query_id
stringlengths
32
32
query
stringlengths
7
4.32k
positive_passages
listlengths
1
1
negative_passages
listlengths
88
101
18d0c35596787f204d75aac32398075a
RequestRemoteAddress returns the remote address for the HTTP request. In order: if the XRealIP header is set, then its value is returned. if the XForwardedFor header is set, then the first value in the commaseparated list is returned. otherwise, the host portion of req.RemoteAddr is returned.
[ { "docid": "399f6ed43d5befb92fc7aa7efc5b6174", "score": "0.843939", "text": "func RequestRemoteAddress(req *http.Request) string {\n\tif realIP := req.Header.Get(\"X-Real-IP\"); realIP != \"\" {\n\t\treturn realIP\n\t}\n\tif xff := req.Header.Get(\"X-Forwarded-For\"); xff != \"\" {\n\t\tif sep := strings.IndexRune(xff, ','); sep > 0 {\n\t\t\txff = xff[:sep]\n\t\t}\n\t\treturn strings.TrimSpace(xff)\n\t}\n\tremoteAddr, _, err := net.SplitHostPort(req.RemoteAddr)\n\tif err != nil {\n\t\tremoteAddr = req.RemoteAddr\n\t}\n\treturn remoteAddr\n}", "title": "" } ]
[ { "docid": "8f4acda9781ba6c2cf04d4d3e68d06cb", "score": "0.84662694", "text": "func RequestGetRemoteAddress(r *http.Request) string {\n\thdr := r.Header\n\thdrRealIP := hdr.Get(\"X-Real-Ip\")\n\thdrForwardedFor := hdr.Get(\"X-Forwarded-For\")\n\tif hdrRealIP == \"\" && hdrForwardedFor == \"\" {\n\t\treturn ipAddrFromRemoteAddr(r.RemoteAddr)\n\t}\n\tif hdrForwardedFor != \"\" {\n\t\t// X-Forwarded-For is potentially a list of addresses separated with \",\"\n\t\tparts := strings.Split(hdrForwardedFor, \",\")\n\t\tfor i, p := range parts {\n\t\t\tparts[i] = strings.TrimSpace(p)\n\t\t}\n\t\treturn parts[0]\n\t}\n\treturn hdrRealIP\n}", "title": "" }, { "docid": "72520a50d5662531a08106931a90f956", "score": "0.8134868", "text": "func requestGetRemoteAddress(r *http.Request) string {\n\thdr := r.Header\n\thdrRealIP := hdr.Get(\"X-Real-Ip\")\n\thdrForwardedFor := hdr.Get(\"X-Forwarded-For\")\n\tif hdrRealIP == \"\" && hdrForwardedFor == \"\" {\n\t\treturn ipAddrFromRemoteAddr(r.RemoteAddr)\n\t}\n\tif hdrForwardedFor != \"\" {\n\t\t// X-Forwarded-For is potentially a list of addresses separated with \",\"\n\t\tparts := strings.Split(hdrForwardedFor, \",\")\n\t\tfor i, p := range parts {\n\t\t\tparts[i] = strings.TrimSpace(p)\n\t\t}\n\t\t// TODO: should return first non-local address\n\t\treturn parts[0]\n\t}\n\treturn hdrRealIP\n}", "title": "" }, { "docid": "b4e9acde7fee38c829dec8da8102bb85", "score": "0.79013884", "text": "func RemoteAddress(r *http.Request) (string, bool) {\n\thdr := r.Header\n\n\t// Try to obtain the ip from the X-Forwarded-For header\n\tip := hdr.Get(\"X-Forwarded-For\")\n\tif ip != \"\" {\n\t\t// X-Forwarded-For is potentially a list of addresses separated with \",\"\n\t\tparts := strings.Split(ip, \",\")\n\t\tif len(parts) > 0 {\n\t\t\tip = strings.TrimSpace(parts[0])\n\n\t\t\tif ip != \"\" {\n\t\t\t\treturn ip, false\n\t\t\t}\n\t\t}\n\t}\n\n\t// Try to obtain the ip from the X-Real-Ip header\n\tip = strings.TrimSpace(hdr.Get(\"X-Real-Ip\"))\n\tif ip != \"\" {\n\t\treturn ip, false\n\t}\n\n\t// Fallback to the request remote address\n\treturn RemovePortFromRemoteAddr(r.RemoteAddr), true\n}", "title": "" }, { "docid": "8f9a3037130066af7aa7fa9cd6a49368", "score": "0.7634477", "text": "func GetRemoteIP(r *http.Request) string {\n\tremoteIP := \"\"\n\tif parts := strings.Split(r.RemoteAddr, \":\"); len(parts) == 2 {\n\t\tremoteIP = parts[0]\n\t}\n\n\tif xff := strings.Trim(r.Header.Get(\"X-Forwarded-For\"), \",\"); len(xff) > 0 {\n\t\taddrs := strings.Split(xff, \",\")\n\t\tlastFwd := addrs[len(addrs)-1]\n\t\tif ip := net.ParseIP(lastFwd); ip != nil {\n\t\t\tremoteIP = ip.String()\n\t\t}\n\t} else if xri := r.Header.Get(\"X-Real-Ip\"); len(xri) > 0 {\n\t\tif ip := net.ParseIP(xri); ip != nil {\n\t\t\tremoteIP = ip.String()\n\t\t}\n\t}\n\n\treturn remoteIP\n}", "title": "" }, { "docid": "663b0ba91647b2b91aba3aca03a81f95", "score": "0.75738007", "text": "func RemoteAddr(r *http.Request) string {\n\tfor _, h := range RemoteAddrHeaders {\n\t\tval := r.Header.Get(h)\n\t\tif val != \"\" {\n\t\t\treturn val\n\t\t}\n\t}\n\n\treturn r.RemoteAddr\n}", "title": "" }, { "docid": "21b7e0af26ec096677f7682169e0b552", "score": "0.7571154", "text": "func getRemoteAddress(r *http.Request) string {\n\thdr := r.Header\n\thdrRealIP := hdr.Get(\"X-Real-Ip\")\n\thdrForwardedFor := hdr.Get(\"X-Forwarded-For\")\n\tif hdrRealIP == \"\" && hdrForwardedFor == \"\" {\n\t\treturn ipAddrFromRemoteAddr(r.RemoteAddr)\n\t}\n\tif hdrForwardedFor != \"\" {\n\t\t// X-Forwarded-For is potentially a list of addresses separated with \",\"\n\t\tparts := strings.Split(hdrForwardedFor, \",\")\n\t\tfor i, p := range parts {\n\t\t\tparts[i] = strings.TrimSpace(p)\n\t\t}\n\t\t// TODO: should return first non-local address\n\t\treturn parts[0]\n\t}\n\treturn hdrRealIP\n}", "title": "" }, { "docid": "2ea77a9b0265c154f88b9db3d76aca22", "score": "0.74318856", "text": "func remoteIP(req *http.Request) (remote string) {\n\tif remote = req.Header.Get(_httpHeaderRemoteIP); remote != \"\" && remote != \"null\" {\n\t\treturn\n\t}\n\tvar xff = req.Header.Get(\"X-Forwarded-For\")\n\tif idx := strings.IndexByte(xff, ','); idx > -1 {\n\t\tif remote = strings.TrimSpace(xff[:idx]); remote != \"\" {\n\t\t\treturn\n\t\t}\n\t}\n\tif remote = req.Header.Get(\"X-Real-IP\"); remote != \"\" {\n\t\treturn\n\t}\n\tremote = req.RemoteAddr[:strings.Index(req.RemoteAddr, \":\")]\n\treturn\n}", "title": "" }, { "docid": "a285b4552e214c65e3a6c81c4d9c46d0", "score": "0.73018694", "text": "func GetRemoteAddr(r *http.Request) string {\n\tip := r.Header.Get(\"CF-Connecting-IP\")\n\tif ip == \"\" {\n\t\treturn r.RemoteAddr\n\t}\n\treturn ip\n}", "title": "" }, { "docid": "159f8de8a512f275f01afbc4a5276f94", "score": "0.7293117", "text": "func remoteAddr( r *http.Request ) net.IP {\n forwardedFor := r.Header.Get( \"X-Forwarded-For\" )\n if forwardedFor != \"\" {\n // Syntax on MDN: X-Forwarded-For: <client>, <proxy1>, <proxy2>\n ip := strings.Split( forwardedFor, \", \" )[0]\n if !(strings.HasPrefix( ip, \"10.\" ) ||\n strings.HasPrefix( ip, \"192.168.\" ) ||\n strings.HasPrefix( ip, \"172.16.\" ) ||\n strings.HasPrefix( ip, \"172.17.\" ) ||\n strings.HasPrefix( ip, \"172.18.\" ) ||\n strings.HasPrefix( ip, \"172.19.\" ) ||\n strings.HasPrefix( ip, \"172.20.\" ) ||\n strings.HasPrefix( ip, \"172.21.\" ) ||\n strings.HasPrefix( ip, \"172.22.\" ) ||\n strings.HasPrefix( ip, \"172.23.\" ) ||\n strings.HasPrefix( ip, \"172.24.\" ) ||\n strings.HasPrefix( ip, \"172.25.\" ) ||\n strings.HasPrefix( ip, \"172.26.\" ) ||\n strings.HasPrefix( ip, \"172.27.\" ) ||\n strings.HasPrefix( ip, \"172.28.\" ) ||\n strings.HasPrefix( ip, \"172.29.\" ) ||\n strings.HasPrefix( ip, \"172.30.\" ) ||\n strings.HasPrefix( ip, \"172.31.\" ) ) {\n return net.ParseIP( ip )\n }\n }\n\n ip, _, _ := net.SplitHostPort( r.RemoteAddr )\n return net.ParseIP( ip )\n}", "title": "" }, { "docid": "88d46142ab77d45d88ed3ee5cf056092", "score": "0.72819525", "text": "func GetRemoteIP(r *http.Request) string {\n\tips := r.Header.Get(\"X-Forwarded-For\")\n\n\tsplitIps := strings.Split(ips, \",\")\n\n\tif ips != \"\" {\n\t\t// trim IP list\n\t\tfor i := range splitIps {\n\t\t\tsplitIps[i] = strings.TrimSpace(splitIps[i])\n\t\t}\n\n\t\t// get last IP in list since ELB prepends other user defined IPs, meaning the last one is the actual client IP.\n\t\tnetIP := net.ParseIP(splitIps[0])\n\t\tif netIP != nil {\n\t\t\treturn netIP.String()\n\t\t}\n\t}\n\n\tip, _, err := net.SplitHostPort(r.RemoteAddr)\n\tif err != nil {\n\t\treturn r.RemoteAddr\n\t}\n\n\tnetIP := net.ParseIP(ip)\n\tif netIP != nil {\n\t\tip := netIP.String()\n\t\tif ip == \"::1\" {\n\t\t\treturn \"127.0.0.1\"\n\t\t}\n\t\treturn ip\n\t}\n\n\treturn r.RemoteAddr\n}", "title": "" }, { "docid": "a2fbae39bc6621c3269875d6113372f8", "score": "0.727298", "text": "func getClientIPByRequestRemoteAddr(req *http.Request) (ip string, err error) {\n\n\t// Try via request\n\tip, _, err = net.SplitHostPort(req.RemoteAddr)\n\tif err != nil {\n\t\t// log.Printf(\"debug: Getting req.RemoteAddr %v\", err)\n\t\treturn \"\", err\n\t} else {\n\t\t// log.Printf(\"debug: With req.RemoteAddr found IP:%v; Port: %v\", ip, port)\n\t}\n\n\tuserIP := net.ParseIP(ip)\n\tif userIP == nil {\n\t\tmessage := fmt.Sprintf(\"debug: Parsing IP from Request.RemoteAddr got nothing.\")\n\t\t// log.Printf(message)\n\t\treturn \"\", fmt.Errorf(message)\n\n\t}\n\t// log.Printf(\"debug: Found IP: %v\", userIP)\n\treturn userIP.String(), nil\n\n}", "title": "" }, { "docid": "e6466d2c27fa0f82f6b7b94511d11a47", "score": "0.7178064", "text": "func RemoteAddr(r *http.Request) string {\n\tvia := r.RemoteAddr\n\txff := r.Header.Get(pdv1.Forward)\n\tif xff != \"\" {\n\t\treturn fmt.Sprintf(\"%v via %v\", xff, r.RemoteAddr)\n\t}\n\treturn via\n}", "title": "" }, { "docid": "6ae8dc57d8791f86a960185c5ca3023b", "score": "0.7147454", "text": "func remoteIP(r *http.Request) (remote string) {\n\tremote = r.Header.Get(\"X-BACKEND-BILI-REAL-IP\")\n\tif remote != \"\" && remote != \"null\" {\n\t\treturn\n\t}\n\tremote = r.Header.Get(\"X-Real-IP\")\n\tif remote != \"\" {\n\t\treturn\n\t}\n\tremote = r.Header.Get(\"X-Forwarded-For\")\n\tif idx := strings.LastIndex(remote, \",\"); idx > -1 {\n\t\tif remote = strings.TrimSpace(remote[idx+1:]); remote != \"\" {\n\t\t\treturn\n\t\t}\n\t}\n\tremote = r.RemoteAddr[0:strings.Index(r.RemoteAddr, \":\")]\n\treturn\n}", "title": "" }, { "docid": "3def108282498758e34f89c2626cc1b6", "score": "0.70558083", "text": "func RemoteAddr(req *http.Request) string {\n\tremoteAddr, _ := splitHost(req.RemoteAddr)\n\treturn remoteAddr\n}", "title": "" }, { "docid": "88cf4e1b03961e93f74adf1c169e5bb7", "score": "0.70517147", "text": "func GetClientIP(r *http.Request) string {\n remoteIP := \"\"\n if parts := strings.Split(r.RemoteAddr, \":\"); len(parts) == 2 {\n remoteIP = parts[0]\n }\n if xff := strings.Trim(r.Header.Get(\"X-Forwarded-For\"), \",\"); len(xff) > 0 {\n addrs := strings.Split(xff, \",\")\n lastFwd := addrs[len(addrs)-1]\n if ip := net.ParseIP(lastFwd); ip != nil {\n remoteIP = ip.String()\n }\n } else if xri := r.Header.Get(\"X-Real-Ip\"); len(xri) > 0 {\n if ip := net.ParseIP(xri); ip != nil {\n remoteIP = ip.String()\n }\n }\n return remoteIP\n}", "title": "" }, { "docid": "afeb75a9c1cb855e138f53c5f71b1e78", "score": "0.6991236", "text": "func (r *Request) RealIP() string {\n\tif len(r.realIP) > 0 {\n\t\treturn r.realIP\n\t}\n\tr.realIP = r.RemoteAddress()\n\tif ip := r.header.Get(echo.HeaderXForwardedFor); len(ip) > 0 {\n\t\tr.realIP = ip\n\t} else if ip := r.header.Get(echo.HeaderXRealIP); len(ip) > 0 {\n\t\tr.realIP = ip\n\t} else {\n\t\tr.realIP, _, _ = net.SplitHostPort(r.realIP)\n\t}\n\treturn r.realIP\n}", "title": "" }, { "docid": "73e1d81047e94698e8fae00e196f24bf", "score": "0.69018674", "text": "func GetIPAddress(r *http.Request) string {\n\tip := \"\"\n\tfor _, h := range []string{\"X-Forwarded-For\", \"X-Real-Ip\"} {\n\t\taddresses := strings.Split(r.Header.Get(h), \",\")\n\t\t// march from right to left until we get a public address\n\t\t// that will be the address right before our proxy.\n\t\tfor i := len(addresses) - 1; i >= 0; i-- {\n\t\t\tip = strings.TrimSpace(addresses[i])\n\t\t\t// header can contain spaces too, strip those out.\n\t\t\trealIP := net.ParseIP(ip)\n\t\t\tif !realIP.IsGlobalUnicast() || IsPrivateSubnet(realIP) {\n\t\t\t\t// bad address, go to next\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\treturn ip\n\t\t}\n\t}\n\n\tip, _, _ = net.SplitHostPort(r.RemoteAddr)\n\treturn ip\n}", "title": "" }, { "docid": "61258dbba7088ea35dc8532579cb33fc", "score": "0.68698084", "text": "func realIP(r *http.Request) string {\n\txRealIP := r.Header.Get(\"X-Real-Ip\")\n\tif xRealIP != \"\" {\n\t\treturn xRealIP\n\t}\n\txForwardedFor := r.Header.Get(\"X-Forwarded-For\")\n\tfor _, address := range strings.Split(xForwardedFor, \",\") {\n\t\taddress = strings.TrimSpace(address)\n\t\tif address != \"\" {\n\t\t\treturn address\n\t\t}\n\t}\n\n\tip, _, err := net.SplitHostPort(r.RemoteAddr)\n\tif err != nil {\n\t\treturn r.RemoteAddr\n\t}\n\treturn ip\n}", "title": "" }, { "docid": "61258dbba7088ea35dc8532579cb33fc", "score": "0.68698084", "text": "func realIP(r *http.Request) string {\n\txRealIP := r.Header.Get(\"X-Real-Ip\")\n\tif xRealIP != \"\" {\n\t\treturn xRealIP\n\t}\n\txForwardedFor := r.Header.Get(\"X-Forwarded-For\")\n\tfor _, address := range strings.Split(xForwardedFor, \",\") {\n\t\taddress = strings.TrimSpace(address)\n\t\tif address != \"\" {\n\t\t\treturn address\n\t\t}\n\t}\n\n\tip, _, err := net.SplitHostPort(r.RemoteAddr)\n\tif err != nil {\n\t\treturn r.RemoteAddr\n\t}\n\treturn ip\n}", "title": "" }, { "docid": "5f31f29904a27ca83cfdababcbd4d57e", "score": "0.6863532", "text": "func GetClientIPFromRequest(request *http.Request) string {\n\tforwaredeFor := request.Header.Get(\"X-FORWARDED-FOR\")\n\tif forwaredeFor != \"\" {\n\t\treturn forwaredeFor\n\t}\n\t// RemoteAddr allows HTTP servers and other software to\n\t// record the network address that sent the request,\n\t// usually for logging. This field is not filled in by\n\t// ReadRequest and has no defined format.\n\t// The HTTP server in this package sets RemoteAddr to an\n\t// \"IP:port\" address before invoking a handler.\n\t// This field is ignored by the HTTP client.\n\treturn request.RemoteAddr\n}", "title": "" }, { "docid": "e0db6dd5977a9b71db9b39482894b9bb", "score": "0.6656568", "text": "func getIP(r *http.Request) string {\n\tvar addr string\n\n\tif fwd := r.Header.Get(xForwardedFor); fwd != \"\" {\n\t\t// Only grab the first (client) address. Note that '192.168.0.1,\n\t\t// 10.1.1.1' is a valid key for X-Forwarded-For where addresses after\n\t\t// the first may represent forwarding proxies earlier in the chain.\n\t\ts := strings.Index(fwd, \", \")\n\t\tif s == -1 {\n\t\t\ts = len(fwd)\n\t\t}\n\t\taddr = fwd[:s]\n\t} else if fwd := r.Header.Get(xRealIP); fwd != \"\" {\n\t\t// X-Real-IP should only contain one IP address (the client making the\n\t\t// request).\n\t\taddr = fwd\n\t} else if fwd := r.Header.Get(forwarded); fwd != \"\" {\n\t\t// match should contain at least two elements if the protocol was\n\t\t// specified in the Forwarded header. The first element will always be\n\t\t// the 'for=' capture, which we ignore. In the case of multiple IP\n\t\t// addresses (for=8.8.8.8, 8.8.4.4,172.16.1.20 is valid) we only\n\t\t// extract the first, which should be the client IP.\n\t\tif match := forRegex.FindStringSubmatch(fwd); len(match) > 1 {\n\t\t\t// IPv6 addresses in Forwarded headers are quoted-strings. We strip\n\t\t\t// these quotes.\n\t\t\taddr = strings.Trim(match[1], `\"`)\n\t\t}\n\t}\n\n\tif addr == \"\" {\n\t\treturn r.RemoteAddr\n\t}\n\treturn addr\n}", "title": "" }, { "docid": "2c576779edcea86e6d72ba4815eab4c8", "score": "0.66006947", "text": "func ipAddr(r *http.Request) string {\n\tip := r.Header.Get(\"X-Real-Ip\")\n\tif ip == \"\" {\n\t\tip = strings.Split(r.Header.Get(\"X-Forwarded-For\"), \", \")[0]\n\t}\n\tif ip == \"\" {\n\t\tip = strings.Split(r.RemoteAddr, \":\")[0]\n\t}\n\treturn ip\n}", "title": "" }, { "docid": "91f26c2c87786159acf058a33a335589", "score": "0.6514458", "text": "func (c *Context) RemoteIP() (remoteIP string) {\n\tremoteIP = metadata.String(c, metadata.RemoteIP)\n\tif remoteIP != \"\" {\n\t\treturn\n\t}\n\n\tremoteIP = c.Request.Header.Get(\"X-Forwarded-For\")\n\tremoteIP = strings.TrimSpace(strings.Split(remoteIP, \",\")[0])\n\tif remoteIP == \"\" {\n\t\tremoteIP = strings.TrimSpace(c.Request.Header.Get(\"X-Real-Ip\"))\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "fb9e798b44549ec35efc9b88fec92eba", "score": "0.64716476", "text": "func GetClientIP(r *http.Request) string {\n\t// Header X-Forwarded-For\n\thdrForwardedFor := http.CanonicalHeaderKey(\"X-Forwarded-For\")\n\tif fwdFor := strings.TrimSpace(r.Header.Get(hdrForwardedFor)); fwdFor != \"\" {\n\t\tindex := strings.Index(fwdFor, \",\")\n\t\tif index == -1 {\n\t\t\treturn fwdFor\n\t\t}\n\t\treturn fwdFor[:index]\n\t}\n\n\t// Header X-Real-Ip\n\thdrRealIP := http.CanonicalHeaderKey(\"X-Real-Ip\")\n\tif realIP := strings.TrimSpace(r.Header.Get(hdrRealIP)); realIP != \"\" {\n\t\treturn realIP\n\t}\n\n\treturn \"10.82.33.161\"\n}", "title": "" }, { "docid": "c1397fbe838ed222d9e515d982806910", "score": "0.6458633", "text": "func getHost(r *http.Request) string {\n\tvar remoteHost string\n\n\tif header := r.Header.Get(\"X-Forwarded-For\"); header != \"\" {\n\t\tremoteHost = header\n\t} else {\n\t\tremoteHost = r.RemoteAddr\n\t}\n\n\treturn remoteHost\n}", "title": "" }, { "docid": "d379fc2c8672508fa7a24e353dd66022", "score": "0.6454224", "text": "func (ctx *Context) RemoteAddr() string {\n\tif ctx.HTTPReq != nil {\n\t\treturn ctx.HTTPReq.RemoteAddr\n\t} else if ctx.WSConn != nil {\n\t\treturn ctx.WSConn.GetRemoteAddr()\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "2a34538d7e59b1b0ee6271caf42d89c6", "score": "0.6437768", "text": "func findIP(req *http.Request) (string, error) {\n\tif xri := req.Header.Get(\"x-real-ip\"); xri != \"\" {\n\t\treturn xri, nil\n\t}\n\tif xff := req.Header.Get(\"x-forwarded-for\"); xff != \"\" {\n\t\tips := strings.Split(xff, \",\")\n\t\treturn ips[0], nil\n\t}\n\tip, _, err := net.SplitHostPort(req.RemoteAddr)\n\treturn ip, err\n\n}", "title": "" }, { "docid": "0906d5dab7f7e85f5ecf20433213e618", "score": "0.64284027", "text": "func GetClientIPAddress(r *http.Request) string {\n\tip := r.Header.Get(\"X-Forwarded-For\")\n\tif ip != \"\" {\n\t\titems := strings.Split(ip, \",\")\n\t\tfor i := len(items) - 1; i >= 0; i-- {\n\t\t\titem := strings.Trim(items[i], \" \")\n\t\t\tif item != \"127.0.0.1\" && !strings.HasPrefix(item, \"10.\") {\n\t\t\t\treturn item\n\t\t\t}\n\t\t}\n\t}\n\t// Try parsing remote address.\n\thost, _, err := net.SplitHostPort(r.RemoteAddr)\n\tif err == nil {\n\t\treturn host\n\t}\n\t// Fallback method.\n\tif strings.HasPrefix(r.RemoteAddr, \"[\") {\n\t\tparts := strings.Split(r.RemoteAddr, \"]\")\n\t\treturn parts[0][1:]\n\t}\n\tparts := strings.Split(r.RemoteAddr, \":\")\n\treturn parts[0]\n}", "title": "" }, { "docid": "85538b6cd9748f2107307aa5154ebbeb", "score": "0.63888574", "text": "func RequestClientIP(req *http.Request) (net.IP, error) {\n\trealIp := req.Header.Get(\"X-Real-IP\")\n\t// ip, _, err := net.SplitHostPort(req.RemoteAddr)\n\t// if err != nil {\n\t// \treturn nil, fmt.Errorf(\"userip: %q is not IP:port\", req.RemoteAddr)\n\t// }\n\t//\n\t// userIP := net.ParseIP(ip)\n\t// if userIP == nil {\n\t// \treturn nil, fmt.Errorf(\"userip: %q is not IP:port\", req.RemoteAddr)\n\t// }\n\t// return userIP, nil\n\treturn net.ParseIP(realIp), nil\n}", "title": "" }, { "docid": "420cf9ce7e7bb2beaa1b642e72de73b0", "score": "0.6387388", "text": "func (m MetaData) GetRemoteIP() string {\n\tif len(m) == 0 {\n\t\treturn \"\"\n\t}\n\tif ip := m[\"x-forwarded-for\"]; ip != \"\" {\n\t\tparts := strings.Split(ip, \",\")\n\t\tif len(parts) > 0 {\n\t\t\treturn parts[0]\n\t\t}\n\t}\n\treturn m[remoteIPFromPeer]\n}", "title": "" }, { "docid": "8b73df1af1bc28fd962c3609c292bbd6", "score": "0.6351185", "text": "func ClientIP(r *http.Request) (clientIP string) {\n\tvar values []string\n\n\tif values, _ = r.Header[XRealIP]; len(values) > 0 {\n\n\t\tclientIP = strings.TrimSpace(values[0])\n\t\tif clientIP != blank {\n\t\t\treturn\n\t\t}\n\t}\n\n\tif values, _ = r.Header[XForwardedFor]; len(values) > 0 {\n\t\tclientIP = values[0]\n\n\t\tif index := strings.IndexByte(clientIP, ','); index >= 0 {\n\t\t\tclientIP = clientIP[0:index]\n\t\t}\n\n\t\tclientIP = strings.TrimSpace(clientIP)\n\t\tif clientIP != blank {\n\t\t\treturn\n\t\t}\n\t}\n\n\tclientIP, _, _ = net.SplitHostPort(strings.TrimSpace(r.RemoteAddr))\n\n\treturn\n}", "title": "" }, { "docid": "869d9e73eecf040840736c0ec6e80165", "score": "0.631186", "text": "func getIP(r *http.Request, trustForwardHeader bool) net.IP {\n\tif trustForwardHeader {\n\t\tip := r.Header.Get(\"X-Forwarded-For\")\n\t\tif ip != \"\" {\n\t\t\tparts := strings.SplitN(ip, \",\", 2)\n\t\t\tpart := strings.TrimSpace(parts[0])\n\t\t\treturn net.ParseIP(part)\n\t\t}\n\t\tip = strings.TrimSpace(r.Header.Get(\"X-Real-IP\"))\n\t\tif ip != \"\" {\n\t\t\treturn net.ParseIP(ip)\n\t\t}\n\t}\n\n\tremoteAddr := strings.TrimSpace(r.RemoteAddr)\n\thost, _, err := net.SplitHostPort(remoteAddr)\n\tif err != nil {\n\t\treturn net.ParseIP(remoteAddr)\n\t}\n\n\treturn net.ParseIP(host)\n}", "title": "" }, { "docid": "090c9745a4fb8cd23dc4b6d40e7158ac", "score": "0.6274963", "text": "func (rs *requestContext) RemoteAddress() string {\n\treturn rs.remoteAddress\n}", "title": "" }, { "docid": "d2103c81c1dd704d4bcb6053b2c2ffa9", "score": "0.6202371", "text": "func GetIP(r *http.Request) string {\n\tforwarded := r.Header.Get(\"X-FORWARDED-FOR\")\n\tif forwarded != \"\" {\n\t\treturn forwarded\n\t}\n\n\treturn r.RemoteAddr\n}", "title": "" }, { "docid": "b5b5dc8586bdbac0b98d5844bed2bf30", "score": "0.61755556", "text": "func GetRemoteAddressSet(ctx *gin.Context) (remoteIp, remotePort string) {\n\tremoteIp, remotePort = \"0.0.0.0\", \"0\"\n\n\tif ctx == nil || ctx.Request == nil {\n\t\treturn\n\t}\n\n\tvar err error\n\tif remoteIp, remotePort, err = net.SplitHostPort(ctx.Request.RemoteAddr); err != nil {\n\t\treturn\n\t}\n\n\tforwardedRemoteIp := ctx.GetHeader(\"x-forwarded-for\")\n\n\t// Deal with forwarded remote ip\n\tif len(forwardedRemoteIp) > 0 {\n\t\tif forwardedRemoteIp == \"::1\" {\n\t\t\tforwardedRemoteIp = \"localhost\"\n\t\t}\n\n\t\tremoteIp = forwardedRemoteIp\n\t}\n\n\tif remoteIp == \"::1\" {\n\t\tremoteIp = \"localhost\"\n\t}\n\n\treturn remoteIp, remotePort\n}", "title": "" }, { "docid": "7ba622606c6d0f5c982068de1f5030cc", "score": "0.61658615", "text": "func GetIP(r *http.Request) string {\n\tforwarded := r.Header.Get(\"X-FORWARDED-FOR\")\n\tif forwarded != \"\" {\n\t\treturn forwarded\n\t}\n\treturn r.RemoteAddr\n}", "title": "" }, { "docid": "d04ca16713ddcefdfa15985cc32d6c27", "score": "0.6164016", "text": "func (m MetaData) GetRealIP() string {\n\tif len(m) == 0 {\n\t\treturn \"\"\n\t}\n\tfor _, k := range []string{\"grpcgateway-x-real-ip\", \"x-real-ip\"} {\n\t\tif v := m[k]; v != \"\" {\n\t\t\treturn v\n\t\t}\n\t}\n\tif ip := m[\"x-forwarded-for\"]; ip != \"\" {\n\t\tparts := strings.Split(ip, \",\")\n\t\tif len(parts) > 0 {\n\t\t\treturn parts[0]\n\t\t}\n\t}\n\treturn m.GetRemoteIP()\n}", "title": "" }, { "docid": "afe3d48adb2b6f354e1336dbd2ef9de2", "score": "0.61529714", "text": "func evaluateIPAddress(req *http.Request) (*ipAddress, error) {\n\tresult := ipAddress{}\n\tip, _, err := net.SplitHostPort(req.RemoteAddr)\n\tif err != nil {\n\t\treturn &result, fmt.Errorf(\"The user IP: %q is not IP:port\", req.RemoteAddr)\n\t}\n\n\t// If the client is behind a non-anonymous proxy, the IP address is in the X-Forwarded-For header.\n\t// req.Header.Get is case-insensitive.\n\tresult.IPAddressV4 = req.Header.Get(\"X-Forwarded-For\")\n\tif result.IPAddressV4 == \"\" {\n\t\t// If no header can be read, directly extract the address for the request.\n\t\tuserIP := net.ParseIP(ip)\n\t\tif userIP == nil {\n\t\t\treturn &result, fmt.Errorf(\"The user IP: %q is not IP:port\", req.RemoteAddr)\n\t\t}\n\t\tresult.IPAddressV4 = userIP.String()\n\t\tresult.Source = \"Remote address\"\n\t} else {\n\t\tresult.Source = \"X-Forwarded-For\"\n\t}\n\treturn &result, nil\n}", "title": "" }, { "docid": "ba3f89c6d99d522859840adc4b618bf6", "score": "0.6132437", "text": "func GetIP(r *http.Request) string {\n\taddr := r.Header.Get(\"X-Forwarded-For\")\n\tif addr != \"\" {\n\t\treturn addr\n\t}\n\treturn r.RemoteAddr\n}", "title": "" }, { "docid": "5d24dba512d1b8e97cadb997edb5c92f", "score": "0.6111287", "text": "func ClientIP(r *http.Request) string {\n\tIPAddress := r.Header.Get(\"X-Real-Ip\")\n\tif IPAddress == \"\" {\n\t\tIPAddress = r.Header.Get(\"X-Forwarded-For\")\n\t}\n\n\tif IPAddress == \"\" {\n\t\tIPAddress = r.RemoteAddr\n\t}\n\n\treturn IPAddress\n}", "title": "" }, { "docid": "b69e10d268d1a81914223c979322cb3b", "score": "0.60558814", "text": "func GetIP(r *http.Request) string {\n\tfwd := r.Header.Get(\"X-FORWARDED-FOR\")\n\tif fwd != \"\" {\n\t\treturn fwd\n\t}\n\treturn r.RemoteAddr\n}", "title": "" }, { "docid": "7f79bdd3b84b72cfda324515c7ea2c4f", "score": "0.60120565", "text": "func GetClientIP(c *gin.Context) string {\n\t// first check the X-Forwarded-For header\n\trequester := c.Request.Header.Get(\"X-Forwarded-For\")\n\t// if empty, check the Real-IP header\n\tif len(requester) == 0 {\n\t\trequester = c.Request.Header.Get(\"X-Real-IP\")\n\t}\n\t// if the requester is still empty, use the hard-coded address from the socket\n\tif len(requester) == 0 {\n\t\trequester = c.Request.RemoteAddr\n\t}\n\n\t// if requester is a comma delimited list, take the first one\n\t// (this happens when proxied via elastic load balancer then again through nginx)\n\tif strings.Contains(requester, \",\") {\n\t\trequester = strings.Split(requester, \",\")[0]\n\t}\n\n\treturn requester\n}", "title": "" }, { "docid": "7f79bdd3b84b72cfda324515c7ea2c4f", "score": "0.60120565", "text": "func GetClientIP(c *gin.Context) string {\n\t// first check the X-Forwarded-For header\n\trequester := c.Request.Header.Get(\"X-Forwarded-For\")\n\t// if empty, check the Real-IP header\n\tif len(requester) == 0 {\n\t\trequester = c.Request.Header.Get(\"X-Real-IP\")\n\t}\n\t// if the requester is still empty, use the hard-coded address from the socket\n\tif len(requester) == 0 {\n\t\trequester = c.Request.RemoteAddr\n\t}\n\n\t// if requester is a comma delimited list, take the first one\n\t// (this happens when proxied via elastic load balancer then again through nginx)\n\tif strings.Contains(requester, \",\") {\n\t\trequester = strings.Split(requester, \",\")[0]\n\t}\n\n\treturn requester\n}", "title": "" }, { "docid": "a8fdb524021048aec3444a7ed5053be3", "score": "0.6005146", "text": "func (m *Headers) GetXForwardedFor()(*string) {\n val, err := m.GetBackingStore().Get(\"xForwardedFor\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "ba940389aa8deaf50ba86fa4944b6e81", "score": "0.6001", "text": "func (s *serverCGI) remoteIP(host string) string {\n\tif host != \"\" {\n\t\treturn host\n\t}\n\tremoteAddr, _, err := net.SplitHostPort(s.req.RemoteAddr)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn \"\"\n\t}\n\tif !isGlobal(remoteAddr) {\n\t\tlog.Println(remoteAddr, \"is local IP\")\n\t\treturn \"\"\n\t}\n\treturn remoteAddr\n}", "title": "" }, { "docid": "9b87934139c9c4d58c2971016527a022", "score": "0.5990176", "text": "func GetRequestIPs(r *http.Request) string {\n\tip, _, err := net.SplitHostPort(r.RemoteAddr)\n\tif err != nil {\n\t\tip = r.RemoteAddr\n\t}\n\tips := []string{ip}\n\txfr := r.Header.Get(\"X-Forwarded-For\")\n\tif xfr != \"\" {\n\t\tips = append(ips, xfr)\n\t}\n\txri := r.Header.Get(\"X-Real-Ip\")\n\tif xri != \"\" {\n\t\tips = append(ips, xri)\n\t}\n\treturn strings.Join(ips, \", \")\n}", "title": "" }, { "docid": "f2e15b1c8c97ef32d314517d904a1466", "score": "0.59688663", "text": "func GetIP(r *http.Request) (string, string) {\n\tfwd := r.Header.Get(\"X-Forwarded-For\")\n\taddrStr := \"\"\n\n\tif fwd != \"\" {\n\t\taddrStr = fwd\n\t} else {\n\t\taddrStr = r.RemoteAddr\n\t}\n\taddr := strings.Split(addrStr, \":\")\n\n\treturn addr[0], addr[1]\n}", "title": "" }, { "docid": "2fe5ff6cdc1e085559193d7de8f1ea9c", "score": "0.59508866", "text": "func getIP(r *http.Request) string {\n\tif ip := r.Header.Get(\"CF-Connecting-IP\"); ip != \"\" {\n\t\treturn ip\n\t}\n\tif ip := r.Header.Get(\"X-Forwarded-For\"); ip != \"\" {\n\t\t// Trim off any others: A.B.C.D[,X.X.X.X,Y.Y.Y.Y,]\n\t\treturn strings.SplitN(ip, \",\", 1)[0]\n\t}\n\tif ip, _, err := net.SplitHostPort(r.RemoteAddr); err == nil {\n\t\treturn ip\n\t}\n\treturn r.RemoteAddr\n}", "title": "" }, { "docid": "2fe5ff6cdc1e085559193d7de8f1ea9c", "score": "0.59508866", "text": "func getIP(r *http.Request) string {\n\tif ip := r.Header.Get(\"CF-Connecting-IP\"); ip != \"\" {\n\t\treturn ip\n\t}\n\tif ip := r.Header.Get(\"X-Forwarded-For\"); ip != \"\" {\n\t\t// Trim off any others: A.B.C.D[,X.X.X.X,Y.Y.Y.Y,]\n\t\treturn strings.SplitN(ip, \",\", 1)[0]\n\t}\n\tif ip, _, err := net.SplitHostPort(r.RemoteAddr); err == nil {\n\t\treturn ip\n\t}\n\treturn r.RemoteAddr\n}", "title": "" }, { "docid": "418095947eedbfa4407bd2b890d703f6", "score": "0.59417623", "text": "func GetIP(r *http.Request, options ...*KeyOptions) net.IP {\n\tif len(options) >= 1 && options[0].TrustForwardHeader {\n\t\tip := r.Header.Get(\"X-Forwarded-For\")\n\t\tif ip != \"\" {\n\t\t\tparts := strings.SplitN(ip, \",\", 2)\n\t\t\tpart := strings.TrimSpace(parts[0])\n\t\t\treturn net.ParseIP(part)\n\t\t}\n\n\t\tip = strings.TrimSpace(r.Header.Get(\"X-Real-IP\"))\n\t\tif ip != \"\" {\n\t\t\treturn net.ParseIP(ip)\n\t\t}\n\t}\n\n\tremoteAddr := strings.TrimSpace(r.RemoteAddr)\n\thost, _, err := net.SplitHostPort(remoteAddr)\n\tif err != nil {\n\t\treturn net.ParseIP(remoteAddr)\n\t}\n\n\treturn net.ParseIP(host)\n}", "title": "" }, { "docid": "a49a415357c57110b5f0d49a4fd21dee", "score": "0.59296393", "text": "func IP(w http.ResponseWriter, r *http.Request) {\n\tremoteAddr := r.Header.Get(\"X-Forwarded-For\")\n\n\tif remoteAddr == \"\" {\n\t\thost, _, err := net.SplitHostPort(r.RemoteAddr)\n\t\tif err != nil {\n\t\t\tlog.Fatalln(err)\n\t\t}\n\t\tremoteAddr = host\n\t}\n\n\tfmt.Fprintln(w, remoteAddr)\n}", "title": "" }, { "docid": "4241980b128c09815c0728aa2bce5b54", "score": "0.59246665", "text": "func getClientIPByHeaders(req *http.Request) (ip string, err error) {\n\n\t// Client could be behid a Proxy, so Try Request Headers (X-Forwarder)\n\tipSlice := []string{}\n\n\tipSlice = append(ipSlice, req.Header.Get(\"X-Forwarded-For\"))\n\tipSlice = append(ipSlice, req.Header.Get(\"x-forwarded-for\"))\n\tipSlice = append(ipSlice, req.Header.Get(\"X-FORWARDED-FOR\"))\n\n\tfor _, v := range ipSlice {\n\t\t// log.Printf(\"debug: client request header check gives ip: %v\", v)\n\t\tif v != \"\" {\n\t\t\treturn v, nil\n\t\t}\n\t}\n\terr = errors.New(\"error: Could not find clients IP address from the Request Headers\")\n\treturn \"\", err\n\n}", "title": "" }, { "docid": "1ce6c794206e6611e052eef881aa52ca", "score": "0.5869314", "text": "func (c *Conn) RemoteAddr() net.Addr {\n\tvar err error\n\n\tc.once.Do(func() {\n\t\terr = c.scanProxyData()\n\t})\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\tif c.srcAddr != nil && c.useRemoteAddress == true {\n\t\treturn c.srcAddr\n\t}\n\treturn c.Conn.RemoteAddr()\n}", "title": "" }, { "docid": "df9a96fe77f81303ff3602218c8fd641", "score": "0.5852071", "text": "func (c *Context) ClientIP() string {\n\tclientIP := c.requestHeader(\"X-Forwarded-For\")\n\tclientIP = strings.TrimSpace(strings.Split(clientIP, \",\")[0])\n\tif clientIP == \"\" {\n\t\tclientIP = strings.TrimSpace(c.requestHeader(\"X-Real-Ip\"))\n\t}\n\tif clientIP != \"\" {\n\t\treturn clientIP\n\t}\n\n\tif addr := c.requestHeader(\"X-Appengine-Remote-Addr\"); addr != \"\" {\n\t\t\treturn addr\n\t\t}\n\n\tif ip, _, err := net.SplitHostPort(strings.TrimSpace(c.Req.RemoteAddr)); err == nil {\n\t\treturn ip\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "1ae6c167ffca0b8f226cc064e2ed5c5f", "score": "0.5851229", "text": "func (c *icecontext) RealIP() string {\n\tif c.clientip == \"\" {\n\t\tra := c.Request().GetRemoteAddr()\n\t\tif ip := c.Header().Get(protocol.HeaderXForwardedFor); ip != \"\" {\n\t\t\tra = strings.Split(ip, \", \")[0]\n\t\t} else if ip := c.Header().Get(protocol.HeaderXRealIP); ip != \"\" {\n\t\t\tra = ip\n\t\t} else {\n\t\t\tra, _, _ = net.SplitHostPort(ra)\n\t\t}\n\t\tc.clientip = ra\n\t\treturn ra\n\t}\n\treturn c.clientip\n}", "title": "" }, { "docid": "21b9c2f79e2b10466dd084692840893d", "score": "0.58491725", "text": "func GetClientIPHelper(req *http.Request) (ipResult string, errResult error) {\n\n\t// Try lots of ways :) Order is important.\n\t// Try Request Headers (X-Forwarder). Client could be behind a Proxy\n\tip, err := getClientIPByHeaders(req)\n\tif err == nil {\n\t\t// log.Printf(\"debug: Found IP using Request Headers sniffing. ip: %v\", ip)\n\t\treturn ip, nil\n\t}\n\n\t// Try by Request\n\tip, err = getClientIPByRequestRemoteAddr(req)\n\tif err == nil {\n\t\t// log.Printf(\"debug: Found IP using Request sniffing. ip: %v\", ip)\n\t\treturn ip, nil\n\t}\n\n\t// Try Request Header (\"Origin\")\n\turl, err := url.Parse(req.Header.Get(\"Origin\"))\n\tif err == nil {\n\t\thost := url.Host\n\t\tip, _, err := net.SplitHostPort(host)\n\t\tif err == nil {\n\t\t\t// log.Printf(\"debug: Found IP using Header (Origin) sniffing. ip: %v\", ip)\n\t\t\treturn ip, nil\n\t\t}\n\t}\n\n\terr = errors.New(\"error: Could not find clients IP address\")\n\treturn \"\", err\n}", "title": "" }, { "docid": "d939f326ca8bee69770e9a8778bff0e6", "score": "0.5833367", "text": "func (p *Conn) RemoteAddr() net.Addr {\n\tp.once.Do(func() {\n\t\tif err := p.checkPrefix(); err != nil && err != io.EOF {\n\t\t\tlog.Printf(\"[ERR] Failed to read proxy prefix: %v\", err)\n\t\t\tp.Close()\n\t\t\tp.bufReader = bufio.NewReader(p.conn)\n\t\t}\n\t})\n\tif p.srcAddr != nil && !p.useConnRemoteAddr {\n\t\treturn p.srcAddr\n\t}\n\treturn p.conn.RemoteAddr()\n}", "title": "" }, { "docid": "c280ccb16cfc421783b19fcd1b666513", "score": "0.5816453", "text": "func getIP(w http.ResponseWriter, req *http.Request) string {\n\n\tip, _, err := net.SplitHostPort(req.RemoteAddr)\n\tif err != nil {\n\t\tlog.Debugf(\"userip: %q is not IP:port\", req.RemoteAddr)\n\t}\n\n\tuserIP := net.ParseIP(ip)\n\tif userIP == nil {\n\t\treturn req.RemoteAddr\n\t}\n\n\t// This will only be defined when site is accessed via non-anonymous proxy\n\t// and takes precedence over RemoteAddr Header.Get is case-insensitive\n\tforward := req.Header.Get(\"X-Forwarded-For\")\n\treturn forward\n}", "title": "" }, { "docid": "bb365ec1363392ca298facfae2d86f62", "score": "0.5802605", "text": "func (c *Context) ClientIP() string {\n\tclientIP := c.GetHeader(\"X-Forwarded-For\")\n\tclientIP = strings.TrimSpace(strings.Split(clientIP, \",\")[0])\n\tif clientIP == emptyString {\n\t\tclientIP = strings.TrimSpace(c.GetHeader(\"X-Real-Ip\"))\n\t}\n\tif clientIP != emptyString {\n\t\treturn clientIP\n\t}\n\tif ip, _, err := net.SplitHostPort(strings.TrimSpace(c.Req.RemoteAddr)); err == nil {\n\t\treturn ip\n\t}\n\treturn emptyString\n}", "title": "" }, { "docid": "d41ab8bd93b03c269a48555e285181e7", "score": "0.5793767", "text": "func (p *Conn) RemoteAddr() net.Addr {\n\tp.checkProxyHeaderOnce()\n\tif p.srcAddr != nil {\n\t\treturn p.srcAddr\n\t}\n\treturn p.conn.RemoteAddr()\n}", "title": "" }, { "docid": "b53cf9de238a4e6550f32c94d10d0ee9", "score": "0.57754964", "text": "func IP(c *fiber.Ctx) string {\n\tvar headerValue []byte\n\tif c.App().Config().ProxyHeader == \"*\" {\n\t\tfor _, headerName := range possibleHeaderes {\n\t\t\theaderValue = c.Request().Header.Peek(headerName)\n\t\t\tif len(headerValue) > 3 {\n\t\t\t\treturn string(fetchIpFromString.Find(headerValue))\n\t\t\t}\n\t\t}\n\t}\n\theaderValue = []byte(c.IP())\n\tif len(headerValue) <= 3 {\n\t\theaderValue = []byte(\"0.0.0.0\")\n\t}\n\n\t// find ip address in string\n\treturn string(fetchIpFromString.Find(headerValue))\n}", "title": "" }, { "docid": "bbba51564ea46a4ca7bbe09a56517d3f", "score": "0.57725745", "text": "func IPFromRequest(r *http.Request) string {\n\theaderIP := r.Header.Get(CsioClientIPHeader)\n\tif headerIP != \"\" {\n\t\treturn IPFromAddr(headerIP)\n\t}\n\treturn IPFromAddr(r.RemoteAddr)\n}", "title": "" }, { "docid": "073728a2b23d185cb6b79a5907386a97", "score": "0.5770789", "text": "func (c *Context) ClientIP() string {\n\tif c.Router.Engine.ForwardedByClientIP {\n\t\tclientIP := c.requestHeader(\"X-Forwarded-For\")\n\t\tif index := strings.IndexByte(clientIP, ','); index >= 0 {\n\t\t\tclientIP = clientIP[0:index]\n\t\t}\n\t\tclientIP = strings.TrimSpace(clientIP)\n\t\tif len(clientIP) > 0 {\n\t\t\treturn clientIP\n\t\t}\n\t\tclientIP = strings.TrimSpace(c.requestHeader(\"X-Real-Ip\"))\n\t\tif len(clientIP) > 0 {\n\t\t\treturn clientIP\n\t\t}\n\t}\n\n\tif c.Router.Engine.AppEngine {\n\t\tif addr := c.Request.Header.Get(\"X-Appengine-Remote-Addr\"); addr != \"\" {\n\t\t\treturn addr\n\t\t}\n\t}\n\n\tif ip, _, err := net.SplitHostPort(strings.TrimSpace(c.Request.RemoteAddr)); err == nil {\n\t\treturn ip\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "e3e5f85f24dd4ab8cfb0e936783ece6c", "score": "0.57622665", "text": "func GetRemoteAddressSetFromMeta(md metadata.MD) (ip, port string) {\n\tif v := md.Get(\"x-forwarded-remote-addr\"); len(v) > 0 {\n\t\tip, port, _ = net.SplitHostPort(v[0])\n\t}\n\n\tif ip == \"::1\" {\n\t\tip = \"localhost\"\n\t}\n\n\treturn ip, port\n}", "title": "" }, { "docid": "5aa2ed3691f6e75828a6554ab40e080a", "score": "0.5742364", "text": "func Get(r *http.Request, header interface{}) (string, error) {\n\tvar value string\n\n\tswitch header.(type) {\n\tcase string:\n\t\tvalue = r.Header.Get(header.(string))\n\t\tif value == \"\" {\n\t\t\tvalue = r.RemoteAddr\n\t\t}\n\tdefault:\n\t\tvalue = r.RemoteAddr\n\t}\n\n\taddresses := strings.Split(value, \",\")\n\taddress := strings.TrimSpace(addresses[len(addresses)-1])\n\n\tidx := strings.LastIndex(address, \":\")\n\tif idx != -1 {\n\t\taddress = address[:idx]\n\t}\n\n\tif address == \"\" {\n\t\terr := errors.New(\"Could not read address\")\n\t\treturn \"\", err\n\t}\n\n\treturn address, nil\n}", "title": "" }, { "docid": "0a2ce996d91bc56a7a21d1de479a3628", "score": "0.572636", "text": "func (c *Ctx) ClientIP() (clientIP string) {\n\n\tvar values []string\n\n\tif values, _ = c.request.Header[XRealIP]; len(values) > 0 {\n\n\t\tclientIP = strings.TrimSpace(values[0])\n\t\tif clientIP != blank {\n\t\t\treturn\n\t\t}\n\t}\n\n\tif values, _ = c.request.Header[XForwardedFor]; len(values) > 0 {\n\t\tclientIP = values[0]\n\n\t\tif index := strings.IndexByte(clientIP, ','); index >= 0 {\n\t\t\tclientIP = clientIP[0:index]\n\t\t}\n\n\t\tclientIP = strings.TrimSpace(clientIP)\n\t\tif clientIP != blank {\n\t\t\treturn\n\t\t}\n\t}\n\n\tclientIP, _, _ = net.SplitHostPort(strings.TrimSpace(c.request.RemoteAddr))\n\n\treturn\n}", "title": "" }, { "docid": "124810728dab4bcc21ebcf57c0e4a9c6", "score": "0.5724238", "text": "func GetClientIP(r *http.Request, headers ...string) string {\n\tfor _, header := range headers {\n\t\tip := r.Header.Get(header)\n\t\tif ip != \"\" {\n\t\t\treturn strings.Split(ip, \",\")[0]\n\t\t}\n\t}\n\treturn strings.Split(r.RemoteAddr, \":\")[0]\n}", "title": "" }, { "docid": "975c6fbe6f1e135386d8396d562854ea", "score": "0.5678684", "text": "func (c *Conn) RemoteAddr() net.Addr {\n\treturn c.c.RemoteAddr()\n}", "title": "" }, { "docid": "c7fd35099e10d968d619f8f1d62c0279", "score": "0.5674571", "text": "func (s *Session) GetRemoteAddr() net.Addr {\n\treturn s.session.RemoteAddr()\n}", "title": "" }, { "docid": "41b3b70b21ab000be11510863b62ba27", "score": "0.56669945", "text": "func (ctx *Context) LocalIP() string {\n\txForwardedFor := ctx.Request.Header.Get(\"X-Forwarded-For\")\n\tip := strings.TrimSpace(strings.Split(xForwardedFor, \",\")[0])\n\tif ip != \"\" {\n\t\treturn ip\n\t}\n\n\tip = strings.TrimSpace(ctx.Request.Header.Get(\"X-Real-Ip\"))\n\tif ip != \"\" {\n\t\treturn ip\n\t}\n\n\tif ip, _, err := net.SplitHostPort(strings.TrimSpace(ctx.Request.RemoteAddr)); err == nil {\n\t\treturn ip\n\t}\n\n\treturn \"127.0.0.1\"\n}", "title": "" }, { "docid": "7c5ef0a670ed6932c1796d8d32b78160", "score": "0.56659836", "text": "func (c *Conn) RemoteAddr() net.Addr {\n\tif !c.ok() {\n\t\treturn nil\n\t}\n\treturn c.raddr\n}", "title": "" }, { "docid": "2cec9f1677eb0fc14e0466358968b577", "score": "0.5659722", "text": "func GetHostName(r *http.Request) string {\n\thost := r.Header.Get(\"X-Forwarded-Host\")\n\tif host != \"\" {\n\t\treturn host\n\t}\n\treturn r.Host\n}", "title": "" }, { "docid": "bc58d31c02076f6595bf2286d50ead3e", "score": "0.56533384", "text": "func (c *Conn) RemoteAddr() net.Addr {\n // return c.conn.RemoteAddr()\n fmt.Println(\"getting remote addr\")\n return nil\n}", "title": "" }, { "docid": "44179d7bc805b0c50063844041baabc7", "score": "0.5617086", "text": "func (ctx *Context) RealIP() string {\r\n\tvar ip = ctx.R.Header.Get(HeaderXRealIP)\r\n\tif len(ip) > 0 {\r\n\t\treturn ip\r\n\t}\r\n\tips := ctx.Proxy()\r\n\tif len(ips) > 0 && ips[0] != \"\" {\r\n\t\trip := strings.Split(ips[0], \":\")\r\n\t\treturn rip[0]\r\n\t}\r\n\treturn ctx.IP()\r\n}", "title": "" }, { "docid": "fd76a576db790276603b1a39c073b6b9", "score": "0.5606427", "text": "func (p *Context) ClientIP() string {\n\tip := p.Request.Header.Get(\"X-Forwarded-For\")\n\tif idx := strings.IndexByte(ip, ','); idx >= 0 {\n\t\tip = ip[0:idx]\n\t}\n\tip = strings.TrimSpace(ip)\n\tif ip != \"\" {\n\t\treturn ip\n\t}\n\n\tip = strings.TrimSpace(p.Request.Header.Get(\"X-Real-Ip\"))\n\tif ip != \"\" {\n\t\treturn ip\n\t}\n\n\tif ip = p.Request.Header.Get(\"X-Appengine-Remote-Addr\"); ip != \"\" {\n\t\treturn ip\n\t}\n\tif ip, _, err := net.SplitHostPort(strings.TrimSpace(p.Request.RemoteAddr)); err == nil {\n\t\treturn ip\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "0013eaf0aaa3eaf19109350870185046", "score": "0.55816245", "text": "func (c *webCtx) RemoteIP() string {\n\treturn c.remoteIP\n}", "title": "" }, { "docid": "ec4f135bdc0d0ddbf47b668a91ca81b4", "score": "0.5578193", "text": "func (v *Client) IP() string {\n\tif v.ip == \"\" {\n\t\tip := strings.TrimSpace(v.req.Header.Get(\"X-Real-Ip\"))\n\t\tif len(ip) > 0 {\n\t\t\tv.ip = ip\n\t\t\treturn ip\n\t\t}\n\t\tip = v.req.Header.Get(\"X-Forwarded-For\")\n\t\tif index := strings.IndexByte(ip, ','); index >= 0 {\n\t\t\tip = ip[0:index]\n\t\t}\n\t\tip = strings.TrimSpace(ip)\n\t\tif len(ip) > 0 {\n\t\t\tv.ip = ip\n\t\t\treturn ip\n\t\t}\n\t\tif ip, _, err := net.SplitHostPort(strings.TrimSpace(v.req.RemoteAddr)); err == nil {\n\t\t\tv.ip = ip\n\t\t\treturn ip\n\t\t}\n\t}\n\treturn v.ip\n}", "title": "" }, { "docid": "d3de651a384d9ff054e7a0bc6df50dd2", "score": "0.55663306", "text": "func (c *Conn) RemoteAddr() net.Addr {\n\tif c.remoteAddr != nil {\n\t\treturn c.remoteAddr\n\t}\n\treturn c.Conn.RemoteAddr()\n}", "title": "" }, { "docid": "5c8528535273dc38a712bb0cff0d3ab0", "score": "0.556436", "text": "func extractIP(r *http.Request) (string, error) {\n\t// if not a proper remote addr, return empty\n\tif !strings.ContainsRune(r.RemoteAddr, ':') {\n\t\treturn \"\", errors.New(\"lol\")\n\t}\n\tipAddr, _, err := net.SplitHostPort(r.RemoteAddr)\n\tif err != nil || ipAddr == \"\" {\n\t\treturn \"\", errors.New(\"Request has failed origin validation. Please retry.\")\n\t}\n\treturn ipAddr, nil\n}", "title": "" }, { "docid": "15350366802090646abaa3ec2fd1cfab", "score": "0.5563361", "text": "func logFrom(req *http.Request) string {\n\tif f := req.Header.Get(\"X-Forwarded-For\"); f != \"\" {\n\t\treturn f\n\t}\n\tf := req.RemoteAddr\n\tip, _, err := net.SplitHostPort(f)\n\tif err != nil {\n\t\treturn f\n\t}\n\treturn ip\n}", "title": "" }, { "docid": "037167a1ee49dc2853b3ac63d8456fe3", "score": "0.555664", "text": "func (c *Conn) RemoteAddr() net.Addr {\n\treturn c.conn.RemoteAddr()\n}", "title": "" }, { "docid": "037167a1ee49dc2853b3ac63d8456fe3", "score": "0.555664", "text": "func (c *Conn) RemoteAddr() net.Addr {\n\treturn c.conn.RemoteAddr()\n}", "title": "" }, { "docid": "037167a1ee49dc2853b3ac63d8456fe3", "score": "0.555664", "text": "func (c *Conn) RemoteAddr() net.Addr {\n\treturn c.conn.RemoteAddr()\n}", "title": "" }, { "docid": "89669231676643b0938f07723a650b57", "score": "0.55544764", "text": "func originalHost(r *http.Request) string {\n\tforwardHost := r.Header.Get(\"X-Forwarded-Host\")\n\tif forwardHost == \"\" {\n\t\treturn r.Host\n\t}\n\tparts := strings.Split(forwardHost, \",\")\n\treturn strings.TrimSpace(parts[len(parts)-1])\n}", "title": "" }, { "docid": "7185683ee91a9b490e454d7005b57b39", "score": "0.55389166", "text": "func (c *Context) ClientIP() string {\n\tif c.engine.AppEngine {\n\t\tif addr := c.GetHeader(\"X-Appengine-Remote-Addr\"); addr != \"\" {\n\t\t\treturn addr\n\t\t}\n\t}\n\n\tclientIP := c.GetHeader(\"X-Forwarded-For\")\n\tif index := strings.IndexByte(clientIP, ','); index >= 0 {\n\t\tclientIP = clientIP[0:index]\n\t}\n\tclientIP = strings.TrimSpace(clientIP)\n\tif len(clientIP) > 0 {\n\t\treturn clientIP\n\t}\n\tclientIP = strings.TrimSpace(c.GetHeader(\"X-Real-Ip\"))\n\tif len(clientIP) > 0 {\n\t\treturn clientIP\n\t}\n\n\tif ip := c.RemoteIP().String(); len(ip) > 0 {\n\t\treturn ip\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "c89aeabb164b6ff8c5d7a88d7debc1e7", "score": "0.55340433", "text": "func getHostAddr(req http.Request) string {\n\tif req.Host != \"\" {\n\t\treturn req.Host\n\t}\n\treturn req.URL.Host\n}", "title": "" }, { "docid": "3c4608e76aa68d8549a486e349bf5bb4", "score": "0.5513991", "text": "func ConnRemoteAddr(c *tls.Conn,) net.Addr", "title": "" }, { "docid": "26c3d1c9693a4254587d9203089fddf4", "score": "0.5510084", "text": "func (c *ThrottledConn) RemoteAddr() net.Addr {\n\treturn c.originalConn.RemoteAddr()\n}", "title": "" }, { "docid": "cb98013c48dc315fdac9c243abff703b", "score": "0.5509305", "text": "func GetClientIp(r *http.Request) string {\n\tclientIp := r.Header.Get(XRealIp)\n\tif clientIp == \"\" {\n\t\tclientIp = \"UNKNOWN_IP\"\n\t}\n\treturn clientIp\n}", "title": "" }, { "docid": "620a1725fc6016feb33e14343f282341", "score": "0.55024004", "text": "func (dc *Conn) RemoteAddr() net.Addr {\n\treturn dc.getConn().RemoteAddr()\n}", "title": "" }, { "docid": "c6f34101b68dd7814f2981d45824168f", "score": "0.5501843", "text": "func GetRequestEndpoint(r *http.Request) string {\n\tproto := r.Header.Get(\"X-Forwarded-Proto\")\n\tif proto == \"\" {\n\t\tif r.TLS == nil {\n\t\t\tproto = \"http\"\n\t\t} else {\n\t\t\tproto = \"https\"\n\t\t}\n\t}\n\treturn proto + \"://\" + r.Host\n}", "title": "" }, { "docid": "275a9e3b408fb550d0c16b0bcbf9e4fc", "score": "0.54982847", "text": "func (p *ProxyConn) RemoteAddr() net.Addr {\n\tif p.srcAddr != nil {\n\t\treturn p.srcAddr\n\t}\n\treturn p.BufferedConn.RemoteAddr()\n}", "title": "" }, { "docid": "48217260ef07acc1af2f94df6ab6541b", "score": "0.5479726", "text": "func GetRemoteAddressSet(ctx context.Context) (ip, port, netType string) {\n\tmd, _ := metadata.FromIncomingContext(ctx)\n\tip, port = GetRemoteAddressSetFromMeta(md)\n\t// no ip and port were passed through gateway\n\n\tif len(ip) < 1 {\n\t\tip, port, netType = \"0.0.0.0\", \"0\", \"\"\n\t\tif peer, ok := peer.FromContext(ctx); ok {\n\t\t\tnetType = peer.Addr.Network()\n\t\t\t// Here is the tricky part\n\t\t\t// We only try to parse IPV4 style Address\n\t\t\t// Rest of peer.Addr implementations are not well formatted string\n\t\t\t// and in this case, we leave port as zero and IP as the returned\n\t\t\t// String from Addr.String() function\n\t\t\t//\n\t\t\t// BTW, just skip the error since it would not impact anything\n\t\t\t// Operators could observe this error from monitor dashboards by\n\t\t\t// validating existence of IP & PORT fields\n\t\t\tip, port, _ = net.SplitHostPort(peer.Addr.String())\n\t\t}\n\n\t\theaders, ok := metadata.FromIncomingContext(ctx)\n\n\t\tif ok {\n\t\t\tforwardedRemoteIPList := headers[\"x-forwarded-for\"]\n\n\t\t\t// Deal with forwarded remote ip\n\t\t\tif len(forwardedRemoteIPList) > 0 {\n\t\t\t\tforwardedRemoteIP := forwardedRemoteIPList[0]\n\t\t\t\tif forwardedRemoteIP == \"::1\" {\n\t\t\t\t\tforwardedRemoteIP = \"localhost\"\n\t\t\t\t}\n\n\t\t\t\tip = forwardedRemoteIP\n\t\t\t}\n\t\t}\n\n\t\tif ip == \"::1\" {\n\t\t\tip = \"localhost\"\n\t\t}\n\t}\n\n\treturn ip, port, netType\n}", "title": "" }, { "docid": "af8d0965bb51746330ab3221c5cb5aae", "score": "0.5478177", "text": "func RealIP(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tr.RemoteAddr = realIP(r)\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "e083175e16b21e40db9fceee5e6df156", "score": "0.5476646", "text": "func extractIP(c *gin.Context) string {\n\tip := c.Request.Header.Get(\"X-Real-IP\")\n\tif ip == \"\" {\n\t\tip = c.Request.Header.Get(\"X-Forwarded-For\")\n\t}\n\tif ip == \"\" {\n\t\tremoteAddr := c.Request.RemoteAddr\n\t\tif remoteAddr != \"\" {\n\t\t\taddrPort := strings.Split(remoteAddr, \":\")\n\t\t\tip = addrPort[0]\n\t\t}\n\t}\n\n\t//Case when Nginx concatenate remote_addr to client addr\n\tif strings.Contains(ip, \",\") {\n\t\taddresses := strings.Split(ip, \",\")\n\t\treturn strings.TrimSpace(addresses[0])\n\t}\n\n\treturn ip\n}", "title": "" }, { "docid": "4e286b694c1fec2e47c28cbfe7c2a886", "score": "0.547552", "text": "func (c *Conn) RemoteAddr() net.Addr {\n\treturn c.raddr\n}", "title": "" }, { "docid": "1ed9e8c33c7af14db1ca5926565098fd", "score": "0.54643375", "text": "func (c *clientHandler) RemoteAddr() net.Addr {\n\treturn c.conn.RemoteAddr()\n}", "title": "" }, { "docid": "fa38cd34b088ec8a3c1ea8e15855a306", "score": "0.5460462", "text": "func (rw *NopConn) RemoteAddr() net.Addr { return nil }", "title": "" }, { "docid": "9b47624accd45de35de1d604933f3bda", "score": "0.54530823", "text": "func (c *Conn) RemoteAddr() net.Addr {\n\treturn c.ws.RemoteAddr()\n}", "title": "" }, { "docid": "afa41725b7c8af6dd20720edbc6e0ea6", "score": "0.54296535", "text": "func (input *Input) IP() string {\n\tips := input.Proxy()\n\tif len(ips) > 0 && ips[0] != \"\" {\n\t\trip := strings.Split(ips[0], \":\")\n\t\treturn rip[0]\n\t}\n\tip := strings.Split(input.Context.Request.RemoteAddr, \":\")\n\tif len(ip) > 0 {\n\t\tif ip[0] != \"[\" {\n\t\t\treturn ip[0]\n\t\t}\n\t}\n\treturn \"127.0.0.1\"\n}", "title": "" } ]
698143d73fcbc5601b3c7067a7a0cc49
Mux registers all the debug routes from the standard library into a new mux bypassing the use of the DefaultServerMux. Using the DefaultServerMux would be a security risk since a dependency could inject a handler into our service without us knowing it.
[ { "docid": "3589bc7761f233192d71380cb07c4b17", "score": "0.6516964", "text": "func Mux() *http.ServeMux {\n\tmux := http.NewServeMux()\n\n\tmux.HandleFunc(\"/debug/pprof/\", pprof.Index)\n\tmux.HandleFunc(\"/debug/pprof/cmdline\", pprof.Cmdline)\n\tmux.HandleFunc(\"/debug/pprof/profile\", pprof.Profile)\n\tmux.HandleFunc(\"/debug/pprof/symbol\", pprof.Symbol)\n\tmux.HandleFunc(\"/debug/pprof/trace\", pprof.Trace)\n\tmux.Handle(\"/debug/vars\", expvar.Handler())\n\n\treturn mux\n}", "title": "" } ]
[ { "docid": "4532306051879c582c47bd28ab155c4a", "score": "0.65905714", "text": "func addDebugHandlers(r *mux.Router) {\n\tfor _, svc := range debugserver.Services {\n\t\tsvc := svc\n\t\tprefix := \"/\" + svc.Name\n\t\tr.PathPrefix(prefix).Handler(adminOnly(&httputil.ReverseProxy{\n\t\t\tDirector: func(req *http.Request) {\n\t\t\t\treq.URL.Scheme = \"http\"\n\t\t\t\treq.URL.Host = svc.Host\n\t\t\t\tif i := strings.Index(req.URL.Path, prefix); i >= 0 {\n\t\t\t\t\treq.URL.Path = req.URL.Path[i+len(prefix):]\n\t\t\t\t}\n\t\t\t},\n\t\t\tErrorLog: log.New(env.DebugOut, fmt.Sprintf(\"%s debug proxy: \", svc.Name), log.LstdFlags),\n\t\t}))\n\t}\n\n\tindex := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tfor _, svc := range debugserver.Services {\n\t\t\tfmt.Fprintf(w, `<a href=\"%s/\">%s</a><br>`, svc.Name, svc.Name)\n\t\t}\n\t\tfmt.Fprintf(w, `<a href=\"headers\">headers</a><br>`)\n\n\t\t// We do not support cluster deployments yet.\n\t\tif len(debugserver.Services) == 0 {\n\t\t\tfmt.Fprintf(w, `Instrumentation endpoint proxying for Sourcegraph cluster deployments is not yet available<br>`)\n\t\t}\n\t})\n\tr.Handle(\"/\", adminOnly(index))\n}", "title": "" }, { "docid": "9e5fc59d5e6bf32c406939d5170a4d76", "score": "0.63633436", "text": "func NewDebugRouter() *mux.Router {\n\trouter := mux.NewRouter()\n\trouter.HandleFunc(\"/debug/pprof/\", pprof.Index)\n\trouter.HandleFunc(\"/debug/pprof/cmdline\", pprof.Cmdline)\n\trouter.HandleFunc(\"/debug/pprof/profile\", pprof.Profile)\n\trouter.HandleFunc(\"/debug/pprof/symbol\", pprof.Symbol)\n\n\t// Manually add support for paths linked to by index page at /debug/pprof/\n\trouter.Handle(\"/debug/pprof/goroutine\", pprof.Handler(\"goroutine\"))\n\trouter.Handle(\"/debug/pprof/heap\", pprof.Handler(\"heap\"))\n\trouter.Handle(\"/debug/pprof/threadcreate\", pprof.Handler(\"threadcreate\"))\n\trouter.Handle(\"/debug/pprof/block\", pprof.Handler(\"block\"))\n\n\treturn router\n}", "title": "" }, { "docid": "bc924168a20c1e3652f91ab7fe5c0641", "score": "0.63006467", "text": "func Mux() *http.ServeMux {\n\tm := http.NewServeMux()\n\tm.HandleFunc(\"/debug/pprof/\", pprof.Index)\n\tm.HandleFunc(\"/debug/pprof/cmdline\", pprof.Cmdline)\n\tm.HandleFunc(\"/debug/pprof/profile\", pprof.Profile)\n\tm.HandleFunc(\"/debug/pprof/symbol\", pprof.Symbol)\n\tm.HandleFunc(\"/debug/pprof/trace\", pprof.Trace)\n\tm.Handle(\"/debug/pprof/block\", pprof.Handler(\"block\"))\n\tm.Handle(\"/debug/pprof/goroutine\", pprof.Handler(\"goroutine\"))\n\tm.Handle(\"/debug/pprof/heap\", pprof.Handler(\"heap\"))\n\tm.Handle(\"/debug/pprof/threadcreate\", pprof.Handler(\"threadcreate\"))\n\treturn m\n}", "title": "" }, { "docid": "a17312e485dc43b23e23de760b6b6ede", "score": "0.6160601", "text": "func NewServeMux() *ServeMux { return &ServeMux{m: make(map[string]muxEntry)} }", "title": "" }, { "docid": "a17312e485dc43b23e23de760b6b6ede", "score": "0.6160601", "text": "func NewServeMux() *ServeMux { return &ServeMux{m: make(map[string]muxEntry)} }", "title": "" }, { "docid": "b86c6f82226d387f6fa110cdfea6b2f0", "score": "0.5988736", "text": "func handleDebug(w http.ResponseWriter, r *http.Request) {\n\thandler, _ := debugServeMux.Handler(r)\n\thandler.ServeHTTP(w, r)\n}", "title": "" }, { "docid": "54b41595285100d2f707fd669d043849", "score": "0.59168774", "text": "func main() {\r\n\r\n\tfmt.Printf(\"Running ServeMux. Waiting for requests on localhost...\\n\")\r\n\t//myMux := http.NewServeMux()\r\n\t//myMux.HandleFunc(\"/\", router)\r\n\t//http.ListenAndServe(\":8080\", myMux)\r\n\r\n\thttp.Handle(\"/\", new(MuxHandler))\r\n\thttp.ListenAndServe(\":8080\", nil)\r\n}", "title": "" }, { "docid": "286a324e9d785d5ab4dbf3d4016ab365", "score": "0.5911636", "text": "func (s *ServeMuxConfig) Mux() *ServeMux {\n\tdevMu.Lock()\n\tfreezeLocalDev = true\n\tif isLocalDev {\n\t\tlog.Println(\"Warning: creating safehttp.Mux in dev mode. This configuration is not valid for production use\")\n\t}\n\tdevMu.Unlock()\n\n\tif s.dispatcher == nil {\n\t\tpanic(\"Use NewServeMuxConfig instead of creating ServeMuxConfig using a composite literal.\")\n\t}\n\n\tmethodNotAllowed := handlerConfig{\n\t\tDispatcher: s.dispatcher,\n\t\tHandler: s.methodNotAllowed,\n\t\tInterceptors: configureInterceptors(s.interceptors, s.methodNotAllowedCfgs),\n\t}\n\n\tm := &ServeMux{\n\t\tmux: http.NewServeMux(),\n\t\thandlers: make(map[string]*registeredHandler),\n\t\tdispatcher: s.dispatcher,\n\t\tinterceptors: s.interceptors,\n\t\tmethodNotAllowed: methodNotAllowed,\n\t}\n\treturn m\n}", "title": "" }, { "docid": "404013ca36fc8def127a5451587953f9", "score": "0.58995897", "text": "func NewServeMux(api *Gateway, appLoc string, enableGUI bool) *http.ServeMux {\n\t// Prepare mux.\n\tmux := http.NewServeMux()\n\n\tif enableGUI {\n\t\tfileServe(mux, appLoc)\n\t}\n\n\tmux.HandleFunc(\"/api/quit\", api.Quit)\n\tmux.HandleFunc(\"/api/ping_submission_address\", api.PingSubmissionAddress)\n\tmux.HandleFunc(\"/api/generate_seed\", api.GenerateSeed)\n\n\tmux.HandleFunc(\"/api/stats/get\", api.Stats.Get)\n\n\tmux.HandleFunc(\"/api/connections/get_all\", api.Connections.GetAll)\n\tmux.HandleFunc(\"/api/connections/add\", api.Connections.Add)\n\tmux.HandleFunc(\"/api/connections/remove\", api.Connections.Remove)\n\n\tmux.HandleFunc(\"/api/subscriptions/get_all\", api.Subscriptions.GetAll)\n\tmux.HandleFunc(\"/api/subscriptions/get\", api.Subscriptions.Get)\n\tmux.HandleFunc(\"/api/subscriptions/add\", api.Subscriptions.Add)\n\tmux.HandleFunc(\"/api/subscriptions/remove\", api.Subscriptions.Remove)\n\n\tmux.HandleFunc(\"/api/users/get_all\", api.Users.GetAll)\n\tmux.HandleFunc(\"/api/users/add\", api.Users.Add)\n\tmux.HandleFunc(\"/api/users/remove\", api.Users.Remove)\n\tmux.HandleFunc(\"/api/users/masters/get_all\", api.Users.Masters.GetAll)\n\tmux.HandleFunc(\"/api/users/masters/add\", api.Users.Masters.Add)\n\tmux.HandleFunc(\"/api/users/masters/current/get\", api.Users.Masters.Current.Get)\n\tmux.HandleFunc(\"/api/users/masters/current/set\", api.Users.Masters.Current.Set)\n\tmux.HandleFunc(\"/api/users/votes/get\", api.Users.Votes.Get)\n\tmux.HandleFunc(\"/api/users/votes/add\", api.Users.Votes.Add)\n\n\tmux.HandleFunc(\"/api/boards/get_all\", api.Boards.GetAll)\n\tmux.HandleFunc(\"/api/boards/get\", api.Boards.Get)\n\tmux.HandleFunc(\"/api/boards/add\", api.Boards.Add)\n\tmux.HandleFunc(\"/api/boards/remove\", api.Boards.Remove)\n\tmux.HandleFunc(\"/api/boards/meta/get\", api.Boards.Meta.Get)\n\tmux.HandleFunc(\"/api/boards/meta/submission_addresses/get_all\", api.Boards.Meta.SubmissionAddresses.GetAll)\n\tmux.HandleFunc(\"/api/boards/meta/submission_addresses/add\", api.Boards.Meta.SubmissionAddresses.Add)\n\tmux.HandleFunc(\"/api/boards/meta/submission_addresses/remove\", api.Boards.Meta.SubmissionAddresses.Remove)\n\tmux.HandleFunc(\"/api/boards/page/get\", api.Boards.Page.Get)\n\n\tmux.HandleFunc(\"/api/threads/get_all\", api.Threads.GetAll)\n\tmux.HandleFunc(\"/api/threads/add\", api.Threads.Add)\n\tmux.HandleFunc(\"/api/threads/remove\", api.Threads.Remove)\n\tmux.HandleFunc(\"/api/threads/import\", api.Threads.Import)\n\tmux.HandleFunc(\"/api/threads/page/get\", api.Threads.Page.Get)\n\tmux.HandleFunc(\"/api/threads/votes/get\", api.Threads.Votes.Get)\n\tmux.HandleFunc(\"/api/threads/votes/add\", api.Threads.Votes.Add)\n\n\tmux.HandleFunc(\"/api/posts/get_all\", api.Posts.Get)\n\tmux.HandleFunc(\"/api/posts/add\", api.Posts.Add)\n\tmux.HandleFunc(\"/api/posts/remove\", api.Posts.Remove)\n\tmux.HandleFunc(\"/api/posts/votes/get\", api.Posts.Votes.Get)\n\tmux.HandleFunc(\"/api/posts/votes/add\", api.Posts.Votes.Add)\n\n\t//mux.HandleFunc(\"/api/hex/get_thread_page\", api.GetThreadPageAsHex)\n\t//mux.HandleFunc(\"/api/hex/get_thread_page/tp_ref\", api.GetThreadPageWithTpRefAsHex)\n\t//mux.HandleFunc(\"/api/hex/add_thread\", api.NewThreadWithHex)\n\t//mux.HandleFunc(\"/api/hex/add_post\", api.NewPostWithHex)\n\n\tmux.HandleFunc(\"/api/tests/add_filled_board\", api.Tests.AddFilledBoard)\n\tmux.HandleFunc(\"/api/tests/panic\", api.Tests.Panic)\n\n\treturn mux\n}", "title": "" }, { "docid": "02efab7d0bf4eba1964465ffff0929ab", "score": "0.5894822", "text": "func (a *Admin) generateMux() {\n\ta.server = http.NewServeMux()\n\tfor key, path := range a.Routes {\n\t\tr, fn := path, routes[key]\n\t\ta.server.Handle(r, http.StripPrefix(r, a.bind(fn)))\n\t}\n}", "title": "" }, { "docid": "4199fefc90ddb25e6a9b0efb8962b887", "score": "0.589011", "text": "func DefaultMux(routes []Route, opts DefaultOptions) http.Handler {\n\tr := Default(routes, opts)\n\th := middleware.Compose(\n\t\tr,\n\t\tmiddleware.Logger(middleware.LoggerOptions{\n\t\t\tGitCommit: opts.GitCommit,\n\t\t\tName: opts.Name,\n\t\t\tVersion: opts.Version,\n\t\t}),\n\t\tmiddleware.Recover,\n\t)\n\n\treturn h\n}", "title": "" }, { "docid": "0da96d88553169e7b2cdf20f9e5f66e4", "score": "0.58758855", "text": "func newServerMux() *mux.Router {\n\tr := mux.NewRouter()\n\tr.HandleFunc(\"/\", func(w http.ResponseWriter, req *http.Request) {\n\t\t// The \"/\" pattern matches everything, so we need to check\n\t\t// that we're at the root here.\n\t\tif req.URL.Path != \"/\" {\n\t\t\thttp.NotFound(w, req)\n\t\t\treturn\n\t\t}\n\t\tfmt.Fprintf(w, \"Welcome to the home page!\")\n\t})\n\n\tr.HandleFunc(\"/api/chain/show/{id:[0-9]+}\", http.HandlerFunc(handleChainShow)).Methods(\"GET\")\n\tr.HandleFunc(\"/api/chain/create\", http.HandlerFunc(handleChainCreate)).Methods(\"POST\")\n\tr.HandleFunc(\"/api/chain/list\", http.HandlerFunc(handleChainList)).Methods(\"GET\")\n\tr.HandleFunc(\"/api/chain/{id:[0-9]+}/add-block\", http.HandlerFunc(handleAddBlock)).Methods(\"POST\")\n\n\treturn r\n}", "title": "" }, { "docid": "1e76597b02aff3019cb29dcb7bcd6e66", "score": "0.5820733", "text": "func NewDebugServer(conf *Config, explorableObject interface{}, handler *mux.Router) (*DebugServer, error) {\n\tlistenAddr := fmt.Sprintf(\":%d\", conf.DebugPort)\n\tclientTimeout := time.Minute * 30\n\tlistener, err := net.Listen(\"tcp\", listenAddr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdebugHTTPListener := listener\n\thandler.PathPrefix(\"/debug/pprof/profile\").HandlerFunc(pprof.Profile)\n\thandler.PathPrefix(\"/debug/pprof/trace\").HandlerFunc(pprof.Trace)\n\thandler.PathPrefix(\"/debug/pprof/\").HandlerFunc(pprof.Index)\n\te := &explorable.Handler{\n\t\tVal: explorableObject,\n\t\tBasePath: \"/debug/explorer/\",\n\t}\n\thandler.PathPrefix(\"/debug/explorer/\").Handler(e)\n\n\tdebugServer := &http.Server{\n\t\tHandler: handler,\n\t\tAddr: listenAddr,\n\t\tReadTimeout: clientTimeout,\n\t\tWriteTimeout: clientTimeout,\n\t}\n\tret := &DebugServer{\n\t\tdebugServer: debugServer,\n\t\tdebugHTTPListener: debugHTTPListener,\n\t\tExpvarHandler: expvar2.New(),\n\t}\n\thandler.Path(\"/debug/vars\").Handler(ret.ExpvarHandler)\n\tgo debugServer.Serve(debugHTTPListener)\n\treturn ret, nil\n}", "title": "" }, { "docid": "d0b1fb44247e06312d46b71e4f011531", "score": "0.58094496", "text": "func RegisterMux(router *mux.Router) {\n\t// add the profiling endpoints\n\trouter.Handle(\"/debug/pprof/\", http.HandlerFunc(pprof.Index))\n\trouter.Handle(\"/debug/pprof/cmdline\", http.HandlerFunc(pprof.Cmdline))\n\trouter.Handle(\"/debug/pprof/profile\", http.HandlerFunc(pprof.Profile))\n\trouter.Handle(\"/debug/pprof/symbol\", http.HandlerFunc(pprof.Symbol))\n\trouter.Handle(\"/debug/pprof/trace\", http.HandlerFunc(pprof.Trace))\n\n\trouter.Handle(\"/debug/pprof/goroutine\", pprof.Handler(\"goroutine\"))\n\trouter.Handle(\"/debug/pprof/heap\", pprof.Handler(\"heap\"))\n\trouter.Handle(\"/debug/pprof/threadcreate\", pprof.Handler(\"threadcreate\"))\n\trouter.Handle(\"/debug/pprof/block\", pprof.Handler(\"block\"))\n\trouter.Handle(\"/debug/pprof/mutex\", pprof.Handler(\"mutex\"))\n}", "title": "" }, { "docid": "186f3d7c7928f1cc89a98a017dc478ae", "score": "0.5808062", "text": "func NewServerMux(log log.Logger) *ServeMux {\n\treturn &ServeMux{\n\t\tlogger: log,\n\t\ttypes: map[RequestType]Handler{},\n\t\tintents: map[string]Handler{},\n\t\tintentSlots: map[string]string{},\n\t}\n}", "title": "" }, { "docid": "c11a49a02a071bb57e207aa9457b4e7d", "score": "0.57995796", "text": "func Mux() *http.ServeMux {\n\tengine := gin.Default()\n\n\tengine.GET(\"/info\", func(c *gin.Context) {\n\t\tc.Redirect(http.StatusMovedPermanently, \"/\")\n\t})\n\n\tengine.GET(\"/audit\", func(c *gin.Context) {\n\t\tc.Redirect(http.StatusMovedPermanently, \"/\")\n\t})\n\n\tengine.GET(\"/feedback\", func(c *gin.Context) {\n\t\tc.Redirect(http.StatusMovedPermanently, \"/\")\n\t})\n\n\tengine.GET(\"/frames\", func(c *gin.Context) {\n\t\tc.Redirect(http.StatusMovedPermanently, \"/\")\n\t})\n\n\tengine.Use(monitor.OperationMonitor())\n\n\tengine.Use(airbraker.Recover())\n\n\tengine.OPTIONS(\"/surveys\", controllers.SurveysOptions)\n\tengine.POST(\"/surveys\", controllers.SurveysCreate)\n\tengine.OPTIONS(\"/surveys/email\", controllers.SurveysOptions)\n\tengine.POST(\"/surveys/email\", controllers.EmailSurvey)\n\tengine.OPTIONS(\"/surveys/feedback\", controllers.SurveysOptions)\n\tengine.POST(\"/surveys/feedback\", controllers.FeedbackSurvey)\n\n\t// Need to run SetCurrentUser middleware for QOR admin\n\tengine.Group(\"/admin\", controllers.SetCurrentUser)\n\n\tsessions := engine.Group(\"/sessions\", controllers.SetCurrentUser)\n\tsessions.GET(\"/new\", controllers.SessionsNew)\n\tsessions.POST(\"/\", controllers.SessionsCreate)\n\tsessions.GET(\"/destroy\", controllers.SessionsDestroy)\n\n\tengine.GET(\"/leaderboards\", controllers.Leaderboard)\n\n\tmux := http.NewServeMux()\n\n\tif config.ServeStaticAssets {\n\t\tassetDir := http.Dir(strings.Join([]string{config.Root, \"public\"}, \"/\"))\n\t\tlog.Printf(\"Serving static assets from %s at /assets\", assetDir)\n\t\tmux.Handle(\"/assets/\", http.FileServer(assetDir))\n\t}\n\n\tmux.Handle(\"/\", engine)\n\tadmin.Admin.MountTo(\"/admin\", mux)\n\n\treturn mux\n}", "title": "" }, { "docid": "8a80c10fc15b472725de5289abe25cb4", "score": "0.57662725", "text": "func Wrap(router *echo.Echo) {\n\tRegisterRoute(router.Group(\"/debug\"))\n}", "title": "" }, { "docid": "f4a17df6a33f1599ee385ed0cf21e6b9", "score": "0.57553536", "text": "func NewServerMux(o ServerOptions) http.Handler {\n\t// mux := http.NewServeMux()\n\tmux := gorilla.NewRouter()\n\tmux.Handle(joinPublic(o, \"/\"), Middleware(indexController, o))\n\tmux.Handle(joinPublic(o, \"/form\"), Middleware(formController, o))\n\tmux.Handle(joinPublic(o, \"/health\"), Middleware(healthController, o))\n\n\timage := ImageMiddleware(o)\n\tmux.Handle(join(o, \"/upload/{service}/{oid}\"), image(Info))\n\tmux.Handle(join(o, \"/delete/{service}/{oid}\"), image(Info))\n\tmux.Handle(joinImageRoute(o, \"/\"), image(Origin))\n\tmux.Handle(joinImageRoute(o, \"/resize\"), image(Resize))\n\tmux.Handle(joinImageRoute(o, \"/enlarge\"), image(Enlarge))\n\tmux.Handle(joinImageRoute(o, \"/extract\"), image(Extract))\n\tmux.Handle(joinImageRoute(o, \"/crop\"), image(Crop))\n\tmux.Handle(joinImageRoute(o, \"/rotate\"), image(Rotate))\n\tmux.Handle(joinImageRoute(o, \"/flip\"), image(Flip))\n\tmux.Handle(joinImageRoute(o, \"/flop\"), image(Flop))\n\tmux.Handle(joinImageRoute(o, \"/thumbnail\"), image(Thumbnail))\n\tmux.Handle(joinImageRoute(o, \"/zoom\"), image(Zoom))\n\tmux.Handle(joinImageRoute(o, \"/convert\"), image(Convert))\n\tmux.Handle(joinImageRoute(o, \"/watermark\"), image(Watermark))\n\tmux.Handle(joinImageRoute(o, \"/info\"), image(Info))\n\tmux.Handle(\"/metrics\", promhttp.Handler())\n\n\treturn mux\n}", "title": "" }, { "docid": "72544cea7810808776a42b657c2cf265", "score": "0.5752621", "text": "func NewServeMux() *ServeMux { return new(ServeMux) }", "title": "" }, { "docid": "72544cea7810808776a42b657c2cf265", "score": "0.5752621", "text": "func NewServeMux() *ServeMux { return new(ServeMux) }", "title": "" }, { "docid": "72544cea7810808776a42b657c2cf265", "score": "0.5752621", "text": "func NewServeMux() *ServeMux { return new(ServeMux) }", "title": "" }, { "docid": "72544cea7810808776a42b657c2cf265", "score": "0.5752621", "text": "func NewServeMux() *ServeMux { return new(ServeMux) }", "title": "" }, { "docid": "72544cea7810808776a42b657c2cf265", "score": "0.5752621", "text": "func NewServeMux() *ServeMux { return new(ServeMux) }", "title": "" }, { "docid": "06c52d7848ab633ccf0a2d7c82e7ad8f", "score": "0.5722383", "text": "func GetMux() *mux.Router {\n\n\tr := mux.NewRouter()\n\tr.HandleFunc(`/`, HomeHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/ip`, IPHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/user-agent`, UserAgentHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/headers`, HeadersHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/get`, GetHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/post`, PostHandler).Methods(http.MethodPost)\n\tr.HandleFunc(`/redirect/{n:[\\d]+}`, RedirectHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/absolute-redirect/{n:[\\d]+}`, AbsoluteRedirectHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/redirect-to`, RedirectToHandler).Methods(http.MethodGet, http.MethodHead).Queries(\"url\", \"{url:.+}\")\n\tr.HandleFunc(`/status/{code:[\\d]+}`, StatusHandler)\n\tr.HandleFunc(`/bytes/{n:[\\d]+}`, BytesHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/delay/{n:\\d+(?:\\.\\d+)?}`, DelayHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/stream/{n:[\\d]+}`, StreamHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/drip`, DripHandler).Methods(http.MethodGet, http.MethodHead).Queries(\n\t\t\"numbytes\", `{numbytes:\\d+}`,\n\t\t\"duration\", `{duration:\\d+(?:\\.\\d+)?}`)\n\tr.HandleFunc(`/cookies`, CookiesHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/cookies/set`, SetCookiesHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/cookies/delete`, DeleteCookiesHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/cache`, CacheHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/cache/{n:[\\d]+}`, SetCacheHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/gzip`, GZIPHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/deflate`, DeflateHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/html`, HTMLHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/xml`, XMLHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/robots.txt`, RobotsTXTHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/deny`, DenyHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/basic-auth/{u}/{p}`, BasicAuthHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/hidden-basic-auth/{u}/{p}`, HiddenBasicAuthHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/image/gif`, GIFHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/image/png`, PNGHandler).Methods(http.MethodGet, http.MethodHead)\n\tr.HandleFunc(`/image/jpeg`, JPEGHandler).Methods(http.MethodGet, http.MethodHead)\n\treturn r\n}", "title": "" }, { "docid": "23797e66e7cbe0a95b2b3f951f37d7c8", "score": "0.571893", "text": "func NewServeMux(opts ...runtime.ServeMuxOption) *ServeMux {\n\tif len(opts) == 0 {\n\t\topts = append(opts,\n\t\t\truntime.WithIncomingHeaderMatcher(DefaultHeaderMatcher),\n\t\t\truntime.WithErrorHandler(DefaultHTTPErrorHandler),\n\t\t\truntime.WithMarshalerOption(\"*\", defaultMarshaler),\n\t\t)\n\t}\n\n\treturn &ServeMux{runtime.NewServeMux(opts...)}\n}", "title": "" }, { "docid": "65a48d4dd6be77b8dfd538d0494eed9a", "score": "0.56788605", "text": "func InitMux(addr string) {\n\tmux := &CustomServerMux{}\n\thttp.ListenAndServe(addr, mux)\n}", "title": "" }, { "docid": "6f28279df6991abd405231fd637f7cf8", "score": "0.5668688", "text": "func NewLoggedRouter() *mux.Router {\n\trouter := mux.NewRouter().StrictSlash(true) // \"/path\" and \"/path/\" will be viewed as the same path\n\tfor _, r := range getRoutes() {\n\t\tvar handler http.Handler\n\t\thandler = r.HandlerFunc\n\t\thandler = logger(handler, r.Name)\n\t\trouter.Methods(r.Method).\n\t\t\tPath(r.Pattern).\n\t\t\tName(r.Name).\n\t\t\tHandler(handler)\n\t}\n\treturn router\n}", "title": "" }, { "docid": "88c5ef32793471eab5a5fbac35e9a541", "score": "0.5666774", "text": "func main() {\n\tmux := http.NewServeMux()\n\tmux.HandleFunc(\"/debug/\", sourceCodeHandler)\n\tmux.HandleFunc(\"/panic/\", panicDemo)\n\tmux.HandleFunc(\"/panic-after/\", panicAfterDemo)\n\tmux.HandleFunc(\"/\", hello)\n\tfmt.Println(\"start server on local host 3000\")\n\tlog.Fatal(http.ListenAndServe(\":3000\", devMW(mux)))\n}", "title": "" }, { "docid": "e77c56e0208230808655ba3a39172e3b", "score": "0.56454086", "text": "func GetServerMux() *httprouter.Router {\n\n\trouter := httprouter.New()\n\trouter.GET(\"/*any\", middleware.DefaultMiddleware(handles.AnyHandle))\n\trouter.POST(\"/*any\", middleware.DefaultMiddleware(handles.AnyHandle))\n\trouter.DELETE(\"/*any\", middleware.DefaultMiddleware(handles.AnyHandle))\n\trouter.PUT(\"/*any\", middleware.DefaultMiddleware(handles.AnyHandle))\n\trouter.HEAD(\"/*any\", middleware.DefaultMiddleware(handles.AnyHandle))\n\trouter.OPTIONS(\"/*any\", middleware.DefaultMiddleware(handles.AnyHandle))\n\trouter.PATCH(\"/*any\", middleware.DefaultMiddleware(handles.AnyHandle))\n\treturn router\n}", "title": "" }, { "docid": "922d94e0b09db6d134b5965187964618", "score": "0.5636155", "text": "func OptAddDebugHandler() Option {\n\thttpToGin := func(h http.HandlerFunc) HandlerFunc {\n\t\thandler := h\n\t\treturn func(c *Context) {\n\t\t\thandler.ServeHTTP(c.Writer, c.Request)\n\t\t}\n\t}\n\tpprofIndex := func(c *Context) {\n\t\tpprof.Handler(strings.TrimPrefix(c.Request.URL.Path, \"/debug/\")).ServeHTTP(c.Writer, c.Request)\n\t}\n\treturn func(s *Server) {\n\t\tif s.hasDebugHandler {\n\t\t\treturn\n\t\t}\n\t\ts.hasDebugHandler = true\n\t\ts.routerEngine.GET(\"/debug/pprof\", httpToGin(pprof.Index))\n\t\ts.routerEngine.GET(\"/debug/pprof/cmdline\", httpToGin(pprof.Cmdline))\n\t\ts.routerEngine.GET(\"/debug/pprof/profile\", httpToGin(pprof.Profile))\n\t\ts.routerEngine.GET(\"/debug/pprof/symbol\", httpToGin(pprof.Symbol))\n\t\ts.routerEngine.POST(\"/debug/pprof/symbol\", httpToGin(pprof.Symbol))\n\t\ts.routerEngine.GET(\"/debug/pprof/trace\", httpToGin(pprof.Trace))\n\t\ts.routerEngine.GET(\"/debug/block\", pprofIndex)\n\t\ts.routerEngine.GET(\"/debug/goroutine\", pprofIndex)\n\t\ts.routerEngine.GET(\"/debug/heap\", pprofIndex)\n\t\ts.routerEngine.GET(\"/debug/mutex\", pprofIndex)\n\t\ts.routerEngine.GET(\"/debug/threadcreate\", pprofIndex)\n\t}\n}", "title": "" }, { "docid": "7917738674ad17cf4a5d7a69fb6fe5e2", "score": "0.5631288", "text": "func AddDebugRoutes(server *server.Server) {\n\tserver.AddHandler(http.MethodGet, \"/debug/pprof\", wrapHTTPHandlerFunc(pprof.Index))\n\tserver.AddHandler(http.MethodGet, \"/debug/pprof/cmdline\", wrapHTTPHandlerFunc(pprof.Cmdline))\n\tserver.AddHandler(http.MethodGet, \"/debug/pprof/profile\", wrapHTTPHandlerFunc(pprof.Profile))\n\tserver.AddHandler(http.MethodGet, \"/debug/pprof/symbol\", wrapHTTPHandlerFunc(pprof.Symbol))\n\tserver.AddHandler(http.MethodGet, \"/debug/pprof/trace\", wrapHTTPHandlerFunc(pprof.Trace))\n\tserver.AddHandler(http.MethodGet, \"/debug/pprof/heap\", wrapHTTPHandler(pprof.Handler(\"heap\")))\n\tserver.AddHandler(http.MethodGet, \"/debug/pprof/block\", wrapHTTPHandler(pprof.Handler(\"block\")))\n\tserver.AddHandler(http.MethodGet, \"/debug/pprof/mutex\", wrapHTTPHandler(pprof.Handler(\"mutex\")))\n\tserver.AddHandler(http.MethodGet, \"/debug/pprof/allocs\", wrapHTTPHandler(pprof.Handler(\"allocs\")))\n\tserver.AddHandler(http.MethodGet, \"/debug/pprof/goroutine\", wrapHTTPHandler(pprof.Handler(\"goroutine\")))\n\tserver.AddHandler(http.MethodGet, \"/debug/pprof/threadcreate\", wrapHTTPHandler(pprof.Handler(\"threadcreate\")))\n}", "title": "" }, { "docid": "28753fd8fb28fbc7715a61e52ca32b56", "score": "0.56163025", "text": "func NewServeMux(opts ...runtime.ServeMuxOption) *ServeMux {\n\t//fix http error for grpc gateway v1.5.0\n\truntime.HTTPError = DefaultHTTPError\n\topts = append(opts, runtime.WithOutgoingHeaderMatcher(defaultOutgoingHeaderMatcher))\n\treturn &ServeMux{runtime.NewServeMux(opts...)}\n}", "title": "" }, { "docid": "7e2050b1d2f7a56754e64bd02a37b9a4", "score": "0.5603625", "text": "func SetupHandlers(\n\tr *mux.Router,\n\tflareComp flare.Component,\n\tserver dogstatsdServer.Component,\n\tserverDebug dogstatsdDebug.Component,\n\tlogsAgent util.Optional[logsAgent.Component],\n) *mux.Router {\n\n\tr.HandleFunc(\"/version\", common.GetVersion).Methods(\"GET\")\n\tr.HandleFunc(\"/hostname\", getHostname).Methods(\"GET\")\n\tr.HandleFunc(\"/flare\", func(w http.ResponseWriter, r *http.Request) { makeFlare(w, r, flareComp) }).Methods(\"POST\")\n\tr.HandleFunc(\"/stop\", stopAgent).Methods(\"POST\")\n\tr.HandleFunc(\"/status\", getStatus).Methods(\"GET\")\n\tr.HandleFunc(\"/stream-event-platform\", streamEventPlatform()).Methods(\"POST\")\n\tr.HandleFunc(\"/status/formatted\", getFormattedStatus).Methods(\"GET\")\n\tr.HandleFunc(\"/status/health\", getHealth).Methods(\"GET\")\n\tr.HandleFunc(\"/{component}/status\", componentStatusGetterHandler).Methods(\"GET\")\n\tr.HandleFunc(\"/{component}/status\", componentStatusHandler).Methods(\"POST\")\n\tr.HandleFunc(\"/{component}/configs\", componentConfigHandler).Methods(\"GET\")\n\tr.HandleFunc(\"/gui/csrf-token\", getCSRFToken).Methods(\"GET\")\n\tr.HandleFunc(\"/config-check\", getConfigCheck).Methods(\"GET\")\n\tr.HandleFunc(\"/config\", settingshttp.Server.GetFullDatadogConfig(\"\")).Methods(\"GET\")\n\tr.HandleFunc(\"/config/list-runtime\", settingshttp.Server.ListConfigurable).Methods(\"GET\")\n\tr.HandleFunc(\"/config/{setting}\", settingshttp.Server.GetValue).Methods(\"GET\")\n\tr.HandleFunc(\"/config/{setting}\", settingshttp.Server.SetValue).Methods(\"POST\")\n\tr.HandleFunc(\"/tagger-list\", getTaggerList).Methods(\"GET\")\n\tr.HandleFunc(\"/workload-list\", getWorkloadList).Methods(\"GET\")\n\tr.HandleFunc(\"/secrets\", secretInfo).Methods(\"GET\")\n\tr.HandleFunc(\"/metadata/{payload}\", metadataPayload).Methods(\"GET\")\n\tr.HandleFunc(\"/diagnose\", getDiagnose).Methods(\"POST\")\n\n\t// Some agent subcommands do not provide these dependencies (such as JMX)\n\tif server != nil && serverDebug != nil {\n\t\tr.HandleFunc(\"/dogstatsd-stats\", func(w http.ResponseWriter, r *http.Request) { getDogstatsdStats(w, r, server, serverDebug) }).Methods(\"GET\")\n\t}\n\n\tif logsAgent, ok := logsAgent.Get(); ok {\n\t\tr.HandleFunc(\"/stream-logs\", streamLogs(logsAgent)).Methods(\"POST\")\n\t}\n\n\treturn r\n}", "title": "" }, { "docid": "da546dd308e8b0c20b777e0586773789", "score": "0.55940527", "text": "func NewMux(hm URLHandlerMap, l Logger) *http.ServeMux {\n\tmux := http.NewServeMux()\n\tfor url, handler := range hm {\n\t\tmux.HandleFunc(url, handler(l))\n\t}\n\treturn mux\n}", "title": "" }, { "docid": "db7e6ef74672b1fbafea65bd71a23f4b", "score": "0.5587247", "text": "func NewServeMux() *ServeMux {\n\treturn &ServeMux{\n\t\tm: make(map[dhcp6.MessageType]Handler),\n\t}\n}", "title": "" }, { "docid": "bd996a81722656cace560ed446d8de23", "score": "0.5555955", "text": "func Start() {\n skywalker.Start()\n r := mux.NewRouter()\n r.HandleFunc(\"/\", homeHandler)\n r.HandleFunc(\"/service/{id}\", serviceHandler)\n r.HandleFunc(\"/show/{id}\", showHandler)\n r.HandleFunc(\"/video/{showid}/{playid}\", videoHandler)\n r.HandleFunc(\"/img/{image}\", imageHandler)\n log.Println(\"Port: 4321\")\n panic(http.ListenAndServe(\":4321\", r))\n}", "title": "" }, { "docid": "0642cc875657232e88aaad1a40e9466f", "score": "0.55493987", "text": "func (e *Explorer) ServeMux() *http.ServeMux {\n\tmux := http.NewServeMux()\n\n\tmux.HandleFunc(\"/_health\", func(w http.ResponseWriter, req *http.Request) {\n\t\tw.WriteHeader(http.StatusNoContent)\n\t})\n\n\tmux.HandleFunc(\"/state\", func(w http.ResponseWriter, req *http.Request) {\n\t\tif req.Method != \"GET\" {\n\t\t\thttp.Error(w, \"expected GET\", http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\tw.Header().Add(\"Content-type\", \"application/json\")\n\t\terr := json.NewEncoder(w).Encode(e.getState())\n\t\tif err != nil {\n\t\t\tlog.Println(\"error sending state:\", err)\n\t\t}\n\t})\n\n\tmux.HandleFunc(\"/versions/\", func(w http.ResponseWriter, req *http.Request) {\n\t\tif req.Method != \"POST\" && req.Method != \"PUT\" {\n\t\t\thttp.Error(w, \"expected POST or PUT\", http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\td := json.NewDecoder(req.Body)\n\t\tv := state.Versions{}\n\t\terr := d.Decode(&v)\n\t\tif err != nil {\n\t\t\thttp.Error(w, fmt.Sprintf(\"version decoding failed: %s\", err), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\ta := strings.TrimPrefix(req.URL.Path, \"/versions/\")\n\t\tif a == \"\" {\n\t\t\thttp.Error(w, \"application is not specified\", http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\te.setVersions(a, v)\n\t\terr = e.persistState()\n\t\tif err != nil {\n\t\t\thttp.Error(w, fmt.Sprintf(\"state set successfully, but persisting failed: %s\", err), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\tw.WriteHeader(http.StatusNoContent)\n\t})\n\n\tmux.HandleFunc(\"/discovery\", func(w http.ResponseWriter, req *http.Request) {\n\t\td, err := e.discover()\n\t\tif err != nil {\n\t\t\thttp.Error(w, fmt.Sprintf(\"error getting servers: %s\", err), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\tw.Header().Add(\"Content-type\", \"application/json\")\n\t\terr = json.NewEncoder(w).Encode(d)\n\t\tif err != nil {\n\t\t\tlog.Println(\"error sending discovery:\", err)\n\t\t}\n\t})\n\n\treturn mux\n}", "title": "" }, { "docid": "84c3cdcd10ab660b4935437152b097f1", "score": "0.5548256", "text": "func (d *Dispatcher) Mux() *http.ServeMux {\n\treturn d.mux\n}", "title": "" }, { "docid": "9523216ff39a09c7e91852340e4f00e4", "score": "0.55396295", "text": "func MakeMux(directory string) *http.ServeMux {\n\tconfigurationBase = directory\n\tmux := http.NewServeMux()\n\tmux.HandleFunc(\"/incoming/\", handleDeployment)\n\treturn mux\n}", "title": "" }, { "docid": "971bd9830d63fa2f473904718eb9a23d", "score": "0.5539281", "text": "func NewRouter() *mux.Router {\n\trouter := mux.NewRouter().StrictSlash(true)\n\n\tfor setName, routes := range RouteSet {\n\t\tfor _, route := range routes {\n\t\t\tname := setName + \"::\" + route.Name\n\n\t\t\thandler := identWrapper(name, stdWrapper(route.HandlerFunc))\n\n\t\t\tlog.Infof(\"Registered HTTP: %s for %s %s\",\n\t\t\t\tname, route.Method, route.Pattern)\n\n\t\t\trouter.\n\t\t\t\tMethods(route.Method).\n\t\t\t\tPath(route.Pattern).\n\t\t\t\tName(name).\n\t\t\t\tHandler(handler)\n\t\t}\n\t}\n\n\tfor setName, routes := range IdentRouteSet {\n\t\tfor _, route := range routes {\n\t\t\tname := setName + \"::\" + route.Name\n\n\t\t\thandler := identWrapper(name, route.HandlerFunc)\n\n\t\t\tlog.Infof(\"Registered IDENT: %s for %s %s\",\n\t\t\t\tname, route.Method, route.Pattern)\n\n\t\t\trouter.\n\t\t\t\tMethods(route.Method).\n\t\t\t\tPath(route.Pattern).\n\t\t\t\tName(name).\n\t\t\t\tHandler(handler)\n\t\t}\n\t}\n\n\tvar assets AssetRoutes\n\tfor setName, assetRoutes := range AssetSet {\n\t\tfor _, route := range assetRoutes {\n\t\t\troute.Name = setName + \"::\" + route.Name\n\t\t\tassets = append(assets, route)\n\t\t}\n\t}\n\tsort.Sort(assets)\n\n\tfor _, route := range assets {\n\t\tfn := assetWrapper(route.Name, route.Path, route.HandlerFunc)\n\t\tlog.Infof(\"Registered ASSET: %s for %s\", route.Name, route.Path)\n\n\t\trouter.PathPrefix(route.Path).Name(route.Name).Handler(fn)\n\t}\n\n\tfor e, lis := range MiddlewareSet {\n\t\tfor _, m := range lis {\n\t\t\tlog.Infof(\"Registered Middleware: %s for %s\", m.Name, e)\n\t\t}\n\t}\n\n\tif viper.IsSet(\"idm\") {\n\t\tlis := viper.GetStringMapString(\"idm\")\n\t\tfor idm := range lis {\n\t\t\tident.RegisterConfig(idm, viper.GetStringMapString(\"idm.\"+idm))\n\t\t}\n\t}\n\n\tfor name, fn := range modules {\n\t\tmodule := viper.GetStringMapString(\"module.\" + name)\n\t\tfn(module)\n\t}\n\n\treturn router\n}", "title": "" }, { "docid": "252d766cf72649e80d6671bab9b3c70a", "score": "0.55310816", "text": "func Map() {\n\t//http.Handle(\"/\", router)\n\thttp.Handle(\"/\", gorillahandlers.CombinedLoggingHandler(os.Stderr, router))\n}", "title": "" }, { "docid": "4fa9e43a23099933ec4eed148955c71a", "score": "0.55220026", "text": "func defaultMux() *http.ServeMux {\n\tmux := http.NewServeMux()\n\tmux.HandleFunc(\"/\", hello)\n\treturn mux\n}", "title": "" }, { "docid": "d5c73116092dedb14a893d108bd172e0", "score": "0.5521958", "text": "func NewServeMux() *ServeMux {\n\treturn &ServeMux{routes: make(map[string]Handler)}\n}", "title": "" }, { "docid": "6703bdbef136de7edcbeb642f9e0154c", "score": "0.55111897", "text": "func (s *server) initServeMux() {\n\ts.mux = http.NewServeMux()\n\ts.mux.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\t\tif r.URL.Path != \"/\" {\n\t\t\thttp.NotFound(w, r)\n\t\t\treturn\n\t\t}\n\t\ts.listHandler.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "5967c9fc5ef459c2cd47cca3c62caab4", "score": "0.55034244", "text": "func NewMux(log *log.Logger) *http.ServeMux {\n\tmux := http.NewServeMux()\n\n\t// Serve everything in the css folder, the img folder and mp3 folder as a file.\n\tmux.Handle(\"/css/\", http.StripPrefix(\"/css/\", http.FileServer(http.Dir(\"css\"))))\n\tmux.Handle(\"/img/\", http.StripPrefix(\"/img/\", http.FileServer(http.Dir(\"img\"))))\n\tmux.Handle(\"/mp3/\", http.StripPrefix(\"/mp3/\", http.FileServer(http.Dir(\"mp3\"))))\n\n\tbase := Base{log}\n\tmux.HandleFunc(\"/\", base.Home)\n\tmux.HandleFunc(\"/scale\", base.Scale)\n\tmux.HandleFunc(\"/scaleshow\", base.ScaleShow)\n\tmux.HandleFunc(\"/duets\", base.Duet)\n\tmux.HandleFunc(\"/duetshow\", base.DuetShow)\n\n\treturn mux\n}", "title": "" }, { "docid": "5d20d15ea9b3e43629ae9284264782d4", "score": "0.54889584", "text": "func ServeMux() *http.ServeMux {\n\treturn DefaultCaddyServeMux\n}", "title": "" }, { "docid": "116c2174e859ca9abfd3169e3a723733", "score": "0.5486183", "text": "func (s *Server) createMux() *mux.Router {\n\tm := mux.NewRouter()\n\n\tlogrus.Debugf(\"Registering routers\")\n\tfor _, apiRouter := range s.routers {\n\t\tfor _, r := range apiRouter.Routes() {\n\t\t\tf := s.makeHTTPHandler(r.Handler())\n\n\t\t\tlogrus.Debugf(\"Registering %s %s\", r.Method(), r.Path())\n\t\t\tm.Path(s.contextRoot + versionMatcher + r.Path()).Methods(r.Method()).Handler(f)\n\t\t\tm.Path(s.contextRoot + r.Path()).Methods(r.Method()).Handler(f)\n\t\t}\n\t}\n\n\treturn m\n}", "title": "" }, { "docid": "38b0627bfa7246dc1015dba08740757e", "score": "0.5485418", "text": "func (s Server) debugMiddleware(h http.Handler) http.Handler {\n\t// Can be changed to debug\n\tconst (\n\t\t// Log settings\n\n\t\tlogDataRequests = false\n\t\tlogExtRequests = false\n\t\tlogStaticFilesRequests = false\n\t\tlogFaviconRequests = false\n\n\t\t// Builder of log records settings\n\n\t\tprintForm = true\n\t\t// Note: request will be logged after ServeHTTP finish (it can take some time)\n\t\tprintServingDuration = true\n\t)\n\n\tconst (\n\t\t// time len + space (1) + [DBG] (5) + space (1) + method len (?) + space (1)\n\t\tindentionOffset = len(clog.DefaultTimeLayout) + 1 + 5 + 1 + 1\n\n\t\t// indentionOriginString helps not to allocate new memory with strings.Repeat()\n\t\t// It contains 50 spaces (must be enough forever)\n\t\tindentionOriginalString = \" \"\n\t)\n\n\tshouldLog := func(urlPath string) bool {\n\t\t// Check sorted by requests popularity\n\n\t\t// Don't log data requests\n\t\tif !logDataRequests && strings.HasPrefix(urlPath, \"/data/\") {\n\t\t\treturn false\n\t\t}\n\n\t\t// Don't log extensions requests\n\t\tif !logExtRequests && strings.HasPrefix(urlPath, \"/file-icons\") {\n\t\t\treturn false\n\t\t}\n\n\t\t// Don't log static files\n\t\tif !logStaticFilesRequests && strings.HasPrefix(urlPath, \"/static/\") {\n\t\t\treturn false\n\t\t}\n\n\t\t// Don't log favicon.ico\n\t\tif !logFaviconRequests && strings.HasSuffix(urlPath, \"favicon.ico\") {\n\t\t\treturn false\n\t\t}\n\n\t\treturn true\n\t}\n\n\t// buildLogRecord builds a string to log. The string contains information about a request.\n\tbuildLogRecord := func(r *http.Request, duration time.Duration) string {\n\t\tbuilder := new(strings.Builder)\n\n\t\t// Add main info\n\t\tbuilder.WriteString(r.Method)\n\t\tbuilder.WriteByte(' ')\n\t\tbuilder.WriteString(r.URL.Path)\n\t\tbuilder.WriteByte('\\n')\n\n\t\tindention := indentionOriginalString[:indentionOffset+len(r.Method)]\n\n\t\t// Add form\n\t\tr.ParseForm()\n\t\tif printForm && len(r.Form) > 0 {\n\t\t\tspace := 0\n\t\t\tfor k := range r.Form {\n\t\t\t\tif space < len(k) {\n\t\t\t\t\tspace = len(k)\n\t\t\t\t}\n\t\t\t}\n\t\t\tspace++\n\n\t\t\tbuilder.WriteString(indention)\n\t\t\tbuilder.WriteString(\"Form: \\n\")\n\n\t\t\tfor k, v := range r.Form {\n\t\t\t\tp := strings.Repeat(\" \", space-len(k))\n\n\t\t\t\tbuilder.WriteString(indention)\n\t\t\t\tbuilder.WriteByte(' ')\n\t\t\t\tbuilder.WriteByte('-')\n\t\t\t\tbuilder.WriteByte(' ')\n\t\t\t\tbuilder.WriteString(k)\n\t\t\t\tbuilder.WriteString(p)\n\t\t\t\tfmt.Fprint(builder, v)\n\t\t\t\tbuilder.WriteByte('\\n')\n\t\t\t}\n\t\t}\n\n\t\t// Add duration\n\t\tif printServingDuration {\n\t\t\tbuilder.WriteString(indention)\n\t\t\tbuilder.WriteString(\"Duration: \")\n\t\t\tbuilder.WriteString(duration.String())\n\t\t\tbuilder.WriteByte('\\n')\n\t\t}\n\n\t\treturn builder.String()\n\t}\n\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tshouldLog := shouldLog(r.URL.Path)\n\n\t\tif shouldLog && !printServingDuration {\n\t\t\t// Print immediately without duration\n\t\t\ts.logger.Debug(buildLogRecord(r, 0))\n\t\t}\n\n\t\tsetDebugHeaders(w, r)\n\n\t\tnow := time.Now()\n\n\t\th.ServeHTTP(w, r)\n\n\t\tif shouldLog && printServingDuration {\n\t\t\t// Print with duration\n\t\t\ts.logger.Debug(buildLogRecord(r, time.Since(now)))\n\t\t}\n\t})\n}", "title": "" }, { "docid": "f8705604f161b3bc2e49a8fb4d8e0182", "score": "0.54844683", "text": "func NewMux() *Mux {\n\ts := &Mux{\n\t\tLogger: log.New(os.Stdout, \"rst: \", log.LstdFlags),\n\t\theader: make(http.Header),\n\t\tm: gorillaMux.NewRouter(),\n\t\tendpoints: make(map[string]mapEndpoint),\n\t}\n\treturn s\n}", "title": "" }, { "docid": "9c595e6e4898ee65f590a2decb9d6b1d", "score": "0.54828465", "text": "func InstallDebugHandlers(reg Registry, mux *http.ServeMux) {\n\tmux.HandleFunc(\"/debug/registry/tasks\", func(w http.ResponseWriter, r *http.Request) {\n\t\t//TODO(jdef) support filtering tasks based on status\n\t\talltasks := reg.List(nil)\n\t\tio.WriteString(w, fmt.Sprintf(\"task_count=%d\\n\", len(alltasks)))\n\t\tfor _, task := range alltasks {\n\t\t\tif err := func() (err error) {\n\t\t\t\tpodName := task.Pod.Name\n\t\t\t\tpodNamespace := task.Pod.Namespace\n\t\t\t\tofferId := \"\"\n\t\t\t\tif task.Offer != nil {\n\t\t\t\t\tofferId = task.Offer.Id()\n\t\t\t\t}\n\t\t\t\t_, err = io.WriteString(w, fmt.Sprintf(\"%v\\t%v/%v\\t%v\\t%v\\n\", task.ID, podNamespace, podName, task.State, offerId))\n\t\t\t\treturn\n\t\t\t}(); err != nil {\n\t\t\t\tlog.Warningf(\"aborting debug handler: %v\", err)\n\t\t\t\tbreak // stop listing on I/O errors\n\t\t\t}\n\t\t}\n\t\tif flusher, ok := w.(http.Flusher); ok {\n\t\t\tflusher.Flush()\n\t\t}\n\t})\n}", "title": "" }, { "docid": "5d637a15ed2a28dec2a58b9c221d4d57", "score": "0.5482467", "text": "func init() {\n\thttp.DefaultServeMux = http.NewServeMux()\n}", "title": "" }, { "docid": "ef0e04058b6d56de818b686a106992ea", "score": "0.5476993", "text": "func newRouter(handler *Handler) *mux.Router {\n\trouter := mux.NewRouter()\n\trouter.HandleFunc(\"/\", handler.handleHome).Methods(\"GET\").Name(\"Home\")\n\trouter.HandleFunc(\"/cluster/resize/abort\", handler.handlePostClusterResizeAbort).Methods(\"POST\").Name(\"PostClusterResizeAbort\")\n\trouter.HandleFunc(\"/cluster/resize/remove-node\", handler.handlePostClusterResizeRemoveNode).Methods(\"POST\").Name(\"PostClusterResizeRemoveNode\")\n\trouter.HandleFunc(\"/cluster/resize/set-coordinator\", handler.handlePostClusterResizeSetCoordinator).Methods(\"POST\").Name(\"PostClusterResizeSetCoordinator\")\n\trouter.PathPrefix(\"/debug/pprof/\").Handler(http.DefaultServeMux).Methods(\"GET\")\n\trouter.Handle(\"/debug/vars\", expvar.Handler()).Methods(\"GET\")\n\trouter.HandleFunc(\"/export\", handler.handleGetExport).Methods(\"GET\").Name(\"GetExport\")\n\trouter.HandleFunc(\"/index\", handler.handleGetIndexes).Methods(\"GET\").Name(\"GetIndexes\")\n\trouter.HandleFunc(\"/index/{index}\", handler.handleGetIndex).Methods(\"GET\").Name(\"GetIndex\")\n\trouter.HandleFunc(\"/index/{index}\", handler.handlePostIndex).Methods(\"POST\").Name(\"PostIndex\")\n\trouter.HandleFunc(\"/index/{index}\", handler.handleDeleteIndex).Methods(\"DELETE\").Name(\"DeleteIndex\")\n\t//router.HandleFunc(\"/index/{index}/field\", handler.handleGetFields).Methods(\"GET\") // Not implemented.\n\trouter.HandleFunc(\"/index/{index}/field/{field}\", handler.handlePostField).Methods(\"POST\").Name(\"PostField\")\n\trouter.HandleFunc(\"/index/{index}/field/{field}\", handler.handleDeleteField).Methods(\"DELETE\").Name(\"DeleteField\")\n\trouter.HandleFunc(\"/index/{index}/field/{field}/import\", handler.handlePostImport).Methods(\"POST\").Name(\"PostImport\")\n\trouter.HandleFunc(\"/index/{index}/field/{field}/import-roaring/{shard}\", handler.handlePostImportRoaring).Methods(\"POST\").Name(\"PostImportRoaring\")\n\trouter.HandleFunc(\"/index/{index}/query\", handler.handlePostQuery).Methods(\"POST\").Name(\"PostQuery\")\n\trouter.HandleFunc(\"/info\", handler.handleGetInfo).Methods(\"GET\").Name(\"GetInfo\")\n\trouter.HandleFunc(\"/recalculate-caches\", handler.handleRecalculateCaches).Methods(\"POST\").Name(\"RecalculateCaches\")\n\trouter.HandleFunc(\"/schema\", handler.handleGetSchema).Methods(\"GET\").Name(\"GetSchema\")\n\trouter.HandleFunc(\"/status\", handler.handleGetStatus).Methods(\"GET\").Name(\"GetStatus\")\n\trouter.HandleFunc(\"/version\", handler.handleGetVersion).Methods(\"GET\").Name(\"GetVersion\")\n\n\t// /internal endpoints are for internal use only; they may change at any time.\n\t// DO NOT rely on these for external applications!\n\trouter.HandleFunc(\"/internal/cluster/message\", handler.handlePostClusterMessage).Methods(\"POST\").Name(\"PostClusterMessage\")\n\trouter.HandleFunc(\"/internal/fragment/block/data\", handler.handleGetFragmentBlockData).Methods(\"GET\").Name(\"GetFragmentBlockData\")\n\trouter.HandleFunc(\"/internal/fragment/blocks\", handler.handleGetFragmentBlocks).Methods(\"GET\").Name(\"GetFragmentBlocks\")\n\trouter.HandleFunc(\"/internal/fragment/nodes\", handler.handleGetFragmentNodes).Methods(\"GET\").Name(\"GetFragmentNodes\")\n\trouter.HandleFunc(\"/internal/index/{index}/attr/diff\", handler.handlePostIndexAttrDiff).Methods(\"POST\").Name(\"PostIndexAttrDiff\")\n\trouter.HandleFunc(\"/internal/index/{index}/field/{field}/attr/diff\", handler.handlePostFieldAttrDiff).Methods(\"POST\").Name(\"PostFieldAttrDiff\")\n\trouter.HandleFunc(\"/internal/index/{index}/field/{field}/remote-available-shards/{shardID}\", handler.handleDeleteRemoteAvailableShard).Methods(\"DELETE\")\n\trouter.HandleFunc(\"/internal/nodes\", handler.handleGetNodes).Methods(\"GET\").Name(\"GetNodes\")\n\trouter.HandleFunc(\"/internal/shards/max\", handler.handleGetShardsMax).Methods(\"GET\").Name(\"GetShardsMax\") // TODO: deprecate, but it's being used by the client\n\trouter.HandleFunc(\"/internal/translate/data\", handler.handleGetTranslateData).Methods(\"GET\").Name(\"GetTranslateData\")\n\n\trouter.Use(handler.queryArgValidator)\n\treturn router\n}", "title": "" }, { "docid": "b55e58ca541054764ca947eebac8b440", "score": "0.54672045", "text": "func (s *Server) createMux() *mux.Router {\n\tm := mux.NewRouter()\n\n\tlogrus.Debug(\"Registering routers\")\n\tfor _, apiRouter := range s.routers {\n\t\tfor _, r := range apiRouter.Routes() {\n\t\t\tf := s.makeHTTPHandler(r.Handler())\n\n\t\t\tlogrus.Debugf(\"Registering %s, %s\", r.Method(), r.Path())\n\t\t\tm.Path(versionMatcher + r.Path()).Methods(r.Method()).Handler(f)\n\t\t\tm.Path(r.Path()).Methods(r.Method()).Handler(f)\n\t\t}\n\t}\n\n\terr := errors.NewRequestNotFoundError(fmt.Errorf(\"page not found\"))\n\tnotFoundHandler := httputils.MakeErrorHandler(err)\n\tm.HandleFunc(versionMatcher+\"/{path:.*}\", notFoundHandler)\n\tm.NotFoundHandler = notFoundHandler\n\n\treturn m\n}", "title": "" }, { "docid": "e43a03829918eaa332e3caf87245cf71", "score": "0.5461953", "text": "func StartServer(handlers []RouteHandler) {\n\trouter := mux.NewRouter()\n\tfor _, handler := range handlers {\n\t\thandler.RegisterRoutes(router)\n\t}\n\tlog.Println(\"Starting HTTP server...\")\n\tlog.Fatal(http.ListenAndServe(\":8888\", router))\n}", "title": "" }, { "docid": "fcc9af2e6a8145daf2c67fce779de6b6", "score": "0.5438002", "text": "func Start(addr string, extra ...Endpoint) {\n\tpp := http.NewServeMux()\n\tindex := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Write([]byte(`\n\t\t\t\t<a href=\"/vars\">Vars</a><br>\n\t\t\t\t<a href=\"/debug/pprof\">PProf</a><br>\n\t\t\t\t<a href=\"/depprof\">DepProf</a><br>\n\t\t\t\t<a href=\"/metrics\">Metrics</a><br>\n\t\t\t`))\n\t\tfor _, e := range extra {\n\t\t\tfmt.Fprintf(w, `<a href=\"%s\">%s</a><br>`, e.Path, e.Name)\n\t\t}\n\t\tw.Write([]byte(`\n\t\t\t\t<br>\n\t\t\t\t<form method=\"post\" action=\"/gc\" style=\"display: inline;\"><input type=\"submit\" value=\"GC\"></form>\n\t\t\t\t<form method=\"post\" action=\"/freeosmemory\" style=\"display: inline;\"><input type=\"submit\" value=\"Free OS Memory\"></form>\n\t\t\t`))\n\t})\n\tpp.Handle(\"/\", index)\n\tpp.Handle(\"/debug\", index)\n\tpp.Handle(\"/vars\", http.HandlerFunc(expvarHandler))\n\tpp.Handle(\"/gc\", http.HandlerFunc(gcHandler))\n\tpp.Handle(\"/freeosmemory\", http.HandlerFunc(freeOSMemoryHandler))\n\tpp.Handle(\"/debug/pprof/\", http.HandlerFunc(pprof.Index))\n\tpp.Handle(\"/debug/pprof/cmdline\", http.HandlerFunc(pprof.Cmdline))\n\tpp.Handle(\"/debug/pprof/profile\", http.HandlerFunc(pprof.Profile))\n\tpp.Handle(\"/debug/pprof/symbol\", http.HandlerFunc(pprof.Symbol))\n\tpp.Handle(\"/debug/pprof/trace\", http.HandlerFunc(pprof.Trace))\n\tpp.Handle(\"/depprof\", depprof.NewHandler(\"sourcegraph.com/sourcegraph/sourcegraph\"))\n\tpp.Handle(\"/metrics\", prometheus.Handler())\n\tfor _, e := range extra {\n\t\tpp.Handle(e.Path, e.Handler)\n\t}\n\tlog.Println(\"warning: could not start debug HTTP server:\", http.ListenAndServe(addr, pp))\n}", "title": "" }, { "docid": "4ebfe51707e0b6121ec4e4b5b7df6652", "score": "0.5428476", "text": "func main() {\n\tmux := http.NewServeMux()\n\tmux.HandleFunc(\"/debug/\", sourceCodeHandler)\n\tmux.HandleFunc(\"/panic/\", panicDemo)\n\tmux.HandleFunc(\"/panic-after/\", panicAfterDemo)\n\tmux.HandleFunc(\"/\", hello)\n\terr := http.ListenAndServe(\":3000\", devMw(mux))\n\tif err != nil {\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "1bfad1868d3d08dd79d77545534ec926", "score": "0.5427945", "text": "func WrapServeMux(\n\tmux *http.ServeMux,\n\tappname string,\n\tprovided DependencySet,\n\tadditional ...HealthMonitor,\n) {\n\tprovided.Register(additional...)\n\n\tinfoHandler := NewInfo(provided)\n\tprivHandler := NewPrivate(appname, provided)\n\n\tmux.Handle(InfoHealthCheck, infoHandler)\n\tmux.Handle(InfoHealthCheckLive, infoHandler)\n\tmux.Handle(PrivateHealthCheck, privHandler)\n\tmux.Handle(PrivateHealthCheckLive, privHandler)\n}", "title": "" }, { "docid": "3e7931120768961ec7b3faebf7474ce5", "score": "0.5421594", "text": "func NewMux(service Service) http.Handler {\n\tr := chi.NewRouter()\n\tr.Post(\"/search\", NewSearchHandler(service))\n\tr.Get(\"/docs\", NewDocsUIHandler())\n\tr.Get(\"/swagger.json\", NewDocsHandler())\n\n\treturn r\n}", "title": "" }, { "docid": "865fb4f4ff1c6cd5ab68e9b12327e97d", "score": "0.5412619", "text": "func RegisterHandlers(router interface {\n\tCONNECT(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route\n\tDELETE(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route\n\tGET(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route\n\tHEAD(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route\n\tOPTIONS(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route\n\tPATCH(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route\n\tPOST(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route\n\tPUT(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route\n\tTRACE(path string, h echo.HandlerFunc, m ...echo.MiddlewareFunc) *echo.Route\n}, si ServerInterface) {\n\n\twrapper := ServerInterfaceWrapper{\n\t\tHandler: si,\n\t}\n\n\trouter.GET(\"/\", wrapper.Root)\n\trouter.GET(\"/auth/info\", wrapper.AuthenticationInfo)\n\trouter.GET(\"/authenticate\", wrapper.Authenticate)\n\trouter.POST(\"/authenticate\", wrapper.OpenshiftCheckToken)\n\trouter.GET(\"/config\", wrapper.GetConfig)\n\trouter.GET(\"/grafana\", wrapper.GrafanaInfo)\n\trouter.GET(\"/istio/permissions\", wrapper.GetPermissions)\n\trouter.DELETE(\"/iter8/experiments/namespaces/:namespace/name/:name\", wrapper.DeleteIter8Experiments)\n\trouter.PATCH(\"/iter8/experiments/:namespace/name/:name\", wrapper.PatchIter8Experiments)\n\trouter.POST(\"/iter8/namespaces/:namespace/experiments\", wrapper.PostIter8Experiments)\n\trouter.GET(\"/iter8/namespaces/:namespace/experiments/:name\", wrapper.GetIter8Experiments)\n\trouter.GET(\"/jaeger\", wrapper.JaegerInfo)\n\trouter.GET(\"/logout\", wrapper.Logout)\n\trouter.GET(\"/mesh/tls\", wrapper.MeshTls)\n\trouter.GET(\"/namespaces\", wrapper.NamespaceList)\n\trouter.GET(\"/namespaces/graph\", wrapper.GraphNamespaces)\n\trouter.GET(\"/namespaces/:namespace/applications/:app/graph\", wrapper.GraphApp)\n\trouter.GET(\"/namespaces/:namespace/applications/:app/versions/:version/graph\", wrapper.GraphAppVersion)\n\trouter.GET(\"/namespaces/:namespace/apps\", wrapper.AppList)\n\trouter.GET(\"/namespaces/:namespace/apps/:app\", wrapper.AppDetails)\n\trouter.GET(\"/namespaces/:namespace/apps/:app/dashboard\", wrapper.AppDashboard)\n\trouter.GET(\"/namespaces/:namespace/apps/:app/health\", wrapper.AppHealth)\n\trouter.GET(\"/namespaces/:namespace/apps/:app/metrics\", wrapper.AppMetrics)\n\trouter.GET(\"/namespaces/:namespace/customdashboard/:dashboard\", wrapper.CustomDashboard)\n\trouter.GET(\"/namespaces/:namespace/health\", wrapper.NamespaceHealth)\n\trouter.GET(\"/namespaces/:namespace/istio\", wrapper.IstioConfigList)\n\trouter.POST(\"/namespaces/:namespace/istio/:object_type\", wrapper.IstioConfigCreate)\n\trouter.POST(\"/namespaces/:namespace/istio/:object_type/:object_subtype\", wrapper.IstioConfigCreateSubtype)\n\trouter.DELETE(\"/namespaces/:namespace/istio/:object_type/:object_subtype/:object\", wrapper.IstioConfigDeleteSubtype)\n\trouter.GET(\"/namespaces/:namespace/istio/:object_type/:object_subtype/:object\", wrapper.IstioConfigDetailsSubtype)\n\trouter.PATCH(\"/namespaces/:namespace/istio/:object_type/:object_subtype/:object\", wrapper.IstioConfigUpdateSubtype)\n\trouter.DELETE(\"/namespaces/:namespace/istio/:object_type/:object\", wrapper.IstioConfigDelete)\n\trouter.GET(\"/namespaces/:namespace/istio/:object_type/:object\", wrapper.IstioConfigDetails)\n\trouter.PATCH(\"/namespaces/:namespace/istio/:object_type/:object\", wrapper.IstioConfigUpdate)\n\trouter.GET(\"/namespaces/:namespace/metrics\", wrapper.NamespaceMetrics)\n\trouter.GET(\"/namespaces/:namespace/pods/:pod\", wrapper.PodDetails)\n\trouter.GET(\"/namespaces/:namespace/pods/:pod/logs\", wrapper.PodLogs)\n\trouter.GET(\"/namespaces/:namespace/services\", wrapper.ServiceList)\n\trouter.GET(\"/namespaces/:namespace/services/:service\", wrapper.ServiceDetails)\n\trouter.GET(\"/namespaces/:namespace/services/:service/dashboard\", wrapper.ServiceDashboard)\n\trouter.GET(\"/namespaces/:namespace/services/:service/errortraces\", wrapper.ErrorTraces)\n\trouter.GET(\"/namespaces/:namespace/services/:service/graph\", wrapper.GraphService)\n\trouter.GET(\"/namespaces/:namespace/services/:service/health\", wrapper.ServiceHealth)\n\trouter.GET(\"/namespaces/:namespace/services/:service/metrics\", wrapper.ServiceMetrics)\n\trouter.GET(\"/namespaces/:namespace/services/:service/spans\", wrapper.SpansList)\n\trouter.GET(\"/namespaces/:namespace/services/:service/traces\", wrapper.TracesDetail)\n\trouter.GET(\"/namespaces/:namespace/tls\", wrapper.NamespaceTls)\n\trouter.GET(\"/namespaces/:namespace/validations\", wrapper.NamespaceValidations)\n\trouter.GET(\"/namespaces/:namespace/workloads\", wrapper.WorkloadList)\n\trouter.GET(\"/namespaces/:namespace/workloads/:workload\", wrapper.WorkloadDetails)\n\trouter.GET(\"/namespaces/:namespace/workloads/:workload/dashboard\", wrapper.WorkloadDashboard)\n\trouter.GET(\"/namespaces/:namespace/workloads/:workload/graph\", wrapper.GraphWorkload)\n\trouter.GET(\"/namespaces/:namespace/workloads/:workload/health\", wrapper.WorkloadHealth)\n\trouter.GET(\"/namespaces/:namespace/workloads/:workload/metrics\", wrapper.WorkloadMetrics)\n\trouter.GET(\"/status\", wrapper.GetStatus)\n\trouter.GET(\"/threescale\", wrapper.GetThreeScaleInfo)\n\trouter.GET(\"/threescale/handlers\", wrapper.GetThreeScaleHandlers)\n\trouter.POST(\"/threescale/handlers\", wrapper.PostThreeScaleHandlers)\n\trouter.DELETE(\"/threescale/handlers/:threescaleHandlerName\", wrapper.DeleteThreeScaleHandler)\n\trouter.PATCH(\"/threescale/handlers/:threescaleHandlerName\", wrapper.PatchThreeScaleHandler)\n\trouter.POST(\"/threescale/namespaces/:namespace/services\", wrapper.PostThreeScaleService)\n\trouter.DELETE(\"/threescale/namespaces/:namespace/services/:service\", wrapper.DeleteThreeScaleService)\n\trouter.GET(\"/threescale/namespaces/:namespace/services/:service\", wrapper.GetThreeScaleService)\n\trouter.PATCH(\"/threescale/namespaces/:namespace/services/:service\", wrapper.PatchThreeScaleService)\n\n}", "title": "" }, { "docid": "21cf2b7558dbd2d85a67ee472b66a0bb", "score": "0.5403863", "text": "func (app App) NewMux() *goji.Mux {\n\tmux := goji.SubMux()\n\n\tmux.HandleFunc(pat.Get(\"/logout\"), app.logout())\n\tmux.HandleFunc(pat.Get(\"/redirect\"), app.slackRedirect())\n\tmux.HandleFunc(pat.Get(\"/whoami\"), app.whoami())\n\tmux.HandleFunc(pat.Post(\"/places/:id\"), app.placeUpdate())\n\tmux.HandleFunc(pat.Delete(\"/places/:id\"), app.deletePlace())\n\tmux.HandleFunc(pat.Get(\"/places\"), app.placesAll())\n\tmux.HandleFunc(pat.Get(\"/login\"), app.login())\n\n\tmux.HandleFunc(pat.Get(\"/graphql\"), app.placesGraphql())\n\n\tmux.HandleFunc(pat.Delete(\"/places/:id\"), app.deletePlace())\n\n\tmux.Use(support.Logging)\n\treturn mux\n}", "title": "" }, { "docid": "f4a5b4ee42efb0a860694b294fe39059", "score": "0.5403288", "text": "func NewMux() (http.Handler, error) {\n\tstorage, err := getStorage()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tauthentication, err := getAuthentication(os.Getenv(\"AUTH\"), storage)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ts := libscontroller.NewServer(storage)\n\n\tmux := http.NewServeMux()\n\tmux.Handle(\"/lib/create\", cors(authentication.Middleware(s.CreateLib)))\n\tmux.Handle(\"/lib/update\", cors(authentication.Middleware(s.UpdateLib)))\n\tmux.Handle(\"/lib/delete\", cors(authentication.Middleware(s.DeleteLib)))\n\tmux.Handle(\"/lib/get\", cors(s.GetLib))\n\tmux.Handle(\"/lib/all\", cors(s.AllLibs))\n\tmux.Handle(\"/auth/upsert\", cors(s.UpsertAuth))\n\tmux.Handle(\"/auth/health\", cors(authentication.Middleware(status)))\n\tmux.Handle(\"/health\", cors(status))\n\treturn mux, nil\n}", "title": "" }, { "docid": "07bbbddba1c4d833ea341f434795ef72", "score": "0.5397244", "text": "func NewRouter() *mux.Router {\n\n router := mux.NewRouter().StrictSlash(true)\n for _, route := range routes {\n\n // Wrap our handler with the logger functionality.\n var handler http.Handler\n handler = route.HandlerFunc // The handling function that will need to service the request (defined in var routes below)\n handler = Logger (handler, route.Name) // Wrap it around our logger.\n\n router.\n Methods(route.Method). // HTTP Method (i.e. GET or POST)\n Path(route.Pattern). // URL PATH or pattern that the handler will need to service (\"/whatever\")\n Name(route.Name). // The name of the route\n Handler(handler) // The wrapped Handler function that will be servicing the request\n }\n\n return router\n}", "title": "" }, { "docid": "21bdbaea6c235e45fbcbbbe622211955", "score": "0.5390237", "text": "func (b *B) HandleDebug(mux *http.ServeMux) {\n\tb.HandleDebugPrefix(\"/debug/bigmachine/\", mux)\n}", "title": "" }, { "docid": "9e6a2f784a1e602eeb39a396dbb97e5b", "score": "0.5366467", "text": "func NewRouter() *mux.Router {\n router := mux.NewRouter().StrictSlash(true)\n apiRouter := router.PathPrefix(\"/api\").Subrouter()\n for _, route := range routes {\n var handler http.Handler\n\n // Run every request through an authenticator\n handler = Authenticator(Logger(route.HandlerFunc, route.Name), route.Authed)\n\n apiRouter.\n Methods(route.Method).\n Path(route.Pattern).\n Name(route.Name).\n Handler(handler)\n }\n log.Printf(\"Backend router successfully initialized with %d routes.\", len(routes))\n\n fileServer := Logger(noDirListing(http.FileServer(http.Dir(StaticFolder))), StaticFolder)\n router.PathPrefix(\"/\").Handler(fileServer)\n log.Println(\"Web router successfully initialized.\")\n return router\n}", "title": "" }, { "docid": "eaafdca4f379c2e2259fb3dbb3c30d55", "score": "0.53606737", "text": "func (api *API) Mux() *mux.Router {\n\tif api.routerInitialized {\n\t\treturn api.router\n\t} else {\n\t\tapi.router = mux.NewRouter()\n\t\tapi.routerInitialized = true\n\t\treturn api.router\n\t}\n}", "title": "" }, { "docid": "7d8db9327a6d8045838bd10b61cf4888", "score": "0.53431255", "text": "func (s *Server) createMux() *mux.Router {\n\tm := mux.NewRouter()\n\n\tif s.opts.Verbose {\n\t\tlogger.L.Infof(\"Registering routes\")\n\t}\n\n\tfor _, apiRouter := range s.routers {\n\t\tfor _, r := range apiRouter.Routes() {\n\n\t\t\tif s.opts.Verbose {\n\t\t\t\tlogger.L.Infof(\"Registering route: [%s] %s\", r.Method(), r.Path())\n\t\t\t}\n\n\t\t\tf := s.makeHTTPHandler(r.Handler())\n\t\t\tm.Path(r.Path()).Methods(r.Method()).Handler(f)\n\t\t}\n\t}\n\n\treturn m\n}", "title": "" }, { "docid": "ad6785acbc6937588a23240e0aabc531", "score": "0.5339032", "text": "func New() *Mux {\n\tp := &Mux{\n\t\trouteGroup: routeGroup{\n\t\t\tmiddleware: make([]Middleware, 0),\n\t\t},\n\t\ttrees: make(map[string]*node),\n\t\tmostParams: 0,\n\t\thttp404: default404Handler,\n\t\thttp405: methodNotAllowedHandler,\n\t\thttpOPTIONS: automaticOPTIONSHandler,\n\t\tredirectTrailingSlash: true,\n\t\thandleMethodNotAllowed: false,\n\t\tautomaticallyHandleOPTIONS: false,\n\t}\n\tp.routeGroup.pure = p\n\tp.pool.New = func() interface{} {\n\n\t\trv := &requestVars{\n\t\t\tparams: make(urlParams, p.mostParams),\n\t\t}\n\n\t\trv.ctx = context.WithValue(context.Background(), defaultContextIdentifier, rv)\n\n\t\treturn rv\n\t}\n\treturn p\n}", "title": "" }, { "docid": "7126ae83beebbe863786ed43e9716cbf", "score": "0.53341", "text": "func New() *ServeMux {\n\tsc := convert(strConv)\n\tic := convert(intConv)\n\n\treturn &ServeMux{\n\t\ttree: &tree{root: &node{tid: root}},\n\t\tconverters: map[string]*convert{\n\t\t\t\"\": &sc,\n\t\t\t\"str\": &sc,\n\t\t\t\"int\": &ic,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "3088ecab0b4f6a45754acdbb826faa47", "score": "0.5333363", "text": "func NewRouter() *mux.Router{\n\trouter := mux.NewRouter().StrictSlash(true)\n\tfor _, route := range routes {\n\t\tvar handler http.Handler\n\n\t\thandler = route.HandlerFunc\n\t\t\n\t\thandler = LoggingHandler(handler, log)\n\n\t\trouter.\n\t\tMethods(route.Method).\n\t\tPath(route.Pattern).\n\t\tName(route.Name).\n\t\tHandler(handlers.LoggingHandler(os.Stdout, handler))\n\t\tlog.Debug(\"Added \" + route.String())\n\t\t\n\t}\n\treturn router\n}", "title": "" }, { "docid": "2837256d5e38e0d8a63a0029e20cb1c2", "score": "0.533331", "text": "func RegisterHTTPMux(mux *http.ServeMux, prefixOptions ...string) *http.ServeMux {\n\tprefix := getPrefix(prefixOptions...)\n\n\tmux.HandleFunc(prefix+\"/\", debugIndex)\n\tmux.HandleFunc(prefix+\"/pprof/\", pprof.Index)\n\tmux.HandleFunc(prefix+\"/pprof/cmdline\", pprof.Cmdline)\n\tmux.HandleFunc(prefix+\"/pprof/profile\", pprof.Profile)\n\tmux.HandleFunc(prefix+\"/pprof/symbol\", pprof.Symbol)\n\tmux.HandleFunc(prefix+\"/pprof/trace\", pprof.Trace)\n\n\tmux.Handle(prefix+\"/vars\", expvar.Handler())\n\n\tmux.HandleFunc(prefix+\"/healthz\", healthHandler)\n\tmux.HandleFunc(prefix+\"/readyz\", readyzHandler)\n\tmux.HandleFunc(prefix+\"/version\", versionHandler)\n\n\treturn mux\n}", "title": "" }, { "docid": "522ab71744dfae53d086d90eac1b3271", "score": "0.5306729", "text": "func New() *Mux {\n\treturn &Mux{\n\t\trootNode: newNode(),\n\n\t\tConcurrentAdd: true,\n\t\tRedirectTrailingSlash: true,\n\t}\n}", "title": "" }, { "docid": "e16fdd49a0f40b2318c3e3dacafab28e", "score": "0.53019625", "text": "func NewRouter(a *atlas.Atlas) *httptreemux.TreeMux {\n\to := a.Observer()\n\tr := httptreemux.New()\n\tgroup := r.NewGroup(URIPrefix)\n\n\t// one handler to respond to all OPTIONS requests for registered routes with our CORS headers\n\tr.OptionsHandler = corsHandler\n\n\tif o != nil && o != observability.NullObserver {\n\t\tconst (\n\t\t\tmetricsRoute = \"/metrics\"\n\t\t)\n\t\tif h := o.Handler(metricsRoute); h != nil {\n\t\t\t// Only set up the /metrics endpoint if we have a configured observer\n\t\t\tlog.Infof(\"setting up observer: %v\", o.Name())\n\t\t\tgroup.UsingContext().Handler(http.MethodGet, metricsRoute, h)\n\t\t}\n\t}\n\n\t// capabilities endpoints\n\tgroup.UsingContext().Handler(observability.InstrumentAPIHandler(http.MethodGet, \"/capabilities\", o, HeadersHandler(HandleCapabilities{})))\n\tgroup.UsingContext().Handler(observability.InstrumentAPIHandler(http.MethodGet, \"/capabilities/:map_name\", o, HeadersHandler(HandleMapCapabilities{})))\n\n\t// map tiles\n\thMapLayerZXY := HandleMapLayerZXY{Atlas: a}\n\tgroup.UsingContext().Handler(observability.InstrumentAPIHandler(http.MethodGet, \"/maps/:map_name/:z/:x/:y\", o, HeadersHandler(GZipHandler(TileCacheHandler(a, hMapLayerZXY)))))\n\tgroup.UsingContext().Handler(observability.InstrumentAPIHandler(http.MethodGet, \"/maps/:map_name/:layer_name/:z/:x/:y\", o, HeadersHandler(GZipHandler(TileCacheHandler(a, hMapLayerZXY)))))\n\n\t// map style\n\tgroup.UsingContext().Handler(observability.InstrumentAPIHandler(http.MethodGet, \"/maps/:map_name/style.json\", o, HeadersHandler(HandleMapStyle{})))\n\n\t// setup viewer routes, which can be excluded via build flags\n\tsetupViewer(o, group)\n\n\treturn r\n}", "title": "" }, { "docid": "8652a5d86918c4f35cf03e3e7f4125c9", "score": "0.5287733", "text": "func NewMux() *Mux {\n\treturn &Mux{\n\t\t// Default handler is a no-op\n\t\tDefaultHandler: HandlerFunc(func(ctx *Context, res *http.Response, err error) {}),\n\t\terrm: make(map[error]Handler),\n\t\tres: make(map[*ResponseMatcher]bool),\n\t}\n}", "title": "" }, { "docid": "2e8626266676ab50af20847656904f3d", "score": "0.52855635", "text": "func NewServer(g *globals.Globals) *Server {\n\tr := mux.NewRouter()\n\n\ts := &Server{\n\t\tServer: http.Server{\n\t\t\tAddr: g.Config.Server.Port,\n\t\t\tHandler: r,\n\t\t},\n\t\tglobals: g,\n\t\tmigrationMutex: &sync.RWMutex{},\n\t}\n\n\t// Alice creates a middleware chain which groups commonly used http handlers to be\n\t// executed in a sequential order for each http endpoint and only executes\n\t// the intended method after all of the methods before has completed.\n\tdefaultHandler := alice.New(s.migrationBlockingHandler, s.loggingHandler, s.noCacheHandler)\n\n\tpingHandler := defaultHandler.ThenFunc(s.ping)\n\tr.Handle(\"/ping\", pingHandler).Methods(http.MethodGet)\n\n\t//Client\n\tcreateClientHandler := defaultHandler.ThenFunc(s.createClient)\n\tr.Handle(\"/client/{id:[0-9]+}/{name:[A-Za-z0-9]+}\", createClientHandler).Methods(http.MethodPost)\n\n\treadClientAllHandler := defaultHandler.ThenFunc(s.readAllClient)\n\tr.Handle(\"/client\", readClientAllHandler).Methods(http.MethodGet)\n\n\treadClient := defaultHandler.ThenFunc(s.readClient)\n\tr.Handle(\"/client/{id:[0-9]+}\", readClient).Methods(http.MethodGet)\n\n\tdeleteClient := defaultHandler.ThenFunc(s.deleteClient)\n\tr.Handle(\"/client/{id:[0-9]+}\", deleteClient).Methods(http.MethodDelete)\n\n\t//Type\n\tcreateTypeHandler := defaultHandler.ThenFunc(s.createType)\n\tr.Handle(\"/type/{id:[0-9]+}/{name:[A-Za-z0-9]+}\", createTypeHandler).Methods(http.MethodPost)\n\n\treadTypeAllHandler := defaultHandler.ThenFunc(s.readAllType)\n\tr.Handle(\"/type\", readTypeAllHandler).Methods(http.MethodGet)\n\n\treadType := defaultHandler.ThenFunc(s.readType)\n\tr.Handle(\"/type/{id:[0-9]+}\", readType).Methods(http.MethodGet)\n\n\tdeleteType := defaultHandler.ThenFunc(s.deleteType)\n\tr.Handle(\"/type/{id:[0-9]+}\", deleteType).Methods(http.MethodDelete)\n\n\t//Message\n\tcreateHandler := defaultHandler.ThenFunc(s.create)\n\tr.Handle(\"/{clientId:[0-9]+}/{type:[A-Za-z0-9]+}\", createHandler).Methods(http.MethodPost)\n\n\treadAllHandler := defaultHandler.ThenFunc(s.readAll)\n\tr.Handle(\"/\", readAllHandler).Methods(http.MethodGet)\n\n\treadHandler := defaultHandler.ThenFunc(s.read)\n\tr.Handle(\"/{id:[0-9]+}\", readHandler).Methods(http.MethodGet)\n\n\tdelete := defaultHandler.ThenFunc(s.delete)\n\tr.Handle(\"/{id:[0-9]+}\", delete).Methods(http.MethodDelete)\n\n\treturn s\n}", "title": "" }, { "docid": "d6ee5ae78e89de79afd079f5f39407da", "score": "0.5284415", "text": "func NewRouter() *mux.Router {\n\tlogrus.Info(\"Serving...\")\n\tvar routes []Route\n\n\troutes = append(routes, Route{\"POST\", \"/register\", \"Register\", Register, false})\n\troutes = append(routes, Route{\"POST\", \"/login\", \"Login\", Login, false})\n\troutes = append(routes, Route{\"POST\", \"/users/groups\", \"GetGroupsByUserID\", GetGroupsByUserID, true})\n\troutes = append(routes, Route{\"POST\", \"/groups/add_members\", \"AddMembersToGroupChat\", AddMembersToGroupChat, true})\n\troutes = append(routes, Route{\"POST\", \"/groups/remove_members\", \"RemoveMembersToGroupChat\", RemoveMembersToGroupChat, true})\n\troutes = append(routes, Route{\"DELETE\", \"/groups/:id\", \"DeleteGroup\", DeleteGroupChat, true})\n\troutes = append(routes, Route{\"GET\", \"/groups/:id/messages\", \"ListMessagesOfGroup\", ListMessagesOfGroup, true})\n\n\t// websocket\n\troutes = append(routes, Route{\"GET\", \"/ws/connect\", \"WebSocketConnect\", WebSocketConnect, true})\n\n\trouter := mux.NewRouter().StrictSlash(true)\n\tfor _, route := range routes {\n\t\tvar handler http.Handler\n\t\thandler = route.HandlerFunc\n\t\thandler = Logger(handler, route.Name)\n\t\thandler = CORS(handler)\n\n\t\tif route.Protected {\n\t\t\thandler = TokenAuthMiddleware(handler)\n\t\t}\n\n\t\tlogrus.Infof(\"%s %s %s\", route.Method, route.Pattern, route.Name)\n\t\trouter.\n\t\t\tMethods(route.Method).\n\t\t\tPath(route.Pattern).\n\t\t\tName(route.Name).\n\t\t\tHandler(handler)\n\t}\n\treturn router\n}", "title": "" }, { "docid": "4cf0acfc56aa9eb115e084f0c9886e9e", "score": "0.52837646", "text": "func New() *Mux {\n\tmux := &Mux{Routes: rootRouteTrie(), caseSensitive: false}\n\tmux.Serve = mux.DefaultServe\n\treturn mux\n}", "title": "" }, { "docid": "6510bd96bbea1dc5ccfbf8ba2bd57559", "score": "0.52818567", "text": "func (s *Server) Mux() *http.ServeMux {\n\treturn s.mux\n}", "title": "" }, { "docid": "665791f9ec2577397b4d4b1361b86508", "score": "0.52714896", "text": "func NewMux() *Mux {\n\treturn &Mux{[]*Router{}, nil, sync.RWMutex{}, nil, nil, nil}\n}", "title": "" }, { "docid": "6e75455697be51cdad63766c50c34f87", "score": "0.526978", "text": "func NewServeMux(tracer opentracing.Tracer) *TracedServeMux {\n\treturn &TracedServeMux{\n\t\tmux: http.NewServeMux(),\n\t\ttracer: tracer,\n\t}\n}", "title": "" }, { "docid": "186d3598b1a7ec847987c39958f2ecb7", "score": "0.526183", "text": "func (s *Server) Start() {\n\t// define HTTP routes\n\trouter := mux.NewRouter()\n\n\t// user auth\n\trouter.HandleFunc(\"/login\", s.authHandler(s.loginHandler)).Methods(http.MethodGet, http.MethodPost)\n\trouter.HandleFunc(\"/logout\", s.authHandler(s.logoutHandler)).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/reset\", s.authHandler(s.resetHandler)).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/reset/{type}\", s.authHandler(s.resetHandler)).Methods(http.MethodPost)\n\t// list all users\n\trouter.HandleFunc(\"/users\", s.authHandler(s.viewUsersHandler)).Methods(http.MethodGet)\n\t// single user\n\trouter.HandleFunc(\"/user\", s.authHandler(s.manageUserHandler)).Methods(http.MethodPost)\n\trouter.HandleFunc(\"/user/{username}\", s.authHandler(s.manageUserHandler)).Methods(http.MethodGet, http.MethodPost)\n\trouter.HandleFunc(\"/admin\", s.authHandler(s.adminHandler)).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/admin/{type}\", s.authHandler(s.adminHandler)).Methods(http.MethodPost)\n\t// memory/file data viewing\n\trouter.HandleFunc(\"/\", s.authHandler(s.viewMemoriesHandler)).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/memory/{fileUUID}\", s.authHandler(s.viewMemoriesHandler)).Methods(http.MethodGet) // passive route, JS utilises fileUUID\n\trouter.HandleFunc(\"/search\", s.authHandler(s.searchMemoriesHandler)).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/data\", s.authHandler(s.getDataHandler)).Methods(http.MethodGet, http.MethodPost)\n\t// upload\n\trouter.HandleFunc(\"/upload\", s.authHandler(s.uploadHandler)).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/upload/{type}\", s.authHandler(s.uploadHandler)).Methods(http.MethodPost)\n\t// static uploaded file server\n\tstaticFileHandler := http.StripPrefix(\"/static/\", http.FileServer(http.Dir(config.rootPath+\"/static/\")))\n\trouter.Handle(`/static/{rest:[a-zA-Z0-9=\\-\\/._]+}`, s.fileServerAuthHandler(staticFileHandler))\n\t// temp uploaded file server\n\ttempFileHandler := http.StripPrefix(\"/temp_uploaded/\", http.FileServer(http.Dir(config.rootPath+\"/db/temp/\")))\n\trouter.Handle(`/temp_uploaded/{user_id:[a-zA-Z0-9=\\-_]+}/{file:[a-zA-Z0-9=\\-\\/._]+}`, s.fileServerAuthHandler(tempFileHandler))\n\n\ts.Server = &http.Server{\n\t\tHandler: router,\n\t\tAddr: net.JoinHostPort(s.host, fmt.Sprint(s.port)),\n\t\tReadTimeout: 15 * time.Second,\n\t\tWriteTimeout: 15 * time.Second,\n\t\tIdleTimeout: 120 * time.Second,\n\t}\n\n\t// listen for HTTP requests\n\tInfo.Logf(\"starting HTTP server on port %d\", s.port)\n\tgo func(server *Server) {\n\t\tInfo.Log(server.ListenAndServe())\n\t}(s)\n}", "title": "" }, { "docid": "e8e5389b5c6b111f69af07d9c862dc86", "score": "0.5259577", "text": "func (s *Server) createMux() *mux.Router {\n\tm := mux.NewRouter()\n\n\tlogrus.Debug(\"Registering routers\")\n\tfor _, r := range s.Routes() {\n\t\tf := s.makeHTTPHandler(r.Handler())\n\n\t\tlogrus.Debugf(\"Registering %s, %s\", r.Method(), r.Path())\n\t\tm.Path(r.Path()).Methods(r.Method()).Handler(f)\n\t}\n\n\treturn m\n}", "title": "" }, { "docid": "908f407aa7f96dceb1e9b4bd0779e98d", "score": "0.5247601", "text": "func NewRouter(option *Option) Router {\n\tif option == nil {\n\t\toption = DefaultOption\n\t}\n\tr := &defaultRouter{\n\t\tmiddleware: &handlerPipeline{},\n\t\troutes: make(map[string][]*route),\n\t\toption: option,\n\t}\n\n\tr.Get(\"/__debug__/routes\", HandlerFunc(func(req *Request, next NextHandler) *response.Response {\n\t\tvar buff bytes.Buffer\n\t\tr.printRoutes(\"GET\", &buff)\n\t\tr.printRoutes(\"POST\", &buff)\n\t\tr.printRoutes(\"PUT\", &buff)\n\t\tr.printRoutes(\"DELETE\", &buff)\n\t\treturn response.NewText(req.Context(), buff.String())\n\t}))\n\treturn r\n}", "title": "" }, { "docid": "a1b85676557a2dd4b969f75274e396b2", "score": "0.5229339", "text": "func Start(extra ...Endpoint) {\n\tlog.Println(\"Starting debug server\")\n\tif addr == \"\" {\n\t\treturn\n\t}\n\tpp := http.NewServeMux()\n\tindex := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Write([]byte(`\n\t\t\t<a href=\"vars\">Vars</a><br>\n\t\t\t<a href=\"debug/pprof/\">PProf</a><br>\n\t\t`))\n\t\tfor _, e := range extra {\n\t\t\tfmt.Fprintf(w, `<a href=\"%s\">%s</a><br>`, strings.TrimPrefix(e.Path, \"/\"), e.Name)\n\t\t}\n\t\tw.Write([]byte(`\n\t\t\t<br>\n\t\t\t<form method=\"post\" action=\"gc\" style=\"display: inline;\"><input type=\"submit\" value=\"GC\"></form>\n\t\t`))\n\t})\n\tpp.Handle(\"/\", index)\n\tpp.Handle(\"/debug\", index)\n\n\tlog.Println(\"warning: could not start debug HTTP server:\", http.ListenAndServe(addr, pp))\n}", "title": "" }, { "docid": "60bd500f66de070dcf1669e9f2e8df2d", "score": "0.5228812", "text": "func Registermulroutes() {\n\t//hook := base.NewStatsdServerHooks(base.GetLogStater())\n\n\t_ = pushserver.GetServer()\n\t//pushHandler := pb.NewReportServiceServer(pushServer, hook)\n\n\tMux = http.DefaultServeMux\n\t//Mux.Handle(pb.ReportServicePathPrefix, pushHandler)\n}", "title": "" }, { "docid": "7c335e2f45c8e7d8f6b5261db87cfe77", "score": "0.52264816", "text": "func debugServer(addr string) {\n\tlogrus.Infof(\"Debug server listening on %s\", addr)\n\tif err := http.ListenAndServe(addr, nil); err != nil {\n\t\tlogrus.Fatalf(\"error listening on debug interface: %v\", err)\n\t}\n}", "title": "" }, { "docid": "9a2c6dc6d5a468efe78753783d0c42f1", "score": "0.5221299", "text": "func New() *Mux {\n\tm := &Mux{Layer: plugin.New()}\n\tm.Middleware = middleware.New()\n\thandler := m.Handler()\n\tm.DefaultHandler = handler\n\treturn m\n}", "title": "" }, { "docid": "c7bb3f8f3d6b03b16657d8525ada49ba", "score": "0.5216583", "text": "func NewServeMux() ServeMux {\n\treturn ServeMux{make(map[string]HandleFunc)}\n}", "title": "" }, { "docid": "a91825a398467640e724821ba5611289", "score": "0.52140075", "text": "func NewMux() *Mux {\n\treturn &Mux{table: newCommandTable(5)}\n}", "title": "" }, { "docid": "83498b41b5cca0e23f8d896f35afadcf", "score": "0.5208309", "text": "func New(prefix string) (*Server, *mux.Router) {\n\tm := mux.NewRouter()\n\trmw := recovery.New(prefix)\n\tlmw := httplog.New(prefix, \"/\")\n\tm.Use(rmw.MWFunc, lmw.MWFunc)\n\n\tport := \"8080\"\n\tif p, ok := os.LookupEnv(\"PORT\"); ok {\n\t\tport = p\n\t}\n\n\tsrv := &Server{m: m, Server: &http.Server{\n\t\tAddr: fmt.Sprintf(\":%s\", port),\n\t\tHandler: m,\n\t\tReadTimeout: 5 * time.Second,\n\t\tWriteTimeout: 10 * time.Second,\n\t}}\n\treturn srv, srv.m\n}", "title": "" }, { "docid": "db829abca632313e53d7878468046fb3", "score": "0.5206918", "text": "func DebugRoute(r *mux.Router) {\n\tdr := r.PathPrefix(\"/debug/pprof\").Subrouter().StrictSlash(true)\n\tdr.HandleFunc(\"/\", pprof.Index)\n\tdr.HandleFunc(\"/allocs\", pprof.Index)\n\tdr.HandleFunc(\"/block\", pprof.Index)\n\tdr.HandleFunc(\"/cmdline\", pprof.Cmdline)\n\tdr.HandleFunc(\"/goroutine\", pprof.Index)\n\tdr.HandleFunc(\"/heap\", pprof.Index)\n\tdr.HandleFunc(\"/mutex\", pprof.Index)\n\tdr.HandleFunc(\"/profile\", pprof.Profile)\n\tdr.HandleFunc(\"/symbol\", pprof.Symbol)\n\tdr.HandleFunc(\"/threadcreate\", pprof.Index)\n\tdr.HandleFunc(\"/trace\", pprof.Trace)\n}", "title": "" }, { "docid": "2db215aa1cf44ed33258323466383e1e", "score": "0.52044004", "text": "func newRootRouter(logger *log.Logger) *chi.Mux {\n\troot := chi.NewRouter()\n\troot.Use(middleware.RequestLogger(&middleware.DefaultLogFormatter{Logger: logger, NoColor: false}))\n\troot.Use(middleware.Recoverer)\n\troot.Use(middleware.RealIP)\n\troot.Use(middleware.StripSlashes)\n\treturn root\n}", "title": "" }, { "docid": "31a996d49674ad8f67b0aa7ab70435d8", "score": "0.5199924", "text": "func (app App) NewMux() *goji.Mux {\n\tmux := goji.SubMux()\n\n\tmux.Handle(pat.New(\"/action\"), app.action())\n\tmux.Handle(pat.New(\"/command\"), app.command())\n\n\tmux.Use(support.Logging)\n\treturn mux\n}", "title": "" }, { "docid": "da8831634b3e72d76451be3be2efd7e1", "score": "0.5192755", "text": "func NewMux() *Mux {\n\tmux := &Mux{tree: &node{}, pool: &sync.Pool{}}\n\tmux.pool.New = func() interface{} {\n\t\treturn NewRouteContext()\n\t}\n\treturn mux\n}", "title": "" }, { "docid": "9fdeeefabc02bfb5c9962d7df2dce0db", "score": "0.5191652", "text": "func NewMux() *mux.Router {\n\treturn mux.NewRouter()\n}", "title": "" }, { "docid": "a67d3d1d22810e57d2bcaafc19f9e7bb", "score": "0.51893324", "text": "func NewRouter() *mux.Router {\n\trouter := mux.NewRouter().StrictSlash(true)\n\trouter.HandleFunc(\"/ping\", controller.PingHandler)\n\trouter.HandleFunc(\"/test/post\", controller.TestPostHandler).Methods(\"POST\")\n\trouter.HandleFunc(\"/test/upload\", controller.TestUploadImgur).Methods(\"GET\")\n\trouter.HandleFunc(\"/images/upload\", controller.UploadImageHandler).Methods(\"POST\")\n\trouter.HandleFunc(\"/posts\", controller.InsertPostHandler).Methods(\"POST\")\n\trouter.HandleFunc(\"/posts\", controller.GetPostsHandler).Methods(\"GET\")\n\trouter.HandleFunc(\"/posts/{id:[0-9]+}\", controller.GetPostByIdHandler).Methods(\"GET\")\n\trouter.HandleFunc(\"/posts/{id:[0-9]+}/images\", controller.GetAllImagesFromPostHanlder).Methods(\"GET\")\n\trouter.HandleFunc(\"/posts/{id:[0-9]+}/images\", controller.InsertProjectPostImageHandler).Methods(\"POST\")\n\trouter.HandleFunc(\"/images/{imageId:[0-9]+}\", controller.GetImageFromPostHanlder).Methods(\"GET\")\n\trouter.HandleFunc(\"/images/{imageId:[0-9]+}\", controller.DeleteProjectPostImageHandler).Methods(\"DELETE\")\n\trouter.HandleFunc(\"/images/{imageId:[0-9]+}\", controller.PutProjectPostImageHandler).Methods(\"PUT\")\n\trouter.HandleFunc(\"/posts/{id:[0-9]+}\", controller.PutPostHandler).Methods(\"PUT\")\n\trouter.HandleFunc(\"/posts/{id:[0-9]+}\", controller.DeletePostHandler).Methods(\"DELETE\")\n\trouter.HandleFunc(\"/sections\", controller.GetSectionsHandler).Methods(\"GET\")\n\trouter.HandleFunc(\"/test/panic\", controller.PanicHandler).Methods(\"GET\")\n\trouter.Use(middleware.RecoveryHandler)\n\treturn router\n}", "title": "" }, { "docid": "ce14f4022127fab0390fc68caa1d555b", "score": "0.51869136", "text": "func (c *Netctrler) runDebugRESTServer(restURL string) error {\n\t// start a debug http server\n\trouter := mux.NewRouter()\n\trouter.Methods(\"GET\").Subrouter().Handle(\"/debug/vars\", expvar.Handler())\n\trouter.Methods(\"GET\").Subrouter().Handle(\"/nimbus/db/\", http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tjData, err := c.mserver.DumpDatabase()\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error dumping nimbus server database. Err: %v\", err)\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Write(jData)\n\t}))\n\trouter.Methods(\"GET\").Subrouter().Handle(\"/ctkit/db/{kind}/\", http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tvars := mux.Vars(r)\n\t\tkind, ok := vars[\"kind\"]\n\t\tif !ok {\n\t\t\thttp.Error(w, fmt.Sprintf(\"kind not specified\"), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tobjlist := c.StateMgr.ListObjects(kind)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusOK)\n\t\tjson.NewEncoder(w).Encode(objlist)\n\t}))\n\n\t// pprof\n\trouter.Methods(\"GET\").Subrouter().Handle(\"/debug/pprof/\", http.HandlerFunc(pprof.Index))\n\trouter.Methods(\"GET\").Subrouter().Handle(\"/debug/pprof/goroutine\", pprof.Handler(\"goroutine\"))\n\n\t// start the server\n\tgo http.ListenAndServe(restURL, router)\n\n\treturn nil\n}", "title": "" }, { "docid": "6306ea59c0600f9cd370ce8675891111", "score": "0.5173494", "text": "func (s *DNSServer) createMux(proto dnsProtocol) *dns.ServeMux {\n\tfailFallback := func(w dns.ResponseWriter, r *dns.Msg) {\n\t\tw.WriteMsg(makeDNSFailResponse(r))\n\t}\n\tnotUsHandler := s.notUsHandler(proto)\n\tnotUsFallback := func(w dns.ResponseWriter, r *dns.Msg) {\n\t\tLog.Infof(\"[dns msgid %d] -> sending to fallback server\", r.MsgHdr.Id)\n\t\tnotUsHandler(w, r)\n\t}\n\n\t// create the multiplexer\n\tm := dns.NewServeMux()\n\tm.HandleFunc(s.Zone.Domain(), s.localHandler(proto, \"Query\", dns.TypeA,\n\t\ts.Zone.DomainLookupName, makeAddressReply, s.Zone.ObserveName, failFallback))\n\tm.HandleFunc(RDNSDomain, s.localHandler(proto, \"Reverse query\", dns.TypePTR,\n\t\ts.Zone.DomainLookupInaddr, makePTRReply, s.Zone.ObserveInaddr, notUsFallback))\n\tm.HandleFunc(\".\", s.notUsHandler(proto))\n\treturn m\n}", "title": "" }, { "docid": "f273c0c379eb46a3f616f1c16b288834", "score": "0.5160422", "text": "func createRouter() *mux.Router {\n\t// Create a new router instance\n\trouter := mux.NewRouter()\n\n\t// List of routes\n\trouteMap := map[string]map[string]HttpApiFunc{\n\t\t\"GET\": {\n\t\t\t\"/node\": httpGetNodeInfo,\n\t\t\t\"/alta\": httpGetAltaList,\n\t\t\t\"/alta/{altaId}\": httpGetAltaInfo,\n\t\t},\n\t\t\"POST\": {\n\t\t\t\"/node/register\": httpPostNodeRegister,\n\t\t\t\"/image/ispresent\": httpPostIsImagePresent,\n\t\t\t\"/image/pull\": httpPostImagePull,\n\t\t\t\"/alta/create\": httpPostAltaCreate,\n\t\t\t\"/alta/{cntId}/update\": httpPostAltaUpdate,\n\t\t\t\"/alta/{altaId}/start\": httpPostAltaStart,\n\t\t\t\"/alta/{altaId}/stop\": httpPostAltaStop,\n\t\t\t\"/network/create\": httpPostNetworkCreate,\n\t\t\t\"/peer/{peerAddr}\": httpPostPeerAdd,\n\t\t\t\"/volume/create\": httpPostVolumeCreate,\n\t\t\t\"/volume/mount\": httpPostVolumeMount,\n\t\t\t\"/volume/unmount\": httpPostVolumeUnmount,\n\t\t},\n\t\t\"DELETE\": {\n\t\t\t\"/alta/{altaId}\": httpRemoveAlta,\n\t\t\t\"/images/{altaId}\": httpRemoveImage,\n\t\t\t\"/network/{networkName}\": httpRemoveNetwork,\n\t\t\t\"/peer/{peerAddr}\": httpRemovePeer,\n\t\t},\n\t}\n\n\t// Register each method/path\n\tfor method, routes := range routeMap {\n\t\tfor route, funct := range routes {\n\t\t\tlog.Infof(\"Registering %s %s\", method, route)\n\n\t\t\t// NOTE: scope issue, make sure the variables are local and won't be changed\n\t\t\tlocalRoute := route\n\t\t\tlocalFunct := funct\n\t\t\tlocalMethod := method\n\n\t\t\t// Create a closure for the handlers\n\t\t\tf := makeHttpHandler(localMethod, localRoute, localFunct)\n\n\t\t\t// Register the handler\n\t\t\trouter.Path(localRoute).Methods(localMethod).HandlerFunc(f)\n\t\t}\n\t}\n\n\treturn router\n}", "title": "" }, { "docid": "1611c4b1ed7234bb0895596d0205637b", "score": "0.5158379", "text": "func Serve(addr string, debug bool) (err error) {\n\trouter := Routes()\n\n\t// Walk and printout all routes\n\twalkFunc := func(method, route string, handler http.Handler, middlewares ...func(http.Handler) http.Handler) error {\n\t\tlog.Printf(\"%s %s\\n\", method, route)\n\t\treturn nil\n\t}\n\n\tif err := chi.Walk(router, walkFunc); err != nil {\n\t\treturn err\n\t}\n\n\treturn http.ListenAndServe(addr, router)\n}", "title": "" }, { "docid": "893dbcc0457b5c34891c6ebeafb2f4e5", "score": "0.5155213", "text": "func initServer() *http.Server {\n\tr := mux.NewRouter()\n\n\tr.HandleFunc(*trackingURLPath, serveImage)\n\tr.HandleFunc(*stateURLPath, serveState)\n\tr.Handle(*metricsURLPath, promhttp.Handler())\n\n\tif serviceLog, err := os.OpenFile(*serviceLogFilePath, os.O_APPEND|os.O_WRONLY|os.O_CREATE, 0600); err != nil {\n\t\tlog.SetOutput(os.Stderr)\n\t} else {\n\t\tlog.SetOutput(serviceLog)\n\t}\n\n\taccessLog, err := os.OpenFile(*accessLogFilePath, os.O_APPEND|os.O_WRONLY|os.O_CREATE, 0600)\n\tif err != nil {\n\t\taccessLog = os.Stdout\n\t}\n\n\treturn &http.Server{\n\t\tAddr: *listenAddress,\n\t\tHandler: handlers.CombinedLoggingHandler(accessLog, r)}\n}", "title": "" } ]
433aefab9fb093b5d6e5e5b7e3207340
Close terminates the iteration process, releasing any pending underlying resources.
[ { "docid": "93a1e3940fc88fbaf0dd8d8bf48a9bc5", "score": "0.0", "text": "func (it *TellorTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" } ]
[ { "docid": "3665b5b3d65486d645a62a1d33abe088", "score": "0.76501197", "text": "func (it *CalculationProcTerminatedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "1357b36f5460502e746056f2864698bf", "score": "0.75216806", "text": "func (it *CalculationProcPunishedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "858456f059f0371d625636a36870f884", "score": "0.7403747", "text": "func (it *L2StandardBridgeERC20BridgeFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "90968b9a4c803b33a685512689e0af76", "score": "0.74022985", "text": "func (it *L1StandardBridgeERC20BridgeFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "a29fe8d8068ddd87075541405ef9431d", "score": "0.7387866", "text": "func (it *BaasPPFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "ba6a1accb23815fea80d98cbcd37c005", "score": "0.7372434", "text": "func (it *ErdstallExitingIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "4cb928c25b6c2d2c2d15274f82e734d0", "score": "0.73657143", "text": "func (iter *iterator) Close() {}", "title": "" }, { "docid": "2c1e38a11825284654273e5029822576", "score": "0.72645634", "text": "func (it *ConvictionBetaProposalExecutedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "d6094bdd06d91fb9783ccf667e785951", "score": "0.72463155", "text": "func (it *CalculationProcCommittedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "f52c648e252b7421990a995071fb5d18", "score": "0.72302717", "text": "func (iter *MultiObjectIter) Close() {\n\tfor _, i := range iter.iters {\n\t\ti.Close()\n\t}\n}", "title": "" }, { "docid": "c63e4f0f9677c66e079982fdcd63b190", "score": "0.7226717", "text": "func (it *AccessControlledAggregatorNewRoundIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "bbaefc05f6ad448a1e84750a2b31dfc7", "score": "0.7224501", "text": "func (iter *MultiEncodedObjectIter) Close() {\n\tfor _, i := range iter.iters {\n\t\ti.Close()\n\t}\n}", "title": "" }, { "docid": "973056a9185415acce81e907efa432bb", "score": "0.7216306", "text": "func (it *ExecutionChallengeChallengerTimedOutIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "3c41a678471e261373f596b5ad885682", "score": "0.72053283", "text": "func (it *ComtrollerMarketExitedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "dc949b9d00678d0d9a819c54af96d74d", "score": "0.7201061", "text": "func (it *L2OutputOracleOutputProposedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "b99644ff35d2162adeb2700903aee18b", "score": "0.7186994", "text": "func (it *ExecutionChallengeContinuedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "6d7aafe2f251ffd12e17e359fda1d796", "score": "0.7184015", "text": "func (it *DFedPairMortgageIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "bb6fbbdd56e8389550eec7f07951f705", "score": "0.71821415", "text": "func (it *L2StandardBridgeETHBridgeFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "88dd015fe754c61346935736267e3c53", "score": "0.7180817", "text": "func (it *L2StandardBridgeDepositFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "a695d20d8e544963c2359bce39dc1db4", "score": "0.71778834", "text": "func (it *HoQuBountyPauseIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "a69a9205687eb287980f06adfd12bd80", "score": "0.7176927", "text": "func (it *EscrowFinishedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "0d38250fe1c04e9e63aa650993d83b09", "score": "0.7161375", "text": "func (it *L1StandardBridgeETHBridgeFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "dbcb6c12e2ec35f1f8a6b03f02f37cff", "score": "0.7138356", "text": "func (it *AggregatorV2V3InterfaceNewRoundIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "5fdc8512b5d07bb4c07653088e6cf381", "score": "0.71339595", "text": "func (it *TBTCSystemExitedCourtesyCallIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "5cfce505c45d557a51c527efb26ee107", "score": "0.7127224", "text": "func (it *PoSLOnReinvestmentIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "71e7e77f7b94545f8d902805e19830ee", "score": "0.7124515", "text": "func (it *HoQuBountyUnpauseIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "1a0e37bf8de6e68e6c632af95241b498", "score": "0.7118491", "text": "func (it *PairBurnIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "750fa1d25f47e36548053ac3058f285c", "score": "0.7114435", "text": "func (it *ExecutionChallengeAsserterTimedOutIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "be9c5e79655bc5e20a0460c40d14d5c3", "score": "0.71082264", "text": "func (it *ArbRollupRollupPrunedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "61d1dad75f2d70ed71f2b70be077c83e", "score": "0.7106413", "text": "func (it *ComtrollerNewLiquidationIncentiveIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "28715a70b389e544e5a86d6f48ab56b3", "score": "0.71055025", "text": "func (it *ConvictionBetaScriptResultIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "48521178570746771ed1f90da43829e2", "score": "0.7095243", "text": "func (it *AggregatorInterfaceNewRoundIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "0ef08c99eedd7aee06255dfeedd3205a", "score": "0.70920634", "text": "func (it *EscrowTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "7d41c0d2c4caf1deb8bf288cb96aaf7e", "score": "0.7084615", "text": "func (it *EsdAdvanceIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "5eb13d15db470791674561cab8904a52", "score": "0.707683", "text": "func (it *DFedPairRepayIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "f3b8c7d6557ffcd198756ef3a4730364", "score": "0.70742214", "text": "func (it *MultiGomokuIntendSettleIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "8918c281e146f27f899fda3088f92d19", "score": "0.7065954", "text": "func (it *DFedPairBurnIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "16ea83e9526d206385af099a1dfe6d87", "score": "0.7059707", "text": "func (it *EscrowCreatedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "629e8b9536459740573fc56e8ad8f677", "score": "0.7054594", "text": "func (it *PoSLTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "3998ef73127d26ba33b74ddf0432541b", "score": "0.70482755", "text": "func (it *EscrowRevocationIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "0d49ba0e447c99a79a0ad1f1aa91324d", "score": "0.7048085", "text": "func (it *BallotContractFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "eb0647e33dcf16b4a754a25497cd8d68", "score": "0.7042894", "text": "func (it *DFedPairMintIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "11481324fd698a052a6db156be401d04", "score": "0.704112", "text": "func (it *L2StandardBridgeERC20BridgeInitiatedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "4bb367af7d5ed05535590393cc2aab15", "score": "0.703674", "text": "func (it *ErdstallChallengedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "421456fbd1c2fe07f3339194fc36e0bd", "score": "0.7034811", "text": "func (i *Iterator) Close() error {\n\ti.iterator.Close()\n\treturn nil\n}", "title": "" }, { "docid": "5e29f494c769c145668fa953f880238e", "score": "0.7034457", "text": "func (it *L1StandardBridgeERC20BridgeInitiatedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "c67384b59784260b976fd11594fd4dbd", "score": "0.7030336", "text": "func (it *TBTCSystemFundedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "6c9b0bdd23ac89c976dfc09291bb6c7f", "score": "0.70246565", "text": "func (it *TBTCSystemLiquidatedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "c62e3d139fd32927c3233f7fcae0fd52", "score": "0.70227975", "text": "func (it *NodeGraphRollupPrunedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "7bac1b10ab406ab1b9173086d93ca1ad", "score": "0.702239", "text": "func (it *ITellorNewDisputeIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "20772307b82dd2e31d10fc0896f9f833", "score": "0.70218986", "text": "func (it *DistributionDistributionStartedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "fe35174f28c686921f7cab7319975fd2", "score": "0.7018257", "text": "func (it *EsdIncentivizationIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "48ae8d61a44bc6e6b3a7d15c10e7e188", "score": "0.7017699", "text": "func (it *PausableOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "e87a9fe59c753149d0d5ece837fca5f7", "score": "0.7014672", "text": "func (it *ERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "e87a9fe59c753149d0d5ece837fca5f7", "score": "0.7014672", "text": "func (it *ERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "3976ac49dc2476037d961b723d3cc560", "score": "0.70146435", "text": "func (it *ComtrollerNewTreasuryPercentIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "c4682938338022d4c5e41e5e331635d8", "score": "0.701138", "text": "func (it *BatcherMaxDelayUpdatedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "b2511355180814bc4dd5716efc841c02", "score": "0.70112145", "text": "func (it *OracleTransferSuccessfulIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "28f01bc5d02a52acdc1ad535917b1f77", "score": "0.7008226", "text": "func (it *EscrowOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "d49b4e4ca8a562d30f3b32bfb6eb1a5a", "score": "0.700262", "text": "func (it *DestructibleOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "e0ef34e0377d0bf3ddec438f5a0cd366", "score": "0.70003235", "text": "func (it *BEP20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "b528b43bfd9423cd2f5a0b69aef82a96", "score": "0.7000117", "text": "func (i CQLIterator) Close() error {\n\treturn i.iter.Close()\n}", "title": "" }, { "docid": "81955ca51b093a336d64611b98c7acd0", "score": "0.6997869", "text": "func (it *VipnodePoolForceSettleIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "3c2a38ba29ced08d2268dcd4036be347", "score": "0.699541", "text": "func (it *PairbindingsBurnIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "08eb4eb4ca10d4b24732737ed9294488", "score": "0.69919276", "text": "func (it *PairMintIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "6d6e8dd2aa5b4b048b8e957cc701f37b", "score": "0.69915116", "text": "func (it *ITellorTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "ddd6256ceecea7428e9842d7f959d813", "score": "0.6990605", "text": "func (it *PausableUnpauseIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "74b1b5d54706ca70a452a7bc04d75677", "score": "0.6990086", "text": "func (it *GeneratedExecutedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "fc0220d5ea5990604e4578be1bd08e3d", "score": "0.69900084", "text": "func (it *EsdUnbondIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "a1896f97b8d8b5d7ad7b34bbdb5855f5", "score": "0.6987261", "text": "func (it *DistributionScriptResultIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "cef507b30d547b9a16151942198f7312", "score": "0.6985857", "text": "func (it *AccessControlledAggregatorRoundDetailsUpdatedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "61e467535cfbc68e2f0b334fab68fb34", "score": "0.6984553", "text": "func (it *OffchainAggregatorNewRoundIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "ede89ec1c2179ccf65c0f284a4c0ed8c", "score": "0.6978129", "text": "func (it *FoundationLogVoteNomineeIterator) Close() error {\r\n\tit.sub.Unsubscribe()\r\n\treturn nil\r\n}", "title": "" }, { "docid": "ea803d50bd30d01ee7a5c14155e04555", "score": "0.6973591", "text": "func (it *DosstakingUnbondIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "b86787be81baa62888fac37fb56e191a", "score": "0.6962176", "text": "func (it *TBTCSystemStartedLiquidationIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "9154de0209269fa834ee3a2a574b0d6d", "score": "0.69619375", "text": "func (iter *FileSystemIterator) Close() {\n\treturn\n}", "title": "" }, { "docid": "e354d41ec04dcf2b0b304b8059d3e3bf", "score": "0.69611967", "text": "func (it *L1StandardBridgeERC20WithdrawalFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "1f28b14ea35cfb911bf5a2f9af3f57f8", "score": "0.6954827", "text": "func (it *PairbindingsMintIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "f6886c7f341648fa0b382deacdf192fb", "score": "0.694512", "text": "func (it *L1StandardBridgeETHWithdrawalFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "ac2d28a648ca39ca1483f669fc7ad343", "score": "0.69441944", "text": "func (it *ITellorVotedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "d9edc9ffd9b78432c0823360d4c34ee7", "score": "0.6942469", "text": "func (it *IBEP20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "5d91257f2a6553b2b8b81271424bbe73", "score": "0.6938153", "text": "func (it *ContractsPostCreatedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "fe4ee74e8c99fc545cb248d3335644df", "score": "0.6937858", "text": "func (it *PausablePauseIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "2102cd9f64bae6a4db4e015612f0d770", "score": "0.6932277", "text": "func (it *ERC20BasicTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "fef4246f63b56cb28630ed3c33810799", "score": "0.69320107", "text": "func (it *ExecutionChallengeOneStepProofCompletedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "056f4841c24e7fbca7223a7b537166c9", "score": "0.6931911", "text": "func (it *DFedERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "c344534bf7c9cda29930b70453a87e35", "score": "0.69303375", "text": "func (it *TBTCSystemCourtesyCalledIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "3f470bdaa126058305e0ec0281cd8650", "score": "0.69279605", "text": "func (it *ITellorOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "c679579eb0ddc268c934565070c263d9", "score": "0.69279456", "text": "func (it *TellorStakeNewDisputeIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "ccfbf2f99994698c600a95884e591c21", "score": "0.69253784", "text": "func (it *GeneratedOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "eefaf658a28c3083bef8c74a6b7a7e68", "score": "0.69235605", "text": "func (it *OffchainAggregatorRoundRequestedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "780d35a1743335571d12f5b33518eb9b", "score": "0.6918052", "text": "func (it *PriceFeedNewRoundIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "2d5817690d7a71d212bcbba887220a85", "score": "0.6916642", "text": "func (it *BEP20OwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "7254e7f1838bbb215bf9e76eb34a560d", "score": "0.6916371", "text": "func (it *TellorNewDisputeIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "265f7ccf76412a4c14267873ba747afa", "score": "0.6916029", "text": "func (it *SimpleAirdropAirdropProcessedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "23c51c14d4773ac0491dfd3b96a0f9da", "score": "0.6912095", "text": "func (it *MasterChefOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "306db9ff9219e44cb940e4928f7bd136", "score": "0.69104487", "text": "func (it *DFedPairTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "a8a6a583f0657d4620996aebd55c6499", "score": "0.69090766", "text": "func (it *ExecutionChallengeInitiatedChallengeIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "89789c2eec17424fd5a2dd88b92df3b5", "score": "0.69082355", "text": "func (it *FoundationLogNewCouncilIterator) Close() error {\r\n\tit.sub.Unsubscribe()\r\n\treturn nil\r\n}", "title": "" }, { "docid": "3b1f5c7b9026b427ad94502f4dfd2079", "score": "0.6908113", "text": "func (iter *LCPIterator) Close() error { return iter.impl.Close() }", "title": "" }, { "docid": "ef191e7cef16dc913ef267189ab3d832", "score": "0.6907817", "text": "func (it *IERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" } ]
a45564ad4e50275ccd77544757124a34
DeployAddress deploys a new Ethereum contract, binding an instance of Address to it.
[ { "docid": "5ad2fdd9814cc61ec7fbb3c284ace735", "score": "0.8113195", "text": "func DeployAddress(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Address, error) {\n\tparsed, err := abi.JSON(strings.NewReader(AddressABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(AddressBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Address{AddressCaller: AddressCaller{contract: contract}, AddressTransactor: AddressTransactor{contract: contract}, AddressFilterer: AddressFilterer{contract: contract}}, nil\n}", "title": "" } ]
[ { "docid": "bf3435211e00bf2a1ba825ad498b3ece", "score": "0.7267855", "text": "func (d *Deploy) Deploy(contractAbi, contractBin, name, symbol string, decimals uint8, authors []common.Address, req, batchSize, blockRange, minBalance *big.Int) (*common.Address, error) {\n\tparsed, err := abi.JSON(strings.NewReader(contractAbi))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdataInputs := make([]interface{}, 0, len(parsed.Constructor.Inputs))\n\n\tif cap(dataInputs) == 8 {\n\t\tdataInputs = append(dataInputs, req)\n\t\tdataInputs = append(dataInputs, authors)\n\t\tdataInputs = append(dataInputs, name)\n\t\tdataInputs = append(dataInputs, symbol)\n\t\tdataInputs = append(dataInputs, decimals)\n\t\tdataInputs = append(dataInputs, batchSize)\n\t\tdataInputs = append(dataInputs, blockRange)\n\t\tdataInputs = append(dataInputs, big.NewInt(0).Mul(minBalance, big.NewInt(1000000000000000000)))\n\t} else {\n\t\tfor _, i := range parsed.Constructor.Inputs {\n\t\t\tt := reflect.Zero(i.Type.TupleType)\n\t\t\tv := t.Interface()\n\t\t\tif t.Kind() == reflect.Ptr && t.IsNil() {\n\t\t\t\telem := reflect.TypeOf(v).Elem()\n\t\t\t\tv2 := reflect.New(elem)\n\t\t\t\tv = v2.Interface()\n\t\t\t}\n\t\t\tdataInputs = append(dataInputs, v)\n\t\t}\n\t}\n\n\td.auth.GasPrice = big.NewInt(5)\n\td.auth.GasLimit = 210000\n\n\taddress, _, _, err := bind.DeployContract(d.auth, parsed, common.FromHex(contractBin), d.con, dataInputs...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &address, nil\n}", "title": "" }, { "docid": "6733d09726de574f1df77c665038c31a", "score": "0.64445686", "text": "func DeployEthereumBank(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *EthereumBank, error) {\n\tparsed, err := abi.JSON(strings.NewReader(EthereumBankABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(EthereumBankBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &EthereumBank{EthereumBankCaller: EthereumBankCaller{contract: contract}, EthereumBankTransactor: EthereumBankTransactor{contract: contract}, EthereumBankFilterer: EthereumBankFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "ea29e4537c47593fa07ff4b22a4f2f1b", "score": "0.6429787", "text": "func (wallet *EthereumWallet) CreateAddress() (common.Address, error) {\n\tfromAddress := wallet.account.Address()\n\tnonce, err := wallet.client.PendingNonceAt(context.Background(), fromAddress)\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t}\n\taddr := crypto.CreateAddress(fromAddress, nonce)\n\treturn addr, err\n}", "title": "" }, { "docid": "95da672b0e6d1e0ebdf9d0bbc21645ce", "score": "0.6366205", "text": "func NewDeploymentAddress(senderAddress Address, senderNonce uint64) Address {\n\tsenderBytes, _ := rlp.EncodeToBytes([]interface{}{senderAddress, senderNonce})\n\tres := blake2b.Sum256(senderBytes)\n\taddress := AddressFromPubKey(res[:])\n\treturn address\n}", "title": "" }, { "docid": "7df67ed5f8ad19679b6acb44b2cf8640", "score": "0.6365222", "text": "func (_Manager *ManagerTransactor) SubmitAddress(opts *bind.TransactOpts, _addr common.Address) (*types.Transaction, error) {\n\treturn _Manager.contract.Transact(opts, \"submitAddress\", _addr)\n}", "title": "" }, { "docid": "f5c53c549c7f861c9a718d632e9c3018", "score": "0.5984527", "text": "func bindAddress(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor, filterer bind.ContractFilterer) (*bind.BoundContract, error) {\n\tparsed, err := abi.JSON(strings.NewReader(AddressABI))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, parsed, caller, transactor, filterer), nil\n}", "title": "" }, { "docid": "f5c53c549c7f861c9a718d632e9c3018", "score": "0.5984527", "text": "func bindAddress(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor, filterer bind.ContractFilterer) (*bind.BoundContract, error) {\n\tparsed, err := abi.JSON(strings.NewReader(AddressABI))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, parsed, caller, transactor, filterer), nil\n}", "title": "" }, { "docid": "77e4d8b77db168475c2b5128fc1885ab", "score": "0.59516954", "text": "func (ch *Chain) DeployContract(sigScheme signaturescheme.SignatureScheme, name string, programHash hashing.HashValue, params ...interface{}) error {\n\tpar := []interface{}{root.ParamProgramHash, programHash, root.ParamName, name}\n\tpar = append(par, params...)\n\treq := NewCallParams(root.Interface.Name, root.FuncDeployContract, par...)\n\t_, err := ch.PostRequest(req, sigScheme)\n\treturn err\n}", "title": "" }, { "docid": "ec80d1422386c8a728b2c32fd08dadb5", "score": "0.5786535", "text": "func (_NodeIngress *NodeIngressTransactor) SetContractAddress(opts *bind.TransactOpts, name [32]byte, addr common.Address) (*types.Transaction, error) {\n\treturn _NodeIngress.contract.Transact(opts, \"setContractAddress\", name, addr)\n}", "title": "" }, { "docid": "48ead2817a3238f3b0efa4407f639c39", "score": "0.57765985", "text": "func (_Ingress *IngressTransactor) SetContractAddress(opts *bind.TransactOpts, name [32]byte, addr common.Address) (*types.Transaction, error) {\n\treturn _Ingress.contract.Transact(opts, \"setContractAddress\", name, addr)\n}", "title": "" }, { "docid": "1ca8fafa3a6cc88ce6a2a38d9371de10", "score": "0.57758045", "text": "func TestFEVMTestDeployOnTransfer(t *testing.T) {\n\tctx, cancel, client := kit.SetupFEVMTest(t)\n\tdefer cancel()\n\n\tfromAddr := client.DefaultKey.Address\n\tt.Log(\"from - \", fromAddr)\n\n\t//create contract A\n\tfilenameStorage := \"contracts/ValueSender.hex\"\n\tfromAddr, contractAddr := client.EVM().DeployContractFromFilename(ctx, filenameStorage)\n\n\t//send to some random address.\n\tparams := [32]byte{}\n\tparams[30] = 0xff\n\trandomAddr, err := ethtypes.CastEthAddress(params[12:])\n\tvalue := big.NewInt(100)\n\tentryPoint := kit.CalcFuncSignature(\"sendEthToB(address)\")\n\trequire.NoError(t, err)\n\tret, err := client.EVM().InvokeSolidityWithValue(ctx, fromAddr, contractAddr, entryPoint, params[:], value)\n\trequire.NoError(t, err)\n\trequire.True(t, ret.Receipt.ExitCode.IsSuccess())\n\n\tbalance, err := client.EVM().EthGetBalance(ctx, randomAddr, ethtypes.NewEthBlockNumberOrHashFromPredefined(\"latest\"))\n\trequire.NoError(t, err)\n\trequire.Equal(t, value.Int, balance.Int)\n\n\tfilAddr, err := randomAddr.ToFilecoinAddress()\n\trequire.NoError(t, err)\n\tclient.AssertActorType(ctx, filAddr, manifest.PlaceholderKey)\n}", "title": "" }, { "docid": "5c14f7991d310fb8cd7b0bd8215a3abc", "score": "0.5721435", "text": "func (_Manager *ManagerTransactorSession) SubmitAddress(_addr common.Address) (*types.Transaction, error) {\n\treturn _Manager.Contract.SubmitAddress(&_Manager.TransactOpts, _addr)\n}", "title": "" }, { "docid": "cc454b81519a5ccfd57e6327b29da70b", "score": "0.5705232", "text": "func (w *Wallet) NewAddress(account uint32) (btcutil.Address, error) {\n\t// Get next address from wallet.\n\taddrs, err := w.Manager.NextExternalAddresses(account, 1)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Request updates from btcd for new transactions sent to this address.\n\tutilAddrs := make([]btcutil.Address, len(addrs))\n\tfor i, addr := range addrs {\n\t\tutilAddrs[i] = addr.Address()\n\t}\n\tif err := w.chainSvr.NotifyReceived(utilAddrs); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn utilAddrs[0], nil\n}", "title": "" }, { "docid": "05701d767245024c46d1f2f6cddeedea", "score": "0.5701462", "text": "func (d *DetailedTestTokenContract) DeployContract(\n\tauth *bind.TransactOpts,\n\tclient eth_rpc_client.IEthClient,\n) error {\n\taddress, tx, instance, err := DeployDetailedTestToken(\n\t\tauth,\n\t\tclient,\n\t\td.ConstructorArgs.name,\n\t\td.ConstructorArgs.symbol,\n\t\td.ConstructorArgs.amount)\n\tif err != nil {\n\t\treturn err\n\t}\n\td.Address = address\n\td.LastTx = tx\n\td.Instance = instance\n\treturn nil\n}", "title": "" }, { "docid": "615ae3a9e5de18053b06b2caa2b5b309", "score": "0.568632", "text": "func newAddress(r repo.Repo) (address.Address, error) {\n\tbackend, err := wallet.NewDSBackend(r.WalletDatastore())\n\tif err != nil {\n\t\treturn address.Undef, errors.Wrap(err, \"failed to set up wallet backend\")\n\t}\n\n\taddr, err := backend.NewAddress()\n\tif err != nil {\n\t\treturn address.Undef, errors.Wrap(err, \"failed to create address\")\n\t}\n\n\treturn addr, err\n}", "title": "" }, { "docid": "e4fed19aad8b887904cca2ba77cf447e", "score": "0.5685226", "text": "func (_NodeIngress *NodeIngressTransactorSession) SetContractAddress(name [32]byte, addr common.Address) (*types.Transaction, error) {\n\treturn _NodeIngress.Contract.SetContractAddress(&_NodeIngress.TransactOpts, name, addr)\n}", "title": "" }, { "docid": "0350bbd3b0acce75ae9bb28b1afd32d4", "score": "0.567289", "text": "func (p *Base) AddAddress(address, coinType, description string, balance float64) {\n\tif description == PortfolioAddressExchange {\n\t\tp.AddExchangeAddress(address, coinType, balance)\n\t\treturn\n\t}\n\tif !p.AddressExists(address) {\n\t\tp.Addresses = append(\n\t\t\tp.Addresses, Address{Address: address, CoinType: coinType,\n\t\t\t\tBalance: balance, Description: description},\n\t\t)\n\t} else {\n\t\tif balance <= 0 {\n\t\t\tp.RemoveAddress(address, coinType, description)\n\t\t} else {\n\t\t\tp.UpdateAddressBalance(address, balance)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "711e6571ab8b07d62b52556f640e13d7", "score": "0.56550807", "text": "func NewAddress(address common.Address, backend bind.ContractBackend) (*Address, error) {\n\tcontract, err := bindAddress(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Address{AddressCaller: AddressCaller{contract: contract}, AddressTransactor: AddressTransactor{contract: contract}, AddressFilterer: AddressFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "711e6571ab8b07d62b52556f640e13d7", "score": "0.56550807", "text": "func NewAddress(address common.Address, backend bind.ContractBackend) (*Address, error) {\n\tcontract, err := bindAddress(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Address{AddressCaller: AddressCaller{contract: contract}, AddressTransactor: AddressTransactor{contract: contract}, AddressFilterer: AddressFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "414b32e8a991ba92b81a2993a2d4df92", "score": "0.56395394", "text": "func DeployEAS(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *EAS, error) {\n\tparsed, err := EASMetaData.GetAbi()\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\tif parsed == nil {\n\t\treturn common.Address{}, nil, nil, errors.New(\"GetABI returned nil\")\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, *parsed, common.FromHex(EASBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &EAS{EASCaller: EASCaller{contract: contract}, EASTransactor: EASTransactor{contract: contract}, EASFilterer: EASFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "c48499c421ecd36c3ebf3da208ff4eb0", "score": "0.56324744", "text": "func NewAddress(ctx *pulumi.Context,\n\tname string, args *AddressArgs, opts ...pulumi.ResourceOption) (*Address, error) {\n\tif args == nil {\n\t\targs = &AddressArgs{}\n\t}\n\targs.ApiVersion = pulumi.StringPtr(\"enmasse.io/v1beta1\")\n\targs.Kind = pulumi.StringPtr(\"Address\")\n\tvar resource Address\n\terr := ctx.RegisterResource(\"kubernetes:enmasse.io/v1beta1:Address\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "15279a4fb0a564112a3115a36973eaf9", "score": "0.5626896", "text": "func (k Keeper) DeployERC20Contract(ctx sdk.Context, coinMetadata banktypes.Metadata) (common.Address, error) {\n\t// meta, found := k.bankKeeper.GetDenomMetaData(ctx, pair.Denom)\n\t// if !found {\n\t// \t// metadata already exists; exit\n\t// \t// TODO: validate that the fields from the ERC20 match the denom metadata's\n\t// \treturn common.Address{}, sdkerrors.Wrapf(types.ErrInternalTokenPair, \"coin denomination is not registered\")\n\t// }\n\t// k.evmKeeper.SetNonce(types.ModuleAddress, 1)\n\n\tctorArgs, err := contracts.ERC20BurnableAndMintableContract.ABI.Pack(\"\", coinMetadata.Name, coinMetadata.Symbol)\n\tif err != nil {\n\t\treturn common.Address{}, sdkerrors.Wrapf(err, \"coin metadata is invalid %s\", coinMetadata.Name)\n\t}\n\n\tdata := make([]byte, len(contracts.ERC20BurnableAndMintableContract.Bin)+len(ctorArgs))\n\tcopy(data[:len(contracts.ERC20BurnableAndMintableContract.Bin)], contracts.ERC20BurnableAndMintableContract.Bin)\n\tcopy(data[len(contracts.ERC20BurnableAndMintableContract.Bin):], ctorArgs)\n\n\tnonce, err := k.accountKeeper.GetSequence(ctx, types.ModuleAddress.Bytes())\n\tif err != nil {\n\t\treturn common.Address{}, err\n\t}\n\n\tcontractAddr := crypto.CreateAddress(types.ModuleAddress, nonce)\n\t_, err = k.CallEVMWithPayload(ctx, types.ModuleAddress, nil, data)\n\tif err != nil {\n\t\treturn common.Address{}, fmt.Errorf(\"failed to deploy contract for %s\", coinMetadata.Name)\n\t}\n\n\treturn contractAddr, nil\n}", "title": "" }, { "docid": "a8f79dbba30c793caa667d5ecce35db8", "score": "0.56030667", "text": "func (_NodeIngress *NodeIngressSession) SetContractAddress(name [32]byte, addr common.Address) (*types.Transaction, error) {\n\treturn _NodeIngress.Contract.SetContractAddress(&_NodeIngress.TransactOpts, name, addr)\n}", "title": "" }, { "docid": "868d29f99a903dffc5e8cee465282902", "score": "0.5599313", "text": "func Deploy(account *bind.TransactOpts,\n\tserver backend.Backend) (common.Address, *ExampleToken, error) {\n\taddr, tx, contract, err := DeployExampleToken(account,\n\t\tserver.Connect())\n\tif err != nil {\n\t\treturn common.Address{}, nil, err\n\t}\n\n\t_, err = server.Mine(context.Background(), tx)\n\tif err != nil {\n\t\treturn common.Address{}, nil, err\n\t}\n\n\tif !server.GoodTransaction(tx) {\n\t\treturn common.Address{}, nil,\n\t\t\terrors.New(\"failed to deploy Token contract\")\n\t}\n\n\treturn addr, contract, nil\n}", "title": "" }, { "docid": "1307c7077c284093c0e75a0d566b8f8d", "score": "0.55900246", "text": "func (_Ingress *IngressTransactorSession) SetContractAddress(name [32]byte, addr common.Address) (*types.Transaction, error) {\n\treturn _Ingress.Contract.SetContractAddress(&_Ingress.TransactOpts, name, addr)\n}", "title": "" }, { "docid": "436d4afc6f898b9df30ef9edda542456", "score": "0.55807894", "text": "func NewAddress(address string) (*Address, error) {\n\t// Create an empty address\n\taddr := Address{}\n\n\t// Assign the bytes and string value of the address\n\taddr.Bytes = []byte(address)\n\taddr.String = address\n\n\t// Decode the address from base58 to get the full hash\n\tfullhash := utils.Base58Decode(addr.Bytes)\n\t// Calculate the breakpoint between the checksum and extended hash\n\thashlen := len(fullhash) - 4\n\n\t// Isolate the checksum hash from the full hash (after the breakpoint)\n\taddr.Checksum = fullhash[hashlen:]\n\t// Isolate the extended hash from the full hash (before the breakpoint)\n\textendedhash := fullhash[:hashlen]\n\n\t// Assign the prefix from the extended hash (first byte)\n\taddr.Prefix = extendedhash[0]\n\t// Assign the public key hash from the extended hash (remove prefix)\n\taddr.PublicKeyHash = extendedhash[1:]\n\n\t//Check if the address is valid\n\tif !addr.IsValid() {\n\t\t// Return an empty address and an error\n\t\treturn &Address{}, fmt.Errorf(\"invalid address\")\n\t}\n\n\t// Return the address\n\treturn &addr, nil\n}", "title": "" }, { "docid": "f4633b44fecc40e76c9c92df7f24c7cc", "score": "0.556315", "text": "func handleContractDeploy(ctx sdk.Context, keeper Keeper, msg MsgContractDeploy) sdk.Result {\n\t// store code\n\tif msg.Code == nil || msg.CID == nil || msg.Fee.AmountOf(appCoin).Int64() <= 10 {\n\t\treturn sdk.ErrUnknownRequest(\"there is invalid contract or not exist\").Result()\n\t}\n\tkeeper.DeployContract(ctx, msg.CID, msg.Code, msg.CodeHash)\n\treturn sdk.Result{}\n}", "title": "" }, { "docid": "9c38c0dd360976927966220b313337f6", "score": "0.55630285", "text": "func (c *addresses) Create(address *v1beta1.Address) (result *v1beta1.Address, err error) {\n\tresult = &v1beta1.Address{}\n\terr = c.client.Post().\n\t\tNamespace(c.ns).\n\t\tResource(\"addresses\").\n\t\tBody(address).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "title": "" }, { "docid": "1a2a7219c4e26ecada573db1e8f197c0", "score": "0.5554168", "text": "func DeployContract(ctx context.Context, client *ethclient.Client, key *ecdsa.PrivateKey) error {\n\ttx, err := NewFundingTransaction(ctx, client, key)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = client.SendTransaction(ctx, tx)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = waitMinedSuccessful(ctx, client, tx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = client.SendTransaction(ctx, DeploymentTransaction)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = waitMinedSuccessful(ctx, client, DeploymentTransaction)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b1578fd061ca2aad862d610372c0568c", "score": "0.55454993", "text": "func createAddress(res http.ResponseWriter, req *http.Request, _ httprouter.Params) {\n\taddress, err := walletAPI.CreateAddress()\n\tif err != nil {\n\t\twriteJSON(res, 400, jsMap{\"status\": err.Error()})\n\t\treturn\n\t}\n\n\tgo walletAPI.Save()\n\t_, err = walletDB.Exec(`\n\t\tINSERT INTO addresses (address)\n\t\tVALUES ($1);`, address[\"address\"],\n\t)\n\tif err != nil {\n\t\tlog.Println(\"createAddress:\", err)\n\t\twriteJSON(res, 500, jsMap{\"status\": err.Error()})\n\t\treturn\n\t}\n\n\tlog.Println(\"createAddress: new subwallet\", address[\"address\"])\n\twriteJSON(res, 201, jsMap{\n\t\t\"status\": \"OK\",\n\t\t\"data\": address[\"address\"],\n\t})\n}", "title": "" }, { "docid": "7f138dfca8f1ac6c8baada71245e44d1", "score": "0.5542841", "text": "func (o *PostWasmContractsContractAddressParams) SetContractAddress(contractAddress string) {\n\to.ContractAddress = contractAddress\n}", "title": "" }, { "docid": "aa93ae3a136270877aa1adbc3a3cf8b7", "score": "0.5533767", "text": "func DeployEthereumBridge(auth *bind.TransactOpts, backend bind.ContractBackend, _operator common.Address, _valset common.Address) (common.Address, *types.Transaction, *EthereumBridge, error) {\n\tparsed, err := abi.JSON(strings.NewReader(EthereumBridgeABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(EthereumBridgeBin), backend, _operator, _valset)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &EthereumBridge{EthereumBridgeCaller: EthereumBridgeCaller{contract: contract}, EthereumBridgeTransactor: EthereumBridgeTransactor{contract: contract}, EthereumBridgeFilterer: EthereumBridgeFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "6fd1109f03d8f2355cffa0f357381155", "score": "0.5528302", "text": "func (_Manager *ManagerSession) SubmitAddress(_addr common.Address) (*types.Transaction, error) {\n\treturn _Manager.Contract.SubmitAddress(&_Manager.TransactOpts, _addr)\n}", "title": "" }, { "docid": "a87460493323e78bd4e1c82e6c5263a1", "score": "0.5525645", "text": "func DeployECDSA(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *ECDSA, error) {\n\tparsed, err := abi.JSON(strings.NewReader(ECDSAABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(ECDSABin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &ECDSA{ECDSACaller: ECDSACaller{contract: contract}, ECDSATransactor: ECDSATransactor{contract: contract}, ECDSAFilterer: ECDSAFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "55f92a4f1eaf16a19ff8e94f6de24744", "score": "0.5522649", "text": "func (wallet *EthereumWallet) NewAddress(purpose wi.KeyPurpose) btcutil.Address {\n\treturn *wallet.address\n}", "title": "" }, { "docid": "786ffc72dc084e6a9a599ae56161ec24", "score": "0.55224264", "text": "func NewAddress(ctx *pulumi.Context,\n\tname string, args *AddressArgs, opts ...pulumi.ResourceOption) (*Address, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.Region == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Region'\")\n\t}\n\tvar resource Address\n\terr := ctx.RegisterResource(\"google-native:compute/beta:Address\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "f80f6164c27b6fbec5f4b0095bfeea83", "score": "0.5522407", "text": "func (s *CreateWithdrawService) Address(v string) *CreateWithdrawService {\n\ts.address = v\n\treturn s\n}", "title": "" }, { "docid": "343e6d69faee4bc3a12c003081a0b870", "score": "0.5517329", "text": "func (_Accounts *AccountsTransactor) SetWalletAddress(opts *bind.TransactOpts, walletAddress common.Address, v uint8, r [32]byte, s [32]byte) (*types.Transaction, error) {\n\treturn _Accounts.contract.Transact(opts, \"setWalletAddress\", walletAddress, v, r, s)\n}", "title": "" }, { "docid": "f984815f42353ecbbebf0f48eeac184b", "score": "0.55051434", "text": "func deploySmartContract(tokenName string, tokenSymbol string, tokenInitialBalance *big.Int, tokenDevAddress common.Address, setSellPrice *big.Int) (common.Address){\r\n\t\r\n\t/*\r\n\tThis is the private key of the palo's account \r\n\tThe acount used will be the only one to be able to modify the smart contract\r\n\tIn the case of a public blockchain this account will have to pay a few transactions\r\n\t*/\r\n\tkey := `{\"address\":\"4da93b7eece99748afac5fdf3b99138177710ff3\",\"crypto\":{\"cipher\":\"aes-128-ctr\",\"ciphertext\":\"53492bc230964b57761e9aebb288f3e3e0c9311605dc8d74a2417b8d38bda12a\",\"cipherparams\":{\"iv\":\"0fa80fd44a285f6871d1b234c1311ff8\"},\"kdf\":\"scrypt\",\"kdfparams\":{\"dklen\":32,\"n\":262144,\"p\":1,\"r\":8,\"salt\":\"9af823c6e8059c8de80611277125fc050fed31b42686b499df2b44289d3694a9\"},\"mac\":\"6e8451f4fe4054a978444bc551af3826e43716f97ed40718e6bdefb38c61db27\"},\"id\":\"95daa908-efc1-433a-b402-d5e2e0dc4d19\",\"version\":3}`\r\n\r\n\r\n\t//Use the key and my account's password to bind to my account\r\n\tauth, err := bind.NewTransactor(strings.NewReader(key), \"Ornithorynque1\")\r\n\tif err != nil {\r\n\t\tfmt.Printf(\"Cannot bind to account: %v : %v\", err, auth)\r\n\t}\r\n\t//Gas limit. In some case it shall be exactly equal to the gas transaction cost!\r\n\tauth.GasLimit = 3000000\r\n\r\n\t/*\r\n\tLink to the blockchain\r\n\tHere I connect to an existing node on the test plateform infura but once my contract is online \r\n\tI shall put the address of the contract in the ethclient.Dial() function\r\n\t*/\r\n\tblockchain, err := ethclient.Dial(\"https://rinkeby.infura.io/v3/44029fa59f854e649e0a4e9f3691de56\")\r\n\tif err != nil {\r\n\t\tfmt.Printf(\"Cannot bind to blockchain: %v : %v\", err, blockchain)\r\n\r\n\t}\r\n\r\n\r\n\t//Deploy contract\r\n\t//tokenInitialBalance : How much tokens the contract will dispose\r\n\t//tokenDevAddress : The ethereum account in charge of the contract that will be able to modify it (usually the one that is used to deploy) \r\n\taddress, tx, _, err := contracts.DeployPayments(auth, blockchain, tokenName, tokenSymbol, tokenInitialBalance, tokenDevAddress, setSellPrice)\r\n\tif err != nil {\r\n\t\tfmt.Printf(\"Failed to deploy new token contract: %v\", err)\r\n\t}\r\n\r\n\r\n\tif err != nil {\r\n\t\tfmt.Printf(\"Failed to deploy the condo contract: %v\", err)\r\n\t}\r\n\r\n\tif len(address.Bytes()) == 0 {\r\n\t\tfmt.Printf(\"Expected a valid deployment address. Received empty address byte array instead\")\r\n\t}\r\n\r\n\t/*\r\n\tadress = address of the smart contract. example : 0xfb7974b7616a0c0dbd08c7fee7f1291548045e33\r\n\twe need this value for each function call\r\n\thave to copie paste this value in the function :\r\n\tcontract, err := contracts.NewPayments(common.HexToAddress(\"0xfb7974b7616a0c0dbd08c7fee7f1291548045e33\"), blockchain)\r\n\t*/\r\n\tfmt.Printf(\"Contract pending deploy: 0x%x\\n\", address)\r\n\tfmt.Printf(\"Transaction waiting to be mined: 0x%x\\n\\n\", tx.Hash())\r\n\treturn (address)\r\n}", "title": "" }, { "docid": "b15d665855498df7abd9626a7e3415ab", "score": "0.5456364", "text": "func (_Ingress *IngressSession) SetContractAddress(name [32]byte, addr common.Address) (*types.Transaction, error) {\n\treturn _Ingress.Contract.SetContractAddress(&_Ingress.TransactOpts, name, addr)\n}", "title": "" }, { "docid": "64649c41d863d43d18e2ba793b673175", "score": "0.5453788", "text": "func DeployTestERC20(auth *bind.TransactOpts, backend bind.ContractBackend, _initialSupply *big.Int, _name string, _symbol string) (common.Address, *types.Transaction, *TestERC20, error) {\n\tparsed, err := abi.JSON(strings.NewReader(TestERC20ABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(TestERC20Bin), backend, _initialSupply, _name, _symbol)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &TestERC20{TestERC20Caller: TestERC20Caller{contract: contract}, TestERC20Transactor: TestERC20Transactor{contract: contract}, TestERC20Filterer: TestERC20Filterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "ef722f49ab3164d1f729533acb8b8d96", "score": "0.5447269", "text": "func (o *PostWasmContractsContractAddressParams) WithContractAddress(contractAddress string) *PostWasmContractsContractAddressParams {\n\to.SetContractAddress(contractAddress)\n\treturn o\n}", "title": "" }, { "docid": "b5a9514ca712b82ac93f94b36ff18fd0", "score": "0.5440078", "text": "func (s *Store) BindAddress(skyAddr, depositAddr, coinType string) error {\n\tlog := s.log.WithField(\"skyAddr\", skyAddr)\n\tlog = log.WithField(\"depositAddr\", depositAddr)\n\treturn s.db.Update(func(tx *bolt.Tx) error {\n\t\texistingSkyAddr, err := s.getBindAddressTx(tx, depositAddr, coinType)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif existingSkyAddr != \"\" {\n\t\t\terr := ErrAddressAlreadyBound\n\t\t\tlog.WithError(err).Error(\"Attempted to bind an address twice\")\n\t\t\treturn err\n\t\t}\n\n\t\t// update index of skycoin address and the deposit seq\n\t\tvar addrs []string\n\t\tif err := dbutil.GetBucketObject(tx, SkyDepositSeqsIndexBkt, skyAddr, &addrs); err != nil {\n\t\t\tswitch err.(type) {\n\t\t\tcase dbutil.ObjectNotExistErr:\n\t\t\tdefault:\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\taddrs = append(addrs, depositAddr)\n\t\tif err := dbutil.PutBucketValue(tx, SkyDepositSeqsIndexBkt, skyAddr, addrs); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tbindBktFullName := dbutil.ByteJoin(BindAddressBkt, coinType, \"_\")\n\t\treturn dbutil.PutBucketValue(tx, bindBktFullName, depositAddr, skyAddr)\n\t})\n}", "title": "" }, { "docid": "f7d457ba856994a35a0fdc38d241ca4b", "score": "0.54377574", "text": "func DeployRegister_0_0_1(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Register_0_0_1, error) {\n\tparsed, err := abi.JSON(strings.NewReader(Register_0_0_1ABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(Register_0_0_1Bin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Register_0_0_1{Register_0_0_1Caller: Register_0_0_1Caller{contract: contract}, Register_0_0_1Transactor: Register_0_0_1Transactor{contract: contract}}, nil\n}", "title": "" }, { "docid": "b7a335d1d2d31e524947a7f14d980caf", "score": "0.5432253", "text": "func (h *HarnessRPC) NewAddress(\n\treq *lnrpc.NewAddressRequest) *lnrpc.NewAddressResponse {\n\n\tctxt, cancel := context.WithTimeout(h.runCtx, DefaultTimeout)\n\tdefer cancel()\n\n\tresp, err := h.LN.NewAddress(ctxt, req)\n\th.NoError(err, \"NewAddress\")\n\n\treturn resp\n}", "title": "" }, { "docid": "0128f3981c6842c134b6254a477b10eb", "score": "0.5421542", "text": "func (m *mockWalletController) NewAddress(addrType lnwallet.AddressType,\n\tchange bool) (btcutil.Address, error) {\n\taddr, _ := btcutil.NewAddressPubKey(\n\t\tm.rootKey.PubKey().SerializeCompressed(), &chaincfg.MainNetParams)\n\treturn addr, nil\n}", "title": "" }, { "docid": "8cddc1e87bf96fdfcf016b5e3693c4c5", "score": "0.5417944", "text": "func Address(pub []byte) types.Address {\n\tif len(pub) != 32 {\n\t\tpanic(\"public key must be 32 bytes\")\n\t}\n\targs := wallet.SpawnArguments{}\n\tcopy(args.PublicKey[:], pub)\n\treturn core.ComputePrincipal(wallet.TemplateAddress, &args)\n}", "title": "" }, { "docid": "1e7058fc95bbf58355812f60ded785a1", "score": "0.5412625", "text": "func (c *addresses) Create(address *v1.Address) (result *v1.Address, err error) {\n\tresult = &v1.Address{}\n\terr = c.client.Post().\n\t\tNamespace(c.ns).\n\t\tResource(\"addresses\").\n\t\tBody(address).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "title": "" }, { "docid": "6b6b0d8c52d201e49c845d4efae68474", "score": "0.54092723", "text": "func (wallet *EthereumWallet) SweepAddress(utxos []wi.TransactionInput, address *btcutil.Address, key *hd.ExtendedKey, redeemScript *[]byte, feeLevel wi.FeeLevel) (*chainhash.Hash, error) {\n\n\touts := []wi.TransactionOutput{}\n\tfor i, in := range utxos {\n\t\tout := wi.TransactionOutput{\n\t\t\tAddress: wallet.address,\n\t\t\tValue: in.Value,\n\t\t\tIndex: uint32(i),\n\t\t\tOrderID: in.OrderID,\n\t\t}\n\t\touts = append(outs, out)\n\t}\n\n\tsigs, err := wallet.CreateMultisigSignature([]wi.TransactionInput{}, outs, key, *redeemScript, *big.NewInt(1))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdata, err := wallet.Multisign([]wi.TransactionInput{}, outs, sigs, []wi.Signature{}, *redeemScript, *big.NewInt(1), false)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\thash := common.BytesToHash(data)\n\n\treturn util.CreateChainHash(hash.Hex())\n}", "title": "" }, { "docid": "8d1654f60c55ae2099ff89f23d775cbd", "score": "0.5403915", "text": "func DeployOwned(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Owned, error) {\n\tparsed, err := abi.JSON(strings.NewReader(OwnedABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(OwnedBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Owned{OwnedCaller: OwnedCaller{contract: contract}, OwnedTransactor: OwnedTransactor{contract: contract}}, nil\n}", "title": "" }, { "docid": "f9a0b3c56706a9853ad1c90525f412f8", "score": "0.5395383", "text": "func (w *WalletBase) NewAddress() (iwallet.Address, error) {\n\taddr, err := w.Keychain.NewAddress(false)\n\tif err != nil {\n\t\treturn addr, err\n\t}\n\tw.ChainManager.AddAddressSubscription(addr)\n\treturn addr, nil\n}", "title": "" }, { "docid": "8590f8be5d720567209937f060bddbf2", "score": "0.539143", "text": "func (k Keeper) DeployTestMintableERC20Contract(\n\tctx sdk.Context,\n\tname string,\n\tsymbol string,\n\tdecimals uint8,\n) (types.InternalEVMAddress, error) {\n\tctorArgs, err := types.ERC20MintableBurnableContract.ABI.Pack(\n\t\t\"\", // Empty string for contract constructor\n\t\tname,\n\t\tsymbol,\n\t\tdecimals,\n\t)\n\tif err != nil {\n\t\treturn types.InternalEVMAddress{}, errorsmod.Wrapf(err, \"token %v is invalid\", name)\n\t}\n\n\tdata := make([]byte, len(types.ERC20MintableBurnableContract.Bin)+len(ctorArgs))\n\tcopy(\n\t\tdata[:len(types.ERC20MintableBurnableContract.Bin)],\n\t\ttypes.ERC20MintableBurnableContract.Bin,\n\t)\n\tcopy(\n\t\tdata[len(types.ERC20MintableBurnableContract.Bin):],\n\t\tctorArgs,\n\t)\n\n\tnonce, err := k.accountKeeper.GetSequence(ctx, types.ModuleEVMAddress.Bytes())\n\tif err != nil {\n\t\treturn types.InternalEVMAddress{}, err\n\t}\n\n\tcontractAddr := crypto.CreateAddress(types.ModuleEVMAddress, nonce)\n\t_, err = k.CallEVMWithData(ctx, types.ModuleEVMAddress, nil, data)\n\tif err != nil {\n\t\treturn types.InternalEVMAddress{}, fmt.Errorf(\"failed to deploy ERC20 for %s: %w\", name, err)\n\t}\n\n\treturn types.NewInternalEVMAddress(contractAddr), nil\n}", "title": "" }, { "docid": "82323ede8b3f4e54c0e0e637af138e8b", "score": "0.53824544", "text": "func Example_depositAddress() {\n\t// Create the address manager and votingpool DB namespace. See the example\n\t// for the Create() function for more info on how this is done.\n\tteardown, db, mgr := exampleCreateDBAndMgr()\n\tdefer teardown()\n\n\terr := walletdb.Update(db, func(tx walletdb.ReadWriteTx) error {\n\t\tns := votingpoolNamespace(tx)\n\n\t\t// Create the voting pool.\n\t\tpool, err := votingpool.Create(ns, mgr, []byte{0x00})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Create a 2-of-3 series.\n\t\tseriesID := uint32(1)\n\t\trequiredSignatures := uint32(2)\n\t\tpubKeys := []string{\n\t\t\t\"xpub661MyMwAqRbcFDDrR5jY7LqsRioFDwg3cLjc7tML3RRcfYyhXqqgCH5SqMSQdpQ1Xh8EtVwcfm8psD8zXKPcRaCVSY4GCqbb3aMEs27GitE\",\n\t\t\t\"xpub661MyMwAqRbcGsxyD8hTmJFtpmwoZhy4NBBVxzvFU8tDXD2ME49A6JjQCYgbpSUpHGP1q4S2S1Pxv2EqTjwfERS5pc9Q2yeLkPFzSgRpjs9\",\n\t\t\t\"xpub661MyMwAqRbcEbc4uYVXvQQpH9L3YuZLZ1gxCmj59yAhNy33vXxbXadmRpx5YZEupNSqWRrR7PqU6duS2FiVCGEiugBEa5zuEAjsyLJjKCh\",\n\t\t}\n\t\terr = pool.CreateSeries(ns, votingpool.CurrentVersion, seriesID, requiredSignatures, pubKeys)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Create a deposit address.\n\t\taddr, err := pool.DepositScriptAddress(seriesID, votingpool.Branch(0), votingpool.Index(1))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfmt.Println(\"Generated deposit address:\", addr.EncodeAddress())\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\n\t// Output:\n\t// Generated deposit address: pruafy9cc8kmpt86wcewzw6u55ckjrmnhspuk2fxvz\n}", "title": "" }, { "docid": "69f7f5cd72e5282e9f450c24bbdcb790", "score": "0.5381674", "text": "func DeployNetworkContract(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *NetworkContract, error) {\n\tparsed, err := abi.JSON(strings.NewReader(NetworkContractABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(NetworkContractBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &NetworkContract{NetworkContractCaller: NetworkContractCaller{contract: contract}, NetworkContractTransactor: NetworkContractTransactor{contract: contract}}, nil\n}", "title": "" }, { "docid": "f392cbe33ebce2800791df2decdf06ed", "score": "0.5381179", "text": "func (artemis *Artemis) CreateAddress(addressName string, routingType string) (*jolokia.ExecData, error) {\n\n\turl := \"org.apache.activemq.artemis:broker=\\\\\\\"\" + artemis.name + \"\\\\\\\"\"\n\troutingType = strings.ToUpper(routingType)\n\tparameters := `\"` + addressName + `\",\"` + routingType + `\"`\n\tjsonStr := `{ \"type\":\"EXEC\",\"mbean\":\"` + url + `\",\"operation\":\"createAddress(java.lang.String,java.lang.String)\",\"arguments\":[` + parameters + `]` + ` }`\n\tdata, err := artemis.jolokia.Exec(url, jsonStr)\n\n\treturn data, err\n}", "title": "" }, { "docid": "ed0151279ab72e6600d4778865d93d5b", "score": "0.5360348", "text": "func CreateAddress(b []byte, nonce uint64) []byte {\n\treturn Sha3(ethutil.NewValue([]interface{}{b, nonce}).Encode())[12:]\n}", "title": "" }, { "docid": "f8ff8cb25cb5394377c0d93e83beb2bb", "score": "0.5360088", "text": "func NewAddressTransactor(address common.Address, transactor bind.ContractTransactor) (*AddressTransactor, error) {\n\tcontract, err := bindAddress(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &AddressTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "f8ff8cb25cb5394377c0d93e83beb2bb", "score": "0.5360088", "text": "func NewAddressTransactor(address common.Address, transactor bind.ContractTransactor) (*AddressTransactor, error) {\n\tcontract, err := bindAddress(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &AddressTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "6cadd82d743cb25f61f22395e08cfb99", "score": "0.53541404", "text": "func (o *CreateAndSetAddressUsingPOST1Params) SetAddress(address *models.AddressWsDTO) {\n\to.Address = address\n}", "title": "" }, { "docid": "797f56eca64fe6f79984d4dbad59b36c", "score": "0.5339596", "text": "func (c *ChannelsCreateChannelRequest) SetAddress(value string) {\n\tc.Flags.Set(2)\n\tc.Address = value\n}", "title": "" }, { "docid": "3f9ba54f1c5fade0f384a355aa6269a2", "score": "0.53303367", "text": "func NewAddress(host string) *Address {\n\ta := Address(host)\n\treturn &a\n}", "title": "" }, { "docid": "ab6de4b5a256fbadc46358b844e6537b", "score": "0.531362", "text": "func (c *Client) CreateAddress(user api.UserPass) (string, error) {\n\tres := &api.JSONAddress{}\n\terr := c.requester.SendRequest(\"createAddress\", &user, res)\n\treturn res.Address, err\n}", "title": "" }, { "docid": "cc042ad00c348f42dabf9434b01dfa80", "score": "0.5298521", "text": "func MakeAddress(db *pop.Connection, assertions Assertions) models.Address {\n\taddress := models.Address{\n\t\tStreetAddress1: \"123 Any Street\",\n\t\tStreetAddress2: models.StringPointer(\"P.O. Box 12345\"),\n\t\tStreetAddress3: models.StringPointer(\"c/o Some Person\"),\n\t\tCity: \"Beverly Hills\",\n\t\tState: \"CA\",\n\t\tPostalCode: \"90210\",\n\t\tCountry: models.StringPointer(\"US\"),\n\t}\n\n\tmergeModels(&address, assertions.Address)\n\n\tmustCreate(db, &address, assertions.Stub)\n\n\treturn address\n}", "title": "" }, { "docid": "d31452635ca7c09b491853b0a807c86d", "score": "0.5284264", "text": "func (a API) SendToAddress(cmd *btcjson.SendToAddressCmd) (e error) {\n\tRPCHandlers[\"sendtoaddress\"].Call <- API{a.Ch, cmd, nil}\n\treturn\n}", "title": "" }, { "docid": "da53266af648a9ab67583493f7da32c5", "score": "0.5278643", "text": "func (rc *ReceiptCreate) SetAddress(s string) *ReceiptCreate {\n\trc.mutation.SetAddress(s)\n\treturn rc\n}", "title": "" }, { "docid": "960c05928b340de35579667f0cf958fc", "score": "0.527794", "text": "func SendToAddress(w *wallet.Wallet, chainSvr *chain.Client, icmd interface{}) (interface{}, error) {\n\tcmd := icmd.(*btcjson.SendToAddressCmd)\n\n\t// Transaction comments are not yet supported. Error instead of\n\t// pretending to save them.\n\tif cmd.Comment != nil || cmd.CommentTo != nil {\n\t\treturn nil, &btcjson.RPCError{\n\t\t\tCode: btcjson.ErrRPCUnimplemented,\n\t\t\tMessage: \"Transaction comments are not yet supported\",\n\t\t}\n\t}\n\n\tamt, err := btcutil.NewAmount(cmd.Amount)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Check that signed integer parameters are positive.\n\tif amt < 0 {\n\t\treturn nil, ErrNeedPositiveAmount\n\t}\n\n\t// Mock up map of address and amount pairs.\n\tpairs := map[string]btcutil.Amount{\n\t\tcmd.Address: amt,\n\t}\n\n\t// sendtoaddress always spends from the default account, this matches bitcoind\n\treturn sendPairs(w, pairs, waddrmgr.DefaultAccountNum, 1)\n}", "title": "" }, { "docid": "c0d0025299a31e0bd1066b2939013424", "score": "0.52537084", "text": "func (w Wallet) Address() []byte {\n\tpublicKeyHash := PublicKeyHash(w.PublicKey)\n\tversionedHash := append([]byte{version}, publicKeyHash...)\n\tcheckSum := GenerateCheckSum(versionedHash)\n\tfullHash := append(versionedHash, checkSum...)\n\taddress := Base58Encode(fullHash)\n\treturn address\n}", "title": "" }, { "docid": "cbd898f87a18a5c1d972f024973c3270", "score": "0.5252711", "text": "func (o *WalletTransactionCounterparty) SetAddress(v PaymentInitiationAddress) {\n\to.Address.Set(&v)\n}", "title": "" }, { "docid": "a339166de19d1ef17c9f963a9a91447f", "score": "0.5236691", "text": "func NewMsgContractDeploy(from sdk.AccAddress, CID sdk.AccAddress, code []byte, codeHash []byte) MsgContractDeploy {\n\t// create contract account\n\tcontractAcc := NewTCPWithDeploy(CID, code, codeHash)\n\treturn MsgContractDeploy{\n\t\tfrom,\n\t\tcontractAcc.Account.Address,\n\t\tcontractAcc.Code,\n\t\tcontractAcc.CodeHash,\n\t\t[]byte{0},\n\t\tsdk.Coins{sdk.NewInt64Coin(appCoin,10)},\n\t}\n}", "title": "" }, { "docid": "c300a16823b6d513d5c8dcaa1f51993d", "score": "0.5219348", "text": "func (w Wallet) Address() []byte {\n\tpubHash := PublicKeyHash(w.PublicKey)\n\n\tversionedHash := append([]byte{version}, pubHash...)\n\tchecksum := CheckSum(versionedHash)\n\n\tfullHash := append(versionedHash, checksum...)\n\tfinalAddress := utils.Base58Encode(fullHash)\n\n\t// fmt.Printf(\"pub key :\\t%x \\n\", w.PublicKey)\n\t// fmt.Printf(\"pub Hash :\\t%x \\n\", pubHash)\n\t// fmt.Printf(\"vHash : \\t%x\\n\", versionedHash)\n\t// fmt.Printf(\"checksum : \\t%x\\n\", checksum)\n\t// fmt.Printf(\"fullHash : \\t%x\\n\", fullHash)\n\t// fmt.Printf(\"address :\\t%s \\n\", finalAddress)\n\n\treturn finalAddress\n}", "title": "" }, { "docid": "ea16c0df05f5431eb3b7c5363b70866a", "score": "0.5214967", "text": "func NewAddress(address string) Address {\n\treturn Address{\n\t\tAddress: address,\n\t\tSupernet: []string{},\n\t\tHypernet: []string{},\n\t}\n}", "title": "" }, { "docid": "a3f7416831e3bc5c3a6c0ed1724d70f9", "score": "0.5210272", "text": "func DeployBrizo(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Brizo, error) {\n\tparsed, err := abi.JSON(strings.NewReader(BrizoABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(BrizoBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Brizo{BrizoCaller: BrizoCaller{contract: contract}, BrizoTransactor: BrizoTransactor{contract: contract}, BrizoFilterer: BrizoFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "3ca57e5c350239a201e6124ee07dd90d", "score": "0.5206099", "text": "func DeployBuyFGE(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *BuyFGE, error) {\n\tparsed, err := BuyFGEMetaData.GetAbi()\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\tif parsed == nil {\n\t\treturn common.Address{}, nil, nil, errors.New(\"GetABI returned nil\")\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, *parsed, common.FromHex(BuyFGEBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &BuyFGE{BuyFGECaller: BuyFGECaller{contract: contract}, BuyFGETransactor: BuyFGETransactor{contract: contract}, BuyFGEFilterer: BuyFGEFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "477896b03d0e4bf99fdc53f0342c1a5a", "score": "0.52052075", "text": "func TestDeployBigContract(t *testing.T) {\n\te := newExecutorWithConfig(t, true, true, func(c *config.Config) {\n\t\tc.ApplicationConfiguration.RPC.MaxGasInvoke = fixedn.Fixed8(1)\n\t})\n\n\t// For proper nef generation.\n\tconfig.Version = \"0.90.0-test\"\n\ttmpDir := t.TempDir()\n\n\tnefName := filepath.Join(tmpDir, \"deploy.nef\")\n\tmanifestName := filepath.Join(tmpDir, \"deploy.manifest.json\")\n\te.Run(t, \"neo-go\", \"contract\", \"compile\",\n\t\t\"--in\", \"testdata/deploy/main.go\", // compile single file\n\t\t\"--config\", \"testdata/deploy/neo-go.yml\",\n\t\t\"--out\", nefName, \"--manifest\", manifestName)\n\n\te.In.WriteString(\"one\\r\")\n\te.RunWithError(t, \"neo-go\", \"contract\", \"deploy\",\n\t\t\"--rpc-endpoint\", \"http://\"+e.RPC.Addr,\n\t\t\"--wallet\", validatorWallet, \"--address\", validatorAddr,\n\t\t\"--in\", nefName, \"--manifest\", manifestName)\n}", "title": "" }, { "docid": "d3ac47adbaa970ee12883953c0a433ac", "score": "0.5202149", "text": "func DeployProjectWallet(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *ProjectWallet, error) {\n\tparsed, err := abi.JSON(strings.NewReader(ProjectWalletABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(ProjectWalletBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &ProjectWallet{ProjectWalletCaller: ProjectWalletCaller{contract: contract}, ProjectWalletTransactor: ProjectWalletTransactor{contract: contract}, ProjectWalletFilterer: ProjectWalletFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "235ae3a5528098c8ff8512a88af14478", "score": "0.5197713", "text": "func (_DynamicMultiSig *DynamicMultiSigCaller) UpgradeContractAddress(opts *bind.CallOpts) (common.Address, error) {\n\tvar out []interface{}\n\terr := _DynamicMultiSig.contract.Call(opts, &out, \"upgradeContractAddress\")\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "92d9c35616d27624ed4502d0bab0c5c0", "score": "0.51894593", "text": "func (wallet *EthereumWallet) DecodeAddress(addr string) (btcutil.Address, error) {\n\tvar (\n\t\tethAddr common.Address\n\t\terr error\n\t)\n\tif len(addr) > 64 {\n\t\tethAddr, err = ethScriptToAddr(addr)\n\t\tif err != nil {\n\t\t\tlog.Error(err.Error())\n\t\t}\n\t} else {\n\t\tethAddr = common.HexToAddress(addr)\n\t}\n\n\treturn EthAddress{&ethAddr}, err\n}", "title": "" }, { "docid": "95214bca5efeb6317b8e6ebf1990e3fd", "score": "0.5188182", "text": "func NewAddress(pubkey *bls.PublicKey) *Address {\n\tpkHash := pubkey\n\th := pkHash.Hash()\n\tvar out Address\n\tcopy(out[:], h)\n\treturn &out\n}", "title": "" }, { "docid": "6217280210273d3c4370e7aec52860ca", "score": "0.51802605", "text": "func (o *TravelExpenseCostSearchParams) SetAddress(address *string) {\n\to.Address = address\n}", "title": "" }, { "docid": "76d1b3b4098b160ebba82bf7cc5a7374", "score": "0.5178014", "text": "func (o *GetWasmContractsContractAddressStoreParams) SetContractAddress(contractAddress string) {\n\to.ContractAddress = contractAddress\n}", "title": "" }, { "docid": "7ce73f2996745cd3971e836fb8a22328", "score": "0.516926", "text": "func (p *Base) AddExchangeAddress(exchangeName, coinType string, balance float64) {\n\tif p.ExchangeAddressExists(exchangeName, coinType) {\n\t\tp.UpdateExchangeAddressBalance(exchangeName, coinType, balance)\n\t} else {\n\t\tp.Addresses = append(\n\t\t\tp.Addresses, Address{Address: exchangeName, CoinType: coinType,\n\t\t\t\tBalance: balance, Description: PortfolioAddressExchange},\n\t\t)\n\t}\n}", "title": "" }, { "docid": "37773452445e076ea94eb1156daab404", "score": "0.516823", "text": "func (p *Process) InitContractAddress(addr common.Address) {\n\tcopy(p.contractAddress[:], addr[:])\n\tp.db = db.NewVersionedDB(p.kvs.Prefix(p.contractAddress.Bytes()))\n}", "title": "" }, { "docid": "2f068b9380e514ac1649305dcee014d4", "score": "0.5163648", "text": "func (_Pricing *PricingTransactor) SetReserveAddress(opts *bind.TransactOpts, reserve common.Address) (*types.Transaction, error) {\n\treturn _Pricing.contract.Transact(opts, \"setReserveAddress\", reserve)\n}", "title": "" }, { "docid": "9bb58967e1c909ef458612c6dda74218", "score": "0.51634943", "text": "func NewAddress(entities ...interface{}) *Address {\n\tvar domain *Domain = nil\n\tvar address interface{} = nil\n\tfor _, entity := range entities {\n\t\tswitch typed := entity.(type) {\n\t\tcase *Domain:\n\t\t\tdomain = typed\n\t\tdefault:\n\t\t\taddress = entity\n\t\t}\n\t}\n\n\tres := new(Address)\n\tif domain != nil {\n\t\tres.SetDomain(domain)\n\t}\n\tif address != nil {\n\t\tres.Set(address)\n\t}\n\treturn res\n}", "title": "" }, { "docid": "bbd66e1d9bfe6fba4e15904494edcfde", "score": "0.51618254", "text": "func (o DeploymentOutput) Address() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v Deployment) *string { return v.Address }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "7bdc2107931148b22e920d614e91ffa5", "score": "0.51597255", "text": "func (_DynamicMultiSig *DynamicMultiSigSession) UpgradeContractAddress() (common.Address, error) {\n\treturn _DynamicMultiSig.Contract.UpgradeContractAddress(&_DynamicMultiSig.CallOpts)\n}", "title": "" }, { "docid": "27e631e2ee04f45013f0a54a11dd822f", "score": "0.515848", "text": "func NewAddress(address string) (*Address, error) {\n\thost, port, err := ParseHostPort(address)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\treturn &Address{Addr: host, Port: port}, nil\n}", "title": "" }, { "docid": "c8ff67ec7270a74bc7dad899528d61a6", "score": "0.5155607", "text": "func (a *Account) RequestAddress(tx *gorm.DB) (*address.Address, error) {\n\tnewAddress := &address.Address{\n\t\tAccountID: a.ID,\n\t}\n\terr := tx.Model(a).Association(\"Addresses\").Append(newAddress).Error\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\teth := ethclient.GetInstance()\n\tfactory, err := eth.GetAddressFactory()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tnonce, err := eth.GenNonce()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsigner, err := eth.GetSigner(nonce)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tid := new(big.Int).SetUint64(uint64(newAddress.ID))\n\n\tt, err := factory.CreateReceivers(signer, id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlog.Println(t.Hash().String())\n\n\treturn newAddress, nil\n}", "title": "" }, { "docid": "71376ba037069623940cf809101f5f80", "score": "0.5152199", "text": "func DeployFillOrder(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *FillOrder, error) {\n\tparsed, err := abi.JSON(strings.NewReader(FillOrderABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(FillOrderBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &FillOrder{FillOrderCaller: FillOrderCaller{contract: contract}, FillOrderTransactor: FillOrderTransactor{contract: contract}, FillOrderFilterer: FillOrderFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "416aeee78064d52c715aa247ac5aa6d0", "score": "0.5141039", "text": "func CreateAddress(a *users.Address, userid string) error {\n\treturn DefaultDb.CreateAddress(a, userid)\n}", "title": "" }, { "docid": "adb591fad7666b1e78d67354f47512f7", "score": "0.51321256", "text": "func DeployUsdc(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Usdc, error) {\n\tparsed, err := abi.JSON(strings.NewReader(UsdcABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(UsdcBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Usdc{UsdcCaller: UsdcCaller{contract: contract}, UsdcTransactor: UsdcTransactor{contract: contract}, UsdcFilterer: UsdcFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "e29945f7e164785144652427d969dc4f", "score": "0.5128898", "text": "func bindEthereumBank(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor, filterer bind.ContractFilterer) (*bind.BoundContract, error) {\n\tparsed, err := abi.JSON(strings.NewReader(EthereumBankABI))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, parsed, caller, transactor, filterer), nil\n}", "title": "" }, { "docid": "b388b3a98d18f895afd12c6ac400ac62", "score": "0.51213086", "text": "func DeployIdentity(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Identity, error) {\n\tparsed, err := abi.JSON(strings.NewReader(IdentityABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(IdentityBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Identity{IdentityCaller: IdentityCaller{contract: contract}, IdentityTransactor: IdentityTransactor{contract: contract}, IdentityFilterer: IdentityFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "c136d0d60515671613454750e25c3665", "score": "0.51157033", "text": "func DeployVault(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Vault, error) {\n\tparsed, err := abi.JSON(strings.NewReader(VaultABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(VaultBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Vault{VaultCaller: VaultCaller{contract: contract}, VaultTransactor: VaultTransactor{contract: contract}, VaultFilterer: VaultFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "4883338aa17cf6fa4c5b086e38eef798", "score": "0.51126", "text": "func (_DynamicMultiSig *DynamicMultiSigCallerSession) UpgradeContractAddress() (common.Address, error) {\n\treturn _DynamicMultiSig.Contract.UpgradeContractAddress(&_DynamicMultiSig.CallOpts)\n}", "title": "" }, { "docid": "19cc7245fe02687230ef0a61389bc07e", "score": "0.51123786", "text": "func (c LNDclient) NewAddress() (string, error) {\n\tstdOutLogger.Printf(\"Getting a new BTC address\")\n\trequest := lnrpc.NewAddressRequest{\n\t\tType: lnrpc.AddressType_WITNESS_PUBKEY_HASH,\n\t}\n\tres, err := c.lndClient.NewAddress(c.ctx, &request)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn res.Address, nil\n}", "title": "" }, { "docid": "6f74ae3f0e72797e6a435a508a7802dd", "score": "0.5101932", "text": "func DeployTellorTransfer(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *TellorTransfer, error) {\n\tparsed, err := abi.JSON(strings.NewReader(TellorTransferABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(TellorTransferBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &TellorTransfer{TellorTransferCaller: TellorTransferCaller{contract: contract}, TellorTransferTransactor: TellorTransferTransactor{contract: contract}, TellorTransferFilterer: TellorTransferFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "4b3b1ecee8b84b0f31550ac1f9080df7", "score": "0.5101052", "text": "func DeployTellorStake(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *TellorStake, error) {\n\tparsed, err := abi.JSON(strings.NewReader(TellorStakeABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(TellorStakeBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &TellorStake{TellorStakeCaller: TellorStakeCaller{contract: contract}, TellorStakeTransactor: TellorStakeTransactor{contract: contract}, TellorStakeFilterer: TellorStakeFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "f7585e264a747f1cf1f1fbd3b6823d1d", "score": "0.50894976", "text": "func (w Wallet) Address() []byte {\n\t// Step 2 and 3\n\tpubKeyHash := PublicKeyHash(w.PublicKey)\n\n\t// all addresses start with 1 because of the version appended to hash\n\tversionedHash := append([]byte{version}, pubKeyHash...)\n\t// Step 4 and 5\n\tchecksum := Checksum(versionedHash)\n\n\t// Step 6: take the original \"public key hash\" + \"version\" + \"checksum\"\n\t// and pass it through base58 encoder algorithm\n\tfullHash := append(versionedHash, checksum...)\n\taddress := Base58Encode(fullHash)\n\n\tfmt.Printf(\"public key: %x\\n\", w.PublicKey)\n\tfmt.Printf(\"public key hash: %x\\n\", pubKeyHash)\n\tfmt.Printf(\"public address: %s\\n\", address)\n\n\treturn address\n}", "title": "" } ]
5a1e813ad49e2e18d2d9f1d613965d88
SetColor sets the color to draw with.
[ { "docid": "9b67ca4163654733ac366b62668c5613", "score": "0.685166", "text": "func SetColor(color string) {\n\tif color == \"yellow\" {\n\t\tDefaultDrawColor = []int{255, 255, 0}\n\t} else if color == \"white\" {\n\t\tDefaultDrawColor = []int{255, 255, 255}\n\t} else if color == \"black\" {\n\t\tDefaultDrawColor = make([]int, 3)\n\t}\n}", "title": "" } ]
[ { "docid": "de2613b1760e48fa4bc1cb4b0763d143", "score": "0.73325485", "text": "func (c *Canvas) SetColor(p sparta.Property, cl color.RGBA) {\n\tif (p != sparta.Background) && (p != sparta.Foreground) {\n\t\treturn\n\t}\n\tc.win.SetColor(p, cl)\n}", "title": "" }, { "docid": "4c454e211289a754d5a7505ecc8930ee", "score": "0.72990566", "text": "func (stg *Stage) Set(x, y int, c color.Color) {\n\tstg.CurrentFrame.Drawn[image.Point{x, y}] = c\n}", "title": "" }, { "docid": "a58da9473c3901e145c439cb48d1f770", "score": "0.70241016", "text": "func (canvas *Canvas) SetColor(r, g, b float32) {\r\n\twriteCommand(canvas.contents, \"rg\", r, g, b)\r\n}", "title": "" }, { "docid": "f6f68b81127b840e37e462dc83e4e4a6", "score": "0.6897753", "text": "func (r *Renderer) SetColor(color *Color) {\n\tr.color = color\n\tr.SetDrawColor(color.R, color.G, color.B, color.A)\n}", "title": "" }, { "docid": "461756344d4c7795350ff53086faf390", "score": "0.6776763", "text": "func (s *State) SetColor(c color.NRGBA) {\n\ts.R.Value = float32(c.R) / 255.0\n\ts.G.Value = float32(c.G) / 255.0\n\ts.B.Value = float32(c.B) / 255.0\n\ts.A.Value = float32(c.A) / 255.0\n\ts.updateEditor()\n}", "title": "" }, { "docid": "e3828ba17f1c9a5f8d355b9f57c67070", "score": "0.6748953", "text": "func (c *Color) Set() *Color {\n\tif c.isNoColorSet() {\n\t\treturn c\n\t}\n\n\tfmt.Fprintf(pencil.Output, c.format())\n\treturn c\n}", "title": "" }, { "docid": "dbfa752f8495157e27406bc98dbca7f2", "score": "0.66808605", "text": "func (s *Slush) SetColor(color int){\n\ts.Col = color\n}", "title": "" }, { "docid": "8e491d156899a21f7ed614a5e14272f3", "score": "0.6679121", "text": "func (_m *Fpdf) SetDrawColor(r int, g int, b int) {\n\t_m.Called(r, g, b)\n}", "title": "" }, { "docid": "6777e28cfbf34b27aa107d22a758ea5e", "score": "0.6677991", "text": "func (c *Canvas) SetColor(clr color.Color) {\n\tc.context().color = clr\n}", "title": "" }, { "docid": "6fb76c36d789c6a654ae6eedbf33a303", "score": "0.661898", "text": "func (d *Display) Set(x, y int, t string, f, b color.Color) {\n\td.Text.Set(x, y, t)\n\td.Foreground.Set(x, y, rgba(f))\n\td.Background.Set(x, y, rgba(b))\n}", "title": "" }, { "docid": "0f10d60d45aba4c23671a96d7f86ae5c", "score": "0.6550402", "text": "func (c *Color) Set() *Color {\n\tif c.isNoColorSet() {\n\t\treturn c\n\t}\n\n\tfmt.Fprintf(Output, c.format())\n\treturn c\n}", "title": "" }, { "docid": "29faade84e5bae5d278991b056d92042", "score": "0.6546703", "text": "func SetColor(id string, r, g, b uint8, ip string) error {\n\tcmd := fmt.Sprintf(\"C %s,%d,%d,%d,,\\r\\n\", id, r, g, b)\n\t_, err := SendCommand(cmd, ip)\n\treturn err\n}", "title": "" }, { "docid": "45b7a9625c652cbc022cad49cd198e39", "score": "0.65089864", "text": "func (this *Sprite) SetColor(color Color) {\n\tC.sfSprite_setColor(this.cptr, color.toC())\n}", "title": "" }, { "docid": "2b3e378f15ff14ab126dd75e75c377ff", "score": "0.6444449", "text": "func (di Dither) SetColor(str string) error {\n\tret, err := C.caca_set_dither_color(di.Di, C.CString(str))\n\n\tif ret == -1 {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "5e0969af9a9cdfa432aa85af13349cb7", "score": "0.6427025", "text": "func (player *Creature) SetColor(color sdl.Color) {\n\tplayer.RenderColor = color\n}", "title": "" }, { "docid": "1924ccc6ac227f60e7c43b9d55a3069d", "score": "0.6391378", "text": "func (b BufferedCanvas) Set(x, y int, color color.Color) {\n\tb.buffer.Set(x, y, color)\n}", "title": "" }, { "docid": "59c1565e8e60ce7bba97fee47f5e2a88", "score": "0.6384694", "text": "func (a *Area) SetColor(c color.Color) {\n\tswitch p := c.(type) {\n\tcase color.RGBA:\n\t\tif (int(p.A)-int(p.R))|(int(p.A)-int(p.G))|(int(p.A)-int(p.B)) < 0 {\n\t\t\tpanic(badAlphaPremul)\n\t\t}\n\tcase color.RGBA64:\n\t\tif (int(p.A)-int(p.R))|(int(p.A)-int(p.G))|(int(p.A)-int(p.B)) < 0 {\n\t\t\tpanic(badAlphaPremul)\n\t\t}\n\t}\n\ta.color = c\n}", "title": "" }, { "docid": "3ff768dee3947c96c54345321d6567ca", "score": "0.6370912", "text": "func (sf *TColor) SetColor(color types.AColor) {\n\tdefer sf.block.Unlock()\n\tsf.block.Lock()\n\tsf.val = color\n}", "title": "" }, { "docid": "349744f4fa7a1c6b472b99ec5000c428", "score": "0.6340671", "text": "func (o Canvas) Set(x, y int, clr Color) {\n\tif o.Includes(x, y) {\n\t\to.Pixels.SetNRGBA(x, o.Height-1-y, clr.N)\n\t}\n}", "title": "" }, { "docid": "6768f96d2a41de7cbe4323057573caf5", "score": "0.62652194", "text": "func (i *Image) Set(x, y int, c color.Color) {\n\tpt := image.Pt(x, y)\n\n\tmodel := i.ColorModel()\n\n\tconvc := model.Convert(c)\n\n\tr, g, b, _ := convc.RGBA()\n\n\tcolr := color9.Color((r << 24) | (g << 16) | (b << 8) | 0xFF)\n\n\timg, err := i.Display.AllocImage(image.Rect(0, 0, 1, 1), i.Pix, true, colr)\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\ti.Draw(image.Rect(pt.X, pt.Y, pt.X+1, pt.Y+1), img, nil, image.ZP)\n}", "title": "" }, { "docid": "560971afa23e464e89d9416566a986a8", "score": "0.6240708", "text": "func (c *CrossNode) SetColor(color api.IPalette) {\n\tc.color = color\n}", "title": "" }, { "docid": "e5a85566c72e01978c02b2ba92ef23c1", "score": "0.62331444", "text": "func Set(code pencil.ColorCode, p ...pencil.Attribute) *Color {\n\tc := New(code, p...)\n\tc.Set()\n\treturn c\n}", "title": "" }, { "docid": "7526f4f7d48d8ea4ad6a1dab1efae2ce", "score": "0.62061435", "text": "func (r *Rectangle) SetColor(color mgl32.Vec3) {\n\tfor i := 0; i < 4; i++ {\n\t\tr.colors[i] = color\n\t}\n}", "title": "" }, { "docid": "82b396f13a106f9297f0de585064f61a", "score": "0.61472905", "text": "func (m *RGB) Set(x, y int, c Color) {\n\ti := (y+m.Y)*m.Stride + (x+m.X)*4\n\tpix := m.Pix[i : i+4]\n\tpix[0] = c.R\n\tpix[1] = c.G\n\tpix[2] = c.B\n\tpix[3] = 255\n}", "title": "" }, { "docid": "29c71ef7afb806dc924d88772a12e565", "score": "0.6117949", "text": "func (w *ConsoleWriter) SetColor(c bool) {\n\tw.color = c\n}", "title": "" }, { "docid": "e84a71a5fb5ebb6b1a6ef18e9d99178e", "score": "0.6057694", "text": "func (c *Color) Set(i uint32) {\n\tr := uint32(byte(i >> 24))\n\tg := uint32(byte(i >> 16))\n\tb := uint32(byte(i >> 8))\n\ta := uint32(byte(i))\n\n\tc.r = r | r<<8\n\tc.g = g | g<<8\n\tc.b = b | b<<8\n\tc.a = a | a<<8\n\tc.raw = i\n}", "title": "" }, { "docid": "e7e79c1c4a65882a0223af0b2ccddfec", "score": "0.60456485", "text": "func (rp *RoomPlayer) SetColor() {\n\trp.Color = util.GetRandomColor()\n}", "title": "" }, { "docid": "894d6cece00686468a3dd7f09a926ca3", "score": "0.6040062", "text": "func (l *Label) SetColor(color canvas.Color) {\n\tl.color = color\n}", "title": "" }, { "docid": "7f3ce1cc2392d67ecc303543c65fa4c1", "score": "0.60122496", "text": "func (ms *Standard) SetColor(color *math32.Color) {\n\n\tms.uni.SetColor(vDiffuse, color)\n\tms.uni.SetColor(vAmbient, color)\n}", "title": "" }, { "docid": "842d18dd09b1287dfb72b266d52aeb1c", "score": "0.60043824", "text": "func (c *Colour) Set() *Colour {\n\tif c.isNoColourSet() {\n\t\treturn c\n\t}\n\n\tfmt.Fprintf(Output, c.format())\n\treturn c\n}", "title": "" }, { "docid": "a9a5dc065d184201087e266aa89af589", "score": "0.59870476", "text": "func (r *RGBAPainter) SetColor(c color.Color) {\n\tr.cr, r.cg, r.cb, r.ca = c.RGBA()\n}", "title": "" }, { "docid": "388b2e8be20906f4a5f28fff7a9761a0", "score": "0.5984098", "text": "func (text *Text) Set(t string) {\n\ttext.Setc([]string{t}, []*Color{NewColor(255, 255, 255, 255)})\n}", "title": "" }, { "docid": "52212b2d522fa88c24193eff2c1706d3", "score": "0.59736073", "text": "func (p *Point) setColor(graphNum int) {\n graphNum = graphNum % 7\n\n switch graphNum {\n case 0:\n p.myColor = ansi.WHITE\n break\n case 1:\n p.myColor = ansi.RED\n break\n case 2:\n p.myColor = ansi.GREEN\n break\n case 3:\n p.myColor = ansi.YELLOW\n break\n case 4:\n p.myColor = ansi.BLUE\n break\n case 5:\n p.myColor = ansi.PURPLE\n break\n case 6:\n p.myColor = ansi.CYAN\n break\n }\n}", "title": "" }, { "docid": "b7a1e91405a29513b0d92c99bf2870d6", "score": "0.59688556", "text": "func (canvas *Canvas) SetStrokeColor(r, g, b float32) {\r\n\twriteCommand(canvas.contents, \"RG\", r, g, b)\r\n}", "title": "" }, { "docid": "7bfca230a774a96d2751f98ce595ff46", "score": "0.59437764", "text": "func (t *TriangleNode) SetColor(color api.IPalette) {\n\tt.color = color\n}", "title": "" }, { "docid": "4845ef5aa1db99ae1365be307d1ccb00", "score": "0.5888555", "text": "func (g *Gui) setColor(c color.Color) color.NRGBA {\n\trc, gc, bc, ac := c.RGBA()\n\treturn color.NRGBA{\n\t\tR: uint8(rc >> 8),\n\t\tG: uint8(gc >> 8),\n\t\tB: uint8(bc >> 8),\n\t\tA: uint8(ac >> 8),\n\t}\n}", "title": "" }, { "docid": "ee8031b0f1e46eab2cd43e84bacc5ae1", "score": "0.5877911", "text": "func (m *Material) SetColor(c color.Color) {\n\tm.color = c\n}", "title": "" }, { "docid": "bcbb020836acd35b29070c79aba453be", "score": "0.5850518", "text": "func (line *Line) SetColor(color uint32) *Line {\n\tline.color = color\n\treturn line\n}", "title": "" }, { "docid": "4d376778f2ac6fc35f856e8c8b36b718", "score": "0.584655", "text": "func (p *RGB24) Set(x, y int, c color.Color) {\n\tif !(image.Point{x, y}.In(p.Rect)) {\n\t\treturn\n\t}\n\ti := p.PixOffset(x, y)\n\tc1 := RGBModel.Convert(c).(RGB)\n\tp.Pix[i+0] = uint8(c1.R)\n\tp.Pix[i+1] = uint8(c1.G)\n\tp.Pix[i+2] = uint8(c1.B)\n}", "title": "" }, { "docid": "7357f29f4e54efbd04adbf9757022b95", "score": "0.5835931", "text": "func Set(p ...Attribute) *Color {\n\tc := New(p...)\n\tc.Set()\n\treturn c\n}", "title": "" }, { "docid": "667c564efb3530aa0f9180dd8b308d5b", "score": "0.5835319", "text": "func (f *FreeTextWidget) SetColor(v string) {\n\tf.Color = &v\n}", "title": "" }, { "docid": "fc0bc31075bd4cff16896a444e8c78ee", "score": "0.5820943", "text": "func (l *Label) SetColor(color string) (err error) {\n\treturn l.Update(\"color\", color)\n}", "title": "" }, { "docid": "3ade80b890a49a5b963a0ed0aeb6267c", "score": "0.5804852", "text": "func (l *Label) SetColor(color *math32.Color) *Label {\n\n\tl.fgColor.FromColor(color, 1.0)\n\tl.SetText(l.currentText)\n\treturn l\n}", "title": "" }, { "docid": "d3b7e851f45e2af5e615e6f616acaafd", "score": "0.5787193", "text": "func (_m *Fpdf) SetFillColor(r int, g int, b int) {\n\t_m.Called(r, g, b)\n}", "title": "" }, { "docid": "35f9ed3937d6e2614a71bf8a549dd300", "score": "0.5776672", "text": "func (m Mono) Set(x, y int, c color.Color) {\n\tif x < 0 || y < 0 || x >= int(m.Width()) || y >= int(m.Height()) {\n\t\treturn\n\t}\n\tw := m.Width()\n\tif w%8 > 0 {\n\t\tw += 8 - w%8\n\t}\n\ti := uint(x) + uint(y)*w\n\tY := colorModel.Convert(c).(color.Gray16).Y\n\tif Y == 0 {\n\t\tm[4+i/8] &^= (1 << (7 - i%8)) // clr\n\t} else {\n\t\tm[4+i/8] |= (1 << (7 - i%8)) // set\n\t}\n}", "title": "" }, { "docid": "2d5394db0a9f94ee3fa91c6ba163fdbe", "score": "0.5747991", "text": "func (r *BasicRectangleNode) SetColor(color api.IPalette) {\n\tr.color = color\n}", "title": "" }, { "docid": "e4a83884e00b210141d6e2d37e7bb91b", "score": "0.57374597", "text": "func (b *Driver) SetRGB(r uint8, g uint8, bl uint8) {\n\tb.packetChannel <- b.craftPacket([]uint8{r, g, bl, 0x01}, 0x02, 0x20)\n}", "title": "" }, { "docid": "4deb2d7abaefaf33bb5889a7444f611c", "score": "0.56982213", "text": "func (e *Embed) SetColor(clr int) *Embed {\n\te.Color = clr\n\treturn e\n}", "title": "" }, { "docid": "260f7388dbe3ca87ca8e6e3a14638a8f", "score": "0.5665506", "text": "func (m *InformationProtectionLabel) SetColor(value *string)() {\n err := m.GetBackingStore().Set(\"color\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "32653999f28a594832a47fab999df37c", "score": "0.5658779", "text": "func (m *messenger) SetUseColor(b bool) {\n\tm.mu.Lock()\n\tm.useColor = b\n\tm.mu.Unlock()\n}", "title": "" }, { "docid": "51d81c0f351aeedbdba7360299825f06", "score": "0.5658407", "text": "func (s *SpheroOllieDriver) SetRGB(r uint8, g uint8, b uint8) {\n\ts.packetChannel <- s.craftPacket([]uint8{r, g, b, 0x01}, 0x02, 0x20)\n}", "title": "" }, { "docid": "e0412bc6513bf761b9b25d7786b39924", "score": "0.5643381", "text": "func (_m *Fpdf) SetDrawSpotColor(nameStr string, tint byte) {\n\t_m.Called(nameStr, tint)\n}", "title": "" }, { "docid": "fd19ba7a15f2144011ad316f981e0e95", "score": "0.5631057", "text": "func (self Shape) Setfillcolor(color Color) void { \n return C.sfShape_setFillColor(self.Cref, sfColor(color));\n}", "title": "" }, { "docid": "62a749938e0a5a573ae165ded6d54239", "score": "0.5577559", "text": "func (g *Gui) setFillColor(c color.Color) {\n\tg.cfg.color.fill = c\n}", "title": "" }, { "docid": "a69493d91feb7a6b1eb04f078e766533", "score": "0.5558067", "text": "func (flex Flex) SetColor(color color.Color) error {\n\tfor index := 0; index < 32; index++ {\n\t\tSetColorOnLed(flex, color, index)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "73408070aae277f6d0fb5daebe0046b9", "score": "0.5542005", "text": "func (c *Canvas) SetStrokeColor(col color.Color) {\n\tr, g, b, a := col.RGBA()\n\tc.strokeColor = color.RGBA{uint8(r >> 8), uint8(g >> 8), uint8(b >> 8), uint8(a >> 8)}\n}", "title": "" }, { "docid": "96ad084fc29543849e735e63fec04bf4", "score": "0.55158645", "text": "func (tr *TableRenderer) Set(key string, value string) {\n\tbold := color.New(color.Bold).SprintFunc()\n\tcyan := color.New(color.FgHiCyan).SprintFunc()\n\tlog.Debugf(\"%s set to %s\\n\", bold(key), cyan(value))\n}", "title": "" }, { "docid": "4bc71658b2a29ecd652f5ef6a38d141c", "score": "0.5510895", "text": "func (me *TfxColorCommon) Set(s string) { (*Tfloat4)(me).Set(s) }", "title": "" }, { "docid": "c32fc3b0112d3629761a8823d09a52ad", "score": "0.5509447", "text": "func (gp *Fpdf) SetRGBStrokeColor(r uint8, g uint8, b uint8) {\n\tgp.currentContent().AppendStreamSetRGBColorStroke(r, g, b)\n}", "title": "" }, { "docid": "62202ca1fb538c2a2e78684496bd1a35", "score": "0.54782456", "text": "func (_m *Fpdf) SetTextColor(r int, g int, b int) {\n\t_m.Called(r, g, b)\n}", "title": "" }, { "docid": "1661ad2d2e17616f18f17f6aebeae58e", "score": "0.5474337", "text": "func (d *Display) SetPixel(x, y int, val byte) {\n\td.growBuffer(x, y)\n\td.buffer[y][x] = val\n}", "title": "" }, { "docid": "9c8671fc4330ed3cc0f0b0488967d365", "score": "0.5459592", "text": "func (r *Rectangle) SetFillColor(c string) {\n\tr.fillColor = c\n}", "title": "" }, { "docid": "afd660cd401036af4036ae4130a6e302", "score": "0.54537785", "text": "func ColorSetA(pSelf []Color, a Real) {\n\tcpSelf, _ := unpackArgSColor(pSelf)\n\tca, _ := (C.godot_real)(a), cgoAllocsUnknown\n\tC.godot_color_set_a(cpSelf, ca)\n\tpackSColor(pSelf, cpSelf)\n}", "title": "" }, { "docid": "6eebe6fd0a279eb6f7e48134e6532459", "score": "0.5434038", "text": "func (self Shape) Setoutlinecolor(color Color) void { \n return C.sfShape_setOutlineColor(self.Cref, sfColor(color));\n}", "title": "" }, { "docid": "2ac2a9a95a978babdc7e59df30cfdb33", "score": "0.5420678", "text": "func (tb *TextBuf) SetLineColor(ln int, color string) {\n\ttb.LinesMu.Lock()\n\tdefer tb.LinesMu.Unlock()\n\tif tb.LineColors == nil {\n\t\ttb.LineColors = make(map[int]gist.Color)\n\t}\n\tclr, _ := gist.ColorFromString(color, nil)\n\ttb.LineColors[ln] = clr\n}", "title": "" }, { "docid": "a534cf00c28c9d1e56639797ea6ff974", "score": "0.54157585", "text": "func (h *HueLight) SetColor(color common.Color) error {\n\tvar err error\n\tx, y := rgb2cie(color)\n\tif h.IsGroup {\n\t\terr = h.Group.Xy([]float32{x, y})\n\t} else {\n\t\terr = h.Light.Xy([]float32{x, y})\n\t}\n\n\tif err != nil {\n\t\th.logger.Error(\"Failed to set HUE color\", err)\n\t\treturn errors.Wrap(err, \"color set failed\")\n\t}\n\n\th.performActualUpdate(true)\n\treturn nil\n}", "title": "" }, { "docid": "d58269ebdd1db08b52fed8c4f5dadd9c", "score": "0.54086494", "text": "func (g *GammaTarget) Set(x int, y int, c algebra.Vector3) {\n\tg.pixelMap.Set(x, y, c.Pow(g.gamma).Saturate().ToColor())\n}", "title": "" }, { "docid": "b41e072ac92954606774c1d987ccb20d", "score": "0.539346", "text": "func (c *Canvas) SetFillColor(col color.Color) {\n\tr, g, b, a := col.RGBA()\n\tc.fillColor = color.RGBA{uint8(r >> 8), uint8(g >> 8), uint8(b >> 8), uint8(a >> 8)}\n}", "title": "" }, { "docid": "fef36e8698b500bafa821f3032afbf37", "score": "0.53931165", "text": "func (_m *Fpdf) SetFillSpotColor(nameStr string, tint byte) {\n\t_m.Called(nameStr, tint)\n}", "title": "" }, { "docid": "7159825e8734ac645cc181b4b0e6da7e", "score": "0.53875184", "text": "func setFillColor(n cfa.Node, color string) {\n\tn.SetAttribute(encoding.Attribute{Key: \"fillcolor\", Value: color})\n\tn.SetAttribute(encoding.Attribute{Key: \"style\", Value: \"filled\"})\n}", "title": "" }, { "docid": "00d74ba31c84f496da646571d432f00d", "score": "0.5379191", "text": "func (debug *Debug) SetColorFunc(colorFunc ColorFunc) {\n\tdebug.colorFunc = colorFunc\n}", "title": "" }, { "docid": "4b598cb2e7222666a171d53d639e76fd", "score": "0.53759736", "text": "func (seg SubSegment) Set(pos uint, colour framebuffer.Rgb) {\n\n\t// Is position out of range?\n\tif pos >= seg.len {\n\t\tlog.Panic(\"position out of range\")\n\t}\n\t// Set at position within segment\n\tseg.baseSeg.Set(seg.start+pos, colour)\n}", "title": "" }, { "docid": "08af4dd00594206ac1950bbc6db9abf5", "score": "0.5305636", "text": "func (e *windowsDriver) SetPixel(x, y int, c Color) {\n\tif x < 0 || x >= e.width || y < 0 || y >= e.height {\n\t\treturn\n\t}\n\tp := (*Color)(unsafe.Add(e.backBufferPtr, (y*e.width+x)*4))\n\t//p := (*Color)(unsafe.Pointer(uintptr(e.backBufferPtr + uintptr((y*e.width+x)*4))))\n\tif c.A() != 255 {\n\t\t*p = c.Blend(*p)\n\t} else {\n\t\t*p = c\n\t}\n}", "title": "" }, { "docid": "7a80b6a2f1c41ddc31e270f270c3af02", "score": "0.5304714", "text": "func (d *Device) SetPixel(x int16, y int16, c color.RGBA) {\n\tif x < 0 || y < 0 || x >= d.width || y >= d.height {\n\t\treturn\n\t}\n\td.FillRectangle(x, y, 1, 1, c)\n}", "title": "" }, { "docid": "efc1baa18e50ba525388adc0566248d4", "score": "0.5298772", "text": "func Set(p ...Attribute) *Colour {\n\tc := New(p...)\n\tc.Set()\n\treturn c\n}", "title": "" }, { "docid": "b5d5b63d914a87e47d2bc2d336e5ee26", "score": "0.52986425", "text": "func SetLEDColor(controller Handle, r, g, b uint8) {\n\tdefer cleanup()()\n\n\tinternal.SteamAPI_ISteamController_SetLEDColor(controller, r, g, b, uint32(internal.ESteamControllerLEDFlag_SetColor))\n}", "title": "" }, { "docid": "bed83e41d2f3445037d3e07f45edaec1", "score": "0.52848756", "text": "func (gp *Fpdf) SetRGBFillColor(r uint8, g uint8, b uint8) {\n\tgp.currentContent().AppendStreamSetRGBColorFill(r, g, b)\n}", "title": "" }, { "docid": "0a234b3efb684a0388bf0cfda8b1739f", "score": "0.5267533", "text": "func (img *Image2D) SetRGB(x, y int, r, g, b uint8) {\n\tidx := img.getIdx(x, y)\n\timg.data[idx] = r\n\timg.data[idx+1] = g\n\timg.data[idx+2] = b\n}", "title": "" }, { "docid": "59c655cde0b64708acc61ef425c76441", "score": "0.52256465", "text": "func (gp *Fpdf) SetTextColor(r uint8, g uint8, b uint8) {\n\trgb := Rgb{\n\t\tr: r,\n\t\tg: g,\n\t\tb: b,\n\t}\n\tgp.curr.setTextColor(rgb)\n}", "title": "" }, { "docid": "7185b8d106dc9ba7fdfbc9af360d6ef9", "score": "0.5225354", "text": "func ColorSetB(pSelf []Color, b Real) {\n\tcpSelf, _ := unpackArgSColor(pSelf)\n\tcb, _ := (C.godot_real)(b), cgoAllocsUnknown\n\tC.godot_color_set_b(cpSelf, cb)\n\tpackSColor(pSelf, cpSelf)\n}", "title": "" }, { "docid": "fcad06a3da9941ccb4259678044745c3", "score": "0.5218139", "text": "func (c Camera) SetPoint(x int, y int, color color.RGBA) {\n\tc.img.Set(x, y, color)\n}", "title": "" }, { "docid": "0630a1f921c5dcc631b9f83b6156d13c", "score": "0.5216135", "text": "func SetBackground(color int) {\n\tC.setbg(C.int(color))\n}", "title": "" }, { "docid": "a6dc1539ae5dedd73d5ba7d868a5db49", "score": "0.5214336", "text": "func (o Canvas) FSet(x, y float64, clr Color) {\n\to.Set(int(x*o.FWidth), int(y*o.FHeight), clr)\n}", "title": "" }, { "docid": "c36f68c3deff25605d3e341075e82f10", "score": "0.52142113", "text": "func SetBackColor(flag int) {\n if flag < BG_BLACK || flag > BG_WHITE {\n return\n }\n\n mutex.Lock()\n defer mutex.Unlock()\n\n fmt.Fprintf(\n os.Stdout,\n \"%s[%vm\",\n ESC_CHAR,\n flag,\n )\n}", "title": "" }, { "docid": "6dd2ee59fdbe2fb62c3bfd56fb43c5e4", "score": "0.5205704", "text": "func (c Canvas) Set(x, y int, value rune) {\n\tc[y][x].Set(value)\n}", "title": "" }, { "docid": "65c0a48b6ae4a22c1694b81a394f5cc5", "score": "0.51987684", "text": "func (s CombinedSegment) Set(pos uint, colour framebuffer.Rgb) {\n\n\tseg, segPos := s.locate(pos)\n\tseg.Set(segPos, colour)\n}", "title": "" }, { "docid": "ff79275319a6d6d81faf7521cda5990f", "score": "0.51947826", "text": "func (n *NoteWidget) SetColor(v string) {\n\tn.Color = &v\n}", "title": "" }, { "docid": "fd45fb0a4f76ac031e17082c8f401475", "score": "0.51908165", "text": "func (h *ConsoleHandler) SetConsoleColor(loglevel LogLevel, color ConsoleColor) {\n\th.mutex.Lock()\n\tdefer h.mutex.Unlock()\n\tcolorMap[loglevel] = color\n}", "title": "" }, { "docid": "e4393171ba675645e3ba3b0fc98c26ef", "score": "0.5180965", "text": "func (w *Window) SetColorMask(c color.Color) {\n\tw.canvas.SetColorMask(c)\n}", "title": "" }, { "docid": "98705b324a32b91945d1cf5cee8ff930", "score": "0.51808983", "text": "func (d *Device) SetPixel(x int16, y int16, c color.RGBA) {\n\tif x < 0 || y < 0 ||\n\t\t(((d.rotation == NO_ROTATION || d.rotation == ROTATION_180) && (x >= d.width || y >= d.height)) ||\n\t\t\t((d.rotation == ROTATION_90 || d.rotation == ROTATION_270) && (x >= d.height || y >= d.width))) {\n\t\treturn\n\t}\n\td.FillRectangle(x, y, 1, 1, c)\n}", "title": "" }, { "docid": "ccba28bff92dcad2950af45ba32dfee2", "score": "0.51759124", "text": "func (r *Rectangle) SetLineColor(c string) {\n\tr.lineColor = c\n}", "title": "" }, { "docid": "870d7a05632070dc5ae10ccd55575b38", "score": "0.5174783", "text": "func (cv Canvas) SetColorAnsi(fg byte, bg byte) error {\n\tret, err := C.caca_set_color_ansi(cv.Cv, C.uint8_t(fg), C.uint8_t(bg))\n\n\tif int(ret) != -1 {\n\t\treturn nil\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "ec42190dd7f427fa93858901da6519a4", "score": "0.51742566", "text": "func (writer *ConsoleWriter) SetColored(colored bool) {\n\tif colored == writer.colored {\n\t\treturn\n\t}\n\n\twriter.colored = colored\n\n\tinitPrefix(colored)\n}", "title": "" }, { "docid": "68fa1e66506485c7bd4ea2f209405235", "score": "0.516513", "text": "func ColorSetG(pSelf []Color, g Real) {\n\tcpSelf, _ := unpackArgSColor(pSelf)\n\tcg, _ := (C.godot_real)(g), cgoAllocsUnknown\n\tC.godot_color_set_g(cpSelf, cg)\n\tpackSColor(pSelf, cpSelf)\n}", "title": "" }, { "docid": "d302595f750ca75aded4992b58f98150", "score": "0.51648813", "text": "func (l *LightMap) Set(id uint16, color *Color) {\n\tl.Lock()\n\tl.lights[id] = color\n\tl.Unlock()\n}", "title": "" }, { "docid": "5aebb55e4243b5230fe6ffeec9634aed", "score": "0.5163528", "text": "func SetForegroundColor(color Color) {\n\tdefaultForegroundColor = color\n\tfmt.Printf(\"\\x1b[%sm\", color.Foreground())\n}", "title": "" }, { "docid": "5af4da36c60a33e7b0b04985dd913ac9", "score": "0.51469576", "text": "func (s Subject) SetColorDepth(depth int) {\n\ts.payload.Add(COLOR_DEPTH, common.NewString(common.IntToString(depth)))\n}", "title": "" }, { "docid": "96ffa3390a66692b08ef5fec2a57c400", "score": "0.5145704", "text": "func SetColors(cls []int) {\n\tcolors = cls\n}", "title": "" }, { "docid": "033681e455d314c1c760226c073903ad", "score": "0.5131125", "text": "func (e *UnifiedEncoder) SetColor(colorConfig ColorConfig) *UnifiedEncoder {\n\te.color = colorConfig\n\treturn e\n}", "title": "" }, { "docid": "0a08610ccf186b70dd1928170cbbc379", "score": "0.5122261", "text": "func (g *Graphics) Set(x, y uint16, on bool) (collision bool) {\n\ta := x + y*GraphicsWidth\n\n\tif g.Pixels[a] == 0x01 {\n\t\tcollision = true\n\t}\n\n\tvar v byte\n\tif on {\n\t\tv = 0x01\n\t}\n\n\tg.Pixels[a] = g.Pixels[a] ^ v\n\n\treturn\n}", "title": "" } ]
bfdeb922daf38e57a5b537bb086d76f7
CreateCommandBuilderFactory creates a new CommandBuilderFactory instance
[ { "docid": "9ad1be602e43c1e3776472428a3f3bf4", "score": "0.8146125", "text": "func CreateCommandBuilderFactory() commands.CommandBuilderFactory {\n\tout := CommandBuilderFactory{}\n\treturn &out\n}", "title": "" } ]
[ { "docid": "38ccb5f918a8923d8436de371320a915", "score": "0.74598813", "text": "func CreateBuilderFactory() commands.BuilderFactory {\n\tout := BuilderFactory{}\n\treturn &out\n}", "title": "" }, { "docid": "80e606d7322904fda22989ac15d12636", "score": "0.66732204", "text": "func (fac *CommandBuilderFactory) Create() commands.CommandBuilder {\n\tout := createCommandBuilder()\n\treturn out\n}", "title": "" }, { "docid": "0d10e5dfea636070188277f1afa4f7a4", "score": "0.6071255", "text": "func (fac *BuilderFactory) Create() commands.Builder {\n\tout := createBuilder()\n\treturn out\n}", "title": "" }, { "docid": "22a00418809d0fd20aba9bc6dc7790a4", "score": "0.5884491", "text": "func CreateBuilderFactoryForTests() chunk.BuilderFactory {\n\tout := CreateBuilderFactory()\n\treturn out\n}", "title": "" }, { "docid": "b74f1f85d08c9dc9d75c0b3c4ab7a078", "score": "0.5501574", "text": "func newCommand(definition *CommandDefinition) Command {\n\tcmdAliases := make([]*commander.Command, 0)\n\tfor _, alias := range definition.Aliases {\n\t\tcmdAliases = append(cmdAliases, commander.NewCommand(alias))\n\t}\n\n\treturn &command{\n\t\tdefinition: definition,\n\t\tcmd: commander.NewCommand(definition.Command),\n\t\tcmdAliases: cmdAliases,\n\t}\n}", "title": "" }, { "docid": "d93a399b192e4ef5c55b3bde04d90fc2", "score": "0.54890597", "text": "func AddCommandFactory() (cli.Command, error) {\n\treturn &AddCommand{options: &addOptions{}}, nil\n}", "title": "" }, { "docid": "372ced22ee38ea0565aa8c92e00bf990", "score": "0.53257823", "text": "func NewCommand(ctx context.Context, config *configuration.Configuration) *command.AppCommand {\n\n\tgetConfigurationCmd := &cobra.Command{\n\t\tUse: \"configuration\",\n\t\tAliases: []string{\n\t\t\t\"config\",\n\t\t\t\"conf\",\n\t\t\t\"cfg\",\n\t\t},\n\t\tShort: \"Provide detail about go-redis-queues configuration\",\n\t\tLong: \"Provide detail about go-redis-queues configuration\",\n\t\tRun: getConfigurationHandler(config),\n\t}\n\n\tcommand := &command.AppCommand{\n\t\tCommand: getConfigurationCmd,\n\t\tConfiguration: config,\n\t\tCtx: ctx,\n\t}\n\n\treturn command\n}", "title": "" }, { "docid": "64e0421f058f3e195f4ce8d4293420cf", "score": "0.5284529", "text": "func createCommand(use, short, long string, functor Command, opts ...*Option) *cobra.Command {\n\tfn := func(parameters ...*Arg) {\n\t\tfunctor(parameters...)\n\t}\n\n\topts = append(opts, configFolderOption)\n\topts = append(opts, configChainFileOption)\n\n\tcommand := createBridgeComm(use, short, long, fn, opts)\n\tAppendOptions(opts, command)\n\treturn command\n}", "title": "" }, { "docid": "a62fd93d5e75a9a15504cf3bec4a0867", "score": "0.52696383", "text": "func (app *commandBuilder) Create() CommandBuilder {\n\treturn createCommandBuilder()\n}", "title": "" }, { "docid": "eee6b536a8df4a0cdaa9d94c067aa6b4", "score": "0.52575916", "text": "func CreateHashTreeBuilderFactory() hashtrees.HashTreeBuilderFactory {\n\tout := hashTreeBuilderFactory{}\n\treturn &out\n}", "title": "" }, { "docid": "bfeffd7d71ad1cc03f5255c5b3579006", "score": "0.52335787", "text": "func ImportCommandFactory() (cli.Command, error) {\n\treturn &ImportCommand{&importOptions{}}, nil\n}", "title": "" }, { "docid": "3726c64c0c2d3734d4f0f16367ee21a9", "score": "0.5197606", "text": "func newCreateCmd(f cmdutil.Factory, out io.Writer, errOut io.Writer) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"creates various entities managed by the Ziti Edge Controller\",\n\t\tLong: \"Creates various entities managed by the Ziti Edge Controller\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tcmdhelper.CheckErr(cmd.Help())\n\t\t},\n\t}\n\n\tcmd.AddCommand(newCreateAuthenticatorCmd(f, out, errOut))\n\tcmd.AddCommand(newCreateCaCmd(f, out, errOut))\n\tcmd.AddCommand(newCreateConfigCmd(f, out, errOut))\n\tcmd.AddCommand(newCreateConfigTypeCmd(f, out, errOut))\n\tcmd.AddCommand(newCreateEdgeRouterCmd(f, out, errOut))\n\tcmd.AddCommand(newCreateEdgeRouterPolicyCmd(f, out, errOut))\n\tcmd.AddCommand(newCreateTerminatorCmd(f, out, errOut))\n\tcmd.AddCommand(newCreateIdentityCmd(f, out, errOut))\n\tcmd.AddCommand(newCreateServiceCmd(f, out, errOut))\n\tcmd.AddCommand(newCreateServiceEdgeRouterPolicyCmd(f, out, errOut))\n\tcmd.AddCommand(newCreateServicePolicyCmd(out, errOut))\n\tcmd.AddCommand(newCreatePostureCheckCmd(out, errOut))\n\n\treturn cmd\n}", "title": "" }, { "docid": "a00dbe4d3af0069d984d3408468007c0", "score": "0.51744795", "text": "func (app *mainCommandBuilder) Create() MainCommandBuilder {\n\treturn createMainCommandBuilder()\n}", "title": "" }, { "docid": "c13dc483a8531cdbbe9918fe1db28582", "score": "0.51642776", "text": "func NewBrokerCreateCommand(p *commands.KnParams) *cobra.Command {\n\n\tvar className string\n\n\tvar deliveryFlags DeliveryOptionFlags\n\tvar configFlags ConfigFlags\n\tcmd := &cobra.Command{\n\t\tUse: \"create NAME\",\n\t\tShort: \"Create a broker\",\n\t\tExample: createExample,\n\t\tRunE: func(cmd *cobra.Command, args []string) (err error) {\n\t\t\tif len(args) != 1 {\n\t\t\t\treturn errors.New(\"'broker create' requires the broker name given as single argument\")\n\t\t\t}\n\t\t\tname := args[0]\n\n\t\t\tnamespace, err := p.GetNamespace(cmd)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\teventingClient, err := p.NewEventingClient(namespace)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tdynamicClient, err := p.NewDynamicClient(namespace)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tdestination, err := deliveryFlags.GetDlSink(cmd, dynamicClient, namespace)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tbackoffPolicy := v1.BackoffPolicyType(deliveryFlags.BackoffPolicy)\n\n\t\t\tvar configReference *duckv1.KReference\n\n\t\t\tif cmd.Flags().Changed(\"broker-config\") {\n\t\t\t\tif !cmd.Flags().Changed(\"class\") {\n\t\t\t\t\treturn fmt.Errorf(\"cannot set broker-config without setting class\")\n\t\t\t\t}\n\n\t\t\t\tconfigReference, err = configFlags.GetBrokerConfigReference()\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tbrokerBuilder := clientv1beta1.\n\t\t\t\tNewBrokerBuilder(name).\n\t\t\t\tNamespace(namespace).\n\t\t\t\tClass(className).\n\t\t\t\tDlSink(destination).\n\t\t\t\tRetry(&deliveryFlags.RetryCount).\n\t\t\t\tTimeout(&deliveryFlags.Timeout).\n\t\t\t\tBackoffPolicy(&backoffPolicy).\n\t\t\t\tBackoffDelay(&deliveryFlags.BackoffDelay).\n\t\t\t\tRetryAfterMax(&deliveryFlags.RetryAfterMax).\n\t\t\t\tConfig(configReference)\n\n\t\t\terr = eventingClient.CreateBroker(cmd.Context(), brokerBuilder.Build())\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\n\t\t\t\t\t\"cannot create broker '%s' in namespace '%s' \"+\n\t\t\t\t\t\t\"because: %s\", name, namespace, err)\n\t\t\t}\n\t\t\tfmt.Fprintf(cmd.OutOrStdout(), \"Broker '%s' successfully created in namespace '%s'.\\n\", args[0], namespace)\n\t\t\treturn nil\n\t\t},\n\t}\n\tcommands.AddNamespaceFlags(cmd.Flags(), false)\n\tcmd.Flags().StringVar(&className, \"class\", \"\", \"Broker class like 'MTChannelBasedBroker' or 'Kafka' (if available).\")\n\tconfigFlags.Add(cmd)\n\tdeliveryFlags.Add(cmd)\n\treturn cmd\n}", "title": "" }, { "docid": "dd46547f693f21069971a67d565fdc55", "score": "0.5143924", "text": "func NewEventtypeCreateCommand(p *commands.KnParams) *cobra.Command {\n\n\tvar eventtypeFlags knflags.EventtypeFlags\n\n\treferenceFlag := knflags.NewSinkFlag(referenceMappings)\n\n\tcmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create eventtype\",\n\t\tExample: createExample,\n\t\tRunE: func(cmd *cobra.Command, args []string) (err error) {\n\t\t\tif len(args) != 1 {\n\t\t\t\treturn errors.New(\"'eventtype create' requires the eventtype name given as single argument\")\n\t\t\t}\n\t\t\tname := args[0]\n\n\t\t\tif eventtypeFlags.Broker != \"\" && referenceFlag.Sink != \"\" {\n\t\t\t\treturn errors.New(\"use only one of '--broker' or '--reference' flags\")\n\t\t\t}\n\n\t\t\tnamespace, err := p.GetNamespace(cmd)\n\t\t\tif err != nil {\n\t\t\t\treturn eventtypeCreateError(name, namespace, err)\n\t\t\t}\n\n\t\t\teventingV1Beta2Client, err := p.NewEventingV1beta2Client(namespace)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tdynamicClient, err := p.NewDynamicClient(namespace)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tvar source *apis.URL\n\n\t\t\tif eventtypeFlags.Source != \"\" {\n\t\t\t\tsource, err = apis.ParseURL(eventtypeFlags.Source)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn eventtypeCreateError(name, namespace, err)\n\t\t\t\t}\n\t\t\t}\n\t\t\tetBuilder := clienteventingv1beta2.NewEventtypeBuilder(name).\n\t\t\t\tNamespace(namespace).\n\t\t\t\tType(eventtypeFlags.Type).\n\t\t\t\tSource(source)\n\n\t\t\tif eventtypeFlags.Broker != \"\" {\n\t\t\t\tetBuilder.Broker(eventtypeFlags.Broker)\n\t\t\t}\n\n\t\t\tif referenceFlag.Sink != \"\" {\n\t\t\t\tdest, err := referenceFlag.ResolveSink(cmd.Context(), dynamicClient, namespace)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn eventtypeCreateError(name, namespace, err)\n\t\t\t\t}\n\t\t\t\tetBuilder.Reference(dest.Ref)\n\t\t\t}\n\t\t\terr = eventingV1Beta2Client.CreateEventtype(cmd.Context(), etBuilder.Build())\n\t\t\tif err != nil {\n\t\t\t\treturn eventtypeCreateError(name, namespace, err)\n\t\t\t}\n\t\t\tfmt.Fprintf(cmd.OutOrStdout(), \"Eventtype '%s' successfully created in namespace '%s'.\\n\", args[0], namespace)\n\t\t\treturn nil\n\t\t},\n\t}\n\tcommands.AddNamespaceFlags(cmd.Flags(), false)\n\n\treferenceFlag.AddWithFlagName(cmd, \"reference\", \"r\")\n\tflag := \"reference\"\n\tcmd.Flag(flag).Usage = \"Addressable Reference producing events. \" +\n\t\t\"You can specify a broker, channel, or fully qualified GroupVersionResource (GVR). \" +\n\t\t\"Examples: '--\" + flag + \" broker:nest' for a broker 'nest', \" +\n\t\t\"'--\" + flag + \" channel:pipe' for a channel 'pipe', \" +\n\t\t\"'--\" + flag + \" special.eventing.dev/v1alpha1/channels:pipe' for GroupVersionResource of v1alpha1 'pipe'.\"\n\teventtypeFlags.Add(cmd)\n\treturn cmd\n}", "title": "" }, { "docid": "d9328a2951da8ef42fa8b0811cec2d06", "score": "0.51390755", "text": "func ClustersCreateBuilder() *cobra.Command {\n\topts := &ClustersCreateOpts{\n\t\tfs: afero.NewOsFs(),\n\t}\n\tcmd := &cobra.Command{\n\t\tUse: \"create [name]\",\n\t\tShort: description.CreateCluster,\n\t\tLong: description.CreateClusterLong,\n\t\tExample: ` \n Deploy a 3 members replica set in AWS\n $ mongocli atlas cluster create <clusterName> --projectId <projectId> --provider AWS --region US_EAST_1 --members 3 --tier M10 --mdbVersion 4.2 --diskSizeGB 10\n\n Deploy a 3 members replica set in AZURE\n $ mongocli atlas cluster create <clusterName> --projectId <projectId> --provider AZURE --region US_EAST_2 --members 3 --tier M10 --mdbVersion 4.2 --diskSizeGB 10\n \n Deploy a 3 members replica set in GCP\n $ mongocli atlas cluster create <clusterName> --projectId <projectId> --provider GCP --region EASTERN_US --members 3 --tier M10 --mdbVersion 4.2 --diskSizeGB 10\n\n Deploy a cluster from a config file\n $ mongocli atlas cluster create --projectId <projectId> --file <path/to/cluster.json>\n`,\n\t\tArgs: cobra.MaximumNArgs(1),\n\t\tPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif opts.filename == \"\" {\n\t\t\t\t_ = cmd.MarkFlagRequired(flag.Provider)\n\t\t\t\t_ = cmd.MarkFlagRequired(flag.Region)\n\n\t\t\t\tif len(args) == 0 {\n\t\t\t\t\treturn errors.New(\"cluster name missing\")\n\t\t\t\t}\n\t\t\t}\n\t\t\tif len(args) != 0 {\n\t\t\t\topts.name = args[0]\n\t\t\t}\n\t\t\treturn opts.PreRunE(opts.initStore)\n\t\t},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn opts.Run()\n\t\t},\n\t}\n\n\tcmd.Flags().StringVar(&opts.provider, flag.Provider, \"\", usage.Provider)\n\tcmd.Flags().StringVarP(&opts.region, flag.Region, flag.RegionShort, \"\", usage.Region)\n\tcmd.Flags().Int64VarP(&opts.members, flag.Members, flag.MembersShort, 3, usage.Members)\n\tcmd.Flags().StringVar(&opts.tier, flag.Tier, atlasM2, usage.Tier)\n\tcmd.Flags().Float64Var(&opts.diskSizeGB, flag.DiskSizeGB, 2, usage.DiskSizeGB)\n\tcmd.Flags().StringVar(&opts.mdbVersion, flag.MDBVersion, currentMDBVersion, usage.MDBVersion)\n\tcmd.Flags().BoolVar(&opts.backup, flag.Backup, false, usage.Backup)\n\tcmd.Flags().StringVarP(&opts.filename, flag.File, flag.FileShort, \"\", usage.Filename)\n\tcmd.Flags().StringVar(&opts.clusterType, flag.Type, replicaSet, usage.ClusterTypes)\n\tcmd.Flags().Int64VarP(&opts.shards, flag.Shards, flag.ShardsShort, 1, usage.Shards)\n\n\tcmd.Flags().StringVar(&opts.ProjectID, flag.ProjectID, \"\", usage.ProjectID)\n\n\t_ = cmd.MarkFlagFilename(flag.File)\n\n\treturn cmd\n}", "title": "" }, { "docid": "243435edf3c5e9aebc85d2def1aaba15", "score": "0.5113903", "text": "func (c *DefaultCommandFactory) Create(container *libcontainer.Container, console string, pipe *os.File, args []string) *exec.Cmd {\n\t// get our binary name from arg0 so we can always reexec ourself\n\tcommand := exec.Command(os.Args[0], append([]string{\n\t\t\"-console\", console,\n\t\t\"-pipe\", \"3\",\n\t\t\"-root\", c.Root,\n\t\t\"init\"}, args...)...)\n\n\tsystem.SetCloneFlags(command, uintptr(GetNamespaceFlags(container.Namespaces)))\n\tcommand.Env = container.Env\n\tcommand.ExtraFiles = []*os.File{pipe}\n\treturn command\n}", "title": "" }, { "docid": "bdc7c558900d2c8ab2dbd4f7c2aaf1a3", "score": "0.5095287", "text": "func NewCreateCommand(parent common.Registerer, globals *config.Data) *CreateCommand {\n\tvar c CreateCommand\n\tc.Globals = globals\n\tc.manifest.File.Read(manifest.Filename)\n\tc.CmdClause = parent.Command(\"create\", \"Create a Syslog logging endpoint on a Fastly service version\").Alias(\"add\")\n\n\tc.CmdClause.Flag(\"name\", \"The name of the Syslog logging object. Used as a primary key for API access\").Short('n').Required().StringVar(&c.Input.Name)\n\tc.CmdClause.Flag(\"service-id\", \"Service ID\").Short('s').StringVar(&c.manifest.Flag.ServiceID)\n\tc.CmdClause.Flag(\"version\", \"Number of service version\").Required().IntVar(&c.Input.Version)\n\n\tc.CmdClause.Flag(\"address\", \"A hostname or IPv4 address\").Required().StringVar(&c.Input.Address)\n\n\tc.CmdClause.Flag(\"port\", \"The port number\").UintVar(&c.Input.Port)\n\tc.CmdClause.Flag(\"use-tls\", \"Whether to use TLS for secure logging. Can be either true or false\").BoolVar(&c.useTLS)\n\tc.CmdClause.Flag(\"tls-ca-cert\", \"A secure certificate to authenticate the server with. Must be in PEM format\").StringVar(&c.Input.TLSCACert)\n\tc.CmdClause.Flag(\"tls-hostname\", \"Used during the TLS handshake to validate the certificate\").StringVar(&c.Input.TLSHostname)\n\tc.CmdClause.Flag(\"tls-client-cert\", \"The client certificate used to make authenticated requests. Must be in PEM format\").StringVar(&c.Input.TLSClientCert)\n\tc.CmdClause.Flag(\"tls-client-key\", \"The client private key used to make authenticated requests. Must be in PEM format\").StringVar(&c.Input.TLSClientKey)\n\tc.CmdClause.Flag(\"auth-token\", \"Whether to prepend each message with a specific token\").StringVar(&c.Input.Token)\n\tc.CmdClause.Flag(\"format\", \"Apache style log formatting\").StringVar(&c.Input.Format)\n\tc.CmdClause.Flag(\"format-version\", \"The version of the custom logging format used for the configured endpoint. Can be either 2 (default) or 1\").UintVar(&c.Input.FormatVersion)\n\tc.CmdClause.Flag(\"message-type\", \"How the message should be formatted. One of: classic (default), loggly, logplex or blank\").StringVar(&c.Input.MessageType)\n\tc.CmdClause.Flag(\"response-condition\", \"The name of an existing condition in the configured endpoint, or leave blank to always execute\").StringVar(&c.Input.ResponseCondition)\n\tc.CmdClause.Flag(\"placement\", \"Where in the generated VCL the logging call should be placed, overriding any format_version default. Can be none or waf_debug\").StringVar(&c.Input.Placement)\n\n\treturn &c\n}", "title": "" }, { "docid": "1703082d34365067ed10978439c05d9c", "score": "0.5081132", "text": "func NewCreateCommand() *CreateCommand {\n\n\treturn &CreateCommand{\n\t\tBaseCommand{\n\t\t\tName: \"create\",\n\t\t\tUsage: \"create a CD Pipeline\",\n\t\t\tDescription: \"Create a CI/CD Pipeline\",\n\t\t\tArgsUsage: \"<pipeline>\",\n\t\t},\n\t}\n}", "title": "" }, { "docid": "de796d3fece69e68885c07e22d7b6d24", "score": "0.50798595", "text": "func NewDataSourceBuilderFactoryFromConfig(dbConfig map[string]interface{}) (physical.DataSourceBuilderFactory, error) {\n\treturn NewDataSourceBuilderFactory(), nil\n}", "title": "" }, { "docid": "de796d3fece69e68885c07e22d7b6d24", "score": "0.50798595", "text": "func NewDataSourceBuilderFactoryFromConfig(dbConfig map[string]interface{}) (physical.DataSourceBuilderFactory, error) {\n\treturn NewDataSourceBuilderFactory(), nil\n}", "title": "" }, { "docid": "de796d3fece69e68885c07e22d7b6d24", "score": "0.50798595", "text": "func NewDataSourceBuilderFactoryFromConfig(dbConfig map[string]interface{}) (physical.DataSourceBuilderFactory, error) {\n\treturn NewDataSourceBuilderFactory(), nil\n}", "title": "" }, { "docid": "7864909a312552e4bfce07e44cb8a41c", "score": "0.5051657", "text": "func testCreateBuilder(t *testing.T, when spec.G, it spec.S) {\n\twhen(\"#BuilderFactory\", func() {\n\t\tvar (\n\t\t\tmockController *gomock.Controller\n\t\t\tmockDocker *mocks.MockDocker\n\t\t\tmockImages *mocks.MockImages\n\t\t\tfactory pack.BuilderFactory\n\t\t\tbuf bytes.Buffer\n\t\t)\n\t\tit.Before(func() {\n\t\t\tmockController = gomock.NewController(t)\n\t\t\tmockDocker = mocks.NewMockDocker(mockController)\n\t\t\tmockImages = mocks.NewMockImages(mockController)\n\n\t\t\tpackHome, err := ioutil.TempDir(\"\", \".pack\")\n\t\t\tif err != nil {\n\t\t\t\tt.Fatalf(\"failed to create temp homedir: %v\", err)\n\t\t\t}\n\t\t\th.ConfigurePackHome(t, packHome, \"0000\")\n\t\t\tcfg, err := config.New(packHome)\n\t\t\tif err != nil {\n\t\t\t\tt.Fatalf(\"failed to create config: %v\", err)\n\t\t\t}\n\t\t\tif err = cfg.Add(config.Stack{\n\t\t\t\tID: \"some.default.stack\",\n\t\t\t\tBuildImages: []string{\"default/build\", \"registry.com/build/image\"},\n\t\t\t\tRunImages: []string{\"default/run\"},\n\t\t\t}); err != nil {\n\t\t\t\tt.Fatalf(\"failed to create config: %v\", err)\n\t\t\t}\n\t\t\tif err = cfg.Add(config.Stack{ID: \"some.other.stack\",\n\t\t\t\tBuildImages: []string{\"other/build\"},\n\t\t\t\tRunImages: []string{\"other/run\"},\n\t\t\t}); err != nil {\n\t\t\t\tt.Fatalf(\"failed to create config: %v\", err)\n\t\t\t}\n\t\t\tif err = cfg.SetDefaultStack(\"some.default.stack\"); err != nil {\n\t\t\t\tt.Fatalf(\"failed to create config: %v\", err)\n\t\t\t}\n\n\t\t\tfactory = pack.BuilderFactory{\n\t\t\t\tFS: &fs.FS{},\n\t\t\t\tDocker: mockDocker,\n\t\t\t\tLog: log.New(&buf, \"\", log.LstdFlags),\n\t\t\t\tConfig: cfg,\n\t\t\t\tImages: mockImages,\n\t\t\t}\n\t\t})\n\n\t\tit.After(func() {\n\t\t\tmockController.Finish()\n\t\t})\n\n\t\twhen(\"#BuilderConfigFromFlags\", func() {\n\t\t\tit(\"uses default stack build image as base image\", func() {\n\t\t\t\tmockBaseImage := mocks.NewMockV1Image(mockController)\n\t\t\t\tmockImageStore := mocks.NewMockStore(mockController)\n\t\t\t\tmockDocker.EXPECT().PullImage(\"default/build\")\n\t\t\t\tmockImages.EXPECT().ReadImage(\"default/build\", true).Return(mockBaseImage, nil)\n\t\t\t\tmockImages.EXPECT().RepoStore(\"some/image\", true).Return(mockImageStore, nil)\n\n\t\t\t\tconfig, err := factory.BuilderConfigFromFlags(pack.CreateBuilderFlags{\n\t\t\t\t\tRepoName: \"some/image\",\n\t\t\t\t\tBuilderTomlPath: filepath.Join(\"testdata\", \"builder.toml\"),\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatalf(\"error creating builder config: %s\", err)\n\t\t\t\t}\n\t\t\t\th.AssertSameInstance(t, config.BaseImage, mockBaseImage)\n\t\t\t\th.AssertSameInstance(t, config.Repo, mockImageStore)\n\t\t\t\tcheckBuildpacks(t, config.Buildpacks)\n\t\t\t\tcheckGroups(t, config.Groups)\n\t\t\t\th.AssertEq(t, config.BuilderDir, \"testdata\")\n\t\t\t\th.AssertEq(t, config.RepoName, \"some/image\")\n\t\t\t})\n\n\t\t\tit(\"select the build image with matching registry\", func() {\n\t\t\t\tmockBaseImage := mocks.NewMockV1Image(mockController)\n\t\t\t\tmockImageStore := mocks.NewMockStore(mockController)\n\t\t\t\tmockDocker.EXPECT().PullImage(\"registry.com/build/image\")\n\t\t\t\tmockImages.EXPECT().ReadImage(\"registry.com/build/image\", true).Return(mockBaseImage, nil)\n\t\t\t\tmockImages.EXPECT().RepoStore(\"registry.com/some/image\", true).Return(mockImageStore, nil)\n\n\t\t\t\tconfig, err := factory.BuilderConfigFromFlags(pack.CreateBuilderFlags{\n\t\t\t\t\tRepoName: \"registry.com/some/image\",\n\t\t\t\t\tBuilderTomlPath: filepath.Join(\"testdata\", \"builder.toml\"),\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatalf(\"error creating builder config: %s\", err)\n\t\t\t\t}\n\t\t\t\th.AssertSameInstance(t, config.BaseImage, mockBaseImage)\n\t\t\t\th.AssertSameInstance(t, config.Repo, mockImageStore)\n\t\t\t\tcheckBuildpacks(t, config.Buildpacks)\n\t\t\t\tcheckGroups(t, config.Groups)\n\t\t\t\th.AssertEq(t, config.BuilderDir, \"testdata\")\n\t\t\t\th.AssertEq(t, config.RepoName, \"registry.com/some/image\")\n\t\t\t})\n\n\t\t\tit(\"doesn't pull base a new image when --no-pull flag is provided\", func() {\n\t\t\t\tmockBaseImage := mocks.NewMockV1Image(mockController)\n\t\t\t\tmockImageStore := mocks.NewMockStore(mockController)\n\t\t\t\tmockImages.EXPECT().ReadImage(\"default/build\", true).Return(mockBaseImage, nil)\n\t\t\t\tmockImages.EXPECT().RepoStore(\"some/image\", true).Return(mockImageStore, nil)\n\n\t\t\t\tconfig, err := factory.BuilderConfigFromFlags(pack.CreateBuilderFlags{\n\t\t\t\t\tRepoName: \"some/image\",\n\t\t\t\t\tBuilderTomlPath: filepath.Join(\"testdata\", \"builder.toml\"),\n\t\t\t\t\tNoPull: true,\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatalf(\"error creating builder config: %s\", err)\n\t\t\t\t}\n\t\t\t\th.AssertSameInstance(t, config.BaseImage, mockBaseImage)\n\t\t\t\th.AssertSameInstance(t, config.Repo, mockImageStore)\n\t\t\t\tcheckBuildpacks(t, config.Buildpacks)\n\t\t\t\tcheckGroups(t, config.Groups)\n\t\t\t\th.AssertEq(t, config.BuilderDir, \"testdata\")\n\t\t\t})\n\n\t\t\tit(\"fails if the base image cannot be found\", func() {\n\t\t\t\tmockImages.EXPECT().ReadImage(\"default/build\", true).Return(nil, nil)\n\n\t\t\t\t_, err := factory.BuilderConfigFromFlags(pack.CreateBuilderFlags{\n\t\t\t\t\tRepoName: \"some/image\",\n\t\t\t\t\tBuilderTomlPath: filepath.Join(\"testdata\", \"builder.toml\"),\n\t\t\t\t\tNoPull: true,\n\t\t\t\t})\n\t\t\t\tif err == nil {\n\t\t\t\t\tt.Fatalf(\"Expected error when base image is missing from daemon\")\n\t\t\t\t}\n\t\t\t})\n\n\t\t\tit(\"fails if the base image cannot be pulled\", func() {\n\t\t\t\tmockDocker.EXPECT().PullImage(\"default/build\").Return(fmt.Errorf(\"some-error\"))\n\n\t\t\t\t_, err := factory.BuilderConfigFromFlags(pack.CreateBuilderFlags{\n\t\t\t\t\tRepoName: \"some/image\",\n\t\t\t\t\tBuilderTomlPath: filepath.Join(\"testdata\", \"builder.toml\"),\n\t\t\t\t})\n\t\t\t\tif err == nil {\n\t\t\t\t\tt.Fatalf(\"Expected error when base image is missing from daemon\")\n\t\t\t\t}\n\t\t\t})\n\n\t\t\tit(\"fails if there is no build image for the stack\", func() {\n\t\t\t\tfactory.Config = &config.Config{\n\t\t\t\t\tDefaultStackID: \"some.bad.stack\",\n\t\t\t\t\tStacks: []config.Stack{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tID: \"some.bad.stack\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\t\t_, err := factory.BuilderConfigFromFlags(pack.CreateBuilderFlags{\n\t\t\t\t\tRepoName: \"some/image\",\n\t\t\t\t\tBuilderTomlPath: filepath.Join(\"testdata\", \"builder.toml\"),\n\t\t\t\t\tNoPull: true,\n\t\t\t\t})\n\t\t\t\th.AssertError(t, err, `Invalid stack: stack \"some.bad.stack\" requires at least one build image`)\n\t\t\t})\n\n\t\t\tit(\"uses the build image that matches the repoName registry\", func() {})\n\n\t\t\twhen(\"-s flag is provided\", func() {\n\t\t\t\tit(\"used the build image from the selected stack\", func() {\n\t\t\t\t\tmockBaseImage := mocks.NewMockV1Image(mockController)\n\t\t\t\t\tmockImageStore := mocks.NewMockStore(mockController)\n\t\t\t\t\tmockDocker.EXPECT().PullImage(\"other/build\")\n\t\t\t\t\tmockImages.EXPECT().ReadImage(\"other/build\", true).Return(mockBaseImage, nil)\n\t\t\t\t\tmockImages.EXPECT().RepoStore(\"some/image\", true).Return(mockImageStore, nil)\n\n\t\t\t\t\tconfig, err := factory.BuilderConfigFromFlags(pack.CreateBuilderFlags{\n\t\t\t\t\t\tRepoName: \"some/image\",\n\t\t\t\t\t\tBuilderTomlPath: filepath.Join(\"testdata\", \"builder.toml\"),\n\t\t\t\t\t\tStackID: \"some.other.stack\",\n\t\t\t\t\t})\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tt.Fatalf(\"error creating builder config: %s\", err)\n\t\t\t\t\t}\n\t\t\t\t\th.AssertSameInstance(t, config.BaseImage, mockBaseImage)\n\t\t\t\t\th.AssertSameInstance(t, config.Repo, mockImageStore)\n\t\t\t\t\tcheckBuildpacks(t, config.Buildpacks)\n\t\t\t\t\tcheckGroups(t, config.Groups)\n\t\t\t\t})\n\n\t\t\t\tit(\"fails if the provided stack id does not exist\", func() {\n\t\t\t\t\t_, err := factory.BuilderConfigFromFlags(pack.CreateBuilderFlags{\n\t\t\t\t\t\tRepoName: \"some/image\",\n\t\t\t\t\t\tBuilderTomlPath: filepath.Join(\"testdata\", \"builder.toml\"),\n\t\t\t\t\t\tNoPull: true,\n\t\t\t\t\t\tStackID: \"some.missing.stack\",\n\t\t\t\t\t})\n\t\t\t\t\th.AssertError(t, err, `Missing stack: stack with id \"some.missing.stack\" not found in pack config.toml`)\n\t\t\t\t})\n\t\t\t})\n\n\t\t\twhen(\"--publish is passed\", func() {\n\t\t\t\tit(\"uses a registry store and doesn't pull base image\", func() {\n\t\t\t\t\tmockBaseImage := mocks.NewMockV1Image(mockController)\n\t\t\t\t\tmockImageStore := mocks.NewMockStore(mockController)\n\t\t\t\t\tmockImages.EXPECT().ReadImage(\"default/build\", false).Return(mockBaseImage, nil)\n\t\t\t\t\tmockImages.EXPECT().RepoStore(\"some/image\", false).Return(mockImageStore, nil)\n\n\t\t\t\t\tconfig, err := factory.BuilderConfigFromFlags(pack.CreateBuilderFlags{\n\t\t\t\t\t\tRepoName: \"some/image\",\n\t\t\t\t\t\tBuilderTomlPath: filepath.Join(\"testdata\", \"builder.toml\"),\n\t\t\t\t\t\tPublish: true,\n\t\t\t\t\t})\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tt.Fatalf(\"error creating builder config: %s\", err)\n\t\t\t\t\t}\n\t\t\t\t\th.AssertSameInstance(t, config.BaseImage, mockBaseImage)\n\t\t\t\t\th.AssertSameInstance(t, config.Repo, mockImageStore)\n\t\t\t\t\tcheckBuildpacks(t, config.Buildpacks)\n\t\t\t\t\tcheckGroups(t, config.Groups)\n\t\t\t\t\th.AssertEq(t, config.BuilderDir, \"testdata\")\n\t\t\t\t})\n\t\t\t})\n\t\t})\n\n\t\twhen(\"#Create\", func() {\n\t\t\twhen(\"successful\", func() {\n\t\t\t\tit(\"logs usage tip\", func() {\n\t\t\t\t\tmockBaseImage := mocks.NewMockV1Image(mockController)\n\t\t\t\t\tmockImageStore := mocks.NewMockStore(mockController)\n\n\t\t\t\t\tmockBaseImage.EXPECT().Manifest().Return(&v1.Manifest{}, nil)\n\t\t\t\t\tmockBaseImage.EXPECT().ConfigFile().Return(&v1.ConfigFile{}, nil)\n\t\t\t\t\tmockImageStore.EXPECT().Write(gomock.Any())\n\n\t\t\t\t\terr := factory.Create(pack.BuilderConfig{\n\t\t\t\t\t\tRepoName: \"myorg/mybuilder\",\n\t\t\t\t\t\tRepo: mockImageStore,\n\t\t\t\t\t\tBuildpacks: []pack.Buildpack{},\n\t\t\t\t\t\tGroups: []lifecycle.BuildpackGroup{},\n\t\t\t\t\t\tBaseImage: mockBaseImage,\n\t\t\t\t\t\tBuilderDir: \"\",\n\t\t\t\t\t})\n\t\t\t\t\th.AssertNil(t, err)\n\n\t\t\t\t\th.AssertContains(t, buf.String(), \"Successfully created builder image: myorg/mybuilder\")\n\t\t\t\t\th.AssertContains(t, buf.String(), `Tip: Run \"pack build <image name> --builder <builder image> --path <app source code>\" to use this builder`)\n\t\t\t\t})\n\t\t\t})\n\t\t})\n\t\twhen(\"a buildpack location uses no scheme uris\", func() {\n\t\t\tit(\"supports relative directories as well as archives\", func() {\n\t\t\t\tmockBaseImage := mocks.NewMockV1Image(mockController)\n\t\t\t\tmockImageStore := mocks.NewMockStore(mockController)\n\n\t\t\t\tmockImages.EXPECT().ReadImage(\"default/build\", true).Return(mockBaseImage, nil)\n\t\t\t\tmockImages.EXPECT().RepoStore(\"myorg/mybuilder\", true).Return(mockImageStore, nil)\n\n\t\t\t\tflags := pack.CreateBuilderFlags{\n\t\t\t\t\tRepoName: \"myorg/mybuilder\",\n\t\t\t\t\tBuilderTomlPath: \"testdata/used-to-test-various-uri-schemes/builder-with-schemeless-uris.toml\",\n\t\t\t\t\tStackID: \"some.default.stack\",\n\t\t\t\t\tPublish: false,\n\t\t\t\t\tNoPull: true,\n\t\t\t\t}\n\n\t\t\t\tbuilderConfig, err := factory.BuilderConfigFromFlags(flags)\n\t\t\t\th.AssertNil(t, err)\n\n\t\t\t\th.AssertDirContainsFileWithContents(t, builderConfig.Buildpacks[0].Dir, \"bin/detect\", \"I come from a directory\")\n\t\t\t\th.AssertDirContainsFileWithContents(t, builderConfig.Buildpacks[1].Dir, \"bin/build\", \"I come from an archive\")\n\t\t\t})\n\t\t\tit(\"supports absolute directories as well as archives\", func() {\n\t\t\t\tmockBaseImage := mocks.NewMockV1Image(mockController)\n\t\t\t\tmockImageStore := mocks.NewMockStore(mockController)\n\n\t\t\t\tmockImages.EXPECT().ReadImage(\"default/build\", true).Return(mockBaseImage, nil)\n\t\t\t\tmockImages.EXPECT().RepoStore(\"myorg/mybuilder\", true).Return(mockImageStore, nil)\n\n\t\t\t\tabsPath, err := filepath.Abs(\"testdata/used-to-test-various-uri-schemes/buildpack\")\n\t\t\t\th.AssertNil(t, err)\n\n\t\t\t\tf, err := ioutil.TempFile(\"\", \"*.toml\")\n\t\t\t\th.AssertNil(t, err)\n\t\t\t\tioutil.WriteFile(f.Name(), []byte(fmt.Sprintf(`[[buildpacks]]\nid = \"some.bp.with.no.uri.scheme\"\nuri = \"%s\"\n\n[[buildpacks]]\nid = \"some.bp.with.no.uri.scheme.and.tgz\"\nuri = \"%s.tgz\"\n\n[[groups]]\nbuildpacks = [\n { id = \"some.bp.with.no.uri.scheme\", version = \"1.2.3\" },\n { id = \"some.bp.with.no.uri.scheme.and.tgz\", version = \"1.2.4\" },\n]\n\n[[groups]]\nbuildpacks = [\n { id = \"some.bp1\", version = \"1.2.3\" },\n]`, absPath, absPath)), 0644)\n\t\t\t\tf.Name()\n\n\t\t\t\tflags := pack.CreateBuilderFlags{\n\t\t\t\t\tRepoName: \"myorg/mybuilder\",\n\t\t\t\t\tBuilderTomlPath: f.Name(),\n\t\t\t\t\tStackID: \"some.default.stack\",\n\t\t\t\t\tPublish: false,\n\t\t\t\t\tNoPull: true,\n\t\t\t\t}\n\n\t\t\t\tbuilderConfig, err := factory.BuilderConfigFromFlags(flags)\n\t\t\t\th.AssertNil(t, err)\n\n\t\t\t\th.AssertDirContainsFileWithContents(t, builderConfig.Buildpacks[0].Dir, \"bin/detect\", \"I come from a directory\")\n\t\t\t\th.AssertDirContainsFileWithContents(t, builderConfig.Buildpacks[1].Dir, \"bin/build\", \"I come from an archive\")\n\t\t\t})\n\t\t})\n\t\twhen(\"a buildpack location uses file:// uris\", func() {\n\t\t\tit(\"supports absolute directories as well as archives\", func() {\n\t\t\t\tmockBaseImage := mocks.NewMockV1Image(mockController)\n\t\t\t\tmockImageStore := mocks.NewMockStore(mockController)\n\n\t\t\t\tmockImages.EXPECT().ReadImage(\"default/build\", true).Return(mockBaseImage, nil)\n\t\t\t\tmockImages.EXPECT().RepoStore(\"myorg/mybuilder\", true).Return(mockImageStore, nil)\n\n\t\t\t\tabsPath, err := filepath.Abs(\"testdata/used-to-test-various-uri-schemes/buildpack\")\n\t\t\t\th.AssertNil(t, err)\n\n\t\t\t\tf, err := ioutil.TempFile(\"\", \"*.toml\")\n\t\t\t\th.AssertNil(t, err)\n\t\t\t\tioutil.WriteFile(f.Name(), []byte(fmt.Sprintf(`[[buildpacks]]\nid = \"some.bp.with.no.uri.scheme\"\nuri = \"file://%s\"\n\n[[buildpacks]]\nid = \"some.bp.with.no.uri.scheme.and.tgz\"\nuri = \"file://%s.tgz\"\n\n[[groups]]\nbuildpacks = [\n { id = \"some.bp.with.no.uri.scheme\", version = \"1.2.3\" },\n { id = \"some.bp.with.no.uri.scheme.and.tgz\", version = \"1.2.4\" },\n]\n\n[[groups]]\nbuildpacks = [\n { id = \"some.bp1\", version = \"1.2.3\" },\n]`, absPath, absPath)), 0644)\n\t\t\t\tf.Name()\n\n\t\t\t\tflags := pack.CreateBuilderFlags{\n\t\t\t\t\tRepoName: \"myorg/mybuilder\",\n\t\t\t\t\tBuilderTomlPath: f.Name(),\n\t\t\t\t\tStackID: \"some.default.stack\",\n\t\t\t\t\tPublish: false,\n\t\t\t\t\tNoPull: true,\n\t\t\t\t}\n\n\t\t\t\tbuilderConfig, err := factory.BuilderConfigFromFlags(flags)\n\t\t\t\th.AssertNil(t, err)\n\n\t\t\t\th.AssertDirContainsFileWithContents(t, builderConfig.Buildpacks[0].Dir, \"bin/detect\", \"I come from a directory\")\n\t\t\t\th.AssertDirContainsFileWithContents(t, builderConfig.Buildpacks[1].Dir, \"bin/build\", \"I come from an archive\")\n\t\t\t})\n\t\t})\n\t\twhen(\"a buildpack location uses http(s):// uris\", func() {\n\t\t\tvar (\n\t\t\t\tserver *http.Server\n\t\t\t)\n\t\t\tit.Before(func() {\n\t\t\t\tport := 1024 + rand.Int31n(65536-1024)\n\t\t\t\tfs := http.FileServer(http.Dir(\"testdata\"))\n\t\t\t\tserver = &http.Server{Addr: fmt.Sprintf(\"127.0.0.1:%d\", port), Handler: fs}\n\t\t\t\tgo func() {\n\t\t\t\t\terr := server.ListenAndServe()\n\t\t\t\t\tif err != http.ErrServerClosed {\n\t\t\t\t\t\tt.Fatalf(\"could not create http server: %v\", err)\n\t\t\t\t\t}\n\t\t\t\t}()\n\t\t\t\tserverReady := false\n\t\t\t\tfor i := 0; i < 10; i++ {\n\t\t\t\t\tresp, err := http.Get(fmt.Sprintf(\"http://%s/used-to-test-various-uri-schemes/buildpack.tgz\", server.Addr))\n\t\t\t\t\tif err == nil && resp.StatusCode >= 200 && resp.StatusCode < 300 {\n\t\t\t\t\t\tserverReady = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\tfmt.Printf(\"Waiting for server to become ready on %s. Currently %v\\n\", server.Addr, err)\n\t\t\t\t\ttime.Sleep(1 * time.Second)\n\t\t\t\t}\n\t\t\t\tif !serverReady {\n\t\t\t\t\tt.Fatal(\"http server does not seem to be up\")\n\t\t\t\t}\n\t\t\t})\n\t\t\tit(\"downloads and extracts the archive\", func() {\n\t\t\t\tmockBaseImage := mocks.NewMockV1Image(mockController)\n\t\t\t\tmockImageStore := mocks.NewMockStore(mockController)\n\n\t\t\t\tmockImages.EXPECT().ReadImage(\"default/build\", true).Return(mockBaseImage, nil)\n\t\t\t\tmockImages.EXPECT().RepoStore(\"myorg/mybuilder\", true).Return(mockImageStore, nil)\n\n\t\t\t\tf, err := ioutil.TempFile(\"\", \"*.toml\")\n\t\t\t\th.AssertNil(t, err)\n\t\t\t\tioutil.WriteFile(f.Name(), []byte(fmt.Sprintf(`[[buildpacks]]\nid = \"some.bp.with.no.uri.scheme\"\nuri = \"http://%s/used-to-test-various-uri-schemes/buildpack.tgz\"\n\n[[groups]]\nbuildpacks = [\n { id = \"some.bp.with.no.uri.scheme\", version = \"1.2.3\" },\n]\n\n[[groups]]\nbuildpacks = [\n { id = \"some.bp1\", version = \"1.2.3\" },\n]`, server.Addr)), 0644)\n\t\t\t\tf.Name()\n\n\t\t\t\tflags := pack.CreateBuilderFlags{\n\t\t\t\t\tRepoName: \"myorg/mybuilder\",\n\t\t\t\t\tBuilderTomlPath: f.Name(),\n\t\t\t\t\tStackID: \"some.default.stack\",\n\t\t\t\t\tPublish: false,\n\t\t\t\t\tNoPull: true,\n\t\t\t\t}\n\n\t\t\t\tbuilderConfig, err := factory.BuilderConfigFromFlags(flags)\n\t\t\t\th.AssertNil(t, err)\n\n\t\t\t\th.AssertDirContainsFileWithContents(t, builderConfig.Buildpacks[0].Dir, \"bin/build\", \"I come from an archive\")\n\t\t\t})\n\t\t\tit.After(func() {\n\t\t\t\tif server != nil {\n\t\t\t\t\tctx, _ := context.WithTimeout(context.Background(), 2*time.Second)\n\t\t\t\t\tserver.Shutdown(ctx)\n\t\t\t\t}\n\t\t\t})\n\t\t})\n\t})\n}", "title": "" }, { "docid": "4f0735417e1ab534df7625c6c674c686", "score": "0.50402486", "text": "func GetCommandFactory(version int) CommandFactory {\n\treturn factories[version]\n}", "title": "" }, { "docid": "07f5aff6efdfa8e749c0beb909b6bc61", "score": "0.5040004", "text": "func BuildManagerCreateCommand(basePrefix ...string) []string {\n\treturn append(BuildManagerCommand(basePrefix...), CreateCommand)\n}", "title": "" }, { "docid": "a00eaf6999d5330794f5a1a8a83be1d2", "score": "0.50366765", "text": "func CR460ServerCommandFactory() (cli.Command, error) {\n\treturn CR460ServerCommand{}, nil\n}", "title": "" }, { "docid": "7aa19f8420a558bf4afcbdb5d1146e8a", "score": "0.50245607", "text": "func NewCreateCommand(parent common.Registerer, globals *config.Data) *CreateCommand {\n\tvar c CreateCommand\n\tc.Globals = globals\n\tc.manifest.File.Read(manifest.Filename)\n\tc.CmdClause = parent.Command(\"create\", \"Create a Sumologic logging endpoint on a Fastly service version\").Alias(\"add\")\n\n\tc.CmdClause.Flag(\"name\", \"The name of the Sumologic logging object. Used as a primary key for API access\").Short('n').Required().StringVar(&c.Input.Name)\n\tc.CmdClause.Flag(\"service-id\", \"Service ID\").Short('s').StringVar(&c.manifest.Flag.ServiceID)\n\tc.CmdClause.Flag(\"version\", \"Number of service version\").Required().IntVar(&c.Input.Version)\n\n\tc.CmdClause.Flag(\"url\", \"The URL to POST to\").Required().StringVar(&c.Input.URL)\n\tc.CmdClause.Flag(\"format\", \"Apache style log formatting\").StringVar(&c.Input.Format)\n\tc.CmdClause.Flag(\"format-version\", \"The version of the custom logging format used for the configured endpoint. Can be either 2 (the default, version 2 log format) or 1 (the version 1 log format). The logging call gets placed by default in vcl_log if format_version is set to 2 and in vcl_deliver if format_version is set to 1\").IntVar(&c.Input.FormatVersion)\n\tc.CmdClause.Flag(\"response-condition\", \"The name of an existing condition in the configured endpoint, or leave blank to always execute\").StringVar(&c.Input.ResponseCondition)\n\tc.CmdClause.Flag(\"message-type\", \"How the message should be formatted. One of: classic (default), loggly, logplex or blank\").StringVar(&c.Input.MessageType)\n\tc.CmdClause.Flag(\"placement\", \"Where in the generated VCL the logging call should be placed, overriding any format_version default. Can be none or waf_debug. This field is not required and has no default value\").StringVar(&c.Input.Placement)\n\n\treturn &c\n}", "title": "" }, { "docid": "3e990646852d91af107e449679d66d1f", "score": "0.50080776", "text": "func (b *Bot) createCommands() {\n\tguildID := b.cfg.Bot.GuildID\n\tswitch guildID {\n\tcase \"\":\n\t\tlog.Println(\"Creating slash commands globally...\")\n\tdefault:\n\t\tlog.Printf(\"Creating slash commands on guild %v...\\n\", guildID)\n\t}\n\n\tfor _, v := range commands.SlashCommands {\n\t\t_, err := b.discord.ApplicationCommandCreate(b.discord.State.User.ID, guildID, v)\n\t\tlog.Printf(\"Create command %v\\n\", v.Name)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Cannot create '%v' command: %v\", v.Name, err)\n\t\t}\n\t}\n\tlog.Println(\"Slash commands will be available in a few minutes\")\n}", "title": "" }, { "docid": "8f12d1e63c57a76799890871f5551d23", "score": "0.5005468", "text": "func NewCommands(conf config.Config, logger logrus.Ext1FieldLogger) Commands {\n\tproc, dist := pkg.GetFunctionality(conf, logger)\n\treturn &commands{conf: conf, proc: proc, dist: dist}\n}", "title": "" }, { "docid": "fe9d6a68b2d2db2dc078bc9979b0281c", "score": "0.5000429", "text": "func New(command string) Builder {\n\treturn Builder{\n\t\tCommand: command,\n\t}\n}", "title": "" }, { "docid": "aad85f1ff8960b6f6d79269fbb5289f2", "score": "0.4998078", "text": "func CreateTransactionsBuilderFactoryForTests() stored_aggregated_transactions.TransactionsBuilderFactory {\n\tout := CreateTransactionsBuilderFactory()\n\treturn out\n}", "title": "" }, { "docid": "fc9fcea49e910fc9c3c8b9fe3316c2b3", "score": "0.49917147", "text": "func NewCreateCommand(banzaiCli cli.Cli) *cobra.Command {\n\to := createBucketsOptions{}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"create NAME [[--cloud=]CLOUD] [[--location=]LOCATION] [[--secret-id=]SECRET_ID]\",\n\t\tShort: \"Create bucket\",\n\t\tLong: \"Create object storage bucket on supported cloud providers\",\n\t\tArgs: cobra.MaximumNArgs(4),\n\t\tAliases: []string{\"c\", \"create\"},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tcmd.SilenceErrors = true\n\t\t\tcmd.SilenceUsage = true\n\n\t\t\tif len(args) > 0 {\n\t\t\t\to.name = args[0]\n\t\t\t}\n\t\t\tif len(args) > 1 {\n\t\t\t\to.cloud = args[1]\n\t\t\t}\n\t\t\tif len(args) > 2 {\n\t\t\t\to.location = args[2]\n\t\t\t}\n\t\t\tif len(args) > 3 {\n\t\t\t\to.secretID = args[3]\n\t\t\t}\n\n\t\t\tif !banzaiCli.Interactive() {\n\t\t\t\tif o.name == \"\" {\n\t\t\t\t\treturn errors.New(\"NAME must be specified\")\n\t\t\t\t}\n\t\t\t\tif o.cloud == \"\" {\n\t\t\t\t\treturn errors.New(\"CLOUD argument or --cloud flag must be specified\")\n\t\t\t\t}\n\t\t\t\tif o.location == \"\" {\n\t\t\t\t\treturn errors.New(\"LOCATION argument or --location flag must be specified\")\n\t\t\t\t}\n\t\t\t\tif o.secretID == \"\" {\n\t\t\t\t\treturn errors.New(\"SECRET_ID argument or --secret-id flag must be specified\")\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif o.cloud == input.CloudProviderAzure {\n\t\t\t\tif o.storageAccount == \"\" {\n\t\t\t\t\treturn errors.New(\"--storage-account must be specified for Azure\")\n\t\t\t\t}\n\t\t\t\tif o.resourceGroup == \"\" {\n\t\t\t\t\treturn errors.New(\"--resource-group must be specified for Azure\")\n\t\t\t\t}\n\t\t\t}\n\n\t\t\treturn runCreate(banzaiCli, o)\n\t\t},\n\t}\n\n\tflags := cmd.Flags()\n\tflags.StringVarP(&o.cloud, \"cloud\", \"c\", \"\", \"Cloud provider for the bucket\")\n\tflags.StringVarP(&o.location, \"location\", \"l\", \"\", \"Location for the bucket\")\n\tflags.StringVarP(&o.secretID, \"secret-id\", \"s\", \"\", \"Secret ID of the used secret to create the bucket\")\n\tflags.StringVarP(&o.storageAccount, \"storage-account\", \"\", \"\", \"Storage account for the bucket (must be specified for Azure)\")\n\tflags.StringVarP(&o.resourceGroup, \"resource-group\", \"\", \"\", \"Resource group for the bucket (must be specified for Azure)\")\n\tflags.BoolVarP(&o.wait, \"wait\", \"w\", false, \"Wait for bucket creation\")\n\n\treturn cmd\n}", "title": "" }, { "docid": "c87cbedd2a177ebe41019f45d5404c51", "score": "0.49588272", "text": "func (m *OpenAPIMocker) CreateCommand() *cli.Command {\n\treturn &cli.Command{\n\t\tName: \"mock\",\n\t\tUsage: \"Runs a mock server from an OpenAPI specification\",\n\t\tDescription: \"Runs a mock server from an OpenAPI specification\",\n\t\tBefore: m.before,\n\t\tAction: m.mock,\n\t\tFlags: []cli.Flag{\n\t\t\t&cli.StringFlag{\n\t\t\t\tName: \"file-path, f\",\n\t\t\t\tUsage: \"path to the open api specification\",\n\t\t\t\tValue: \"./swagger.yaml\",\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "3f615cce767bfe156a3673f3d5f3e5f1", "score": "0.4952611", "text": "func NewCreateCommand(parent cmd.Registerer, g *global.Data, m manifest.Data) *CreateCommand {\n\tc := CreateCommand{\n\t\tBase: cmd.Base{\n\t\t\tGlobals: g,\n\t\t},\n\t\tmanifest: m,\n\t}\n\tc.CmdClause = parent.Command(\"create\", \"Create a backend on a Fastly service version\").Alias(\"add\")\n\n\t// Required.\n\tc.RegisterFlag(cmd.StringFlagOpts{\n\t\tName: cmd.FlagVersionName,\n\t\tDescription: cmd.FlagVersionDesc,\n\t\tDst: &c.serviceVersion.Value,\n\t\tRequired: true,\n\t})\n\n\t// Optional.\n\n\tc.CmdClause.Flag(\"address\", \"A hostname, IPv4, or IPv6 address for the backend\").Action(c.address.Set).StringVar(&c.address.Value)\n\tc.RegisterAutoCloneFlag(cmd.AutoCloneFlagOpts{\n\t\tAction: c.autoClone.Set,\n\t\tDst: &c.autoClone.Value,\n\t})\n\tc.CmdClause.Flag(\"auto-loadbalance\", \"Whether or not this backend should be automatically load balanced\").Action(c.autoLoadBalance.Set).BoolVar(&c.autoLoadBalance.Value)\n\tc.CmdClause.Flag(\"between-bytes-timeout\", \"How long to wait between bytes in milliseconds\").Action(c.betweenBytesTimeout.Set).IntVar(&c.betweenBytesTimeout.Value)\n\tc.CmdClause.Flag(\"comment\", \"A descriptive note\").Action(c.comment.Set).StringVar(&c.comment.Value)\n\tc.CmdClause.Flag(\"connect-timeout\", \"How long to wait for a timeout in milliseconds\").Action(c.connectTimeout.Set).IntVar(&c.connectTimeout.Value)\n\tc.CmdClause.Flag(\"first-byte-timeout\", \"How long to wait for the first bytes in milliseconds\").Action(c.firstByteTimeout.Set).IntVar(&c.firstByteTimeout.Value)\n\tc.CmdClause.Flag(\"healthcheck\", \"The name of the healthcheck to use with this backend\").Action(c.healthCheck.Set).StringVar(&c.healthCheck.Value)\n\tc.CmdClause.Flag(\"max-conn\", \"Maximum number of connections\").Action(c.maxConn.Set).IntVar(&c.maxConn.Value)\n\tc.CmdClause.Flag(\"max-tls-version\", \"Maximum allowed TLS version on SSL connections to this backend\").Action(c.maxTLSVersion.Set).StringVar(&c.maxTLSVersion.Value)\n\tc.CmdClause.Flag(\"min-tls-version\", \"Minimum allowed TLS version on SSL connections to this backend\").Action(c.minTLSVersion.Set).StringVar(&c.minTLSVersion.Value)\n\tc.CmdClause.Flag(\"name\", \"Backend name\").Short('n').Action(c.name.Set).StringVar(&c.name.Value)\n\tc.CmdClause.Flag(\"override-host\", \"The hostname to override the Host header\").Action(c.overrideHost.Set).StringVar(&c.overrideHost.Value)\n\tc.CmdClause.Flag(\"port\", \"Port number of the address\").Action(c.port.Set).IntVar(&c.port.Value)\n\tc.CmdClause.Flag(\"request-condition\", \"Condition, which if met, will select this backend during a request\").Action(c.requestCondition.Set).StringVar(&c.requestCondition.Value)\n\tc.RegisterFlag(cmd.StringFlagOpts{\n\t\tName: cmd.FlagServiceIDName,\n\t\tDescription: cmd.FlagServiceIDDesc,\n\t\tDst: &c.manifest.Flag.ServiceID,\n\t\tShort: 's',\n\t})\n\tc.RegisterFlag(cmd.StringFlagOpts{\n\t\tAction: c.serviceName.Set,\n\t\tName: cmd.FlagServiceName,\n\t\tDescription: cmd.FlagServiceDesc,\n\t\tDst: &c.serviceName.Value,\n\t})\n\tc.CmdClause.Flag(\"shield\", \"The shield POP designated to reduce inbound load on this origin by serving the cached data to the rest of the network\").Action(c.shield.Set).StringVar(&c.shield.Value)\n\tc.CmdClause.Flag(\"ssl-ca-cert\", \"CA certificate attached to origin\").Action(c.sslCACert.Set).StringVar(&c.sslCACert.Value)\n\tc.CmdClause.Flag(\"ssl-cert-hostname\", \"Overrides ssl_hostname, but only for cert verification. Does not affect SNI at all.\").Action(c.sslCertHostname.Set).StringVar(&c.sslCertHostname.Value)\n\tc.CmdClause.Flag(\"ssl-check-cert\", \"Be strict on checking SSL certs\").Action(c.sslCheckCert.Set).BoolVar(&c.sslCheckCert.Value)\n\tc.CmdClause.Flag(\"ssl-ciphers\", \"List of OpenSSL ciphers (https://www.openssl.org/docs/man1.0.2/man1/ciphers)\").Action(c.sslCiphers.Set).StringVar(&c.sslCiphers.Value)\n\tc.CmdClause.Flag(\"ssl-client-cert\", \"Client certificate attached to origin\").Action(c.sslClientCert.Set).StringVar(&c.sslClientCert.Value)\n\tc.CmdClause.Flag(\"ssl-client-key\", \"Client key attached to origin\").Action(c.sslClientKey.Set).StringVar(&c.sslClientKey.Value)\n\tc.CmdClause.Flag(\"ssl-sni-hostname\", \"Overrides ssl_hostname, but only for SNI in the handshake. Does not affect cert validation at all.\").Action(c.sslSNIHostname.Set).StringVar(&c.sslSNIHostname.Value)\n\tc.CmdClause.Flag(\"use-ssl\", \"Whether or not to use SSL to reach the backend\").Action(c.useSSL.Set).BoolVar(&c.useSSL.Value)\n\tc.CmdClause.Flag(\"weight\", \"Weight used to load balance this backend against others\").Action(c.weight.Set).IntVar(&c.weight.Value)\n\n\treturn &c\n}", "title": "" }, { "docid": "bf144a2c048df2681dc31f1b823e408c", "score": "0.4948343", "text": "func NewMockBlockBuilderFactory(ctrl *gomock.Controller) *MockBlockBuilderFactory {\n\tmock := &MockBlockBuilderFactory{ctrl: ctrl}\n\tmock.recorder = &MockBlockBuilderFactoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "27b7c5ad9b5a2f3ac5f1262620d71432", "score": "0.49454832", "text": "func NewCreateCommand() cli.Command {\n\treturn cli.Command{\n\t\tName: \"create\",\n\t\tUsage: \"create new application/process/service/secret/configmap/deployment/user/meshcluster/logcollectiontask/datacleanstrategy/dataid\",\n\t\tFlags: []cli.Flag{\n\t\t\tcli.StringFlag{\n\t\t\t\tName: \"from-file, f\",\n\t\t\t\tUsage: \"Create with configuration `FILE`\",\n\t\t\t},\n\t\t\tcli.StringFlag{\n\t\t\t\tName: \"clusterid\",\n\t\t\t\tUsage: \"Cluster ID\",\n\t\t\t},\n\t\t\tcli.StringFlag{\n\t\t\t\tName: \"type, t\",\n\t\t\t\tUsage: \"Create type, value can be app/service/secret/configmap/deployment/user/daemonset/logcollectiontask/datacleanstrategy/dataid\",\n\t\t\t},\n\t\t\tcli.StringFlag{\n\t\t\t\tName: \"usertype\",\n\t\t\t\tUsage: \"user type, value can be admin/saas/plain\",\n\t\t\t},\n\t\t\tcli.StringFlag{\n\t\t\t\tName: \"username\",\n\t\t\t\tUsage: \"user name\",\n\t\t\t},\n\t\t},\n\t\tAction: func(c *cli.Context) error {\n\t\t\treturn create(utils.NewClientContext(c))\n\t\t},\n\t}\n}", "title": "" }, { "docid": "4d4ae260bfc63189db276b674d4b48ea", "score": "0.4938799", "text": "func (cfg *ServerConfig) makeCommand() func() *exec.Cmd {\n\tcfg.mu.Lock()\n\tdefer cfg.mu.Unlock()\n\n\tif cfg.CommandProducer != nil {\n\t\treturn cfg.CommandProducer(cfg)\n\t}\n\n\tvar cmd = strings.Split(cfg.Command, \" \")\n\treturn func() *exec.Cmd {\n\t\tcmd := exec.Command(cmd[0], cmd[1:]...)\n\t\tosutil.IsolateProcess(cmd)\n\n\t\tcmd.Env = cfg.GetEnv()\n\n\t\treturn cmd\n\t}\n}", "title": "" }, { "docid": "971fe7d6ddc17eb4fee34a4d97f0438a", "score": "0.4936772", "text": "func Commands(conf config.Config) map[string]cli.CommandFactory {\n\tmeta := Meta{\n\t\tConfig: conf,\n\t}\n\n\tmeta.UI = &cli.BasicUi{\n\t\tReader: os.Stdin,\n\t\tWriter: os.Stdout,\n\t\tErrorWriter: os.Stderr,\n\t}\n\n\tmeta.UI = &cli.ColoredUi{\n\t\tUi: meta.UI,\n\t\tErrorColor: cli.UiColorRed,\n\t\tWarnColor: cli.UiColorYellow,\n\t\tInfoColor: cli.UiColorGreen,\n\t}\n\n\treturn map[string]cli.CommandFactory{\n\t\t\"build\": func() (cli.Command, error) {\n\t\t\treturn &BuildCommand{\n\t\t\t\tMeta: meta,\n\t\t\t}, nil\n\t\t},\n\t\t\"deploy\": func() (cli.Command, error) {\n\t\t\treturn &DeployCommand{\n\t\t\t\tMeta: meta,\n\t\t\t}, nil\n\t\t},\n\t\t\"destroy\": func() (cli.Command, error) {\n\t\t\treturn &DestroyCommand{\n\t\t\t\tMeta: meta,\n\t\t\t}, nil\n\t\t},\n\t}\n}", "title": "" }, { "docid": "ae3205d13ae524421f38d17f2c9fc4f4", "score": "0.4927524", "text": "func NewCreateCommand(parent cmd.Registerer, globals *config.Data, data manifest.Data) *CreateCommand {\n\tvar c CreateCommand\n\tc.Globals = globals\n\tc.manifest = data\n\tc.CmdClause = parent.Command(\"create\", \"Create a backend on a Fastly service version\").Alias(\"add\")\n\tc.RegisterServiceIDFlag(&c.manifest.Flag.ServiceID)\n\tc.RegisterServiceVersionFlag(cmd.ServiceVersionFlagOpts{\n\t\tDst: &c.serviceVersion.Value,\n\t})\n\tc.RegisterAutoCloneFlag(cmd.AutoCloneFlagOpts{\n\t\tAction: c.autoClone.Set,\n\t\tDst: &c.autoClone.Value,\n\t})\n\tc.CmdClause.Flag(\"name\", \"Backend name\").Short('n').Required().StringVar(&c.Input.Name)\n\tc.CmdClause.Flag(\"address\", \"A hostname, IPv4, or IPv6 address for the backend\").Required().StringVar(&c.Input.Address)\n\tc.CmdClause.Flag(\"comment\", \"A descriptive note\").StringVar(&c.Input.Comment)\n\tc.CmdClause.Flag(\"port\", \"Port number of the address\").UintVar(&c.Input.Port)\n\tc.CmdClause.Flag(\"override-host\", \"The hostname to override the Host header\").StringVar(&c.Input.OverrideHost)\n\tc.CmdClause.Flag(\"connect-timeout\", \"How long to wait for a timeout in milliseconds\").UintVar(&c.Input.ConnectTimeout)\n\tc.CmdClause.Flag(\"max-conn\", \"Maximum number of connections\").UintVar(&c.Input.MaxConn)\n\tc.CmdClause.Flag(\"first-byte-timeout\", \"How long to wait for the first bytes in milliseconds\").UintVar(&c.Input.FirstByteTimeout)\n\tc.CmdClause.Flag(\"between-bytes-timeout\", \"How long to wait between bytes in milliseconds\").UintVar(&c.Input.BetweenBytesTimeout)\n\tc.CmdClause.Flag(\"auto-loadbalance\", \"Whether or not this backend should be automatically load balanced\").BoolVar(&c.AutoLoadbalance)\n\tc.CmdClause.Flag(\"weight\", \"Weight used to load balance this backend against others\").UintVar(&c.Input.Weight)\n\tc.CmdClause.Flag(\"request-condition\", \"Condition, which if met, will select this backend during a request\").StringVar(&c.Input.RequestCondition)\n\tc.CmdClause.Flag(\"healthcheck\", \"The name of the healthcheck to use with this backend\").StringVar(&c.Input.HealthCheck)\n\tc.CmdClause.Flag(\"shield\", \"The shield POP designated to reduce inbound load on this origin by serving the cached data to the rest of the network\").StringVar(&c.Input.Shield)\n\tc.CmdClause.Flag(\"use-ssl\", \"Whether or not to use SSL to reach the backend\").BoolVar(&c.UseSSL)\n\tc.CmdClause.Flag(\"ssl-check-cert\", \"Be strict on checking SSL certs\").BoolVar(&c.SSLCheckCert)\n\tc.CmdClause.Flag(\"ssl-ca-cert\", \"CA certificate attached to origin\").StringVar(&c.Input.SSLCACert)\n\tc.CmdClause.Flag(\"ssl-client-cert\", \"Client certificate attached to origin\").StringVar(&c.Input.SSLClientCert)\n\tc.CmdClause.Flag(\"ssl-client-key\", \"Client key attached to origin\").StringVar(&c.Input.SSLClientKey)\n\tc.CmdClause.Flag(\"ssl-cert-hostname\", \"Overrides ssl_hostname, but only for cert verification. Does not affect SNI at all.\").StringVar(&c.Input.SSLCertHostname)\n\tc.CmdClause.Flag(\"ssl-sni-hostname\", \"Overrides ssl_hostname, but only for SNI in the handshake. Does not affect cert validation at all.\").StringVar(&c.Input.SSLSNIHostname)\n\tc.CmdClause.Flag(\"min-tls-version\", \"Minimum allowed TLS version on SSL connections to this backend\").StringVar(&c.Input.MinTLSVersion)\n\tc.CmdClause.Flag(\"max-tls-version\", \"Maximum allowed TLS version on SSL connections to this backend\").StringVar(&c.Input.MaxTLSVersion)\n\tc.CmdClause.Flag(\"ssl-ciphers\", \"Colon delimited list of OpenSSL ciphers (see https://www.openssl.org/docs/man1.0.2/man1/ciphers for details)\").StringVar(&c.Input.SSLCiphers)\n\n\treturn &c\n}", "title": "" }, { "docid": "ac4e252ee1fb3f8c86acbe22821b451a", "score": "0.49250758", "text": "func Commands(metaPtr *meta.Meta) map[string]cli.CommandFactory {\n\tif metaPtr == nil {\n\t\tmetaPtr = &meta.Meta{\n\t\t\tTokenHelper: command.DefaultTokenHelper,\n\t\t}\n\t}\n\n\t// if metaPtr.Ui == nil {\n\t// \tmetaPtr.Ui = &cli.BasicUi{\n\t// \t\tWriter: os.Stdout,\n\t// \t\tErrorWriter: os.Stderr,\n\t// \t}\n\t// }\n\n\treturn map[string]cli.CommandFactory{\n\t\t\"init\": func() (cli.Command, error) {\n\t\t\treturn &command.InitCommand{\n\t\t\t\tMeta: *metaPtr,\n\t\t\t}, nil\n\t\t},\n\n\t\t\"ssh\": func() (cli.Command, error) {\n\t\t\treturn &command.SSHCommand{\n\t\t\t\tMeta: *metaPtr,\n\t\t\t}, nil\n\t\t},\n\n\t\t\"version\": func() (cli.Command, error) {\n\t\t\tversionInfo := version.GetVersion()\n\n\t\t\treturn &command.VersionCommand{\n\t\t\t\tVersionInfo: versionInfo,\n\t\t\t\tUi: metaPtr.Ui,\n\t\t\t}, nil\n\t\t},\n\t}\n}", "title": "" }, { "docid": "e2f70e233b980377c06fc68e3e18220a", "score": "0.48814523", "text": "func NewCreateCommand(parent cmd.Registerer, g *global.Data, m manifest.Data) *CreateCommand {\n\tc := CreateCommand{\n\t\tBase: cmd.Base{\n\t\t\tGlobals: g,\n\t\t},\n\t\tManifest: m,\n\t}\n\tc.CmdClause = parent.Command(\"create\", \"Create an Amazon S3 logging endpoint on a Fastly service version\").Alias(\"add\")\n\n\t// Required.\n\tc.CmdClause.Flag(\"name\", \"The name of the S3 logging object. Used as a primary key for API access\").Short('n').Action(c.EndpointName.Set).StringVar(&c.EndpointName.Value)\n\tc.RegisterFlag(cmd.StringFlagOpts{\n\t\tName: cmd.FlagVersionName,\n\t\tDescription: cmd.FlagVersionDesc,\n\t\tDst: &c.ServiceVersion.Value,\n\t\tRequired: true,\n\t})\n\n\t// Optional.\n\tc.RegisterAutoCloneFlag(cmd.AutoCloneFlagOpts{\n\t\tAction: c.AutoClone.Set,\n\t\tDst: &c.AutoClone.Value,\n\t})\n\tc.CmdClause.Flag(\"access-key\", \"Your S3 account access key\").Action(c.AccessKey.Set).StringVar(&c.AccessKey.Value)\n\tc.CmdClause.Flag(\"bucket\", \"Your S3 bucket name\").Action(c.BucketName.Set).StringVar(&c.BucketName.Value)\n\tcommon.CompressionCodec(c.CmdClause, &c.CompressionCodec)\n\tc.CmdClause.Flag(\"domain\", \"The domain of the S3 endpoint\").Action(c.Domain.Set).StringVar(&c.Domain.Value)\n\tc.CmdClause.Flag(\"file-max-bytes\", \"The maximum size of a log file in bytes\").Action(c.FileMaxBytes.Set).IntVar(&c.FileMaxBytes.Value)\n\tcommon.Format(c.CmdClause, &c.Format)\n\tcommon.FormatVersion(c.CmdClause, &c.FormatVersion)\n\tcommon.GzipLevel(c.CmdClause, &c.GzipLevel)\n\tc.CmdClause.Flag(\"iam-role\", \"The IAM role ARN for logging\").Action(c.IAMRole.Set).StringVar(&c.IAMRole.Value)\n\tcommon.MessageType(c.CmdClause, &c.MessageType)\n\tcommon.Path(c.CmdClause, &c.Path)\n\tcommon.Period(c.CmdClause, &c.Period)\n\tcommon.Placement(c.CmdClause, &c.Placement)\n\tcommon.PublicKey(c.CmdClause, &c.PublicKey)\n\tc.CmdClause.Flag(\"redundancy\", \"The S3 storage class. One of: standard, intelligent_tiering, standard_ia, onezone_ia, glacier, glacier_ir, deep_archive, or reduced_redundancy\").Action(c.Redundancy.Set).EnumVar(&c.Redundancy.Value, string(fastly.S3RedundancyStandard), string(fastly.S3RedundancyIntelligentTiering), string(fastly.S3RedundancyStandardIA), string(fastly.S3RedundancyOneZoneIA), string(fastly.S3RedundancyGlacierFlexibleRetrieval), string(fastly.S3RedundancyGlacierInstantRetrieval), string(fastly.S3RedundancyGlacierDeepArchive), string(fastly.S3RedundancyReduced))\n\tcommon.ResponseCondition(c.CmdClause, &c.ResponseCondition)\n\tc.CmdClause.Flag(\"secret-key\", \"Your S3 account secret key\").Action(c.SecretKey.Set).StringVar(&c.SecretKey.Value)\n\tc.CmdClause.Flag(\"server-side-encryption\", \"Set to enable S3 Server Side Encryption. Can be either AES256 or aws:kms\").Action(c.ServerSideEncryption.Set).EnumVar(&c.ServerSideEncryption.Value, string(fastly.S3ServerSideEncryptionAES), string(fastly.S3ServerSideEncryptionKMS))\n\tc.CmdClause.Flag(\"server-side-encryption-kms-key-id\", \"Server-side KMS Key ID. Must be set if server-side-encryption is set to aws:kms\").Action(c.ServerSideEncryptionKMSKeyID.Set).StringVar(&c.ServerSideEncryptionKMSKeyID.Value)\n\tc.RegisterFlag(cmd.StringFlagOpts{\n\t\tName: cmd.FlagServiceIDName,\n\t\tDescription: cmd.FlagServiceIDDesc,\n\t\tDst: &c.Manifest.Flag.ServiceID,\n\t\tShort: 's',\n\t})\n\tc.RegisterFlag(cmd.StringFlagOpts{\n\t\tAction: c.ServiceName.Set,\n\t\tName: cmd.FlagServiceName,\n\t\tDescription: cmd.FlagServiceDesc,\n\t\tDst: &c.ServiceName.Value,\n\t})\n\tcommon.TimestampFormat(c.CmdClause, &c.TimestampFormat)\n\treturn &c\n}", "title": "" }, { "docid": "27becbd5360f80bc120d4ead6766d2bc", "score": "0.4880323", "text": "func newNodesCommand(base jenkinsCommand, cfg config.Jenkins) bot.Command {\n\treturn &nodesCommand{base, cfg}\n}", "title": "" }, { "docid": "174eb375824d5217cf5a777afb074283", "score": "0.4877546", "text": "func makeCLI() *cli.CLI {\n\tc := cli.NewCLI(\"commands\", \"1.0.0\")\n\n\tfooCommand := &commands.FooCommand{\n\t\tHelpText: \"foo blah blah blah flibby dibby do\",\n\t\tSynopsisText: \"do some foo\",\n\t}\n\n\tbarCommand := &commands.BarCommand{\n\t\tHelpText: \"bar bar barness\",\n\t\tSynopsisText: \"when you want bar\",\n\t}\n\n\tc.Commands = map[string]cli.CommandFactory{\n\t\t\"foo\": func() (cli.Command, error) {\n\t\t\treturn fooCommand, nil\n\t\t},\n\n\t\t\"bar\": func() (cli.Command, error) {\n\t\t\treturn barCommand, nil\n\t\t},\n\t}\n\n\treturn c\n}", "title": "" }, { "docid": "fff013315d63f24f06c0766aaa57a4d6", "score": "0.48688018", "text": "func CreateCommand(name string, description string, executor func([]string) error, completer func(prompt.Document) []prompt.Suggest) Command {\n\treturn Command{name, description, executor, completer}\n}", "title": "" }, { "docid": "4079e6d78a93db5ca9aae32a3e647dcb", "score": "0.4859077", "text": "func NewImplement() cli.CommandFactory {\n\treturn func() (cli.Command, error) {\n\t\treturn &Implement{}, nil\n\t}\n}", "title": "" }, { "docid": "e0382d175003833eccf3cdf2bf0c23cc", "score": "0.48545745", "text": "func NewCommand(lf logger.Factory) *Command {\n\treturn &Command{\n\t\tLoggerFactory: lf,\n\t}\n}", "title": "" }, { "docid": "72f8d0f5339cb2673015e0e9b9b6d495", "score": "0.485233", "text": "func NewCmdGenerate(f *clientcmd.Factory, parentName, name string, out io.Writer) *cobra.Command {\n\tdockerHelper := dh.NewHelper()\n\tinput := params{}\n\tenvironment := \"\"\n\n\tc := &cobra.Command{\n\t\tUse: fmt.Sprintf(\"%s [source]\", name),\n\t\tShort: \"Generates an application configuration from a source repository\",\n\t\tLong: longDescription,\n\t\tRun: func(c *cobra.Command, args []string) {\n\t\t\terr := RunGenerate(f, out, c, args, dockerHelper, input, environment)\n\t\t\tkcmdutil.CheckErr(err)\n\t\t},\n\t}\n\n\tflag := c.Flags()\n\tflag.StringVar(&input.name, \"name\", \"\", \"Set name to use for generated application artifacts\")\n\tflag.StringVar(&input.sourceRef, \"ref\", \"\", \"Set the name of the repository branch/ref to use\")\n\tflag.StringVar(&input.sourceURL, \"source-url\", \"\", \"Set the source URL\")\n\tflag.StringVar(&input.dockerContext, \"docker-context\", \"\", \"Context path for Dockerfile if creating a Docker build\")\n\tflag.StringVar(&input.builderImage, \"builder-image\", \"\", \"Image to use for STI build\")\n\tflag.StringVarP(&input.port, \"port\", \"p\", \"\", \"Port to expose on pod deployment\")\n\tflag.StringVarP(&environment, \"environment\", \"e\", \"\", \"Comma-separated list of environment variables to add to the deployment.\"+\n\t\t\"Should be in the form of var1=value1,var2=value2,...\")\n\tflag.StringP(\"labels\", \"l\", \"\", \"Label to set in all resources for this configuration\")\n\tkcmdutil.AddPrinterFlags(c)\n\tdockerHelper.InstallFlags(flag)\n\treturn c\n}", "title": "" }, { "docid": "18b20bafb4c2065e39189f0ab5ff02bb", "score": "0.48471642", "text": "func newCommand(opts ...option) (cmd *command, err error) {\n\tcmd = &command{\n\t\troot: &cobra.Command{\n\t\t\tUse: \"resolver\",\n\t\t\tShort: \"Swarm address resolver\",\n\t\t\tLong: `Swarm resolver performs name resolution for the swarm bee.\n\nConfiguration is stored in the \"config.yaml\" file. Configuration lookup is\nperformed in the following order:\n\t\t\t\t\n- File path explicitly passed via --config switch\n- swarm/resolver/config.yaml in the standard user config directory \n - eg. \"~/.config/swarm/resolver/config.yaml\" on Linux\n- Working directory config.yaml`,\n\t\t\tSilenceErrors: true,\n\t\t\tSilenceUsage: true,\n\t\t\tPersistentPreRunE: func(_ *cobra.Command, _ []string) error {\n\t\t\t\treturn cmd.initConfig()\n\t\t\t},\n\t\t},\n\t}\n\n\t// Apply all options to the command.\n\tfor _, o := range opts {\n\t\to(cmd)\n\t}\n\n\tcmd.initGlobalFlags()\n\n\t// Initialize all commands.\n\tcmd.initStartCommand()\n\tcmd.initVersionCmd()\n\n\t// Override for the root command RunE (used for tests).\n\tif cmd.rootRunE != nil {\n\t\tcmd.root.RunE = cmd.rootRunE\n\t}\n\n\treturn cmd, nil\n}", "title": "" }, { "docid": "53aedd736a9e0855f710d19c9695fa6d", "score": "0.48446682", "text": "func NewCreateCmd(f *cmdutil.Factory) *CreateCmd {\n\tccmd := &CreateCmd{\n\t\tfactory: f,\n\t}\n\tcmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create application\",\n\t\tLong: `Create a new application using explicit settings`,\n\t\tExample: heredoc.Doc(`\n$ c8y applications create --name myapp --type HOSTED --key \"myapp-key\" --contextPath \"myapp\"\nCreate a new hosted application\n `),\n\t\tPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn f.CreateModeEnabled()\n\t\t},\n\t\tRunE: ccmd.RunE,\n\t}\n\n\tcmd.SilenceUsage = true\n\n\tcmd.Flags().String(\"name\", \"\", \"Name of application (accepts pipeline)\")\n\tcmd.Flags().String(\"key\", \"\", \"Shared secret of application\")\n\tcmd.Flags().String(\"type\", \"\", \"Type of application. Possible values are EXTERNAL, HOSTED, MICROSERVICE\")\n\tcmd.Flags().String(\"availability\", \"\", \"Access level for other tenants. Possible values are : MARKET, PRIVATE (default)\")\n\tcmd.Flags().String(\"contextPath\", \"\", \"contextPath of the hosted application. Required when application type is HOSTED\")\n\tcmd.Flags().String(\"resourcesUrl\", \"\", \"URL to application base directory hosted on an external server. Required when application type is HOSTED\")\n\tcmd.Flags().String(\"resourcesUsername\", \"\", \"authorization username to access resourcesUrl\")\n\tcmd.Flags().String(\"resourcesPassword\", \"\", \"authorization password to access resourcesUrl\")\n\tcmd.Flags().String(\"externalUrl\", \"\", \"URL to the external application. Required when application type is EXTERNAL\")\n\n\tcompletion.WithOptions(\n\t\tcmd,\n\t\tcompletion.WithValidateSet(\"type\", \"EXTERNAL\", \"HOSTED\", \"MICROSERVICE\"),\n\t\tcompletion.WithValidateSet(\"availability\", \"MARKET\", \"PRIVATE\"),\n\t)\n\n\tflags.WithOptions(\n\t\tcmd,\n\t\tflags.WithProcessingMode(),\n\t\tflags.WithData(),\n\t\tf.WithTemplateFlag(cmd),\n\t\tflags.WithExtendedPipelineSupport(\"name\", \"name\", false, \"name\"),\n\t)\n\n\t// Required flags\n\n\tccmd.SubCommand = subcommand.NewSubCommand(cmd)\n\n\treturn ccmd\n}", "title": "" }, { "docid": "b5d4980a58ac880900e64806f7be2970", "score": "0.48409706", "text": "func NewCreateServiceCommand(p *config.KfParams, client services.ClientInterface) *cobra.Command {\n\tvar configAsJSON string\n\n\tcreateCmd := &cobra.Command{\n\t\tUse: \"create-service SERVICE PLAN SERVICE_INSTANCE [-c PARAMETERS_AS_JSON]\",\n\t\tAliases: []string{\"cs\"},\n\t\tShort: \"Create a service instance\",\n\t\tExample: `\n kf create-service db-service silver mydb -c '{\"ram_gb\":4}'\n kf create-service db-service silver mydb -c ~/workspace/tmp/instance_config.json`,\n\t\tArgs: cobra.ExactArgs(3),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tserviceName := args[0]\n\t\t\tplanName := args[1]\n\t\t\tinstanceName := args[2]\n\n\t\t\tcmd.SilenceUsage = true\n\n\t\t\tif err := utils.ValidateNamespace(p); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tparams, err := services.ParseJSONOrFile(configAsJSON)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tinstance, err := client.CreateService(\n\t\t\t\tinstanceName,\n\t\t\t\tserviceName,\n\t\t\t\tplanName,\n\t\t\t\tservices.WithCreateServiceNamespace(p.Namespace),\n\t\t\t\tservices.WithCreateServiceParams(params))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tdescribe.ServiceInstance(cmd.OutOrStdout(), instance)\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tcreateCmd.Flags().StringVarP(\n\t\t&configAsJSON,\n\t\t\"config\",\n\t\t\"c\",\n\t\t\"{}\",\n\t\t\"Valid JSON object containing service-specific configuration parameters, provided in-line or in a file.\")\n\n\treturn createCmd\n}", "title": "" }, { "docid": "35913954a76ec32301829200b2909055", "score": "0.48378175", "text": "func NewCreateCommand(parent common.Registerer, globals *config.Data) *CreateCommand {\n\tvar c CreateCommand\n\tc.Globals = globals\n\tc.manifest.File.Read(manifest.Filename)\n\tc.CmdClause = parent.Command(\"create\", \"Create an Amazon S3 logging endpoint on a Fastly service version\").Alias(\"add\")\n\n\tc.CmdClause.Flag(\"name\", \"The name of the S3 logging object. Used as a primary key for API access\").Short('n').Required().StringVar(&c.Input.Name)\n\tc.CmdClause.Flag(\"service-id\", \"Service ID\").Short('s').StringVar(&c.manifest.Flag.ServiceID)\n\tc.CmdClause.Flag(\"version\", \"Number of service version\").Required().IntVar(&c.Input.Version)\n\n\tc.CmdClause.Flag(\"bucket\", \"Your S3 bucket name\").Required().StringVar(&c.Input.BucketName)\n\tc.CmdClause.Flag(\"access-key\", \"Your S3 account access key\").Required().StringVar(&c.Input.AccessKey)\n\tc.CmdClause.Flag(\"secret-key\", \"Your S3 account secret key\").Required().StringVar(&c.Input.SecretKey)\n\n\tc.CmdClause.Flag(\"domain\", \"The domain of the S3 endpoint\").StringVar(&c.Input.Domain)\n\tc.CmdClause.Flag(\"path\", \"The path to upload logs to\").StringVar(&c.Input.Path)\n\tc.CmdClause.Flag(\"period\", \"How frequently log files are finalized so they can be available for reading (in seconds, default 3600)\").UintVar(&c.Input.Period)\n\tc.CmdClause.Flag(\"gzip-level\", \"What level of GZIP encoding to have when dumping logs (default 0, no compression)\").UintVar(&c.Input.GzipLevel)\n\tc.CmdClause.Flag(\"format\", \"Apache style log formatting\").StringVar(&c.Input.Format)\n\tc.CmdClause.Flag(\"format-version\", \"The version of the custom logging format used for the configured endpoint. Can be either 2 (default) or 1\").UintVar(&c.Input.FormatVersion)\n\tc.CmdClause.Flag(\"message-type\", \"How the message should be formatted. One of: classic (default), loggly, logplex or blank\").StringVar(&c.Input.MessageType)\n\tc.CmdClause.Flag(\"response-condition\", \"The name of an existing condition in the configured endpoint, or leave blank to always execute\").StringVar(&c.Input.ResponseCondition)\n\tc.CmdClause.Flag(\"timestamp-format\", `strftime specified timestamp formatting (default \"%Y-%m-%dT%H:%M:%S.000\")`).StringVar(&c.Input.TimestampFormat)\n\tc.CmdClause.Flag(\"redundancy\", \"The S3 redundancy level. Can be either standard or reduced_redundancy\").EnumVar(&c.redundancy, string(fastly.S3RedundancyStandard), string(fastly.S3RedundancyReduced))\n\tc.CmdClause.Flag(\"placement\", \"Where in the generated VCL the logging call should be placed, overriding any format_version default. Can be none or waf_debug\").StringVar(&c.Input.Placement)\n\tc.CmdClause.Flag(\"server-side-encryption\", \"Set to enable S3 Server Side Encryption. Can be either AES256 or aws:kms\").EnumVar(&c.serverSideEncryption, string(fastly.S3ServerSideEncryptionAES), string(fastly.S3ServerSideEncryptionKMS))\n\tc.CmdClause.Flag(\"server-side-encryption-kms-key-id\", \"Server-side KMS Key ID. Must be set if server-side-encryption is set to aws:kms\").StringVar(&c.Input.ServerSideEncryptionKMSKeyID)\n\treturn &c\n}", "title": "" }, { "docid": "ed54eaf02b4b81b0ad1569f32556a036", "score": "0.4834894", "text": "func BuildManagerCreateProcessCommand(basePrefix ...string) []string {\n\treturn append(BuildManagerCommand(basePrefix...), CreateProcessCommand)\n}", "title": "" }, { "docid": "b30e3743d86886a9fee02dac6d73a44c", "score": "0.482218", "text": "func CreateCliCommand(bc commands.WSCommand, cfg commands.Config) *cli.Command {\n\tcmd := &cli.Command{\n\t\tName: bc.GetCommand(),\n\t\tUsage: bc.GetDescription(),\n\t\tAliases: bc.GetAliases(),\n\t\tArgsUsage: \"[command]\",\n\t\tSubcommands: createSubCommands(bc.GetSubcommands(), cfg),\n\t\tFlags: getFlags(bc),\n\t}\n\n\tif bc.GetAction() != nil {\n\t\tcmd.Action = func(c *cli.Context) error {\n\t\t\tbc.GetAction()(commandContext{\n\t\t\t\tcontext: c,\n\t\t\t\tcfg: cfg,\n\t\t\t})\n\n\t\t\treturn nil\n\t\t}\n\t}\n\n\treturn cmd\n}", "title": "" }, { "docid": "0b98e30df5eb98931ecc7181b8a01cfe", "score": "0.48160818", "text": "func New() (cmd *cobra.Command) {\n\tcmd = &cobra.Command{\n\t\tUse: \"create\",\n\t\tHidden: true,\n\t\tDeprecated: \"use `fly apps create` instead\",\n\t}\n\n\tflag.Add(cmd,\n\t\tflag.String{\n\t\t\tName: \"name\",\n\t\t\tDescription: \"The app name to use\",\n\t\t},\n\t\tflag.Bool{\n\t\t\tName: \"generate-name\",\n\t\t\tDescription: \"Generate an app name\",\n\t\t},\n\t\tflag.String{\n\t\t\tName: \"network\",\n\t\t\tDescription: \"Specify custom network id\",\n\t\t},\n\t\tflag.Bool{\n\t\t\tName: \"machines\",\n\t\t\tDescription: \"Use the machines platform\",\n\t\t},\n\t\tflag.Org(),\n\t)\n\n\treturn cmd\n}", "title": "" }, { "docid": "cda228cb2f3b9aa89ecdf60ddedfa776", "score": "0.48098302", "text": "func ProjectSetFactory() (cli.Command, error) {\n\tcomm, err := newCommand(\"nerd project set\", \"Set current working project.\", \"\", nil)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to create command\")\n\t}\n\tcmd := &ProjectSet{\n\t\tcommand: comm,\n\t}\n\tcmd.runFunc = cmd.DoRun\n\n\treturn cmd, nil\n}", "title": "" }, { "docid": "42223a353db5ed35a0fb555416aae48c", "score": "0.4793386", "text": "func CreateCommand() *cobra.Command {\n\treturn base.CreateCommand(\"repo\", \"Create repo from xml\", New())\n}", "title": "" }, { "docid": "df6dbbcc50591414582abeeb15490b81", "score": "0.47887763", "text": "func NewCommand(parts ...string) Command {\n\treturn Command{parts}\n}", "title": "" }, { "docid": "e6910ba99c34840b24ea5ec8884fe334", "score": "0.4788371", "text": "func NewPluginCommand(cmd *cobra.Command, dockerCli *command.DockerCli) {\n}", "title": "" }, { "docid": "36ed147b7bbda7539bf3940223d95e47", "score": "0.47877264", "text": "func CreateMultiwordCommand(orig cli.Command) cli.Command {\n\tif !strings.Contains(orig.Name, \" \") {\n\t\treturn orig\n\t}\n\n\tcmdNameParts := strings.Split(orig.Name, \" \")\n\tlastIndex := len(cmdNameParts) - 1\n\n\t// create the innermost Command\n\tcmd := orig\n\tcmd.Name = cmdNameParts[lastIndex]\n\n\tlastIndex--\n\tfor lastIndex >= 0 {\n\t\tname := cmdNameParts[lastIndex]\n\t\tcmd = cli.Command{\n\t\t\tName: name,\n\t\t\tHidden: true,\n\t\t\tSubcommands: []cli.Command{cmd},\n\t\t}\n\t\tlastIndex--\n\t}\n\treturn cmd\n}", "title": "" }, { "docid": "19d23a859171d2dfbfd58c01cbcadb7d", "score": "0.4787367", "text": "func CreateCommand(commands []string) []string {\n\tdockerConfig := config.MainDockerConfig()\n\n\tcommand := \"cd \" + dockerConfig.Workspace\n\n\tfor _, element := range commands {\n\t\tcommand += \"&&\" + element\n\t}\n\n\treturn []string{\"sh\", \"-c\", command}\n}", "title": "" }, { "docid": "d55f462b5113a06667be5bdc49daf033", "score": "0.47859553", "text": "func CreateCommand(body interface{}) Command {\n\tcommandType := reflect.TypeOf(body)\n\treturn Command{MessageID: \"mid:\" + NewUUIDString(),\n\t\tCorrelationID: \"cid:\" + NewUUIDString(),\n\t\tCommandType: commandType.String(),\n\t\tCreated: time.Now(),\n\n\t\tBody: body}\n}", "title": "" }, { "docid": "566dbf50f662a6102c6cec843540c799", "score": "0.47854263", "text": "func newDependenciesCmd(f factory.Factory, globalFlags *flags.GlobalFlags) *cobra.Command {\n\tcmd := &dependenciesCmd{GlobalFlags: globalFlags}\n\n\tdependenciesCmd := &cobra.Command{\n\t\tUse: \"dependencies\",\n\t\tShort: \"Updates the git repositories of the dependencies defined in the devspace.yaml\",\n\t\tLong: `\n#######################################################\n############ devspace update dependencies #############\n#######################################################\nUpdates the git repositories of the dependencies defined\nin the devspace.yaml\n#######################################################\n\t`,\n\t\tArgs: cobra.NoArgs,\n\t\tRunE: func(cobraCmd *cobra.Command, args []string) error {\n\t\t\treturn cmd.RunDependencies(f, cobraCmd, args)\n\t\t},\n\t}\n\n\tdependenciesCmd.Flags().BoolVar(&cmd.AllowCyclicDependencies, \"allow-cyclic\", false, \"When enabled allows cyclic dependencies\")\n\n\treturn dependenciesCmd\n}", "title": "" }, { "docid": "f5f6134c981d0919b7e4ef34d1cd0526", "score": "0.47837052", "text": "func getCreateCommand() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"create {cluster} [args]\",\n\t\tShort: \"Create a test resource on Kubernetes\",\n\t\tExample: createExample,\n\t}\n\tcmd.AddCommand(getCreateClusterCommand())\n\treturn cmd\n}", "title": "" }, { "docid": "7bb8852ce2fd108b303ce0f3f0905f96", "score": "0.47754437", "text": "func NewCommand(fs afero.Fs, p *config.Params) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"brokers\",\n\t\tShort: \"View and configure Redpanda brokers through the admin listener\",\n\t\tArgs: cobra.ExactArgs(0),\n\t}\n\tcmd.AddCommand(\n\t\tnewListCommand(fs, p),\n\t\tnewDecommissionBroker(fs, p),\n\t\tnewDecommissionBrokerStatus(fs, p),\n\t\tnewRecommissionBroker(fs, p),\n\t)\n\treturn cmd\n}", "title": "" }, { "docid": "bc33590ac7843a1238aeff954e601e7a", "score": "0.47747183", "text": "func CreateBot(conf Config) Bot {\n\tbot := Bot{\n\t\tconfig: conf,\n\t\tinQueue: make(chan string, 100),\n\t\toutQueue: make(chan string, 100),\n\t\t// this currently isn't actually needed I don't think, so I should\n\t\t// probably remove it\n\t\tcommands: make(map[string]func(Message)),\n\t}\n\tbot.LoadCommands()\n\treturn bot\n}", "title": "" }, { "docid": "af737d73f01682f82e2059b335b1c24f", "score": "0.4765466", "text": "func New(buildRevision, buildTime string) *cobra.Command {\n\trootCmd := &cobra.Command{\n\t\tUse: \"iris-cli\",\n\t\tShort: \"Command Line Interface for Iris\",\n\t\tLong: `Iris CLI is a tool for Iris Web Framework.\nIt can be used to install starter kits and project structures \nComplete documentation is available at https://github.com/kataras/iris-cli`,\n\t\tSilenceErrors: true,\n\t\tSilenceUsage: true,\n\t\tTraverseChildren: true,\n\t\tSuggestionsMinimumDistance: 1,\n\t\tRun: func(cmd *cobra.Command, args []string) {},\n\t\tPersistentPreRun: func(cmd *cobra.Command, args []string) {\n\t\t\ttransport := &http.Transport{\n\t\t\t\tDisableCompression: true,\n\t\t\t\tDisableKeepAlives: true,\n\t\t\t\tTLSClientConfig: &tls.Config{\n\t\t\t\t\tInsecureSkipVerify: utils.IsInsideDocker(),\n\t\t\t\t},\n\t\t\t}\n\n\t\t\tif proxyAddr != \"\" {\n\t\t\t\tif proxyAddr == \"env\" {\n\t\t\t\t\ttransport.Proxy = http.ProxyFromEnvironment\n\t\t\t\t} else {\n\t\t\t\t\tu := &url.URL{Scheme: \"http\", Host: proxyAddr}\n\t\t\t\t\ttransport.Proxy = func(req *http.Request) (*url.URL, error) {\n\t\t\t\t\t\treturn u, nil\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tutils.DefaultClient.Transport = transport\n\t\t},\n\t}\n\n\thelpTemplate := HelpTemplate{\n\t\tBuildRevision: buildRevision,\n\t\tBuildTime: buildTime,\n\t\tShowGoRuntimeVersion: true,\n\t}\n\trootCmd.SetHelpTemplate(helpTemplate.String())\n\trootCmd.PersistentFlags().StringVar(&proxyAddr, \"proxy\", proxyAddr, \"--proxy=env to load from system or ip:port form, e.g. 51.158.178.4:3128\")\n\n\t// Commands.\n\trootCmd.AddCommand(initCommand())\n\trootCmd.AddCommand(newCommand())\n\trootCmd.AddCommand(runCommand())\n\trootCmd.AddCommand(cleanCommand())\n\trootCmd.AddCommand(unistallCommand())\n\trootCmd.AddCommand(addCommand())\n\trootCmd.AddCommand(checkCommand())\n\n\treturn rootCmd\n}", "title": "" }, { "docid": "c9151609e56e6793f1546765ff4e5558", "score": "0.4757448", "text": "func newCmdManager(out io.Writer) *cobra.Command {\n\tvar kubicCfgFile string\n\tvar kubeconfigFile = \"\"\n\tvar vars = []string{}\n\tvar crdsDir = \"config/crds\"\n\tvar rbacDir = \"config/rbac\"\n\n\tcmd := &cobra.Command{\n\t\tUse: \"manager\",\n\t\tShort: \"Run the Kubic controller manager.\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tvar err error\n\n\t\t\tkubicCfg, err := kubiccfg.ConfigFileAndDefaultsToKubicInitConfig(kubicCfgFile)\n\t\t\tkubeadmutil.CheckErr(err)\n\n\t\t\terr = kubicCfg.SetVars(vars)\n\t\t\tkubeadmutil.CheckErr(err)\n\n\t\t\tglog.V(1).Infof(\"[kubic] getting a kubeconfig to talk to the apiserver\")\n\t\t\tif len(kubeconfigFile) > 0 {\n\t\t\t\tglog.V(3).Infof(\"[kubic] setting KUBECONFIG to '%s'\", kubeconfigFile)\n\t\t\t\tos.Setenv(\"KUBECONFIG\", kubeconfigFile)\n\t\t\t}\n\t\t\tkubeconfig, err := config.GetConfig()\n\t\t\tkubeadmutil.CheckErr(err)\n\n\t\t\tglog.V(1).Infof(\"[kubic] creating a new manager to provide shared dependencies and start components\")\n\t\t\tmgr, err := manager.New(kubeconfig, manager.Options{})\n\t\t\tkubeadmutil.CheckErr(err)\n\n\t\t\tglog.V(1).Infof(\"[kubic] installing components\")\n\t\t\terr = loader.InstallRBAC(kubeconfig, loader.RBACInstallOptions{Paths: []string{rbacDir}})\n\t\t\tkubeadmutil.CheckErr(err)\n\t\t\t_, err = loader.InstallCRDs(kubeconfig, loader.CRDInstallOptions{Paths: []string{crdsDir}})\n\t\t\tkubeadmutil.CheckErr(err)\n\n\t\t\tglog.V(1).Infof(\"[kubic] setting up the scheme for all the resources\")\n\t\t\terr = apis.AddToScheme(mgr.GetScheme())\n\t\t\tkubeadmutil.CheckErr(err)\n\n\t\t\tglog.V(1).Infof(\"[kubic] setting up all the controllers\")\n\t\t\terr = controller.AddToManager(mgr, kubicCfg)\n\t\t\tkubeadmutil.CheckErr(err)\n\n\t\t\tglog.V(1).Infof(\"[kubic] starting the controller\")\n\t\t\terr = mgr.Start(signals.SetupSignalHandler())\n\t\t\tkubeadmutil.CheckErr(err)\n\t\t},\n\t}\n\n\tflagSet := cmd.PersistentFlags()\n\tflagSet.StringVar(&kubicCfgFile, \"config\", \"\", \"Path to kubic-init config file.\")\n\tflagSet.StringVar(&kubeconfigFile, \"kubeconfig\", \"\", \"Use this kubeconfig file for talking to the API server.\")\n\tflagSet.StringSliceVar(&vars, \"var\", []string{}, \"Set a configuration variable (ie, Network.Cni.Driver=cilium\")\n\tflagSet.StringVar(&crdsDir, \"crdsDir\", crdsDir, \"Load CRDs from this directory.\")\n\tflagSet.StringVar(&rbacDir, \"rbacDir\", rbacDir, \"Load RBACs from this directory.\")\n\treturn cmd\n}", "title": "" }, { "docid": "eafa7d56263926d7167494a339b908ae", "score": "0.47567278", "text": "func GetCreateCommand() (setup cli.Command) {\n\tsetup = cli.Command{\n\t\tName: \"create\",\n\t\tUsage: \"This subcommand is used to create a migration and register it with the management database.\",\n\t\tFlags: []cli.Flag{\n\t\t\tcli.StringFlag{\n\t\t\t\tName: \"version\",\n\t\t\t\tValue: \"\",\n\t\t\t\tUsage: \"The target git version\",\n\t\t\t},\n\t\t\tcli.BoolFlag{\n\t\t\t\tName: \"rollback\",\n\t\t\t\tUsage: \"Force a rollback (backward) migration to be created\",\n\t\t\t},\n\t\t\tcli.StringFlag{\n\t\t\t\tName: \"gitinfo\",\n\t\t\t\tValue: \"\",\n\t\t\t\tUsage: \"Provide a git info file for the schema in the working path\",\n\t\t\t},\n\t\t\tcli.BoolFlag{\n\t\t\t\tName: \"no-clone\",\n\t\t\t\tUsage: \"Do not clone from git. Use this when the yaml files have already been checked out.\",\n\t\t\t},\n\t\t},\n\t\tAction: func(ctx *cli.Context) error {\n\t\t\tvar version string\n\t\t\tvar gitinfo string\n\t\t\tvar rollback bool\n\t\t\tvar clone bool\n\n\t\t\trollback = false\n\t\t\tclone = true\n\n\t\t\t// Override the project settings with the command line flags\n\t\t\tif ctx.IsSet(\"version\") {\n\t\t\t\tversion = ctx.String(\"version\")\n\t\t\t} else if ctx.IsSet(\"gitinfo\") {\n\t\t\t\tgitinfo = ctx.String(\"gitinfo\")\n\t\t\t} else {\n\t\t\t\tcli.ShowSubcommandHelp(ctx)\n\t\t\t\treturn cli.NewExitError(\"Unable to generate a migration. Please specify a target version to migrate to.\", 1)\n\t\t\t}\n\n\t\t\tif ctx.IsSet(\"no-clone\") {\n\t\t\t\tclone = false\n\t\t\t}\n\n\t\t\t// Parse global flags\n\t\t\tparseGlobalFlags(ctx)\n\n\t\t\t// Setup the management database and configuration settings\n\t\t\tconf, err := configsetup.ConfigureManagement()\n\n\t\t\tif err != nil {\n\t\t\t\treturn cli.NewExitError(fmt.Sprintf(\"Configuration Load failed. Error: %v\", err), 1)\n\t\t\t}\n\n\t\t\tif ctx.IsSet(\"rollback\") {\n\t\t\t\trollback = ctx.Bool(\"rollback\")\n\t\t\t}\n\n\t\t\treturn create(version, gitinfo, clone, rollback, conf)\n\n\t\t},\n\t}\n\treturn setup\n}", "title": "" }, { "docid": "4abe5fc1813ecc6ad3332d1a3025a59c", "score": "0.47495493", "text": "func NewCreateCommand(f *factory.Factory) *cobra.Command {\n\topts := &Options{\n\t\tIO: f.IOStreams,\n\t\tConfig: f.Config,\n\t\tConnection: f.Connection,\n\t\tLogger: f.Logger,\n\t\tlocalizer: f.Localizer,\n\t}\n\n\tcmd := &cobra.Command{\n\t\tUse: opts.localizer.MustLocalize(\"decision.create.cmd.use\"),\n\t\tShort: opts.localizer.MustLocalize(\"decision.create.cmd.shortDescription\"),\n\t\tLong: opts.localizer.MustLocalize(\"decision.create.cmd.longDescription\"),\n\t\tExample: opts.localizer.MustLocalize(\"decision.create.cmd.example\"),\n\t\tArgs: cobra.RangeArgs(0, 1),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif len(args) > 0 {\n\t\t\t\topts.name = args[0]\n\n\t\t\t\tif err := decision.ValidateName(opts.name); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tif opts.dmnFile != \"\" {\n\t\t\t\t\tif err := decision.ValidateDMNfile(opts.dmnFile); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif !opts.IO.CanPrompt() && opts.name == \"\" && opts.dmnFile == \"\" {\n\t\t\t\treturn errors.New(opts.localizer.MustLocalize(\"decision.create.argument.name.error.requiredWhenNonInteractive\"))\n\t\t\t} else if opts.name == \"\" || opts.descrip == \"\" || opts.dmnFile == \"\" {\n\t\t\t\topts.interactive = true\n\t\t\t}\n\n\t\t\tvalidOutputFormats := flagutil.ValidOutputFormats\n\t\t\tif opts.outputFormat != \"\" && !flagutil.IsValidInput(opts.outputFormat, validOutputFormats...) {\n\t\t\t\treturn flag.InvalidValueError(\"output\", opts.outputFormat, validOutputFormats...)\n\t\t\t}\n\n\t\t\treturn runCreate(opts)\n\t\t},\n\t}\n\n\tcmd.Flags().StringVar(&opts.descrip, flags.FlagDescrip, \"\", opts.localizer.MustLocalize(\"decision.create.flag.descrip.description\"))\n\tcmd.Flags().StringVar(&opts.dmnFile, flags.FlagDMN, \"\", opts.localizer.MustLocalize(\"decision.create.flag.dmn.description\"))\n\tcmd.Flags().StringVar(&opts.kafkaSource, flags.FlagSource, \"\", opts.localizer.MustLocalize(\"decision.create.flag.kafkasource.description\"))\n\tcmd.Flags().StringVar(&opts.kafkaSink, flags.FlagSink, \"\", opts.localizer.MustLocalize(\"decision.create.flag.kafkasink.description\"))\n\tcmd.Flags().StringToStringVar(&opts.configs, flags.FlagConfig, map[string]string{}, opts.localizer.MustLocalize(\"decision.create.flag.config.description\"))\n\tcmd.Flags().StringToStringVar(&opts.tags, flags.FlagTag, map[string]string{}, opts.localizer.MustLocalize(\"decision.create.flag.tag.description\"))\n\tcmd.Flags().StringVarP(&opts.outputFormat, \"output\", \"o\", \"json\", opts.localizer.MustLocalize(\"decision.common.flag.output.description\"))\n\tcmd.Flags().BoolVar(&opts.autoUse, \"use\", true, opts.localizer.MustLocalize(\"decision.create.flag.autoUse.description\"))\n\tcmd.Flags().SortFlags = false\n\n\treturn cmd\n}", "title": "" }, { "docid": "25484cbc0b46f75af426cd8bc32bd299", "score": "0.47389317", "text": "func New(config Config) (*Command, error) {\n\t// Dependencies.\n\tif config.Logger == nil {\n\t\treturn nil, microerror.Maskf(invalidConfigError, \"%T.Logger must not be empty\", config)\n\t}\n\n\tc := &Command{\n\t\tlogger: config.Logger,\n\n\t\t// Internals.\n\t\tcobraCommand: nil,\n\t}\n\n\tc.cobraCommand = &cobra.Command{\n\t\tUse: \"project\",\n\t\tShort: \"Managing projects with CLI\",\n\t\tLong: `Creation project command is a wrapper that triggers a pipeline to created different resources.`,\n\t\tRun: c.Execute,\n\t}\n\n\tflags.AZDVOToken = os.Getenv(\"AZDVO_TOKEN\")\n\tflags.AZDVOUser = os.Getenv(\"AZDVO_USER\")\n\n\tc.cobraCommand.PersistentFlags().StringVarP(&flags.projectName, \"name\", \"n\", \"\", \"Name of the project that will be created\")\n\tc.cobraCommand.PersistentFlags().StringVarP(&flags.projectType, \"type\", \"t\", \"container-project\", \"Template project to be used\")\n\tc.cobraCommand.PersistentFlags().StringVarP(&flags.projectPlatform, \"platform\", \"p\", \"azuredevops\", \"In which platform will be created the project\")\n\n\treturn c, nil\n}", "title": "" }, { "docid": "b1e06b6547b2ad19137ac6b8a66bd9f2", "score": "0.4734655", "text": "func NewBuilder(c Config) (pool.EnvBuilder, error) {\n\troot, err := ioutil.TempDir(\"\", \"executorserver\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tc.Info(\"Created tmp dir for container root at:\", root)\n\n\tvar mb *mount.Builder\n\tmc, err := readMountConfig(c.MountConf)\n\tif err != nil {\n\t\tif !os.IsNotExist(err) {\n\t\t\treturn nil, err\n\t\t}\n\t\tc.Info(\"Mount.yaml(\", c.MountConf, \") does not exists, use the default container mount\")\n\t\tmb = getDefaultMount(c.TmpFsParam)\n\t} else {\n\t\tmb, err = parseMountConfig(mc)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tm := mb.FilterNotExist().Mounts\n\tc.Info(\"Created container mount at:\", mb)\n\n\tunshareFlags := uintptr(forkexec.UnshareFlags)\n\tif c.NetShare {\n\t\tunshareFlags ^= syscall.CLONE_NEWNET\n\t}\n\n\t// use setuid container only if running in root privilege\n\tvar credGen container.CredGenerator\n\tif os.Getuid() == 0 {\n\t\tcredGen = newCredGen()\n\t}\n\n\thostName := containerName\n\tdomainName := containerName\n\tworkDir := defaultWorkDir\n\tif mc != nil {\n\t\thostName = mc.HostName\n\t\tdomainName = mc.DomainName\n\t\tworkDir = mc.WorkDir\n\t}\n\tc.Info(\"Creating container builder: hostName=\", hostName, \", domainName=\", domainName, \", workDir=\", workDir)\n\n\tb := &container.Builder{\n\t\tRoot: root,\n\t\tMounts: m,\n\t\tCredGenerator: credGen,\n\t\tStderr: os.Stderr,\n\t\tCloneFlags: unshareFlags,\n\t\tExecFile: c.ContainerInitPath,\n\t\tHostName: hostName,\n\t\tDomainName: domainName,\n\t\tWorkDir: workDir,\n\t}\n\tcgb, err := cgroup.NewBuilder(c.CgroupPrefix).WithCPUAcct().WithMemory().WithPids().FilterByEnv()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tc.Info(\"Test created cgroup builder with:\", cgb)\n\tif cg, err := cgb.Build(); err != nil {\n\t\tc.Warn(\"Tested created cgroup with error\", err)\n\t\tc.Warn(\"Failed back to rlimit / rusage mode\")\n\t\tcgb = nil\n\t} else {\n\t\tcg.Destroy()\n\t}\n\n\tvar cgroupPool pool.CgroupPool\n\tif cgb != nil {\n\t\tcgroupPool = pool.NewFakeCgroupPool(cgb)\n\t}\n\treturn pool.NewEnvBuilder(b, cgroupPool, workDir), nil\n}", "title": "" }, { "docid": "9bb4a8af2868564a0f01e15b6681e7ff", "score": "0.47279787", "text": "func New(dockerCli command.Cli, opts ...Option) (_ *Builder, err error) {\n\tb := &Builder{\n\t\topts: builderOpts{\n\t\t\tdockerCli: dockerCli,\n\t\t\tvalidate: true,\n\t\t},\n\t}\n\tfor _, opt := range opts {\n\t\topt(b)\n\t}\n\n\tif b.opts.txn == nil {\n\t\t// if store instance is nil we create a short-lived one using the\n\t\t// default store and ensure we release it on completion\n\t\tvar release func()\n\t\tb.opts.txn, release, err = storeutil.GetStore(dockerCli)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdefer release()\n\t}\n\n\tif b.opts.name != \"\" {\n\t\tif b.NodeGroup, err = storeutil.GetNodeGroup(b.opts.txn, dockerCli, b.opts.name); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t} else {\n\t\tif b.NodeGroup, err = storeutil.GetCurrentInstance(b.opts.txn, dockerCli); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tif b.opts.validate {\n\t\tif err = b.Validate(); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn b, nil\n}", "title": "" }, { "docid": "80a3323207bd7e84be091e5b36f22908", "score": "0.4725154", "text": "func (build *commandBuilder) Create() commands.CommandBuilder {\n\tbuild.met = nil\n\tbuild.cmds = nil\n\tbuild.ins = nil\n\tbuild.up = nil\n\tbuild.del = nil\n\tbuild.err = nil\n\treturn build\n}", "title": "" }, { "docid": "f9c79424a57fe15f9f32898c3298a75d", "score": "0.47216234", "text": "func NewCreateCommand(parent cmd.Registerer, g *global.Data, m manifest.Data) *CreateCommand {\n\tc := CreateCommand{\n\t\tBase: cmd.Base{\n\t\t\tGlobals: g,\n\t\t},\n\t\tmanifest: m,\n\t}\n\tc.CmdClause = parent.Command(\"create\", \"Add an ACL entry to an ACL\").Alias(\"add\")\n\n\t// Required.\n\tc.CmdClause.Flag(\"acl-id\", \"Alphanumeric string identifying a ACL\").Required().StringVar(&c.aclID)\n\n\t// Optional.\n\tc.CmdClause.Flag(\"comment\", \"A freeform descriptive note\").Action(c.comment.Set).StringVar(&c.comment.Value)\n\tc.CmdClause.Flag(\"ip\", \"An IP address\").Action(c.ip.Set).StringVar(&c.ip.Value)\n\tc.CmdClause.Flag(\"negated\", \"Whether to negate the match\").Action(c.negated.Set).BoolVar(&c.negated.Value)\n\tc.RegisterFlag(cmd.StringFlagOpts{\n\t\tName: cmd.FlagServiceIDName,\n\t\tDescription: cmd.FlagServiceIDDesc,\n\t\tDst: &c.manifest.Flag.ServiceID,\n\t\tShort: 's',\n\t})\n\tc.RegisterFlag(cmd.StringFlagOpts{\n\t\tAction: c.serviceName.Set,\n\t\tName: cmd.FlagServiceName,\n\t\tDescription: cmd.FlagServiceDesc,\n\t\tDst: &c.serviceName.Value,\n\t})\n\tc.CmdClause.Flag(\"subnet\", \"Number of bits for the subnet mask applied to the IP address\").Action(c.subnet.Set).IntVar(&c.subnet.Value)\n\n\treturn &c\n}", "title": "" }, { "docid": "eb8078256d0c50f2cc82a1a31985e60f", "score": "0.47203666", "text": "func NewCmdFactory(register func(id string) (*RegisteredLoop, error), lcfg CmdConfig) (func() *exec.Cmd, error) {\n\tregisteredLoop, err := register(lcfg.ID)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to register %s LOOP plugin: %w\", lcfg.ID, err)\n\t}\n\treturn func() *exec.Cmd {\n\t\tcmd := exec.Command(lcfg.Cmd) //#nosec G204 -- we control the value of the cmd so the lint/sec error is a false positive\n\t\tSetCmdEnvFromConfig(cmd, registeredLoop.EnvCfg)\n\t\treturn cmd\n\t}, nil\n}", "title": "" }, { "docid": "428736839433442cf51a45086248ad35", "score": "0.47191036", "text": "func NewCreateCommand(parent cmd.Registerer, globals *config.Data, data manifest.Data) *CreateCommand {\n\tvar c CreateCommand\n\tc.Globals = globals\n\tc.manifest = data\n\tc.CmdClause = parent.Command(\"create\", \"Create a healthcheck on a Fastly service version\").Alias(\"add\")\n\tc.RegisterServiceIDFlag(&c.manifest.Flag.ServiceID)\n\tc.RegisterServiceVersionFlag(cmd.ServiceVersionFlagOpts{\n\t\tDst: &c.serviceVersion.Value,\n\t})\n\tc.RegisterAutoCloneFlag(cmd.AutoCloneFlagOpts{\n\t\tAction: c.autoClone.Set,\n\t\tDst: &c.autoClone.Value,\n\t})\n\tc.CmdClause.Flag(\"name\", \"Healthcheck name\").Short('n').Required().StringVar(&c.Input.Name)\n\tc.CmdClause.Flag(\"comment\", \"A descriptive note\").StringVar(&c.Input.Comment)\n\tc.CmdClause.Flag(\"method\", \"Which HTTP method to use\").StringVar(&c.Input.Method)\n\tc.CmdClause.Flag(\"host\", \"Which host to check\").StringVar(&c.Input.Host)\n\tc.CmdClause.Flag(\"path\", \"The path to check\").StringVar(&c.Input.Path)\n\tc.CmdClause.Flag(\"http-version\", \"Whether to use version 1.0 or 1.1 HTTP\").StringVar(&c.Input.HTTPVersion)\n\tc.CmdClause.Flag(\"timeout\", \"Timeout in milliseconds\").UintVar(&c.Input.Timeout)\n\tc.CmdClause.Flag(\"check-interval\", \"How often to run the healthcheck in milliseconds\").UintVar(&c.Input.CheckInterval)\n\tc.CmdClause.Flag(\"expected-response\", \"The status code expected from the host\").UintVar(&c.Input.ExpectedResponse)\n\tc.CmdClause.Flag(\"window\", \"The number of most recent healthcheck queries to keep for this healthcheck\").UintVar(&c.Input.Window)\n\tc.CmdClause.Flag(\"threshold\", \"How many healthchecks must succeed to be considered healthy\").UintVar(&c.Input.Threshold)\n\tc.CmdClause.Flag(\"initial\", \"When loading a config, the initial number of probes to be seen as OK\").UintVar(&c.Input.Initial)\n\treturn &c\n}", "title": "" }, { "docid": "3a7bb9b565348ff888f06f4edfb1f7b8", "score": "0.47174752", "text": "func newCreateSubscriptionCmd(out io.Writer) *cobra.Command {\n\tcommand := &cobra.Command{\n\t\tUse: \"create_subscription TOPIC_ID SUBSCRIPTION_ID\",\n\t\tShort: \"create Pub/Sub subscription\",\n\t\tLong: \"create subscription\",\n\t\tExample: \"pubsub_cli create_subscription test_topic test_topic_sub --create-if-not-exist --host=localhost:8085 --project=test_project\",\n\t\tAliases: []string{\"cs\"},\n\t\tArgs: cobra.MinimumNArgs(2),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\ttopicID := args[0]\n\t\t\tsubscriptionID := args[1]\n\t\t\tprojectID, err := cmd.Flags().GetString(projectFlagName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\temulatorHost, err := cmd.Flags().GetString(hostFlagName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tgcpCredentialFilePath, err := cmd.Flags().GetString(credFileFlagName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tcreateTopicIfNotExist, err := cmd.Flags().GetBool(createTopicIfNotExistFlagName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tpubsubClient, err := pkg.NewPubSubClient(cmd.Context(), projectID, emulatorHost, gcpCredentialFilePath)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"initialize pubsub client\")\n\t\t\t}\n\t\t\treturn createSubscription(cmd.Context(), out, pubsubClient, topicID, subscriptionID, createTopicIfNotExist)\n\t\t},\n\t}\n\tcommand.SetOut(out)\n\tcommand.PersistentFlags().Bool(createTopicIfNotExistFlagName, false, \"create topics if not exist\")\n\t// TODO: add flags below\n\t// optional flags may be --ack-deadline | --dead-letter-topic |\n\t// --dead-letter-topic-project |\n\t// --enable-message-ordering | --expiration-period |\n\t// --help | --labels | --max-delivery-attempts |\n\t// --max-retry-delay | --message-retention-duration |\n\t// --min-retry-delay | --push-auth-service-account |\n\t// --push-auth-token-audience | --push-endpoint |\n\t// --retain-acked-messages | --topic-project\n\treturn command\n}", "title": "" }, { "docid": "968691bcf2698ba42eb61198888fb140", "score": "0.47132444", "text": "func New() Interface {\n\treturn &command{}\n}", "title": "" }, { "docid": "f55665d7d43f93ea7ec7568a5113bc77", "score": "0.4711323", "text": "func NewCommand() *cobra.Command {\n\treturn cmd.NewQueueCommand(\"build\")\n}", "title": "" }, { "docid": "ae74011b5a00beb9a78e2161b1865343", "score": "0.47111446", "text": "func createCommand(vars map[string]string) (repository.Command, bool) {\n\tif value, ok := vars[\"git\"]; ok {\n\t\t// add Git command\n\t\treturn command.NewGitProxyCommand(value, vars), true\n\t}\n\treturn nil, false\n}", "title": "" }, { "docid": "9e78ba8faebe82bed63e3c4960d107bc", "score": "0.47105637", "text": "func New(b *bot.Bot, name string, commands *map[string]*Command) *Command {\n\treturn &Command{\n\t\tName: name,\n\t\tAllowedChatType: AllowedChatTypeAll,\n\t\tchildren: map[string]*Command{},\n\t\tBot: b,\n\t\tCommandMap: commands,\n\t}\n}", "title": "" }, { "docid": "24c23d542e45aa0270cd4927adfcac92", "score": "0.470914", "text": "func CreateCommand() *cobra.Command {\n\treturn base.CreateCommand(\"model\", \"Create golang model from xml\", New())\n}", "title": "" }, { "docid": "3517617517e19dea34ee0b2266e7d762", "score": "0.4692104", "text": "func SecretDeleteFactory() (cli.Command, error) {\n\tcomm, err := newCommand(\"nerd secret delete <name>\", \"Remove a secret.\", \"\", nil)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to create command\")\n\t}\n\tcmd := &SecretDelete{\n\t\tcommand: comm,\n\t}\n\tcmd.runFunc = cmd.DoRun\n\n\treturn cmd, nil\n}", "title": "" }, { "docid": "83ea9e38451e1c047d0c5c83c7a66bbc", "score": "0.46806285", "text": "func New(rootConfig *rootcmd.Config) *ffcli.Command {\n\tcfg := Config{\n\t\trootConfig: rootConfig,\n\t}\n\n\tfs := flag.NewFlagSet(rootcmd.CommandName+\" build\", flag.ExitOnError)\n\tfs.BoolVar(&cfg.noClean, \"noClean\", false, \"do not clean out /content before building\")\n\n\trootConfig.RegisterFlags(fs)\n\n\treturn &ffcli.Command{\n\t\tName: \"build\",\n\t\tShortUsage: rootcmd.CommandName + \" build [flags] <action>\",\n\t\tShortHelp: \"Build re-creates the themes site's content based on themes.txt and go.mod.\",\n\t\tFlagSet: fs,\n\t\tExec: cfg.Exec,\n\t}\n}", "title": "" }, { "docid": "7150b0b631971b2419dfa562b0885866", "score": "0.46764338", "text": "func New(name string, description string, owner bool, run func(s *discordgo.Session, m *discordgo.MessageCreate, args []string)) {\n\tCommands[name] = Command{\n\t\tName: name,\n\t\tDescription: description,\n\t\tOwner: owner,\n\t\tRun: run,\n\t}\n\n\tlog.Printf(\"Loaded new command [%s]\", name)\n}", "title": "" }, { "docid": "98c1e72b33deb11396706bb8d2e6734f", "score": "0.4666788", "text": "func CreateCommand() *cobra.Command {\n\n\tcmd := util.GenerateCmd(\"namespaces\", \"List, create and delete namespaces\", \"\", nil, nil)\n\n\tcmd.AddCommand(listCmd)\n\tcmd.AddCommand(createCmd)\n\tcmd.AddCommand(deleteCmd)\n\n\treturn cmd\n\n}", "title": "" }, { "docid": "5860b66033afae79fc22b2eec12aa7dc", "score": "0.4666386", "text": "func RootCmdFactory(session *discordgo.Session, event *discordgo.MessageCreate) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\t// short usage\n\t\tShort: \"Simple example bot\",\n\t\t// example is shown when help is called\n\t\tExample: `\n!ping - pong.\n!echo <message> - echoes the given message.\n!help - get help\n`,\n\t}\n\t// register child commands\n\tcmd.AddCommand(\n\t\tcolorCommandFactory(session, event),\n\t)\n\treturn cmd\n}", "title": "" }, { "docid": "b8b29a1ce32cb729d49c3c3f8dd7b0cc", "score": "0.46617752", "text": "func newNodesCommand(jenkins jenkins.Client, slackClient client.SlackClient) bot.Command {\n\treturn &nodesCommand{jenkins, slackClient}\n}", "title": "" }, { "docid": "865744c0a7c6075d4852ffe81bd2455d", "score": "0.46571577", "text": "func NewCommand(deps Dependencies) *Command {\n\treturn &Command{\n\t\tStdin: os.Stdin,\n\t\tStdout: os.Stdout,\n\t\tStderr: os.Stderr,\n\t\tserver: deps.Server,\n\t\tfilter: deps.SeriesGeneratorFilter,\n\t}\n}", "title": "" }, { "docid": "1ab4620e51bd9bc95e903c55ae23490c", "score": "0.46502632", "text": "func NewBuilder(scopes ...string) (*builder, error) {\n\tif len(scopes) == 0 {\n\t\tscopes = []string{di.App, di.Request, di.SubRequest}\n\t}\n\tb, err := di.NewBuilder(scopes...)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not create di.Builder: %v\", err)\n\t}\n\tprovider := &providerPkg.ProviderObject{}\n\tif err := provider.Load(); err != nil {\n\t\treturn nil, fmt.Errorf(\"could not load definitions with the Provider (ProviderObject from gitlab.com/igor.tumanov1/theboatscom/di/sarulabsdingo/container): %v\", err)\n\t}\n\tfor _, d := range getDiDefs(provider) {\n\t\tif err := b.Add(d); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not add di.Def in di.Builder: %v\", err)\n\t\t}\n\t}\n\treturn &builder{builder: b}, nil\n}", "title": "" }, { "docid": "aadb51ef3dee9de7788747860102ab1a", "score": "0.4630659", "text": "func CreateCommand(inFilePDF, inFileJSON, outFilePDF string, conf *model.Configuration) *Command {\n\tif conf == nil {\n\t\tconf = model.NewDefaultConfiguration()\n\t}\n\tconf.Cmd = model.CREATE\n\treturn &Command{\n\t\tMode: model.CREATE,\n\t\tInFile: &inFilePDF,\n\t\tInFileJSON: &inFileJSON,\n\t\tOutFile: &outFilePDF,\n\t\tConf: conf}\n}", "title": "" }, { "docid": "48b94799efefbfaee5e6b47e1a275efc", "score": "0.46177077", "text": "func NewCreateClusterCommand() *cobra.Command {\n\topt := &Options{}\n\n\topt.homeDir = \".\"\n\n\tif u, err := user.Current(); err == nil {\n\t\topt.homeDir = u.HomeDir\n\t}\n\tdefaultSSHPublicKeyFile := filepath.Join(opt.homeDir, \".ssh\", \"id_rsa.pub\")\n\n\tdefaultPullSecretFile := filepath.Join(opt.homeDir, \".pull-secret\")\n\tif _, err := os.Stat(defaultPullSecretFile); os.IsNotExist(err) {\n\t\tdefaultPullSecretFile = \"\"\n\t} else if err != nil {\n\t\tlog.WithError(err).Errorf(\"%v can not be used\", defaultPullSecretFile)\n\t}\n\n\tcmd := &cobra.Command{\n\t\tUse: `create-cluster CLUSTER_DEPLOYMENT_NAME\ncreate-cluster CLUSTER_DEPLOYMENT_NAME --cloud=aws\ncreate-cluster CLUSTER_DEPLOYMENT_NAME --cloud=azure --azure-base-domain-resource-group-name=RESOURCE_GROUP_NAME\ncreate-cluster CLUSTER_DEPLOYMENT_NAME --cloud=gcp --gcp-project-id=PROJECT_ID`,\n\t\tShort: \"Creates a new Hive cluster deployment\",\n\t\tLong: fmt.Sprintf(longDesc, defaultSSHPublicKeyFile, defaultPullSecretFile),\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tlog.SetLevel(log.InfoLevel)\n\t\t\tif err := opt.Complete(cmd, args); err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif err := opt.Validate(cmd); err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\terr := opt.Run()\n\t\t\tif err != nil {\n\t\t\t\tlog.WithError(err).Error(\"Error\")\n\t\t\t}\n\t\t},\n\t}\n\n\tflags := cmd.Flags()\n\tflags.StringVar(&opt.Cloud, \"cloud\", cloudAWS, \"Cloud provider: aws(default)|azure|gcp)\")\n\tflags.StringVarP(&opt.Namespace, \"namespace\", \"n\", \"\", \"Namespace to create cluster deployment in\")\n\tflags.StringVar(&opt.SSHPrivateKeyFile, \"ssh-private-key-file\", \"\", \"file name containing private key contents\")\n\tflags.StringVar(&opt.SSHPublicKeyFile, \"ssh-public-key-file\", defaultSSHPublicKeyFile, \"file name of SSH public key for cluster\")\n\tflags.StringVar(&opt.SSHPublicKey, \"ssh-public-key\", \"\", \"SSH public key for cluster\")\n\tflags.StringVar(&opt.BaseDomain, \"base-domain\", \"new-installer.openshift.com\", \"Base domain for the cluster\")\n\tflags.StringVar(&opt.PullSecret, \"pull-secret\", \"\", \"Pull secret for cluster. Takes precedence over pull-secret-file.\")\n\tflags.StringVar(&opt.DeleteAfter, \"delete-after\", \"\", \"Delete this cluster after the given duration. (i.e. 8h)\")\n\tflags.StringVar(&opt.PullSecretFile, \"pull-secret-file\", defaultPullSecretFile, \"Pull secret file for cluster\")\n\tflags.StringVar(&opt.CredsFile, \"creds-file\", \"\", \"Cloud credentials file (defaults vary depending on cloud)\")\n\tflags.StringVar(&opt.ClusterImageSet, \"image-set\", \"\", \"Cluster image set to use for this cluster deployment\")\n\tflags.StringVar(&opt.InstallerImage, \"installer-image\", \"\", \"Installer image to use for installing this cluster deployment\")\n\tflags.StringVar(&opt.ReleaseImage, \"release-image\", \"\", \"Release image to use for installing this cluster deployment\")\n\tflags.StringVar(&opt.ReleaseImageSource, \"release-image-source\", \"https://openshift-release.svc.ci.openshift.org/api/v1/releasestream/4-stable/latest\", \"URL to JSON describing the release image pull spec\")\n\tflags.StringVar(&opt.ServingCert, \"serving-cert\", \"\", \"Serving certificate for control plane and routes\")\n\tflags.StringVar(&opt.ServingCertKey, \"serving-cert-key\", \"\", \"Serving certificate key for control plane and routes\")\n\tflags.BoolVar(&opt.ManageDNS, \"manage-dns\", false, \"Manage this cluster's DNS. This is only available for AWS.\")\n\tflags.BoolVar(&opt.UseClusterImageSet, \"use-image-set\", true, \"If true(default), use a cluster image set for this cluster\")\n\tflags.StringVarP(&opt.Output, \"output\", \"o\", \"\", \"Output of this command (nothing will be created on cluster). Valid values: yaml,json\")\n\tflags.BoolVar(&opt.IncludeSecrets, \"include-secrets\", true, \"Include secrets along with ClusterDeployment\")\n\tflags.BoolVar(&opt.InstallOnce, \"install-once\", false, \"Run the install only one time and fail if not successful\")\n\tflags.BoolVar(&opt.UninstallOnce, \"uninstall-once\", false, \"Run the uninstall only one time and fail if not successful\")\n\tflags.BoolVar(&opt.SimulateBootstrapFailure, \"simulate-bootstrap-failure\", false, \"Simulate an install bootstrap failure by injecting an invalid manifest.\")\n\tflags.Int64Var(&opt.WorkerNodes, \"workers\", 3, \"Number of worker nodes to create.\")\n\n\t// Azure flags\n\tflags.StringVar(&opt.AzureBaseDomainResourceGroupName, \"azure-base-domain-resource-group-name\", \"os4-common\", \"Resource group where the azure DNS zone for the base domain is found\")\n\n\t// GCP flags\n\tflags.StringVar(&opt.GCPProjectID, \"gcp-project-id\", \"\", \"Project ID is the ID of the GCP project to use\")\n\n\treturn cmd\n}", "title": "" }, { "docid": "d5b466b1e2c298644b6e7e2110802d9b", "score": "0.45896092", "text": "func (m *Module) CreateCommands() {\n\tr := m.Sys.CommandRouter\n\n\t// =================== Adjustments ========================\n\t// !______________________________________________________!\n\tr.On(\"hue\", m.NewEffectCommandFloat(exeffects.Hue)).Set(\"\", \"adjusts the hue of the supplied image;\\nex: `hue [degree]`\")\n\tr.On(\"animatehue\", m.NewGifCommand(exeffects.Hue, &animate.Options{From: 0, To: 360, Increment: 10, Delay: 10})).Set(\"\", \"Creates an image with an animated hue\")\n\n\tr.On(\"saturation\", m.NewEffectCommandFloat(adjust.Saturation)).Set(\"\", \"Adjusts the saturation of an image;\\nex: `saturation [value]`\")\n\tr.On(\"contrast\", m.NewEffectCommandFloat(adjust.Contrast)).Set(\"\", \"Adjusts the contrast of an image;\\nex: `contrast [value]`\")\n\tr.On(\"gamma\", m.NewEffectCommandFloat(adjust.Gamma)).Set(\"\", \"Adjusts the gamma of an image;\\nex: `gamma [value]`\")\n\tr.On(\"brightness\", m.NewEffectCommandFloat(adjust.Brightness)).Set(\"\", \"Adjusts the brightness of an image;\\nex: `brightness [value]`\")\n\n\t// =================== Effects ============================\n\t// !______________________________________________________!\n\tr.On(\"pixelate\", m.NewEffectCommandFloat(exeffects.Pixelate, constraints(oMax(1), oMin(0), oDefault(0.1)))).Set(\"\", \"Piexelates an image\\nUsage: `pixelate [scale 0-1.0]\")\n\tr.On(\"jpegify\", m.NewEffectCommandFloat(exeffects.Jpegify, constraints(oMax(100), oMin(0), oDefault(1)))).Set(\"\", \"Almost as good as lossy audio\\nUsage: `jpegify [quality 0-100]`\")\n\tr.On(\"animatejpegify\", m.NewGifCommand(exeffects.Jpegify, &animate.Options{From: 100, To: 1, Increment: 5, Delay: 10})).Set(\"\", \"Animates the jpegification of an image\")\n\tr.On(\"textify\", m.CmdTextify).Set(\"\", \"Converts an image to text\")\n\tr.On(\"overlay\", m.NewBlendCommand(exeffects.Overlay)).Set(\"\", \"Overlays the last sent image over the image sent before it\")\n\tr.On(\"duoimage\", m.NewBlendCommand(exeffects.DuoImage)).Set(\"\", \"Merge two images so that one is visible only on discord light theme, \"+\n\t\t\"and the other only visible on discord dark theme\")\n\n\tr.On(\"sharpen\", m.NewEffectCmdSingle(effect.Sharpen)).Set(\"\", \"Applies a sharpen effect to an image\")\n\tr.On(\"invert\", m.NewEffectCmdSingle(effect.Invert)).Set(\"\", \"inverts an image\")\n\tr.On(\"emboss\", m.NewEffectCmdSingle(effect.Emboss)).Set(\"\", \"applies an emboss effect to an image\")\n\tr.On(\"sepia\", m.NewEffectCmdSingle(effect.Sepia)).Set(\"\", \"applies a sepia effect to an image\")\n\tr.On(\"sobel\", m.NewEffectCmdSingle(effect.Sobel)).Set(\"\", \"applies a sobel effect to an image\")\n\tr.On(\"grayscale\", m.NewEffectCmdSingle(func(img image.Image) *image.RGBA { return clone.AsRGBA(effect.Grayscale(img)) })).Set(\"\", \"applies a grayscale effect to an image\")\n\tr.On(\"edgedetect\", m.NewEffectCmdSingle(exeffects.EdgeDetect)).Set(\"\", \"Perform an edge detection\")\n\n\tr.On(\"erode\", m.NewEffectCommandFloat(effect.Erode, constraints(oMax(5)))).Set(\"\", \"applies an erode effect to an image\\nUsage: `erode [radius]`\")\n\tr.On(\"dilate\", m.NewEffectCommandFloat(effect.Dilate, constraints(oMax(5), oMin(0)))).Set(\"\", \"Dilate the image.\\nUsage: `dilate [radius]`\")\n\tr.On(\"animatedilate\", m.NewGifCommand(effect.Dilate, &animate.Options{From: 0, To: 6, Increment: 0.5, Delay: 10, StopFor: 30, LoopBackwards: true}))\n\n\t// ================== Blur ============================\n\t// !__________________________________________________!\n\tr.On(\"blur\", m.NewEffectCommandFloat(blur.Gaussian, constraints(oMax(10), oMin(0)))).Set(\"\", \"creates a gaussian blur:\\nUsage: `blur [radius]`\")\n\tr.On(\"boxblur\", m.NewEffectCommandFloat(blur.Box, constraints(oMax(10), oMin(0)))).Set(\"\", \"creates a box blue:\\nUsage: `boxblur [radius]\")\n\n\t// ================= Transform =======================\n\t// !_________________________________________________!\n\tr.On(\"rotate\", m.NewEffectCommandFloat(exeffects.Rotate, constraints(oMax(360), oMin(-360)))).Set(\"\", \"rotate an image [n] degrees\\nUsage: `rotate [degrees]`\")\n\tr.On(\"animaterotate\", m.NewGifCommand(exeffects.Rotate, &animate.Options{From: 0, To: 360, Increment: 10, Delay: 10})).Set(\"\", \"Animates the rotation of an image\")\n\tr.On(\"shearh\", m.NewEffectCommandFloat(transform.ShearH, constraints(oMax(360), oMin(-360)))).Set(\"\", \"shear horizontal\\nUsage: `shearh [amount]`\")\n\tr.On(\"shearv\", m.NewEffectCommandFloat(transform.ShearV, constraints(oMax(360), oMin(-360)))).Set(\"\", \"shear vertical\\nUsage: `shearh [amount]`\")\n\tr.On(\"fliph\", m.NewEffectCmdSingle(transform.FlipH)).Set(\"\", \"flip an image over the horizontal axis\")\n\tr.On(\"flipv\", m.NewEffectCmdSingle(transform.FlipV)).Set(\"\", \"flip an image over the vertical axis\")\n}", "title": "" }, { "docid": "3b68e5b2bd10d9b643b4bc8a9d176214", "score": "0.4587676", "text": "func (r runtimeBuilderFactory) Builder(config *s2iapi.Config, overrides s2ibuild.Overrides) (s2ibuild.Builder, s2iapi.BuildInfo, error) {\n\tvar client docker.Client\n\tvar err error\n\tbuilder, buildInfo, err := s2i.Strategy(client, config, overrides)\n\treturn builder, buildInfo, err\n}", "title": "" }, { "docid": "79d3783672d731d513bb3238086fee9d", "score": "0.45874834", "text": "func NewStartCommand() *cobra.Command {\n\tvar config string\n\tvar schema string\n\tvar worker string\n\tvar listen string\n\tvar saAccount string\n\tvar saKey string\n\tvar saConnectionString string\n\tvar saStuccoFiles string\n\tvar cert string\n\tvar key string\n\tvar maxDepth int\n\tstartCommand := &cobra.Command{\n\t\tUse: \"start\",\n\t\tShort: \"Run azure router\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tvar cfg server.Config\n\t\t\tif config == \"\" && schema == \"\" {\n\t\t\t\tvar err error\n\t\t\t\tconfig, schema, err = createBlobLinks(saStuccoFiles, saAccount, saKey, saConnectionString)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Fatal(err)\n\t\t\t\t}\n\t\t\t}\n\t\t\tif err := utils.LoadConfigFile(config, &cfg); err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t\tif schema != \"\" {\n\t\t\t\tcfg.Schema = schema\n\t\t\t}\n\t\t\tif maxDepth != 0 {\n\t\t\t\tcfg.MaxDepth = maxDepth\n\t\t\t}\n\t\t\tvar azureAttribs map[string]interface{}\n\t\t\tif cert != \"\" || key != \"\" {\n\t\t\t\tazureAttribs = map[string]interface{}{\n\t\t\t\t\t\"cert\": cert,\n\t\t\t\t\t\"key\": key,\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdri := &server.Drivers{\n\t\t\t\t{\n\t\t\t\t\tType: server.Plugin,\n\t\t\t\t\tOptional: true,\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tConfig: driver.Config{\n\t\t\t\t\t\tProvider: \"azure\",\n\t\t\t\t\t\tRuntime: \"function\",\n\t\t\t\t\t},\n\t\t\t\t\tType: server.Azure,\n\t\t\t\t\tAttributes: azureAttribs,\n\t\t\t\t},\n\t\t\t}\n\t\t\tif err := dri.Load(); err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t\tdefer dri.Close()\n\t\t\th, err := server.New(server.Config{\n\t\t\t\tConfig: cfg.Config,\n\t\t\t\tDefaultEnvironment: router.Environment{\n\t\t\t\t\tProvider: \"azure\",\n\t\t\t\t\tRuntime: \"function\",\n\t\t\t\t},\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t\twebhookHandler, err := server.NewWebhookHandler(cfg)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t\tsrv := server.Server{\n\t\t\t\tHandler: h,\n\t\t\t\tWebhookHandler: webhookHandler,\n\t\t\t\tAddr: listen,\n\t\t\t}\n\t\t\tif err := srv.ListenAndServe(); err != nil && err != http.ErrServerClosed {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t},\n\t}\n\tstartCommand.Flags().StringVarP(&config, \"config\", \"c\", defaults.config, \"Path or url to stucco config\")\n\tstartCommand.Flags().StringVarP(&listen, \"listen\", \"l\", defaults.listenAddress, \"Router listen address\")\n\tstartCommand.Flags().StringVarP(&schema, \"schema\", \"s\", defaults.schema, \"Path or url to stucco schema\")\n\tstartCommand.Flags().StringVarP(&worker, \"worker\", \"w\", defaults.worker, \"Address of azure function worker\")\n\tstartCommand.Flags().StringVar(&saAccount, \"storage-account\", defaults.storage.account, \"Storage account to use\")\n\tstartCommand.Flags().StringVar(&saKey, \"storage-account-key\", defaults.storage.key, \"Key to storage account\")\n\tstartCommand.Flags().StringVar(&saConnectionString, \"storage-connection-string\", defaults.storage.connectionString, \"Connection string to azure web jobs storage\")\n\tstartCommand.Flags().StringVar(&saStuccoFiles, \"stucco-files-container\", defaults.storage.stuccoFiles, \"A name of container with stucco files in Azure Storage\")\n\tstartCommand.Flags().StringVar(&cert, \"cert\", \"\", \"Certficate for client cert auth\")\n\tstartCommand.Flags().StringVar(&key, \"key\", \"\", \"Key for client cert auth\")\n\tstartCommand.Flags().IntVar(&maxDepth, \"max-depth\", defaults.maxDepth, \"Limit GraphQL recursion\")\n\treturn startCommand\n}", "title": "" }, { "docid": "dcd9cabb9c16068a9d4718c7eb7bca94", "score": "0.45854446", "text": "func NewCommandBus() *CommandBus {\n\treturn &CommandBus{\n\t\thandlers: make(map[string]CommandHandler),\n\t}\n}", "title": "" }, { "docid": "538e3c85643f4161d51d650e5b02f6a1", "score": "0.45849591", "text": "func BuildManagerCloseCommand(basePrefix ...string) []string {\n\treturn append(BuildManagerCommand(basePrefix...), CloseCommand)\n}", "title": "" }, { "docid": "db9c6baf6d5cf014c25e96c9214aa827", "score": "0.4582603", "text": "func newCMD(raw string) (*CMD, error) {\n\tvar cmd CMD\n\tcmd.Status = 0\n\tcmd.Raw = raw\n\terr := cmd.loadArgs()\n\tif err != nil {\n\t\tlog.Fatal(err.Error())\n\t\treturn &cmd, err\n\t}\n\tif strings.Contains(raw, \"#cloud-config\") {\n\t\tcmd.Type = \"script\"\n\t\terr = cmd.buildInitCmd()\n\t} else {\n\t\tcmd.Type = \"command\"\n\t\terr = cmd.buildCmd()\n\t}\n\tif err != nil {\n\t\tlog.Fatal(err.Error())\n\t\treturn &cmd, err\n\t}\n\tcmd.Status = 1\n\treturn &cmd, nil\n}", "title": "" }, { "docid": "704f195a6f43826a1298bcedd967418e", "score": "0.45757145", "text": "func NewCommand(\n\tname string,\n\tbuilder appflag.Builder,\n\tmoduleReaderProvider bufcli.ModuleReaderProvider,\n) *appcmd.Command {\n\tflags := newFlags()\n\treturn &appcmd.Command{\n\t\tUse: name,\n\t\tShort: \"Generate stubs for a plugin.\",\n\t\tArgs: cobra.NoArgs,\n\t\tRun: builder.NewRunFunc(\n\t\t\tfunc(ctx context.Context, container applog.Container) error {\n\t\t\t\treturn run(ctx, container, flags, moduleReaderProvider)\n\t\t\t},\n\t\t),\n\t\tBindFlags: flags.Bind,\n\t}\n}", "title": "" }, { "docid": "ad2bd1504d28adeda5ce897897ce968c", "score": "0.45752192", "text": "func NewCmdCreateConfigMap(f cmdutil.Factory, ioStreams genericiooptions.IOStreams) *cobra.Command {\n\to := NewConfigMapOptions(ioStreams)\n\n\tcmd := &cobra.Command{\n\t\tUse: \"configmap NAME [--from-file=[key=]source] [--from-literal=key1=value1] [--dry-run=server|client|none]\",\n\t\tDisableFlagsInUseLine: true,\n\t\tAliases: []string{\"cm\"},\n\t\tShort: i18n.T(\"Create a config map from a local file, directory or literal value\"),\n\t\tLong: configMapLong,\n\t\tExample: configMapExample,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tcmdutil.CheckErr(o.Complete(f, cmd, args))\n\t\t\tcmdutil.CheckErr(o.Validate())\n\t\t\tcmdutil.CheckErr(o.Run())\n\t\t},\n\t}\n\to.PrintFlags.AddFlags(cmd)\n\n\tcmdutil.AddApplyAnnotationFlags(cmd)\n\tcmdutil.AddValidateFlags(cmd)\n\tcmdutil.AddDryRunFlag(cmd)\n\n\tcmd.Flags().StringSliceVar(&o.FileSources, \"from-file\", o.FileSources, \"Key file can be specified using its file path, in which case file basename will be used as configmap key, or optionally with a key and file path, in which case the given key will be used. Specifying a directory will iterate each named file in the directory whose basename is a valid configmap key.\")\n\tcmd.Flags().StringArrayVar(&o.LiteralSources, \"from-literal\", o.LiteralSources, \"Specify a key and literal value to insert in configmap (i.e. mykey=somevalue)\")\n\tcmd.Flags().StringSliceVar(&o.EnvFileSources, \"from-env-file\", o.EnvFileSources, \"Specify the path to a file to read lines of key=val pairs to create a configmap.\")\n\tcmd.Flags().BoolVar(&o.AppendHash, \"append-hash\", o.AppendHash, \"Append a hash of the configmap to its name.\")\n\n\tcmdutil.AddFieldManagerFlagVar(cmd, &o.FieldManager, \"kubectl-create\")\n\n\treturn cmd\n}", "title": "" } ]
cbf7861bb415cb34e470e9175d672f56
FindMatch finds a specific match and returns a specific part of the match
[ { "docid": "b944f261e97b7f4cdefc0cc2b414fccd", "score": "0.7358404", "text": "func FindMatch(toMatch string, regx string, selecter int) string {\n\tre := regexp.MustCompile(regx)\n\tout := re.FindStringSubmatch(string(toMatch))\n\tif len(out) > selecter {\n\t\treturn out[selecter]\n\t}\n\treturn \"\"\n}", "title": "" } ]
[ { "docid": "b3bad996d9fefe395cd38c2300744124", "score": "0.6487657", "text": "func (c Provider) Match(query string) string {\n\tsm := SearchRegex.FindStringSubmatch(query)\n\tif len(sm) == 0 {\n\t\treturn \"\"\n\t}\n\tsms := strings.Split(sm[1], \"/\")\n\tfilename := sms[len(sms)-1]\n\tpieces := strings.Split(filename, \"-\")\n\tif len(pieces) > 2 {\n\t\treturn strings.Join(pieces[0:len(pieces)-1], \"-\")\n\t}\n\treturn pieces[0]\n}", "title": "" }, { "docid": "797ebe86841c2165e59a7c80fbf2da0d", "score": "0.6368688", "text": "func find(text []byte, exp string) []byte {\n\treturn regexp.MustCompile(exp).FindSubmatch(text)[1]\n}", "title": "" }, { "docid": "7d75bf017b3b7a294261239b37872f60", "score": "0.6149716", "text": "func (this *node) getMatch(split string) *node {\n\tfor _, child := range this.children {\n\t\tif child.split == split {\n\t\t\treturn child\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "23002138dd325e5f3aaaefc774015314", "score": "0.6026395", "text": "func (c Provider) Match(query string) string {\n\tsm := SourceRegex.FindStringSubmatch(query)\n\tif len(sm) != 2 {\n\t\treturn \"\"\n\t}\n\treturn sm[1]\n}", "title": "" }, { "docid": "5d10ed975ab00e11a95d474d2daf1f5d", "score": "0.5984733", "text": "func (e Match) Find(s []byte) (matches [1][]byte, pos int, ok bool) {\n\tvar bt [319]stateMatch // static storage for backtracking state\n\tmatches, pos, ok = e.doByteSlice(s, modeFirstMatch, bt[:0])\n\treturn\n}", "title": "" }, { "docid": "3ca9008529529175c9e0ce792781953b", "score": "0.5964169", "text": "func (c Conversation) Match(position int) (string, error) {\n\treturn c.match.Match(position)\n}", "title": "" }, { "docid": "77d9dae999d7833b9a6c7b727e871699", "score": "0.59079725", "text": "func findVersion(matches [][]string, version string) string {\n\t/*\n\t\tlog.Printf(\"Matches: %v\", matches)\n\t\tlog.Printf(\"Version: %v\", version)\n\t*/\n\n\tvar v string\n\n\tfor _, matchPair := range matches {\n\t\t// replace backtraces (max: 3)\n\t\tfor i := 1; i <= 3; i++ {\n\t\t\tbt := fmt.Sprintf(\"\\\\%v\", i)\n\t\t\tif strings.Contains(version, bt) && len(matchPair) >= i {\n\t\t\t\tv = strings.Replace(version, bt, matchPair[i], 1)\n\t\t\t}\n\t\t}\n\n\t\t// return first found version\n\t\tif v != \"\" {\n\t\t\treturn v\n\t\t}\n\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "0402b75cc13b3d83ea1c1b62d477e09b", "score": "0.5793595", "text": "func (c Provider) Match(query string) string {\n\tsm := MirrorsRegex.FindStringSubmatch(query)\n\tif len(sm) == 0 {\n\t\treturn \"\"\n\t}\n\treturn sm[1]\n}", "title": "" }, { "docid": "c7ac0e194fff94452b5f218bcecc515f", "score": "0.57720554", "text": "func (r *RuleMatcher) FindMatch(cfgString string) string {\n\tif match, ok := r.rules[cfgString]; ok {\n\t\treturn match\n\t}\n\n\tchunk := cfgToChunk(cfgString)\n\tfor i := 0; i < 4; i++ {\n\t\tchunk = flipChunk(chunk)\n\t\tflippedCfg := chunkToCfgString(chunk)\n\t\tif match, ok := r.rules[flippedCfg]; ok {\n\t\t\tr.AddRule(cfgString, match)\n\t\t\treturn match\n\t\t}\n\n\t\tchunk = transposeChunk(chunk)\n\t\ttransposed := chunkToCfgString(chunk)\n\t\tif match, ok := r.rules[transposed]; ok {\n\t\t\tr.AddRule(cfgString, match)\n\t\t\treturn match\n\t\t}\n\t}\n\tpanic(\"No match found\")\n}", "title": "" }, { "docid": "e7f57aad7f87d1e688af1053e2695c27", "score": "0.57138866", "text": "func TestFindStringSubmatch(t *testing.T) {\n\tregex := regexp.MustCompile(\"Hello.*(world)\")\n\tsubject := \"Hello brave new world\"\n\tmatches := regex.FindStringSubmatch(subject)\n\tAssert(\"world\", matches[1], t)\n}", "title": "" }, { "docid": "fbc7e2337b4ef7a88822218956653e47", "score": "0.56844354", "text": "func (m *Match) printMatch() {\n\tfmt.Printf(\"%s%s%s%s:%s:%s%s%s%s%s%s\\n\",\n\t\tcolors.Purple,\n\t\tm.Path,\n\t\tcolors.Restore,\n\t\tcolors.Green,\n\t\tstrconv.Itoa(m.LineNumber),\n\t\tcolors.Restore,\n\t\tstring(m.Line[:m.Match[0]]),\n\t\tcolors.LightRed,\n\t\tstring(m.Line[m.Match[0]:m.Match[1]]),\n\t\tcolors.Restore,\n\t\tstring(m.Line[m.Match[1]:]),\n\t)\n}", "title": "" }, { "docid": "d6e9875e6d20beadd5acc0d85b9ed845", "score": "0.565506", "text": "func (c Provider) Match(query string) (params []string) {\n\tif sm := SourceRegex.FindStringSubmatch(query); len(sm) > 2 {\n\t\tparams = sm[1:]\n\t}\n\treturn\n}", "title": "" }, { "docid": "28b4c0446d019a0840b92285dd442f16", "score": "0.5652593", "text": "func (m *MatchResult) Get(s string) (string, error) {\n\tif !m.matched {\n\t\treturn \"\", nil\n\t}\n\n\tgroupNums, err := m.getNamedGroupNums(s)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tfor _, groupNum := range groupNums {\n\t\tw := C.onigmo_helper_get(C.CString(m.input), m.region.beg, m.region.end, groupNum)\n\t\tword := C.GoString(w)\n\t\tif word != \"\" {\n\t\t\treturn word, nil\n\t\t}\n\t}\n\n\treturn \"\", nil\n}", "title": "" }, { "docid": "de9c5bf4b5439e57184e6f7def9ca88a", "score": "0.5651682", "text": "func (d *DmSpecial) Find(sha1Sum string) string {\n\tlocations := d.Split()\n\treg := regexp.MustCompile(fmt.Sprintf(_regFmt, sha1Sum))\n\tfor _, location := range locations {\n\t\tif reg.MatchString(location) {\n\t\t\treturn location\n\t\t}\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "12da796554593b997c6158deec28b709", "score": "0.56425136", "text": "func (hs *HostStats) FindPathMatch(findPath string) string {\n\n\t// TODO: need to make sure we take into account dynamicAddPathDepth\n\t// e.g., do not return \"/v2\" if calling with \"/v2/app\" even if /v2\n\t// is registered and /v2/apps is not -- we should return:\n\t//\t\t empty match? or \"/v2/apps\" even though its not in list?\n\n\tfor _, path := range hs.routeIndex {\n\t\tif strings.HasPrefix(findPath, path) {\n\t\t\tpathLen := len(path)\n\t\t\tif len(findPath) == pathLen {\n\t\t\t\treturn path\n\t\t\t}\n\t\t\tif findPath[pathLen] == '/' {\n\t\t\t\treturn path\n\t\t\t}\n\t\t}\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "d42db00309891c76ea9a78e4bbf9f221", "score": "0.56089365", "text": "func (e Match) FindString(r string) (matches [1]string, pos int, ok bool) {\n\tvar bt [319]stateMatch // static storage for backtracking state\n\tmatches, pos, ok = e.doString(r, modeFirstMatch, bt[:0])\n\treturn\n}", "title": "" }, { "docid": "e9b3d48dd40fa44ee498510f8678f2e0", "score": "0.56057495", "text": "func (rules *UpstreamRuleList) FindMatch(buf *[]byte) *UpstreamRule {\n\tfor _, rule := range *rules {\n\t\tif !rule.pattern.Match(*buf) {\n\t\t\tcontinue\n\t\t}\n\t\treturn rule\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "715cae2f73b2b3a74da970c4c83755f8", "score": "0.5593141", "text": "func (c Provider) Match(query string) (params []string) {\n\tif sm := SourceRegex.FindStringSubmatch(query); len(sm) > 1 {\n\t\tparams = sm[1:]\n\t}\n\treturn\n}", "title": "" }, { "docid": "9557866bf2493b41efd947562c053309", "score": "0.5568501", "text": "func (re *RegexpStd) Find(b []byte) []byte {\n\t// var dstCap [2]int\n\t// a := re.doExecute(nil, b, \"\", 0, 2, dstCap[:0])\n\t// if a == nil {\n\t// \treturn nil\n\t// }\n\t// return b[a[0]:a[1]:a[1]]\n\tpanic(\"\")\n}", "title": "" }, { "docid": "d8b96dadf5f0e297720960cb0aa3debd", "score": "0.54597455", "text": "func (regex *Regex) Match(entire bool, str string) map[string]string {\n\tcompiled := regex.compiled\n\tcaptured := compiled.FindStringSubmatch(str)\n\tif captured == nil || (entire && len(captured[0]) != len(str)) {\n\t\treturn nil\n\t}\n\n\tresult := make(map[string]string, compiled.NumSubexp())\n\tfor i, name := range compiled.SubexpNames()[1:] {\n\t\tresult[name] = captured[i+1]\n\t}\n\treturn result\n}", "title": "" }, { "docid": "2f3d69a0a011b4e4fab390e02c7d0a62", "score": "0.5457815", "text": "func (p *routeParser) getMatch(s string, partialCheck bool) ([][2]int, bool) {\n\tlenKeys := len(p.params)\n\tparamsPositions := getAllocFreeParamsPos(lenKeys)\n\tvar i, j, paramsIterator, partLen, paramStart int\n\tif len(s) > 0 {\n\t\ts = s[1:]\n\t\tparamStart++\n\t}\n\tfor index, segment := range p.segs {\n\t\tpartLen = len(s)\n\t\t// check parameter\n\t\tif segment.IsParam {\n\t\t\t// determine parameter length\n\t\t\tif segment.Param == wildcardParam {\n\t\t\t\tif segment.IsLast {\n\t\t\t\t\ti = partLen\n\t\t\t\t} else {\n\t\t\t\t\ti = findWildcardParamLen(s, p.segs, index)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\ti = strings.IndexByte(s, segment.EndChar)\n\t\t\t}\n\t\t\tif i == -1 {\n\t\t\t\ti = partLen\n\t\t\t}\n\n\t\t\tif !segment.IsOptional && i == 0 {\n\t\t\t\treturn nil, false\n\t\t\t\t// special case for not slash end character\n\t\t\t} else if i > 0 && partLen >= i && segment.EndChar != '/' && s[i-1] == '/' {\n\t\t\t\treturn nil, false\n\t\t\t}\n\n\t\t\tparamsPositions[paramsIterator][0], paramsPositions[paramsIterator][1] = paramStart, paramStart+i\n\t\t\tparamsIterator++\n\t\t} else {\n\t\t\t// check const segment\n\t\t\ti = len(segment.Const)\n\t\t\tif partLen < i || (i == 0 && partLen > 0) || s[:i] != segment.Const || (partLen > i && s[i] != segment.EndChar) {\n\t\t\t\treturn nil, false\n\t\t\t}\n\t\t}\n\n\t\t// reduce founded part from the string\n\t\tif partLen > 0 {\n\t\t\tj = i + 1\n\t\t\tif segment.IsLast || partLen < j {\n\t\t\t\tj = i\n\t\t\t}\n\t\t\tparamStart += j\n\n\t\t\ts = s[j:]\n\t\t}\n\t}\n\tif len(s) != 0 && !partialCheck {\n\t\treturn nil, false\n\t}\n\n\treturn paramsPositions, true\n}", "title": "" }, { "docid": "5ebe6ab3cd88b51e967ba240d47a1952", "score": "0.54464424", "text": "func FindSegmentSubmatch(name string) []string {\n\tmatches := SegmentPropertiesRegexp.FindStringSubmatch(name)\n\tif matches == nil ||\n\t\tstrings.HasPrefix(name, TraefikFrontend+\".\") ||\n\t\tstrings.HasPrefix(name, TraefikBackend+\".\") {\n\t\treturn nil\n\t}\n\treturn matches\n}", "title": "" }, { "docid": "eb6801d38afbc89fe7b24e541ae80dec", "score": "0.544069", "text": "func (idx *deltaIndex) findMatch(src, tgt []byte, tgtOffset int) (srcOffset, l int) {\n\tif len(tgt) < tgtOffset+s {\n\t\treturn 0, len(tgt) - tgtOffset\n\t}\n\n\tif len(src) < blksz {\n\t\treturn 0, -1\n\t}\n\n\tif len(tgt) >= tgtOffset+s && len(src) >= blksz {\n\t\th := hashBlock(tgt, tgtOffset)\n\t\ttIdx := h & idx.mask\n\t\teIdx := idx.table[tIdx]\n\t\tif eIdx != 0 {\n\t\t\tsrcOffset = idx.entries[eIdx]\n\t\t} else {\n\t\t\treturn\n\t\t}\n\n\t\tl = matchLength(src, tgt, tgtOffset, srcOffset)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "0d5acc2b584db08f5ff6ed7e1412344c", "score": "0.54229933", "text": "func (ps *Segment) Match(s string) (name string, capture bool, wildcard bool, matches bool) {\n\tif ps.IsWildcard {\n\t\twildcard = true\n\t\tmatches = true\n\t\treturn\n\t}\n\tif ps.IsVariable {\n\t\tname = ps.Name\n\t\tcapture = true\n\t\tmatches = true\n\t\treturn\n\t}\n\tif strings.EqualFold(s, ps.Name) {\n\t\tmatches = true\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "59e48c83eba038bc916c9095f75def1f", "score": "0.5363048", "text": "func (t *TST) Match(p string) []string {\n\tif p == \"\" {\n\t\treturn nil\n\t}\n\t// if p has no matching, just find the string\n\tif !strings.ContainsAny(p, \"*_\") {\n\t\tif t.Find(p) {\n\t\t\treturn []string{p}\n\t\t}\n\t\treturn nil\n\t}\n\t// when matching for \"word*\" use prefix instead since it's cheaper\n\tif idx := strings.LastIndex(p, \"*\"); strings.Count(p, \"*\") == 1 && idx == len(p)-1 {\n\t\treturn t.Prefix(p[:idx])\n\t}\n\tmatches := []string{}\n\tt.root.rmatch(p, \"\", &matches)\n\tif len(matches) > 0 {\n\t\treturn matches\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3a74fb0d81168edf6c92bf4c0b7e340c", "score": "0.5357141", "text": "func (c Provider) Match(query string) (params []string) {\n\tif sm := MirrorsRegex.FindStringSubmatch(query); len(sm) > 1 {\n\t\tparams = sm[1:]\n\t}\n\treturn\n}", "title": "" }, { "docid": "e8a7e6a6aea5705fb9bb0be920346518", "score": "0.5352045", "text": "func (pi PackageIndex) Match(char string) []*CompletionItem {\n\treturn pi.charMap[char]\n}", "title": "" }, { "docid": "b75f19a540337d917682bf4624676cc1", "score": "0.534638", "text": "func (o HttpQueryParameterMatchOutput) RegexMatch() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v HttpQueryParameterMatch) *string { return v.RegexMatch }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4900f8c28c8c7b5327978d113c6ecbc0", "score": "0.5344286", "text": "func matcher(text, pat string, leadingPercent bool) (res string, match bool) {\n\tif !leadingPercent {\n\t\tres = strings.TrimPrefix(text, pat)\n\t\tif len(text) == len(res) {\n\t\t\treturn \"\", false\n\t\t}\n\t} else {\n\t\tparts := strings.SplitN(text, pat, 2)\n\t\tif len(parts) == 1 {\n\t\t\treturn \"\", false\n\t\t}\n\t\tres = parts[1]\n\t}\n\treturn res, true\n}", "title": "" }, { "docid": "80e6f0e13a415e82d29f35e29f2ba559", "score": "0.53302515", "text": "func CleanFindMatch(toMatch string, regx string, selecter int) string {\n\treturn CleanupCli(FindMatch(toMatch, regx, selecter))\n}", "title": "" }, { "docid": "10f497a0ad9dd55583d0e4dd58da4831", "score": "0.53037006", "text": "func (re *RegexpStd) FindSubmatch(b []byte) [][]byte {\n\t// var dstCap [4]int\n\t// a := re.doExecute(nil, b, \"\", 0, re.prog.NumCap, dstCap[:0])\n\t// if a == nil {\n\t// \treturn nil\n\t// }\n\t// ret := make([][]byte, 1+re.numSubexp)\n\t// for i := range ret {\n\t// \tif 2*i < len(a) && a[2*i] >= 0 {\n\t// \t\tret[i] = b[a[2*i]:a[2*i+1]:a[2*i+1]]\n\t// \t}\n\t// }\n\t// return ret\n\tpanic(\"\")\n}", "title": "" }, { "docid": "c52469307e9c9506d46db03ea60c3ca8", "score": "0.527999", "text": "func (o HttpHeaderMatchOutput) ExactMatch() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v HttpHeaderMatch) *string { return v.ExactMatch }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "81f161cc927f41b5eab0db3a9f5c84ca", "score": "0.5257036", "text": "func (d *dictator) findMatch(pos int, prevHead int, prevLength int, lookahead int) (length, offset int, ok bool) {\n\n\tminMatchLook := maxMatchLength\n\tif lookahead < minMatchLook {\n\t\tminMatchLook = lookahead\n\t}\n\n\twin := d.window\n\n\t// We quit when we get a match that's at least nice long\n\tnice := len(win) - pos\n\n\tif d.nice < nice {\n\t\tnice = d.nice\n\t}\n\n\t// If we've got a match that's good enough, only look in 1/4 the chain.\n\ttries := d.chain\n\tlength = prevLength\n\tif length >= d.good {\n\t\ttries >>= 2\n\t}\n\n\tw0 := win[pos]\n\tw1 := win[pos+1]\n\twEnd := win[pos+length]\n\n\tfor i := prevHead; tries > 0; tries-- {\n\t\tif w0 == win[i] && w1 == win[i+1] && wEnd == win[i+length] {\n\t\t\tn := 2\n\t\t\tfor pos+n < len(win) && win[i+n] == win[pos+n] {\n\t\t\t\tn++\n\t\t\t}\n\n\t\t\tif n > length && (n > 3) {\n\t\t\t\tlength = n\n\t\t\t\toffset = pos - i\n\t\t\t\tok = true\n\t\t\t\tif n >= nice {\n\t\t\t\t\t// The match is good enough that we don't try to find a better one.\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\twEnd = win[pos+n]\n\t\t\t}\n\t\t}\n\t\tif i = d.hashPrev[i]; i < 0 {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "762af0ae1d109c61dadd648fe18e67b0", "score": "0.52384216", "text": "func (decryptor *PgDecryptor) GetMatched() []byte {\n\treturn decryptor.matchBuffer[:decryptor.matchIndex]\n}", "title": "" }, { "docid": "80921c42bae0a7263f5f4d75654956a3", "score": "0.5227626", "text": "func (re *RegexpStd) FindIndex(b []byte) (loc []int) {\n\t// a := re.doExecute(nil, b, \"\", 0, 2, nil)\n\t// if a == nil {\n\t// \treturn nil\n\t// }\n\t// return a[0:2]\n\tpanic(\"\")\n}", "title": "" }, { "docid": "5d65240f109ecee15403abf9e1bcbbc1", "score": "0.5222228", "text": "func (p *Path) Match(path string) *Match {\n\tvar match = &Match{\n\t\tValues: make(map[string]string),\n\t}\n\n\tfor _, part := range p.parts {\n\t\tif len(path) < 1 {\n\t\t\treturn nil\n\t\t}\n\n\t\tif path[0] != '/' {\n\t\t\treturn nil\n\t\t}\n\t\t// prefix /\n\t\tpath = path[1:]\n\n\t\tmatched, key, value, length := part.match(path)\n\n\t\t//log.Printf(\"%#v == %v (%d) %s\", part, matched, length, value)\n\n\t\tif !matched {\n\t\t\treturn nil\n\t\t}\n\n\t\tif key != \"\" {\n\t\t\tmatch.Values[key] = value\n\t\t}\n\t\tpath = path[length:]\n\t}\n\n\tif len(path) > 0 && path != \"/\" {\n\t\treturn nil\n\t}\n\n\treturn match\n}", "title": "" }, { "docid": "4831ea1e6a7410792fbd184a31592291", "score": "0.52189434", "text": "func (o HttpHeaderMatchOutput) RegexMatch() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v HttpHeaderMatch) *string { return v.RegexMatch }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "858ced00d871b3165ca4e82fcd3794cc", "score": "0.5205799", "text": "func (m *matcher) match(path string) (results, error) {\n\tif m.root == nil {\n\t\treturn nil, ErrNotFound\n\t}\n\treturn m.root.match(path, false, m.mp)\n}", "title": "" }, { "docid": "a6d68d743c64945007b7ac077549d616", "score": "0.5201412", "text": "func getTestNameFromResultLine(text string) string {\n\tm := regexResult.FindStringSubmatch(text)\n\treturn m[2]\n}", "title": "" }, { "docid": "5449486a0a93167016d091967995a85a", "score": "0.5189996", "text": "func GetMatch(settings *playfab.Settings, postData *GetMatchRequestModel, entityToken string) (*GetMatchResultModel, error) {\n if entityToken == \"\" {\n return nil, playfab.NewCustomError(\"entityToken should not be an empty string\", playfab.ErrorGeneric)\n }\n b, errMarshal := json.Marshal(postData)\n if errMarshal != nil {\n return nil, playfab.NewCustomError(errMarshal.Error(), playfab.ErrorMarshal)\n }\n\n sourceMap, err := playfab.Request(settings, b, \"/Match/GetMatch\", \"X-EntityToken\", entityToken)\n if err != nil {\n return nil, err\n }\n \n result := &GetMatchResultModel{}\n\n config := mapstructure.DecoderConfig{\n DecodeHook: playfab.StringToDateTimeHook,\n Result: result,\n }\n \n decoder, errDecoding := mapstructure.NewDecoder(&config)\n if errDecoding != nil {\n return nil, playfab.NewCustomError(errDecoding.Error(), playfab.ErrorDecoding)\n }\n \n errDecoding = decoder.Decode(sourceMap)\n if errDecoding != nil {\n return nil, playfab.NewCustomError(errDecoding.Error(), playfab.ErrorDecoding)\n }\n\n return result, nil\n}", "title": "" }, { "docid": "1058e5458ed554e9e828846f9837a9c5", "score": "0.517951", "text": "func (s *MatchService) Match(matchID int64) (Match, *http.Response, error) {\n\tmatch := new(Match)\n\tapiError := new(APIError)\n\tresp, err := s.sling.New().Get(strconv.Itoa(int(matchID))).Receive(match, apiError)\n\treturn *match, resp, relevantError(err, *apiError)\n}", "title": "" }, { "docid": "54ef01af99b9a300327ad9f060bfd0fa", "score": "0.5172122", "text": "func NextMatch(team string) string {\n\tvar matches *footballMatches\n\tmatches, errorMsg := ParseBbcFixtures(team)\n\tif matches == nil {\n\t\treturn errorMsg\n\t}\n\n\tif len(matches.fixtures) == 0 {\n\t\treturn \"Error - no fixtures for \" + team\n\t}\n\n\tloc, err := time.LoadLocation(\"Europe/London\")\n\tif err != nil {\n\t\treturn \"Error - \" + err.Error()\n\t}\n\n\tfixturesArr := make([]string, 0)\n\n\tfor i := 0; i < len(matches.fixtures); i++ {\n\t\tmatch := matches.fixtures[i]\n\n\t\tvar compName = \"\"\n\t\tif !match.isTournamentGame {\n\t\t\tcompName = \" - \" + match.Tournament\n\t\t}\n\n\t\tif match.inProgress {\n\t\t\tfixturesArr = append(fixturesArr, formatMatchResult(match))\n\t\t} else {\n\t\t\tvar kickOffTime = match.kickOffTime.In(loc).Format(\"15:04 Jan 2\")\n\t\t\tvar homeTeam = match.HomeTeam.Name.First\n\t\t\tvar awayTeam = match.AwayTeam.Name.First\n\n\t\t\tfixturesArr = append(fixturesArr, fmt.Sprintf(\"\\x02%s\\x02 vs \\x02%s\\x02 (%s%s)\", homeTeam, awayTeam, kickOffTime, compName))\n\t\t}\n\t}\n\n\treturn strings.Join(fixturesArr[:], \", \")\n}", "title": "" }, { "docid": "72adc88ec958619e9a880782a463e483", "score": "0.51570797", "text": "func TestFindIndex(t *testing.T) {\n\tregex := regexp.MustCompile(\"Brian\")\n\tsubject := []byte(\"My name is Brian, pleased to meet you\")\n\tindex := regex.FindIndex(subject)\n\tAssert(index[0], 11, t)\n\tAssert(index[1], 16, t)\n}", "title": "" }, { "docid": "dd7688dfa5ddc4bee3a9681dc6371967", "score": "0.5148806", "text": "func (v *VerbalExpression) Find(s string) *VerbalExpression {\n\treturn v.add(`(?:` + quote(s) + `)`)\n}", "title": "" }, { "docid": "c02ae9639ddc3e914eb3dc6269ce64ce", "score": "0.51366293", "text": "func (o HttpQueryParameterMatchResponseOutput) RegexMatch() pulumi.StringOutput {\n\treturn o.ApplyT(func(v HttpQueryParameterMatchResponse) string { return v.RegexMatch }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "2495b21fb7cfd8aa0fadbcf2a6dae3f3", "score": "0.51356155", "text": "func FindAllMatch(toMatch string, regx string, selecter int) []string {\n\tre := regexp.MustCompile(regx)\n\tout := re.FindAllStringSubmatch(string(toMatch), -1)\n\ttoReturn := []string{}\n\tfor _, value := range out {\n\t\ttoReturn = append(toReturn, value[selecter])\n\t}\n\treturn toReturn\n}", "title": "" }, { "docid": "1abb63a860b5ef92724632cad9808080", "score": "0.51189595", "text": "func (re *RegexpStd) FindSubmatchIndex(b []byte) []int {\n\t//return re.pad(re.doExecute(nil, b, \"\", 0, re.prog.NumCap, nil))\n\tpanic(\"\")\n}", "title": "" }, { "docid": "24159de050187bd2221ddeb8ae4a1b16", "score": "0.51140434", "text": "func match(n *node, s string) (matches []string) {\n\tif n == nil {\n\t\treturn matches\n\t}\n\n\tns := s + string(n.char)\n\n\tif n.end {\n\t\tmatches = append(matches, ns)\n\t}\n\n\tmatches = append(matches, match(n.eq, ns)...)\n\tmatches = append(matches, match(n.lo, s)...)\n\tmatches = append(matches, match(n.hi, s)...)\n\n\treturn\n}", "title": "" }, { "docid": "d6e7fbbbc28eefed852323805c291116", "score": "0.51050377", "text": "func findMatches(content string, regexes []AppRegexp) ([][]string, string) {\n\tvar m [][]string\n\tvar version string\n\n\tfor _, r := range regexes {\n\t\tmatches := r.Regexp.FindAllStringSubmatch(content, -1)\n\t\tif matches == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tm = append(m, matches...)\n\n\t\tif r.Version != \"\" {\n\t\t\tversion = findVersion(m, r.Version)\n\t\t}\n\n\t}\n\treturn m, version\n}", "title": "" }, { "docid": "05e6e533d78a82820bad5464765a8439", "score": "0.5095253", "text": "func (o HttpHeaderMatchResponseOutput) ExactMatch() pulumi.StringOutput {\n\treturn o.ApplyT(func(v HttpHeaderMatchResponse) string { return v.ExactMatch }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "80b4648852b0a8f45087ee813fcf7ba0", "score": "0.509438", "text": "func (t MemTree) Lookup(n *Node, s string) (nres *Node, part, match string) {\n\tdebugf(\"Lookup: NODE<%+v> for '%s'\\n\", *n, s)\n\tif s == \"\" {\n\t\treturn n, \"\", \"\"\n\t}\n\tfor _, c := range n.Children {\n\t\tdebugf(\"\\tchild %s\", c.Edgename)\n\t\tmatch = matchprefix(c.Edgename, s)\n\t\tif match == \"\" {\n\t\t\tdebug(\" does not match\")\n\t\t\tcontinue\n\t\t} else {\n\t\t\tdebug(\" matches\", len(match), \"characters ->\", match)\n\t\t\tif len(match) < len(c.Edgename) {\n\t\t\t\treturn c, \"\", match\n\t\t\t}\n\t\t\tvar m string\n\t\t\tnres, part, m = t.Lookup(c, s[len(match):])\n\t\t\tmatch += m\n\t\t\tif part == \"\" {\n\t\t\t\tpart = m\n\t\t\t}\n\t\t\t// for a partial match\n\t\t\tif nres == nil {\n\t\t\t\treturn c, part, match\n\t\t\t}\n\t\t\treturn nres, part, match\n\t\t}\n\t}\n\treturn nil, \"\", \"\"\n}", "title": "" }, { "docid": "bff38c721b30cce950ea401c93678ca0", "score": "0.50873077", "text": "func (n *matcherNode) match(path string, explicit bool, maxParams int) (results, error) {\n\tpi := pathIterator{path: path}\n\tresults := newResults(maxParams)\n\tvar mrg compilable\n\n\tfor pi.hasNext() {\n\t\ts := pi.next()\n\t\tchild, ok := n.children[s]\n\t\tif !ok {\n\t\t\t// No child found, check for case where we are\n\t\t\t// at trailing slash and a redirect might be in order\n\t\t\tif pi.seenTrailingSlash() {\n\t\t\t\tif n.data != nil {\n\t\t\t\t\treturn nil, ErrRedirectSlash\n\t\t\t\t}\n\t\t\t\tif n.parent.wildChild != nil && n.parent.wildChild.data != nil {\n\t\t\t\t\treturn nil, ErrRedirectSlash\n\t\t\t\t}\n\t\t\t\treturn nil, ErrNotFound\n\t\t\t}\n\n\t\t\tvar notWild = len(s) == 0 || s[0] != '{' || s[len(s)-1] != '}'\n\t\t\tchild = n.wildChild\n\n\t\t\t// If segment is not wild and we want explicit match\n\t\t\t// or wild child doesn't exist, check catch all and\n\t\t\t// most recent group as last ditch effort\n\t\t\tif (explicit && notWild) || child == nil {\n\t\t\t\tif n.catchAll != nil {\n\t\t\t\t\tn = n.catchAll\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\tif mrg != nil {\n\t\t\t\t\tresults.c = mrg\n\t\t\t\t\treturn results, nil\n\t\t\t\t}\n\t\t\t\treturn nil, ErrNotFound\n\t\t\t}\n\n\t\t\t// Found wildcard, check the regex constraint if necessary\n\t\t\tif !explicit && child.regex != nil && !child.regex.MatchString(s) {\n\t\t\t\treturn nil, ErrNotFound\n\t\t\t}\n\t\t\tresults.addPair(child.wildcard, s)\n\t\t}\n\t\tif child.data != nil && child.data.cType() == GROUP {\n\t\t\tmrg = child.data\n\t\t}\n\t\tn = child\n\t}\n\tif n.data == nil {\n\t\t// If we are at a node whose data is nil, it is most likely the\n\t\t// case that the data actually lies on a trailing slash node\n\t\tif child, ok := n.children[empty]; ok && child.data != nil {\n\t\t\treturn nil, ErrRedirectSlash\n\t\t}\n\t\treturn nil, ErrNotFound\n\t}\n\n\tresults.c = n.data\n\treturn results, nil\n}", "title": "" }, { "docid": "95005211f090a47dd9bc0bf7cda05c06", "score": "0.5082794", "text": "func FindMatches(regex string, subject string) map[string]string {\n\tre := regexp.MustCompile(regex)\n\tmatches := re.FindStringSubmatch(subject)\n\tresult := make(map[string]string)\n\n\tif len(matches) == 0 {\n\t\treturn result\n\t}\n\n\tfor i, name := range re.SubexpNames() {\n\t\tif i != 0 {\n\t\t\tif name != \"\" {\n\t\t\t\tresult[name] = matches[i]\n\t\t\t} else {\n\t\t\t\tresult[fmt.Sprintf(\"%d\", i)] = matches[i]\n\t\t\t}\n\t\t}\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "2aebebc0c8cf59d65d605baf623a412d", "score": "0.5082736", "text": "func (s *HTTPServer)currentMatch() *match.Match {\n return s.matches.Last().(*match.Match)\n}", "title": "" }, { "docid": "d8055d2995c71986e75d99bbe8325aaf", "score": "0.5073659", "text": "func fnMatch(ctx Context, doc *JDoc, params []string) interface{} {\n\tstats := ctx.Value(EelTotalStats).(*ServiceStats)\n\tif params == nil || len(params) != 2 {\n\t\tctx.Log().Error(\"error_type\", \"func_match\", \"op\", \"match\", \"cause\", \"wrong_number_of_parameters\", \"params\", params)\n\t\tstats.IncErrors()\n\t\tAddError(ctx, SyntaxError{fmt.Sprintf(\"wrong number of parameters in call to match function\"), \"match\", params})\n\t\treturn nil\n\t}\n\treg, err := regexp.Compile(extractStringParam(params[1]))\n\tif err != nil {\n\t\tctx.Log().Error(\"error_type\", \"func_match\", \"op\", \"match\", \"cause\", \"invalid_regex\", \"params\", params, \"error\", err.Error())\n\t\tstats.IncErrors()\n\t\tAddError(ctx, RuntimeError{fmt.Sprintf(\"invalid regex in call to match function: %s\", err.Error()), \"match\", params})\n\t\treturn nil\n\t}\n\treturn reg.MatchString(extractStringParam(params[0]))\n}", "title": "" }, { "docid": "6fa04dd7a2453af1f2d45a023a091757", "score": "0.5072711", "text": "func (m *Matcher) Match(message string) (matched bool, arg string, err error) {\n\tmatches := m.matchRegex.FindStringSubmatch(message)\n\tif matches == nil {\n\t\tmatched = false\n\t\treturn\n\t}\n\n\tmatched = true\n\n\tif len(m.arguments) == 0 {\n\t\treturn\n\t} else if len(matches) == 0 {\n\t\tlog.Fatal(\"Expected argument but did not set it up in the regex.\")\n\t}\n\n\targ = strings.TrimSpace(matches[1])\n\tif arg == \"\" {\n\t\terr = Error{name: m.name, arguments: m.arguments}\n\t}\n\treturn\n}", "title": "" }, { "docid": "e4f85507865910eeff58e649a1108f4d", "score": "0.5058317", "text": "func (c *Completer) Match(ctx *Context, content IContent, line interface{}, index int) (int, bool) {\n\treturn -1, false\n}", "title": "" }, { "docid": "e0759eb31c8c54f347c7602945147b7d", "score": "0.5057565", "text": "func (j *CompleterJoint) Match(ctx *Context, content IContent, line interface{}, index int) (int, bool) {\n\tif content == nil {\n\t\treturn index, true\n\t}\n\ttokens := line.([]string)\n\tif tokens[index] == content.GetLabel() {\n\t\treturn index + 1, true\n\t}\n\treturn index, true\n}", "title": "" }, { "docid": "a3157afb2e8de48c5636e5481d07bb89", "score": "0.50464666", "text": "func Find(rawurl string) (idvideoteca string, err error) {\n\n\tif strings.Contains(rawurl, \"%\") {\n\t// if isURLEncoded.MatchString(rawurl) {\n\t\trawurl, err = url.QueryUnescape(rawurl)\n\t\tif err != nil {\n\t\t\t// log.Println(err.Error())\n\t\t\treturn \"\", err\n\t\t}\n\t}\n\n\t// Cerca la prima corrispondenza\n\tidvideoteca = idv.FindString(rawurl)\n\n\t// idvideoteca = onlyNum.ReplaceAllString(element, \"\")\n\n\tidvideoteca = strings.Replace(idvideoteca, \"/\", \"\", 2)\n\n\treturn idvideoteca, err\n}", "title": "" }, { "docid": "9168674a1a4b314d9175da4316ad3226", "score": "0.5042288", "text": "func isMatch(s string, p string) bool {\n\n}", "title": "" }, { "docid": "82ccd41f02758555e2bb2f04b237bdd5", "score": "0.5028062", "text": "func (mg *MultiGlob) FindPattern(input string) (string, bool) {\n\tresults, ok := match(mg.node, input, false)\n\tif !ok || len(results) < 1 {\n\t\treturn \"\", false\n\t}\n\treturn results[0], true\n}", "title": "" }, { "docid": "a4995216ed1766ad23095d611ee3451f", "score": "0.5027186", "text": "func findTraefikTCPRouteByMatch(spec *traefik.IngressRouteTCPSpec, match string) *traefik.RouteTCP {\n\tfor _, routeCandidate := range spec.Routes {\n\t\tif routeCandidate.Match == match {\n\t\t\treturn &routeCandidate\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d16c242bbee1074dfb587f694fdf34b9", "score": "0.50107276", "text": "func matches(re *regexp.Regexp, filename, template string) (match bool, origin string) {\n\tbase := filepath.Base(filename)\n\n\tmatches := re.FindStringSubmatchIndex(base)\n\tif matches == nil {\n\t\treturn false, \"\"\n\t}\n\n\tby := re.ExpandString(nil, template, base, matches)\n\tif by == nil {\n\t\treturn false, \"\"\n\t}\n\n\torigin = dns.Fqdn(string(by))\n\n\treturn true, origin\n}", "title": "" }, { "docid": "18442d572b827c50b6c9fcf719c0fab1", "score": "0.5009212", "text": "func (self *Glob) Match(haystack string) *Match {\n\treturn self.match(haystack, true)\n}", "title": "" }, { "docid": "29a99a04db3f863f5f24b5663a510a59", "score": "0.5009114", "text": "func (o HttpQueryParameterMatchOutput) ExactMatch() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v HttpQueryParameterMatch) *string { return v.ExactMatch }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6c107b26b867ee12ec7a6be8502dda77", "score": "0.50065064", "text": "func TokenFind(text, token []byte, startat int) (at int) {\n\treturn inbytes.TokenFind(text, token, startat)\n}", "title": "" }, { "docid": "45f7a16b46beddd515873719ece910f9", "score": "0.49950933", "text": "func main() {\n\t//fmt.Println(findSubstring(\"barfoothefoobarman\", []string{\"foo\", \"bar\"}))\n\t//fmt.Println(findSubstring(\"wordgoodgoodgoodbestword\", []string{\"word\", \"good\", \"best\", \"good\"}))\n\tfmt.Println(findSubstring(\"foobarfoobar\", []string{\"foo\", \"bar\"}))\n}", "title": "" }, { "docid": "15460cc052826fb581cb79d49b76221d", "score": "0.49910924", "text": "func GetMatchString(str string) string {\n\tescapeStr := GetEscapeString(str)\n\tmatchString := make([]byte, 0, 10)\n\tmatchString = append(matchString, \"%\"...)\n\tmatchString = append(matchString, escapeStr...)\n\tmatchString = append(matchString, \"%\"...)\n\n\treturn string(matchString)\n}", "title": "" }, { "docid": "afabe0d4417d40790c51a1dfc9985cd2", "score": "0.4990067", "text": "func (o HttpHeaderMatchResponseOutput) RegexMatch() pulumi.StringOutput {\n\treturn o.ApplyT(func(v HttpHeaderMatchResponse) string { return v.RegexMatch }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "cb2cdbe393d59de037a93c76ad6e828f", "score": "0.49821973", "text": "func (b *BTCVanity) Find(pattern string) (IWallet, error) {\n\tvar resWallet IWallet\n\tvar resError error\n\n\tcWallet := make(chan IWallet, b.config.Buffer)\n\tcErr := make(chan error)\n\tvar chainParams *chaincfg.Params\n\tif b.config.TestNet {\n\t\tchainParams = &chaincfg.TestNet3Params\n\t} else {\n\t\tchainParams = &chaincfg.MainNetParams\n\t}\n\n\tbtcWorker := &worker{gen: &Generator{params: chainParams}}\n\nloop:\n\tfor {\n\t\tselect {\n\t\tcase wallet := <-cWallet:\n\t\t\tif isMatch(pattern, wallet.PublicKey()) {\n\t\t\t\tresWallet = wallet\n\t\t\t\tbreak loop\n\t\t\t}\n\t\t\tbreak\n\n\t\tcase err := <-cErr:\n\t\t\tresError = err\n\t\t\tbreak loop\n\n\t\tcase <-b.stop:\n\t\t\tbreak loop\n\n\t\tdefault:\n\t\t\tbtcWorker.Work(cWallet, cErr)\n\t\t}\n\t}\n\n\tclose(cWallet)\n\tclose(cErr)\n\treturn resWallet, resError\n}", "title": "" }, { "docid": "6b0bfd5722b5ff903ba64ef0993d606c", "score": "0.49811172", "text": "func reExtract(regex, target string, matchGroup ...int) ([]string, error) {\n\tresults := make([]string, 0)\n\tmatches := regexp.MustCompile(regex).FindStringSubmatch(target)\n\tfor _, mg := range matchGroup {\n\t\tif mg > len(matches)-1 {\n\t\t\treturn nil, fmt.Errorf(\"not enough matches\")\n\t\t}\n\t\tresults = append(results, matches[mg])\n\t}\n\treturn results, nil\n}", "title": "" }, { "docid": "56cdc4adfc4eb4525e95d630ed21875a", "score": "0.49810404", "text": "func InfoFind(im *info.ZInfoMsg, query map[string]string) int {\n\tmatched := 1\n\tfor k, v := range query {\n\t\t// Uppercase of filed's name first letter\n\t\tn := strings.Title(k)\n\t\t// Find field in structure by Titlized() name 'n'\n\t\tr := reflect.ValueOf(im)\n\t\tf := fmt.Sprint(reflect.Indirect(r).FieldByName(n))\n\t\tmatched, err := regexp.Match(v, []byte(f))\n\t\tif err != nil {\n\t\t\treturn -1\n\t\t}\n\t\tif matched == false {\n\t\t\treturn 0\n\t\t}\n\t}\n\treturn matched\n}", "title": "" }, { "docid": "2581b6024a39490e5737be2c2b8d72f7", "score": "0.49801815", "text": "func (cs *commandSet) match(txt string) (final Runner, prefixlen int) {\n\tcs.RLock()\n\tdefer cs.RUnlock()\n\n\tfor prefix, r := range cs.set {\n\t\tif !strings.HasPrefix(txt, prefix) {\n\t\t\tcontinue\n\t\t}\n\t\tif final == nil || len(prefix) > prefixlen {\n\t\t\tprefixlen = len(prefix)\n\t\t\tfinal = r\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "3cf266531903a58c8767325b9d57c94e", "score": "0.49488357", "text": "func runMatch(checkConfig sigCheck, outputToSearch string) bool {\n\tmatcherFound := false\n\tnoRegexMatcherFound := false\n\n\t// Determine what type of matcher was provided\n\tmatchers := checkConfig.Matchers\n\tfor _, matcher := range matchers {\n\t\tmatcherType := matcher.Type\n\t\tif matcherType == \"\" || strings.ToLower(matcherType) == \"regex\" {\n\t\t\tstrToSearch := strings.ReplaceAll(outputToSearch, \"\\n\", Delim)\n\t\t\tstrToSearch = strings.ReplaceAll(strToSearch, \"\\r\", Delim)\n\n\t\t\t// First check if there is regex that should not be present\n\t\t\tnoRegex := matcher.NoRegex\n\t\t\tif noRegex != \"\" {\n\t\t\t\tfound, err := regexp.MatchString(noRegex, strToSearch)\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"[-] Regex Error when running NoRegex search: %s\\n\", err.Error())\n\t\t\t\t\tlog.Fatalf(\"[-] Regex Error when running NoRegex search: %s\\n\", err.Error())\n\t\t\t\t}\n\t\t\t\tif found {\n\t\t\t\t\tmatcherFound = false\n\t\t\t\t\tnoRegexMatcherFound = true\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Then search for positive regex\n\t\t\tregex := matcher.Regex\n\t\t\t//fmt.Printf(\"Regex, strToSearch[0:100]: %s, %s\", regex, strToSearch[0:100])\n\t\t\tif !noRegexMatcherFound {\n\t\t\t\t//fmt.Printf(\"regex: %s, strToSearch: %s\\n\", regex, strToSearch[0:200])\n\t\t\t\tfound, err := regexp.MatchString(regex, strToSearch)\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"[-] Regex Error when running Regex search: %s\\n\", err.Error())\n\t\t\t\t\tlog.Fatalf(\"[-] Regex Error when running Regex search: %s\\n\", err.Error())\n\t\t\t\t}\n\t\t\t\tif found {\n\t\t\t\t\tmatcherFound = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tlog.Fatalf(\"[-] Unknown matcher type: %s\\n\", matcherType)\n\t\t}\n\t}\n\treturn matcherFound\n}", "title": "" }, { "docid": "e591e1ab567c08196737c43c7f201f6e", "score": "0.49481922", "text": "func (o HttpQueryParameterMatchResponseOutput) ExactMatch() pulumi.StringOutput {\n\treturn o.ApplyT(func(v HttpQueryParameterMatchResponse) string { return v.ExactMatch }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "45a36b76a4baf50e93890e849df29970", "score": "0.4944311", "text": "func (a *WhisperAggregation) Match(metric string) *WhisperAggregationItem {\n\tfor _, s := range a.Data {\n\t\tif s.pattern.MatchString(metric) {\n\t\t\treturn s\n\t\t}\n\t}\n\treturn a.Default\n}", "title": "" }, { "docid": "37fda2ca3ee096a2025fd00374208f82", "score": "0.49355048", "text": "func (fn *formulaFuncs) find(name string, argsList *list.List) formulaArg {\n\tif argsList.Len() < 2 {\n\t\treturn newErrorFormulaArg(formulaErrorVALUE, fmt.Sprintf(\"%s requires at least 2 arguments\", name))\n\t}\n\tif argsList.Len() > 3 {\n\t\treturn newErrorFormulaArg(formulaErrorVALUE, fmt.Sprintf(\"%s allows at most 3 arguments\", name))\n\t}\n\tfindText := argsList.Front().Value.(formulaArg).Value()\n\twithinText := argsList.Front().Next().Value.(formulaArg).Value()\n\tstartNum, result := 1, 1\n\tif argsList.Len() == 3 {\n\t\tnumArg := argsList.Back().Value.(formulaArg).ToNumber()\n\t\tif numArg.Type != ArgNumber {\n\t\t\treturn numArg\n\t\t}\n\t\tif numArg.Number < 0 {\n\t\t\treturn newErrorFormulaArg(formulaErrorVALUE, formulaErrorVALUE)\n\t\t}\n\t\tstartNum = int(numArg.Number)\n\t}\n\tif findText == \"\" {\n\t\treturn newNumberFormulaArg(float64(startNum))\n\t}\n\tfor idx := range withinText {\n\t\tif result < startNum {\n\t\t\tresult++\n\t\t}\n\t\tif strings.Index(withinText[idx:], findText) == 0 {\n\t\t\treturn newNumberFormulaArg(float64(result))\n\t\t}\n\t\tresult++\n\t}\n\treturn newErrorFormulaArg(formulaErrorVALUE, formulaErrorVALUE)\n}", "title": "" }, { "docid": "cbea249c63ca9e6f20a511de04f18dbe", "score": "0.49321705", "text": "func findInfo(infoList []*index.VersionInfo, version string) *index.VersionInfo {\n\tfor _, info := range infoList {\n\t\tif info.Name == version {\n\t\t\treturn info\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "8713a8e431723dc30b0323ed1013442a", "score": "0.49314934", "text": "func GetSingleContentPreferLastMatchFromString(content string, regularExpression string) (string, error) {\n\tcontents := GetContentFormString(content, regularExpression)\n\tif contents == nil {\n\t\treturn \"\", fmt.Errorf(\"no matching string %s in content %s\", regularExpression, content)\n\t}\n\tif len(contents) > 1 {\n\t\treturn contents[len(contents)-1], nil\n\t}\n\treturn contents[0], nil\n}", "title": "" }, { "docid": "c616f8b7a74d74d20d73cb8f7f0cd78b", "score": "0.49279845", "text": "func Find(txt, pat string, T []int) (offsets []int) {\n\treturn FindYourOwnWay(txt, pat, T, -1, noop)\n}", "title": "" }, { "docid": "7628d3b04f7cac46cf44758f67a12cb9", "score": "0.49253672", "text": "func find(s []string, pattern string) (int, bool) {\n for i, item := range s {\n if item == pattern {\n return i, true\n }\n }\n return -1, false\n}", "title": "" }, { "docid": "a11d48eb8af72050ccef96567987876a", "score": "0.49207044", "text": "func (n *Node) Match(u string) (interface{}, map[string]string, bool) {\n\tu, err := url.QueryUnescape(u)\n\n\tif err != nil {\n\t\treturn nil, nil, false\n\t}\n\n\treturn n.match(map[string]string{}, strings.Split(checkURL(u), \"/\")[1:])\n}", "title": "" }, { "docid": "dc6e9a8c423a49052c3d163edb0ef7ab", "score": "0.4907711", "text": "func FindSnapshot(be Lister, s string) (ID, error) {\n\t// parse ID directly\n\tif id, err := ParseID(s); err == nil {\n\t\treturn id, nil\n\t}\n\n\t// find snapshot id with prefix\n\tid, err := Find(be, Snapshot, s)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn id, nil\n}", "title": "" }, { "docid": "459f371c12f4070a9d6ba4db913799cd", "score": "0.49034125", "text": "func (o HttpHeaderMatchOutput) SuffixMatch() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v HttpHeaderMatch) *string { return v.SuffixMatch }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "8e24346dd5dfd1aabe8e651814a99af2", "score": "0.49022695", "text": "func Regex() {\n\n\t// This tests whether a pattern matches a string.\n\tmatch, _ := regexp.MatchString(\"p([a-z]+)ch\", \"peach\")\n\tfmt.Println(match)\n\n\t// Above we used a string pattern directly,\n\t// but for other regexp tasks you’ll need to Compile an optimized\n\t// Regexp struct.\n\tr, _ := regexp.Compile(\"p([a-z]+)ch\")\n\n\t// Many methods are available on these structs.\n\t// Here’s a match test like we saw earlier.\n\tfmt.Println(r.MatchString(\"peach\"))\n\n\t// This finds the match for the regexp.\n\tfmt.Println(r.FindString(\"peach punch\"))\n\n\t// This also finds the first match but returns the start\n\t// and end indexes for the match instead of the matching text.\n\tfmt.Println(r.FindStringIndex(\"peach punch\"))\n\n\t// The Submatch variants include information about both\n\t// the whole-pattern matches and the submatches within those matches.\n\t// For example this will return information for both p([a-z]+)ch and ([a-z]+).\n\tfmt.Println(r.FindStringSubmatch(\"peach punch\"))\n\n\t// Similarly this will return information about the indexes of matches and submatches.\n\tfmt.Println(r.FindStringSubmatchIndex(\"peach punch\"))\n\n\t// The All variants of these functions apply to all matches in the input,\n\t// not just the first. For example to find all matches for a regexp.\n\tfmt.Println(r.FindAllString(\"peach punch pinch azerty\", -1))\n\n\t// These All variants are available for the other functions we saw above as well.\n\tfmt.Println(r.FindAllStringSubmatchIndex(\"peach punch pinch azert\", -1))\n\n\t// Providing a non-negative integer as the second argument\n\t// to these functions will limit the number of matches.\n\tfmt.Println(r.FindAllString(\"peach punch pinch azert\", 2))\n\n\t// Our examples above had string arguments and used names like MatchString.\n\t// We can also provide []byte arguments and drop String from the function name.\n\tfmt.Println(r.Match([]byte(\"peach\")))\n\n\t// When creating constants with regular expressions\n\t// you can use the MustCompile variation of Compile.\n\t// A plain Compile won’t work for constants because it has 2 return values.\n\tr = regexp.MustCompile(\"p([a-z]+)ch\")\n\tfmt.Println(r)\n\n\t// The regexp package can also be used to replace subsets of strings with other values.\n\tfmt.Println(r.ReplaceAllString(\"a peach\", \"<fruit>\"))\n\n\t// The Func variant allows you to transform matched text with a given function.\n\tin := []byte(\"a peach\")\n\tout := r.ReplaceAllFunc(in, bytes.ToUpper)\n\tfmt.Println(string(out))\n}", "title": "" }, { "docid": "24110890ad48becb6e5cdba2d40afb85", "score": "0.4900374", "text": "func bestMatch(name string, t reflect.Type) string {\n\tkey := strings.ToLower(hyphens.ReplaceAllString(name, \"\"))\n\tfor i := 0; i < t.NumField(); i++ {\n\t\tfield := t.Field(i)\n\t\tif field.Name == name {\n\t\t\treturn field.Name\n\t\t}\n\t\tj := field.Tag.Get(\"json\")\n\t\tif j != \"\" {\n\t\t\tflags := strings.Split(j, \",\")\n\t\t\tfor _, flag := range flags {\n\t\t\t\tif name == flag {\n\t\t\t\t\treturn field.Name\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tlname := strings.ToLower(hyphens.ReplaceAllString(field.Name, \"\"))\n\t\tif key == lname {\n\t\t\treturn field.Name\n\t\t}\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "784390cb56ca8d0d3c7e8cc263d3a85e", "score": "0.4899159", "text": "func TestFind(t *testing.T) {\n\tregex, err := regexp.Compile(\"Set|SetValue\")\n\tif err != nil {\n\t\tt.Error(\"Regexp could not compile\")\n\t}\n\tsubject := []byte{'S', 'e', 't', 'V', 'a', 'l', 'u', 'e'}\n\tmatch := regex.Find(subject)\n\tif match == nil {\n\t\tt.Error(\"Could not find match for regexp.Find\")\n\t\treturn\n\t}\n\tstr := string(match)\n\tif str != \"Set\" {\n\t\tt.Errorf(\"Expected 'Set', got %q\", str)\n\t}\n}", "title": "" }, { "docid": "2bfe8a05eefe720af583573f5edec30a", "score": "0.48959512", "text": "func (me *TrieNode) match(searchKey *TrieKey, prematchedBits uint) *TrieNode {\n\tif me == nil {\n\t\treturn nil\n\t}\n\n\tnodeKey := &me.TrieKey\n\tif searchKey.Length < nodeKey.Length {\n\t\treturn nil\n\t}\n\n\tmatches, exact, _, child := contains(nodeKey, searchKey, prematchedBits)\n\tif !matches {\n\t\treturn nil\n\t}\n\n\tif !exact {\n\t\tif better := me.children[child].match(searchKey, me.TrieKey.Length); better != nil {\n\t\t\treturn better\n\t\t}\n\t}\n\n\tif !me.isActive {\n\t\treturn nil\n\t}\n\n\treturn me\n}", "title": "" }, { "docid": "74742df1ff8120b24691c0f278566e6b", "score": "0.48920324", "text": "func (i *GameInfo) GetMatch(client *Client) (*Match, error) {\n\treturn client.Match.Get(fmt.Sprintf(\"%v_%v\", strings.ToUpper(string(client.Match.c.Region)), i.GameID))\n}", "title": "" }, { "docid": "7bafdd362de1dad5cae10f8512a4eaf2", "score": "0.48916364", "text": "func (f *Filter) Match(res *benchfmt.Result) (Match, error) {\n\tm, x := f.match(res)\n\treturn Match{len(res.Values), m, x}, nil\n}", "title": "" }, { "docid": "a84d2d9c918b5e1f14eb6413e124db58", "score": "0.4887623", "text": "func returnMatchMessage(counter int, searchWord string) string {\n\tmessage := \"\"\n\tif counter == 0 {\n\t\tmessage = \"\\nSorry, no matches on \\\"\" + searchWord + \"\\\".\"\n\t} else {\n\t\tstrCounter := strconv.Itoa(counter)\n\t\tmessage = \"\\n\" + strCounter + \" matches on \\\"\" + searchWord + \"\\\".\"\n\t}\n\treturn message\n}", "title": "" }, { "docid": "5ecfcc1f82aa6c23ff4a948457383dc4", "score": "0.48836052", "text": "func (b *BTCVanity) Find(pattern string) (IWallet, error) {\n\tvar resWallet IWallet\n\tvar resError error\n\n\tvar chainParams *chaincfg.Params\n\tif b.config.TestNet {\n\t\tchainParams = &chaincfg.TestNet3Params\n\t} else {\n\t\tchainParams = &chaincfg.MainNetParams\n\t}\n\n\tbtcWorker := &worker{gen: &Generator{params: chainParams}}\n\n\tmutex := sync.Mutex{}\n\tfor i := 0; i < b.config.Buffer; i++ {\n\t\tgo func() {\n\t\t\tfor {\n\t\t\t\twallet, err := btcWorker.Work()\n\t\t\t\tif err != nil {\n\t\t\t\t\tmutex.Lock()\n\t\t\t\t\tresError = err\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\tif isMatch(pattern, wallet.PublicKey()) {\n\t\t\t\t\tmutex.Lock()\n\t\t\t\t\tif resWallet != nil {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\tresWallet = wallet\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tb.stop <- true\n\t\t\tmutex.Unlock()\n\t\t}()\n\t}\n\n\t<-b.stop\n\n\treturn resWallet, resError\n}", "title": "" }, { "docid": "1b5da620fcf176553e712065fe8bf056", "score": "0.4878919", "text": "func (m *EmbeddedSIMActivationCode) GetMatchingIdentifier()(*string) {\n val, err := m.GetBackingStore().Get(\"matchingIdentifier\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "b151bb3bee404bfc2221e08696743d9e", "score": "0.48757523", "text": "func (t *Tap) FindLikely(s string) string {\n\ti := len(t.programs) / 2\n\tbeg := 0\n\tend := len(t.programs)\n\tfor {\n\t\tp := t.programs[i]\n\t\tif len(s) <= len(p.Name) {\n\t\t\tif p.Name[:len(s)] == s {\n\t\t\t\t//Check for better fit.\n\t\t\t\tfor j := i; j > 0; j-- {\n\t\t\t\t\tif t.programs[j].Name == s {\n\t\t\t\t\t\treturn t.programs[j].Name\n\t\t\t\t\t}\n\t\t\t\t\tif p.Name[:len(s)] != s {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\treturn p.Name\n\t\t\t}\n\t\t}\n\t\tif s < p.Name {\n\t\t\tend = i\n\t\t\ti = (i + beg) / 2\n\t\t} else {\n\t\t\tbeg = i\n\t\t\ti = (i + end) / 2\n\t\t}\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "7d0f267b2dab871600aace241b1f067b", "score": "0.48734236", "text": "func (moves Moves) ExactMatch(p path.Path) *Move {\n\tfor _, mv := range moves {\n\t\tif mv.From.Equal(p) {\n\t\t\treturn mv\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "df3133acb4685c5ccd770cd479a5034a", "score": "0.48719767", "text": "func GetClosestMatchContextLine(haystack, needle string) string {\n\tadditonalContext := 15\n\tmaxContextLength := 60\n\tstacks := []string{}\n\tfor _, line := range strings.Split(haystack, \"\\n\") {\n\t\tnormalizedHay, err := Normalize(line)\n\t\tif err != nil {\n\t\t\treturn \"ERR: \" + err.Error()\n\t\t}\n\t\tstacks = append(stacks, normalizedHay)\n\t}\n\n\tmatches := fuzzy.Find(needle, stacks)\n\tif len(matches) == 0 {\n\t\treturn \"\"\n\t}\n\n\tm := matches[0] // only look at the best (first) match\n\n\tb := strings.Builder{}\n\tfor i := max(m.MatchedIndexes[0]-additonalContext, 0); i < min(len(m.Str), m.MatchedIndexes[len(m.MatchedIndexes)-1]+additonalContext); i++ {\n\t\tb.WriteByte(m.Str[i])\n\t}\n\n\t// trim off any annoying components we may not care about\n\tres := strings.TrimSpace(b.String())\n\treturn res[0:min(maxContextLength, len(res))]\n}", "title": "" }, { "docid": "660826e6c6e600176899c8bed014d9dd", "score": "0.48705712", "text": "func (c *CompleterCustom) Match(ctx *Context, content IContent, line interface{}, index int) (int, bool) {\n\ttokens := line.([]string)\n\tif tokens[index] == content.GetLabel() {\n\t\treturn index + 1, true\n\t}\n\treturn index, false\n}", "title": "" }, { "docid": "f065e41d9d4d45d7b56b83c38478670a", "score": "0.48662004", "text": "func (ns nodes) match(name string) *node {\n\tvar r *node\n\tfor _,n := range ns {\n\t\tif n.name == name {\n\t\t\treturn n\n\t\t}\n\t\tif n.param {\n\t\t\t// param node will match any name for now. This will change when parameters are validated by type.\n\t\t\tr = n\n\t\t}\n\t}\n\treturn r\n}", "title": "" }, { "docid": "c435b63c97936f4037ed89647a0db37b", "score": "0.48648095", "text": "func GetMatch(refName string, input image.Image) float32 {\n\trefFile, _ := os.Open(refName)\n\trefImg, _ := png.Decode(refFile)\n\trefFile.Close()\n\n\tdx := refImg.Bounds().Dx()\n\tdy := refImg.Bounds().Dy()\n\tequal := 0\n\tfor y := 0; y < dy; y++ {\n\t\tfor x := 0; x < dx; x++ {\n\t\t\tif DoesPixelMatch(refImg.At(x, y), x, y, input, 5*0x100) {\n\t\t\t\tequal++\n\t\t\t}\n\t\t}\n\t}\n\n\treturn float32(equal) / float32(dx*dy)\n}", "title": "" }, { "docid": "17d0732eeb234e71e4b9254a181f3927", "score": "0.48581308", "text": "func (re *RegexpStd) FindStringSubmatchIndex(s string) []int {\n\t//return re.pad(re.doExecute(nil, nil, s, 0, re.prog.NumCap, nil))\n\tpanic(\"\")\n}", "title": "" } ]
658727b2eff88aa6d102d97869f9ac9d
String returns the string representation. API parameter values that are decorated as "sensitive" in the API will not be included in the string output. The member name will be present, but the value will be replaced with "sensitive".
[ { "docid": "7ebaac3ea148378adc73d1d4e489752e", "score": "0.0", "text": "func (s CreateReportGroupOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" } ]
[ { "docid": "b4630d33b70c5844b5e64ade660963a3", "score": "0.65439045", "text": "func (s Member) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "b4630d33b70c5844b5e64ade660963a3", "score": "0.65439045", "text": "func (s Member) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "947af2e687894d6d29a03e631290b565", "score": "0.64533514", "text": "func (s CognitoMemberDefinition) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "947af2e687894d6d29a03e631290b565", "score": "0.64533514", "text": "func (s CognitoMemberDefinition) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0385bd60ab79aacf4851dab1d485440e", "score": "0.6400417", "text": "func (id MemberId) String() string {\n\tcomponents := []string{\n\t\tfmt.Sprintf(\"Subscription: %q\", id.SubscriptionId),\n\t\tfmt.Sprintf(\"Resource Group Name: %q\", id.ResourceGroupName),\n\t\tfmt.Sprintf(\"Fleet Name: %q\", id.FleetName),\n\t\tfmt.Sprintf(\"Member Name: %q\", id.MemberName),\n\t}\n\treturn fmt.Sprintf(\"Member (%s)\", strings.Join(components, \"\\n\"))\n}", "title": "" }, { "docid": "67a78d4f9e24d3d61a3aefcfdf2f360f", "score": "0.6368878", "text": "func (p API) String() string {\n\treturn fmt.Sprintf(\n\t\t\"api key: '%s', api url: '%s', hostname: '%s', plugin: '%s', timeout: %s,\"+\n\t\t\t\" disable ssl verify: %t, proxy url: '%s', ssl cert filepath: '%s'\",\n\t\tp.Key[:4]+\"...\",\n\t\tp.URL,\n\t\tp.Hostname,\n\t\tp.Plugin,\n\t\tp.Timeout,\n\t\tp.DisableSSLVerify,\n\t\tp.ProxyURL,\n\t\tp.SSLCertFilepath,\n\t)\n}", "title": "" }, { "docid": "e8521db3a320a6453fa167795cf50cdb", "score": "0.6358003", "text": "func (s TeamMember) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "a8ddb8c6b19270de166546042c64e695", "score": "0.6302838", "text": "func (m Member) String() string {\n\treturn m.Name + \" \" + m.Type.String()\n}", "title": "" }, { "docid": "d4f4feb57ed4078a049e446401200967", "score": "0.6292776", "text": "func (p parameter) String() string {\n\treturn p.Key().String()\n}", "title": "" }, { "docid": "7810f5262bc9faa785879a38fa9b775d", "score": "0.6269752", "text": "func (s MemberDefinition) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "7810f5262bc9faa785879a38fa9b775d", "score": "0.6269752", "text": "func (s MemberDefinition) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "7fdd9d07690703691d426379ec8d9a7a", "score": "0.6262242", "text": "func (s MemberFrameworkAttributes) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "7422e92ddcee98e4ae227fd7e12e513f", "score": "0.6221339", "text": "func (s GroupMember) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "7422e92ddcee98e4ae227fd7e12e513f", "score": "0.6221339", "text": "func (s GroupMember) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "3604a1d12813ce519872a998508d98c7", "score": "0.61847967", "text": "func (s GetMembersOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "3604a1d12813ce519872a998508d98c7", "score": "0.61847967", "text": "func (s GetMembersOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0c7ad72c2f5abf275d2a0886e28199a3", "score": "0.61216843", "text": "func (p *Param) String() string {\n\treturn p.Name\n}", "title": "" }, { "docid": "e25c579deb5766c76d2a372d64e7bb7f", "score": "0.6117851", "text": "func (s RequestBypassInterfaceStruct) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "f4f4ede478f981b3cfcc4b05c0adc5fa", "score": "0.6104713", "text": "func (s CacheNodeTypeSpecificParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "fea6b1db8f7c88035ae711e8ab461794", "score": "0.61015", "text": "func (s OriginGroupMember) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "d9508c7da3435545c727f34b49abd5ce", "score": "0.6100171", "text": "func (s RequestFilterStruct) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "aac925659d9c89e6d5d4ea1feca8e02d", "score": "0.6089245", "text": "func (s RequestAdditionalAttributesStruct) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "34d2bb568fd179affe29ec214e0665db", "score": "0.60845846", "text": "func String() string {\n\treturn fmt.Sprintf(\"%s v%v %s\", Name, Version, Additional)\n}", "title": "" }, { "docid": "c5e8d267363625188a2b0af1c416955a", "score": "0.6076549", "text": "func String(v interface{}) (string, error) {\n\tfields, err := extractFields(nil, v)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tvar s strings.Builder\n\tfor i, fld := range fields {\n\t\tif fld.Options.Noprint {\n\t\t\tcontinue\n\t\t}\n\n\t\ts.WriteString(flagUsage(fld))\n\t\ts.WriteString(\"=\")\n\t\tv := fmt.Sprintf(\"%v\", fld.Field.Interface())\n\n\t\tswitch {\n\t\tcase fld.Options.Mask:\n\t\t\ts.WriteString(maskVal(v))\n\n\t\tdefault:\n\t\t\ts.WriteString(v)\n\t\t}\n\n\t\tif i < len(fields)-1 {\n\t\t\ts.WriteString(\"\\n\")\n\t\t}\n\t}\n\n\treturn s.String(), nil\n}", "title": "" }, { "docid": "73c0cab2005d31098ef74dae88190f1f", "score": "0.60691065", "text": "func (s CreateMembersOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "757f8c625b42d3482ed24fcf69ec5e32", "score": "0.60536367", "text": "func (s NiftyModifyWebProxyAttributeOutput) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "85ce395912b475acdf3ad6330161a646", "score": "0.6036306", "text": "func (s ParameterNameValue) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "7d25457a006edc37216b672b52731c92", "score": "0.60345644", "text": "func (s NiftyModifyWebProxyAttributeInput) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "e02abd781c4a9da866c52985627a778b", "score": "0.6030915", "text": "func (p *Params) String() string {\n\treturn fmt.Sprintf(\"[%v, %v]\", p.password, p.expirationDuration)\n}", "title": "" }, { "docid": "38456e3a48979bbab5f5103284b26c4e", "score": "0.6012188", "text": "func (s BypassInterface) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "fa3439ba8da6a08bf8c1fe78ff45e9d8", "score": "0.60046124", "text": "func (s NodeGroupMember) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "9404f836c18f60c1bb69fd4085850327", "score": "0.5998125", "text": "func MemberToString(m *gossip.Member) string {\n\treturn fmt.Sprint(\"Membership: Endpoint:\", m.Endpoint, \" PKI-id:\", hex.EncodeToString(m.PkiId))\n}", "title": "" }, { "docid": "70140ac87aff30abd20b69092ccac057", "score": "0.5996405", "text": "func (o Params) String() (l string) {\n\tfor i, prm := range o {\n\t\tif i > 0 {\n\t\t\tl += \",\\n\"\n\t\t}\n\t\tl += io.Sf(\"{\")\n\t\tl += io.Sf(`\"n\":%q, `, prm.N)\n\t\tl += io.Sf(`\"v\":%v, `, prm.V)\n\t\tl += io.Sf(`\"min\":%v, `, prm.Min)\n\t\tl += io.Sf(`\"max\":%v, `, prm.Max)\n\t\tl += io.Sf(`\"s\":%v, `, prm.S)\n\t\tl += io.Sf(`\"d\":%q, `, prm.D)\n\t\tl += io.Sf(`\"u\":%q, `, prm.U)\n\t\tl += io.Sf(`\"adj\":%v, `, prm.Adj)\n\t\tl += io.Sf(`\"dep\":%v, `, prm.Dep)\n\t\tl += io.Sf(`\"extra\":%q, `, prm.Extra)\n\t\tl += io.Sf(`\"inact\":%v, `, prm.Inact)\n\t\tl += io.Sf(`\"setdef\":%v`, prm.SetDef)\n\t\tl += io.Sf(\"}\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "2ce29d2c405fefa5672180d3d62b7ac2", "score": "0.5991273", "text": "func (s RequestTranslationStruct) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "b6f479214244e07cb7eb28cffe30059c", "score": "0.5987889", "text": "func (o LunSetAttributeRequest) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "title": "" }, { "docid": "11a4e7851f5e03cc5470dce5aef81d39", "score": "0.59876555", "text": "func (s GetMembersInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "11a4e7851f5e03cc5470dce5aef81d39", "score": "0.59876555", "text": "func (s GetMembersInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "a5a738c2efdc9f171b82ac6ba530b5b7", "score": "0.598545", "text": "func (s MemberSummary) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "e94ef42f6b95e510369aaa534cc4360d", "score": "0.5979906", "text": "func (s FederationParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "06f41396cfdb3a84a0a6e9c62ecba48b", "score": "0.5978638", "text": "func (ca checkArg) String() string {\n\treturn fmt.Sprintf(\"{uid: %s, username: %s, kid: %s, sibkeys: %v, subkeys: %v}\",\n\t\tca.uid, ca.username, ca.kid, ca.sibkeys, ca.subkeys)\n}", "title": "" }, { "docid": "0dea6f5bd697f18ced020135f873618e", "score": "0.5976662", "text": "func (p Params) String() string {\n\treturn fmt.Sprintf(`Params:\n Unbonding Time : %s\n Max Validators : %d\n Max Validators Extending : %d\n Max Validators Extending Speed : %d\n Next Extending Time : %d\n Max Entries : %d\n Bonded Coin Denom : %s\n Max Lever : %s`,\n p.UnbondingTime,\n p.MaxValidators,\n p.MaxValidatorsExtending,\n p.MaxValidatorsExtendingSpeed,\n p.NextExtendingTime,\n p.MaxEntries,\n p.BondDenom,\n p.MaxLever)\n}", "title": "" }, { "docid": "e3f7f7812feb12cacdda205e9b7725d4", "score": "0.5975862", "text": "func (o VserverGetIterRequestDesiredAttributes) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "title": "" }, { "docid": "d40c27cc10c23e8fee3ec6856da5b419", "score": "0.59710324", "text": "func (o SnapshotGetIterRequestDesiredAttributes) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "title": "" }, { "docid": "4abcfcd520d2e00b0d733c5fbcfd9010", "score": "0.5949517", "text": "func (obj *ServerInfoImpl) String() string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"ServerInfoImpl:{\")\n\tbuffer.WriteString(fmt.Sprintf(\"CacheInfo: '%+v'\", obj.cacheInfo))\n\tbuffer.WriteString(fmt.Sprintf(\", DatabaseInfo: '%+v'\", obj.databaseInfo))\n\tbuffer.WriteString(fmt.Sprintf(\", MemoryInfo: '%+v'\", obj.memoryInfo))\n\tbuffer.WriteString(fmt.Sprintf(\", NetListenersInfo: '%+v'\", obj.netListenersInfo))\n\tbuffer.WriteString(fmt.Sprintf(\", ServerStatusInfo: '%+v'\", obj.serverStatusInfo))\n\tbuffer.WriteString(fmt.Sprintf(\", TransactionsInfo: '%+v'\", obj.transactionsInfo))\n\tbuffer.WriteString(\"}\")\n\treturn buffer.String()\n}", "title": "" }, { "docid": "faab7da9e253b8fa9489d7f186c64b6d", "score": "0.5948662", "text": "func (s GroupMembers) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "6d733bfb8f44983dcd122f0c4dde9d1f", "score": "0.59476084", "text": "func (p Params) String() string {\n\treturn fmt.Sprintf(`Register Params:\n\t BondDenom: \t\t%s\n\t Unbonding Threashold Time: \t%s\n\t Unbonding Completion Time: \t%s\n\t Max Entries: \t\t\t%d\n`,\n\t\tp.BondDenom, p.UnbondingThreasholdTime, p.UnbondingCompletionTime, p.MaxEntries,\n\t)\n}", "title": "" }, { "docid": "8421ac307988f24d28ed1a0cb4cc5c59", "score": "0.59379166", "text": "func (s structure) String() string {\n\treturn fmt.Sprintf(\"{%s %d}\", s.Key, s.Int)\n}", "title": "" }, { "docid": "2b4dab3da2d5c4341a7d473e5361f0ba", "score": "0.5922777", "text": "func (o LunGetIterRequestDesiredAttributes) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "title": "" }, { "docid": "bc3052ec2d6d17830a144a788ddc57d3", "score": "0.5905464", "text": "func (s ListMembersOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "a3b14c49fe75991b8bf1d87ccbf691e7", "score": "0.59020066", "text": "func (s GetMemberDetectorsOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "67c6b2c17784f217e7874d36b9dd433c", "score": "0.58994806", "text": "func (a AdminPriv) String() string {\n\tja, _ := json.Marshal(a)\n\treturn string(ja)\n}", "title": "" }, { "docid": "0401611b39a66e199e441825ff238575", "score": "0.58808714", "text": "func String(params ...interface{}) string {\n\treturn spew.Sprintf(\"%v\", params)\n}", "title": "" }, { "docid": "3ffc25a4edc5ca7652c4750de89130eb", "score": "0.58799726", "text": "func (s Parameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "3ffc25a4edc5ca7652c4750de89130eb", "score": "0.58799726", "text": "func (s Parameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "3ffc25a4edc5ca7652c4750de89130eb", "score": "0.58799726", "text": "func (s Parameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "3ffc25a4edc5ca7652c4750de89130eb", "score": "0.58799726", "text": "func (s Parameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "ac3118d7c546b6ec2de4370e41c21cf0", "score": "0.5875547", "text": "func (s UpdateMemberDetectorsOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "f2c7aa22279a96333bf8c8554ceba368", "score": "0.5868055", "text": "func (s InviteMembersOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "f2c7aa22279a96333bf8c8554ceba368", "score": "0.5868055", "text": "func (s InviteMembersOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "a07f38a8a8710afc865a548844b8c69e", "score": "0.5866853", "text": "func (p Params) String() string {\n\treturn fmt.Sprintf(`\nSigners: %v\n\t`, p.Signers)\n}", "title": "" }, { "docid": "08080e32f3d4e3b2796729e5983bc821", "score": "0.58615273", "text": "func (s Extra) String() string {\n\tres := make([]string, 6)\n\tres[0] = \"ID: \" + reform.Inspect(s.ID, true)\n\tres[1] = \"Name: \" + reform.Inspect(s.Name, true)\n\tres[2] = \"Bytes: \" + reform.Inspect(s.Bytes, true)\n\tres[3] = \"Bytes2: \" + reform.Inspect(s.Bytes2, true)\n\tres[4] = \"Byte: \" + reform.Inspect(s.Byte, true)\n\tres[5] = \"Array: \" + reform.Inspect(s.Array, true)\n\treturn strings.Join(res, \", \")\n}", "title": "" }, { "docid": "ae636ca84c47b7e852912e63ff8f5589", "score": "0.58597183", "text": "func (a AdminPrivs) String() string {\n\tja, _ := json.Marshal(a)\n\treturn string(ja)\n}", "title": "" }, { "docid": "bbaee1c6d54770a26bbe0c65c67dca94", "score": "0.58456796", "text": "func (s *StarlarkStruct) String() string {\n\treturn fmt.Sprint(s.fields)\n}", "title": "" }, { "docid": "25324a870c0919e99ee63b5ec24a200c", "score": "0.5834432", "text": "func (s MemberGroup) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "22b2a07f7f4afb1c31bdad8f9ce29a79", "score": "0.58306587", "text": "func (p *Parameter) String() string {\n\t// Hack to get the reader to not throw errors in creating string representative of parameters\n\tcode := jen.Func().Id(\"_\").Params(p.Code()).Block()\n\ts := code.GoString()\n\ts = strings.TrimPrefix(s, \"func _(\")\n\ts = strings.TrimSuffix(s, \") {}\")\n\t// -----\n\treturn s\n}", "title": "" }, { "docid": "2e924ed8b95c5fb25e921c6ac44b5f27", "score": "0.5818191", "text": "func (s MemberConfiguration) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "373e281ce7d0c6c2869e45bdd86c6ac5", "score": "0.5811277", "text": "func (s UpdateMemberDetectorsInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "ad064b89c683e8c10416461fa7825d0b", "score": "0.58111906", "text": "func (s SuperuserParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "e81e2e645673dc1c3e1a3d092d55dc1a", "score": "0.58018816", "text": "func (s ConnectionApiKeyAuthResponseParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "9c21331a641165912132e4ec7d690d91", "score": "0.5797069", "text": "func (s NiftyModifyKeyPairAttributeOutput) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "09d7a477ea3c4420cb9c1c90834ac337", "score": "0.57970405", "text": "func (p Params) String() string {\n\treturn fmt.Sprintf(`MaxValidators: %d; JailAfter: %d; UnjailAfter: %d; LotteryValidators: %d; MinStatus: %d`,\n\t\tp.MaxValidators, p.JailAfter, p.UnjailAfter, p.LotteryValidators, p.MinStatus,\n\t)\n}", "title": "" }, { "docid": "11c90d6ee574cda9903fc75bee8832a0", "score": "0.5796461", "text": "func (s DBClusterMember) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "11c90d6ee574cda9903fc75bee8832a0", "score": "0.5796461", "text": "func (s DBClusterMember) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "a4b1019d8be3075e68b5e0f5b023fe6e", "score": "0.5788022", "text": "func (a *API) String() string {\n\tb, err := json.MarshalIndent(a, \"\", \" \")\n\tif err != nil {\n\t\tpanic(err) // should not happen because of our closed model\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "1db4ef4c721e176c728a4050ed80d3a7", "score": "0.5784286", "text": "func (s InstancesMemberItem) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "ab429420bcc0e75dcb7ca22c09e73967", "score": "0.577844", "text": "func (s IdentityProviderDetails) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "54e9d695b9de96e285f059bf2671eb55", "score": "0.57766163", "text": "func (p Params) String() string {\n\treturn string(ModuleCdc.MustMarshalBinaryLengthPrefixed(&p))\n}", "title": "" }, { "docid": "14a5d8153fa38ed0e3c2c8e5825e17e4", "score": "0.57739496", "text": "func (s CreateMembersInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "30f795b7330bf1e6dab852ebdba31f40", "score": "0.5773573", "text": "func (s UsersMemberItem) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "b66208ff2f26bed4c87dc66c3d623072", "score": "0.5772413", "text": "func (s OriginGroupMembers) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "7c2c371366631c12dbd91385db965ae9", "score": "0.5772315", "text": "func (s NiftyModifyKeyPairAttributeInput) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "7b440a8d36f9662f1768c52661585ac4", "score": "0.5771406", "text": "func (s GetMemberDetectorsInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "fc3f1155f252d88806b0bd68f6d5defe", "score": "0.5768829", "text": "func (p *Param) String() string {\n\tswitch value := p.Value.(type) {\n\tcase string:\n\t\treturn value\n\tcase []string:\n\t\treturn strings.Join(value, \"\")\n\tcase nil, interface{}, []interface{}: // TODO: Figure out parsing to string\n\t\treturn \"\"\n\tdefault:\n\t\treturn fmt.Sprintf(\"%v\", value)\n\t}\n}", "title": "" }, { "docid": "2d9661aaed9dac52501904fb2ea773f6", "score": "0.576707", "text": "func (s HttpParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "63f0995b54b50b89eb28282630c5a5ec", "score": "0.5758004", "text": "func (s MemberUser) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "274153962e1fa3fed28c5eb694513762", "score": "0.57569075", "text": "func (p Parameters) String() (s string) {\n\ts += fmt.Sprintln(\"Parameters:\")\n\ts += fmt.Sprintln(\"Generations\")\n\ts += fmt.Sprintln(\" \", p.Generations)\n\ts += fmt.Sprintln(\"RInitOdds\")\n\ts += fmt.Sprintln(\" \", p.RInitOdds)\n\ts += fmt.Sprintln(\"SInitOdds\")\n\ts += fmt.Sprintln(\" \", p.SInitOdds)\n\ts += fmt.Sprintln(\"GInitOdds\")\n\ts += fmt.Sprintln(\" \", p.GInitOdds)\n\ts += fmt.Sprintln(\"SignalThreshold\")\n\ts += fmt.Sprintln(\" \", p.SignalThreshold)\n\ts += fmt.Sprintln(\"CooperationEffectThreshold\")\n\ts += fmt.Sprintln(\" \", p.CooperationEffectThreshold)\n\ts += fmt.Sprintln(\"SRad\")\n\ts += fmt.Sprintln(\" \", p.SRadius)\n\ts += fmt.Sprintln(\"CRad\")\n\ts += fmt.Sprintln(\" \", p.PGRadius)\n\ts += fmt.Sprintln(\"BoardSize\")\n\ts += fmt.Sprintln(\" \", p.BoardSize)\n\ts += fmt.Sprintln(\"D\")\n\ts += fmt.Sprintln(\" \", p.D)\n\ts += fmt.Sprintln(\"MutOddsR\")\n\ts += fmt.Sprintln(\" \", p.MutOddsR)\n\ts += fmt.Sprintln(\"MutOddsS\")\n\ts += fmt.Sprintln(\" \", p.MutOddsS)\n\treturn\n}", "title": "" }, { "docid": "eb455905db6cfae92d7813a73f42f7e8", "score": "0.5755705", "text": "func StructToString(si interface{}) string {\n\trval := reflect.ValueOf(si).Elem()\n\ttipe := rval.Type()\n\n\tfmt.Println(rval,tipe,rval.NumField())\n\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"{ \")\n\tfor i := 0; i < rval.NumField(); i++ {\n\t\ttf := tipe.Field(i)\n\t\tif !rval.FieldByName(tf.Name).CanSet() {\n\t\t\tcontinue // skip unexported fields\n\t\t}\n\t\tvar fStr string\n\t\ttagv := tf.Tag.Get(SecretTag)\n\t\tif tagv == \"password\" || tagv == \"username\" {\n\t\t\tfStr = fmt.Sprintf(\"%s:**** \", tf.Name)\n\t\t} else if tagv == \"url\" {\n\t\t\tval, ok := rval.Field(i).Interface().(string)\n\t\t\tif ok {\n\t\t\t\tval = GetMaskedURL(val)\n\t\t\t\tfStr = fmt.Sprintf(\"%s:%v \", tf.Name, val)\n\t\t\t} else {\n\t\t\t\tfStr = fmt.Sprintf(\"%s:%v \", tf.Name, rval.Field(i).Interface())\n\t\t\t}\n\t\t} else {\n\t\t\tfStr = fmt.Sprintf(\"%s:%v \", tf.Name, rval.Field(i).Interface())\n\t\t}\n\t\tbuffer.WriteString(fStr)\n\t}\n\tbuffer.WriteString(\" }\")\n\treturn buffer.String()\n}", "title": "" }, { "docid": "c5486e11364a33ecf5653773248059d5", "score": "0.5750651", "text": "func (o NetInterfaceGetIterRequestDesiredAttributes) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "title": "" }, { "docid": "f26b83a1f3c58181a03e07094182d557", "score": "0.57478076", "text": "func (this *Extension) String() string {\n\treturn this.headerName + core.SIPSeparatorNames_COLON +\n\t\tcore.SIPSeparatorNames_SP + this.value +\n\t\tcore.SIPSeparatorNames_NEWLINE\n}", "title": "" }, { "docid": "7504a1c6d308352ce8b554240117176b", "score": "0.57457775", "text": "func (s PremiumSupportInfo) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "6dcae4ce2b7a69ed162cbe53c42d66f4", "score": "0.5741853", "text": "func (s MemberAdditionalConfiguration) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "36b197d4e5977fd4ccd3bcf5e213b5c9", "score": "0.57396954", "text": "func (s RequestIpPermissionsStruct) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "2cada81761099ad7ed182cbdc2a209f4", "score": "0.5737899", "text": "func (p Params) String() string {\n\tvar sb strings.Builder\n\tsb.WriteString(\"Params: \\n\")\n\tsb.WriteString(fmt.Sprintf(\"MaxMemoCharacters: %d\\n\", p.MaxMemoCharacters))\n\tsb.WriteString(fmt.Sprintf(\"TxSigLimit: %d\\n\", p.TxSigLimit))\n\tsb.WriteString(fmt.Sprintf(\"FeeMultiplier: %v\\n\", p.FeeMultiplier))\n\treturn sb.String()\n}", "title": "" }, { "docid": "19bd308526ebe26bc7782e79d4e2a779", "score": "0.5731475", "text": "func (p Params) String() string {\n\treturn fmt.Sprintf(`oracle Params:\n MaxRawRequestCount: %d\n MaxAskCount: %d\n ExpirationBlockCount: %d\n MaxConsecutiveMisses: %d\n BaseRequestGas %d\n PerValidatorRequestGas: %d\n`,\n\t\tp.MaxRawRequestCount,\n\t\tp.MaxAskCount,\n\t\tp.ExpirationBlockCount,\n\t\tp.MaxConsecutiveMisses,\n\t\tp.BaseRequestGas,\n\t\tp.PerValidatorRequestGas,\n\t)\n}", "title": "" }, { "docid": "4fa66e65f2c6409e769e2bb48f1abaa9", "score": "0.57299834", "text": "func (s ApiSpec) String() string {\n\tdisableIstioAuthPolicyMTLS := \"<nil>\"\n\tauthenticationEnabled := \"<nil>\"\n\tauthentication := \"<nil slice>\"\n\n\tif s.DisableIstioAuthPolicyMTLS != nil {\n\t\tdisableIstioAuthPolicyMTLS = fmt.Sprintf(\"&%t\", *s.DisableIstioAuthPolicyMTLS)\n\t}\n\tif s.AuthenticationEnabled != nil {\n\t\tauthenticationEnabled = fmt.Sprintf(\"&%t\", *s.AuthenticationEnabled)\n\t}\n\tif s.Authentication != nil {\n\t\tauthentication = fmt.Sprintf(\"%+v\", s.Authentication)\n\t}\n\n\treturn fmt.Sprintf(\"{Service:%+v Hostname:%s DisableIstioAuthPolicyMTLS:%s AuthenticationEnabled:%s Authentication:%+v}\", s.Service, s.Hostname, disableIstioAuthPolicyMTLS, authenticationEnabled, authentication)\n}", "title": "" }, { "docid": "0c7b830afaa9935d069f5b2798ffcaca", "score": "0.5728572", "text": "func (s ServiceAdditionalInfo) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0ae4a03f18a90989ad17cd63ce8e1159", "score": "0.5722059", "text": "func (obj *UserInfoImpl) String() string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"UserInfoImpl:{\")\n\tbuffer.WriteString(fmt.Sprintf(\"UserId: '%d'\", obj.UserId))\n\tbuffer.WriteString(fmt.Sprintf(\", UserType: '%+v'\", obj.UserType))\n\tbuffer.WriteString(fmt.Sprintf(\", UserName: '%s'\", obj.UserName))\n\tbuffer.WriteString(\"}\")\n\treturn buffer.String()\n}", "title": "" }, { "docid": "cb441578d57de763e1c50f65a4543aa0", "score": "0.57179606", "text": "func (v *TestService_Call_Args) String() string {\n\tif v == nil {\n\t\treturn \"<nil>\"\n\t}\n\n\tvar fields [1]string\n\ti := 0\n\tfields[i] = fmt.Sprintf(\"Key: %v\", v.Key)\n\ti++\n\n\treturn fmt.Sprintf(\"TestService_Call_Args{%v}\", strings.Join(fields[:i], \", \"))\n}", "title": "" }, { "docid": "2a06959f51277ecf54529ee5b2a72ded", "score": "0.57118064", "text": "func (s MemberFrameworkConfiguration) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "58e616c116641f48e3d67742bd6d326f", "score": "0.57085747", "text": "func (o SnapmirrorReleaseRequest) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "title": "" }, { "docid": "c78d9a3fd867f39e732d1683ed5a5760", "score": "0.5707814", "text": "func (f *featureFlag) String() string { return fmt.Sprintf(\"%s=%t\", f.name, f.enabled) }", "title": "" } ]
588a91f6264f1aebce9ad13807cb666b
JSONString returns path representation is JSON convention
[ { "docid": "711d86c3ac888fe20b5658f5c6a744cb", "score": "0.7037189", "text": "func (fp *Limit_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" } ]
[ { "docid": "c7f67b1cbff80fa25bd9296e76c25e17", "score": "0.7517165", "text": "func (fpm *RegionalDistribution_FieldPathMap) JSONString() string {\n\treturn strcase.ToLowerCamel(fpm.selector.String()) + \".\" + fpm.key\n}", "title": "" }, { "docid": "866fd80eaca47a91fc030611704b3a43", "score": "0.740136", "text": "func (fp *Resource_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "b7036dd2a4050076b5a04d929504e064", "score": "0.73705375", "text": "func (fps *Resource_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "552d3ad973f7d82ef0ab48b64e3925fd", "score": "0.7350189", "text": "func (fp *RegionalDistribution_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "18da398072a25b3163949e33cd8ee54d", "score": "0.7334258", "text": "func (fp *ServiceAccount_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "0e15cc29005ccb72519dbaaa5737be74", "score": "0.72847754", "text": "func (fp *Plan_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "efd45d29b84f1f3e705ab1c0a7f46634", "score": "0.7276075", "text": "func (fps *CreateRegionRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "a3772aa5bc2330f99f27d64b9f423638", "score": "0.72664994", "text": "func (fps *Plan_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "95bc8a702b8c617056b79f0657052175", "score": "0.7223889", "text": "func (fp *Allowance_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "9c67aaa081df618a3ba07bd5b48418aa", "score": "0.72127956", "text": "func (fps *UpdateRegionRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "39c88f48a488e6f41ba075e672ad6254", "score": "0.7199382", "text": "func jsonizePath(mi *modelInfo, path string) string {\n\texprs := strings.Split(path, ExprSep)\n\texprs = jsonizeExpr(mi, exprs)\n\treturn strings.Join(exprs, ExprSep)\n}", "title": "" }, { "docid": "733ce6183c4f2530a92e36a728a62d71", "score": "0.7191658", "text": "func (fps *UpdateRegionRequestCAS_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "b7cf31fec103a1c0880d6fbe0e183569", "score": "0.71771324", "text": "func (fp *WatchRegionRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "bd82c2ecc302de0d4ecd7973bb4149af", "score": "0.71654636", "text": "func JSONPath(fields []string) string {\n\treturn \".\" + strings.Join(fields, \".\")\n}", "title": "" }, { "docid": "4cf6391f6cb58cba097e17c7fbed5d95", "score": "0.71637356", "text": "func JSONPath(fields ...string) string {\n\treturn strings.Join(fields, \".\")\n}", "title": "" }, { "docid": "ba9b05ce75e3ff46575050f04db2d5ac", "score": "0.7154006", "text": "func (fp *WatchRegionsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "806a836966623226c764e0fb93e5a0c3", "score": "0.7141561", "text": "func (fp *AlertingCondition_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "3bc97e5d126efce8f4beae2e1272cb19", "score": "0.71414614", "text": "func (fp *LimitPool_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "79082c4ad8e944eb53b45ce8606dbe35", "score": "0.71359855", "text": "func (fps *AlertingCondition_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "ee187f2cd0b58d58e097afe93874c63f", "score": "0.7135667", "text": "func jsonizePath(mi *Model, path string) string {\n\texprs := strings.Split(path, ExprSep)\n\texprs = jsonizeExpr(mi, exprs)\n\treturn strings.Join(exprs, ExprSep)\n}", "title": "" }, { "docid": "2337839d3e675889a971bf03a37e0e20", "score": "0.7123089", "text": "func (fps *BatchGetRegionsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "128e4dd998465350d3ff71a1dcd4af7a", "score": "0.7121322", "text": "func (fp *GetAuditedResourceDescriptorRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "f862ef55811c7050b9113dd8828d80eb", "score": "0.7120214", "text": "func (fp *WatchRegionResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "64cdda43b9e6fe21d035417821f17e37", "score": "0.71186405", "text": "func (fp *UpdateRegionRequestCAS_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "794ab63fba53c7c92c9596a9a6dae2ad", "score": "0.7112631", "text": "func (fps *LimitPool_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "9be11176095cee62dd8da344ff1c73f3", "score": "0.71121365", "text": "func (fps *WatchRegionsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "7daa270e7bf892d08f60230067fa3df2", "score": "0.71089035", "text": "func (fp *WatchRegionsResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "b5d32e941367a7eac1935d97329895b3", "score": "0.71056986", "text": "func (fp *AcceptProjectInvitationRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "33ad783978051b5a298c3a64f5b0f871", "score": "0.70935786", "text": "func (fps *Limit_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "eb2710da7a36179e0a1eca3a7328de75", "score": "0.70910394", "text": "func (fp *WatchAuditedResourceDescriptorsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "bc279c5b79a8d397b0985e314d9f7b5b", "score": "0.7088554", "text": "func (fp *AlertingConditionSpec_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "b0a23157bd07314ba299e1ff882817a8", "score": "0.7080401", "text": "func (ctx *TemplateContext) JSON(path string) (string, error) {\n\tdata := make(map[string]interface{})\n\tdec := json.NewDecoder(strings.NewReader(ctx.Payload))\n\terr := dec.Decode(&data)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tparts := strings.Split(path, \".\")\n\n\tquery := jsonq.NewQuery(data)\n\tvalue, err := query.Interface(parts...)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// converts int, float, bool, etc to string\n\treturn fmt.Sprintf(\"%v\", value), nil\n}", "title": "" }, { "docid": "2f050a388dbc9450b9a68205f7ddc431", "score": "0.7079625", "text": "func (fp *AlertingConditionState_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "7b3b7d2eb656f187479e474dfbcd7a53", "score": "0.70793927", "text": "func (fps *ListRegionsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "dd1d3621e6d9cbede7437bde3568198c", "score": "0.7076892", "text": "func (fp *GetRegionRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "4cca0598d14be47b623ffed724c957cc", "score": "0.7074599", "text": "func (fp *CreateAuditedResourceDescriptorRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "a10c8953c8ec0ddfa10766f7a5202381", "score": "0.70704657", "text": "func (fp *WatchAuditedResourceDescriptorRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "b2c99e15dca90973d2c57fde5fdf8f6f", "score": "0.70691", "text": "func (fp *UpdateAuditedResourceDescriptorRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "23220f5b30b281b21a84b320b0bd7795", "score": "0.70689046", "text": "func (fp *CreateRegionRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "610d40d911a4bfcdb6b903eac0d1046c", "score": "0.70549375", "text": "func (fp *BatchGetAuditedResourceDescriptorsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "73b9320242271bf64f75b68ade16d13e", "score": "0.70488334", "text": "func (fp *ListMyProjectInvitationsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "700ddd38dd3f61edae83200e63539577", "score": "0.70461845", "text": "func (fp *UpdateAuditedResourceDescriptorRequestCAS_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "7e56a9416d8aa00a2a1afa7135570742", "score": "0.7041891", "text": "func (fp *ListMyProjectInvitationsResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "d78cc415ba8ad514027cb8fd38a83a87", "score": "0.7034303", "text": "func (fp *UpdateRegionRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "06cf90d587bf1b4124379b9ba4bc6012", "score": "0.7029552", "text": "func (fp *AlertingConditionSpecTimeSeries_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "8385e33bae2507b151d31e7531316e45", "score": "0.70293856", "text": "func (fp *WatchRegionsResponsePageTokenChange_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "839b9d122f9ff92655214ce124415a0d", "score": "0.70261276", "text": "func (fp *BatchGetRegionsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "5f366b21db17c4b6193e9fd17f32cdc2", "score": "0.701882", "text": "func (fp *AcceptProjectInvitationResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "21a6c623c8444a93161c052e919d4944", "score": "0.70157194", "text": "func (fps *CreateAuditedResourceDescriptorRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "5a9412935e3ab4d82102d1de06429653", "score": "0.70115465", "text": "func (fp *DeclineProjectInvitationRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "d038b3c6c8126c9ce39528e2f224e93d", "score": "0.70008326", "text": "func (fp *DeleteRegionRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "4056ce79be42128bd1897b960a52a451", "score": "0.70002073", "text": "func (fps *ResendProjectInvitationResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "57970116423c24a3f809234c4beccd14", "score": "0.6998485", "text": "func (fps *UpdateLimitPoolRequestCAS_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "f0fb7a128b8042103f5814828686d308", "score": "0.6994314", "text": "func (fp *WatchAuditedResourceDescriptorsResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "f577411e73350d26df5f825a765fd193", "score": "0.69937336", "text": "func (fp *ListRegionsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "770e030a7dd286b6d86f05dc2dd134ab", "score": "0.69895005", "text": "func (fps *AlertingConditionSpec_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "0baeca684f4c32e4eeac9cd767286b5c", "score": "0.6976053", "text": "func (fp *AlertingConditionSpecTrigger_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "f10629373775141b95e652daf004f6ca", "score": "0.69756335", "text": "func (fp *UpdateLimitPoolRequestCAS_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "64fe4f58526f24f365b53f0982de0677", "score": "0.69715935", "text": "func (fps *UpdateAuditedResourceDescriptorRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "d97e4a14fdb0523ae9e8ec0d001f140b", "score": "0.697149", "text": "func (fps *ListMyProjectInvitationsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "6a0ec0f5b9552d7bba9ac5640b479962", "score": "0.6970643", "text": "func (fp *BatchGetAuditedResourceDescriptorsResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "d28cbb4e45e926b263090b07741e0c5e", "score": "0.6968891", "text": "func (fps *BatchGetAuditedResourceDescriptorsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "fcc1ee3a9a0c459030de63a1facfd657", "score": "0.69686383", "text": "func (fp *WatchLimitPoolsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "0095a3589f1df90ded47c34ce458ef1b", "score": "0.69600636", "text": "func (fp *BatchGetRegionsResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "d23ac0598df5fd53b27399b2b0273c9f", "score": "0.6958875", "text": "func (fp *ResendProjectInvitationRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "770ce5b26193a413956e1a2cf3d6d18c", "score": "0.69549006", "text": "func (fps *UpdateLimitPoolRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "63547ea683a7f5cda73c1f88dfa28d5e", "score": "0.6952893", "text": "func (fp *DeclineProjectInvitationResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "ce69a47dba31e165135111258d5abef8", "score": "0.6951198", "text": "func (fp *WatchAuditedResourceDescriptorResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "75414e17c51ab047cac3545020ecd366", "score": "0.6948839", "text": "func (fps *CreateMetricDescriptorRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "09312caf55294502ad03477ab3525abf", "score": "0.6948775", "text": "func (fp *ListRegionsResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "678e4fb7dc8f8c5b3042914423efeb6d", "score": "0.69428056", "text": "func (fps *AlertingConditionSpecTimeSeries_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "8cfa12768af90e37b52e723f2f1d6911", "score": "0.6934655", "text": "func (fps *UpdateAuditedResourceDescriptorRequestCAS_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "781c245abfbbf946bb1b46d82fb06a12", "score": "0.6931187", "text": "func (fp *ListAuditedResourceDescriptorsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "205a2d0b6891036fa6fd40f9599e73ff", "score": "0.69120973", "text": "func (fp *ResendProjectInvitationResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "b4c60ec3b8235cf894228e634de41a77", "score": "0.6911782", "text": "func (fps *WatchLimitPoolsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "24c099eab6ae35fb5fe8aacef702be23", "score": "0.69079894", "text": "func (fps *WatchAuditedResourceDescriptorsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "68d30cce54149cbae236c7fba4367634", "score": "0.6906299", "text": "func (fp *WatchLimitPoolRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "5111dbc36b942a9cbe23d37e7d6a08f8", "score": "0.69054693", "text": "func (fp *WatchLimitPoolsResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "742acf18aeeebc070877b9323cdd8b7d", "score": "0.6900566", "text": "func (fp *GetMetricDescriptorRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "afea08f7f6fec2712a276b9dee3fee11", "score": "0.6894481", "text": "func (j *JSONData) String(path ...interface{}) (string, error) {\n\tjson, err := j.get(path...)\n\treturn json.MustString(), err\n}", "title": "" }, { "docid": "871b021f26714bd69bc34d0ed55e6c1d", "score": "0.6892104", "text": "func (fp *WatchLimitPoolsResponsePageTokenChange_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "8ad4f656cacd5b3f8ca78f070553e2a5", "score": "0.6884275", "text": "func (fpm *AlertingConditionSpecTimeSeriesCombineThreshold_FieldPathMap) JSONString() string {\n\treturn strcase.ToLowerCamel(fpm.selector.String()) + \".\" + fpm.key\n}", "title": "" }, { "docid": "4a9fb6fca7016fc8cde92e0d55afb9b0", "score": "0.6882771", "text": "func (fp *WatchLimitPoolResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "15a1bfe26d8c6e64674568b40099a9bd", "score": "0.68710893", "text": "func (fp *ListAuditedResourceDescriptorsResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "5a02fb22b5532c2cb879ef6c249363d1", "score": "0.68679965", "text": "func (fp *CreateMetricDescriptorRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "193e9e6d09e8089e2df0ec4d1b65a1dd", "score": "0.6849919", "text": "func (fps *ListAuditedResourceDescriptorsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "528918fdba4504357e9b8dfa1a7f7755", "score": "0.68481904", "text": "func (fp *WatchAuditedResourceDescriptorsResponsePageTokenChange_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "3651a40095f543c57e7c5535c79093ad", "score": "0.68442106", "text": "func (fp *AlertingConditionSpecTimeSeriesQuery_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "67a9f67e777d12421a35fd36749c069c", "score": "0.68321925", "text": "func (fps *BatchGetLimitPoolsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "74afdb57c1237c68a6c8de45751c3d75", "score": "0.6816848", "text": "func (fps *ListMetricDescriptorsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "9d9a04760ff0fd5fede4817baefca25e", "score": "0.6791574", "text": "func (fp *DeleteLimitPoolRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "aecdf5c59898f587f6a22b40e90ef92b", "score": "0.6783071", "text": "func (fps *AlertingConditionSpecTimeSeriesQuery_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "5af5ef45f1d92fd08cc307419d9230f8", "score": "0.67706823", "text": "func (fps *ListLimitPoolsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "6a8fcebda8d6bce9b41891b6ca2d2754", "score": "0.676806", "text": "func (fp *UpdateLimitPoolRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "54b17fd20330abcd5cc23eaa568136af", "score": "0.674622", "text": "func (fp *DeleteMetricDescriptorRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "1a764d708af3da8ef3e44693324b35c2", "score": "0.6736669", "text": "func (fp *BatchGetLimitPoolsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "2a2ad9806f2698de5d23998ee077b3de", "score": "0.6726831", "text": "func (fp *GetLimitPoolRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "3c5843f227461202cd9e6ebee6a4cc44", "score": "0.6688026", "text": "func (fp *AlertingConditionSpecTimeSeriesThreshold_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "22cac4696a836ecdaeff622aae410b71", "score": "0.668066", "text": "func (fp *ListMetricDescriptorsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "30d91197977505f2935ac069d5d9b77d", "score": "0.6671477", "text": "func (fp *ListMetricDescriptorsResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" } ]
877b914d42508e548d7d0e58697f1ba3
setVar overwrites the last declared variable with the given name. Used by variable assignments.
[ { "docid": "ef7c93b4be0600f5ce251aaa2dfe90c5", "score": "0.70220435", "text": "func (s *state) setVar(name string, typ reflect.Type) {\n\tfor i := s.mark() - 1; i >= 0; i-- {\n\t\tif s.vars[i].name == name {\n\t\t\ts.vars[i].typ = typ\n\t\t\treturn\n\t\t}\n\t}\n\ts.errorf(\"undefined variable: %s\", name)\n}", "title": "" } ]
[ { "docid": "0914bf4071895494af79ca0a851568fd", "score": "0.67202675", "text": "func (p *Object) SetVar(name string, val interface{}) {\n\n\tif _, ok := p.Cls.Fns[name]; ok {\n\t\tpanic(\"set failed: class already have a method named \" + name)\n\t}\n\tp.vars[name] = val\n}", "title": "" }, { "docid": "da5e2d13c478ca7d620af6c0fe0fef2c", "score": "0.64048916", "text": "func Set(name, value string) error {\n\tif err := ValidIdentifier(name); err != nil {\n\t\treturn err\n\t}\n\n\tvars.Set(name, value)\n\treturn nil\n}", "title": "" }, { "docid": "27f1b8f129eaceaf99746f6b51dac205", "score": "0.631148", "text": "func (s *scope) Set(name string, value pyObject) {\n\ts.locals[name] = value\n}", "title": "" }, { "docid": "813e7dc934582e1ce4b24d84002bd64d", "score": "0.63020056", "text": "func SetVar(name string, value interface{}) {\n\tname(nvim_set_var)\n}", "title": "" }, { "docid": "2b178b59934645a0caf393a00297f709", "score": "0.6251726", "text": "func (v Vars) Set(name, value string) {\n\tv[name] = value\n}", "title": "" }, { "docid": "fa25d10fb632665a95ee2cdcad2b911a", "score": "0.6017111", "text": "func (v *Variables) Set(name string, value interface{}) bool {\n\texisted := false\n\tif v.vars == nil {\n\t\tv.vars = make(map[string]interface{})\n\t} else {\n\t\t_, existed = v.vars[name]\n\t}\n\n\tv.vars[name] = value\n\treturn !existed\n}", "title": "" }, { "docid": "8888910d05e9001b2c3e0fcc443d1522", "score": "0.58806795", "text": "func (c *Compiled) Set(name string, value interface{}) error {\n\tobj, err := tengo.FromInterface(value)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tidx, ok := c.indexes[name]\n\tif !ok {\n\t\treturn fmt.Errorf(\"'%s' is not defined\", name)\n\t}\n\n\tc.globals[idx] = obj\n\treturn nil\n}", "title": "" }, { "docid": "fe2604060beff30949ad8cf5dcc84687", "score": "0.58270544", "text": "func (vm *variableManager) set(req *http.Request, varName string, variable interface{}) {\n\tvm.lock.Lock()\n\tdefer vm.lock.Unlock()\n\n\t_, ok := vm.variables[req]\n\tif !ok { // req is not registered\n\t\t// create a map and set to variables\n\t\tvm.variables[req] = make(map[string]interface{})\n\t}\n\n\t// set variable\n\tvm.variables[req][varName] = variable\n}", "title": "" }, { "docid": "3ec488c55456e84ceb4ec2be6fa0af5f", "score": "0.5689122", "text": "func (rs *RiveScript) SetVariable(name, value string) {\n\trs.cLock.Lock()\n\tdefer rs.cLock.Unlock()\n\n\tif value == UNDEFINED {\n\t\tdelete(rs.vars, name)\n\t} else {\n\t\trs.vars[name] = value\n\t}\n}", "title": "" }, { "docid": "7a53680208bba09f98325498ca280f86", "score": "0.5686343", "text": "func (ctx *Context) UnsetVar(k string, scope Scope) {\n\tctx.Lock()\n\tdefer ctx.Unlock()\n\n\ti := len(ctx.scopes) - 1 // index of local scope\n\tif i < 0 {\n\t\tpanic(\"no scopes\")\n\t}\n\n\tswitch scope {\n\tcase GlobalScope:\n\t\ti = 0 // index of global scope\n\n\tcase ParentScope:\n\t\tif i > 0 {\n\t\t\ti -= 1 // index of parent scope\n\t\t}\n\t}\n\n\tif _, ok := ctx.scopes[i][k]; ok {\n\t\tdelete(ctx.scopes[i], k)\n\t}\n}", "title": "" }, { "docid": "d469a8c485d5dbb85d9d8327e2daf54e", "score": "0.55253065", "text": "func (c *Cmd) SetVar(name, val string) *Cmd {\n\tc.Vars[name] = val\n\treturn c\n}", "title": "" }, { "docid": "e1ba00d58f347c6531c9874b525924e7", "score": "0.55022854", "text": "func setGlobal(i *interpreter, pkg *ssa2.Package, name string, v Value) {\n\tif g, ok := i.globals[pkg.Var(name)]; ok {\n\t\t*g = v\n\t\treturn\n\t}\n\tpanic(\"no global variable: \" + pkg.Object.Path() + \".\" + name)\n}", "title": "" }, { "docid": "d537f40a18705a4b6a2dcc8c7633841e", "score": "0.5482063", "text": "func (b *nullBackend) SetVariable(id string, v int64) {}", "title": "" }, { "docid": "7474019409a521becee6fd7133d82c12", "score": "0.54783744", "text": "func (a *AttributeList) UnsetVar(name string) {\n\ta.lock.Lock()\n\tdefer a.lock.Unlock()\n\tif _, ok := a.set[name]; ok {\n\t\ta.set[name] = nil\n\t\tdelete(a.set, name)\n\t}\n}", "title": "" }, { "docid": "999bb5a1db5aef0194a347184e0ce7ba", "score": "0.5472276", "text": "func (ctx *Context) setVar(k string, v interface{}, scope Scope) string {\n\ti := len(ctx.scopes) - 1 // index of local scope\n\tif i < 0 {\n\t\tpanic(\"no scopes\")\n\t}\n\n\tswitch scope {\n\tcase GlobalScope:\n\t\ti = 0 // index of global scope\n\n\tcase ParentScope:\n\t\tsave := i\n\n\t\tfor ; i > 0; i-- {\n\t\t\tif _, ok := ctx.scopes[i][k]; ok { // find where the variable is defined\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif i < 0 {\n\t\t\ti = save\n\t\t}\n\t}\n\n\t//\n\t// here we should convert complex types to a meaningful\n\t// string representation (i.e. json)\n\t//\n\n\t/*\n\t switch t := v.(type) {\n\t case Dict:\n\t ;\n\n\t case Array:\n\t ;\n\t }\n\t*/\n\n\tctx.scopes[i][k] = fmt.Sprintf(\"%v\", v)\n\treturn ctx.scopes[i][k]\n}", "title": "" }, { "docid": "2f29b2987ac14040027cfbc0bd03c655", "score": "0.54326683", "text": "func (s *Service) SetVar(requestBody *SetVarRequest) (*setVarResponse, error) {\n\tresponseBody := &setVarResponse{}\n\trequest, response := newSetVarAction(requestBody, responseBody)\n\n\t// copy authheader to new envelope\n\trequest.Envelope.Header.Data = s.AuthHeader\n\n\t// create a new HTTP request from the SOAP envelope\n\thttpReq, err := s.Client.NewRequest(s.Endpoint.String(), request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// make the HTTP request\n\t_, err = s.Client.Do(httpReq, response)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// @TODO: check if this can be better\n\tsetVarResponse, ok := response.Envelope.Body.Data.(*setVarResponse)\n\tif ok == false {\n\t\treturn setVarResponse, soap.ErrBadResponse\n\t}\n\n\treturn setVarResponse, err\n}", "title": "" }, { "docid": "808337fe8b0a31b1d56c542b8d641e99", "score": "0.5420023", "text": "func (v *Vars) TempSet(idx int, resource interface{}) {\n\tprev := v.Temps[idx]\n\tif prev != nil {\n\t\tcloser, ok := prev.(io.Closer)\n\t\tif ok {\n\t\t\tcloser.Close()\n\t\t}\n\t}\n\n\tv.Temps[idx] = resource\n}", "title": "" }, { "docid": "05e81366c3ab708ab28e1405a7e40c12", "score": "0.5381", "text": "func (s *scope) put(sym string, isConst bool) *ast.Variable {\n\n\t_, ok := s.defs[sym]\n\tif ok {\n\t\tpanic(\"symbol is already defined\")\n\t}\n\tv := &ast.Variable{sym, incrementNumLocals(s), isConst, false}\n\ts.defs[sym] = v\n\treturn v\n}", "title": "" }, { "docid": "6154d4cf2da1bdc109f55c0b754068ab", "score": "0.53608894", "text": "func (c *Chain) Set(key string, val interface{}) {\n\tc.varmu.Lock()\n\tdefer c.varmu.Unlock()\n\n\tc.vars[key] = val\n}", "title": "" }, { "docid": "d65b49ed7115c1e65a36a7d875749792", "score": "0.5333435", "text": "func (c ViewContext) SetVar(v *value.Value, paths ...string) error {\n\tstr, err := v.String()\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"compile var\")\n\t}\n\tif err := c.vars.FillRaw(str, paths...); err != nil {\n\t\treturn err\n\t}\n\treturn c.vars.Error()\n}", "title": "" }, { "docid": "822736dac8e1c1458f93cdad47046cce", "score": "0.5317198", "text": "func (a *stmtCompiler) defineVar(ident *ast.Ident, t Type) *Variable {\n\tv, prev := a.block.DefineVar(ident.Value, ident.Pos(), t);\n\tif prev != nil {\n\t\t// TODO(austin) It's silly that we have to capture\n\t\t// Pos() in a variable.\n\t\tpos := prev.Pos();\n\t\tif pos.IsValid() {\n\t\t\ta.diagAt(ident, \"variable %s redeclared in this block\\n\\tprevious declaration at %s\", ident.Value, &pos)\n\t\t} else {\n\t\t\ta.diagAt(ident, \"variable %s redeclared in this block\", ident.Value)\n\t\t}\n\t\treturn nil;\n\t}\n\n\t// Initialize the variable\n\tindex := v.Index;\n\tif v.Index >= 0 {\n\t\ta.push(func(v *Thread) { v.f.Vars[index] = t.Zero() })\n\t}\n\treturn v;\n}", "title": "" }, { "docid": "86d329c058df54f16e9a292f2629a3fd", "score": "0.5302152", "text": "func (e *Engine) SetVariable(name string, value []byte) {\n\te.values[strings.ToLower(name)] = value\n}", "title": "" }, { "docid": "bca1c9fa13f064eca38caff7aa076a78", "score": "0.52965856", "text": "func (le LocalEnv) Put(a Atom, e Expr) {\n\t//case 1: already defined locally\n\tif _, ok := le.Vals[a]; ok {\n\t\tle.Vals[a] = e\n\t\treturn\n\t}\n\t// case 2: defined somewhere in a parent scope\n\tif _, ok := le.Parent.Get(a); ok {\n\t\tle.Parent.Put(a, e)\n\t\treturn\n\t}\n\t// case 3: never defined\n\tle.Vals[a] = e\n}", "title": "" }, { "docid": "63732414a2786f25876f99a1676b0ed8", "score": "0.52959", "text": "func Any(name string, v Var) {\n\tif v == nil {\n\t\treturn\n\t}\n\tvarmu.Lock()\n\tvars[name] = v\n\tvarmu.Unlock()\n}", "title": "" }, { "docid": "c59ced0ac2471011e9527fccb2eda23b", "score": "0.52914673", "text": "func (v *Variables) Set(key string, val interface{}) {\n\t(*v)[key] = val\n}", "title": "" }, { "docid": "f6b975ecdb2f3753014e8d8ae55f6f55", "score": "0.52855617", "text": "func (c *context) Put(n Name, v Value) {\n\tc.Lock()\n\tdefer c.Unlock()\n\tif _, ok := c.vars[n]; ok {\n\t\tpanic(ErrStr(AlreadyBound, n))\n\t}\n\tc.vars[n] = v\n}", "title": "" }, { "docid": "d18953c7034a8a878639bb53939ff78c", "score": "0.5271919", "text": "func SetVar(ctx context.Context, key string, value any) {\n\tvarMap, ok := ctx.Value(VarsCtxKey).(map[string]any)\n\tif !ok {\n\t\treturn\n\t}\n\tif value == nil {\n\t\tif _, ok := varMap[key]; ok {\n\t\t\tdelete(varMap, key)\n\t\t\treturn\n\t\t}\n\t}\n\tvarMap[key] = value\n}", "title": "" }, { "docid": "d08cdd5aedc0fe0b5535c345e80d1ca4", "score": "0.52582246", "text": "func (e *Elvishd) SetUniVar(arg *UniVar, reply *struct{}) error {\n\tcurrent, err := e.dbmap.Get(UniVar{}, arg.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif current == nil {\n\t\treturn e.dbmap.Insert(arg)\n\t} else {\n\t\t_, err = e.dbmap.Update(arg)\n\t\treturn err\n\t}\n}", "title": "" }, { "docid": "2d11dbf69dee2779784c421f476b985e", "score": "0.5254968", "text": "func (t *Tree) useVar(pos int, name string) ast.ExprNode {\n\tfor s := t.topScope; s != nil; s = s.Outer {\n\t\tif obj := s.Lookup(name); obj != nil {\n\t\t\tv := ast.NewVariable(pos, name)\n\t\t\t// v.Obj = obj\n\t\t\treturn v\n\t\t}\n\t}\n\tt.errorf(\"undefined variable %q\", name)\n\treturn nil\n}", "title": "" }, { "docid": "5b8f1e7332fa692338daf6e4cbd7cad8", "score": "0.5246394", "text": "func (ctx *Context) SetVar(k string, v interface{}, scope Scope) {\n\tctx.Lock()\n\tdefer ctx.Unlock()\n\n\tctx.setVar(k, v, scope)\n}", "title": "" }, { "docid": "a389856a3a8b516bb26e33f1e07918a5", "score": "0.5232115", "text": "func Var(value flag.Value, name string, usage string) {\n\tdefaultSet.Var(value, name, usage)\n}", "title": "" }, { "docid": "f30e5e20aab3e0b8915c34c38223e974", "score": "0.52243346", "text": "func (td *TemplateData) SetVar(key, value string) {\n\ttd.vars[key] = value\n}", "title": "" }, { "docid": "34a235d165010a42335161dcc9a4d9d9", "score": "0.5212299", "text": "func (v *Vars) Set(key, value string) {\n\tmap[string]string(*v)[key] = value\n}", "title": "" }, { "docid": "43ca64881ba6ad399ab57f3db59e4d3f", "score": "0.51668406", "text": "func (fn VarFunc) Set(v string) []byte { return fn(v) }", "title": "" }, { "docid": "b2bd396094e21d5ca377b9c5690fdb6c", "score": "0.5136782", "text": "func Var(value Value, name string, usage string) {\n\tGlobal.Var(value, name, usage)\n}", "title": "" }, { "docid": "221b8ea9ce76bad31660c72e05f4d7e8", "score": "0.51207125", "text": "func (this Heart) Set(k string, v interface{}) {\n\tthis.Vars[k] = v\n}", "title": "" }, { "docid": "dcc4bd7f5abadca5326176c8fca6f200", "score": "0.50713956", "text": "func SetVariable(host, name, value string) {\n\tsession := ensureSession(host)\n\tif value == \"\" {\n\t\tdelete(session.Variables, name)\n\t\treturn\n\t}\n\n\tsession.Variables[name] = value\n}", "title": "" }, { "docid": "707aab7530fc67736d59cfd7c1d9c05c", "score": "0.50644404", "text": "func (c *Ctx) SetVar(k string, v interface{}) {\n\tif c.vars == nil {\n\t\tc.vars = make(map[string]interface{})\n\t}\n\tc.vars[k] = v\n}", "title": "" }, { "docid": "8fc4dee11877a7548546f56950bfd1c1", "score": "0.50557244", "text": "func (v *Variables) Set(value string) error {\n\t*v = append(*v, value)\n\treturn nil\n}", "title": "" }, { "docid": "a6aa01b5646e8dc8e85e5abeb80b4d81", "score": "0.5054542", "text": "func (c *clientConn) handleSetVar(e *setVarEvent) error {\n\tc.setVarStmts = append(c.setVarStmts, e.stmt)\n\treturn nil\n}", "title": "" }, { "docid": "3f9ab75235587aafaeb48fa2766886b3", "score": "0.50531995", "text": "func SetWindowVar(window Window, name string, value interface{}) {\n\tname(nvim_win_set_var)\n}", "title": "" }, { "docid": "3954dad5563dfb7a25632415b803e043", "score": "0.50473726", "text": "func UintVar(p *uint, name string, value uint, usage string) {\n\tdefaultSet.UintVar(p, name, value, usage)\n}", "title": "" }, { "docid": "8f25d16b2db14cbca258be1dd446d760", "score": "0.5040339", "text": "func (s *Simp) ReleaseVar(p Lit) {\n\tif s.IsEliminated(p.Var()) {\n\t\tpanic(\"cannot release eliminated variable\")\n\t}\n\tif !s.useSimp && p.Var() > s.maxSimpVar {\n\t\ts.d.ReleaseVar(p)\n\t} else {\n\t\t// don't allow the variable to be reused\n\t\ts.d.AddClause(p)\n\t}\n}", "title": "" }, { "docid": "3f3904bd9dae9af5a25ab7fe6d691b64", "score": "0.5036063", "text": "func (this *CodeNode) Set_hasVarDef( value bool) {\n this.hasVarDef = value \n}", "title": "" }, { "docid": "9c63ceec06ded3e1fead78fd5751766f", "score": "0.50107455", "text": "func (e *Echo) SetVar(name, value string) *Echo {\n\tvars := e.vars.SetVar(name, value)\n\te.err = vars.Err()\n\treturn e\n}", "title": "" }, { "docid": "db4b88b68594223f31b5d43a7edb6fd2", "score": "0.4998502", "text": "func (rs *RiveScript) SetGlobal(name, value string) {\n\trs.cLock.Lock()\n\tdefer rs.cLock.Unlock()\n\n\t// Special globals that reconfigure the interpreter.\n\tif name == \"debug\" {\n\t\tswitch strings.ToLower(value) {\n\t\tcase \"true\", \"t\", \"on\", \"yes\":\n\t\t\trs.Debug = true\n\t\tdefault:\n\t\t\trs.Debug = false\n\t\t}\n\t} else if name == \"depth\" {\n\t\tdepth, err := strconv.Atoi(value)\n\t\tif err != nil {\n\t\t\trs.warn(\"Can't set global `depth` to `%s`: %s\\n\", value, err)\n\t\t} else {\n\t\t\trs.Depth = uint(depth)\n\t\t}\n\t}\n\n\tif value == UNDEFINED {\n\t\tdelete(rs.global, name)\n\t} else {\n\t\trs.global[name] = value\n\t}\n}", "title": "" }, { "docid": "17435735d69b956ab199c2bb5e39e7c8", "score": "0.49966758", "text": "func (s *state) variable(name ssaVar, t ssa.Type) *ssa.Value {\n\tv := s.vars[name]\n\tif v == nil {\n\t\t// TODO: get type? Take Sym as arg?\n\t\tv = s.newValue0A(ssa.OpFwdRef, t, name)\n\t\ts.vars[name] = v\n\t}\n\treturn v\n}", "title": "" }, { "docid": "f3fece213a125d46351abef8426f8af6", "score": "0.49849394", "text": "func (v Vars) Unset(name string) {\n\tdelete(v, name)\n}", "title": "" }, { "docid": "3610b2d9658c58c1916b779225a40041", "score": "0.4979671", "text": "func (s *state) setTopVar(n int, typ reflect.Type) {\n\ts.vars[len(s.vars)-n].typ = typ\n}", "title": "" }, { "docid": "9e384158232f0907c61d530ffdc8e819", "score": "0.49726114", "text": "func (cmd *varCmd) RunSetVar(f factory.Factory, cobraCmd *cobra.Command, args []string) error {\n\t// Set config root\n\tlog := f.GetLog()\n\tconfigLoader := f.NewConfigLoader(nil, log)\n\tconfigExists, err := configLoader.SetDevSpaceRoot()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !configExists {\n\t\treturn errors.New(message.ConfigNotFound)\n\t}\n\n\t// Load generated config\n\tgeneratedConfig, err := configLoader.Generated()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tallowedVars, err := getPossibleVars(generatedConfig, configLoader, log)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"get possible vars\")\n\t}\n\n\t// Set vars\n\tfor _, v := range args {\n\t\tif v == \"\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tsplitted := strings.Split(v, \"=\")\n\t\tif len(splitted) != 2 {\n\t\t\treturn errors.Errorf(\"Unexpected variable format. Expected key=value, got %s\", v)\n\t\t} else if allowedVars[splitted[0]] == false {\n\t\t\tallowedVarsArr := []string{}\n\t\t\tfor k := range allowedVars {\n\t\t\t\tallowedVarsArr = append(allowedVarsArr, k)\n\t\t\t}\n\n\t\t\treturn errors.Errorf(\"Variable %s is not allowed. Allowed vars: %+v\", splitted[0], allowedVarsArr)\n\t\t}\n\n\t\tgeneratedConfig.Vars[splitted[0]] = splitted[1]\n\t}\n\n\t// Save the config\n\terr = configLoader.SaveGenerated()\n\tif err != nil {\n\t\treturn errors.Errorf(\"Error saving config: %v\", err)\n\t}\n\n\tlog.Done(\"Successfully changed variables\")\n\treturn nil\n}", "title": "" }, { "docid": "87b1f055f97004022cfc63d9005da1c7", "score": "0.49628848", "text": "func SetVVar(name string, value interface{}) {\n\tname(nvim_set_vvar)\n}", "title": "" }, { "docid": "56697eaa086772283c91d80f45d2ff0d", "score": "0.4957757", "text": "func (c *Context) Set(key string, d interface{}) {\n\tc.vmu.Lock()\n\tc.Vars[key] = d\n\tc.vmu.Unlock()\n}", "title": "" }, { "docid": "86bfbd0b3951c2f19d84f51a2b1c28e2", "score": "0.4946881", "text": "func SetVar(key, value string) (err error) {\n\t// Find and get the prefix from the env\n\tprefix, err := getPrefix()\n\t// add the prefix to the key\n\tkey = fmt.Sprintf(\"%s_%s\", prefix, key)\n\t// format the key\n\tkey = underscoreUpperCase(key)\n\t// set the key value\n\terr = os.Setenv(key, value)\n\treturn\n}", "title": "" }, { "docid": "42f22d8a29e9619a4281bd52d1628df0", "score": "0.49400505", "text": "func (ll *LuaLoader) SetGlobalVar(n string, v interface{}) {\n\t// If already exists then remove it first\n\tif _, exists := ll.EnvMap[n]; exists {\n\t\tdelete(ll.EnvMap, n)\n\t}\n\tll.EnvMap[n] = v\n}", "title": "" }, { "docid": "68b4834bd0fa3b8a20692ec72660bea6", "score": "0.4930699", "text": "func (self *Engine) SetGlobalVariable(name string, value interface{}) {\n\t// Set the propertie in the global context..\n\tJerry_set_object_property(getGlobalObject(), name, value)\n}", "title": "" }, { "docid": "9139a74d251dbaed46b5e571b9c81b57", "score": "0.49226248", "text": "func fresh_var(x string, s T, y string) string {\n\ts_fvs := s.FV()\n\tconflicts := func(candidate string) bool {\n\t\tfor _, s_fv := range s_fvs {\n\t\t\tif s_fv == candidate {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t\treturn false\n\t}\n\tvarName := y\n\tfor varName == x || conflicts(varName) {\n\t\tvarName = next_var()\n\t}\n\treturn varName\n}", "title": "" }, { "docid": "e6658a4a47181e63b4c41a87977d6d15", "score": "0.49204406", "text": "func (f *FlagSet) UintVar(p *uint, name rune, value uint, usage string) {\n\tf.Var(newUintValue(value, p), name, usage)\n}", "title": "" }, { "docid": "8da5455d290440cce3b645cd2a501e64", "score": "0.49069577", "text": "func SetVars(next buffalo.Handler) buffalo.Handler {\n\treturn func(c buffalo.Context) error {\n\t\tyear := fmt.Sprintf(\"%d\", time.Now().Year())\n\t\tc.Set(\"year\", year)\n\t\treturn next(c)\n\t}\n}", "title": "" }, { "docid": "d44f03c9109264649e726b327c9b76bd", "score": "0.4902529", "text": "func (f *FlagSet) StringVar(p *string, name rune, value string, usage string) {\n\tf.Var(newStringValue(value, p), name, usage)\n}", "title": "" }, { "docid": "3d2704a94bb5989d79f90bae60298bc9", "score": "0.48820344", "text": "func (s *EnvStack) Set(name string, value []string) {\n\tif i := s.iLast(); i >= 0 {\n\t\t(*s)[i][name] = value\n\t}\n}", "title": "" }, { "docid": "5c3cc215014e0431f04d7a6f91029496", "score": "0.48685488", "text": "func (b *blockWalker) replaceVar(v ir.Node, typ types.Map, reason string, flags meta.VarFlags) {\n\tb.ctx.sc.ReplaceVar(v, typ, reason, flags)\n\tsv, ok := v.(*ir.SimpleVar)\n\tif !ok {\n\t\treturn\n\t}\n\n\tb.trackVarName(v, sv.Name)\n}", "title": "" }, { "docid": "60198d5d33274aeba9b8ae12c43d3e6b", "score": "0.48612154", "text": "func (e *environment) Set(sym Symbol, val interface{}) LispError {\n\tif !e.writable {\n\t\treturn NewLispError(ESUPPORT, \"restricted environment not writable\")\n\t}\n\titem := newEnvItem(sym, val)\n\tif e.vars.Has(item) {\n\t\te.vars.ReplaceOrInsert(item)\n\t\treturn nil\n\t} else if e.parent != nil {\n\t\treturn e.parent.Set(sym, val)\n\t}\n\treturn NewLispErrorf(ESYMBOL, \"symbol '%v' not yet defined\", sym)\n}", "title": "" }, { "docid": "59edcafac7c96f9d7ec1c704bfd8aa2d", "score": "0.48594245", "text": "func SetBufferVar(buffer Buffer, name string, value interface{}) {\n\tname(nvim_buf_set_var)\n}", "title": "" }, { "docid": "9952ce88ed93011dadf25f2b3ab28794", "score": "0.48554102", "text": "func (v *Variable) Set(ctx *Context, value interface{}) error {\n\tif v.setFnc == nil {\n\t\treturn errors.New(\"variable is not mutable\")\n\t}\n\n\treturn v.setFnc(ctx, value)\n}", "title": "" }, { "docid": "f200afb9a9c33e078a0302db57cbc7c3", "score": "0.48503467", "text": "func (r *VarRef) Set(value interface{}) error {\n\terr := assertIsCompatible(value)\n\tif err != nil {\n\t\treturn err\n\t}\n\tr.setter(value)\n\treturn nil\n}", "title": "" }, { "docid": "6185153b09cd1b95538562e2562616b0", "score": "0.4838237", "text": "func (env *Env) Set(key, val string) {\n\tval = env.Expand(val)\n\n\tenv.Lock()\n\tdefer env.Unlock()\n\n\tenv.Vars[key] = val\n}", "title": "" }, { "docid": "668109ccc1089c190f01a381263b1853", "score": "0.4836375", "text": "func (t *ApplyAndValidateVars) backfillVar(keyPattern *regexp.Regexp, val string, wf *daisy.Workflow) {\n\tfor k := range wf.Vars {\n\t\tif keyPattern.MatchString(k) && t.vars[k] == \"\" {\n\t\t\tt.vars[k] = val\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d3db11b42d281c5e2d000b32719465f3", "score": "0.483246", "text": "func (this *RangerBackReference) Set_var_name( value *GoNullable) {\n this.var_name = value \n}", "title": "" }, { "docid": "9af52edc946fc51c6aa0cb84c170115b", "score": "0.48324537", "text": "func (rs *RiveScript) SetSubstitution(name, value string) {\n\trs.cLock.Lock()\n\tdefer rs.cLock.Unlock()\n\n\tif value == UNDEFINED {\n\t\tdelete(rs.sub, name)\n\t} else {\n\t\trs.sub[name] = value\n\t}\n}", "title": "" }, { "docid": "5cad8ac81f3ec2c16659a3ffe389be22", "score": "0.48102704", "text": "func IntVar(p *int, name string, value int, usage string) {\n\tdefaultSet.IntVar(p, name, value, usage)\n}", "title": "" }, { "docid": "30918e4dd5e1da5da278020dd3c6836f", "score": "0.48086068", "text": "func (e *environment) Set(name string, val Object) Object {\n\te.store[name] = val\n\treturn val\n}", "title": "" }, { "docid": "cd5113d9efa2faf16a22973d15f8ad0a", "score": "0.47921777", "text": "func (f *FlagSet) StringVar(p *string, name string, alias rune, value string, usage string, fn Callback) {\n\tf.Var(newStringValue(value, p), name, alias, usage, fn)\n}", "title": "" }, { "docid": "977629c8134484fa850b595f384ddd67", "score": "0.47863582", "text": "func Unset(name string) error {\n\tif err := ValidIdentifier(name); err != nil {\n\t\treturn err\n\t}\n\n\tvars.Unset(name)\n\treturn nil\n}", "title": "" }, { "docid": "b4bfb783c34082a5234f99df90bc0cdf", "score": "0.47855055", "text": "func (fs *FlagSet) Var(value pflag.Value, name string, usage string) *VarValue {\n\tv := &VarValue{\n\t\tname: name,\n\t\tfs: fs.fs,\n\t}\n\tfs.fs.Var(value, name, usage)\n\treturn v\n}", "title": "" }, { "docid": "5ffe3aed21134325be638ef6b36406a1", "score": "0.47757778", "text": "func (ir *Interpreter) Set(name string, val interface{}) error {\n\tif C.Tcl_GetCurrentThread() == ir.ir.thread {\n\t\treturn ir.ir.filt(ir.ir.set(name, val))\n\t}\n\treturn ir.ir.run_and_wait(func() error {\n\t\treturn ir.ir.filt(ir.ir.set(name, val))\n\t})\n}", "title": "" }, { "docid": "f3798230343f7a8efe25c2a7bdddd78d", "score": "0.47603986", "text": "func (ctx *Context) UpdateVar(k string, scope Scope, update func(string) interface{}) string {\n\tctx.Lock()\n\tdefer ctx.Unlock()\n\n\tcurrent, _ := ctx.getVar(k)\n\treturn ctx.setVar(k, update(current), scope)\n}", "title": "" }, { "docid": "92cd284618a810c6a51718326d84aba8", "score": "0.47577763", "text": "func (c *Context) SetValue(name string, value Value) {\n\tfor _, symbol := range c.symbols {\n\t\tif symbol.Name == name {\n\t\t\tsymbol.Value = value\n\t\t\treturn\n\t\t}\n\t}\n\tpanicf(\"name `%s' is not defined\", name)\n}", "title": "" }, { "docid": "032e595d66dbe1d9803452507719f3e7", "score": "0.4757288", "text": "func newVar(namespace string, name ...string) variable {\n\tswitch len(name) {\n\tcase 0:\n\t\treturn variable(edn.Symbol{Namespace: \"\", Name: namespace})\n\tcase 1:\n\t\treturn variable(edn.Symbol{Namespace: namespace, Name: name[0]})\n\tdefault:\n\t\tpanic(\"newVar only takes one or two arguments\")\n\t}\n}", "title": "" }, { "docid": "e8877fac5f6149ddf26f33c94fdc4501", "score": "0.47513667", "text": "func SetVar(k string, v string) {\n\tConf[k] = v\n}", "title": "" }, { "docid": "969520823e613880966f0bd063bb3d92", "score": "0.4741898", "text": "func (kv *KV) Set(key string, value interface{}) {\n\tif _, ok := kv.vars[key]; ok {\n\t\tlog.Warning(\"To overwrite key %s held by %s\", key, kv.name)\n\t}\n\tkv.vars[key] = value\n}", "title": "" }, { "docid": "f2096174a75a976d0534564a709f4053", "score": "0.47305536", "text": "func (c *config) Set(key string, value interface{}) {\n\tc.variables[key] = value\n}", "title": "" }, { "docid": "07e6457de2d1e099c94becfac7a9821d", "score": "0.4716371", "text": "func (a *Asserter) Var(name string) *Asserter {\r\n\ta.VarName = name\r\n\treturn a\r\n}", "title": "" }, { "docid": "ed0a1814f37918639b1dc5c1e9b78404", "score": "0.47156304", "text": "func (es *ExprStack) SetVariableSolved(id int, val dec.Decimal) {\n\tv, ok := es.resolver[id]\n\tif ok { // yes, we know about this variable\n\t\ta, isAssignable := v.(Assignable)\n\t\tif isAssignable { // is it an lvalue ?\n\t\t\ta.SetValue(val)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4202ee19b3a9cbee159bf873ba256a71", "score": "0.47055736", "text": "func (e *Environment) Set(name string, val Object) Object {\n\te.store[name] = val\n\treturn val\n}", "title": "" }, { "docid": "4202ee19b3a9cbee159bf873ba256a71", "score": "0.47055736", "text": "func (e *Environment) Set(name string, val Object) Object {\n\te.store[name] = val\n\treturn val\n}", "title": "" }, { "docid": "8ecf51d5a87a0ac1f7e50606114bf179", "score": "0.47046772", "text": "func (q *UpdateQuery) Set(name string, param interface{}) {\n\tq.values = append(q.values, namedParam{name, param})\n}", "title": "" }, { "docid": "5f75ce75b8be39f2785a93b7e790d391", "score": "0.46941587", "text": "func (b *blockWalker) addVar(v ir.Node, typ types.Map, reason string, flags meta.VarFlags) {\n\tb.ctx.sc.AddVar(v, typ, reason, flags)\n\tsv, ok := v.(*ir.SimpleVar)\n\tif !ok {\n\t\treturn\n\t}\n\tb.trackVarName(v, sv.Name)\n}", "title": "" }, { "docid": "e76382c3273ac7aa9ca24ec5ed976e7a", "score": "0.4690696", "text": "func Var(name string, value interface{}) Option {\n\treturn func(bd *Request) {\n\t\tif bd.Variables == nil {\n\t\t\tbd.Variables = map[string]interface{}{}\n\t\t}\n\n\t\tbd.Variables[name] = value\n\t}\n}", "title": "" }, { "docid": "8949887f2d2ab9046144563de0d2babb", "score": "0.4681648", "text": "func (r *Replacer) Set(variable string, value any) {\n\tr.static[variable] = value\n}", "title": "" }, { "docid": "e6ce402e5b4801ecaaa010122a07410d", "score": "0.46811458", "text": "func (vars *Variables) Set(v Variable) error {\n\n\tval, err := vars.Resolve(v)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err := os.Setenv(v.Key, val); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "54a7b40e0463d269b9eeab3f903fd464", "score": "0.46770585", "text": "func (p Payload) Set(name string, value interface{}) {\n\tp[name] = value\n}", "title": "" }, { "docid": "5354981e0b5773c960e3a798a01c58bd", "score": "0.4676501", "text": "func (m *MethodScope) AddVar(vr *types.Var, suffix string) *Var {\n\timports := make(map[string]*Package)\n\tm.populateImports(vr.Type(), imports)\n\tm.resolveImportVarConflicts(imports)\n\n\tname := varName(vr, suffix)\n\t// Ensure that the var name does not conflict with a package import.\n\tif _, ok := m.registry.searchImport(name); ok {\n\t\tname += \"MoqParam\"\n\t}\n\tif _, ok := m.searchVar(name); ok || m.conflicted[name] {\n\t\tname = m.resolveVarNameConflict(name)\n\t}\n\n\tv := Var{\n\t\tvr: vr,\n\t\timports: imports,\n\t\tmoqPkgPath: m.moqPkgPath,\n\t\tName: name,\n\t}\n\tm.vars = append(m.vars, &v)\n\treturn &v\n}", "title": "" }, { "docid": "c86fa117d3483310954ce9b75b19b7cc", "score": "0.46696118", "text": "func (info *StmtInfo) SetLocals(key, val interface{}) {\n\tinfo.locals[key] = val\n}", "title": "" }, { "docid": "6c36d186bc621202e9e4e700fbf27c8e", "score": "0.46686074", "text": "func (o *Optimize) Set(name string, val interface{}) {\n\tconfig := newOptimizeConfig()\n\tconfig.m[name] = val\n\tcparams := config.toC(o.ctx)\n\tdefer C.Z3_params_dec_ref(o.ctx.c, cparams)\n\to.ctx.do(func() {\n\t\tC.Z3_optimize_set_params(o.ctx.c, o.o, cparams)\n\t})\n\truntime.KeepAlive(o)\n\truntime.KeepAlive(cparams)\n}", "title": "" }, { "docid": "5fa798b1a5b55a1b2c068f15398cc79c", "score": "0.4658731", "text": "func (Mock) SetVariables(params, flags []string) error {\n\treturn nil\n}", "title": "" }, { "docid": "59fe7b4d777322a1d4e578600ecf787e", "score": "0.465181", "text": "func (f *FlagSet) IntVar(p *int, name rune, value int, usage string) {\n\tf.Var(newIntValue(value, p), name, usage)\n}", "title": "" }, { "docid": "917774f0629543129267b27ae071794d", "score": "0.46499372", "text": "func (args *Args) Set(name string, value interface{}) {\n\tfor _, arg := range args.items {\n\t\tif arg.name == name {\n\t\t\targ.value = value\n\t\t\targ.kind = reflect.TypeOf(value).Name()\n\n\t\t\treturn\n\t\t}\n\t}\n\n\targs.items = append(args.items, &Arg{\n\t\tname: name,\n\t\tvalue: value,\n\t\tkind: reflect.TypeOf(value).Name(),\n\t})\n}", "title": "" }, { "docid": "196ffd66c00e0b2890c407d06986ff97", "score": "0.46416196", "text": "func (s *state) lookupVarOutgoing(b *ssa.Block, t ssa.Type, name ssaVar) *ssa.Value {\n\treturn nil\n\t// m := s.defvars[b.ID]\n\t// if v, ok := m[name]; ok {\n\t// \treturn v\n\t// }\n\t// // The variable is not defined by b and we haven't\n\t// // looked it up yet. Generate v, a copy value which\n\t// // will be the outgoing value of the variable. Then\n\t// // look up w, the incoming value of the variable.\n\t// // Make v = copy(w). We need the extra copy to\n\t// // prevent infinite recursion when looking up the\n\t// // incoming value of the variable.\n\t// v := b.NewValue0(s.peekLine(), ssa.OpCopy, t)\n\t// m[name] = v\n\t// v.AddArg(s.lookupVarIncoming(b, t, name))\n\t// return v\n}", "title": "" }, { "docid": "d1af641fbe7a523823958221f4b359e1", "score": "0.4636262", "text": "func (s *Simp) FreezeVar(v Var) {\n\tif !s.frozen[v] {\n\t\ts.frozen[v] = true\n\t\ts.frozenVars = append(s.frozenVars, v)\n\t}\n}", "title": "" }, { "docid": "08391a3fe040096aa378c10c218d8f9b", "score": "0.46249264", "text": "func (f *FlagSet) IntVar(p *int, name string, value int, usage string) {\n\tf.fs.IntVar(p, name,value,usage)\n}", "title": "" } ]
98d32fc2025500175c4f3bad32b4645f
Algorithm returns the key importation algorithm identifier (to be used).
[ { "docid": "1a619482f321d94b9cf582eada71d0d6", "score": "0.7314088", "text": "func (opts *ECDSAPKIXPublicKeyImportOpts) Algorithm() string {\n\treturn ECDSA\n}", "title": "" } ]
[ { "docid": "bdc8a8f3d372c23456c07514c4f66273", "score": "0.73792017", "text": "func (opts *SM4ImportKeyOpts) Algorithm() string {\n\treturn SM4\n}", "title": "" }, { "docid": "0d30ea54dacf868726a9aefab94a1396", "score": "0.731097", "text": "func (k TUFKey) Algorithm() string {\n\treturn k.Type\n}", "title": "" }, { "docid": "fafcf73cb1c418142d7f844f765d083e", "score": "0.7174226", "text": "func (opts *ECDSAPrivateKeyImportOpts) Algorithm() string {\n\treturn ECDSA\n}", "title": "" }, { "docid": "2d618001e991500c519520a92a98e12a", "score": "0.7072891", "text": "func (opts *ECDSAGoPublicKeyImportOpts) Algorithm() string {\n\treturn ECDSA\n}", "title": "" }, { "docid": "b5227644765726fcd7ab6f0b1e841707", "score": "0.6972644", "text": "func (key keyBase) Algorithm() Algorithm {\n\tif key.algorithm == nil {\n\t\treturn Null\n\t}\n\treturn key.algorithm\n}", "title": "" }, { "docid": "9b4a088d1a29b2dbb8d4f15f93c26a98", "score": "0.68590826", "text": "func (privkey *PrivateKey) Algorithm() KeyAlgorithm {\n\treturn privkey.algorithm\n}", "title": "" }, { "docid": "5ce8518399b0a653ab5e581023ea0a8f", "score": "0.67225623", "text": "func (s *signer) Algorithm() string {\n\treturn \"SHA1+RSA\" // XXX NOT THE PROPER NAME\n}", "title": "" }, { "docid": "39237b7848db9b25857940e95f59e21a", "score": "0.6696599", "text": "func (opts *ECDSAP256KeyGenOpts) Algorithm() string {\n\treturn ECDSAP256\n}", "title": "" }, { "docid": "17376ad18034f3b5db1522dea5566132", "score": "0.66955054", "text": "func (this *Challenge) GetAlgorithm() string {\n\treturn this.authParams.GetValue(ParameterNames_ALGORITHM).(string)\n}", "title": "" }, { "docid": "7cc3f303d7b9fbb03379d478c315621a", "score": "0.6686349", "text": "func Algorithm(s string) (crypto.Hash, error) {\n\ts = strings.ToLower(s)\n\tfor alg, v := range algMap {\n\t\tif v == s {\n\t\t\treturn alg, nil\n\t\t}\n\t}\n\treturn crypto.Hash(0), errors.Wrap(ErrNoImplement, \"error \"+s)\n}", "title": "" }, { "docid": "394e11eab668ac4ca04606f63546f2c1", "score": "0.6583542", "text": "func (o *PkixEddsaKeySpecAllOf) GetAlgorithm() string {\n\tif o == nil || o.Algorithm == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Algorithm\n}", "title": "" }, { "docid": "9dd36f36af366f5d7737f6130bd354f0", "score": "0.65476614", "text": "func getAlgorithm(key interface{}) (string, error) {\n\tswitch v := key.(type) {\n\tcase jwk.Key:\n\t\tallowedAlgs, algType, err := getAlgsForJWKKeyType(v)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\talgorithm = strings.ToUpper(algorithm)\n\t\tif algorithm != \"\" {\n\t\t\talgOk := false\n\t\t\tfor _, alg := range allowedAlgs {\n\t\t\t\tif alg == algorithm {\n\t\t\t\t\talgOk = true\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !algOk {\n\t\t\t\treturn \"\", errors.New(fmt.Sprintf(\"You must supply a valid alg for your key. Valid algs for %v are %v\", algType, strings.Join(allowedAlgs, \", \")))\n\t\t\t}\n\t\t} else {\n\t\t\treturn getDefaultAlg(v)\n\t\t}\n\tcase cryptoKey:\n\t\tallowedAlgs, algType, err := getAlgsForKeyType(key)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\n\t\talgorithm = strings.ToUpper(algorithm)\n\t\tif algorithm != \"\" {\n\t\t\talgOk := false\n\t\t\tfor _, alg := range allowedAlgs {\n\t\t\t\tif alg == algorithm {\n\t\t\t\t\talgOk = true\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !algOk {\n\t\t\t\treturn \"\", errors.New(fmt.Sprintf(\"You must supply a valid alg for your key. Valid algs for %v are %v\", algType, strings.Join(allowedAlgs, \", \")))\n\t\t\t}\n\t\t} else {\n\t\t\tparsedKey, err := jwk.New(key)\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", err\n\t\t\t}\n\t\t\treturn getDefaultAlg(parsedKey)\n\t\t}\n\tdefault:\n\t\treturn \"\", errors.New(fmt.Sprintf(\"Could not determine algorithm for type %T\", v))\n\t}\n\treturn \"\", errors.New(\"Unknown error\")\n}", "title": "" }, { "docid": "f97644419428472ff53e0f3022e423f8", "score": "0.65395474", "text": "func (j *JWT) Algorithm() string {\n\treturn j.header.Algorithm\n}", "title": "" }, { "docid": "d28ddf0c31dd2cbc4717271815259b98", "score": "0.6522618", "text": "func (opts *ECDSAP384KeyGenOpts) Algorithm() string {\n\treturn ECDSAP384\n}", "title": "" }, { "docid": "e8379979ec5f3962c0d3e2fcf10418e4", "score": "0.6517579", "text": "func (opts *ECDSAKeyGenOpts) Algorithm() string {\n\treturn ECDSA\n}", "title": "" }, { "docid": "e31ccc0410aab398fbea76b0db2abd78", "score": "0.6450208", "text": "func (h *HMAC) GetAlgorithmID() jwtee.Algorithm {\n\treturn h.alg\n}", "title": "" }, { "docid": "dfacd27c22cf8e6aef9d8247f0a20c92", "score": "0.6437847", "text": "func (opts *SM4KeyGenOpts) Algorithm() string {\n\treturn SM4\n}", "title": "" }, { "docid": "c943e72079c1378b9d29824f2f6f5246", "score": "0.642644", "text": "func Algorithm(alg func() hash.Hash) func(*SignerProvider) {\n\treturn func(provider *SignerProvider) { provider.algorithm = alg }\n}", "title": "" }, { "docid": "4b35c44496efb56e6a91f53cb1531e30", "score": "0.6281087", "text": "func (o CertificateOutput) KeyAlgorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Certificate) pulumi.StringOutput { return v.KeyAlgorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "07fe792fa24fafaec13dee10d451375c", "score": "0.61842036", "text": "func (jwt *jwt) Algorithm() Algorithm {\n\treturn jwt.algorithm\n}", "title": "" }, { "docid": "78489df8c862f98847db6c3f1f0aa9a1", "score": "0.61165273", "text": "func AlgorithmPrefix(algo Algorithm) []byte {\n\treturn algo.prefix\n}", "title": "" }, { "docid": "58b230640a3d7ff1a831eadbb1fb35ec", "score": "0.61100614", "text": "func (o KeyVersionSpecOutput) Algorithm() KeyVersionSpecAlgorithmPtrOutput {\n\treturn o.ApplyT(func(v KeyVersionSpec) *KeyVersionSpecAlgorithm { return v.Algorithm }).(KeyVersionSpecAlgorithmPtrOutput)\n}", "title": "" }, { "docid": "6ccbbea03613fe86a095096aded0dc17", "score": "0.60751224", "text": "func (o AsymmetricEncryptedSecretOutput) EncryptionAlgorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v AsymmetricEncryptedSecret) string { return v.EncryptionAlgorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "0eea1b0d3c673e17a273349c7cb67b15", "score": "0.6073202", "text": "func GetPublicKeyAlgorithm(key interface{}) x509.PublicKeyAlgorithm {\n\tif privkey, ok := key.(crypto.Signer); ok {\n\t\tkey = privkey.Public()\n\t}\n\tswitch key.(type) {\n\tcase *rsa.PublicKey:\n\t\treturn x509.RSA\n\tcase *ecdsa.PublicKey:\n\t\treturn x509.ECDSA\n\tdefault:\n\t\treturn x509.UnknownPublicKeyAlgorithm\n\t}\n}", "title": "" }, { "docid": "137276314c38825db191fcc668291045", "score": "0.5999486", "text": "func (opts *ECDSAReRandKeyOpts) Algorithm() string {\n\treturn ECDSAReRand\n}", "title": "" }, { "docid": "a1477f4bf0f784a0f1a0c500bbbb9f7a", "score": "0.59895337", "text": "func getDefaultAlg(key jwk.Key) (string, error) {\n\tif keyAlg := key.Algorithm(); keyAlg != \"\" {\n\t\treturn keyAlg, nil\n\t}\n\n\tswitch keyType := key.KeyType(); keyType {\n\tcase jwa.EC:\n\t\treturn ecAlgs[0], nil\n\tcase jwa.RSA:\n\t\treturn rsaAlgs[0], nil\n\tcase jwa.OctetSeq:\n\t\treturn octetAlgs[0], nil\n\tdefault:\n\t\treturn \"\", errors.New(\"Could not find a valid alg. Invalid key type\")\n\t}\n}", "title": "" }, { "docid": "18cd2b1a1511f3fb5ccb6bfc14fd1cb0", "score": "0.59767246", "text": "func keyTypeFromCryptoKeyVersionAlgorithm(algorithm kmspb.CryptoKeyVersion_CryptoKeyVersionAlgorithm) (keymanagerv1.KeyType, bool) {\n\tswitch algorithm {\n\tcase kmspb.CryptoKeyVersion_EC_SIGN_P256_SHA256:\n\t\treturn keymanagerv1.KeyType_EC_P256, true\n\tcase kmspb.CryptoKeyVersion_EC_SIGN_P384_SHA384:\n\t\treturn keymanagerv1.KeyType_EC_P384, true\n\tcase kmspb.CryptoKeyVersion_RSA_SIGN_PKCS1_2048_SHA256:\n\t\treturn keymanagerv1.KeyType_RSA_2048, true\n\tcase kmspb.CryptoKeyVersion_RSA_SIGN_PKCS1_4096_SHA256:\n\t\treturn keymanagerv1.KeyType_RSA_4096, true\n\tdefault:\n\t\treturn keymanagerv1.KeyType_UNSPECIFIED_KEY_TYPE, false\n\t}\n}", "title": "" }, { "docid": "3797b8b931908b7b3e0b5c536f4360a0", "score": "0.5937731", "text": "func (opts *SHA256Opts) Algorithm() string {\n\treturn SHA256\n}", "title": "" }, { "docid": "820bf52310d9c2a7c283023fd9070c69", "score": "0.5930966", "text": "func (opts *SHA256Opts) Algorithm() string {\r\n\treturn SHA256\r\n}", "title": "" }, { "docid": "a8e504df742bdd750ff6bf60c9873d37", "score": "0.5885308", "text": "func (o AsymmetricEncryptedSecretResponseOutput) EncryptionAlgorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v AsymmetricEncryptedSecretResponse) string { return v.EncryptionAlgorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "1c2755c38e0d5dd800b07d02386b6f5d", "score": "0.5880363", "text": "func (o KeyVersionSpecResponseOutput) Algorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v KeyVersionSpecResponse) string { return v.Algorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "9badc556e54249e085b8fed4f9b4dd9e", "score": "0.5878714", "text": "func (opts *SHA3_256Opts) Algorithm() string {\n\treturn SHA3_256\n}", "title": "" }, { "docid": "8bc2bec5a75b8d72dbf4d729831c636d", "score": "0.5878555", "text": "func (opts *SHA3_256Opts) Algorithm() string {\r\n\treturn SHA3_256\r\n}", "title": "" }, { "docid": "37ab93b9318d987dd2f19e032eaa3cda", "score": "0.58562016", "text": "func (o ModuleModuleLinkHashOutput) Algorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ModuleModuleLinkHash) string { return v.Algorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "82458bf5f1b04c777064bd05486b0d85", "score": "0.58465993", "text": "func (o KeyVersionSpecPtrOutput) Algorithm() KeyVersionSpecAlgorithmPtrOutput {\n\treturn o.ApplyT(func(v *KeyVersionSpec) *KeyVersionSpecAlgorithm {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Algorithm\n\t}).(KeyVersionSpecAlgorithmPtrOutput)\n}", "title": "" }, { "docid": "8e2aaeaa936656ac7ca1ca8ee07dc40d", "score": "0.5787637", "text": "func (o AsymmetricEncryptedSecretPtrOutput) EncryptionAlgorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AsymmetricEncryptedSecret) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.EncryptionAlgorithm\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c94bedfc6c43c14c8bfac8c5ca657a05", "score": "0.5765415", "text": "func (opts *SHA3_384Opts) Algorithm() string {\r\n\treturn SHA3_384\r\n}", "title": "" }, { "docid": "6b19879a9487ab72fd374f92e8684ae3", "score": "0.57566065", "text": "func ParseKeyAlgorithm(in string) (KeyAlgorithm, error) {\n\tswitch in {\n\tcase \"ecdsa\":\n\t\treturn ECDSAKey, nil\n\tcase \"rsa\":\n\t\treturn RSAKey, nil\n\tdefault:\n\t\treturn keyAlgorithmNotSet, fmt.Errorf(\"unknown key type: %s\", in)\n\t}\n}", "title": "" }, { "docid": "66206812fa25a441ff34df6af2861000", "score": "0.5754431", "text": "func (o *CreateJsonWebKeySet) GetAlg() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Alg\n}", "title": "" }, { "docid": "bed43c9c4172224d4eb1cd7aea51eba2", "score": "0.57504934", "text": "func (opts *SHA384Opts) Algorithm() string {\r\n\treturn SHA384\r\n}", "title": "" }, { "docid": "aa5e99c507087a6a3a3aad3883908b86", "score": "0.5747898", "text": "func (o RunBookDraftContentLinkHashOutput) Algorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v RunBookDraftContentLinkHash) string { return v.Algorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "66c3dfde4d9b7daf142dc7ddedcadda1", "score": "0.5725589", "text": "func (opts *SHA3_384Opts) Algorithm() string {\n\treturn SHA3_384\n}", "title": "" }, { "docid": "c66857c9ec00171e323a4b0db03f21fb", "score": "0.57180417", "text": "func (o SpringCloudCustomizedAcceleratorGitRepositorySshAuthPtrOutput) HostKeyAlgorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *SpringCloudCustomizedAcceleratorGitRepositorySshAuth) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.HostKeyAlgorithm\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5833ad0e9c6725b1b50e4d1069b071a1", "score": "0.5709032", "text": "func (o VpnGatewayConnectionVpnLinkIpsecPolicyOutput) EncryptionAlgorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v VpnGatewayConnectionVpnLinkIpsecPolicy) string { return v.EncryptionAlgorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "09522e4851e458a7ad73b9c35f87b277", "score": "0.5699359", "text": "func (di *DCTCPInfo) Algorithm() string { return \"dctcp\" }", "title": "" }, { "docid": "d2cec2d557d560f5ae8dc808e517b35e", "score": "0.5696823", "text": "func (o SpringCloudCustomizedAcceleratorGitRepositorySshAuthOutput) HostKeyAlgorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v SpringCloudCustomizedAcceleratorGitRepositorySshAuth) *string { return v.HostKeyAlgorithm }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "77ef95ebb7ef6ce4050bc5dbf332e41c", "score": "0.56918013", "text": "func (jSig *JwsSignature) GetAlg() (string, error) {\n\tvar algProt string\n\tvar algUnProt string\n\n\tif jSig.ProtectedHeader != nil {\n\t\talgProt = jSig.ProtectedHeader.Algorithm\n\t}\n\tif jSig.UnprotectedHeader != nil {\n\t\talgUnProt = jSig.UnprotectedHeader.Algorithm\n\t}\n\n\tif algProt == \"\" {\n\t\tif algUnProt == \"\" {\n\t\t\treturn \"\", errors.New(\"No algorithm (alg) found in protected or unprotected header\")\n\t\t} else if algProt != algUnProt {\n\t\t\treturn \"\", errors.New(\"Two non-matching algorithm (alg) parameters found in unprotected and protected header\")\n\t\t} else if !IsValidJwsAlg(algUnProt) {\n\t\t\treturn \"\", errors.New(\"Unprotected header algorithm (alg) is not valid\")\n\t\t}\n\t\treturn algUnProt, nil\n\t} else {\n\t\tif algUnProt != \"\" && algProt != algUnProt {\n\t\t\treturn \"\", errors.New(\"Two non-matching algorithm (alg) parameters found in unprotected and protected header\")\n\t\t} else if !IsValidJwsAlg(algProt) {\n\t\t\treturn \"\", errors.New(\"protected header algorithm (alg) is not valid\")\n\t\t}\n\t\treturn algProt, nil\n\t}\n}", "title": "" }, { "docid": "b388b65122a48bbdf0a874cca181216f", "score": "0.5677319", "text": "func (opts *SHA384Opts) Algorithm() string {\n\treturn SHA384\n}", "title": "" }, { "docid": "562cdd86e3d44a057dcd5ed5d0ac6ff6", "score": "0.5664453", "text": "func (o RunBookPublishContentLinkHashOutput) Algorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v RunBookPublishContentLinkHash) string { return v.Algorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "e3b38bd385a07566b71dafd3d806d73e", "score": "0.5638581", "text": "func AlgorithmFlag(cc *kingpin.CmdClause) *string {\n\treturn cc.Flag(\"algorithm\", \"Encryption algorithm. If the environment variable BISCUIT_ALGORITHM is \"+\n\t\t\"set, it will be used as the default value. Options: \"+\n\t\tstrings.Join(algorithms.GetRegisteredAlgorithmsNames(), \", \")).\n\t\tShort('a').\n\t\tEnvar(\"BISCUIT_ALGORITHM\").\n\t\tDefault(secretbox.Name).\n\t\tEnum(algorithms.GetRegisteredAlgorithmsNames()...)\n}", "title": "" }, { "docid": "ae898e6543ff6dc65cf7bc91911f65be", "score": "0.56380385", "text": "func (o AsymmetricEncryptedSecretResponsePtrOutput) EncryptionAlgorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AsymmetricEncryptedSecretResponse) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.EncryptionAlgorithm\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0957e10ea605b457432064f83166f41c", "score": "0.56278557", "text": "func (k UnknownPrivateKey) SignatureAlgorithm() SigAlgorithm {\n\treturn \"\"\n}", "title": "" }, { "docid": "b7d95415f66dcec8b78485b90e0ffa45", "score": "0.5604259", "text": "func (k ED25519PrivateKey) SignatureAlgorithm() SigAlgorithm {\n\treturn EDDSASignature\n}", "title": "" }, { "docid": "b8c9f6abb8864fe59f19a0e73fdccb95", "score": "0.55889267", "text": "func (o *PkixEddsaKeySpecAllOf) GetAlgorithmOk() (*string, bool) {\n\tif o == nil || o.Algorithm == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Algorithm, true\n}", "title": "" }, { "docid": "7ca382e9d73855f986fa5227b2c08703", "score": "0.5579593", "text": "func (r *LoadBalancer) Algorithm() *pulumi.StringOutput {\n\treturn (*pulumi.StringOutput)(r.s.State[\"algorithm\"])\n}", "title": "" }, { "docid": "07b202ca369265315e694f1b65b933a5", "score": "0.5576108", "text": "func (hasher *sha224) HashAlgorithm() HashAlgorithm {\n\treturn Sha224\n}", "title": "" }, { "docid": "a01f0178fc586882673a55e32f660821", "score": "0.55674195", "text": "func KeygenEnc(alg jose.KeyAlgorithm, bits int) (crypto.PublicKey, crypto.PrivateKey, error) {\n\tswitch alg {\n\tcase jose.RSA1_5, jose.RSA_OAEP, jose.RSA_OAEP_256:\n\t\tif bits == 0 {\n\t\t\tbits = 2048\n\t\t}\n\t\tif bits < 2048 {\n\t\t\treturn nil, nil, errors.New(\"too short key for RSA `alg`, 2048+ is required\")\n\t\t}\n\t\tkey, err := rsa.GenerateKey(rand.Reader, bits)\n\t\treturn key.Public(), key, err\n\tcase jose.ECDH_ES, jose.ECDH_ES_A128KW, jose.ECDH_ES_A192KW, jose.ECDH_ES_A256KW:\n\t\tvar crv elliptic.Curve\n\t\tswitch bits {\n\t\tcase 0, 256:\n\t\t\tcrv = elliptic.P256()\n\t\tcase 384:\n\t\t\tcrv = elliptic.P384()\n\t\tcase 521:\n\t\t\tcrv = elliptic.P521()\n\t\tdefault:\n\t\t\treturn nil, nil, errors.New(\"unknown elliptic curve bit length, use one of 256, 384, 521\")\n\t\t}\n\t\tkey, err := ecdsa.GenerateKey(crv, rand.Reader)\n\t\treturn key.Public(), key, err\n\tdefault:\n\t\treturn nil, nil, errors.New(\"unknown `alg` for `use` = `enc`\")\n\t}\n}", "title": "" }, { "docid": "351dd1d5471465f0c538be4b77cc3483", "score": "0.5563178", "text": "func NewAlgorithm(in string) (Algorithm, error) {\n\tif result, ok := string2algorithm[in]; ok {\n\t\treturn result, nil\n\t}\n\n\treturn AlgorithmUnknown, fmt.Errorf(\"unknown algorithm %s\", in)\n}", "title": "" }, { "docid": "e08388a5e7a00411a73ca34bb37c8635", "score": "0.55550486", "text": "func (o GetSpringCloudServiceConfigServerGitSettingSshAuthOutput) HostKeyAlgorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetSpringCloudServiceConfigServerGitSettingSshAuth) string { return v.HostKeyAlgorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "52ad2926e677cc609289cc80d0d90be0", "score": "0.55531603", "text": "func (o VpnGatewayConnectionVpnLinkIpsecPolicyOutput) IkeEncryptionAlgorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v VpnGatewayConnectionVpnLinkIpsecPolicy) string { return v.IkeEncryptionAlgorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "3b0d0be068adbafedf143051313b6aa4", "score": "0.55507535", "text": "func (k *keyImpl) JWASignatureAlgorithm() (jwa.SignatureAlgorithm, error) {\n\tkeyType := k.jwk.KeyType()\n\tswitch keyType {\n\t// Handle elliptic curve keys\n\tcase jwa.EC:\n\t\t// Get the curve of the key\n\t\tcurve, _ := k.jwk.Get(jwk.ECDSACrvKey)\n\n\t\t// Determine the signature algorithm based on the key's curve\n\t\tswitch curve {\n\t\t// ECDSA P-256 keys use the ES256 signature algorithm\n\t\tcase jwa.P256:\n\t\t\treturn jwa.ES256, nil\n\t\t// ECDSA P-384 keys use the ES384 signature algorithm\n\t\tcase jwa.P384:\n\t\t\treturn jwa.ES384, nil\n\t\t// ECDSA P-521 (sic) keys use the ES512 (sic) signature algorithm\n\t\tcase jwa.P521:\n\t\t\treturn jwa.ES512, nil\n\t\t}\n\n\t\t// Ensure unhandled curves result in an error\n\t\treturn \"\", fmt.Errorf(\"Unhandled EC curve (%T): %+v\", curve, curve)\n\t// Handle octet key pair keys\n\tcase jwa.OKP:\n\t\t// Get the curve of the key\n\t\tcurve, _ := k.jwk.Get(jwk.OKPCrvKey)\n\n\t\t// Determine the signature algorithm based on the key's curve\n\t\tswitch curve {\n\t\t// Ed25519 keys use the EdDSA signature algorithm\n\t\tcase jwa.Ed25519:\n\t\t\treturn jwa.EdDSA, nil\n\t\t}\n\n\t\t// Ensure unhandled curves result in an error\n\t\treturn \"\", fmt.Errorf(\"Unhandled OKP curve (%T): %+v\", curve, curve)\n\t// Handle RSA key types\n\tcase jwa.RSA:\n\t\t// There are many algorithms that can be used with RSA keys, but PS512 offers\n\t\t// better security compared to RS256, RS384, RS512, PS256, and PS384 algorithms\n\t\treturn jwa.PS512, nil\n\tdefault:\n\t\treturn \"\", fmt.Errorf(\"unsupported %T %+v\", keyType, keyType)\n\t}\n\t// Convert the key to its raw crypto/* type\n\traw, err := k.Raw()\n\tif err != nil {\n\t\treturn jwa.NoSignature, err\n\t}\n\n\t// Determine the type of the key\n\tswitch raw := raw.(type) {\n\tcase *ecdsa.PrivateKey:\n\t\t// ECDSA256 keys use the ES256 signature algorithm\n\t\tif raw.Curve == elliptic.P256() {\n\t\t\treturn jwa.ES256, nil\n\t\t}\n\n\t\t// ECDSA384 keys use the ES384 signature algorithm\n\t\tif raw.Curve == elliptic.P384() {\n\t\t\treturn jwa.ES384, nil\n\t\t}\n\n\t\t// ECDSA521 (sic) keys use the ES512 (sic) signature algorithm\n\t\tif raw.Curve == elliptic.P521() {\n\t\t\treturn jwa.ES512, nil\n\t\t}\n\tcase *ecdsa.PublicKey:\n\t\t// ECDSA256 keys use the ES256 signature algorithm\n\t\tif raw.Curve == elliptic.P256() {\n\t\t\treturn jwa.ES256, nil\n\t\t}\n\n\t\t// ECDSA384 keys use the ES384 signature algorithm\n\t\tif raw.Curve == elliptic.P384() {\n\t\t\treturn jwa.ES384, nil\n\t\t}\n\n\t\t// ECDSA521 (sic) keys use the ES512 (sic) signature algorithm\n\t\tif raw.Curve == elliptic.P521() {\n\t\t\treturn jwa.ES512, nil\n\t\t}\n\t}\n\n\treturn jwa.NoSignature, fmt.Errorf(\"No known signature algorithms for %T: %+v\", raw, raw)\n}", "title": "" }, { "docid": "aaf51738803786b661930b6900e3e562", "score": "0.5549745", "text": "func GetFileAlgoName(algo int) string {\n\tswitch algo {\n\tcase PGPHASHALGO_MD5:\n\t\treturn \"md5\"\n\tcase PGPHASHALGO_SHA1:\n\t\treturn \"sha1\"\n\tcase PGPHASHALGO_RIPEMD160:\n\t\treturn \"rmd160\"\n\tcase PGPHASHALGO_MD2:\n\t\treturn \"md2\"\n\tcase PGPHASHALGO_TIGER192:\n\t\treturn \"tgr192\"\n\tcase PGPHASHALGO_HAVAL_5_160:\n\t\treturn \"haval5160\"\n\tcase PGPHASHALGO_SHA256:\n\t\treturn \"sha256\"\n\tcase PGPHASHALGO_SHA384:\n\t\treturn \"sha384\"\n\tcase PGPHASHALGO_SHA512:\n\t\treturn \"sha512\"\n\tcase PGPHASHALGO_SHA224:\n\t\treturn \"sha224\"\n\tdefault:\n\t\treturn \"md5\"\n\t}\n}", "title": "" }, { "docid": "64759caeaccf46eb0c5c1006510127c7", "score": "0.55219585", "text": "func (o KeyVersionSpecResponsePtrOutput) Algorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *KeyVersionSpecResponse) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Algorithm\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "1037c440ced64197bbe7dec7ae10286e", "score": "0.54960847", "text": "func GetHashAlgorithm() string {\n\treturn defaultHashAlgorithm\n}", "title": "" }, { "docid": "5d58ce9826ea4560a369f5b046288b66", "score": "0.5491599", "text": "func (o SpringCloudServiceConfigServerGitSettingSshAuthOutput) HostKeyAlgorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v SpringCloudServiceConfigServerGitSettingSshAuth) *string { return v.HostKeyAlgorithm }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "24f2d4d25845e09358414f836b29461b", "score": "0.548508", "text": "func (o ModuleModuleLinkHashPtrOutput) Algorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ModuleModuleLinkHash) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Algorithm\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6cf091bb044a815e215f51cd7a84648c", "score": "0.5483032", "text": "func (hasher *sha256) HashAlgorithm() HashAlgorithm {\n\treturn Sha256\n}", "title": "" }, { "docid": "6219c5d2934fb6c3fa368e880b895017", "score": "0.5477511", "text": "func (o SpringCloudServiceConfigServerGitSettingSshAuthPtrOutput) HostKeyAlgorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *SpringCloudServiceConfigServerGitSettingSshAuth) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.HostKeyAlgorithm\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "b6a9bad9130ef600a8de841b98ffd923", "score": "0.54685533", "text": "func (o EcKeyTypeResponseOutput) SignatureAlgorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v EcKeyTypeResponse) string { return v.SignatureAlgorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "e9ecb02462e0051c9e535fd417a04bac", "score": "0.5463789", "text": "func (o GetSpringCloudServiceConfigServerGitSettingRepositorySshAuthOutput) HostKeyAlgorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetSpringCloudServiceConfigServerGitSettingRepositorySshAuth) string { return v.HostKeyAlgorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "a8c592affb489769eb3f1fb5593fba22", "score": "0.5454223", "text": "func kmsSigningAlgorithm(pub crypto.PublicKey, opts crypto.SignerOpts) (string, error) {\n\tswitch pub.(type) {\n\tcase *ecdsa.PublicKey:\n\t\tswitch opts.HashFunc() {\n\t\tcase crypto.SHA256:\n\t\t\treturn kms.SigningAlgorithmSpecEcdsaSha256, nil\n\t\tcase crypto.SHA384:\n\t\t\treturn kms.SigningAlgorithmSpecEcdsaSha384, nil\n\t\tcase crypto.SHA512:\n\t\t\treturn kms.SigningAlgorithmSpecEcdsaSha512, nil\n\t\tdefault:\n\t\t\treturn \"\", fmt.Errorf(\"hallow/kmssigner: unknown hash algorithm for use with ECDSA\")\n\t\t}\n\tcase *rsa.PublicKey:\n\t\t// If the opts we're passed is a PSSOptions, sign with PSS,\n\t\t// otherwise fallback to PKCS1v1.5\n\t\tif _, ok := opts.(*rsa.PSSOptions); ok {\n\t\t\t// We don't handle SaltLength ATM...\n\t\t\tswitch opts.HashFunc() {\n\t\t\tcase crypto.SHA256:\n\t\t\t\treturn kms.SigningAlgorithmSpecRsassaPssSha256, nil\n\t\t\tcase crypto.SHA384:\n\t\t\t\treturn kms.SigningAlgorithmSpecRsassaPssSha384, nil\n\t\t\tcase crypto.SHA512:\n\t\t\t\treturn kms.SigningAlgorithmSpecRsassaPssSha512, nil\n\t\t\tdefault:\n\t\t\t\treturn \"\", fmt.Errorf(\"hallow/kmssigner: unknown hash algorithm for use with RSA\")\n\t\t\t}\n\t\t}\n\t\tswitch opts.HashFunc() {\n\t\tcase crypto.SHA256:\n\t\t\treturn kms.SigningAlgorithmSpecRsassaPkcs1V15Sha256, nil\n\t\tcase crypto.SHA384:\n\t\t\treturn kms.SigningAlgorithmSpecRsassaPkcs1V15Sha384, nil\n\t\tcase crypto.SHA512:\n\t\t\treturn kms.SigningAlgorithmSpecRsassaPkcs1V15Sha512, nil\n\t\tdefault:\n\t\t\treturn \"\", fmt.Errorf(\"hallow/kmssigner: unknown hash algorithm for use with RSA\")\n\t\t}\n\t}\n\n\treturn \"\", fmt.Errorf(\"hallow/kmsigner: unknown key algorithm\")\n}", "title": "" }, { "docid": "043d5aeebf24e08ff6a918e1e8454007", "score": "0.5448729", "text": "func signatureAlgorithm(jwk *jose.JSONWebKey) (alg jose.SignatureAlgorithm, err error) {\n\tif jwk.Key == nil {\n\t\treturn alg, errors.New(\"no signing key\")\n\t}\n\tswitch key := jwk.Key.(type) {\n\tcase *rsa.PrivateKey:\n\t\t// Because OIDC mandates that we support RS256, we always return that\n\t\t// value. In the future, we might want to make this configurable on a\n\t\t// per client basis. For example allowing PS256 or ECDSA variants.\n\t\t//\n\t\t// See https://github.com/coreos/dex/issues/692\n\t\treturn jose.RS256, nil\n\tcase *ecdsa.PrivateKey:\n\t\t// We don't actually support ECDSA keys yet, but they're tested for\n\t\t// in case we want to in the future.\n\t\t//\n\t\t// These values are prescribed depending on the ECDSA key type. We\n\t\t// can't return different values.\n\t\tswitch key.Params() {\n\t\tcase elliptic.P256().Params():\n\t\t\treturn jose.ES256, nil\n\t\tcase elliptic.P384().Params():\n\t\t\treturn jose.ES384, nil\n\t\tcase elliptic.P521().Params():\n\t\t\treturn jose.ES512, nil\n\t\tdefault:\n\t\t\treturn alg, errors.New(\"unsupported ecdsa curve\")\n\t\t}\n\tdefault:\n\t\treturn alg, fmt.Errorf(\"unsupported signing key type %T\", key)\n\t}\n}", "title": "" }, { "docid": "0d4d4b441b67d96f4d2f9d8ab4990a00", "score": "0.54271126", "text": "func (o *PkixEddsaKeySpecAllOf) SetAlgorithm(v string) {\n\to.Algorithm = &v\n}", "title": "" }, { "docid": "299552bafc4bf26fabe55761c85933d5", "score": "0.54054224", "text": "func (o SpringCloudConfigurationServiceRepositoryOutput) HostKeyAlgorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v SpringCloudConfigurationServiceRepository) *string { return v.HostKeyAlgorithm }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f2d6169ea1a68290d35cd5cf39073650", "score": "0.5392043", "text": "func (c Algorithm) Name() string {\n\treturn c.name\n}", "title": "" }, { "docid": "5c26e3f1e6801e2d1d4ca9ffec65cbc4", "score": "0.536688", "text": "func getKeyGen(scheme string) crypto.KeyShareGenerator {\n\tswitch scheme {\n\tcase \"TBLS256Optimistic\":\n\t\tfallthrough\n\tcase \"TBLS256Pessimistic\":\n\t\tfallthrough\n\tcase \"TBLS256\":\n\t\treturn tbls.NewTBLS256KeyGenerator()\n\tcase \"TRSA1024Optimistic\":\n\t\tfallthrough\n\tcase \"TRSA1024Pessimistic\":\n\t\tfallthrough\n\tcase \"TRSA1024\":\n\t\treturn trsa.NewTRSAKeyGenerator(1024)\n\tcase \"TRSA2048Optimistic\":\n\t\tfallthrough\n\tcase \"TRSA2048Pessimistic\":\n\t\tfallthrough\n\tcase \"TRSA2048\":\n\t\treturn trsa.NewTRSAKeyGenerator(2048)\n\tdefault:\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "d6c017191c57a4a65fe1e0048a062a80", "score": "0.53637916", "text": "func (o SpringCloudServiceConfigServerGitSettingRepositorySshAuthOutput) HostKeyAlgorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v SpringCloudServiceConfigServerGitSettingRepositorySshAuth) *string { return v.HostKeyAlgorithm }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4b471962bc86066a133590940560a683", "score": "0.5356222", "text": "func (cc *ChannelConfig) HashingAlgorithm() func(input []byte) []byte {\n\treturn cc.hashingAlgorithm\n}", "title": "" }, { "docid": "8f6f548dee6520b90670b186f2f5409a", "score": "0.5334385", "text": "func (o SpringCloudServiceConfigServerGitSettingRepositorySshAuthPtrOutput) HostKeyAlgorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *SpringCloudServiceConfigServerGitSettingRepositorySshAuth) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.HostKeyAlgorithm\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "552c3dc3419ed7402e402e22f2e4bd9d", "score": "0.5322953", "text": "func (e PKIEncryptionAlgorithm) validate() error {\n\tswitch e {\n\tcase RSAEncryption:\n\tcase SM2Encryption:\n\tdefault:\n\t\treturn errors.New(\"unsupported encryption algorithm\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3b39b910c940ddb40e1e7be2116f9308", "score": "0.52796835", "text": "func (o RunBookDraftContentLinkHashPtrOutput) Algorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RunBookDraftContentLinkHash) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Algorithm\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6644bdd22dbc757d885b70a9ea1a8c64", "score": "0.5254993", "text": "func (k ECDSAPrivateKey) SignatureAlgorithm() SigAlgorithm {\n\treturn ECDSASignature\n}", "title": "" }, { "docid": "9da05ed25b7d20e429e5badbf3b5bae7", "score": "0.52463055", "text": "func (vi *VegasInfo) Algorithm() string { return \"vegas\" }", "title": "" }, { "docid": "18626bb9a7fdeff3d213159833b0e47f", "score": "0.523582", "text": "func DefaultSigAlgo(priv crypto.Signer) x509.SignatureAlgorithm {\n pub := priv.Public()\n switch pub := pub.(type) {\n case *rsa.PublicKey:\n keySize := pub.N.BitLen()\n switch {\n case keySize >= 4096:\n return x509.SHA512WithRSA\n case keySize >= 3072:\n return x509.SHA384WithRSA\n case keySize >= 2048:\n return x509.SHA256WithRSA\n default:\n return x509.SHA1WithRSA\n }\n case *ecdsa.PublicKey:\n switch pub.Curve {\n case elliptic.P256():\n return x509.ECDSAWithSHA256\n case elliptic.P384():\n return x509.ECDSAWithSHA384\n case elliptic.P521():\n return x509.ECDSAWithSHA512\n default:\n return x509.ECDSAWithSHA1\n }\n default:\n return x509.UnknownSignatureAlgorithm\n }\n}", "title": "" }, { "docid": "615bfc1cf72f05da2ccb5111e6b7e086", "score": "0.5213205", "text": "func (o RunBookPublishContentLinkHashPtrOutput) Algorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RunBookPublishContentLinkHash) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Algorithm\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ea63939542fd70ab3d97daea3397dd28", "score": "0.5208534", "text": "func GenerateKeyForIKESA(ikeSecurityAssociation *context.IKESecurityAssociation) error {\n\t// Check parameters\n\tif ikeSecurityAssociation == nil {\n\t\treturn errors.New(\"IKE SA is nil\")\n\t}\n\n\t// Check if the context contain needed data\n\tif ikeSecurityAssociation.EncryptionAlgorithm == nil {\n\t\treturn errors.New(\"No encryption algorithm specified\")\n\t}\n\tif ikeSecurityAssociation.IntegrityAlgorithm == nil {\n\t\treturn errors.New(\"No integrity algorithm specified\")\n\t}\n\tif ikeSecurityAssociation.PseudorandomFunction == nil {\n\t\treturn errors.New(\"No pseudorandom function specified\")\n\t}\n\tif ikeSecurityAssociation.DiffieHellmanGroup == nil {\n\t\treturn errors.New(\"No Diffie-hellman group algorithm specified\")\n\t}\n\n\tif len(ikeSecurityAssociation.ConcatenatedNonce) == 0 {\n\t\treturn errors.New(\"No concatenated nonce data\")\n\t}\n\tif len(ikeSecurityAssociation.DiffieHellmanSharedKey) == 0 {\n\t\treturn errors.New(\"No Diffie-Hellman shared key\")\n\t}\n\n\t// Transforms\n\ttransformIntegrityAlgorithm := ikeSecurityAssociation.IntegrityAlgorithm\n\ttransformEncryptionAlgorithm := ikeSecurityAssociation.EncryptionAlgorithm\n\ttransformPseudorandomFunction := ikeSecurityAssociation.PseudorandomFunction\n\n\t// Get key length of SK_d, SK_ai, SK_ar, SK_ei, SK_er, SK_pi, SK_pr\n\tvar length_SK_d, length_SK_ai, length_SK_ar, length_SK_ei, length_SK_er, length_SK_pi, length_SK_pr, totalKeyLength int\n\tvar ok bool\n\n\tif length_SK_d, ok = getKeyLength(transformPseudorandomFunction.TransformType,\n\t\ttransformPseudorandomFunction.TransformID, transformPseudorandomFunction.AttributePresent,\n\t\ttransformPseudorandomFunction.AttributeValue); !ok {\n\t\tikeLog.Error(\"[IKE] Get key length of an unsupported algorithm. This may imply an unsupported tranform is chosen.\")\n\t\treturn errors.New(\"Get key length failed\")\n\t}\n\tif length_SK_ai, ok = getKeyLength(transformIntegrityAlgorithm.TransformType,\n\t\ttransformIntegrityAlgorithm.TransformID, transformIntegrityAlgorithm.AttributePresent,\n\t\ttransformIntegrityAlgorithm.AttributeValue); !ok {\n\t\tikeLog.Error(\"[IKE] Get key length of an unsupported algorithm. This may imply an unsupported tranform is chosen.\")\n\t\treturn errors.New(\"Get key length failed\")\n\t}\n\tlength_SK_ar = length_SK_ai\n\tif length_SK_ei, ok = getKeyLength(transformEncryptionAlgorithm.TransformType,\n\t\ttransformEncryptionAlgorithm.TransformID, transformEncryptionAlgorithm.AttributePresent,\n\t\ttransformEncryptionAlgorithm.AttributeValue); !ok {\n\t\tikeLog.Error(\"[IKE] Get key length of an unsupported algorithm. This may imply an unsupported tranform is chosen.\")\n\t\treturn errors.New(\"Get key length failed\")\n\t}\n\tlength_SK_er = length_SK_ei\n\tlength_SK_pi, length_SK_pr = length_SK_d, length_SK_d\n\ttotalKeyLength = length_SK_d + length_SK_ai + length_SK_ar + length_SK_ei + length_SK_er + length_SK_pi + length_SK_pr\n\n\t// Generate IKE SA key as defined in RFC7296 Section 1.3 and Section 1.4\n\tvar pseudorandomFunction hash.Hash\n\n\tif pseudorandomFunction, ok = NewPseudorandomFunction(ikeSecurityAssociation.ConcatenatedNonce,\n\t\ttransformPseudorandomFunction.TransformID); !ok {\n\t\tikeLog.Error(\"[IKE] Get an unsupported pseudorandom funcion. This may imply an unsupported transform is chosen.\")\n\t\treturn errors.New(\"New pseudorandom function failed\")\n\t}\n\n\tikeLog.Tracef(\"DH shared key:\\n%s\", hex.Dump(ikeSecurityAssociation.DiffieHellmanSharedKey))\n\tikeLog.Tracef(\"Concatenated nonce:\\n%s\", hex.Dump(ikeSecurityAssociation.ConcatenatedNonce))\n\n\tif _, err := pseudorandomFunction.Write(ikeSecurityAssociation.DiffieHellmanSharedKey); err != nil {\n\t\tikeLog.Errorf(\"[IKE] Pseudorandom function write error: %+v\", err)\n\t\treturn errors.New(\"Pseudorandom function write failed\")\n\t}\n\n\tSKEYSEED := pseudorandomFunction.Sum(nil)\n\n\tikeLog.Tracef(\"SKEYSEED:\\n%s\", hex.Dump(SKEYSEED))\n\n\tseed := concatenateNonceAndSPI(ikeSecurityAssociation.ConcatenatedNonce,\n\t\tikeSecurityAssociation.RemoteSPI, ikeSecurityAssociation.LocalSPI)\n\n\tvar keyStream, generatedKeyBlock []byte\n\tvar index byte\n\tfor index = 1; len(keyStream) < totalKeyLength; index++ {\n\t\tif pseudorandomFunction, ok =\n\t\t\tNewPseudorandomFunction(SKEYSEED, transformPseudorandomFunction.TransformID); !ok {\n\t\t\tikeLog.Error(\"[IKE] Get an unsupported pseudorandom funcion. This may imply an unsupported transform is chosen.\")\n\t\t\treturn errors.New(\"New pseudorandom function failed\")\n\t\t}\n\t\tif _, err := pseudorandomFunction.Write(append(append(generatedKeyBlock, seed...), index)); err != nil {\n\t\t\tikeLog.Errorf(\"[IKE] Pseudorandom function write error: %+v\", err)\n\t\t\treturn errors.New(\"Pseudorandom function write failed\")\n\t\t}\n\t\tgeneratedKeyBlock = pseudorandomFunction.Sum(nil)\n\t\tkeyStream = append(keyStream, generatedKeyBlock...)\n\t}\n\n\t// Assign keys into context\n\tikeSecurityAssociation.SK_d = keyStream[:length_SK_d]\n\tkeyStream = keyStream[length_SK_d:]\n\tikeSecurityAssociation.SK_ai = keyStream[:length_SK_ai]\n\tkeyStream = keyStream[length_SK_ai:]\n\tikeSecurityAssociation.SK_ar = keyStream[:length_SK_ar]\n\tkeyStream = keyStream[length_SK_ar:]\n\tikeSecurityAssociation.SK_ei = keyStream[:length_SK_ei]\n\tkeyStream = keyStream[length_SK_ei:]\n\tikeSecurityAssociation.SK_er = keyStream[:length_SK_er]\n\tkeyStream = keyStream[length_SK_er:]\n\tikeSecurityAssociation.SK_pi = keyStream[:length_SK_pi]\n\tkeyStream = keyStream[length_SK_pi:]\n\tikeSecurityAssociation.SK_pr = keyStream[:length_SK_pr]\n\t// keyStream = keyStream[length_SK_pr:]\n\n\tikeLog.Tracef(\"SK_d:\\n%s\", hex.Dump(ikeSecurityAssociation.SK_d))\n\tikeLog.Tracef(\"SK_ai:\\n%s\", hex.Dump(ikeSecurityAssociation.SK_ai))\n\tikeLog.Tracef(\"SK_ar:\\n%s\", hex.Dump(ikeSecurityAssociation.SK_ar))\n\tikeLog.Tracef(\"SK_ei:\\n%s\", hex.Dump(ikeSecurityAssociation.SK_ei))\n\tikeLog.Tracef(\"SK_er:\\n%s\", hex.Dump(ikeSecurityAssociation.SK_er))\n\tikeLog.Tracef(\"SK_pi:\\n%s\", hex.Dump(ikeSecurityAssociation.SK_pi))\n\tikeLog.Tracef(\"SK_pr:\\n%s\", hex.Dump(ikeSecurityAssociation.SK_pr))\n\n\treturn nil\n}", "title": "" }, { "docid": "93ae28293f5c432928becc9ad270bc04", "score": "0.52016246", "text": "func calculateEncNumBasis(doc *did.Doc) (string, error) {\n\tdocBytes, err := json.Marshal(doc)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\thash, err := multihash.Sum(docBytes, multihash.SHA2_256, -1)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tmessageIdentifier := []string{numAlgo, string(transform), hash.B58String()}\n\n\treturn strings.Join(messageIdentifier, \"\"), nil\n}", "title": "" }, { "docid": "dfeb75a048f74d9d1d8972823c20b737", "score": "0.52001125", "text": "func (o MfaTotpOutput) Algorithm() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *MfaTotp) pulumi.StringPtrOutput { return v.Algorithm }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "235b46b14f34e8252f06f7f26fd011f0", "score": "0.51891494", "text": "func (o SecretBackendRoleOutput) AlgorithmSigner() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *SecretBackendRole) pulumi.StringOutput { return v.AlgorithmSigner }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "1eb2a5d893f5e0028a4905cdbe5b893f", "score": "0.5187704", "text": "func (k *TUFKey) ID() string {\n\tif k.id == \"\" {\n\t\tpubK := TUFKey{\n\t\t\tType: k.Algorithm(),\n\t\t\tValue: KeyPair{\n\t\t\t\tPublic: k.Public(),\n\t\t\t\tPrivate: nil,\n\t\t\t},\n\t\t}\n\t\tdata, err := json.MarshalCanonical(&pubK)\n\t\tif err != nil {\n\t\t\tlogrus.Error(\"Error generating key ID:\", err)\n\t\t}\n\t\tdigest := sha256.Sum256(data)\n\t\tk.id = hex.EncodeToString(digest[:])\n\t}\n\treturn k.id\n}", "title": "" }, { "docid": "ccd0fc405f132857c92ae519f1741d24", "score": "0.5181264", "text": "func (this *PdfReader) GetEncryptionMethod() string {\n\tcrypter := this.parser.GetCrypter()\n\tstr := crypter.Filter + \" - \"\n\n\tif crypter.V == 0 {\n\t\tstr += \"Undocumented algorithm\"\n\t} else if crypter.V == 1 {\n\t\t// RC4 or AES (bits: 40)\n\t\tstr += \"RC4: 40 bits\"\n\t} else if crypter.V == 2 {\n\t\tstr += fmt.Sprintf(\"RC4: %d bits\", crypter.Length)\n\t} else if crypter.V == 3 {\n\t\tstr += \"Unpublished algorithm\"\n\t} else if crypter.V == 4 {\n\t\t// Look at CF, StmF, StrF\n\t\tstr += fmt.Sprintf(\"Stream filter: %s - String filter: %s\", crypter.StreamFilter, crypter.StringFilter)\n\t\tstr += \"; Crypt filters:\"\n\t\tfor name, cf := range crypter.CryptFilters {\n\t\t\tstr += fmt.Sprintf(\" - %s: %s (%d)\", name, cf.Cfm, cf.Length)\n\t\t}\n\t}\n\tperms := crypter.GetAccessPermissions()\n\tstr += fmt.Sprintf(\" - %#v\", perms)\n\n\treturn str\n}", "title": "" }, { "docid": "baefc23a0728c1085104521f37e3f3ee", "score": "0.51785547", "text": "func (algo SignatureAlgorithm) Name() string {\n\tswitch algo {\n\tcase SignatureAlgorithmUnknown:\n\t\treturn \"unknown\"\n\tcase SignatureAlgorithmECDSA_P256:\n\t\treturn \"ECDSA_P256\"\n\tcase SignatureAlgorithmECDSA_secp256k1:\n\t\treturn \"ECDSA_secp256k1\"\n\tcase SignatureAlgorithmBLS_BLS12_381:\n\t\treturn \"BLS_BLS12_381\"\n\t}\n\n\tpanic(errors.NewUnreachableError())\n}", "title": "" }, { "docid": "c0c6284a869198ac9da362ae0f3fa35b", "score": "0.5164701", "text": "func Compute(a algorithm, v string) (hash string) {\n\treturn v + \"-\" + string(a.name)\n}", "title": "" }, { "docid": "69e1bdfb6ab7f6537cb58c494264dcef", "score": "0.51550263", "text": "func (o LookupSamlResultOutput) SignatureAlgorithm() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupSamlResult) string { return v.SignatureAlgorithm }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "c55619a615a2c8a29d485e4d0a02ebcb", "score": "0.51468647", "text": "func ConfigAlgoToCryptoAlgo(fromConfig string) (CryptAlgo, error) {\n\tswitch fromConfig {\n\tcase argon2id:\n\t\treturn HashingAlgorithmArgon2id, nil\n\tcase sha512:\n\t\treturn HashingAlgorithmSHA512, nil\n\tdefault:\n\t\treturn HashingAlgorithmArgon2id, errors.New(\"Invalid algorithm in configuration. It should be `argon2id` or `sha512`\")\n\t}\n}", "title": "" }, { "docid": "b5df1d9b9edbfa3de0d961572c94e682", "score": "0.5132494", "text": "func NewAlgorithm(name, mime string, prefix []byte, decompressor DecompressorFunc, compressor CompressorFunc) Algorithm {\n\treturn Algorithm{\n\t\tname: name,\n\t\tmime: mime,\n\t\tprefix: prefix,\n\t\tdecompressor: decompressor,\n\t\tcompressor: compressor,\n\t}\n}", "title": "" }, { "docid": "ee1d579fe16c0291441a09e999dff9ca", "score": "0.5115041", "text": "func (cfg *asCfg) KeyTypeToAlgo(keyType trc.KeyType) string {\n\tswitch keyType {\n\tcase trc.OnlineKey:\n\t\treturn cfg.ASCfg.Online\n\tcase trc.OfflineKey:\n\t\treturn cfg.ASCfg.Offline\n\tcase trc.IssuingKey:\n\t\treturn cfg.ASCfg.Issuing\n\t}\n\treturn \"none\"\n}", "title": "" }, { "docid": "83574bc02121c16ff3c3e5a8f5ce6356", "score": "0.508212", "text": "func GetListKeysAlgorithmEnumStringValues() []string {\n\treturn []string{\n\t\t\"AES\",\n\t\t\"RSA\",\n\t\t\"ECDSA\",\n\t}\n}", "title": "" }, { "docid": "1d2b646b5aac5a6fc2d0844582ce4777", "score": "0.50693434", "text": "func (c *TLSEcdheRsaWithAes128GcmSha256) ID() ID {\n\treturn TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\n}", "title": "" }, { "docid": "7d9b6a0405dc0cb2166b219c38293576", "score": "0.5062063", "text": "func getKey(code string) string {\n\tif code == \"PBUT\" {\n\t\treturn \"LEAD\"\n\t}\n\tif code == \"CRUT\" {\n\t\treturn \"CHROMIUM\"\n\t}\n\tif code == \"ASUT\" {\n\t\treturn \"ARSENIC\"\n\t}\n\n\tpanic(fmt.Sprintf(\"Unknown code %s\\n\", code))\n}", "title": "" } ]
433aefab9fb093b5d6e5e5b7e3207340
Close terminates the iteration process, releasing any pending underlying resources.
[ { "docid": "c8cb18782c219d8f49d2a34b59aed95b", "score": "0.0", "text": "func (it *MigrateSnapshotsFacetTestLogNamedStringIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" } ]
[ { "docid": "6c936ae39455257c7c29bf2df5204600", "score": "0.7355702", "text": "func (it *OptimismMintableERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "274b84e15be0a3cc434d4cfa81882097", "score": "0.73447627", "text": "func (it *FinalizableCrowdsaleImplFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "6da41879b7a75eb16cdb537c494b3fd1", "score": "0.7305579", "text": "func (it *IGOFSPinnedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "e8f552225a517573bc7a5aca191ae428", "score": "0.72924715", "text": "func (it *OptimismMintableERC20BurnIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "e8bb6b772d6bb47d7c03ec0c5093d80c", "score": "0.7291705", "text": "func (it *SampleCrowdsaleFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "a4d9e058f2e50d00d6ba2af47f28af68", "score": "0.72728795", "text": "func (it *CKPregnantIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "244ca71c73abececb2be76fb1fd9ebf5", "score": "0.72461575", "text": "func (i *iter) Close() error {\n\treturn i.close(nil)\n}", "title": "" }, { "docid": "af76f3cb13a7061a56e835ba3436c8da", "score": "0.7184913", "text": "func (it *OptimismMintableERC20MintIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "ba68ce493e240e66cba4519c30375a14", "score": "0.7165579", "text": "func (it *RefundableCrowdsaleImplFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "4ee0f9687849f83d53104518c601e233", "score": "0.7128719", "text": "func (it *SizzleCertEndorsedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "03ebcede8425d5d8ee26116dfa250ed8", "score": "0.71101916", "text": "func (it *ERC20PausableTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "03ebcede8425d5d8ee26116dfa250ed8", "score": "0.71101916", "text": "func (it *ERC20PausableTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "59361af8667f53a64c582afdb88225c0", "score": "0.70976645", "text": "func (it *ContractNSEC3DigestUpdatedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "e823da259ca0a4bae8953a8611f89cd7", "score": "0.7089749", "text": "func (it *StakingFinedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "61918bbb1a6df0156ca0dc729815cecf", "score": "0.70880824", "text": "func (it *FinalizableCrowdsaleImplOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "fff19c305a63f283e7f0f5e0ad8e59c3", "score": "0.708463", "text": "func (it *ContractDigestUpdatedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "0bd5169f441e91433be00742852c00a9", "score": "0.7073973", "text": "func (i *Iter) Close() error {\n\treturn i.iter.Close()\n}", "title": "" }, { "docid": "4c9c7f36e640900aedfb72cc8b0d2910", "score": "0.70474815", "text": "func (it *PLCRVotingContractVoteRevealedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "4ccc158839083f9ef4323f8fc6959ffe", "score": "0.70472157", "text": "func (it *PLCRVotingContractTokensRescuedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "03b89c84dd9353f1cb67ec9457523800", "score": "0.70461494", "text": "func (it *ERC20BurnableTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "03b89c84dd9353f1cb67ec9457523800", "score": "0.70461494", "text": "func (it *ERC20BurnableTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "d3f85391171fcddbbff08aee6465864a", "score": "0.7041186", "text": "func (it *BountyRegistryPauseIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "08702b4d9f976688d6488d4a4a1bd4e9", "score": "0.7039707", "text": "func (it *LinkContractForwardToIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "354348fd3eabbba674b9499bcb0ec92f", "score": "0.7039336", "text": "func (it *BountyRegistryUnpauseIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "13d1b67d43d868a3868f93b37e4ebb1a", "score": "0.7023768", "text": "func (iter *Iterator) Close() {\n\tC.rocksdb_iter_destroy(iter.c)\n\titer.c = nil\n}", "title": "" }, { "docid": "48ae8d61a44bc6e6b3a7d15c10e7e188", "score": "0.7018967", "text": "func (it *PausableOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "c7455bb467ae9a409631566ff77b13ae", "score": "0.7017126", "text": "func (it *BurnableTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "e87a9fe59c753149d0d5ece837fca5f7", "score": "0.7015892", "text": "func (it *ERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "e87a9fe59c753149d0d5ece837fca5f7", "score": "0.7015892", "text": "func (it *ERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "e87a9fe59c753149d0d5ece837fca5f7", "score": "0.7015892", "text": "func (it *ERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "e87a9fe59c753149d0d5ece837fca5f7", "score": "0.7015892", "text": "func (it *ERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "0545c1eac6a77e074bf841887a7c33da", "score": "0.7003904", "text": "func (it *SizzleCertRekeyedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "b3931a667a91654316ca5107dbc50281", "score": "0.70016783", "text": "func (it *ETHDKGShareDistributionIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "962f48d0c505700692ac85913ece997f", "score": "0.6996036", "text": "func (it *DforceSetOracleIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "ddd6256ceecea7428e9842d7f959d813", "score": "0.69918823", "text": "func (it *PausableUnpauseIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "737a51b431fe7be0abb3e6a62976dc93", "score": "0.6990751", "text": "func (it *L1ERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "00ff86b9c3e423348260f1e24078bfb5", "score": "0.6988697", "text": "func (it *TemporalLootOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "33c9e13ae3aebd9db3036744f5bf37bd", "score": "0.6988136", "text": "func (it *UniswapUSDC2PoolBurnIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "9732c2246829a799f8bc5aa2863a170a", "score": "0.69856596", "text": "func (it *PlasmaBlocksOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "7a3dfae936a0c195385260474010bc29", "score": "0.6985441", "text": "func (it *UniswapUSDC2PoolCollectIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "3da42b04866ebabf042f11207ec4195d", "score": "0.6985392", "text": "func (i *Iterator) Close() {\n\titeratorPool.Put(i)\n}", "title": "" }, { "docid": "100e5c92ae03c8b565abfbf65a0dd0ce", "score": "0.6982866", "text": "func (it *MigrateETHDKGTestLogIntIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "b3d0bbdeef354c2aec87f93cb53771e4", "score": "0.697877", "text": "func (it *MainOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "3e88d6ce716e4eea854eb0f4a23ae4e7", "score": "0.6975059", "text": "func (it *StakingLibraryFinedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "427d3082c6c1342b8f896a2f576c3f99", "score": "0.69667876", "text": "func (it *BindingsTokenBurnedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "d3f064b4a1f491a28cfe8271488d39eb", "score": "0.6963984", "text": "func (it *RewardsStakedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "743c30770da973278ad36cc834bf8359", "score": "0.6963126", "text": "func (it *DforcePausedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "70ba0c28fc2ce784502d02620599b0da", "score": "0.69625276", "text": "func (it *L2ERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "1c8cb1ebb588af39a19d47015277ade2", "score": "0.6960709", "text": "func (i *Iterator) Close() error {\n\treturn i.ErrClose\n}", "title": "" }, { "docid": "935fffeb81d85bd5df38b35e998111b6", "score": "0.6959359", "text": "func (it *ERC20PausablePausedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "935fffeb81d85bd5df38b35e998111b6", "score": "0.6959359", "text": "func (it *ERC20PausablePausedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "85aeaf32ce86b089e2061a24ce721444", "score": "0.6956997", "text": "func (m *multiSeriesBlockStepIter) Close() {\n}", "title": "" }, { "docid": "31e3c3025d2b16f34b12b05a4db11956", "score": "0.69469005", "text": "func (it *CUSDCRepayBorrowIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "76a40dc70746d9ebdd57639512a5b2d6", "score": "0.69442695", "text": "func (it *ArenaMatchGoldUnpauseIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "bf55e02c5c79ab2123f2292b9dcd1579", "score": "0.6943705", "text": "func (it *EnergyproductionEnerProductionEventIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "d9edc9ffd9b78432c0823360d4c34ee7", "score": "0.6943429", "text": "func (it *IBEP20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "fe4ee74e8c99fc545cb248d3335644df", "score": "0.69389164", "text": "func (it *PausablePauseIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "2102cd9f64bae6a4db4e015612f0d770", "score": "0.6933494", "text": "func (it *ERC20BasicTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "a3f6b04aa07e78a55f25c1926f82d073", "score": "0.69326866", "text": "func (it *ETHDKGEventsShareDistributionIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "2c6845315b78be48ae0bc557a9b12ad7", "score": "0.69283974", "text": "func (itr *integerSortedMergeIterator) Close() error {\n\tfor _, input := range itr.inputs {\n\t\tinput.Close()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7ec12999872288fd2e8bc07c64e23fc6", "score": "0.69281113", "text": "func (itr *unsignedLimitIterator) Close() error { return itr.input.Close() }", "title": "" }, { "docid": "cba21e29387643a185a372c4218a705a", "score": "0.69270414", "text": "func (it *MynftTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "61ca90bff4474afaf3d491d7c2172014", "score": "0.6926912", "text": "func (self *RoundRobin) Close() {\n\tself.mu.RLock()\n\tdefer self.mu.RUnlock()\n\tfor atomic.LoadInt64(&self.size) > 0 {\n\t\tfw := <-self.resources\n\t\tfw.resource.Close()\n\t\tatomic.AddInt64(&self.size, -1)\n\t}\n}", "title": "" }, { "docid": "b19483bfd612ee350b53c4ddda51ab85", "score": "0.69262844", "text": "func (it *BurnableBurnIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "83a4e158a0c7ea6633f08aa791b23178", "score": "0.69232774", "text": "func (it *DepositShareDistributionIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "9b65dccb0fba77b5e7cdd7dd2bc487e8", "score": "0.6922735", "text": "func (it *ContractRRSetUpdatedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "1216dc99847a9ba126b4be84f7ae1756", "score": "0.69197285", "text": "func (it *McdflapKickIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "958e6ca34d0420ecfed8635611b59d53", "score": "0.69187766", "text": "func (it *AbinftTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "71b49933d672edd275e8d0785c528c6c", "score": "0.69178957", "text": "func (it *PresalefactoryOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "41d2cdf2743811b8a47f0237739950f7", "score": "0.6916306", "text": "func (it *BountyRegistryNewBountyIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "838cbd0214673e4be5c1b9f11e2c016e", "score": "0.6911694", "text": "func (itr *unsignedSortedMergeIterator) Close() error {\n\tfor _, input := range itr.inputs {\n\t\tinput.Close()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "21d2c642d719f8dbe6ea9c04cfdd51f3", "score": "0.6910509", "text": "func (it *IERC20MetadataTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "16c38a19700fd50ecc125f30b9fab1fe", "score": "0.69096553", "text": "func (it *EcdsaSortitionPoolOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "2213581fb6edd019f446f8eb79cd1a6d", "score": "0.69096154", "text": "func (it *MigrateETHDKGTestLogIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "a9153332e2e60071f86d19db351b0d10", "score": "0.6909108", "text": "func (it *AtokenBurnOnLiquidationIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "ef191e7cef16dc913ef267189ab3d832", "score": "0.6908941", "text": "func (it *IERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "ef191e7cef16dc913ef267189ab3d832", "score": "0.6908941", "text": "func (it *IERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "ef191e7cef16dc913ef267189ab3d832", "score": "0.6908941", "text": "func (it *IERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "ef191e7cef16dc913ef267189ab3d832", "score": "0.6908941", "text": "func (it *IERC20TransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "93b6577bbc8e80d8117b982946e2941f", "score": "0.6907795", "text": "func (it *CUSDCMintIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "0581ccd769bc88bc6ed03cb5d7253b30", "score": "0.690675", "text": "func (it *MigrateETHDKGTestLogBytesIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "1cfedd0627935f43677ca54ca1184df4", "score": "0.69061214", "text": "func (itr *integerMergeIterator) Close() error {\n\titr.mu.Lock()\n\tdefer itr.mu.Unlock()\n\n\tfor _, input := range itr.inputs {\n\t\tinput.Close()\n\t}\n\titr.curr = nil\n\titr.inputs = nil\n\titr.heap.items = nil\n\titr.closed = true\n\treturn nil\n}", "title": "" }, { "docid": "4e7109ca7d2cf081f3ba3eb8b4ceda33", "score": "0.69019514", "text": "func (it *MigrateETHDKGTestLogNamedIntIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "81bd12507d68471ca7024b4fefaef068", "score": "0.690043", "text": "func (it *UniswapUSDC2PoolMintIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "8509e0e10a2a55c61bddb11a9556b1db", "score": "0.6900356", "text": "func (it *MigrateETHDKGTestLogStringIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "0f7326b8e7a2eedd6cd76c2b1bf4768c", "score": "0.6898205", "text": "func (it *BindingsUnlockedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "2782bd69f16e22698ca90165f71d3093", "score": "0.6895819", "text": "func (it *ERC20PausableUnpausedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "2782bd69f16e22698ca90165f71d3093", "score": "0.6895819", "text": "func (it *ERC20PausableUnpausedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "a312e2d1aff0e3f1a9abaaf869ba9821", "score": "0.68925583", "text": "func (it *SystemOwnerOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "20805d41c4ba4a8d8f646d3f458f7930", "score": "0.6889937", "text": "func (it *LinkContractGenerateLinkContractIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "6661c0614a12751d1c87805dc89decfe", "score": "0.688875", "text": "func (it *ContractUpdatedBaseRewardPerSecIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "e0af36c0878e9fbbceba4a12ddabaad3", "score": "0.6887814", "text": "func (it *ArenaMatchGoldBurnIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "12183c0d94fea3dcbacaed6d22ad00af", "score": "0.6886583", "text": "func (it *MainOwnershipRenouncedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "c4d99991bf0178fc0614f80e8ca8a874", "score": "0.68856865", "text": "func (it *DforceTransferOutIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "21e76c401f32e5e678facf77794f400f", "score": "0.6885587", "text": "func (it *ArenaMatchGoldPauseIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "9f0215ab701a68cde7cfd015ab516726", "score": "0.68852264", "text": "func (it *CUSDCRedeemIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "43c91d1451c182b25131e49ae41f8af3", "score": "0.68843055", "text": "func (it *AppRegistryOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "160928b1d7bdc9314f839ab4f7abb19b", "score": "0.6884181", "text": "func (it *BountyRegistryOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "7672fd728b13d32eee548ab1a2e35c37", "score": "0.68830585", "text": "func (it *MainChainlinkFulfilledIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "3a6a7d7900fc61e92ebbdbf74735dfed", "score": "0.6879694", "text": "func (it *DforceTransferInIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "5cde671fa3a10da790f49985e5b8f4df", "score": "0.6879569", "text": "func (it *TemporalLootTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" } ]
1b7ddc89352cc767f661fde471c68914
SetResponseType adds the responseType to the post authorize params
[ { "docid": "388c248c2e6e652910cf0a4ff3ccc49c", "score": "0.84924054", "text": "func (o *PostAuthorizeParams) SetResponseType(responseType string) {\n\to.ResponseType = responseType\n}", "title": "" } ]
[ { "docid": "738596fff8734720a1b75cd537432c2f", "score": "0.82005984", "text": "func (o *AuthorizeSubmitParams) SetResponseType(responseType string) {\n\to.ResponseType = responseType\n}", "title": "" }, { "docid": "f2057ccd2fab6b795e38720e1d54247d", "score": "0.7821334", "text": "func SetAllowedResponseType(types ...oauth2.ResponseType) {\n\tgServer.Config.AllowedResponseTypes = types\n}", "title": "" }, { "docid": "f5f50a346fed69a59bd38febc742ee7a", "score": "0.7571752", "text": "func (m *OpenIdConnectIdentityProvider) SetResponseType(value *OpenIdConnectResponseTypes)() {\n err := m.GetBackingStore().Set(\"responseType\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "a9e4772e5128d5c9fbbea73cbf91672d", "score": "0.7451698", "text": "func (s *NotarizationAPP) SetResponseType(rw web.ResponseWriter, req *web.Request, next web.NextMiddlewareFunc) {\n\trw.Header().Set(\"Content-Type\", \"application/json\")\n\n\t// Enable CORS\n\trw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\trw.Header().Set(\"Access-Control-Allow-Headers\", \"accept, content-type\")\n\n\tnext(rw, req)\n}", "title": "" }, { "docid": "67edb84601ed08899a6b94924d408497", "score": "0.74474335", "text": "func (o *PostAuthorizeParams) WithResponseType(responseType string) *PostAuthorizeParams {\n\to.SetResponseType(responseType)\n\treturn o\n}", "title": "" }, { "docid": "89edb1a6cac1e024415d25e36b91bc62", "score": "0.72889286", "text": "func (s *AppREST) SetResponseType(rw web.ResponseWriter, req *web.Request, next web.NextMiddlewareFunc) {\n\trw.Header().Set(\"Content-Type\", \"application/json\")\n\n\t// Enable CORS\n\trw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\trw.Header().Set(\"Access-Control-Allow-Headers\", \"accept, content-type\")\n\n\tnext(rw, req)\n}", "title": "" }, { "docid": "4c1a275d0e5cc631f5cdfdea468cc75a", "score": "0.6914973", "text": "func (o *AuthorizeSubmitParams) WithResponseType(responseType string) *AuthorizeSubmitParams {\n\to.SetResponseType(responseType)\n\treturn o\n}", "title": "" }, { "docid": "ae04838e40b44ebf0db83c0debe35974", "score": "0.5833916", "text": "func newResponseType() *responseType {\n\tr := &responseType{\n\t\tObject: js.Global.Get(\"Object\").New(),\n\t}\n\t// Deserialization is done elsewhere\n\tr.deserializeFunc = func(in []byte) []byte { return in }\n\n\treturn r\n}", "title": "" }, { "docid": "47f4393cc4626b8935e9c4db8a02658c", "score": "0.56035435", "text": "func (arc *AuthRequestCreate) SetResponseTypes(s []string) *AuthRequestCreate {\n\tarc.mutation.SetResponseTypes(s)\n\treturn arc\n}", "title": "" }, { "docid": "179d4075690e6db023a7e3c5d4850c59", "score": "0.54242986", "text": "func (m *Application) SetOauth2RequirePostResponse(value *bool)() {\n err := m.GetBackingStore().Set(\"oauth2RequirePostResponse\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "a0fffbcb8c029c50d15112b049202223", "score": "0.5358856", "text": "func (c *GetChannelInfoCommand) GetResponseType() interface{} {\n\treturn &GetChannelInfoResponse{}\n}", "title": "" }, { "docid": "4c514ac29500fd7006fdb8f4c3be4426", "score": "0.533961", "text": "func (o ServiceApiMethodOutput) ResponseType() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ServiceApiMethod) *string { return v.ResponseType }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d93bf0fd9f7fc4afb63e3154caa92b85", "score": "0.53261876", "text": "func SanitizeIncomingResponseType(responseType ResponseType) (ResponseType, error) {\n\tif _, registered := ResponseTypes[responseType]; !registered {\n\t\treturn responseType, fmt.Errorf(\"unknown response type '%s'\", responseType)\n\t}\n\tif responseType == ResponseTypeToken {\n\t\treturn responseType, errors.New(\"only authorization codes and id tokens may be generated\")\n\t}\n\treturn responseType, nil\n}", "title": "" }, { "docid": "e951fce328b7489568faa4d678fd3746", "score": "0.53117085", "text": "func (appContext *Context) SetResponseContentType(contentType string) {\n\tappContext.responseContentType = contentType\n}", "title": "" }, { "docid": "6d45f27665fea08ab4d62928f8ed87c1", "score": "0.52432054", "text": "func (m *OpenIdConnectIdentityProvider) GetResponseType()(*OpenIdConnectResponseTypes) {\n val, err := m.GetBackingStore().Get(\"responseType\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*OpenIdConnectResponseTypes)\n }\n return nil\n}", "title": "" }, { "docid": "0ad3fc69178ba23de3def9ef39bb33ab", "score": "0.5192158", "text": "func (o *PostAuthorizeParams) SetResponseMode(responseMode *string) {\n\to.ResponseMode = responseMode\n}", "title": "" }, { "docid": "cf4c2f3605c1ae111fb3619e101db05a", "score": "0.5065583", "text": "func (h *ConsoleHandler) SetOutputType(outputType ConsoleOutputType) {\n\th.mutex.Lock()\n\tdefer h.mutex.Unlock()\n\th.outputType = outputType\n}", "title": "" }, { "docid": "ff0e9f777ad4efc3533975c438bfdc25", "score": "0.5059958", "text": "func (a OauthApi) CreateOauthAuthorization(clientId string, responseType string, scope string, redirectUri string) (*APIResponse, error) {\n\n\tvar localVarHttpMethod = strings.ToUpper(\"Get\")\n\t// create path and map variables\n\tlocalVarPath := a.Configuration.BasePath + \"/oauth/authorization\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := make(map[string]string)\n\tvar localVarPostBody interface{}\n\tvar localVarFileName string\n\tvar localVarFileBytes []byte\n\t// authentication '(apiKey)' required\n\t// set key with prefix in header\n\tlocalVarHeaderParams[\"Authorization\"] = a.Configuration.GetAPIKeyWithPrefix(\"Authorization\")\n\t// add default headers if any\n\tfor key := range a.Configuration.DefaultHeader {\n\t\tlocalVarHeaderParams[key] = a.Configuration.DefaultHeader[key]\n\t}\n\tlocalVarQueryParams.Add(\"client_id\", a.Configuration.APIClient.ParameterToString(clientId, \"\"))\n\tlocalVarQueryParams.Add(\"response_type\", a.Configuration.APIClient.ParameterToString(responseType, \"\"))\n\tlocalVarQueryParams.Add(\"scope\", a.Configuration.APIClient.ParameterToString(scope, \"\"))\n\tlocalVarQueryParams.Add(\"redirect_uri\", a.Configuration.APIClient.ParameterToString(redirectUri, \"\"))\n\n\tclearEmptyParams(localVarQueryParams)\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ \"application/json\", }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := a.Configuration.APIClient.SelectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/json\",\n\t\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := a.Configuration.APIClient.SelectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tlocalVarHttpResponse, err := a.Configuration.APIClient.CallAPI(localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\n\tvar localVarURL, _ = url.Parse(localVarPath)\n\tlocalVarURL.RawQuery = localVarQueryParams.Encode()\n\tvar localVarAPIResponse = &APIResponse{Operation: \"CreateOauthAuthorization\", Method: localVarHttpMethod, RequestURL: localVarURL.String()}\n\tif localVarHttpResponse != nil {\n\t\tlocalVarAPIResponse.Response = localVarHttpResponse.RawResponse\n\t\tlocalVarAPIResponse.Payload = localVarHttpResponse.Body()\n\t}\n\n\tif err != nil {\n\t\treturn localVarAPIResponse, err\n\t}\n\treturn localVarAPIResponse, err\n}", "title": "" }, { "docid": "cd94ba0f2af8506403329c0421e435df", "score": "0.5040323", "text": "func (a *ApiApiService) OauthAuthorizePost(ctx _context.Context, authorizeRequest AuthorizeRequest) (AuthorizeResponse, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue AuthorizeResponse\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/oauth/authorize\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &authorizeRequest\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "5ec7bd806f60595ed7f08adcf90d91b7", "score": "0.502128", "text": "func (self *Template) SetType(w http.ResponseWriter, typ string) {\n\tw.Header().Set(\"Content Type\", typ)\n}", "title": "" }, { "docid": "aed06f32c06c39b7ea8f8068edfba1b4", "score": "0.5015563", "text": "func (c *GetChannelListCommand) GetResponseType() interface{} {\n\treturn make([]*ChannelListEntry, 0)\n}", "title": "" }, { "docid": "eecb0d13f2a2f5f00a83d3c47f91d6a3", "score": "0.4970741", "text": "func (responseType *ResponseType) UnmarshalString(str string) error {\n\tstr = strings.ToLower(str)\n\n\tif str == \"shelter\" {\n\t\t*responseType = ResponseTypeShelter\n\t} else if str == \"evacuate\" {\n\t\t*responseType = ResponseTypeEvacuate\n\t} else if str == \"prepare\" {\n\t\t*responseType = ResponseTypePrepare\n\t} else if str == \"execute\" {\n\t\t*responseType = ResponseTypeExecute\n\t} else if str == \"avoid\" {\n\t\t*responseType = ResponseTypeAvoid\n\t} else if str == \"monitor\" {\n\t\t*responseType = ResponseTypeMonitor\n\t} else if str == \"assess\" {\n\t\t*responseType = ResponseTypeAssess\n\t} else if str == \"allclear\" || str == \"all clear\" {\n\t\t*responseType = ResponseTypeAllClear\n\t} else if str == \"none\" {\n\t\t*responseType = ResponseTypeNone\n\t} else {\n\t\treturn errors.New(\"Unknown ResponseType value: \" + str)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cf87345924c2a51c32d3e64617a05190", "score": "0.49696317", "text": "func CreateConvertPayTypeResponse() (response *ConvertPayTypeResponse) {\n\tresponse = &ConvertPayTypeResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "title": "" }, { "docid": "1e6728413d57b6c5c2c0d7e1152a2617", "score": "0.4965558", "text": "func (o *AuthorizeSubmitOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(200)\n}", "title": "" }, { "docid": "eac69ff249578ba186cb7dea0ab5f686", "score": "0.49345496", "text": "func OptionsResponse(\n\tw http.ResponseWriter,\n\tacceptedMethods []string,\n\tcontentType string,\n) {\n\tw.Header().Set(\"Allow\", strings.Join(acceptedMethods, \", \"))\n\tw.Header().Set(\"Accept\", contentType)\n\tw.Header().Set(\"Accept-Encoding\", \"gzip\")\n\tw.WriteHeader(http.StatusOK)\n\n\tfmt.Fprint(w, http.StatusText(http.StatusOK))\n}", "title": "" }, { "docid": "012c98a15d65932c25be68569e4292f5", "score": "0.48988006", "text": "func (o *PostAuthorizeParams) WithResponseMode(responseMode *string) *PostAuthorizeParams {\n\to.SetResponseMode(responseMode)\n\treturn o\n}", "title": "" }, { "docid": "0eb39800e86548529845b523763481ce", "score": "0.48795697", "text": "func setContentType(rw http.ResponseWriter, accept string) {\n\tswitch accept {\n\tcase \"application/xml\":\n\t\trw.Header().Set(\"Content-Type\", \"application/xml; charset=utf-8\")\n\t\treturn\n\tdefault:\n\t\trw.Header().Set(\"Content-Type\", \"application/json; charset=utf-8\")\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "36b8b6f9b528dc1f81ea31fe5db80633", "score": "0.4841716", "text": "func responseWithType(w io.Writer, typ Type) {\n\tif err := util.WriteTLV(w, util.TLV{T: uint64(typ)}); err != nil {\n\t\tlog.Printf(\"[server]: write type[%#x] failed with %v\\n\", typ, err)\n\t}\n}", "title": "" }, { "docid": "8a5db6d15aaf5d16a8ec94d395103873", "score": "0.48246443", "text": "func (o *CreateAccountAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(202)\n}", "title": "" }, { "docid": "0bc057242a6f979ba26a44ab5f809a65", "score": "0.479997", "text": "func (o *CreateAuthorizationV1SubjectAccessReviewUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(401)\n}", "title": "" }, { "docid": "82c393f24643896cbb21283e46e9d4ba", "score": "0.47865292", "text": "func SetAllowedGrantType(types ...oauth2.GrantType) {\n\tgServer.Config.AllowedGrantTypes = types\n}", "title": "" }, { "docid": "b0fe7ecfecea35e0e1b00b53e89212d1", "score": "0.4782479", "text": "func (o GoogleIamAdminV1WorkforcePoolProviderOidcWebSsoConfigResponseOutput) ResponseType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GoogleIamAdminV1WorkforcePoolProviderOidcWebSsoConfigResponse) string { return v.ResponseType }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "a44a0f4d2bb53cd1a2d1ee14e64d74e4", "score": "0.4770313", "text": "func (responseType *ResponseType) UnmarshalJSON(b []byte) error {\n\tvar str string\n\tif err := json.Unmarshal(b, &str); err != nil {\n\t\treturn err\n\t}\n\treturn responseType.UnmarshalString(str)\n}", "title": "" }, { "docid": "c4e6128331fdb1a0d27a77f03fbb0584", "score": "0.47491816", "text": "func (responseType *ResponseType) MarshalJSON() ([]byte, error) {\n\treturn json.Marshal(responseType.String())\n}", "title": "" }, { "docid": "874a46bef67f3633744bbc1ec790e643", "score": "0.47438297", "text": "func (o *GetTypeBadRequest) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(400)\n}", "title": "" }, { "docid": "5f24c8edec82ed6aa38c30117ff6e7cf", "score": "0.47200528", "text": "func CreateCreateBizTypeResponse() (response *CreateBizTypeResponse) {\n\tresponse = &CreateBizTypeResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "title": "" }, { "docid": "12b31a94a7f1b3e56e532716d6d322fa", "score": "0.46581656", "text": "func (c *ChunkResponse) Type() Type {\n\treturn ChunkResponseType\n}", "title": "" }, { "docid": "6027287f835ab1cd3a71173c66a0eb39", "score": "0.46221045", "text": "func (o *CreateAuthorizationV1SubjectAccessReviewAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(202)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "50776f6998af9c7e7de3d5e821893a82", "score": "0.4605427", "text": "func (s *Server) Authorize(param AuthorizeParam) (url string, err error) {\n\tif param.ResponseType != \"token\" {\n\t\treturn \"\", ErrNotImplemented(\"support only response_type=token\")\n\t}\n\tr := AuthorizeResponse{\n\t\tState: param.State,\n\t\tAccessToken: \"qwertyuiop\",\n\t\tTokenType: \"Bearer\",\n\t\tExpiresIn: 3600,\n\t}\n\turl = param.RedirectURI + \"#\" + r.AsFragment()\n\treturn\n}", "title": "" }, { "docid": "226eb133244b1b1446db74b6a020c1bc", "score": "0.459894", "text": "func (o *GetProviderTypeByIDBadRequest) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(400)\n}", "title": "" }, { "docid": "dfdce23471cd2dd534c15f696e9b2302", "score": "0.45816436", "text": "func (c InternalClient) GetResponseTypes() fosite.Arguments {\n\tif len(c.ResponseTypes) == 0 {\n\t\treturn fosite.Arguments{\"code\"}\n\t}\n\n\treturn c.ResponseTypes\n}", "title": "" }, { "docid": "71f5f3a45ab15c51d6c00affa3ce2924", "score": "0.45654353", "text": "func (o SecurityPolicyRuleRedirectOptionsResponseOutput) Type() pulumi.StringOutput {\n\treturn o.ApplyT(func(v SecurityPolicyRuleRedirectOptionsResponse) string { return v.Type }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b9051b01354926fbc415b12b6a0711bd", "score": "0.45326188", "text": "func (w *Writer) SetType(mediaType string) error {\n\tif _, _, err := mime.ParseMediaType(mediaType); err != nil {\n\t\treturn err\n\t}\n\tw.mediaType = mediaType\n\n\treturn nil\n}", "title": "" }, { "docid": "a3122f84f71e0011a30f791f133309af", "score": "0.45243782", "text": "func (o RunbookParameterResponseOutput) Type() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RunbookParameterResponse) *string { return v.Type }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "527af3bc5dbae47c66c338a74638af23", "score": "0.45095325", "text": "func (o *OperationDefinition) GetResponseTypeDefinitions() ([]ResponseTypeDefinition, error) {\n\tvar tds []ResponseTypeDefinition\n\n\tresponses := o.Spec.Responses\n\tsortedResponsesKeys := SortedResponsesKeys(responses)\n\tfor _, responseName := range sortedResponsesKeys {\n\t\tresponseRef := responses[responseName]\n\n\t\t// We can only generate a type if we have a value:\n\t\tif responseRef.Value != nil {\n\t\t\tjsonCount := 0\n\t\t\tfor mediaType := range responseRef.Value.Content {\n\t\t\t\tif util.IsMediaTypeJson(mediaType) {\n\t\t\t\t\tjsonCount++\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tsortedContentKeys := SortedContentKeys(responseRef.Value.Content)\n\t\t\tfor _, contentTypeName := range sortedContentKeys {\n\t\t\t\tcontentType := responseRef.Value.Content[contentTypeName]\n\t\t\t\t// We can only generate a type if we have a schema:\n\t\t\t\tif contentType.Schema != nil {\n\t\t\t\t\tresponseSchema, err := GenerateGoSchema(contentType.Schema, []string{responseName})\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn nil, fmt.Errorf(\"Unable to determine Go type for %s.%s: %w\", o.OperationId, contentTypeName, err)\n\t\t\t\t\t}\n\n\t\t\t\t\tvar typeName string\n\t\t\t\t\tswitch {\n\n\t\t\t\t\t// HAL+JSON:\n\t\t\t\t\tcase StringInArray(contentTypeName, contentTypesHalJSON):\n\t\t\t\t\t\ttypeName = fmt.Sprintf(\"HALJSON%s\", ToCamelCase(responseName))\n\t\t\t\t\tcase \"application/json\" == contentTypeName:\n\t\t\t\t\t\t// if it's the standard application/json\n\t\t\t\t\t\ttypeName = fmt.Sprintf(\"JSON%s\", ToCamelCase(responseName))\n\t\t\t\t\t// Vendored JSON\n\t\t\t\t\tcase StringInArray(contentTypeName, contentTypesJSON) || util.IsMediaTypeJson(contentTypeName):\n\t\t\t\t\t\tbaseTypeName := fmt.Sprintf(\"%s%s\", ToCamelCase(contentTypeName), ToCamelCase(responseName))\n\n\t\t\t\t\t\ttypeName = strings.ReplaceAll(baseTypeName, \"Json\", \"JSON\")\n\t\t\t\t\t// YAML:\n\t\t\t\t\tcase StringInArray(contentTypeName, contentTypesYAML):\n\t\t\t\t\t\ttypeName = fmt.Sprintf(\"YAML%s\", ToCamelCase(responseName))\n\t\t\t\t\t// XML:\n\t\t\t\t\tcase StringInArray(contentTypeName, contentTypesXML):\n\t\t\t\t\t\ttypeName = fmt.Sprintf(\"XML%s\", ToCamelCase(responseName))\n\t\t\t\t\tdefault:\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\n\t\t\t\t\ttd := ResponseTypeDefinition{\n\t\t\t\t\t\tTypeDefinition: TypeDefinition{\n\t\t\t\t\t\t\tTypeName: typeName,\n\t\t\t\t\t\t\tSchema: responseSchema,\n\t\t\t\t\t\t},\n\t\t\t\t\t\tResponseName: responseName,\n\t\t\t\t\t\tContentTypeName: contentTypeName,\n\t\t\t\t\t}\n\t\t\t\t\tif IsGoTypeReference(responseRef.Ref) {\n\t\t\t\t\t\trefType, err := RefPathToGoType(responseRef.Ref)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn nil, fmt.Errorf(\"error dereferencing response Ref: %w\", err)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif jsonCount > 1 && util.IsMediaTypeJson(contentTypeName) {\n\t\t\t\t\t\t\trefType += mediaTypeToCamelCase(contentTypeName)\n\t\t\t\t\t\t}\n\t\t\t\t\t\ttd.Schema.RefType = refType\n\t\t\t\t\t}\n\t\t\t\t\ttds = append(tds, td)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn tds, nil\n}", "title": "" }, { "docid": "019f782e7cc5108eb0333d33f6264ea1", "score": "0.44622555", "text": "func SetResponse(resp ResponseInterface) {\n\tdefaultResponse = resp\n}", "title": "" }, { "docid": "110ae37618feafcc46daefcfc90a8252", "score": "0.4445038", "text": "func (t *DynamicServiceType) ResponseType() MessageType {\n\treturn t.resType\n}", "title": "" }, { "docid": "7bf00008f1abe021cc47c0e741b98696", "score": "0.44407147", "text": "func (client Client) SetACLResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "title": "" }, { "docid": "c3f231693742e6fbb8e3554fe1ed901b", "score": "0.44401303", "text": "func setResponse(ctx *gin.Context) {\n\tresponseBody, status := prepareResponse(ctx)\n\t_, ok := responseBody.(map[string]interface{})\n\tct := ctx.Request.Header.Get(\"accept\")\n\tif (ct == \"text/xml\" || ct == \"application/xml\") && !ok {\n\t\tctx.XML(status, responseBody)\n\t\treturn\n\t}\n\tctx.JSON(status, responseBody)\n}", "title": "" }, { "docid": "e2f189803194623bd8d8cc08eab9b776", "score": "0.44397226", "text": "func (c *SimpleClaim) SetTokenType(tokenType string) *SimpleClaim {\n\tif c.content == nil {\n\t\tc.content = make(map[string]interface{})\n\t}\n\tc.content[\"typ\"] = tokenType\n\treturn c\n}", "title": "" }, { "docid": "a1c57a7a97614145f42cd3442c98fc4c", "score": "0.4438268", "text": "func (_obj *Apiaccount) Account_acceptAuthorization(params *TLaccount_acceptAuthorization, _opt ...map[string]string) (ret Bool, err error) {\n\n\tvar length int32\n\tvar have bool\n\tvar ty byte\n\t_os := codec.NewBuffer()\n\terr = params.WriteBlock(_os, 1)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tvar _status map[string]string\n\tvar _context map[string]string\n\tif len(_opt) == 1 {\n\t\t_context = _opt[0]\n\t} else if len(_opt) == 2 {\n\t\t_context = _opt[0]\n\t\t_status = _opt[1]\n\t}\n\t_resp := new(requestf.ResponsePacket)\n\ttarsCtx := context.Background()\n\n\terr = _obj.s.Tars_invoke(tarsCtx, 0, \"account_acceptAuthorization\", _os.ToBytes(), _status, _context, _resp)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\t_is := codec.NewReader(tools.Int8ToByte(_resp.SBuffer))\n\terr = ret.ReadBlock(_is, 0, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tif len(_opt) == 1 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t} else if len(_opt) == 2 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t\tfor k := range _status {\n\t\t\tdelete(_status, k)\n\t\t}\n\t\tfor k, v := range _resp.Status {\n\t\t\t_status[k] = v\n\t\t}\n\n\t}\n\t_ = length\n\t_ = have\n\t_ = ty\n\treturn ret, nil\n}", "title": "" }, { "docid": "4fc32588b2e17ca264e6a0ac832a9634", "score": "0.44360682", "text": "func (c *CreateBearerResponse) MessageTypeName() string {\n\treturn \"Create Bearer Response\"\n}", "title": "" }, { "docid": "af0de7e909bad2f76ecceb8f81918728", "score": "0.4432837", "text": "func (ps *PointServer) setResponseHeader(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "0d4bc42e553d5b5bb126b184ac6e025e", "score": "0.44302616", "text": "func CreateSubmitFlowResponse() (response *SubmitFlowResponse) {\n\tresponse = &SubmitFlowResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "title": "" }, { "docid": "300d1bfbdfef2975bfa30d2b5a07e124", "score": "0.4426389", "text": "func (_options *GetPolicyOptions) SetSecretType(secretType string) *GetPolicyOptions {\n\t_options.SecretType = core.StringPtr(secretType)\n\treturn _options\n}", "title": "" }, { "docid": "b1dc96f8493b34eacadaee0ada8e2ced", "score": "0.44258174", "text": "func (o ResourceCommitmentResponseOutput) Type() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ResourceCommitmentResponse) string { return v.Type }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "4a845d2d9e1b8aa6c7d7eedd2d90e53d", "score": "0.44166693", "text": "func SetContentType(w http.ResponseWriter, ct string) {\n\th := w.Header().Get(\"Content-Type\")\n\tif h == \"\" {\n\t\tw.Header().Set(\"Content-Type\", ct)\n\t\treturn\n\t}\n\t// RFC6839 only defines suffixes for a few mime types, we only concern\n\t// ourselves with JSON and XML.\n\tif ct != \"application/json\" && ct != \"application/xml\" {\n\t\tw.Header().Set(\"Content-Type\", ct)\n\t\treturn\n\t}\n\tif strings.Contains(h, \"+\") {\n\t\treturn\n\t}\n\tsuffix := \"+json\"\n\tif ct == \"application/xml\" {\n\t\tsuffix = \"+xml\"\n\t}\n\tw.Header().Set(\"Content-Type\", h+suffix)\n}", "title": "" }, { "docid": "449a55a476857e43ba00b3322a2597d8", "score": "0.4415966", "text": "func (o *ReplaceAdmissionregistrationV1beta1ValidatingWebhookConfigurationUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(401)\n}", "title": "" }, { "docid": "928bcb316074e09feface6e870549821", "score": "0.4411744", "text": "func (m Message) SecurityResponseType() (*field.SecurityResponseTypeField, quickfix.MessageRejectError) {\n\tf := &field.SecurityResponseTypeField{}\n\terr := m.Body.Get(f)\n\treturn f, err\n}", "title": "" }, { "docid": "175504970318575f2f08667d4ba29ba1", "score": "0.4411497", "text": "func (resp *AlexaResponse) EndResponse() {\n\tclear(resp)\n\tresp.Version = \"1.0\"\n\tresp.Response.ShouldEndSession = Wrong\n\tvar dtype string\n\tdtype = \"Dialog.Delegate\"\n\td := DialogDirective{\n\t\tType: dtype,\n\t}\n\tresp.Response.Directives = append(resp.Response.Directives, d)\n}", "title": "" }, { "docid": "49bd2fa546a2dcfcd2396695c0bd4bea", "score": "0.44040057", "text": "func encodePostReviewResponse(ctx context.Context, w http1.ResponseWriter, response interface{}) (err error) {\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=utf-8\")\n\terr = json.NewEncoder(w).Encode(response)\n\treturn\n}", "title": "" }, { "docid": "883d147932d537a2e045732c26a9d8cd", "score": "0.43945277", "text": "func (appContext *Context) ResponseContentType() string {\n\treturn appContext.responseContentType\n}", "title": "" }, { "docid": "2108bf9f13abfbfd8e01c44c26552afa", "score": "0.4392094", "text": "func (o GoogleIamAdminV1WorkforcePoolProviderOidcWebSsoConfigOutput) ResponseType() GoogleIamAdminV1WorkforcePoolProviderOidcWebSsoConfigResponseTypeOutput {\n\treturn o.ApplyT(func(v GoogleIamAdminV1WorkforcePoolProviderOidcWebSsoConfig) GoogleIamAdminV1WorkforcePoolProviderOidcWebSsoConfigResponseType {\n\t\treturn v.ResponseType\n\t}).(GoogleIamAdminV1WorkforcePoolProviderOidcWebSsoConfigResponseTypeOutput)\n}", "title": "" }, { "docid": "b0caf008cbe2667d25fdcb609e72fd72", "score": "0.43913338", "text": "func (c *clientCredentialsClient) ResponseTypes() []oidc.ResponseType {\n\treturn nil\n}", "title": "" }, { "docid": "afe59759298de8e2a25c4993eb462e69", "score": "0.4389323", "text": "func NewTokenResponse(tokenType, accessToken string, expiresIn int) *TokenResponse {\n\treturn &TokenResponse{\n\t\tTokenType: tokenType,\n\t\tAccessToken: accessToken,\n\t\tExpiresIn: expiresIn,\n\t}\n}", "title": "" }, { "docid": "556976862922f6764998479aa5328b85", "score": "0.43827453", "text": "func (o *SchemaObjectsCreateUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(401)\n}", "title": "" }, { "docid": "697877918bd0516a9c5e090908f9968b", "score": "0.43778855", "text": "func (o *WeaviateKeyCreateUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(401)\n}", "title": "" }, { "docid": "d5136e34b6a9316b23db753a4144de51", "score": "0.4372715", "text": "func (o *PostRevisionUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(401)\n}", "title": "" }, { "docid": "ecd063be61591cd82e0ca5535aac1195", "score": "0.43708757", "text": "func setJsonContentType(writer http.ResponseWriter) {\n\twriter.Header().Set(contentTypeHeaderKey, contentTypeHeaderValue)\n}", "title": "" }, { "docid": "bee7b813266ebf185a0860a70c26bc93", "score": "0.43698677", "text": "func (h *handler) authorize(req *restful.Request, response *restful.Response) {\n\tvar scope, responseType, clientID, redirectURI, state, nonce string\n\tscope = req.QueryParameter(\"scope\")\n\tclientID = req.QueryParameter(\"client_id\")\n\tredirectURI = req.QueryParameter(\"redirect_uri\")\n\t//prompt = req.QueryParameter(\"prompt\")\n\tresponseType = req.QueryParameter(\"response_type\")\n\tstate = req.QueryParameter(\"state\")\n\tnonce = req.QueryParameter(\"nonce\")\n\n\t// Authorization Servers MUST support the use of the HTTP GET and POST methods\n\t// defined in RFC 2616 [RFC2616] at the Authorization Endpoint.\n\tif req.Request.Method == http.MethodPost {\n\t\tscope, _ = req.BodyParameter(\"scope\")\n\t\tclientID, _ = req.BodyParameter(\"client_id\")\n\t\tredirectURI, _ = req.BodyParameter(\"redirect_uri\")\n\t\tresponseType, _ = req.BodyParameter(\"response_type\")\n\t\tstate, _ = req.BodyParameter(\"state\")\n\t\tnonce, _ = req.BodyParameter(\"nonce\")\n\t}\n\n\toauthClient, err := h.options.OAuthOptions.OAuthClient(clientID)\n\tif err != nil {\n\t\tresponse.WriteHeaderAndEntity(http.StatusBadRequest, oauth.NewInvalidClient(err))\n\t\treturn\n\t}\n\n\tredirectURL, err := oauthClient.ResolveRedirectURL(redirectURI)\n\tif err != nil {\n\t\tresponse.WriteHeaderAndEntity(http.StatusBadRequest, oauth.NewInvalidRequest(err))\n\t\treturn\n\t}\n\n\tauthenticated, _ := request.UserFrom(req.Request.Context())\n\tif authenticated == nil || authenticated.GetName() == user.Anonymous {\n\t\tresponse.Header().Add(\"WWW-Authenticate\", \"Basic\")\n\t\tresponse.WriteHeaderAndEntity(http.StatusUnauthorized, oauth.ErrorLoginRequired)\n\t\treturn\n\t}\n\n\t// If no openid scope value is present, the request may still be a valid OAuth 2.0 request,\n\t// but is not an OpenID Connect request.\n\tvar scopes []string\n\tif scope != \"\" {\n\t\tscopes = strings.Split(scope, \" \")\n\t}\n\tvar responseTypes []string\n\tif responseType != \"\" {\n\t\tresponseTypes = strings.Split(responseType, \" \")\n\t}\n\n\t// If the resource owner denies the access request or if the request\n\t// fails for reasons other than a missing or invalid redirection URI,\n\t// the authorization server informs the client by adding the following\n\t// parameters to the query component of the redirection URI using the\n\t// \"application/x-www-form-urlencoded\" format\n\tinformsError := func(err oauth.Error) {\n\t\tvalues := make(url.Values, 0)\n\t\tvalues.Add(\"error\", err.Type)\n\t\tif err.Description != \"\" {\n\t\t\tvalues.Add(\"error_description\", err.Description)\n\t\t}\n\t\tif state != \"\" {\n\t\t\tvalues.Add(\"state\", state)\n\t\t}\n\t\tredirectURL.RawQuery = values.Encode()\n\t\thttp.Redirect(response.ResponseWriter, req.Request, redirectURL.String(), http.StatusFound)\n\t}\n\n\t// Other scope values MAY be present.\n\t// Scope values used that are not understood by an implementation SHOULD be ignored.\n\tif !oauth.IsValidScopes(scopes) {\n\t\tklog.Warningf(\"Some requested scopes were invalid: %v\", scopes)\n\t}\n\n\tif !oauth.IsValidResponseTypes(responseTypes) {\n\t\terr := fmt.Errorf(\"Some requested response types were invalid\")\n\t\tinformsError(oauth.NewInvalidRequest(err))\n\t\treturn\n\t}\n\n\t// TODO(hongming) support Hybrid Flow\n\t// Authorization Code Flow\n\tif responseType == oauth.ResponseCode {\n\t\tcode, err := h.tokenOperator.IssueTo(&token.IssueRequest{\n\t\t\tUser: authenticated,\n\t\t\tClaims: token.Claims{\n\t\t\t\tRegisteredClaims: jwt.RegisteredClaims{\n\t\t\t\t\tAudience: []string{clientID},\n\t\t\t\t},\n\t\t\t\tTokenType: token.AuthorizationCode,\n\t\t\t\tNonce: nonce,\n\t\t\t\tScopes: scopes,\n\t\t\t},\n\t\t\t// A maximum authorization code lifetime of 10 minutes is\n\t\t\tExpiresIn: 10 * time.Minute,\n\t\t})\n\t\tif err != nil {\n\t\t\tresponse.WriteHeaderAndEntity(http.StatusInternalServerError, oauth.NewServerError(err))\n\t\t\treturn\n\t\t}\n\t\tvalues := redirectURL.Query()\n\t\tvalues.Add(\"code\", code)\n\t\tredirectURL.RawQuery = values.Encode()\n\t\thttp.Redirect(response, req.Request, redirectURL.String(), http.StatusFound)\n\t}\n\n\t// Implicit Flow\n\tif responseType != oauth.ResponseToken {\n\t\tinformsError(oauth.ErrorUnsupportedResponseType)\n\t\treturn\n\t}\n\n\tresult, err := h.issueTokenTo(authenticated)\n\tif err != nil {\n\t\tresponse.WriteHeaderAndEntity(http.StatusInternalServerError, oauth.NewServerError(err))\n\t\treturn\n\t}\n\n\tvalues := make(url.Values, 0)\n\tvalues.Add(\"access_token\", result.AccessToken)\n\tvalues.Add(\"refresh_token\", result.RefreshToken)\n\tvalues.Add(\"token_type\", result.TokenType)\n\tvalues.Add(\"expires_in\", fmt.Sprint(result.ExpiresIn))\n\tredirectURL.Fragment = values.Encode()\n\thttp.Redirect(response, req.Request, redirectURL.String(), http.StatusFound)\n}", "title": "" }, { "docid": "99876c76d2044cbc0f5a8d8c4e2e9de8", "score": "0.43598258", "text": "func (r ResponseContentDefinition) TypeDef(opID string, statusCode int) *TypeDefinition {\n\treturn &TypeDefinition{\n\t\tTypeName: fmt.Sprintf(\"%s%v%sResponse\", opID, statusCode, r.NameTagOrContentType()),\n\t\tSchema: r.Schema,\n\t}\n}", "title": "" }, { "docid": "353eaca2c3778c670f082d0becb6b543", "score": "0.4358011", "text": "func tokenType(token oauth2.TokenResponse) string {\n\tif strings.EqualFold(token.TokenType, \"bearer\") {\n\t\treturn \"Bearer\"\n\t}\n\tif strings.EqualFold(token.TokenType, \"mac\") {\n\t\treturn \"MAC\"\n\t}\n\tif strings.EqualFold(token.TokenType, \"basic\") {\n\t\treturn \"Basic\"\n\t}\n\tif token.TokenType != \"\" {\n\t\treturn token.TokenType\n\t}\n\treturn \"Bearer\"\n}", "title": "" }, { "docid": "630ba1870c9cf5faa49019f4bf079824", "score": "0.43571392", "text": "func (m *ModifyAccessBearersResponse) MessageTypeName() string {\n\treturn \"Modify Access Bearers Response\"\n}", "title": "" }, { "docid": "682a1d6609a79c669f048f35dd4534bd", "score": "0.43526685", "text": "func AuthType(authType string) option {\n\treturn func(driver *Driver) {\n\t\tdriver.hmacAuthType = authType\n\t}\n}", "title": "" }, { "docid": "78eb6bd53042e43cdb9a4e2622dc884c", "score": "0.43504423", "text": "func (ctx *Context) SetContentType(contentType string) {\n ctx.ResponseWriter.Header().Add(\"Content-Type\", contentType)\n}", "title": "" }, { "docid": "aebf04252dadf049896b60d76896a223", "score": "0.4343387", "text": "func (o *ListFlowcontrolApiserverV1alpha1PriorityLevelConfigurationUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(401)\n}", "title": "" }, { "docid": "25184c7c078696993aa35b154191564f", "score": "0.43315786", "text": "func (o *AddNewReviewerBadRequest) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(400)\n}", "title": "" }, { "docid": "afec777f044270dd393612d75e3f3f68", "score": "0.43315482", "text": "func SendResponse(w io.Writer, resp admissionctl.Response) {\n\n\t// Apply ownership annotation to allow for granular alerts for\n\t// manipulation of SREP owned webhooks.\n\tresp.AuditAnnotations = map[string]string{\n\t\t\"owner\": \"srep-managed-webhook\",\n\t}\n\n\tencoder := json.NewEncoder(w)\n\tresponseAdmissionReview := admissionapi.AdmissionReview{\n\t\tResponse: &resp.AdmissionResponse,\n\t}\n\tresponseAdmissionReview.APIVersion = admissionapi.SchemeGroupVersion.String()\n\tresponseAdmissionReview.Kind = \"AdmissionReview\"\n\terr := encoder.Encode(responseAdmissionReview)\n\t// TODO (lisa): handle this in a non-recursive way (why would the second one succeed)?\n\tif err != nil {\n\t\tlog.Error(err, \"Failed to encode Response\", \"response\", resp)\n\t\tSendResponse(w, admissionctl.Errored(http.StatusInternalServerError, err))\n\t}\n}", "title": "" }, { "docid": "c86131a6b0fea25b292cff3ed4cbb33f", "score": "0.43275833", "text": "func adaptAccessTokenPostRequest(w http.ResponseWriter, r *http.Request, server AccessTokenServer) {\n\trequest := &AccessTokenPostServerRequest{}\n\terr := readAccessTokenPostRequest(request, r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := &AccessTokenPostServerResponse{}\n\tresponse.status = 201\n\terr = server.Post(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeAccessTokenPostResponse(response, w)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "dbcd5099fa43c901e7db0b6bea1b41ff", "score": "0.43199214", "text": "func WriteContentType(w http.ResponseWriter, cType string) {\n\tw.Header().Set(\"Content-Type\", cType)\n}", "title": "" }, { "docid": "e2b315b89590957ed6cc3931ae765b34", "score": "0.43187407", "text": "func CreateAcceptBookkeepingAuditResultResponse() (response *AcceptBookkeepingAuditResultResponse) {\n\tresponse = &AcceptBookkeepingAuditResultResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "title": "" }, { "docid": "a3fe26e4115cfb182a7462a6bcf6d8b1", "score": "0.431803", "text": "func (o AccessConfigResponseOutput) Type() pulumi.StringOutput {\n\treturn o.ApplyT(func(v AccessConfigResponse) string { return v.Type }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b206430e8d13712809b56cfcbc9af9e1", "score": "0.4315233", "text": "func (o *UpdateOwnerMethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(405)\n}", "title": "" }, { "docid": "53ad8b95f0516407e1e41b1b95bde87d", "score": "0.4314381", "text": "func (o *WatchFlowcontrolApiserverV1alpha1PriorityLevelConfigurationUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(401)\n}", "title": "" }, { "docid": "f8282a1ff56ff3b48cae6eeb637f6e24", "score": "0.43119997", "text": "func (o *CreateRbacAuthorizationV1alpha1NamespacedRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(401)\n}", "title": "" }, { "docid": "b0eb8ae648c8856f77ed7078e17003e5", "score": "0.43011683", "text": "func (ctx *Ctx) Type(ext string) *Ctx {\n\tctx.C.Response.Header.SetContentType(getMIME(ext))\n\treturn ctx\n}", "title": "" }, { "docid": "f1f626ce33cab2418deee1a5f8a4e9fb", "score": "0.42988133", "text": "func (o *PostSearchMethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(405)\n}", "title": "" }, { "docid": "82849a93d820aa510f8c830da94a3f7e", "score": "0.4297759", "text": "func (responseType *ResponseType) UnmarshalXML(d *xml.Decoder, start xml.StartElement) error {\n\tvar str string\n\tif err := d.DecodeElement(&str, &start); err != nil {\n\t\treturn err\n\t}\n\treturn responseType.UnmarshalString(str)\n}", "title": "" }, { "docid": "41f135e2e22fe7d620ecc75169fcf12c", "score": "0.42965877", "text": "func PostPartType(request []string, params map[string][]string) (answer Answer) {\n\tanswer.Message = \"PostPartType\"\n\treturn\n}", "title": "" }, { "docid": "3112d9aba30cbeb68f029434df40da4f", "score": "0.4292768", "text": "func (this *AuthenticationInfo) SetResponse(response string) (ParseException error) {\n\tthis.SetParameter(ParameterNames_RESPONSE, response)\n\treturn nil\n}", "title": "" }, { "docid": "db15fb1ac9a42f75ef2febcd0efe8bee", "score": "0.4290275", "text": "func (o RoboDirectiveResponseOutput) ActionType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v RoboDirectiveResponse) string { return v.ActionType }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "44ba321658a176a35e4f15cd14839a36", "score": "0.42852738", "text": "func (a *SlingApiService) PostAuthorizablesExecute(r ApiPostAuthorizablesRequest) (string, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue string\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"SlingApiService.PostAuthorizables\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/libs/granite/security/post/authorizables\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\tif r.authorizableId == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"authorizableId is required and must be specified\")\n\t}\n\tif r.intermediatePath == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"intermediatePath is required and must be specified\")\n\t}\n\n\tlocalVarQueryParams.Add(\"authorizableId\", parameterToString(*r.authorizableId, \"\"))\n\tlocalVarQueryParams.Add(\"intermediatePath\", parameterToString(*r.intermediatePath, \"\"))\n\tif r.createUser != nil {\n\t\tlocalVarQueryParams.Add(\"createUser\", parameterToString(*r.createUser, \"\"))\n\t}\n\tif r.createGroup != nil {\n\t\tlocalVarQueryParams.Add(\"createGroup\", parameterToString(*r.createGroup, \"\"))\n\t}\n\tif r.reppassword != nil {\n\t\tlocalVarQueryParams.Add(\"rep:password\", parameterToString(*r.reppassword, \"\"))\n\t}\n\tif r.profileGivenName != nil {\n\t\tlocalVarQueryParams.Add(\"profile/givenName\", parameterToString(*r.profileGivenName, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"text/html\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\t\tvar v string\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "369badad20bff6e62ab9399fe5984027", "score": "0.4284495", "text": "func (o *GeneratedUploadURLParams) SetFileType(fileType string) {\n\to.FileType = fileType\n}", "title": "" }, { "docid": "624e7eea9163d9d334844d56f7a52e56", "score": "0.4277086", "text": "func setContentType(v string) requestOption {\n\treturn func(req *http.Request) error {\n\t\treq.Header.Set(\"Content-Type\", v)\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "2de2db945f33e8917412aca5e23c8003", "score": "0.42768252", "text": "func (o *WatchApiextensionsV1CustomResourceDefinitionListUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(401)\n}", "title": "" }, { "docid": "f34d5d41c622637513b0059e8279edad", "score": "0.42739713", "text": "func (client Client) SetPermissionResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "title": "" }, { "docid": "fc1d725f2f923f207e822a283f7f8e63", "score": "0.4272414", "text": "func (u *HTTPHelper) SetResponse(c echo.Context, status string, message string, data interface{}, code int, codeType string) ResponseHelper {\n\treturn ResponseHelper{c, status, message, data, code, codeType}\n}", "title": "" }, { "docid": "423206400d6e5f2d6286145952293906", "score": "0.42654857", "text": "func (o *RegisterKardexMethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(405)\n}", "title": "" }, { "docid": "3d091ffc1ab6c792727323d8b769850d", "score": "0.42620218", "text": "func (o *GetPrivateClosePositionParams) SetType(typeVar string) {\n\to.Type = typeVar\n}", "title": "" }, { "docid": "967aa2dba994498f56ceb661a9d03eb7", "score": "0.42523432", "text": "func (client BaseClient) UpdateTemplateByTypeResponder(resp *http.Response) (result SetObject, err error) {\n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusNoContent,http.StatusForbidden,http.StatusNotFound),\n autorest.ByUnmarshallingJSON(&result.Value),\n autorest.ByClosing())\n result.Response = autorest.Response{Response: resp}\n return\n }", "title": "" } ]
579fab45e59091acb06a8a5d0eb8d3bf
Return a route that services the tree relative to httpstatic=
[ { "docid": "64806cec963c5895383d23bb19067977", "score": "0.0", "text": "func (options Options) Route(prefix string, handler http.Handler) Route {\n\treturn Route{\n\t\tPattern: prefix,\n\t\tHandler: http.StripPrefix(prefix, handler),\n\t}\n}", "title": "" } ]
[ { "docid": "ce8af39f048f2953d0827a8c8206c168", "score": "0.69712734", "text": "func (e *Server) Static(prefix, root string) *Route {\n\tif root == \"\" {\n\t\troot = \".\" // For security we want to restrict to CWD.\n\t}\n\treturn e.static(prefix, root, e.GET)\n}", "title": "" }, { "docid": "d9b76a8b18b7029d2136765854437361", "score": "0.6698276", "text": "func (r *Route) Static(dirpath string) *Route {\n\treturn r.StaticFS(newOnlyFileFS(dirpath))\n}", "title": "" }, { "docid": "6fb1b89ac3f8c83c6d3bc5b825c91ba0", "score": "0.66158473", "text": "func (r *Router) Static(url, rootPath string) *Path {\n\treturn r.StaticCustom(url, &StaticFS{\n\t\tRoot: rootPath,\n\t\tIndexNames: []string{\"index.html\"},\n\t\tGenerateIndexPages: true,\n\t\tAcceptByteRange: true,\n\t})\n}", "title": "" }, { "docid": "68629ca1f68db780d1901d8513d3a6b0", "score": "0.65816337", "text": "func (r *Router) StaticCustom(url string, fs *StaticFS) *Path {\n\tif strings.HasSuffix(url, \"/\") {\n\t\turl = url[:len(url)-1]\n\t}\n\n\tffs := &fasthttp.FS{\n\t\tRoot: fs.Root,\n\t\tIndexNames: fs.IndexNames,\n\t\tGenerateIndexPages: fs.GenerateIndexPages,\n\t\tCompress: fs.Compress,\n\t\tAcceptByteRange: fs.AcceptByteRange,\n\t\tCacheDuration: fs.CacheDuration,\n\t\tCompressedFileSuffix: fs.CompressedFileSuffix,\n\t}\n\n\tif fs.PathNotFound != nil {\n\t\tffs.PathNotFound = viewToHandler(fs.PathNotFound, r.errorView)\n\t}\n\n\tif fs.PathRewrite != nil {\n\t\tffs.PathRewrite = func(ctx *fasthttp.RequestCtx) []byte {\n\t\t\tactx := AcquireRequestCtx(ctx)\n\t\t\tresult := fs.PathRewrite(actx)\n\t\t\tReleaseRequestCtx(actx)\n\n\t\t\treturn result\n\t\t}\n\t}\n\n\tstripSlashes := strings.Count(r.getGroupFullPath(url), \"/\")\n\n\tif ffs.PathRewrite == nil && stripSlashes > 0 {\n\t\tffs.PathRewrite = fasthttp.NewPathSlashesStripper(stripSlashes)\n\t}\n\n\treturn r.RequestHandlerPath(fasthttp.MethodGet, url+\"/{filepath:*}\", ffs.NewRequestHandler())\n}", "title": "" }, { "docid": "cc4c87b3aac0b79a6d7be126bb3af4cc", "score": "0.65696305", "text": "func (router *Router) Static(relativePath, root string) gin.IRoutes {\n\treturn router.ginRouter.Static(relativePath, root)\n}", "title": "" }, { "docid": "98afed943312278c2228a33265f95942", "score": "0.6522323", "text": "func (service *HTTPListenerService) AddStaticRoute(pathPrefix string, directory string) *HTTPListenerService {\n\tfileServer := http.FileServer(http.Dir(\"./www/assets\"))\n\tservice.Router.PathPrefix(pathPrefix).Handler(http.StripPrefix(pathPrefix, fileServer))\n\n\treturn service\n}", "title": "" }, { "docid": "994e1575cc934bcdb98a0f2209a0db3d", "score": "0.6370164", "text": "func (n *LocalRoutesPath) Static(Prefix string) *LocalRoutes_StaticPath {\n\treturn &LocalRoutes_StaticPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"static-routes\", \"static\"},\n\t\t\tmap[string]interface{}{\"prefix\": Prefix},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "9223958a1fa9009e90551f4b9040b9db", "score": "0.63663894", "text": "func (n *LocalRoutesPathAny) Static(Prefix string) *LocalRoutes_StaticPathAny {\n\treturn &LocalRoutes_StaticPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"static-routes\", \"static\"},\n\t\t\tmap[string]interface{}{\"prefix\": Prefix},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "87710df3e125dd52715fa30a32197f6f", "score": "0.62955964", "text": "func Static(w http.ResponseWriter, r *http.Request) {\t\n\tvalues := strings.Split(r.URL.Path, \"/\")\n\tprefix := \"/\"+values[1]+\"/\"\n\tfspath := \"./assets/\"+values[1]\n\n\t// fs := http.StripPrefix(prefix, http.FileServer(http.Dir(fspath)))\n\tfs := http.StripPrefix(prefix, http.FileServer(http.Dir(fspath)))\n\tif strings.HasSuffix(r.URL.Path, \"/\") {\n\t\thttp.NotFound(w, r)\n\t\treturn\n\t}\n\tfs.ServeHTTP(w, r)\n}", "title": "" }, { "docid": "923ce345088f735a873aa61827a7e4a7", "score": "0.6263076", "text": "func (cm *common) Static(prefix, root string) {\n\tif root == \"\" {\n\t\troot = \".\" // For security we want to restrict to CWD.\n\t}\n\n\th := func(c Context) error {\n\t\tp, err := url.PathUnescape(c.Param(\"*\"))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tname := filepath.Join(root, filepath.Clean(\"/\"+p)) // \"/\"+ for security\n\t\tfi, err := os.Stat(name)\n\t\tif err != nil {\n\t\t\t// The access path does not exist\n\t\t\treturn NotFoundHandler(c)\n\t\t}\n\n\t\t// If the request is for a directory and does not end with \"/\"\n\t\tp = c.Request().URL.Path // path must not be empty.\n\t\tif fi.IsDir() && p[len(p)-1] != '/' {\n\t\t\t// Redirect to ends with \"/\"\n\t\t\treturn c.Redirect(http.StatusMovedPermanently, p+\"/\")\n\t\t}\n\t\treturn c.File(name)\n\t}\n\tif prefix == \"/\" {\n\t\tcm.add(http.MethodGet, prefix+\"*\", h)\n\t}\n\tcm.add(http.MethodGet, prefix+\"/*\", h)\n}", "title": "" }, { "docid": "19b6a6cca1c958c5dbbd437b33fc9cc9", "score": "0.6231253", "text": "func (e Essen) Static(route string, path string) {\n\n\t//Create error instance\n\tee := EssenError{nilval: true}\n\n\t//Generate absolute path\n\tpath, err := filepath.Abs(path)\n\n\t//Check for absolute path generation error\n\tif err != nil {\n\t\tee.nilval = false\n\t\tee.errortype = \"PathError\"\n\t\tee.message = \"String provided cannot be used for absolute path conversion\"\n\t\tlog.Panic(ee.Error())\n\t}\n\n\t//Create file serving handler\n\tpaths.static[route] = http.FileServer(http.Dir(path))\n}", "title": "" }, { "docid": "09ffe8e80302a30e047dcd2b1e6ae05b", "score": "0.62273854", "text": "func (s *Server) newStaticRouter(st *StaticFolder) http.Handler {\n\tr := chi.NewRouter()\n\tstore := s.Storage.WithPrefix(st.StoragePrefix)\n\tr.Get(\"/{file}\", http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\ts.serveStaticFile(store, w, r)\n\t}))\n\treturn r\n}", "title": "" }, { "docid": "16c0a03f2807cad831c21083ae26ea09", "score": "0.62202394", "text": "func (n *NetworkInstance_ProtocolPath) Static(Prefix string) *NetworkInstance_Protocol_StaticPath {\n\treturn &NetworkInstance_Protocol_StaticPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"static-routes\", \"static\"},\n\t\t\tmap[string]interface{}{\"prefix\": Prefix},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "91469363d03de98c2faa7271a52febd7", "score": "0.6154562", "text": "func (rr *RegRouter) Static(path string, pattern string) {\n\trr.Add(\"GET\", pattern, func(w http.ResponseWriter, r *http.Request) {\n\t\tif file, err := rr.Params(r).GetE(\"filepath\"); err == nil {\n\t\t\tr.URL.Path = fmt.Sprintf(\"/%s\", file)\n\t\t\thttp.FileServer(http.Dir(path)).ServeHTTP(w, r)\n\t\t}\n\t}, false)\n}", "title": "" }, { "docid": "e34e4714c2d9ce71354c2a2b4e2f522d", "score": "0.61258936", "text": "func (s *Subrouter) ServeStatic(rpath string, dir string) {\n\tfp := s.getFullPath(rpath)\n\tfs := http.Dir(dir)\n\tfh := http.StripPrefix(fp, http.FileServer(fs))\n\troot := path.Join(rpath, \"/*filepath\")\n\t// Add two more routes for handling index.html\n\ts.Handle(\"GET\", rpath, fh)\n\ts.Handle(\"HEAD\", rpath, fh)\n\t// and the files one...\n\ts.Handle(\"GET\", root, fh)\n\ts.Handle(\"HEAD\", root, fh)\n}", "title": "" }, { "docid": "e49fd31dae2bd2893a1c56ee655f4379", "score": "0.6111525", "text": "func (options Options) RouteStatic(prefix string) Route {\n\tvar route = Route{Pattern: prefix}\n\tvar handler http.Handler\n\n\tif options.Static != \"\" {\n\t\tlog.Infof(\"Serve %v from %v\", prefix, options.Static)\n\n\t\thandler = http.FileServer(http.Dir(options.Static))\n\n\t\tif options.StaticCacheControl != \"\" {\n\t\t\thandler = CacheFilter{handler, options.StaticCacheControl}\n\t\t}\n\n\t\troute.Handler = http.StripPrefix(prefix, handler)\n\t}\n\n\treturn route\n}", "title": "" }, { "docid": "4d4ddbc438bdd724922a8520211772c1", "score": "0.6067768", "text": "func (n *NetworkInstance_ProtocolPathAny) Static(Prefix string) *NetworkInstance_Protocol_StaticPathAny {\n\treturn &NetworkInstance_Protocol_StaticPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"static-routes\", \"static\"},\n\t\t\tmap[string]interface{}{\"prefix\": Prefix},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "2ef9c935dd2fe6af6fafa8dc4b70f525", "score": "0.60378754", "text": "func (group *RoutesGroup) StaticDir(relativePath, root string) {\r\n\tif strings.Contains(relativePath, \":\") || strings.Contains(relativePath, \"*\") {\r\n\t\tpanic(\"URL parameters can not be used when serving a static folder\")\r\n\t}\r\n\r\n\tfs := Dir(root, false)\r\n\r\n\tabsolutePath := joinPaths(group.BasePath, relativePath)\r\n\tfileHandler := http.StripPrefix(absolutePath, http.FileServer(fs))\r\n\t_, nolisting := fs.(*onlyfilesFS)\r\n\thandler := func(c *Context) {\r\n\t\tif nolisting {\r\n\t\t\tc.Writer.WriteHeader(404)\r\n\t\t}\r\n\t\tfileHandler.ServeHTTP(c.Writer, c.Request)\r\n\t}\r\n\r\n\tpathPattern := path.Join(relativePath, \"/*filepath\")\r\n\r\n\tgroup.Get(pathPattern, handler)\r\n\tgroup.Head(pathPattern, handler)\r\n}", "title": "" }, { "docid": "44328ac800db8182919d0d069be1182f", "score": "0.5999979", "text": "func (wc *WebController) setupStatic(path string) error {\n\tfs := http.FileServer(http.Dir(path))\n\tfullPath := \"/\" + path + \"/\"\n\n\thttp.Handle(fullPath, http.StripPrefix(fullPath, fs))\n\treturn nil\n}", "title": "" }, { "docid": "a3857a23bad1d035c76179e0f32a1d89", "score": "0.5986205", "text": "func (m *Maze) Static(rule string, dir string) {\n\t// delivering static content and preventing malicious access\n\tfs := web.OnlyFilesFS{Fs: http.Dir(dir)}\n\tfileServer := http.FileServer(fs)\n\tm.GET(rule, func(ctx IContext) error {\n\t\tfileServer.ServeHTTP(ctx.GetResponse(), ctx.GetRequest())\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "3b9bb18f595e332fa602b75b02ad607c", "score": "0.59167814", "text": "func (s *Server) RouteStatic(uriPath, filePath string) *RouteItem {\n\ts.initRoute(false)\n\tri := new(RouteItem)\n\tri.Name = uriPath\n\tri.Pattern = uriPath\n\tri.FilePath = filePath\n\tri.IsStatic = true\n\ts.routes[uriPath] = ri\n\treturn ri\n}", "title": "" }, { "docid": "a4a296fe25b189bc064bcc102dffbf32", "score": "0.59030557", "text": "func HandleStatic(rootDir string) matcher.PathHandler {\n\thandler := http.FileServer(http.Dir(rootDir))\n\n\treturn func(res http.ResponseWriter, req *http.Request, params matcher.PathParams) {\n\t\thandler.ServeHTTP(res, req)\n\t}\n}", "title": "" }, { "docid": "9fda19a72c742bc20a9c0edb77554723", "score": "0.5842267", "text": "func (c *Config) HttpStaticPath() string {\n\treturn c.ResourcesPath() + \"/static\"\n}", "title": "" }, { "docid": "36e4e70aee34ce6461a648cfcd26caad", "score": "0.5834343", "text": "func (router *Router) StaticFS(relativePath string, fs http.FileSystem) gin.IRoutes {\n\treturn router.ginRouter.StaticFS(relativePath, fs)\n}", "title": "" }, { "docid": "e6f1f9b0a09832376597c500aaa89cc3", "score": "0.58061916", "text": "func (g *Group) Static(pathPrefix, fsRoot string) {\n\tsubFs := MustSubFS(g.echo.Filesystem, fsRoot)\n\tg.StaticFS(pathPrefix, subFs)\n}", "title": "" }, { "docid": "e39c786426e8e513631416fb52ec136e", "score": "0.5792687", "text": "func (r *Route) StaticFS(fs http.FileSystem) *Route {\n\tif strings.Contains(r.path, \":\") || strings.Contains(r.path, \"*\") {\n\t\tpanic(errors.New(\"URL parameters cannot be used when serving a static file\"))\n\t}\n\n\tfileServer := http.StripPrefix(r.path, http.FileServer(fs))\n\trpath := path.Join(r.path, \"/*\")\n\n\tr.addRoute(\"\", r.host, rpath, func(ctx *Context) error {\n\t\tif _, err := fs.Open(ctx.URLParam(\"*\")); err != nil {\n\t\t\treturn ctx.NotFoundHandler()(ctx)\n\t\t}\n\t\tfileServer.ServeHTTP(ctx.Response(), ctx.Request())\n\t\treturn nil\n\t}, http.MethodHead, http.MethodGet)\n\n\treturn r\n}", "title": "" }, { "docid": "2ec4af5374830f251b97fad8df75fc9e", "score": "0.57557434", "text": "func Static(name string) HTTP {\n\tpath, err := filepath.Abs(filepath.Clean(config.Settings.Views.Path) + \"/\" + filepath.Clean(name+\".html\"))\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\treturn HTTP{StatusCode: http.StatusOK, Type: StaticResponse, TextData: path}\n}", "title": "" }, { "docid": "52976887f070cb82e8f03be0ae192a01", "score": "0.57409847", "text": "func staticWrapper(root http.FileSystem) http.Handler {\n\treturn &staticServer{root: root, handler: http.FileServer(root)}\n}", "title": "" }, { "docid": "e53e71f3f6707ee5c27b2a3a0c597a1a", "score": "0.57233685", "text": "func HandleStaticPartial(rootDir string, rootHTTPPath string) matcher.PathHandler {\n\thandler := http.StripPrefix(rootHTTPPath, http.FileServer(http.Dir(rootDir)))\n\n\treturn func(res http.ResponseWriter, req *http.Request, params matcher.PathParams) {\n\t\thandler.ServeHTTP(res, req)\n\t}\n}", "title": "" }, { "docid": "a25ea0aff58e3eb5fdd482a6e8ae6b0b", "score": "0.57001406", "text": "func staticHandler(fs http.FileSystem, prefix string) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tif prefix != \"/\" {\n\t\t\tr.URL.Path = strings.TrimPrefix(r.URL.Path, prefix)\n\t\t}\n\t\thttp.FileServer(fs).ServeHTTP(w, r)\n\t}\n}", "title": "" }, { "docid": "d9fe6d98aeaf6abb9d4e692fbd5cdb06", "score": "0.56774276", "text": "func (ps *platformServer) SetStaticRoute(prefix, fullpath string, middlewareFn ...mux.MiddlewareFunc) {\n\tps.router.Handle(prefix, http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\thttp.Redirect(w, r, prefix+\"/\", http.StatusMovedPermanently)\n\t}))\n\n\tndir := NoDirFileSystem{http.Dir(fullpath)}\n\tendpointHandlerMapKey := prefix + \"*\"\n\tcompositeHandler := http.StripPrefix(prefix, middleware.BasicSecurityHeaderMiddleware()(http.FileServer(ndir)))\n\n\tfor _, mw := range middlewareFn {\n\t\tcompositeHandler = mw(compositeHandler)\n\t}\n\n\tps.endpointHandlerMap[endpointHandlerMapKey] = compositeHandler.(http.HandlerFunc)\n\tps.router.PathPrefix(prefix + \"/\").Name(endpointHandlerMapKey).Handler(ps.endpointHandlerMap[endpointHandlerMapKey])\n}", "title": "" }, { "docid": "6683c99ca3a2803c87c61801fed74ca5", "score": "0.5640992", "text": "func Static(dir, notFoundFallbackFile string, interceptors ...InterceptorConfig) http.Handler {\n\troot := http.Dir(dir)\n\tfs := http.StripPrefix(\"/\", http.FileServer(root))\n\n\treturn ApplyInterceptors(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tif _, err := os.Stat(fmt.Sprintf(\"%s\", root) + r.RequestURI); os.IsNotExist(err) {\n\t\t\thttp.ServeFile(w, r, dir+\"/\"+notFoundFallbackFile)\n\t\t\treturn\n\t\t}\n\n\t\tfs.ServeHTTP(w, r)\n\t}), interceptors...)\n}", "title": "" }, { "docid": "641934ef42d3684f438196b39593ece3", "score": "0.56358534", "text": "func GetRoutesStatic(client sophos.ClientInterface, options ...sophos.Option) (val []interface{}, err error) {\n\terr = get(client, \"/api/nodes/routes.static\", &val, options...)\n\treturn\n}", "title": "" }, { "docid": "528a3b54c511c204fee2cbe687485918", "score": "0.5632975", "text": "func MapStatic(publicPath, systemPath string, matcherFuncs ...handlers.MatcherFunc) (handlers.Handler, error) {\n\treturn DefaultHttpHandler().MapStatic(publicPath, systemPath, matcherFuncs...)\n}", "title": "" }, { "docid": "04939f1b607fa9cc9c3a39e7e60101cc", "score": "0.56294143", "text": "func (a *app) ServeStatic(w http.ResponseWriter, r *http.Request) bool {\n\tif r.Method != http.MethodGet {\n\t\treturn false\n\t}\n\n\tif r.URL.Path == \"/sitemap.xml\" {\n\t\ta.renderer.Sitemap(w)\n\t\treturn true\n\t}\n\n\tif strings.HasPrefix(r.URL.Path, \"/svg\") {\n\t\ta.renderer.SVG(strings.TrimPrefix(r.URL.Path, \"/svg/\"), r.URL.Query().Get(\"fill\"))\n\t\treturn true\n\t}\n\n\tif strings.HasPrefix(r.URL.Path, \"/favicon\") {\n\t\thttp.ServeFile(w, r, path.Join(\"templates/static\", r.URL.Path))\n\t\treturn true\n\t}\n\n\tfor _, staticPath := range staticRootPath {\n\t\tif r.URL.Path == staticPath {\n\t\t\thttp.ServeFile(w, r, path.Join(\"templates/static\", r.URL.Path))\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "7d224ef5041da30659d262e80e7a44c9", "score": "0.5621856", "text": "func (g *Gor) Static(dir string) {\n\tg.staticFielDir = dir\n}", "title": "" }, { "docid": "6cd62212fd75794159c82af0963b4eb8", "score": "0.5621555", "text": "func frontStaticRouter(c *context.Context) error {\n\tif c.Method() != \"GET\" && c.Method() != \"HEAD\" {\n\t\treturn errNotStaticRequest\n\t}\n\n\tvar isFront bool\n\n\trequestPath := path.Clean(c.Path())\n\tlocalPath := \"./front\" + requestPath\n\t// special processing : favicon.ico/robots.txt can be in any static dir\n\tif requestPath == \"/favicon.ico\" || requestPath == \"/robots.txt\" {\n\t\tserveFile(localPath, c)\n\t\treturn nil\n\t}\n\n\t//Matching static file\n\tfor _, prefix := range Aconfig.FrontDir {\n\t\tif strings.HasPrefix(requestPath, \"/\"+prefix) {\n\t\t\tisFront = true\n\t\t}\n\t}\n\n\tif isFront {\n\t\treturn serveFile(localPath, c)\n\n\t}\n\n\treturn errNotStaticRequest\n}", "title": "" }, { "docid": "ace481b8445f577a4fb2b7cc33ed67c3", "score": "0.5616825", "text": "func (n *LocalRoutesPath) StaticAny() *LocalRoutes_StaticPathAny {\n\treturn &LocalRoutes_StaticPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"static-routes\", \"static\"},\n\t\t\tmap[string]interface{}{\"prefix\": \"*\"},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "51e9a43d533453e8c877ca5caa7cb197", "score": "0.56053275", "text": "func staticHandler(w http.ResponseWriter, r *http.Request) {\n\t// Use the http.ServeFile function\n\thttp.ServeFile(w, r, r.URL.Path[1:]) // Use '1' to remove the leading forward slash ('/')\n}", "title": "" }, { "docid": "52ae49018669a059998ecf85cca89c01", "score": "0.5593853", "text": "func (g *Group) StaticFS(pathPrefix string, filesystem fs.FS) {\n\tg.Add(\n\t\thttp.MethodGet,\n\t\tpathPrefix+\"*\",\n\t\tStaticDirectoryHandler(filesystem, false),\n\t)\n}", "title": "" }, { "docid": "b58eee8e19dcf0781fdb53a0c0f4232a", "score": "0.5570674", "text": "func ResourceAndStaticFileHandler(\n testDirs []string,\n static string,\n) func(http.ResponseWriter, *http.Request) {\n\n return func( w http.ResponseWriter, req * http.Request){\n\n path := req.URL.Path\n\n file, err := os.Stat(path)\n if err == nil && !file.IsDir() {\n http.ServeFile(w, req, path)\n return\n }\n\n // Fix the slashes by removing first slash, and last slash if exists.\n if strings.HasSuffix(path, \"/\") { path = path[1: len(path)-1] }\n\n // Split into parts\n parts := strings.Split(path, \"/\")\n length := len(parts)\n\n //If is a path, return the static file\n if strings.Index(parts[length-1], \".\") == -1 {\n http.ServeFile(w, req, static)\n return\n }\n\n // Find existing files\n _testDirs := make([]string, len(testDirs)+1)\n _testDirs[0] = \"./\"\n for i, t := range testDirs {\n if strings.HasPrefix(t, \"/\"){ t = t[1:] }\n if strings.HasPrefix(t, \"./\"){ t = t[2:] }\n if !strings.HasSuffix(t, \"/\"){ t = t + \"/\" }\n _testDirs[i+1] = \"./\" + t\n }\n\n // Go through all directories including current directory\n for i:=0; i < length; i++ {\n testPath := strings.Join( parts[i:length], \"/\")\n for _, d := range _testDirs {\n if _, err := os.Stat(\"./\" + d + testPath); err == nil{\n http.ServeFile(w, req, d + testPath)\n return\n }\n }\n }\n\n http.ServeFile(w, req, static)\n }\n}", "title": "" }, { "docid": "58835b8df8f925ff40a3988d06c0d25f", "score": "0.5511757", "text": "func StaticServer(mx *chi.Mux, path string, root http.FileSystem) {\n\tif strings.ContainsAny(path, \":*\") {\n\t\tpanic(\"chi: FileServer does not permit URL parameters.\")\n\t}\n\n\tmx.Group(func(r chi.Router) {\n\t\t//r.Use(NormalizePath)\n\n\t\tfs := http.StripPrefix(path, FileServer(root))\n\t\tr.Get(path+\"*\", http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tfs.ServeHTTP(w, r)\n\t\t}))\n\t})\n\n}", "title": "" }, { "docid": "a2752226be7caf6b69367acac98c8b00", "score": "0.5509285", "text": "func (n *LocalRoutesPathAny) StaticAny() *LocalRoutes_StaticPathAny {\n\treturn &LocalRoutes_StaticPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"static-routes\", \"static\"},\n\t\t\tmap[string]interface{}{\"prefix\": \"*\"},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "0324102fac84231e9b8937f867a4b934", "score": "0.5494099", "text": "func staticHandler(next http.Handler) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tif !strings.HasPrefix(r.URL.Path, \"/api\") && sendFile(r.URL.Path, w) {\n\t\t\treturn\n\t\t}\n\t\tnext.ServeHTTP(w, r)\n\t}\n}", "title": "" }, { "docid": "332016071bf17291ecbbd34c60784c73", "score": "0.5464761", "text": "func staticHandler(w http.ResponseWriter, r *http.Request) {\n\tif r.RequestURI == \"/\" {\n\t\tindex, err := ioutil.ReadFile(\"./index.html\")\n\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tw.Write(index)\n\t\treturn\n\t}\n\n\tserveFile(r.RequestURI[1:], w)\n}", "title": "" }, { "docid": "c107b9c2ea481d53622e1eaacc50a887", "score": "0.5448334", "text": "func (s defaultServer) serveStaticResource() http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tfs := http.Dir(frontendRootDir)\n\t\tfile, err := fs.Open(r.URL.Path)\n\t\tif os.IsNotExist(err) {\n\t\t\t// If there's no static file that matches this route, serve the index\n\t\t\t// page and let the frontend handle it.\n\t\t\tserveIndexPage(w, r)\n\t\t\treturn\n\t\t} else if err != nil {\n\t\t\tlog.Printf(\"Failed to retrieve the file %s from the file system: %s\", r.URL.Path, err)\n\t\t\thttp.Error(w, \"Failed to find file: \"+r.URL.Path, http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tdefer file.Close()\n\n\t\tstat, err := file.Stat()\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Failed to retrieve the information of %s from the file system: %s\", r.URL.Path, err)\n\t\t\thttp.Error(w, \"Failed to serve: \"+r.URL.Path, http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tif stat.IsDir() {\n\t\t\t// If the client requested a directory, serve the index page.\n\t\t\tserveIndexPage(w, r)\n\t\t\treturn\n\t\t}\n\n\t\t// Otherwise, serve a static file.\n\t\thttp.ServeFile(w, r, path.Join(frontendRootDir, r.URL.Path))\n\t}\n}", "title": "" }, { "docid": "f503899da10714de2784ef05d66ae57f", "score": "0.5431925", "text": "func StaticPath(path string) Path {\n\treturn func(_ Name) string {\n\t\treturn path\n\t}\n}", "title": "" }, { "docid": "996857794a952939f0fe73596ad2e072", "score": "0.5427214", "text": "func (r *Route) StaticFile(filePath string) *Route {\n\tif strings.Contains(r.path, \":\") || strings.Contains(r.path, \"*\") {\n\t\tpanic(errors.New(\"URL parameters cannot be used when serving a static file\"))\n\t}\n\n\tr.addRoute(\"\", r.host, r.path, func(ctx *Context) error {\n\t\treturn ctx.File(filePath)\n\t}, http.MethodGet)\n\tr.addRoute(\"\", r.host, r.path, func(ctx *Context) error {\n\t\treturn r.serveFileMetadata(ctx, filePath)\n\t}, http.MethodHead)\n\treturn r\n}", "title": "" }, { "docid": "d7a1e4c094bd289e6de809af6f5e744b", "score": "0.5421921", "text": "func rewriteStaticMiddleware(root string, cacheTTL int, html5 bool) echo.MiddlewareFunc {\n\tstatic := middleware.StaticWithConfig(middleware.StaticConfig{\n\t\tRoot: root,\n\t\tHTML5: html5,\n\t})\n\treturn func(next echo.HandlerFunc) echo.HandlerFunc {\n\t\tnext = static(next)\n\t\treturn func(c echo.Context) (err error) {\n\t\t\treturn next(&rewriteFileWrapper{Context: c, cacheTTL: cacheTTL})\n\t\t}\n\t}\n}", "title": "" }, { "docid": "87453b62399651c26e6acd1d1da0589f", "score": "0.5404226", "text": "func NewRouter() *mux.Router {\n\n\tconf := config.Get()\n\twebRoot := conf.Server.WebRoot\n\twebRootWithSlash := webRoot + \"/\"\n\n\trootRouter := mux.NewRouter().StrictSlash(false)\n\tappRouter := rootRouter\n\n\tstaticFileServer := http.FileServer(http.Dir(conf.Server.StaticContentRootDirectory))\n\n\tif webRoot != \"/\" {\n\t\t// help the user out - if a request comes in for \"/\", redirect to our true webroot\n\t\trootRouter.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\t\t\thttp.Redirect(w, r, webRootWithSlash, http.StatusFound)\n\t\t})\n\n\t\tappRouter = rootRouter.PathPrefix(conf.Server.WebRoot).Subrouter()\n\t\tstaticFileServer = http.StripPrefix(webRootWithSlash, staticFileServer)\n\n\t\t// Because of OIDC, when we receive a request for the webroot without\n\t\t// the trailing slash, we can not redirect the user to the correct\n\t\t// webroot as the hash params are lost (and they are not sent to the\n\t\t// server).\n\t\t//\n\t\t// See https://github.com/kiali/kiali/issues/3103\n\t\trootRouter.HandleFunc(webRoot, func(w http.ResponseWriter, r *http.Request) {\n\t\t\tr.URL.Path = webRootWithSlash\n\t\t\trootRouter.ServeHTTP(w, r)\n\t\t})\n\t} else {\n\t\twebRootWithSlash = \"/\"\n\t}\n\n\tfileServerHandler := func(w http.ResponseWriter, r *http.Request) {\n\t\turlPath := r.RequestURI\n\t\tif r.URL != nil {\n\t\t\turlPath = r.URL.Path\n\t\t}\n\n\t\tif urlPath == webRootWithSlash || urlPath == webRoot || urlPath == webRootWithSlash+\"index.html\" {\n\t\t\tserveIndexFile(w)\n\t\t} else if urlPath == webRootWithSlash+\"env.js\" {\n\t\t\tserveEnvJsFile(w)\n\t\t} else {\n\t\t\tstaticFileServer.ServeHTTP(w, r)\n\t\t}\n\t}\n\n\tappRouter = appRouter.StrictSlash(true)\n\n\t// Build our API server routes and install them.\n\tapiRoutes := NewRoutes()\n\tauthenticationHandler, _ := handlers.NewAuthenticationHandler()\n\tfor _, route := range apiRoutes.Routes {\n\t\thandlerFunction := metricHandler(route.HandlerFunc, route)\n\t\tif route.Authenticated {\n\t\t\thandlerFunction = authenticationHandler.Handle(handlerFunction)\n\t\t} else {\n\t\t\thandlerFunction = authenticationHandler.HandleUnauthenticated(handlerFunction)\n\t\t}\n\t\tappRouter.\n\t\t\tMethods(route.Method).\n\t\t\tPath(route.Pattern).\n\t\t\tName(route.Name).\n\t\t\tHandler(handlerFunction)\n\t}\n\n\tif authController := authentication.GetAuthController(); authController != nil {\n\t\tif ac, ok := authController.(*authentication.OpenIdAuthController); ok {\n\t\t\tac.PostRoutes(appRouter)\n\t\t}\n\t}\n\n\t// All client-side routes are prefixed with /console.\n\t// They are forwarded to index.html and will be handled by react-router.\n\tappRouter.PathPrefix(\"/console\").HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tserveIndexFile(w)\n\t})\n\n\tif authController := authentication.GetAuthController(); authController != nil {\n\t\tif ac, ok := authController.(*authentication.OpenIdAuthController); ok {\n\t\t\tauthCallback := ac.GetAuthCallbackHandler(http.HandlerFunc(fileServerHandler))\n\t\t\trootRouter.Methods(\"GET\").Path(webRootWithSlash).Handler(authCallback)\n\t\t}\n\t}\n\n\trootRouter.PathPrefix(webRootWithSlash).HandlerFunc(fileServerHandler)\n\n\treturn rootRouter\n}", "title": "" }, { "docid": "3815eb09db7d9a04036a74d351b9558f", "score": "0.5403541", "text": "func ServeStatic(router *mux.Router, staticDirectory string) {\n\tstaticPaths := map[string]string{\n\t\t\"css\": staticDirectory + \"/css/\",\n\t\t\"js\": staticDirectory + \"/js/\",\n\t\t\"img\": staticDirectory + \"/img/\",\n\t}\n\tfor pathName, pathValue := range staticPaths {\n\t\tpathPrefix := \"/\" + pathName + \"/\"\n\t\trouter.PathPrefix(pathPrefix).Handler(http.StripPrefix(pathPrefix,\n\t\t\thttp.FileServer(http.Dir(pathValue))))\n\t}\n}", "title": "" }, { "docid": "10c20dd7b1938a63b10ac031f065c622", "score": "0.5391783", "text": "func (s *Server) InitRouting() {\n\tr := mux.NewRouter()\n\tapi := r.PathPrefix(\"/api\").Subrouter()\n\n\tapi.HandleFunc(\"/user/register\", s.headers(NewUserHandler)).Methods(\"POST\")\n\n\tapi.HandleFunc(\"/user/login\", s.headers(LoginUserHandler)).Methods(\"POST\")\n\n\tapi.HandleFunc(\"/user\", s.headers(s.restrict(GetCurrentUserHandler))).Methods(\"GET\")\n\n\tapi.HandleFunc(\"/user/projects\", s.headers(s.restrict(GetUsersProjectsHandler))).Methods(\"GET\")\n\n\tapi.HandleFunc(\"/user/{username}\", s.headers(GetUserHandler)).Methods(\"GET\")\n\n\tapi.HandleFunc(\"/project/new\", s.headers(s.restrict(PostCreateProjectHandler))).Methods(\"POST\")\n\n\tapi.HandleFunc(\"/project/{id}\", s.headers(GetProjectHandler)).Methods(\"GET\")\n\n\tapi.HandleFunc(\"/project/{id}/update\", s.headers(s.restrict(PostEditProject))).Methods(\"POST\")\n\n\tapi.HandleFunc(\"/project/{id}/flags/new\", s.headers(s.restrict(PostFlagForFeedbackHandler))).Methods(\"POST\")\n\n\tapi.HandleFunc(\"/project/{id}/flags\", s.headers(GetProjectsFlagsHandler)).Methods(\"GET\")\n\n\tapi.HandleFunc(\"/project/{id}/flags/{flag}\", s.headers(GetFlagHandler)).Methods(\"GET\")\n\n\tapi.HandleFunc(\"/project/{id}/flags/{flag}/feedback/new\", s.headers(s.restrict(PostFeedbackOnFlagHandler))).Methods(\"POST\")\n\n\tapi.HandleFunc(\"/project/{id}/flags/{flag}/feedback\", s.headers(GetAllFeedbackForFlagHandler)).Methods(\"GET\")\n\n\tapi.HandleFunc(\"/top/projects\", s.headers(GetTopProjects)).Methods(\"GET\")\n\n\tr.PathPrefix(\"/\").Handler(http.FileServer(http.Dir(\"static/\")))\n\n\thttp.Handle(\"/\", r)\n}", "title": "" }, { "docid": "af3a9dfa61d15643989ec512584b9bad", "score": "0.5361934", "text": "func handleStatic(url string, handler func(*Context)) {\n\tif !strings.HasPrefix(url, \"/\") {\n\t\turl = \"/\" + url\n\t}\n\thttp.HandleFunc(\n\t\turl,\n\t\tfunc(w http.ResponseWriter, r *http.Request) {\n\t\t\tif r.URL.Path != url && !strings.HasSuffix(url, \"/\") {\n\t\t\t\thttp.NotFound(w, r)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tq := &Context{\n\t\t\t\tw: w,\n\t\t\t\tr: r,\n\t\t\t}\n\t\t\thandler(q)\n\t\t})\n}", "title": "" }, { "docid": "f1ee372320c309ec20a5fbcdb17160ea", "score": "0.5356223", "text": "func (t *Tree) add(method, pattern string, handlers []HandlerFunc) RouteNode {\n\tif _, ok := RouterMethods[method]; !ok {\n\t\tpanic(\"unsupport http method [\" + method + \"]\")\n\t}\n\n\tt.mu.Lock()\n\tdefer t.mu.Unlock()\n\n\t// check group set\n\tif len(t.groups) > 0 {\n\t\tvar gpattern string\n\t\tvar ghandlers []HandlerFunc\n\t\tfor i := range t.groups {\n\t\t\tgpattern += t.groups[i].pattern\n\t\t\tif len(t.groups[i].handlers) > 0 {\n\t\t\t\tghandlers = append(ghandlers, t.groups[i].handlers...)\n\t\t\t}\n\t\t}\n\t\tpattern = gpattern + pattern\n\t\tghandlers = append(ghandlers, handlers...)\n\t\thandlers = ghandlers\n\t}\n\n\t// check pattern (for training slash move behind group check)\n\tif pattern == \"\" {\n\t\tpanic(\"route pattern can not be emtpy!\")\n\t}\n\tif pattern[0] != '/' {\n\t\tpanic(\"route pattern must begin /\")\n\t}\n\n\tfor i := 0; i < len(handlers); i++ {\n\t\thandlers[i] = WrapHandlerFunc(handlers[i])\n\t}\n\n\troot := t.nodes[RouterMethods[method]]\n\torigPattern := pattern\n\tnameNode := NewNode(origPattern, t)\n\n\t// specialy route = /\n\tif len(pattern) == 1 {\n\t\troot.handlers = handlers\n\t\troot.nameNode = nameNode\n\t\treturn nameNode\n\t}\n\n\t// left trim slash, because root is slash /\n\tpattern = pattern[1:]\n\n\tvar radix []byte\n\tvar param []byte\n\tvar i, k int\n\tvar tl *leaf\n\tfor i = 0; i < len(pattern); i++ {\n\t\t// wide route\n\t\tif pattern[i] == '*' {\n\t\t\t// clear static route\n\t\t\tif len(radix) > 0 {\n\t\t\t\troot = root.insertChild(newLeaf(string(radix), nil, t))\n\t\t\t\tradix = radix[:0]\n\t\t\t}\n\t\t\ttl = newLeaf(\"*\", handlers, t)\n\t\t\ttl.kind = leafKindWide\n\t\t\ttl.nameNode = nameNode\n\t\t\troot.insertChild(tl)\n\t\t\tbreak\n\t\t}\n\n\t\t// param route\n\t\tif pattern[i] == ':' {\n\t\t\t// clear static route\n\t\t\tif len(radix) > 0 {\n\t\t\t\troot = root.insertChild(newLeaf(string(radix), nil, t))\n\t\t\t\tradix = radix[:0]\n\t\t\t}\n\t\t\t// set param route\n\t\t\tparam = param[:0]\n\t\t\tk = 0\n\t\t\tfor i = i + 1; i < len(pattern); i++ {\n\t\t\t\tif pattern[i] == '/' {\n\t\t\t\t\ti--\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\tparam = append(param, pattern[i])\n\t\t\t\tk++\n\t\t\t}\n\t\t\tif k == 0 {\n\t\t\t\tpanic(\"route pattern param is empty\")\n\t\t\t}\n\t\t\t// check last character\n\t\t\tif i == len(pattern) {\n\t\t\t\ttl = newLeaf(\":\", handlers, t)\n\t\t\t\ttl.nameNode = nameNode\n\t\t\t} else {\n\t\t\t\ttl = newLeaf(\":\", nil, t)\n\t\t\t}\n\t\t\ttl.param = string(param[:k])\n\t\t\ttl.kind = leafKindParam\n\t\t\troot = root.insertChild(tl)\n\t\t\tcontinue\n\t\t}\n\t\tradix = append(radix, pattern[i])\n\t}\n\n\t// static route\n\tif len(radix) > 0 {\n\t\ttl = newLeaf(string(radix), handlers, t)\n\t\ttl.nameNode = nameNode\n\t\troot.insertChild(tl)\n\t}\n\n\treturn nameNode\n}", "title": "" }, { "docid": "e11529878da48933bd2a6701f83a85e0", "score": "0.53344506", "text": "func addStatic(host, dir string) {\n\tstatic[host] = Static{\n\t\tDir: dir,\n\t\tHandler: http.FileServer(http.Dir(dir)),\n\t}\n}", "title": "" }, { "docid": "a69eb0bc72b6afbe28c6a1257b1aba34", "score": "0.5322794", "text": "func LoadStatic(dir string) {\n\n\thttp.Handle(\"/static/\", http.FileServer(http.Dir(dir)))\n\n}", "title": "" }, { "docid": "e0fcf53b4de4c41918e7a5dce741767b", "score": "0.5316324", "text": "func Init() *mux.Router {\n\tvar router = mux.NewRouter()\n\n\tmanagers := controllers.GetManagers()\n\n\t// Download Route: Use to download files\n\trouter.HandleFunc(\"/d/{id}\", managers.DownloadManager).Methods(\"GET\")\n\n\t// Make Path for api reqiest\n\tr := router.PathPrefix(\"/api/\").Name(\"apipath\").Subrouter()\n\n\t// Upload Route: Use for post new Upload\n\tr.HandleFunc(\"/upload\", managers.UploadManager).Methods(\"POST\")\n\tr.PathPrefix(\"/upload/cache/\").Handler(managers.InitTusServer())\n\n\t// Meta Route: Use to get metadata files\n\tr.HandleFunc(\"/meta/{id}\", managers.MetadataManager).Methods(\"GET\")\n\n\t// Auth Route: Use to get Token\n\tr.HandleFunc(\"/auth\", managers.AuthManager).Methods(\"POST\")\n\n\t// static assets & 404 handler\n\tbox := packr.NewBox(\"../client/dist\")\n\trouter.Path(\"/\").Handler(http.FileServer(box))\n\trouter.Path(\"/index.html\").Handler(serverFile(&box, \"/index.html\"))\n\trouter.Path(\"/favicon.ico\").Handler(serverFile(&box, \"/favicon.ico\"))\n\trouter.PathPrefix(\"/css\").Handler(http.FileServer(box))\n\trouter.PathPrefix(\"/font\").Handler(http.FileServer(box))\n\trouter.PathPrefix(\"/js\").Handler(http.FileServer(box))\n\trouter.NotFoundHandler = notFoundPath(&box)\n\n\t// Enumeration of all the routes\n\tif err := router.Walk(func(route *mux.Route, router *mux.Router, ancestors []*mux.Route) error {\n\t\tpathTemplate, err := route.GetPathTemplate()\n\t\tif err == nil {\n\t\t\tfmt.Println(\"ROUTE:\", pathTemplate)\n\t\t}\n\t\tpathRegexp, err := route.GetPathRegexp()\n\t\tif err == nil {\n\t\t\tfmt.Println(\"Path regexp:\", pathRegexp)\n\t\t}\n\t\tqueriesTemplates, err := route.GetQueriesTemplates()\n\t\tif err == nil {\n\t\t\tfmt.Println(\"Queries templates:\", strings.Join(queriesTemplates, \",\"))\n\t\t}\n\t\tqueriesRegexps, err := route.GetQueriesRegexp()\n\t\tif err == nil {\n\t\t\tfmt.Println(\"Queries regexps:\", strings.Join(queriesRegexps, \",\"))\n\t\t}\n\t\tmethods, err := route.GetMethods()\n\t\tif err == nil {\n\t\t\tfmt.Println(\"Methods:\", strings.Join(methods, \",\"))\n\t\t}\n\n\t\tfmt.Println()\n\n\t\treturn nil\n\n\t}); err != nil {\n\n\t\tfmt.Println(err)\n\n\t}\n\n\treturn router\n}", "title": "" }, { "docid": "af8a1768624a4588aafb311fad0e06f9", "score": "0.5314203", "text": "func (router *Router) StaticFile(relativePath, filepath string) gin.IRoutes {\n\treturn router.ginRouter.StaticFile(relativePath, filepath)\n}", "title": "" }, { "docid": "1b22f3717ca09e80c8898076ec6845d3", "score": "0.5306643", "text": "func (n *NetworkInstance_ProtocolPath) StaticAny() *NetworkInstance_Protocol_StaticPathAny {\n\treturn &NetworkInstance_Protocol_StaticPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"static-routes\", \"static\"},\n\t\t\tmap[string]interface{}{\"prefix\": \"*\"},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "d4ebfa95f843352398a7068a18f9b959", "score": "0.5296653", "text": "func (group *RoutesGroup) StaticFile(relativePath, filePath string) {\r\n\tif strings.Contains(relativePath, \":\") || strings.Contains(relativePath, \"*\") {\r\n\t\tpanic(\"URL parameters can not be used when serving a static file\")\r\n\t}\r\n\r\n\thandler := func(c *Context) {\r\n\t\tc.File(filePath)\r\n\t}\r\n\r\n\tgroup.Get(relativePath, handler)\r\n\tgroup.Head(relativePath, handler)\r\n}", "title": "" }, { "docid": "60b77c0df0cfa03309d81459044b1505", "score": "0.52924854", "text": "func StaticFileViewHandler(w http.ResponseWriter, r *http.Request) {\n staticFileName := r.URL.Path[1:]\n http.ServeFile(w, r, staticFileName)\n}", "title": "" }, { "docid": "e0977a7c16af766dea5e5251723de879", "score": "0.52861905", "text": "func StaticPath(path string) Path {\n\treturn func(_ Name) (string, error) {\n\t\treturn path, nil\n\t}\n}", "title": "" }, { "docid": "f89e0d5a4c3616929492a49f5c563678", "score": "0.52652675", "text": "func (h spaHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {\n\t// get the absolute path to prevent directory traversal\n\tpath, err := filepath.Abs(r.URL.Path)\n\tif err != nil {\n\t\t// if we failed to get the absolute path respond with a 400 bad request\n\t\t// and stop\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// get the volume of the absolute path and remove it\n\tvolume := filepath.VolumeName(path)\n\tpath = strings.Replace(path, volume, \"\", 1)\n\n\t// prepend the path with the path to the static directory\n\tpath = filepath.Join(h.staticPath, path)\n\n\t// check whether a file exists at the given path\n\t_, err = os.Stat(path)\n\tif os.IsNotExist(err) {\n\t\t// file does not exist, serve index.html\n\t\thttp.ServeFile(w, r, filepath.Join(h.staticPath, h.indexPath))\n\t\treturn\n\t} else if err != nil {\n\t\t// if we got an error (that wasn't that the file doesn't exist) stating the\n\t\t// file, return a 500 internal server error and stop\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// otherwise, use http.FileServer to serve the static dir\n\tnoCache(http.StripPrefix(\"/\", http.FileServer(http.Dir(h.staticPath)))).ServeHTTP(w, r)\n}", "title": "" }, { "docid": "e1015e5f3d29970de8aac741b5238fbc", "score": "0.5245483", "text": "func (dsl *PutDSL) StaticRoute(val *l3.StaticRoutes_Route) vppclient.PutDSL {\n\tdsl.parent.txn.Put(l3.RouteKey(val.VrfId, val.DstIpAddr, val.NextHopAddr), val)\n\treturn dsl\n}", "title": "" }, { "docid": "cd85f32b8ee5ee743f561fd8c30d4d8a", "score": "0.5237127", "text": "func HandleRouting(w http.ResponseWriter, r *http.Request) {\n\n\tvar urlPath = r.URL.Path\n\n\t//remove first \"/\" character\n\tif strings.HasPrefix(urlPath, \"/\") {\n\t\turlPath = r.URL.Path[1:]\n\t}\n\tlog.Println(fmt.Sprintf(\"Serving URL[%s]: %s\", r.Method, r.URL.Path))\n\n\t//proceed to development if path matched\n\tif enableDevMode == true && (strings.HasPrefix(urlPath, devStartURL+\"/\") ||\n\t\tstrings.Compare(urlPath, devStartURL) == 0) {\n\n\t\turlPath = urlPath[len(devStartURL):]\n\t\tif strings.HasPrefix(urlPath, \"/\") {\n\t\t\turlPath = urlPath[1:]\n\t\t}\n\n\t\t//if start with \"api/\" direct to REST handler\n\t\tif strings.HasPrefix(urlPath, \"api/\") || strings.Compare(urlPath, \"api\") == 0 {\n\t\t\t//log.Println(\"route handle by development API\")\n\t\t\tif strings.HasPrefix(urlPath, \"api/\") {\n\t\t\t\trouteDevelopmentAPI(w, r, urlPath[4:]) //trim: 'api/'\n\t\t\t} else {\n\t\t\t\trouteDevelopmentAPI(w, r, \"\")\n\t\t\t}\n\t\t} else {\n\t\t\t//log.Println(\"route handle by development static file\")\n\t\t\t//other wise, lets read a file path and display to client\n\t\t\thttp.ServeFile(w, r, \"./\"+devStaticPath+\"/\"+urlPath)\n\t\t}\n\n\t} else {\n\t\t//if start with \"api/\" direct to REST handler\n\t\tif strings.HasPrefix(urlPath, \"api/\") || strings.Compare(urlPath, \"api\") == 0 {\n\t\t\t//log.Println(\"route handle by production API\")\n\t\t\tif strings.HasPrefix(urlPath, \"api/\") {\n\t\t\t\trouteProductionAPI(w, r, urlPath[4:]) //trim: \"api/\"\n\t\t\t} else {\n\t\t\t\trouteProductionAPI(w, r, \"\")\n\t\t\t}\n\n\t\t} else {\n\t\t\t//log.Println(\"route handle by production stati file\")\n\t\t\t//other wise, lets read a file path and display to client\n\t\t\thttp.ServeFile(w, r, \"./\"+staticPath+\"/\"+urlPath)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "15beb6504733bed6aa9f589478ae4410", "score": "0.51752186", "text": "func StaticResolver(address string, mode types.ProxyListenerMode) Resolver {\n\taddr, err := utils.ParseAddr(address)\n\tif err == nil {\n\t\taddr.Addr = utils.ReplaceUnspecifiedHost(addr, defaults.HTTPListenPort)\n\t}\n\n\treturn func(context.Context) (*utils.NetAddr, types.ProxyListenerMode, error) {\n\t\treturn addr, mode, err\n\t}\n}", "title": "" }, { "docid": "2cbec8fcfcef8e66667bfc1de5b65b85", "score": "0.5169988", "text": "func (ls *LadleService) ServeHTTP(w http.ResponseWriter, r *http.Request) {\n\tfor _, s := range ls.Static {\n\t\tif strings.HasPrefix(r.RequestURI, s.URI) {\n\t\t\thttp.StripPrefix(s.URI, http.FileServer(http.Dir(s.Path))).ServeHTTP(w, r)\n\t\t\treturn\n\t\t}\n\t}\n\tls.Proxy.ServeHTTP(w, r)\n}", "title": "" }, { "docid": "f730a5456349af2daf3d3b26152d7673", "score": "0.5167826", "text": "func (t *LocalRoutes) GetStatic(Prefix string) *LocalRoutes_Static {\n\n\tif t == nil {\n\t\treturn nil\n\t}\n\n\tkey := Prefix\n\n\tif lm, ok := t.Static[key]; ok {\n\t\treturn lm\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "99aa54f5027c2916f91cd422fc57f801", "score": "0.5162659", "text": "func (n *NetworkInstance_ProtocolPathAny) StaticAny() *NetworkInstance_Protocol_StaticPathAny {\n\treturn &NetworkInstance_Protocol_StaticPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"static-routes\", \"static\"},\n\t\t\tmap[string]interface{}{\"prefix\": \"*\"},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "95814749d37d8a39a71db04637c3a865", "score": "0.5160582", "text": "func StaticResolver(address string) Resolver {\n\taddr, err := utils.ParseAddr(address)\n\tif err == nil {\n\t\taddr.Addr = utils.ReplaceUnspecifiedHost(addr, defaults.HTTPListenPort)\n\t}\n\n\treturn func(context.Context) (*utils.NetAddr, error) {\n\t\treturn addr, err\n\t}\n}", "title": "" }, { "docid": "aa8bb83ce256c2bc0adb717562bb9ea0", "score": "0.5151158", "text": "func registerStatic(dir string) {\n\tif dir == \"\" {\n\t\tdir = \"static\"\n\t}\n\tpath := fmt.Sprintf(\"/%s/\", dir)\n\th := http.StripPrefix(\n\t\tpath,\n\t\thttp.FileServer(http.Dir(dir)))\n\thttp.Handle(path, h)\n}", "title": "" }, { "docid": "d9ef98a857143a125947d3c9fba5cf46", "score": "0.51490676", "text": "func (s *Server) AddStatic(path string, dir string) {\n\tfileHandler := http.StripPrefix(path, http.FileServer(http.Dir(dir)))\n\ts.mux.Handle(path, fileHandler)\n}", "title": "" }, { "docid": "7fa72cf2ad314b67a92e002bfeaab490", "score": "0.51338553", "text": "func (n *Node) AddStaticRoute(name string, port uint16) error {\n\treturn n.epmd.AddStaticRoute(name, port)\n}", "title": "" }, { "docid": "2269bf67ef975faed2f22cd5436e99fa", "score": "0.5128092", "text": "func staticHandler(w http.ResponseWriter, r *http.Request) {\n\tpath := strings.TrimPrefix(r.URL.Path, \"/\")\n\tif a, ok := assets[path]; ok {\n\t\tct := mime.TypeByExtension(filepath.Ext(a.info.Name()))\n\t\tif ct == \"\" {\n\t\t\tct = http.DetectContentType(a.bytes)\n\t\t}\n\t\tw.Header().Set(\"Content-Type\", ct)\n\t\tb := bytes.NewReader(a.bytes)\n\t\thttp.ServeContent(w, r, a.info.Name(), a.info.ModTime(), b)\n\t}\n\n\thttp.NotFound(w, r)\n}", "title": "" }, { "docid": "fc3802d6ffb4215e8e0703d1b527b826", "score": "0.51226187", "text": "func (c *Config) HttpStaticBuildPath() string {\n\treturn c.HttpStaticPath() + \"/build\"\n}", "title": "" }, { "docid": "ec828e77a3c9c72b31885565aca902f6", "score": "0.510908", "text": "func StaticHandler(dir fs.FS) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tv := fs.ValidPath(strings.TrimLeft(r.URL.Path, \"/\"))\n\t\tif !v {\n\t\t\tw.WriteHeader(http.StatusNotFound)\n\t\t\treturn\n\t\t}\n\n\t\t// check whether a file exists at the given path\n\t\t_, err := fs.Stat(dir, strings.TrimLeft(r.URL.Path, \"/\"))\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusNotFound)\n\t\t\treturn\n\t\t}\n\n\t\t// otherwise, use http.FileServer to serve the static file that we now know\n\t\t// definitely exists\n\t\thttp.FileServer(http.FS(dir)).ServeHTTP(w, r)\n\t}\n}", "title": "" }, { "docid": "4e8e35c93b14db5960ecec07e41be245", "score": "0.5101279", "text": "func Route() {\n\thttp.HandleFunc(\"/\", middleware.ErrorHandling(controllers.Template))\n\t// Enabling and adding CSS files\n\tfileServer := http.FileServer(http.Dir(\"./views/static\"))\n\thttp.Handle(\"/static/\", http.StripPrefix(\"/static\", fileServer))\n}", "title": "" }, { "docid": "c9c069336a64f7d8065eaacbf4de7860", "score": "0.51006156", "text": "func New(staticFilesPath string, log logr.Logger) (*Server, error) {\n\ts := &Server{}\n\n\ts.Router = mux.NewRouter().StrictSlash(true)\n\n\ts.Router.HandleFunc(\"/healthz\", s.Healthz)\n\n\ts.log = log\n\n\tif staticFilesPath == \"\"{\n\t\treturn nil, fmt.Errorf(\"staticFilesPath can't be empty.\")\n\t}\n\n\tlog.Info(\"Configuring static files.\", \"path\", staticFilesPath)\n\tfs := http.FileServer(http.Dir(path.Join(staticFilesPath)))\n\t// We need need to strip the prefix from the handler to correctly map the files.\n\ts.Router.PathPrefix(\"/ui/\").Handler(http.StripPrefix(\"/ui/\", fs))\n\n\t// Add an additional handler for js so we can continue to serve js off that path.\n\tjsFs := http.FileServer(http.Dir(path.Join(staticFilesPath, \"js\")))\n\ts.Router.PathPrefix(\"/js/\").Handler(http.StripPrefix(\"/js/\", jsFs))\n\n\t// TODO(jlewi): The redirects are problematic behind a reverse proxy. We need to strip the prefix\n\t// when rewriting the URI otherwise the PathPrefix rules won't work. But in the redirect case\n\t// we need to know the base URI when issuing the redirect. one solution would be to use the header\n\t// x-forwarded-prefix to store the base path. We then need to modify the redirect handler to\n\t// get the http header and include it.\n\t// TODO(jlewi): I think ISTIO can setup the redirects directly in the virtual service so maybe we should\n\t// just rely on ISTIO in the reverse proxy case? And possibly in all cases.\n\ts.Router.Handle(\"/ui\", httphelper.RelativeRedirectHandler(\"ui/\", http.StatusMovedPermanently))\n\t// Redirect \"/\" to the UI\n\ts.Router.Handle(\"/\", httphelper.RelativeRedirectHandler(\"ui/\", http.StatusMovedPermanently))\n\n\treturn s, nil\n}", "title": "" }, { "docid": "7a6d562bcc32ee7c7a25b679979877d7", "score": "0.50968164", "text": "func (s *Server) newHTTPHandler() http.Handler {\n\n\tstaticHandler := http.FileServer(http.Dir(s.StaticDir))\n\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"http request: %v\", r.URL.Path)\n\n\t\tif resource, params := s.matchResource(r.URL.Path); resource != nil {\n\t\t\tif mimeType := resource.MimeType(); mimeType != \"\" {\n\t\t\t\tw.Header().Set(\"Content-Type\", mimeType)\n\t\t\t}\n\n\t\t\tif err := r.ParseForm(); err != nil {\n\t\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tfor k, v := range r.Form {\n\t\t\t\tparams[k] = v[len(v)-1]\n\t\t\t}\n\n\t\t\tparams[\"HTTP_METHOD\"] = r.Method\n\n\t\t\tbw := bufio.NewWriterSize(w, 65535)\n\n\t\t\tif err := resource.Render(bw, params, s.Variables); err != nil {\n\t\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tif err := bw.Flush(); err != nil {\n\t\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\t}\n\t\t} else {\n\t\t\tstaticHandler.ServeHTTP(w, r)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "37e17f8048bb85fd8b931b0fb1a329c2", "score": "0.5096586", "text": "func (ptr *Controller) GetRouterStaticRoutes(r *Router) ([]*StaticRoute, error) {\n\tkvs, err := ptr.getKVs(routerStaticRoutePath(r.Name, \"\"))\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to get router static routes\")\n\t}\n\n\tsrs := make([]*StaticRoute, 0, len(kvs))\n\tfor name, value := range kvs {\n\t\tsr := &StaticRoute{Name: name, Owner: r}\n\t\tUnmarshalTuplenet(sr, value)\n\t\tsrs = append(srs, sr)\n\t}\n\n\treturn srs, nil\n}", "title": "" }, { "docid": "a3fd20a92039f3a42fe198f92ff4cc28", "score": "0.5089462", "text": "func (s *Handler) StaticHandler() http.HandlerFunc {\n\th := http.FileServer(s.StaticRoot)\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\t// TODO: add HTST header to static files.\n\t\t// addHTSTHeader(w)\n\t\th.ServeHTTP(w, r)\n\t}\n}", "title": "" }, { "docid": "5ebc738bc51a934254a44803b6d9c625", "score": "0.5084889", "text": "func (s *Server) ServeStaticSite(index *template.Template, fileSystem http.FileSystem) {\n\ts.mux.GET(\"/\", staticTemplate(index, \"index\"))\n\ts.mux.ServeFiles(\"/static/*filepath\", fileSystem)\n}", "title": "" }, { "docid": "495108510bc0ceae1b36bc0d4be5aec9", "score": "0.50831544", "text": "func (t *Tree) Add(method, pattern string, handlers []HandlerFunc) RouteNode {\n\tif method == \"GET\" && t.autoHead {\n\t\tt.add(\"HEAD\", pattern, handlers)\n\t}\n\tif t.autoTrailingSlash && (len(pattern) > 1 || len(t.groups) > 0) {\n\t\tvar index byte\n\t\tif len(pattern) > 0 {\n\t\t\tindex = pattern[len(pattern)-1]\n\t\t}\n\t\tif index == '/' {\n\t\t\tt.add(method, pattern[:len(pattern)-1], handlers)\n\t\t} else if index == '*' {\n\t\t\t// wideChild not need trail slash\n\t\t} else {\n\t\t\tt.add(method, pattern+\"/\", handlers)\n\t\t}\n\t}\n\treturn t.add(method, pattern, handlers)\n}", "title": "" }, { "docid": "8cb071264cc24f25adad516cbacc7f44", "score": "0.5082692", "text": "func pathStaticDir(board string) string {\n\tif board == \"\" {\n\t\treturn \"files/static\"\n\t} else {\n\t\treturn \"files/\" + board + \"/static\"\n\t}\n}", "title": "" }, { "docid": "3e604f65c6e11b61b2cf3b144d831db3", "score": "0.50823116", "text": "func (t *LocalRoutes) AppendStatic(v *LocalRoutes_Static) error {\n\tkey := *v.Prefix\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Static == nil {\n\t\tt.Static = make(map[string]*LocalRoutes_Static)\n\t}\n\n\tif _, ok := t.Static[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Static %v\", key)\n\t}\n\n\tt.Static[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "9cc0ea6f1d22f305f71146cc87e50ed9", "score": "0.5079211", "text": "func InitRoutes(router *mux.Router) *mux.Router {\n\tappRouter := router.PathPrefix(\"/v1/consul\").Subrouter()\n\tappRouter.HandleFunc(\"/service/all\", getAllService).Methods(\"GET\")\n\tappRouter.HandleFunc(\"/service/list\", getService).Methods(\"GET\")\n\treturn router\n}", "title": "" }, { "docid": "d6c2a2b1e0f39920937f38b956f698c6", "score": "0.50685686", "text": "func (h spaHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {\n\t// get the absolute path to prevent directory traversal\n\tpath, err := filepath.Abs(r.URL.Path)\n\tif err != nil {\n\t\t// if we failed to get the absolute path respond with a 400 bad request\n\t\t// and stop\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tutils.Sugar.Infof(\"%s\", path)\n\t// prepend the path with the path to the static directory\n\tpath = filepath.Join(h.staticPath, path)\n\n\t// check whether a file exists at the given path\n\t_, err = os.Stat(path)\n\tif os.IsNotExist(err) {\n\t\t// file does not exist, serve index.html\n\t\thttp.ServeFile(w, r, filepath.Join(h.staticPath, h.indexPath))\n\t\treturn\n\t} else if err != nil {\n\t\t// if we got an error (that wasn't that the file doesn't exist) stating the\n\t\t// file, return a 500 internal server error and stop\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// otherwise, use http.FileServer to serve the static dir\n\thttp.FileServer(http.Dir(h.staticPath)).ServeHTTP(w, r)\n}", "title": "" }, { "docid": "5829126e332c01261532ce16b98b87e2", "score": "0.5061478", "text": "func static_handler(rw http.ResponseWriter, req *http.Request) {\n\tvar path string = req.URL.Path\n\tif path == \"\" {\n\t\tpath = \"index.html\"\n\t}\n\tif bs, err := Asset(path); err != nil {\n\t\trw.WriteHeader(http.StatusNotFound)\n\t} else {\n\t\tvar reader = bytes.NewBuffer(bs)\n\t\tio.Copy(rw, reader)\n\t}\n}", "title": "" }, { "docid": "9c9f94fda1edca4727cfc2c862005b20", "score": "0.50533247", "text": "func (router *Router) serveFromTree(path string, r *http.Request, w http.ResponseWriter) {\n\tvar routeInfo routeMatchInfo\n\tnode := router.routes.rcRoutes.match(path, &routeInfo)\n\n\t// Node not found..\n\tif node == nil {\n\t\tnotFound(w, r)\n\t\treturn\n\t}\n\n\thandler := node.handlers[r.Method]\n\tif handler == nil && r.Method == \"OPTIONS\" {\n\t\thandler = router.routes.rcOptsHandler\n\t}\n\n\t// Node found, but no handler for the method\n\tif handler == nil {\n\t\tnotAllowed(w, r)\n\t\treturn\n\t}\n\n\t// Set route match info in context\n\tr = setContextValue(r, routeMatchContextKey, &routeInfo)\n\n\thandler.ServeHTTP(w, r)\n}", "title": "" }, { "docid": "dcb0fb77b58291204eab3f9d1a22d4e1", "score": "0.50483114", "text": "func Load() *mux.Router {\n\tr := mux.NewRouter().StrictSlash(true)\n\n\tfs := http.FileServer(http.Dir(\"./public\"))\n\tr.PathPrefix(\"/public/\").Handler(http.StripPrefix(\"/public/\", fs))\n\n\tsiteTmpls := templates.CreateSiteTemplates()\n\n\thandlerWrapper := func(siteHandler controllers.SiteHandler) func(http.ResponseWriter,\n\t\t*http.Request) {\n\t\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\t\tsiteHandler(w, r, siteTmpls)\n\t\t}\n\t}\n\n\t// site routes\n\tr.HandleFunc(\"/\", handlerWrapper(controllers.HomePageHandler)).Methods(\"GET\")\n\tr.HandleFunc(\"/about\", handlerWrapper(controllers.AboutPageHandler)).Methods(\"GET\")\n\tr.HandleFunc(\"/help\", handlerWrapper(controllers.HelpPageHandler)).Methods(\"GET\")\n\tr.HandleFunc(\"/privacy\", handlerWrapper(controllers.PrivacyPageHandler)).Methods(\"GET\")\n\tr.HandleFunc(\"/terms\", handlerWrapper(controllers.TermsPageHandler)).Methods(\"GET\")\n\tr.HandleFunc(\"/message-board\", handlerWrapper(controllers.MessageBoardPageHandler)).Methods(\"GET\")\n\tr.HandleFunc(\"/category/networking/conversion-table\", handlerWrapper(controllers.ConversionTablePageHandler)).Methods(\"GET\")\n\tr.HandleFunc(\"/category/{category}\", handlerWrapper(controllers.CategoryPageHandler)).Methods(\"GET\")\n\tr.HandleFunc(\"/category/{category}/{calculation}\", handlerWrapper(controllers.CalculationPageHandler)).Methods(\"GET\")\n\tr.NotFoundHandler = http.HandlerFunc(handlerWrapper(controllers.NotFoundPageHandler))\n\n\t// api routes\n\tapiRouter := r.PathPrefix(\"/api\").Subrouter()\n\tapiRouter.HandleFunc(\"/calculation\", controllers.ProcessCalculationHandler).Methods(\"POST\")\n\tapiRouter.NotFoundHandler = http.HandlerFunc(controllers.NotFoundHandler)\n\n\treturn r\n}", "title": "" }, { "docid": "6b4a57b01e3f1af3847bbd765cc3d648", "score": "0.50409377", "text": "func NewStaticServe(staticFile StaticFile, config StaticServeConfig) elton.Handler {\n\tcacheArr := []string{\n\t\t\"public\",\n\t}\n\tif config.MaxAge > 0 {\n\t\tcacheArr = append(cacheArr, \"max-age=\"+toSeconds(config.MaxAge))\n\t}\n\tif config.SMaxAge > 0 {\n\t\tcacheArr = append(cacheArr, \"s-maxage=\"+toSeconds(config.SMaxAge))\n\t}\n\tcacheControl := \"\"\n\tif len(cacheArr) > 1 {\n\t\tcacheControl = strings.Join(cacheArr, \", \")\n\t}\n\tif cacheControl != \"\" && config.Immutable {\n\t\tcacheControl += \", immutable\"\n\t}\n\tskipper := config.Skipper\n\tif skipper == nil {\n\t\tskipper = elton.DefaultSkipper\n\t}\n\t// convert different os file path\n\tbasePath := filepath.Join(config.Path, \"\")\n\tnoCacheRegexp := config.NoCacheRegexp\n\treturn func(c *elton.Context) error {\n\t\tif skipper(c) {\n\t\t\treturn c.Next()\n\t\t}\n\t\tfile := \"\"\n\t\t// 从第一个参数获取文件名\n\t\tif c.Params != nil && len(c.Params.Values) > 0 {\n\t\t\tfile = c.Params.Values[0]\n\t\t}\n\n\t\turl := c.Request.URL\n\n\t\tif file == \"\" {\n\t\t\tfile = url.Path\n\t\t}\n\n\t\tfile = filepath.Join(config.Path, file)\n\t\t// 避免文件名是有 .. 等导致最终文件路径越过配置的路径\n\t\tif !strings.HasPrefix(file, basePath) {\n\t\t\treturn ErrStaticServeOutOfPath\n\t\t}\n\n\t\t// 检查文件(路径)是否包括.\n\t\tif config.DenyDot {\n\t\t\tarr := strings.SplitN(file, string(filepath.Separator), -1)\n\t\t\tfor _, item := range arr {\n\t\t\t\tif item != \"\" && item[0] == '.' {\n\t\t\t\t\treturn ErrStaticServeNotAllowAccessDot\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// 禁止 querystring\n\t\tif config.DenyQueryString && url.RawQuery != \"\" {\n\t\t\treturn ErrStaticServeNotAllowQueryString\n\t\t}\n\t\texists := staticFile.Exists(file)\n\t\tif !exists {\n\t\t\tif config.NotFoundNext {\n\t\t\t\treturn c.Next()\n\t\t\t}\n\t\t\treturn ErrStaticServeNotFound\n\t\t}\n\n\t\tc.SetContentTypeByExt(file)\n\t\tvar fileBuf []byte\n\t\t// strong eTag需要读取文件内容计算eTag\n\t\tif !config.DisableETag && config.EnableStrongETag {\n\t\t\tbuf, e := staticFile.Get(file)\n\t\t\tif e != nil {\n\t\t\t\the, ok := e.(*hes.Error)\n\t\t\t\tif !ok {\n\t\t\t\t\the = hes.NewWithErrorStatusCode(e, http.StatusInternalServerError)\n\t\t\t\t\the.Category = ErrStaticServeCategory\n\t\t\t\t}\n\t\t\t\treturn he\n\t\t\t}\n\t\t\tfileBuf = buf\n\t\t}\n\n\t\tif !config.DisableETag {\n\t\t\tif config.EnableStrongETag {\n\t\t\t\teTag := generateETag(fileBuf)\n\t\t\t\tif eTag != \"\" {\n\t\t\t\t\tc.SetHeader(elton.HeaderETag, eTag)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tfileInfo := staticFile.Stat(file)\n\t\t\t\tif fileInfo != nil {\n\t\t\t\t\teTag := fmt.Sprintf(`W/\"%x-%x\"`, fileInfo.Size(), fileInfo.ModTime().Unix())\n\t\t\t\t\tc.SetHeader(elton.HeaderETag, eTag)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif !config.DisableLastModified {\n\t\t\tfileInfo := staticFile.Stat(file)\n\t\t\tif fileInfo != nil {\n\t\t\t\tlmd := fileInfo.ModTime().UTC().Format(time.RFC1123)\n\t\t\t\tc.SetHeader(elton.HeaderLastModified, lmd)\n\t\t\t}\n\t\t}\n\n\t\tfor k, v := range config.Header {\n\t\t\tc.AddHeader(k, v)\n\t\t}\n\t\t// 未设置cache control\n\t\t// 或文件符合正则\n\t\tif cacheControl == \"\" ||\n\t\t\t(noCacheRegexp != nil && noCacheRegexp.MatchString(file)) {\n\t\t\tc.NoCache()\n\t\t} else {\n\t\t\tc.SetHeader(elton.HeaderCacheControl, cacheControl)\n\t\t}\n\t\t// 如果有设置before response\n\t\tif config.BeforeResponse != nil && fileBuf != nil {\n\t\t\tbuf, err := config.BeforeResponse(file, fileBuf)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfileBuf = buf\n\t\t}\n\t\tif fileBuf != nil {\n\t\t\tc.StatusCode = http.StatusOK\n\t\t\tc.BodyBuffer = bytes.NewBuffer(fileBuf)\n\t\t} else {\n\t\t\tr, e := staticFile.NewReader(file)\n\t\t\tif e != nil {\n\t\t\t\treturn getStaticServeError(e.Error(), http.StatusBadRequest)\n\t\t\t}\n\t\t\tc.StatusCode = http.StatusOK\n\t\t\tc.Body = r\n\t\t}\n\t\treturn c.Next()\n\t}\n}", "title": "" }, { "docid": "7bad7845f27bc7e53a07898bde24b805", "score": "0.50340235", "text": "func (options Options) RouteFile(url string, file string) Route {\n\tfile = path.Join(options.Static, file)\n\n\treturn Route{\n\t\tPattern: url,\n\t\tHandler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tif r.URL.Path != url {\n\t\t\t\tw.WriteHeader(404)\n\t\t\t} else {\n\t\t\t\thttp.ServeFile(w, r, file)\n\t\t\t}\n\t\t}),\n\t}\n}", "title": "" }, { "docid": "9644685e79ef39d41c09ec1dbc136b45", "score": "0.50316644", "text": "func NewStatic(prefix string, fs http.FileSystem) Middleware {\n\treturn &negroni.Static{\n\t\tDir: fs,\n\t\tPrefix: prefix,\n\t\tIndexFile: \"index.html\",\n\t}\n}", "title": "" }, { "docid": "363c6ab7ddbd2e3c48456f364f9deddf", "score": "0.5027467", "text": "func NewHandler(opt *ServerOptions) (http.Handler, error) {\n\tif opt.RootDir == \"\" {\n\t\t// set rootDir to current directory\n\t\topt.RootDir = \".\"\n\t}\n\n\t// clean rootDir\n\topt.RootDir = filepath.Clean(opt.RootDir)\n\n\t// clean and update URLPathPrefix\n\topt.URLPathPrefix = \"/\" + strings.TrimPrefix(filepath.Clean(opt.URLPathPrefix), \"/\")\n\n\tif opt.Index == \"\" {\n\t\topt.Index = \"./index.html\"\n\t}\n\n\t// clean and update home dir\n\topt.Index = filepath.Clean(opt.Index)\n\n\tif opt.NotFoundHandler == nil {\n\t\t// set not found to be http default\n\t\topt.NotFoundHandler = http.NotFoundHandler()\n\t}\n\n\tif opt.FallBackIndex {\n\t\tpath := filepath.Join(opt.RootDir, opt.Index)\n\t\topt.NotFoundHandler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\thttp.ServeFile(w, r, path)\n\t\t})\n\t}\n\n\t// allowed direcories\n\tallowedDirs := make([]string, 0, len(opt.AllowedDirs))\n\tfor _, dir := range opt.AllowedDirs {\n\t\tdir := filepath.Join(opt.RootDir, dir)\n\t\tif dir == opt.Index {\n\t\t\tcontinue\n\t\t}\n\t\tallowedDirs = append(allowedDirs, dir)\n\t}\n\n\tstaticDirs := make(map[string]struct{}, 0)\n\tallowAll := len(allowedDirs) == 0\n\n\tif !allowAll {\n\t\tvar readDir func(string) error\n\t\treadDir = func(dir string) error {\n\t\t\tfileInfos, err := ioutil.ReadDir(filepath.Clean(dir))\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"failed to read directory\")\n\t\t\t}\n\t\t\tfor _, fileInfo := range fileInfos {\n\t\t\t\tname := filepath.Join(dir, fileInfo.Name())\n\t\t\t\tif fileInfo.IsDir() {\n\t\t\t\t\tstaticDirs[name] = struct{}{}\n\t\t\t\t\terr = readDir(name)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn nil\n\t\t}\n\t\terr := readDir(opt.RootDir)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// create the server\n\tsfs := &staticFileServer{\n\t\trootDir: opt.RootDir,\n\t\tindexPage: opt.Index,\n\t\tallowedDirs: allowedDirs,\n\t\tstaticDirs: staticDirs,\n\t\tallowAll: allowAll,\n\t\tmu: &sync.RWMutex{},\n\t\tfiles: make(map[string]*staticFile, 0),\n\t\tpushContent: make(map[string]*pushOptions, len(opt.PushContent)),\n\t\tnotFoundPaths: make(map[string]int8, 0),\n\t\tpushOptions: &http.PushOptions{\n\t\t\tMethod: http.MethodGet,\n\t\t\tHeader: http.Header{\n\t\t\t\t\"pushed-from\": []string{\"api\"},\n\t\t\t},\n\t\t},\n\t\tpushSupport: opt.PushContent != nil && len(opt.PushContent) > 0,\n\t\tnotFoundHandler: opt.NotFoundHandler,\n\t}\n\n\tif sfs.pushSupport {\n\t\tfor ppath, files := range opt.PushContent {\n\t\t\tpushVal := &pushOptions{\n\t\t\t\tstrict: !strings.HasSuffix(ppath, \"*\"),\n\t\t\t\tpath: filepath.Clean(ppath), // removes any trailing /\n\t\t\t\tpushFiles: make([]string, 0),\n\t\t\t}\n\n\t\t\tfor _, file := range files {\n\t\t\t\tfilePath := filepath.Clean(file)\n\t\t\t\tpushVal.pushFiles = append(pushVal.pushFiles, filepath.Join(opt.URLPathPrefix, filePath))\n\n\t\t\t\t// add the file to static files\n\t\t\t\terr := sfs.addStaticFile(filepath.Clean(filePath))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// update static file server pushContent map entry\n\t\t\tsfs.pushContent[pushVal.Key()] = pushVal\n\t\t}\n\t}\n\n\treturn sfs, nil\n}", "title": "" }, { "docid": "d5a0c660fb340ad47b7d2545b380d2b5", "score": "0.50237805", "text": "func (dsl *DeleteDSL) StaticRoute(vrf uint32, dstAddr string, nextHopAddr string) vppclient.DeleteDSL {\n\tdsl.parent.txn.Delete(l3.RouteKey(vrf, dstAddr, nextHopAddr))\n\treturn dsl\n}", "title": "" }, { "docid": "cbb0631d7d3ff6796b8b2eb4a4767f5a", "score": "0.5020988", "text": "func makeRoute(tenantName string, proxy *apimgmt.Proxy) []*route.Route {\n\tclusterID := fmt.Sprintf(\"t_%s-p_%s\", tenantName, proxy.Name)\n\textAuthConfig := makeExtAuthzConfig(tenantName, proxy)\n\n\t// Exact match on basepath\n\texactRoute := &route.Route{\n\t\tName: fmt.Sprintf(\"%s-%s\", clusterID, \"exact\"),\n\t\tMatch: &route.RouteMatch{\n\t\t\tPathSpecifier: &route.RouteMatch_Path{\n\t\t\t\tPath: proxy.Frontend.BasePath,\n\t\t\t},\n\t\t},\n\t\tAction: &route.Route_Route{\n\t\t\tRoute: &route.RouteAction{\n\t\t\t\tClusterSpecifier: &route.RouteAction_Cluster{\n\t\t\t\t\tCluster: clusterID,\n\t\t\t\t},\n\t\t\t\tPrefixRewrite: proxy.Backend.Path,\n\t\t\t\tHostRewriteSpecifier: &route.RouteAction_HostRewrite{\n\t\t\t\t\tHostRewrite: proxy.Backend.Host,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\tPerFilterConfig: map[string]*_struct.Struct{\n\t\t\t\"envoy.ext_authz\": extAuthConfig,\n\t\t},\n\t}\n\n\t// Match basepath/\n\ttarget := proxy.Backend.Path\n\tif !strings.HasSuffix(target, \"/\") {\n\t\ttarget = target + \"/\"\n\t}\n\n\tprefixRoute := &route.Route{\n\t\tName: fmt.Sprintf(\"%s-%s\", clusterID, \"prefix\"),\n\t\tMatch: &route.RouteMatch{\n\t\t\tPathSpecifier: &route.RouteMatch_Prefix{\n\t\t\t\tPrefix: proxy.Frontend.BasePath + \"/\",\n\t\t\t},\n\t\t},\n\t\tAction: &route.Route_Route{\n\t\t\tRoute: &route.RouteAction{\n\t\t\t\tClusterSpecifier: &route.RouteAction_Cluster{\n\t\t\t\t\tCluster: clusterID,\n\t\t\t\t},\n\t\t\t\tPrefixRewrite: target,\n\t\t\t\tHostRewriteSpecifier: &route.RouteAction_HostRewrite{\n\t\t\t\t\tHostRewrite: proxy.Backend.Host,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\tPerFilterConfig: map[string]*_struct.Struct{\n\t\t\t\"envoy.ext_authz\": extAuthConfig,\n\t\t},\n\t}\n\n\treturn []*route.Route{\n\t\tprefixRoute,\n\t\texactRoute,\n\t}\n}", "title": "" }, { "docid": "c515f384361dd84010200343c4266ca4", "score": "0.5020508", "text": "func serve(c Static, prefix, filepath string, allowDir bool) revel.Result {\n\tvar basePath string\n\tif !fpath.IsAbs(prefix) {\n\t\tbasePath = revel.BasePath\n\t}\n\n\tbasePathPrefix := fpath.Join(basePath, fpath.FromSlash(prefix))\n\tfname := fpath.Join(basePathPrefix, fpath.FromSlash(filepath))\n\n\t// Verify the request file path is within the application's scope of access\n\tif !strings.HasPrefix(fname, basePathPrefix) {\n\t\tc.Log.Warn(\"Attempted to read file outside of base path\", \"path\", fname, \"basePath\", basePathPrefix)\n\t\treturn c.NotFound(\"\")\n\t}\n\n\t// Normalize filepath and verify that the suffix is the same\n\tif !strings.Contains(fpath.ToSlash(fpath.Clean(fname)), fpath.ToSlash(filepath)) {\n\t\tc.Log.Warnf(\"Attempted to read path structure outside of base path: %s %s\", fname, fpath.Clean(filepath))\n\t\treturn c.NotFound(\"\")\n\t}\n\n\t// Verify file path is accessible\n\tfinfo, err := os.Stat(fname)\n\tif err != nil {\n\t\tif os.IsNotExist(err) || err.(*os.PathError).Err == syscall.ENOTDIR {\n\t\t\tc.Log.Warnf(\"File not found (%s): %s \", fname, err)\n\t\t\treturn c.NotFound(\"File not found\")\n\t\t}\n\t\tc.Log.Errorf(\"Error trying to get fileinfo for '%s': %s\", fname, err)\n\t\treturn c.RenderError(err)\n\t}\n\tisDir := finfo.Mode().IsDir()\n\t// Disallow directory listing\n\tif isDir && !allowDir {\n\t\trevel.WARN.Printf(\"Attempted directory listing of %s\", fname)\n\t\treturn c.Forbidden(\"Directory listing not allowed\")\n\t}\n\n\tif isDir {\n\t\tif c.Request.URL.Path[len(c.Request.URL.Path)-1] != '/' {\n\t\t\tc.Response.Out.Header().Set(\"Location\", c.Request.URL.Path+\"/\")\n\t\t\tc.Response.WriteHeader(http.StatusFound, \"\")\n\t\t\t// Send redirection\n\t\t\tc.RenderText(\"Redirecting\")\n\t\t}\n\n\t\tviewArgs, err := c.processDir(fname, fpath.Join(basePath, prefix))\n\t\tif err != nil {\n\t\t\tviewArgs[\"message\"] = fmt.Sprintf(\"An error occured %s\", err.Error())\n\t\t}\n\t\tc.ViewArgs[\"details\"] = viewArgs\n\t\treturn c.RenderTemplate(\"static/folder-view.html\")\n\t}\n\n\t// Open request file path\n\tfile, err := os.Open(fname)\n\tif err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\tc.Log.Warnf(\"File not found (%s): %s \", fname, err)\n\t\t\treturn c.NotFound(\"File not found\")\n\t\t}\n\t\tc.Log.Errorf(\"Error opening '%s': %s\", fname, err)\n\t\treturn c.RenderError(err)\n\t}\n\treturn c.RenderFile(file, revel.Inline)\n}", "title": "" }, { "docid": "b19974d7bf5d3ccb34edb44b171db9aa", "score": "0.501936", "text": "func StaticDir(pathPrefix string) {\n\tdefaultServer.StaticDir(pathPrefix)\n}", "title": "" }, { "docid": "b537fd1945930c75e38818b799ae208e", "score": "0.4983411", "text": "func (cs *Service) AttachRoute(router *mux.Router) {\n\trouter.HandleFunc(\"/public_key\", cs.GetPublicKey).Methods(\"GET\")\n}", "title": "" }, { "docid": "ef11e5e1cfeeb856182aa0979d3ea743", "score": "0.49830127", "text": "func MapStaticFile(publicPath, staticFilePath string, matcherFuncs ...handlers.MatcherFunc) (handlers.Handler, error) {\n\treturn DefaultHttpHandler().MapStaticFile(publicPath, staticFilePath, matcherFuncs...)\n}", "title": "" }, { "docid": "4f6c0d6e212728bd410bef7afad361e6", "score": "0.49824044", "text": "func (h spaHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {\n\t// get the absolute path to prevent directory traversal\n\tpath, err := filepath.Abs(r.URL.Path)\n\tif err != nil {\n\t\t// if we failed to get the absolute path respond with a 400 bad request\n\t\t// and stop\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// prepend the path with the path to the static directory\n\tpath = filepath.Join(h.staticPath, path)\n\n\t// check whether a file exists at the given path\n\t_, err = os.Stat(path)\n\tif os.IsNotExist(err) {\n\t\t// file does not exist, serve index.html\n\t\thttp.ServeFile(w, r, filepath.Join(h.staticPath, h.indexPath))\n\t\treturn\n\t} else if err != nil {\n\t\t// if we got an error (that wasn't that the file doesn't exist) stating the\n\t\t// file, return a 500 internal server error and stop\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// otherwise, use http.FileServer to serve the static dir\n\thttp.FileServer(http.Dir(h.staticPath)).ServeHTTP(w, r)\n}", "title": "" } ]
59feb8c6efe03f80c19840a44602ffbc
Terminate should not be used with the Graphite provider since all the work should occur in the Run method
[ { "docid": "098e641ffa278f73ad76de29dafde2ab", "score": "0.6843804", "text": "func (p *Provider) Terminate(run *v1alpha1.AnalysisRun, metric v1alpha1.Metric, measurement v1alpha1.Measurement) v1alpha1.Measurement {\n\tp.logCtx.Warn(\"Graphite provider should not execute the Terminate method\")\n\treturn measurement\n}", "title": "" } ]
[ { "docid": "6f9d052e2df4d995adf234fcc4ad5f63", "score": "0.60885864", "text": "func (m *member) Terminate(t *testing.T) {\n\tm.s.Stop()\n\tfor _, hs := range m.hss {\n\t\ths.CloseClientConnections()\n\t\ths.Close()\n\t}\n\tif err := os.RemoveAll(m.ServerConfig.DataDir); err != nil {\n\t\tt.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "7a91552a89e313f13bf5d67259ed0159", "score": "0.59853125", "text": "func (container *Main) Terminate() {\n\tif err := container.Dictionary.CloseDatabaseConnection(); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "fa0f9f02501ac1daa7797cf6f280bd46", "score": "0.59045476", "text": "func (p *Provider) Terminate(run *v1alpha1.AnalysisRun, metric v1alpha1.Metric, measurement v1alpha1.Measurement) v1alpha1.Measurement {\n\tp.logCtx.Warn(\"kayenta provider should not execute the Terminate method\")\n\treturn measurement\n}", "title": "" }, { "docid": "7ed66400049fef33766786dd9d2e6b55", "score": "0.5865738", "text": "func Terminate() error {\n\treturn pm.ToError(pm.Terminate())\n}", "title": "" }, { "docid": "d479ff0dfce750653e6a7a4d010bad3b", "score": "0.5830528", "text": "func (v *Engine) Quit() {\n\tv.running = false\n}", "title": "" }, { "docid": "b7358e80963ab4154142f37a1bc75caa", "score": "0.5747717", "text": "func Terminate() {\n\tif db != nil {\n\t\tcloseDB()\n\t}\n}", "title": "" }, { "docid": "e2871c661c4c1afe8781825039bb700f", "score": "0.5740923", "text": "func (m *manager) Terminate(specs []types.Spec) error {\n\tlog.Debug(\"stack.Terminate\", \"specs\", specs)\n\treturn fmt.Errorf(\"not implemented -- destroy via direct calls to plugins\")\n}", "title": "" }, { "docid": "1fd4a17e688b96f893df2b6980dc52c0", "score": "0.57340044", "text": "func (liqoIPAM *IPAM) Terminate() {\n\t// Stop GRPC server\n\tliqoIPAM.grpcServer.GracefulStop()\n}", "title": "" }, { "docid": "7a4ca297fa8abda1a14212b1b33d90fa", "score": "0.5679825", "text": "func (e *Engine) Stop() {\n\tglfw.Terminate()\n}", "title": "" }, { "docid": "a14b090b99b30fefd39117ff1260c35a", "score": "0.56114274", "text": "func Terminate() {\n\tif db != nil {\n\t\tinsist.IsNil(db.Close())\n\t\tdb = nil\n\t}\n}", "title": "" }, { "docid": "b20f0b78420852705b5a646ef4cc7085", "score": "0.5608546", "text": "func Terminate() {\n\tLogging.Info(\"Closing RPC service...\")\n\tif err := RPC.Close(); err != nil {\n\t\tLogging.Error(err)\n\t}\n\n\tLogging.Info(\"Closing PubSub service...\")\n\tif err := PubSub.Close(); err != nil {\n\t\tLogging.Error(err)\n\t}\n\n\tLogging.Info(\"Closing Logging service...\")\n\tLogging.Info(\"Waiting for the ZeroMQ context to terminate...\")\n\tLogging.Close()\n\tzmq.Term()\n}", "title": "" }, { "docid": "4d1d283d3f895933823dfc252b51462d", "score": "0.55452895", "text": "func (e *Engine) Close() { e.stop <- true }", "title": "" }, { "docid": "155259f9be548e410636c68d01ef533b", "score": "0.554317", "text": "func (m *VizierMonitor) Quit() {\n\tif m.ctx != nil {\n\t\tm.cancel()\n\t}\n}", "title": "" }, { "docid": "4dfd8910b51f2c0f3c8b88ce6eb88b42", "score": "0.5521164", "text": "func (tracker *Instance) Quit() {\n\ttracker.quit <- struct{}{}\n}", "title": "" }, { "docid": "c5ef2e63aba452659ab6d45d4d92662f", "score": "0.5495685", "text": "func (w *TelemetryUsageWorker) Cleanup() error { return nil }", "title": "" }, { "docid": "7da7dff0ef7c6e98a50774d0a5570e16", "score": "0.5476732", "text": "func (self *CMediaRouteT) Terminate() {\n\n\tC.cefingo_media_route_terminate((*C.cef_media_route_t)(self.pc_media_route))\n\n}", "title": "" }, { "docid": "83394812fe159362b6f0108a8c540e75", "score": "0.5440811", "text": "func (w *TestWorker) Quit() {}", "title": "" }, { "docid": "f9b6be68603d8c8cdd1bc6ae384f4144", "score": "0.5438945", "text": "func (g *GradOptimizable) Close() {\n\tclose(g.quit)\n}", "title": "" }, { "docid": "836caa500046051cb8f21b628806ed39", "score": "0.54282427", "text": "func (w *TelemetryKeysServerSideWorker) Cleanup() error { return nil }", "title": "" }, { "docid": "912a7286f5341e4995d072fd1de4cd51", "score": "0.5426147", "text": "func (app *ExampleApp) Terminate() {\n\tapp.MainWindow.SetShouldClose(true)\n\tglfw.Terminate()\n}", "title": "" }, { "docid": "cfd54a5175dd2ad216532bab7e7d5e69", "score": "0.53907657", "text": "func (w *TelemetryKeysClientSideWorker) Cleanup() error { return nil }", "title": "" }, { "docid": "e316123aabf8ea3db5ade32d38bf1b55", "score": "0.5383503", "text": "func (p *platform) Terminate() error {\n close(p.events)\n\n // Wait for any goroutines that are pumping Events.\n p.Wait()\n\n p.client.Disconnect()\n\n return nil\n}", "title": "" }, { "docid": "9856bbe8f43c8ae43ced900bf347b8bb", "score": "0.53813255", "text": "func (r *RenderThread) Terminate() {\n}", "title": "" }, { "docid": "d0ffd25fb8b1e588bf2a60a615cf7501", "score": "0.5363167", "text": "func TearDown() {\n\tlog.Debug(\"In gnmi_oper TearDown\")\n\tgnmiConn.cancel()\n}", "title": "" }, { "docid": "0ae304b37cbd9b78c083775268c7a9e4", "score": "0.53630656", "text": "func (d *NASBlockStorageDriver) Terminate(ctx context.Context, _ string) {\n\tfields := LogFields{\"Method\": \"Terminate\", \"Type\": \"NASBlockStorageDriver\"}\n\tLogd(ctx, d.Name(), d.Config.DebugTraceFlags[\"method\"]).WithFields(fields).Trace(\">>>> Terminate\")\n\tdefer Logd(ctx, d.Name(), d.Config.DebugTraceFlags[\"method\"]).WithFields(fields).Trace(\"<<<< Terminate\")\n\n\td.initialized = false\n}", "title": "" }, { "docid": "0177d89810c88c6cce4d6b7c03cb6053", "score": "0.53497374", "text": "func (n *Noop) Terminate() {\n\tclose(n.shutdown)\n}", "title": "" }, { "docid": "414d0d7ed39543c0eb1c30e4174b9360", "score": "0.53496724", "text": "func (gr *GuestRunner) Quit() {\n\tLogRunnerInfo(gr.GuestID, \"\", \"\", \"Quiting\")\n\tgr.Async.Quit()\n}", "title": "" }, { "docid": "de8eba942068f78b40d11f10c3ffc9c1", "score": "0.53488266", "text": "func Stop() {\n\tglfw.Terminate()\n}", "title": "" }, { "docid": "5c083457d0a644355829df07115c4ef3", "score": "0.5347433", "text": "func (tf *Runtime) Close() error {\n\treturn tf.grid.Close()\n}", "title": "" }, { "docid": "1e68d3e000ba35b6da0974bf01556082", "score": "0.5334101", "text": "func (r *RuntimeCollector) Close() {\n\tclose(r.quit)\n}", "title": "" }, { "docid": "d6e304e758f2a14830955508811254e1", "score": "0.5328553", "text": "func (a *PubSub) Terminate() error {\n\n\t// send single termination signal for\n\t// blocking driver\n\tvar signalCount = 1\n\n\t// send two termination signal for concurrent\n\t// driver\n\tif a.supportsConcurrency {\n\t\tsignalCount = 2\n\t}\n\n\tfor i := 0; i < signalCount; i++ {\n\t\ta.terminate <- 1\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "91392c60797dc7150951dc4267501698", "score": "0.53262746", "text": "func (e *Engine) Stop() {\r\n\te.pool.Shutdown()\r\n}", "title": "" }, { "docid": "9aeb94f16345bb378652eaad0311dee1", "score": "0.5321819", "text": "func (g *Gost) Exit() {\n // Closes the application\n for i := 0; i < len(g.applications); i++ {\n g.applications[i].Stop()\n }\n // Exit the main loop.\n g.exitChannel <- 1\n}", "title": "" }, { "docid": "0e515c94e9c1dfcf95c20208b353cd01", "score": "0.5319855", "text": "func (es *executionService) Terminate(runID string, userInfo state.UserInfo) error {\n\tes.terminateJobChannel <- state.TerminateJob{RunID: runID, UserInfo: userInfo}\n\tgo es.terminateWorker(es.terminateJobChannel)\n\treturn nil\n}", "title": "" }, { "docid": "8ad4486720e550f638e4454024363254", "score": "0.5318288", "text": "func (v *Vehicle) Terminate() {\n\tv.ctxCancelFunc()\n}", "title": "" }, { "docid": "1ad0bfeadb9d502dc845c372b333100f", "score": "0.53136426", "text": "func (r *Rediaron) TerminateEmbededStorage() {\n\t_ = r.cli.Close()\n}", "title": "" }, { "docid": "1f7ffd070348103bdfc85ce7a4ef814f", "score": "0.5302236", "text": "func TerminateDbContext() {\n\tsession.Close()\n}", "title": "" }, { "docid": "06d17b3b0a1bba5333059f6d272a3a63", "score": "0.5293324", "text": "func Terminate() {\n\tsaveToFileFlag = saveToFileFlag && utils.Save(fName, conf) && !saveToFileFlag\n}", "title": "" }, { "docid": "bfac2ba8d8ca35c7db71e17e228eee15", "score": "0.5291055", "text": "func (w *TelemetryConfigWorker) Cleanup() error { return nil }", "title": "" }, { "docid": "894599e151c02533116e87c84f4b432b", "score": "0.5286442", "text": "func (e *Engine) Exit() {\n\te._Cancel()\n\te._Wg.Wait()\n}", "title": "" }, { "docid": "5e67e4be83512d4660cf36460fb182fc", "score": "0.52857774", "text": "func Exit() {\r\n\tcore.GetCoreController().Kill()\r\n}", "title": "" }, { "docid": "09ae9346105c31da3a87cb127f5ee4a7", "score": "0.52848685", "text": "func (bc *Broker) Terminate() {\n\tclose(bc.terminating)\n}", "title": "" }, { "docid": "1a4bda2899a74c774c22ec5384874840", "score": "0.52715933", "text": "func (t *Terminator) Run() {\n\tlog.Info(\"Starting terminator\")\n\tt.db = base.NewDb(t.config.Dsn())\n\tlog.Info(\"Connecting to instance\")\n\tt.db.Connect()\n\tdefer t.terminate()\n\n\tfor {\n\t\tselect {\n\t\tcase <-t.done:\n\t\t\treturn\n\t\tdefault:\n\t\t\tsessions := t.db.Sessions()\n\n\t\t\t// Cancel or terminate active sessions\n\t\t\tif t.config.ActiveTimeout != 0 {\n\t\t\t\tactives := t.filter(activeSessions(sessions, t.config.ActiveTimeout))\n\t\t\t\tif t.config.Cancel {\n\t\t\t\t\tt.db.CancelSessions(actives)\n\t\t\t\t} else {\n\t\t\t\t\tt.db.TerminateSessions(actives)\n\t\t\t\t}\n\t\t\t\tt.notify(actives)\n\t\t\t}\n\n\t\t\t// Terminate idle sessions\n\t\t\tif t.config.IdleTimeout != 0 {\n\t\t\t\tidles := t.filter(idleSessions(sessions, t.config.IdleTimeout))\n\t\t\t\tt.db.TerminateSessions(idles)\n\t\t\t\tt.notify(idles)\n\t\t\t}\n\n\t\t\ttime.Sleep(time.Duration(t.config.Interval*1000) * time.Millisecond)\n\t\t}\n\n\t}\n}", "title": "" }, { "docid": "f6e7fea5e2f43d778104318d9937cf36", "score": "0.5271214", "text": "func (p *SQSPlugin) Exit() {\n\tp.l.Exit()\n\tconnPool.Delete(p.URL)\n}", "title": "" }, { "docid": "b2a651e6821e98a67a583f85e55ad51e", "score": "0.52671665", "text": "func (proc *Process) Terminate() {\n\tproc.vm.abort = true\n}", "title": "" }, { "docid": "c1044c837c62d34428bd9a9485fde43d", "score": "0.52649385", "text": "func (s *Ecosystem) Stop() error {\n\ts.bloomIndexer.Close()\n\ts.blockchain.Stop()\n\ts.protocolManager.Stop()\n\tif s.lesServer != nil {\n\t\ts.lesServer.Stop()\n\t}\n\ts.txPool.Stop()\n\ts.miner.Stop()\n\ts.eventMux.Stop()\n\n\ts.chainDb.Close()\n\ts.broadTx.Stop() //YY\n\tclose(s.shutdownChan)\n\n\treturn nil\n}", "title": "" }, { "docid": "97d17cdad037fa36e2f2cc58588b2acd", "score": "0.52529323", "text": "func (e* Engine) QuitAll(x int, reply *int) error {\n\n listOfNodes := []*rpc.Client{}\n for numberOfWorkers := 0; numberOfWorkers < len(nodeAddresses); numberOfWorkers++ {\n var client *rpc.Client\n listOfNodes = append(listOfNodes, client)\n }\n\n for node := 0; node < len(nodeAddresses); node++ {\n var err error\n listOfNodes[node], err = rpc.Dial(\"tcp\", nodeAddresses[node])\n if err != nil {\n log.Fatal(\"Failed to connect to node \", node, \" \", err)\n }\n var x, reply int\n listOfNodes[node].Call(\"Engine.QuitNode\", x, &reply)\n }\n os.Exit(0)\n return nil\n}", "title": "" }, { "docid": "361e70861f740193d3d584af203adde1", "score": "0.52416676", "text": "func (v *Virtualizer) Close(force bool) error {\n\tv.logger.Debugf(\"Deleting VM\")\n\tif force && !(v.state == virtualizers.Ready) {\n\t\terr := v.ForceStop()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else if !(v.state == virtualizers.Ready) {\n\t\terr := v.Stop()\n\t\tif err != nil {\n\t\t\tif !strings.Contains(err.Error(), \"not currently running\") {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\tv.state = virtualizers.Deleted\n\n\tvar stopVM func() error\n\tstopVM = func() error {\n\t\terr := v.execute(exec.Command(\"VBoxManage\", \"unregistervm\", v.name))\n\t\tif err != nil {\n\t\t\tif !strings.Contains(err.Error(),\n\t\t\t\tfmt.Sprintf(\"Could not find a registered machine named\")) {\n\t\t\t\t// VM still shutting down\n\t\t\t\tif strings.Contains(err.Error(), \"is already locked by a session (or being locked or unlocked)\") {\n\t\t\t\t\ttime.Sleep(time.Millisecond * 500)\n\t\t\t\t\treturn stopVM()\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n\terr := stopVM()\n\tif err != nil {\n\t\tif !strings.Contains(err.Error(),\n\t\t\tfmt.Sprintf(\"Cannot unregister the machine '%s' while it is locked\",\n\t\t\t\tv.name)) && !strings.Contains(err.Error(),\n\t\t\tfmt.Sprintf(\"Could not find a registered machine\")) && !strings.Contains(err.Error(), \"(MISSING)\") {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif v.sock != nil {\n\t\tv.sock.Close()\n\t}\n\tv.disk.Close()\n\tvirtualizers.ActiveVMs.Delete(v.name)\n\n\treturn nil\n}", "title": "" }, { "docid": "895e6cf4e8551a9afe5c0446afd92d29", "score": "0.5209529", "text": "func (ds *datastore) close() {\n\tclose(ds.quit)\n}", "title": "" }, { "docid": "67e12f9f5c5e77724ff987f67784d82c", "score": "0.5205724", "text": "func terminate(control *Control) {\n\t// close the main process context\n\tcontrol.Cancel()\n}", "title": "" }, { "docid": "aff9f0d889f9e0f2e04471f6c89b84aa", "score": "0.5171305", "text": "func (node *Node) Stop(ctx context.Context) {\n\t// stop mpool submodule\n\tnode.mpool.Stop(ctx)\n\n\t//stop syncer submodule\n\tnode.syncer.Stop(ctx)\n\n\t//Stop discovery submodule\n\tnode.discovery.Stop()\n\n\t//Stop network submodule\n\tnode.network.Stop(ctx)\n\n\t//Stop chain submodule\n\tnode.chain.Stop(ctx)\n\n\t//Stop paychannel submodule\n\tnode.paychan.Stop()\n\n\t//Stop market submodule\n\t//node.market.Stop()\n\n\tif err := node.repo.Close(); err != nil {\n\t\tfmt.Printf(\"error closing repo: %s\\n\", err)\n\t}\n}", "title": "" }, { "docid": "551f3deaff38741083342a5ce21f5e9f", "score": "0.51492184", "text": "func (a *Application) Exit() {\n\ta.IsRun = false\n\n\t// disconnect waiting time in milliseconds\n\tvar quiesce uint = 10\n\ta.cli.Disconnect(quiesce)\n\n\t// close project stream\n\tclose(a.projectStream)\n\n\t// all channels are going to close\n\t// so we are waiting for them\n\ta.insertCloseCounter.Wait()\n}", "title": "" }, { "docid": "e0f8cee867ebf5f35cfc045b01417eb1", "score": "0.51407534", "text": "func (e *Engine) Run(\n//c *ClusterOpts,\n) {\n\t/*\n\t\tif c != nil {\n\t\t\t// TODO: implement\n\t\t\t// https://github.com/go-ego/riot/issues/62\n\t\t\te.l.Fatal(\"cluster support is incomplete - do not use\")\n\t\t\te.l.Infow(\"setting up Riot cluster\", \"opts\", c)\n\t\t\tcluster.InitEngine(com.Config{\n\t\t\t\tEngine: com.Engine{\n\t\t\t\t\tStoreEngine: e.engineOpts.StoreEngine,\n\t\t\t\t\tStoreFolder: e.engineOpts.StoreFolder,\n\t\t\t\t},\n\t\t\t\tRpc: com.Rpc{\n\t\t\t\t\tGrpcPort: []string{}, // ??\n\t\t\t\t\tDistPort: []string{}, // ??\n\t\t\t\t\tPort: c.Port,\n\t\t\t\t},\n\t\t\t})\n\t\t\tgo cluster.InitGrpc(c.Port)\n\t\t}\n\t*/\n\tgo e.q.Run()\n\tfor {\n\t\tselect {\n\t\tcase <-e.stop:\n\t\t\te.l.Infow(\"exit signal received - closing\")\n\t\t\te.q.Close()\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "73abfab60be91f23754e7ffbf516f0b9", "score": "0.5139769", "text": "func MainQuit() {\n\tCandy().StopLoop()\n}", "title": "" }, { "docid": "55bc686628ca9759f17f378f7a80be4a", "score": "0.5134837", "text": "func Terminate() error {\n\tee := C.espeak_Terminate()\n\tif err := ErrFromCode(ee); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d87a2ebb0e48e9db5b4102624b7c99f1", "score": "0.51304835", "text": "func (dummyWorkItem) Terminate(msg string) {\n\n}", "title": "" }, { "docid": "c794540ac8a24c61dd458991f7e01725", "score": "0.5114834", "text": "func (s *store) Shutdown() {\n\n}", "title": "" }, { "docid": "c59ba0a4002e0d4ff427384531bac20c", "score": "0.5113405", "text": "func EndRun(ctx context.Context) {\n\tdefer util.Close(getCtx(ctx).run)\n\n\t// Mark the root step as finished.\n\tfinishStep(ctx, recover())\n}", "title": "" }, { "docid": "b8d694ca9902e5ee2f9043a30e1a868e", "score": "0.51114446", "text": "func (cm *SortedMergeCIPageUsageManager) Quit() {\n\n\tif cm.ioCloseChan != nil {\n\t\tclose(cm.ioChan)\n\t\tlog.Info(\"wait for ioTraceRoutine\")\n\t\t<-cm.ioCloseChan\n\t}\n\n\tif cm.outputFilename == \"\" {\n\t\treturn\n\t}\n\n\t//jsonMap := make(map[string]interface{})\n\t//for i, generationStats := range cm.StatsList {\n\t//jsonMap[\"generation \"+strconv.Itoa(i)] = generationStats\n\t//}\n\n\tif encodedStats, err := json.MarshalIndent(cm.diffNumClientsResults, \"\", \" \"); err != nil {\n\t\tlog.Error(\"Couldn't marshal results: \", err)\n\t} else if f, err := os.Create(cm.outputFilename); err != nil {\n\t\tlog.Error(\"Couldn't create results file: \", err)\n\t} else if n, err := f.Write(encodedStats); (n != len(encodedStats)) || err != nil {\n\t\tlog.Error(\"Couldn't write to results file: \", err)\n\t} else {\n\t\tlog.Info(bytes.NewBuffer(encodedStats).String())\n\t\tf.Close()\n\t}\n}", "title": "" }, { "docid": "b282dbb17d51b13ba479c88ef992ddce", "score": "0.5104626", "text": "func (r *MMSA) Terminate(unregHK bool) {\n\tvar (\n\t\tfreed int64\n\t\tgced string\n\t)\n\tif unregHK {\n\t\thk.Unreg(r.Name + hk.NameSuffix)\n\t}\n\tfor _, s := range r.rings {\n\t\tfreed += s.cleanup()\n\t}\n\tr.toGC.Add(freed)\n\tif r.doGC(sizeToGC, true) {\n\t\tgced = \" (GC-ed)\"\n\t}\n\tdebug.Infof(\"%s terminated%s\", r, gced)\n}", "title": "" }, { "docid": "a0aae37caddb0da394b27147b36d4e95", "score": "0.5103136", "text": "func (emfInstance *EMFAPI) Terminate() EMFErrorCode {\n\tif emfInstance.context != nil {\n\t\terr := emfInstance.context.Term()\n\t\tif nil != err {\n\t\t\tlogger.Error(\"EMF termination failed\")\n\t\t\treturn EMF_ERROR\n\t\t}\n\t\temfInstance.context = nil\n\t\tlogger.Debug(\"EMF terminated\")\n\t}\n\temfInstance.status = EMF_Terminated\n\treturn EMF_OK\n}", "title": "" }, { "docid": "073be01ec5fcbd3c0203fb2de9dc52cc", "score": "0.51008993", "text": "func (t *Transitive) Shutdown() error {\n\tt.Config.Context.Log.Info(\"shutting down consensus engine\")\n\treturn t.Config.VM.Shutdown()\n}", "title": "" }, { "docid": "e954540de1fdbaa20a2fee0c7894d10d", "score": "0.50988925", "text": "func main() {\n\t// Parse the CLI's attributes\n\tvar filename = flag.String(\"config\", \"\", \"configuration `file` for the dialect\")\n\tflag.BoolVar(&verbose, \"verbose\", false, \"verbose mode for debugging\")\n\tflag.Parse()\n\n\tif *filename == \"\" {\n\t\tflag.PrintDefaults()\n\t\tos.Exit(1)\n\t}\n\n\t// Set a prefix for the logger\n\tlog.SetPrefix(fmt.Sprintf(\"hamustro-%s \", Version))\n\n\t// Read and parse the configuration file\n\tconfig = NewConfig(*filename)\n\tif !config.IsValid() {\n\t\tlog.Fatalf(\"Config is incomplete, please define `dialect` and `shared_secret` property\")\n\t}\n\tdialect, err := config.DialectConfig()\n\tif err != nil {\n\t\tlog.Fatalf(\"Loading dialect configuration is failed: %s\", err.Error())\n\t}\n\tif !dialect.IsValid() {\n\t\tlog.Fatalf(\"Dialect configuration is incorrect or incomplete: %s\", err.Error())\n\t}\n\n\t// Construct the dialect's client\n\tstorageClient, err = dialect.NewClient()\n\tif err != nil {\n\t\tlog.Fatalf(\"Client initialization is failed: %s\", err.Error())\n\t}\n\n\t// Create the background workers\n\tjobQueue = make(chan *Job, config.GetMaxQueueSize())\n\tdispatcher = NewDispatcher(config.GetMaxWorkerSize(), config.GetBufferSize(), config.IsSpreadBuffer())\n\tdispatcher.Run()\n\n\t// Capture SIGINT and SIGTERM events to finish the ongoing work\n\tsignalChannel := make(chan os.Signal, 1)\n\tsignal.Notify(signalChannel, os.Interrupt)\n\tsignal.Notify(signalChannel, syscall.SIGTERM)\n\tgo func() {\n\t\t<-signalChannel\n\t\tcleanup()\n\t\tos.Exit(1)\n\t}()\n\n\t// Set the log's output\n\tif config.LogFile != \"\" {\n\t\tlogFile, err := os.OpenFile(config.LogFile, os.O_CREATE|os.O_RDWR|os.O_APPEND, 0666)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Can't open logfile %s\", err.Error())\n\t\t}\n\t\tdefer logFile.Close()\n\t\tlog.SetOutput(logFile)\n\t}\n\n\t// Start the server\n\tlog.Printf(\"Starting server at %s\", config.GetAddress())\n\thttp.HandleFunc(\"/api/v1/track\", TrackHandler)\n\thttp.ListenAndServe(config.GetAddress(), nil)\n}", "title": "" }, { "docid": "e231421718124c36d94eca8125d3f5ef", "score": "0.50986314", "text": "func (g *Graphite) Close() error {\n\tif g.Conn != nil {\n\t\treturn g.Conn.Close()\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4b716b6073904575d37a52f6f7ea4694", "score": "0.50909704", "text": "func (api *FooAPI) Quit(id discover.NodeID) error {\n\n\tlog.Info(\"quiting API\", \"peer\", id)\n\n\tif api.HelloMsgS[id] == nil {\n\t\treturn fmt.Errorf(\"unknown peer\")\n\t}\n\tapi.running = false\n\tclose(api.HelloMsgS[id])\n\treturn nil\n}", "title": "" }, { "docid": "b08466c402b0647f05309d34564b161a", "score": "0.50906515", "text": "func (b *Backend) Close() {\n\tb.conn.Disconnect(250) // wait 250 milisec to complete pending actions\n}", "title": "" }, { "docid": "c827c1cb232829f2471af3a20af5e342", "score": "0.50767386", "text": "func main() { exitFn(run()) }", "title": "" }, { "docid": "0028d41f6a655079397a9d31dc3acbda", "score": "0.50755095", "text": "func (c *GRPCCollector) Shutdown() { c.srv.Stop() }", "title": "" }, { "docid": "e0cd5c35410216d3a90c604939030bdd", "score": "0.50696343", "text": "func (r *Runner) Stop() { r.shut.Run() }", "title": "" }, { "docid": "d4acaa130a445da0ae0c759b08887400", "score": "0.5066961", "text": "func (v *Manager) Shutdown() {\n close(v.jobs) //now submission will panic\n}", "title": "" }, { "docid": "d94fff80e329bd56af70fdf8a2eed68e", "score": "0.50656766", "text": "func (s *BasepikeListener) ExitProgram(ctx *ProgramContext) {}", "title": "" }, { "docid": "3718c3f9b28e4eb03c08f97298b5b95d", "score": "0.5061031", "text": "func (executor *Executor) TearDown() {\n\texecutor.storage.Close()\n}", "title": "" }, { "docid": "f22851626fc60f3544564f0d58aa4a42", "score": "0.5052433", "text": "func onStop(ctx gl.Context) {\n\tenv.Unload(ctx)\n\tfor _, q := range quits {\n\t\tq <- struct{}{}\n\t}\n}", "title": "" }, { "docid": "b13ee12d333bd1745b3076d512815f10", "score": "0.50487155", "text": "func (ir *Runtime) Shutdown(force bool) error {\n\t_, err := ir.store.Shutdown(force)\n\treturn err\n}", "title": "" }, { "docid": "613a1d060454cfedc47c5480f3a6edbb", "score": "0.50478524", "text": "func (s *Kowala) Stop() error {\n\t// @NOTE (rgeraldes) - validator needs to be the first process\n\t// otherwise it might not be able to finish an election and\n\t// could be punished\n\ts.StopValidating()\n\ts.bloomIndexer.Close()\n\ts.blockchain.Stop()\n\ts.protocolManager.Stop()\n\ts.txPool.Stop()\n\ts.eventMux.Stop()\n\n\ts.chainDb.Close()\n\tclose(s.shutdownChan)\n\n\treturn nil\n}", "title": "" }, { "docid": "939e5f92b210bfab01b08f8f07801ebd", "score": "0.5047442", "text": "func (s *BaseCQLListener) ExitDestroy(ctx *DestroyContext) {}", "title": "" }, { "docid": "6f620a8fc409ae5b56e439e571cf3293", "score": "0.50462854", "text": "func Stop() {\n\texecutor.Stop()\n}", "title": "" }, { "docid": "986fda73fdc58a01f6117c6e0defdf1d", "score": "0.5043968", "text": "func (r *Runner) terminate() error {\n\tif r.cmd == nil {\n\t\treturn nil\n\t}\n\n\ttimer := time.NewTicker(time.Second)\n\tdone := make(chan error, 1)\n\n\t// Try to stop the running processes\n\tgo func() {\n\t\tdone <- r.cmd.Wait()\n\t}()\n\n\t// Wait for atleast one second for the process to stop\n\tselect {\n\tcase <-timer.C:\n\t\tr.cmd.Process.Kill()\n\t\t<-done\n\tcase err := <-done:\n\t\tif err != nil {\n\t\t\tif _, ok := err.(*exec.ExitError); !ok {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\tr.cmd = nil\n\treturn nil\n}", "title": "" }, { "docid": "560a543e72f46e2baf949f7b611a5a84", "score": "0.50416255", "text": "func (graph *CompletionGraph) handleTerminating(event *model.GraphTerminatingEvent, shouldTrigger bool) {\n\tgraph.log.Debug(\"Graph terminating\")\n\tgraph.state = StateTerminating\n\n\tgraph.terminationRoot.SetResult(model.NewSuccessfulResult(model.NewStateDatum(event.Status)))\n\n\tif shouldTrigger {\n\t\tgraph.triggerReadyStages()\n\t}\n\tgraph.checkForExecutionFinished()\n\n}", "title": "" }, { "docid": "b478ce84121faa662ad0d3fbe6fb611b", "score": "0.5036476", "text": "func (h *Handler) Terminate(w http.ResponseWriter, req *http.Request) *rest.Error {\n\tsessionID := req.URL.Query().Get(\"gid\")\n\tchannelID := req.URL.Query().Get(\"cid\")\n\tchannelType := req.URL.Query().Get(\"type\")\n\n\t// Validation\n\tif sessionID == \"\" || channelID == \"\" || channelType == \"\" {\n\t\treturn &rest.Error{\n\t\t\tExternalError: errors.Errorf(\"invalid parameters\"),\n\t\t\tCode: http.StatusBadRequest,\n\t\t}\n\t}\n\n\tsession := h.SessionManager.GetSessionByHash(sessionID)\n\tif session == nil {\n\t\treturn &rest.Error{\n\t\t\tExternalError: errors.Errorf(\"session not existed: session[%s]\", sessionID),\n\t\t\tCode: http.StatusNotFound,\n\t\t}\n\t}\n\n\tvar host = \"\"\n\tlogger.Infof(\"RTC terminate: channel[%s]\", channelID)\n\n\tip := session.IP\n\thost = fmt.Sprintf(\"%s:%s\", ip, rtcPort)\n\n\t// Relay to RTC server\n\tres, body, err := h.Manager.RelayRequestToRtc(host, \"http\", req)\n\tif err != nil {\n\t\tfmt.Fprint(w, jsonResponse{\"return_code\": -1, \"error\": jsonResponse{\n\t\t\t\"reason\": err}})\n\n\t\treturn nil\n\t}\n\n\tif res.StatusCode == http.StatusOK {\n\t\tgo h.SessionManager.ReleaseSession(session, h.InstanceManager.Detach)\n\n\t\tcopyHeader(w.Header(), res.Header)\n\t\tw.WriteHeader(res.StatusCode)\n\t\tfmt.Fprint(w, jsonResponse{\"return_code\": 0})\n\n\t\treturn nil\n\t}\n\n\tcopyHeader(w.Header(), res.Header)\n\tw.WriteHeader(res.StatusCode)\n\tw.Write([]byte(body))\n\n\treturn nil\n}", "title": "" }, { "docid": "dacf41bc616466287773be33353f069e", "score": "0.50364435", "text": "func (s *store) stopUsingGraphDriver() {\n\ts.graphLock.Unlock()\n}", "title": "" }, { "docid": "be760eec1d0c7351900b0234c6914e43", "score": "0.50345594", "text": "func (api *FooAPI) Quit(id enode.ID) error {\n\tdemo.LogDebug(\"quitting API\", \"peer\", id)\n\tif api.pingC[id] == nil {\n\t\treturn fmt.Errorf(\"unknown peer\")\n\t}\n\tapi.running = false\n\tclose(api.pingC[id])\n\treturn nil\n}", "title": "" }, { "docid": "081cd17f057ac0b5a070baa3ccb68471", "score": "0.5034215", "text": "func (p *Pipeline) Terminate(sig os.Signal) {\n\tp.sh.Ok()\n\thandleError(p.sh, p.terminate(sig))\n}", "title": "" }, { "docid": "7e66544a2f82d27df1336031a351d199", "score": "0.50279224", "text": "func (m *mngr) Stop() error {\n\treturn nil\n}", "title": "" }, { "docid": "0b126c93bf8ef2b028ba1124f64ae0ed", "score": "0.5022725", "text": "func (s *BasemodelicaListener) ExitRelation(ctx *RelationContext) {}", "title": "" }, { "docid": "144dae00dbfaccb7c2210ed84d0db2a6", "score": "0.50158", "text": "func Close() error {\n\treturn engine.Close()\n}", "title": "" }, { "docid": "c6a3511e2164a3a636cc20ba5a522774", "score": "0.5014493", "text": "func (e *Engine) Stop() {\n\tfor _, t := range e.tasks {\n\t\tt.Stop()\n\t}\n\te.log.Info(\"terminated\")\n}", "title": "" }, { "docid": "1303d5d5066306fb37885a9983569c87", "score": "0.5012633", "text": "func (c *Client) Terminate() (err error) {\n\terr = c.r.Call(\"rpc.Terminate\", struct{}{}, nil)\n\tif err == io.ErrUnexpectedEOF {\n\t\terr = nil\n\t}\n\treturn\n}", "title": "" }, { "docid": "54f7e872ea99060dc485d03dfff97754", "score": "0.5012122", "text": "func (e *Engine) Close() error {\n\te.Lock()\n\tdefer e.Unlock()\n\te.c.Cleanup() // frees all ancillary allocations in C land\n\tif e.c.Context == nil {\n\t\treturn nil\n\t}\n\tcu.SetCurrentContext(e.c.Context.CUDAContext())\n\n\t// Unload all modules (and consequently all functions)\n\tfor name, mod := range e.m {\n\t\tif err := mod.Unload(); err != nil {\n\t\t\treturn errors.Wrapf(err, \"Failed to unload module %v\", name)\n\t\t}\n\t}\n\n\t// Free all CUDA memory\n\tif e.a.start != 0 {\n\t\tcu.MemFree(cu.DevicePtr(e.a.start))\n\t}\n\te.a.reset()\n\n\tcloseB := func() error { return e.b.Close() }\n\n\tif err := e.c.Do(closeB); err != nil {\n\t\treturn errors.Wrap(e.err, \"Failed to close cuBLAS context\")\n\t}\n\n\tcloseN := func() error { return e.n.Close() }\n\n\tif err := e.c.Do(closeN); err != nil {\n\t\treturn errors.Wrap(e.err, \"Failed to close cuDNN context\")\n\t}\n\n\tif e.workAvailable != nil {\n\t\tclose(e.workAvailable)\n\t}\n\n\tif err := e.c.Close(); err != nil {\n\t\treturn errors.Wrapf(err, \"Failed to cloes CUDA Context \")\n\t}\n\n\truntime.Gosched() // make sure everyone has a fair play\n\te.finishChan <- struct{}{}\n\te.finishChan2 <- struct{}{} // wait\n\te.initialized = false\n\treturn nil\n}", "title": "" }, { "docid": "3ad688950f5a5a8c798ca9591bae3185", "score": "0.49979076", "text": "func end() {\n\tpid, err := getRunningPid()\n\tcheckErr(err)\n\n\tsyscall.Kill(pid, syscall.SIGTERM)\n}", "title": "" }, { "docid": "8fcc8e7dbe97355af3de95587ee04cf8", "score": "0.49956483", "text": "func (rt *Runtime) Stop() {\n\trt.listener.Close()\n}", "title": "" }, { "docid": "ea0c17692a505cb78813e5ce8825d761", "score": "0.49783143", "text": "func (ssm *StreamSimilarityManager) Quit() {\n\n\tif ssm.finalStatsOut == \"\" {\n\t\treturn\n\t}\n\n\tif encodedStats, err := json.MarshalIndent(ssm.allStats, \"\", \" \"); err != nil {\n\t\tlog.Error(\"Couldn't marshal results: \", err)\n\t} else if f, err := os.Create(ssm.finalStatsOut); err != nil {\n\t\tlog.Error(\"Couldn't create results file: \", err)\n\t} else if n, err := f.Write(encodedStats); (n != len(encodedStats)) || err != nil {\n\t\tlog.Error(\"Couldn't write to results file: \", err)\n\t} else {\n\t\tlog.Info(bytes.NewBuffer(encodedStats).String())\n\t\tf.Close()\n\t}\n}", "title": "" }, { "docid": "be0fed58a046215a793737d05bbfc4a9", "score": "0.497567", "text": "func Exit() error {\n\treturn fuseConn.Close()\n}", "title": "" }, { "docid": "20243fb7f5c5d2782218cc112b0cd533", "score": "0.49726662", "text": "func (s *BaseEsDslQueryListener) ExitDouble(ctx *DoubleContext) {}", "title": "" }, { "docid": "bbb0f8180a814f130fd6412f71a1de12", "score": "0.49723998", "text": "func (g *Graphite) Run() {\n\tlastEmission := time.Now()\n\tmetrics := make([]string, 0, g.maxBufferSize)\n\tlog.Info(\"graphite handler started\")\n\n\tfor metric := range g.Channel() {\n\t\tlog.Println(\"Sending metric to Graphite:\", metric)\n\t\tdatapoint := g.convertToGraphite(&metric)\n\n\t\tmetrics = append(metrics, datapoint)\n\n\t\t//if the datapoints from metric would overflow the buffer, flush it and then add the new datapoints\n\t\tif time.Since(lastEmission).Seconds() >= float64(g.interval) || len(metrics) >=g.maxBufferSize {\n\t\t\tg.emitMetrics(metrics)\n\t\t\tlastEmission = time.Now()\n\t\t\tmetrics = make([]string, 0, g.maxBufferSize)\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "ec58925fc09090e8fe2efd343944f2b2", "score": "0.49692133", "text": "func (r *Runtime) Shutdown(force bool) error {\n\tif !r.valid {\n\t\treturn nil\n\t}\n\n\tif r.workerChannel != nil {\n\t\tr.workerGroup.Wait()\n\t\tclose(r.workerChannel)\n\t}\n\n\tr.valid = false\n\n\t// Shutdown all containers if --force is given\n\tif force {\n\t\tctrs, err := r.state.AllContainers(false)\n\t\tif err != nil {\n\t\t\tlogrus.Errorf(\"Retrieving containers from database: %v\", err)\n\t\t} else {\n\t\t\tfor _, ctr := range ctrs {\n\t\t\t\tif err := ctr.StopWithTimeout(r.config.Engine.StopTimeout); err != nil {\n\t\t\t\t\tlogrus.Errorf(\"Stopping container %s: %v\", ctr.ID(), err)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tvar lastError error\n\t// If no store was requested, it can be nil and there is no need to\n\t// attempt to shut it down\n\tif r.store != nil {\n\t\t// Wait for the events to be written.\n\t\tif r.libimageEventsShutdown != nil {\n\t\t\t// Tell loop to shutdown\n\t\t\tr.libimageEventsShutdown <- true\n\t\t\t// Wait for close to signal shutdown\n\t\t\t<-r.libimageEventsShutdown\n\t\t}\n\n\t\t// Note that the libimage runtime shuts down the store.\n\t\tif err := r.libimageRuntime.Shutdown(force); err != nil {\n\t\t\tlastError = fmt.Errorf(\"shutting down container storage: %w\", err)\n\t\t}\n\t}\n\tif err := r.state.Close(); err != nil {\n\t\tif lastError != nil {\n\t\t\tlogrus.Error(lastError)\n\t\t}\n\t\tlastError = err\n\t}\n\n\treturn lastError\n}", "title": "" }, { "docid": "f5689f828e8b0545155098c3ac9d703f", "score": "0.49644348", "text": "func (k *Kite) Close() {\n\tk.Log.Info(\"Closing kite...\")\n\n\tk.kontrol.Lock()\n\tif k.kontrol != nil && k.kontrol.Client != nil {\n\t\tk.kontrol.Close()\n\t}\n\tk.kontrol.Unlock()\n\n\tif k.listener != nil {\n\t\tk.listener.Close()\n\t\tk.listener = nil\n\t}\n\n\tk.mu.Lock()\n\tcache := k.verifyCache\n\tk.mu.Unlock()\n\n\tif cache != nil {\n\t\tcache.StopGC()\n\t}\n}", "title": "" }, { "docid": "f63f64c22a24f77c3b6fe09eeedd1333", "score": "0.4960638", "text": "func (s *BaseDynamoDbGrammarListener) ExitStar(ctx *StarContext) {}", "title": "" }, { "docid": "999b49fd3f9a3311f5282fa0cdf2d250", "score": "0.4958534", "text": "func (eng *Engine) Close(ctx context.Context) (err error) {\n\treturn nil\n}", "title": "" }, { "docid": "e25d1205351ce268d8616200b3b97298", "score": "0.4957392", "text": "func Stop() {\n\tservices.DeRegisterblobgeter(Instance)\n\tservices.DeRegistercommitgeter(Instance)\n\tservices.DeRegistertaggeter(Instance)\n\tservices.DeRegistertagsgeter(Instance)\n\tservices.DeRegisterkeygeter(Instance)\n\tservices.DeRegisterblobposter(Instance)\n\tservices.DeRegistercommitposter(Instance)\n\tservices.DeRegistertagposter(Instance)\n\tservices.DeRegisterkeyposter(Instance)\n\trunning = false\n}", "title": "" } ]
b7654303a4eb909756f4e2cdaba6770e
Register a new channel with a name to subscribe. The sizeOfBuffer is the size of the queue. Returns a channel that is triggered if the buffer is ever full
[ { "docid": "6e889f0a464adba3c62f88f7ecc58f3b", "score": "0.6977549", "text": "func Register(name string, sizeOfBuffer int) {\n\tmutex.Lock()\n\tif channels == nil {\n\t\tchannels = make(map[string]*channelStruct)\n\t}\n\tmutex.Unlock()\n\n\tchannelStruct := channelStruct{\n\t\tready: true,\n\t\tcloser: make(chan bool),\n\t\tbufferSize: sizeOfBuffer,\n\t}\n\t// Lock the map to write the channel\n\tmutex.Lock()\n\tchannels[name] = &channelStruct\n\tmutex.Unlock()\n}", "title": "" } ]
[ { "docid": "9e0ffce342c52b3d141e0cf567762bc0", "score": "0.6185562", "text": "func Subscribe(name string) (Channel, chan bool) {\n\tdefer mutex.Unlock()\n\tmutex.Lock()\n\n\tif channel, ok := channels[name]; ok {\n\t\treader := make(Channel, channel.bufferSize)\n\t\tchannels[name].subscribers = append(channel.subscribers, reader)\n\t\treturn reader, channels[name].closer\n\t}\n\n\tpanic(fmt.Sprintf(\"The channel %s was not registered\", name))\n}", "title": "" }, { "docid": "5ebdd800dccbffbd7e66612f9c8f5341", "score": "0.5860976", "text": "func (b *BroadcastManager) Subscribe() (chan string, func()) {\n\tb.Lock()\n\tdefer b.Unlock()\n\n\tch := make(chan string, bufferSize)\n\tb.subs[ch] = struct{}{}\n\n\t// Returns function for unregistering, this can be deferred in the caller of Subscribe().\n\treturn ch, func() {\n\t\tb.Lock()\n\t\tdefer b.Unlock()\n\n\t\tdelete(b.subs, ch)\n\t}\n}", "title": "" }, { "docid": "4e486f4ed802a13fdefdcaa284eccd2e", "score": "0.5775727", "text": "func (t *Topic) Subscribe(subscriberName string) chan []byte {\n\treceiveChan := make(chan []byte)\n\tsubscriber := &Consumer{\n\t\tName: subscriberName,\n\t\tReceive: receiveChan,\n\t\tLastRead: t.oldestIndex,\n\t}\n\tt.subscribeChan <- subscriber\n\treturn receiveChan\n}", "title": "" }, { "docid": "933ec093525957b7dd479372cc3ded52", "score": "0.5768511", "text": "func (r *Registry) Subscribe(name string, c chan EventBlock) {\n\tr.m.Lock()\n\tdefer r.m.Unlock()\n\tif _, ok := r.subscriptions[name]; !ok {\n\t\tr.subscriptions[name] = c\n\t}\n\tif r.log != nil {\n\t\tr.log.Println(`subscribed ` + name)\n\t}\n}", "title": "" }, { "docid": "1b9880454921ab5d3f41c68290e98b25", "score": "0.5760581", "text": "func (m *Queue) Subscribe(name string, handler queue.Consumer, opts ...queue.SubscribeOption) error {\n\toptions := queue.EmptySubscribeOptions()\n\tfor _, o := range opts {\n\t\to(options)\n\t}\n\tif err := queue.BackendImplementor().Ping(); err != nil {\n\t\treturn err\n\t}\n\tmessageChan := make(chan queue.MessageWrapper)\n\tif err := queue.BackendImplementor().Read(options.Context, name, options.Topic, messageChan); err != nil {\n\t\treturn err\n\t}\n\tfor i := 0; i < options.Concurrency; i++ {\n\t\tgo m.process(messageChan, handler, options)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a60b1f02670b0eb75d0e6737404fb2ae", "score": "0.5736857", "text": "func (s *provider) Subscribe(channel bus.ChannelName, queue chan bus.RawMessage) error {\n\treturn s.SubscribeStr(channel.String(), queue)\n}", "title": "" }, { "docid": "72d3fc26ca77ca01dcd15307cb1889c8", "score": "0.572025", "text": "func NewNamedBufferedChannel(ctx Context, name string, size int) Channel {\n\treturn internal.NewNamedBufferedChannel(ctx, name, size)\n}", "title": "" }, { "docid": "e31f6d26c29ed5b326dfe45c9c569ee3", "score": "0.55995053", "text": "func (s *MessageQueue) Subscribe(ctx context.Context) (string, error) {\n\tfor {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\treturn \"\", ctx.Err()\n\t\tdefault:\n\t\t}\n\t\tmsg, err := redisClient.BRPopLPush(mq.SyncChannelKey, mq.SyncPendingChannelKey, 5*time.Second).Result()\n\t\t// If timeout is reached, a redis.Nil will be returned\n\t\tif err == redis.Nil {\n\t\t\tcontinue\n\t\t}\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\treturn msg, nil\n\t}\n}", "title": "" }, { "docid": "64cf2ecff4de530a477fd04395e94655", "score": "0.5586631", "text": "func NewChannelWithSize(bufSize int) *Channel {\n\treturn &Channel{ch: make(chan interface{}, bufSize)}\n}", "title": "" }, { "docid": "712b3b1b3bd5ce70eac227e76522066d", "score": "0.5573096", "text": "func SubscriberBufferSize(a int) SubscriberOption {\n\treturn func(subscriber *Subscriber) {\n\t\tsubscriber.opts.channelBuffer = a\n\t}\n}", "title": "" }, { "docid": "74cbf8e73c804a8241aa1a9c02d818a1", "score": "0.55331117", "text": "func Subscribe(ch *amqp.Channel,\n\tconf Config,\n\tcallback callbackFunc) {\n\n\tmsg, err := ch.Consume(conf.Queue, // queue name\n\t\t\"\", // consumer\n\t\ttrue, // auto acknolage\n\t\tfalse, // exclusice\n\t\tfalse, // no local\n\t\tfalse, // no wait\n\t\tnil) // arguments\n\n\tfailOnError(err, \"metaRabbitMQAdapter::: Failed to register a consumer\")\n\n\tforever := make(chan bool)\n\n\tgo callback(msg)\n\n\tlog.Printf(\"metaRabbitMQAdapter::: [*] Waiting for messages. To exit press CTRL+C\")\n\n\t<-forever // wait forever or until goroutine finished (never happen)\n}", "title": "" }, { "docid": "3e2cf5741ec84f7fcc18c0b9f046a535", "score": "0.5505464", "text": "func (q *Queue) Listen(count int) <-chan *QueueMessage {\n\n\tif count < 1 {\n\t\tpanic(fmt.Sprintf(\"Listen on queue with count < 1 - received: %d\", count))\n\t}\n\n\tif q.listening() {\n\t\treturn q.channel\n\t}\n\n\tq.mux.Lock()\n\tdefer q.mux.Unlock()\n\n\tq.channel = make(chan *QueueMessage)\n\tq.running = true\n\n\tq.wg.Add(count)\n\tfor i := 0; i < count; i++ {\n\t\tgo q.listen()\n\t}\n\n\treturn q.channel\n}", "title": "" }, { "docid": "5c4cf71e9d48a7d8d69cf14cc99f5b59", "score": "0.5476701", "text": "func (b *NsqBus) Subscribe(channel string, queue chan bus.RawMessage) error {\n\tb.Lock()\n\tdefer b.Unlock()\n\n\tif _, ok := b.consumers[channel]; ok {\n\t\tb.logger.Warn(\"Trying to subscribe to the same channel twice\",\n\t\t\tcommon.LogChannelToken, channel)\n\t\treturn nil\n\t}\n\n\tq, err := nsq.NewConsumer(channel, \"gh\", b.config)\n\tif err != nil {\n\t\tb.logger.Error(\"Failed to subscribe to the channel\", err, common.LogChannelToken, channel)\n\t\treturn errors.Wrap(err, \"consumer init failed\")\n\t}\n\n\tq.AddHandler(nsq.HandlerFunc(func(message *nsq.Message) error {\n\t\tb.Lock()\n\t\tdefer b.Unlock()\n\t\t_, ok := b.consumers[channel]\n\t\tif !ok {\n\t\t\treturn nil\n\t\t}\n\n\t\tmsg := bus.RawMessage{\n\t\t\tBody: make([]byte, len(message.Body)),\n\t\t}\n\t\tcopy(msg.Body, message.Body)\n\t\tqueue <- msg\n\t\treturn nil\n\t}))\n\n\tq.SetLogger(&nsqLogger{logger: b.logger}, nsqLogLevel)\n\n\terr = q.ConnectToNSQD(b.Settings.ServerAddress)\n\tif err != nil {\n\t\tb.logger.Error(\"Failed to connect to nsq while subscribing\", err, common.LogChannelToken, channel)\n\t\treturn errors.Wrap(err, \"connection to bus failed\")\n\t}\n\n\tb.logger.Debug(\"Successfully subscribed to nsq channel\", common.LogChannelToken, channel)\n\tb.consumers[channel] = q\n\n\treturn nil\n}", "title": "" }, { "docid": "c6b32268984370765b9aa55f19f2fe0b", "score": "0.5460242", "text": "func (b *Broker) Subscribe() chan *Message {\n\t// log.S(\"topic\", b.topic).Debug(\"subscribe\")\n\tch := make(chan *Message, 128)\n\tif b.state != nil {\n\t\tgo func() {\n\t\t\tb.removeLock.RLock()\n\t\t\tdefer b.removeLock.RUnlock()\n\t\t\tb.state.waitTouch() // ceka barem jednu poruku u bufferu\n\t\t\tb.state.emit(ch) // salje sve poruke u bufferu (fullove)\n\t\t\tb.setSubscriber(ch, true) // sad subscriber moze primati diffove\n\t\t}()\n\t}\n\treturn ch\n}", "title": "" }, { "docid": "90f8b3650d03c0e857cc12857c0d3e07", "score": "0.5443489", "text": "func (q *FileQueue) Subscribe(fn func(int64, []byte, error)) error {\n\tif q.enqueueChan == nil {\n\t\treturn ErrSubscribeFailedNoOpenErr\n\t}\n\n\tif q.subscriber != nil {\n\t\treturn ErrSubscribeExistErr\n\t}\n\tq.subscriber = fn\n\tgo q.doLoopSubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "06465ec71f3bb1bcb593a11878da3af2", "score": "0.5441601", "text": "func (c *conn) subscribe(protoID uint32) (<-chan []byte, error) {\n\tc.lock.Lock()\n\tdefer c.lock.Unlock()\n\tif c.closed {\n\t\treturn nil, ErrConnClosed\n\t}\n\n\tif c.queue[protoID] != nil {\n\t\treturn nil, fmt.Errorf(\"subscribe to duplicated protoID\")\n\t}\n\tout := make(chan []byte)\n\tc.queue[protoID] = newNotifyRespHandler(out)\n\treturn out, nil\n}", "title": "" }, { "docid": "795d60ff07818946878aa30227f0652f", "score": "0.54193133", "text": "func (c *EncodedConn) QueueSubscribe(subject, queue string, cb nats.Handler) (*EncodedSubscription, error) {\n\treturn c.subscribe(subject, queue, cb)\n}", "title": "" }, { "docid": "7ac3104c39180aba7592a7cf2341abe7", "score": "0.5419008", "text": "func NewBufferedChan(ctx context.Context, chanSize int, bufferSize int) *BufferedChan {\n\tpool := &sync.Pool{\n\t\tNew: func() interface{} {\n\t\t\treturn make([]interface{}, 0, bufferSize)\n\t\t},\n\t}\n\treturn &BufferedChan{\n\t\tc: make(chan []interface{}, chanSize),\n\t\tpool: pool,\n\t\tputSlice: pool.Get().([]interface{}),\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "3836b5792fd6f0519880110b597c322a", "score": "0.5407726", "text": "func NewChan(bufferCapacity int, endpointCapacity int) *Chan {\n\n\tsize := uint64(1) << uint(math.Ceil(math.Log2(float64(bufferCapacity))))\n\tc := &Chan{\n\t\tend:\t\tsize,\n\t\tmod:\t\tsize - 1,\n\t\tbuffer:\t\tmake([]interface{}, size),\n\t\tstart:\t\ttime.Now(),\n\t\twritten:\tmake([]int64, size),\n\t\tendpoints: endpoints{\n\t\t\tentry: make([]Endpoint, endpointCapacity),\n\t\t},\n\t}\n\tc.receivers = sync.NewCond(c)\n\treturn c\n}", "title": "" }, { "docid": "672df1efa181d63f301aa02bc0c8a7f3", "score": "0.5377187", "text": "func (np *NowPlaying) Subscribe(c chan string) {\n\tnp.Lock()\n\tdefer np.Unlock()\n\tnp.subscribers = append(np.subscribers, c)\n}", "title": "" }, { "docid": "e40869b0b1998369497fdcd00a233bef", "score": "0.53293097", "text": "func (d *Dispatcher) subscribe(id uuid.UUID) (chan interface{}, error) {\n\tif atomic.LoadUint32(&d.running) == 0 {\n\t\treturn nil, errors.New(errNotInitialised)\n\t}\n\n\t// Read lock to read route list\n\td.rMtx.RLock()\n\t_, ok := d.routes[id]\n\td.rMtx.RUnlock()\n\tif !ok {\n\t\treturn nil, errors.New(\"dispatcher uuid not found in route list\")\n\t}\n\n\t// Get an unused channel from the channel pool\n\tunusedChan, ok := d.outbound.Get().(chan interface{})\n\tif !ok {\n\t\treturn nil, errors.New(\"unable to type assert unusedChan\")\n\t}\n\n\t// Lock for writing to the route list\n\td.rMtx.Lock()\n\td.routes[id] = append(d.routes[id], unusedChan)\n\td.rMtx.Unlock()\n\n\treturn unusedChan, nil\n}", "title": "" }, { "docid": "5e3852dac10ac876dd64075cbfe3c628", "score": "0.53259814", "text": "func (m *MessagingClient) Subscribe(exchangeName, exchangeType, queueName, bindingKey, consumerName string, handleFunc func(amqp.Delivery)) error {\n\tch, err := m.conn.Channel()\n\tif err != nil {\n\t\treturn errors.New(strings.Join([]string{\"Subscribe channel error: \"}, err.Error()))\n\t}\n\tExChangeDeclare(exchangeName, exchangeType, ch)\n\tqueue := QueueDeclare(queueName, ch)\n\n\terr = ch.QueueBind(\n\t\tqueue.Name,\n\t\tbindingKey,\n\t\texchangeName,\n\t\tfalse,\n\t\tnil,\n\t)\n\tif err != nil {\n\t\treturn errors.New(strings.Join([]string{\"Subscribe queue bind error: \", err.Error()}, \"\"))\n\t}\n\tmsgs, err := ch.Consume(\n\t\tqueue.Name,\n\t\tconsumerName,\n\t\ttrue,\n\t\tfalse,\n\t\tfalse,\n\t\tfalse,\n\t\tnil,\n\t)\n\tgo consumeLoop(msgs, handleFunc)\n\treturn nil\n}", "title": "" }, { "docid": "7829d004aec7f26abf8f3f27359e7dfd", "score": "0.5325589", "text": "func Subscribe(channel string) (listener chan Message) {\n\tlistener = make(chan Message)\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tif listeners[channel] == nil {\n\t\tlisteners[channel] = make([]chan Message, 0)\n\t}\n\tlisteners[channel] = append(listeners[channel], listener)\n\treturn\n}", "title": "" }, { "docid": "4da51acddbe9abe7461e142ebc6256a0", "score": "0.5316659", "text": "func (rabbit *Connector) SubscribeToQueue(\n\tqName, consumerName string, handlerFunc func(amqp.Delivery) error, closeCh chan bool, durable bool,\n) error {\n\tch, err := rabbit.conn.Channel()\n\tfailOnError(err, \"Failed to open a channel\")\n\n\tqueue, err := ch.QueueDeclare(\n\t\tqName, // name of the queue\n\t\tdurable, // durable\n\t\tfalse, // delete when usused\n\t\tfalse, // exclusive\n\t\tfalse, // noWait\n\t\tnil, // arguments\n\t)\n\tfailOnError(err, \"Failed to register an Queue\")\n\n\tmsgs, err := ch.Consume(\n\t\tqueue.Name, // queue\n\t\tconsumerName, // consumer\n\t\tfalse, // auto-ack\n\t\tfalse, // exclusive\n\t\tfalse, // no-local\n\t\tfalse, // no-wait\n\t\tnil, // args\n\t)\n\tfailOnError(err, \"Failed to register a consumer\")\n\n\tgo rabbit.consumeLoop(msgs, handlerFunc, closeCh)\n\treturn nil\n}", "title": "" }, { "docid": "9de89e62c1e59d388adfe1d6ecf11a2b", "score": "0.53134316", "text": "func New[T any](capacity int) *ChannelQueue[T] {\n\tif capacity == 0 {\n\t\tpanic(\"unbuffered behavior not supported\")\n\t}\n\tif capacity < 0 {\n\t\tcapacity = -1\n\t}\n\tcq := &ChannelQueue[T]{\n\t\tinput: make(chan T),\n\t\toutput: make(chan T),\n\t\tlength: make(chan int),\n\t\tcapacity: capacity,\n\t}\n\tgo cq.bufferData()\n\treturn cq\n}", "title": "" }, { "docid": "ae1b82e464585f12eb690082e11f6906", "score": "0.53113097", "text": "func (s *Store) Subscribe(ctx context.Context, key string) (chan *pb.FetchResponse, error) {\n\tnewID := atomic.AddUint64(&s.nextSubscriptionID, 1)\n\tnewSub := subscription{\n\t\tkey: key,\n\t\tid: newID,\n\t\tctx: ctx,\n\t\t// create the channel for pushing updates to the subscriber\n\t\tstream: make(chan *pb.FetchResponse, s.requestChanBufSize),\n\t}\n\n\tselect {\n\tcase s.subscribeQueue <- newSub:\n\t\treturn newSub.stream, nil\n\tdefault:\n\t\treturn nil, ErrStoreBackpressure\n\t}\n}", "title": "" }, { "docid": "b9ebcf435f2cfa4f49660930ebf59a45", "score": "0.53071666", "text": "func (pf *PublisherSubscriberFactory) QueueSubscribe(topic string, grp string, id string, receiver pubsubs.Receiver) (*Subscription, error) {\n\tif topic == \"\" {\n\t\treturn nil, errors.New(\"topic value can not be empty\")\n\t}\n\n\tif grp == \"\" {\n\t\treturn nil, errors.New(\"grp value can not be empty\")\n\t}\n\n\tif id == \"\" {\n\t\treturn nil, errors.New(\"id value can not be empty\")\n\t}\n\n\tvar subid = fmt.Sprintf(pubsubs.SubscriberTopicFormat, \"segment/kafka\", pf.config.ProjectID, topic, id)\n\tvar sub Subscription\n\tsub.id = subid\n\tsub.group = grp\n\tsub.queue = true\n\tsub.topic = topic\n\tsub.config = &pf.config\n\tsub.log = pf.config.Log\n\tsub.receiver = receiver\n\tsub.ctx, sub.canceler = context.WithCancel(pf.ctx)\n\n\tif err := sub.init(); err != nil {\n\t\treturn nil, errors.Wrap(err, \"Failed to create subscription\")\n\t}\n\n\tpf.sl.Lock()\n\tpf.subs[sub.id] = &sub\n\tpf.sl.Unlock()\n\n\treturn &sub, nil\n}", "title": "" }, { "docid": "1551556a19aa37f1a51b4d71a85d359d", "score": "0.53004336", "text": "func (c *creator) Subscribe(ctx context.Context, eventType core.EventType) <-chan *core.EventData {\n\tc.Lock()\n\tdefer c.Unlock()\n\thandler := make(chan *core.EventData, maxChanSize)\n\t_, ok := c.subs[eventType]\n\tif !ok {\n\t\tc.subs[eventType] = []chan *core.EventData{}\n\t}\n\tc.subs[eventType] = append(c.subs[eventType], handler)\n\n\tgo func() {\n\t\t<-ctx.Done()\n\t\tc.Lock()\n\t\tdefer c.Unlock()\n\t\tclose(handler)\n\t}()\n\n\treturn handler\n}", "title": "" }, { "docid": "67084e7615a96b81f4c81bd56fa927d6", "score": "0.5290951", "text": "func (b *Bot) Subscribe(id string) chan interface{} {\n\tb.mx.Lock()\n\tdefer b.mx.Unlock()\n\tc := make(chan interface{}, 10)\n\tb.subs[id] = c\n\treturn c\n}", "title": "" }, { "docid": "4ab7d8dfbb910c8a410d3645827fa97f", "score": "0.528254", "text": "func (r *RMQListener) Subscribe(consume bool) {\n\tlogger.InfoJ(r.lc, fmt.Sprint(r.lMask, \"Subscribing\"))\n\n\tvar err error\n\n\tif !r.hasConnection() {\n\t\tlogger.ErrorJ(r.lc, fmt.Sprint(r.lMask, \"Subscribing is failed, RMQ connection is closed\"))\n\t\treturn\n\t}\n\n\tr.amqpChannel, err = r.conn.Channel()\n\tif err != nil {\n\t\tlogger.ErrorJ(r.lc, fmt.Sprint(r.lMask, \"Could not open RMQ channel: \", err.Error()))\n\t\treturn\n\t}\n\tdefer r.amqpChannel.Close()\n\n\tif err := r.amqpChannel.ExchangeDeclare(\n\t\tr.exchange,\n\t\t\"direct\",\n\t\ttrue,\n\t\tfalse,\n\t\tfalse,\n\t\tfalse,\n\t\tnil); err != nil {\n\t\tlogger.ErrorJ(r.lc, fmt.Sprint(r.lMask, \"Can not declare exchange: \", err.Error()))\n\t\treturn\n\t}\n\n\tif !consume {\n\t\treturn\n\t}\n\n\tr.amqpQueue, err = r.amqpChannel.QueueDeclare(r.queue, true, false, false, false, nil)\n\tif err != nil {\n\t\tlogger.ErrorJ(r.lc, fmt.Sprint(r.lMask, \"Error queue declaring: \", err.Error()))\n\t\treturn\n\t}\n\n\tif err := r.amqpChannel.QueueBind(r.queue, \"\", r.exchange, false, nil); err != nil {\n\t\tlogger.ErrorJ(r.lc, fmt.Sprint(r.lMask, \"Error binding the queue: \", err.Error()))\n\t\treturn\n\t}\n\n\tr.amqpDelivery, err = r.amqpChannel.Consume(r.queue, \"\", false, false, false, false, nil)\n\tif err != nil {\n\t\tlogger.ErrorJ(r.lc, fmt.Sprint(r.lMask, \"Error consuming the queue: \", err.Error()))\n\t\treturn\n\t}\n\n\tr.consumer()\n}", "title": "" }, { "docid": "02c4d278339744863efc75c0f63e061c", "score": "0.52540684", "text": "func (bh *ByteHub) Subscribe(id int, ch chan<- []byte) error {\n\tbh.Lock()\n\n\tif _, ok := bh.subscribers[id]; ok {\n\t\tbh.Unlock()\n\t\treturn errors.New(\"subscriber already exists\")\n\t}\n\n\tbh.subscribers[id] = ch\n\n\tbh.Unlock()\n\treturn nil\n}", "title": "" }, { "docid": "14ff622acbddd035c6a0219792f1200e", "score": "0.52495474", "text": "func (p *platform) QueueSubscribe() error {\n\treturn p.Send(messages.New(\"queue:subscribe\", libs.JSONObject{}))\n}", "title": "" }, { "docid": "577fbb6f60d40cf9b10ee1b89bb1683b", "score": "0.5241404", "text": "func (p *Pubsub) Subscribe(topics ...string) chan interface{} {\n\t// init new chan using capacity as channel buffer\n\tworkChan := make(chan interface{}, p.capacity)\n\tp.updateTopicMapClient(workChan, topics)\n\treturn workChan\n}", "title": "" }, { "docid": "5eb74fb310078e2d06101452d3a590ca", "score": "0.5239735", "text": "func (disco *DiscoveryService) Subscribe(clientName string) chan []byte {\n\tdisco.mtx.Lock()\n\tdefer disco.mtx.Unlock()\n\n\tlog.Infof(\"Subscribing client: [%s]\", clientName)\n\tclientChan := make(chan []byte)\n\tdisco.clientChannels[clientName] = clientChan\n\n\treturn clientChan\n}", "title": "" }, { "docid": "eda911655601d701c78f12d7af9144c2", "score": "0.5235017", "text": "func newSubscriber(ctx context.Context, ch chan mq.Message) func(client mq.Client, message mq.Message) {\n\treturn func(client mq.Client, message mq.Message) {\n\t\tt := message.Topic()\n\t\tm := message.Payload()\n\t\tvenom.Debug(ctx, \"rx message in subscribe handler: %s len(%d), %v\", t, len(m), m)\n\t\tch <- message\n\t}\n}", "title": "" }, { "docid": "e99bbc8fef1448cae4e1fe395d9b26a7", "score": "0.5211263", "text": "func (p *Provider) Subscribe(ctx context.Context, ch chan<- ctpb.Entry) {\n\tvar i int\n\tsub := &subscriber{ch, nil}\n\tp.mu.Lock()\n\tfor i = 0; i < len(p.mu.subscribers); i++ {\n\t\tif p.mu.subscribers[i] == nil {\n\t\t\tp.mu.subscribers[i] = sub\n\t\t\tbreak\n\t\t}\n\t}\n\tif i == len(p.mu.subscribers) {\n\t\tp.mu.subscribers = append(p.mu.subscribers, sub)\n\t}\n\tdraining := p.mu.draining\n\tp.mu.Unlock()\n\n\tdefer func() {\n\t\tp.mu.Lock()\n\t\tp.mu.subscribers[i] = nil\n\t\tp.mu.Unlock()\n\t\tclose(ch)\n\t}()\n\n\tif draining {\n\t\treturn\n\t}\n\n\tif log.V(1) {\n\t\tlog.Infof(ctx, \"new subscriber (slot %d) connected\", i)\n\t}\n\n\t// The subscription is already active, so any storage snapshot from now on is\n\t// going to fully catch up the subscriber without a gap.\n\t{\n\t\tvar entries []ctpb.Entry\n\n\t\tp.cfg.Storage.VisitAscending(p.cfg.NodeID, func(entry ctpb.Entry) (done bool) {\n\t\t\t// Don't block in this method.\n\t\t\tentries = append(entries, entry)\n\t\t\treturn false // not done\n\t\t})\n\n\t\tfor _, entry := range entries {\n\t\t\tselect {\n\t\t\tcase ch <- entry:\n\t\t\tcase <-p.cfg.Stopper.ShouldQuiesce():\n\t\t\t\treturn\n\t\t\tcase <-ctx.Done():\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\n\tfor {\n\t\tp.mu.RLock()\n\t\tvar done bool\n\t\tfor len(p.mu.subscribers[i].queue) == 0 {\n\t\t\tif ctx.Err() != nil || p.mu.draining {\n\t\t\t\tdone = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tp.mu.Wait()\n\t\t}\n\t\tvar queue []ctpb.Entry\n\t\t// When only readers are around (as they are now), we can actually\n\t\t// mutate our slot because that's all the others do as well.\n\t\tqueue, p.mu.subscribers[i].queue = p.mu.subscribers[i].queue, nil\n\t\tp.mu.RUnlock()\n\n\t\tif done {\n\t\t\treturn\n\t\t}\n\n\t\tshouldLog := log.V(1)\n\t\tvar n int\n\t\tminMLAI := ctpb.LAI(math.MaxInt64)\n\t\tvar minRangeID, maxRangeID roachpb.RangeID\n\t\tvar maxMLAI ctpb.LAI\n\n\t\tfor _, entry := range queue {\n\t\t\tif shouldLog {\n\t\t\t\tn += len(entry.MLAI)\n\t\t\t\tfor rangeID, mlai := range entry.MLAI {\n\t\t\t\t\tif mlai < minMLAI {\n\t\t\t\t\t\tminMLAI = mlai\n\t\t\t\t\t\tminRangeID = rangeID\n\t\t\t\t\t}\n\t\t\t\t\tif mlai > maxMLAI {\n\t\t\t\t\t\tmaxMLAI = mlai\n\t\t\t\t\t\tmaxRangeID = rangeID\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tselect {\n\t\t\tcase ch <- entry:\n\t\t\tcase <-p.cfg.Stopper.ShouldQuiesce():\n\t\t\t\treturn\n\t\t\tcase <-ctx.Done():\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif shouldLog {\n\t\t\tlog.Infof(ctx, \"sent %d closed timestamp entries to client %d (%d range updates total, min/max mlai: %d@r%d / %d@r%d)\", len(queue), i, n, minMLAI, minRangeID, maxMLAI, maxRangeID)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2415887b19dc97f52875b3493afb66a8", "score": "0.5204115", "text": "func (m *MangosClient) Subscribe(filter string, handler PayloadHandler) (chan string, error) {\n\tvar sock mangos.Socket\n\tvar err error\n\n\t_, _, found := m.payloadHandlers.Get(filter)\n\tif found {\n\t\t// There's already a listener, just swap out the handler\n\t\tm.registerHandlerForChannel(sock, filter, handler)\n\t\treturn m.SubscribeChan, nil\n\t}\n\n\tif sock, err = sub.NewSocket(); err != nil {\n\t\treturn m.SubscribeChan, fmt.Errorf(\"can't get new sub socket: %s\", err.Error())\n\t}\n\tsock.AddTransport(tcp.NewTransport())\n\n\tlog.Info(\"Dialing: \", m.URL)\n\tif err = sock.Dial(m.URL); err != nil {\n\t\treturn m.SubscribeChan, fmt.Errorf(\"can't dial on sub socket: %s\", err.Error())\n\t}\n\n\terr = sock.SetOption(mangos.OptionSubscribe, []byte(filter))\n\t//err = sock.SetOption(mangos.OptionSubscribe, []byte(\"\"))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tm.registerHandlerForChannel(sock, filter, handler)\n\n\tgo m.startListening(sock, filter)\n\treturn m.SubscribeChan, nil\n}", "title": "" }, { "docid": "f643b079dafcbc2793dba3eb7182d628", "score": "0.5185238", "text": "func (b *Broker) Subscribe() chan interface{} {\n\tmsgCh := make(chan interface{}, 5)\n\tb.subCh <- msgCh\n\treturn msgCh\n}", "title": "" }, { "docid": "5db73f50031ec9869df843470cc5e965", "score": "0.5170629", "text": "func (c *EncodedConn) subscribe(subject, queue string, cb nats.Handler) (*EncodedSubscription, error) {\n\tif cb == nil {\n\t\treturn c.SubscribeSync(subject)\n\t}\n\tes := EncodedSubscription{nil, c.Enc}\n\thandler, err := es.makeMsgHandler(cb)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tes.Subscription, err = c.Conn.QueueSubscribe(subject, queue, handler)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &es, nil\n}", "title": "" }, { "docid": "e8860b62023d112995d29668e1c65414", "score": "0.51674503", "text": "func (s *natsServer) subscribe(subject, queue string) (<-chan *nats.Msg, error) {\n\trecv := make(chan *nats.Msg) // make an inbound chan\n\tf := func(msg *nats.Msg) {\n\t\trecv <- msg\n\t}\n\n\tsub, err := s.conn.QueueSubscribe(subject, queue, f)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ts.subs = append(s.subs, sub)\n\n\treturn recv, nil\n}", "title": "" }, { "docid": "bde81c3721db1c1ad4700d6e4bedd3b4", "score": "0.51346827", "text": "func SubBuffer(size int) queue.SubBinding {\n\treturn func(s queue.Subscriber) (queue.Subscriber, error) {\n\t\tif size <= 0 {\n\t\t\treturn nil, fmt.Errorf(\"SubBuffer expects positive size, got %d\", size)\n\t\t}\n\n\t\tsS, err := getSubSocket(s)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif sS == nil {\n\t\t\treturn nil, fmt.Errorf(\"SubBuffer expects non-nil socket, use Sub or XSub first\")\n\t\t}\n\n\t\tif err := sS.SetOption(mangos.OptionReadQLen, size); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treturn s, nil\n\t}\n}", "title": "" }, { "docid": "bb9e0baf133f7f597e86402ad9a0caf4", "score": "0.5133476", "text": "func (e *Exchange) Subscribe(qtype string) <-chan mq.Value {\n\te.qtype = qtype\n\te.rcvCh = make(chan mq.Value)\n\treturn e.rcvCh\n}", "title": "" }, { "docid": "ac91d4cbea2cd879c5e0abe3364fe14f", "score": "0.5129768", "text": "func (ch *Channel) Subscribe(s *Socket) {\n\tch.Lock()\n\tdefer ch.Unlock()\n\n\tif _, present := ch.subscribers[s.client.id]; present {\n\t\tlog.Println(\"[pogo] Client already subscribed to Channel: \" + ch.name)\n\t} else {\n\t\tlog.Println(\"[pogo] Client Subscribed to Channel: \" + ch.name)\n\t\tch.subscribers[s.client.id] = &Subscription{s, time.Now()}\n\t\ts.subscriptions[ch.name] = ch\n\t}\n}", "title": "" }, { "docid": "a1a6495eecedf9c609712aa0b04a6795", "score": "0.51190996", "text": "func (d *KafkaDispatcher) subscribe(channelRef eventingchannels.ChannelReference, sub subscription) error {\n\td.logger.Info(\"Subscribing\", zap.Any(\"channelRef\", channelRef), zap.Any(\"subscription\", sub))\n\n\ttopicName := d.topicFunc(utils.KafkaChannelSeparator, channelRef.Namespace, channelRef.Name)\n\tgroupID := fmt.Sprintf(\"kafka.%s.%s.%s\", sub.Namespace, channelRef.Name, sub.Name)\n\n\thandler := &consumerMessageHandler{d.logger, sub, d.dispatcher}\n\n\tconsumerGroup, err := d.kafkaConsumerFactory.StartConsumerGroup(groupID, []string{topicName}, d.logger, handler)\n\n\tif err != nil {\n\t\t// we can not create a consumer - logging that, with reason\n\t\td.logger.Info(\"Could not create proper consumer\", zap.Error(err))\n\t\treturn err\n\t}\n\n\t// sarama reports error in consumerGroup.Error() channel\n\t// this goroutine logs errors incoming\n\tgo func() {\n\t\tfor err = range consumerGroup.Errors() {\n\t\t\td.logger.Warn(\"Error in consumer group\", zap.Error(err))\n\t\t}\n\t}()\n\n\td.channelSubscriptions[channelRef] = append(d.channelSubscriptions[channelRef], sub.UID)\n\td.subscriptions[sub.UID] = sub\n\td.subsConsumerGroups[sub.UID] = consumerGroup\n\n\treturn nil\n}", "title": "" }, { "docid": "e272ec7712cb2d50b8ecc4910c0ed6d6", "score": "0.51151586", "text": "func (ch *Channel) Subscribe(sub Subscriber) {\n\tch.subscribers[sub.GetID()] = sub\n}", "title": "" }, { "docid": "cfc163dfcfdbb00b3f501c527029a3a1", "score": "0.5105218", "text": "func (eb *EventBus) Subscribe(topic string, ch DataChannel) {\n\teb.m.Lock()\n\tdefer eb.m.Unlock()\n\n\tif prev, found := eb.subscribers[topic]; found {\n\t\teb.subscribers[topic] = append(prev, ch)\n\t} else {\n\t\teb.subscribers[topic] = append([]DataChannel{}, ch)\n\t}\n}", "title": "" }, { "docid": "bc2e9a1e03e37c96a578ed78571dcff6", "score": "0.51033336", "text": "func (cl *Client) RegisterSubscriber(name string) error {\n\tmsg := Message{\n\t\tMode: \"subscriber\",\n\t\tData: name,\n\t}\n\tstr, _ := json.Marshal(msg)\n\t_, err := cl.c.Write([]byte(str))\n\tif err != nil {\n\t\treturn err\n\t}\n\tSerr := <-cl.Err\n\tif \" \" != Serr {\n\t\treturn fmt.Errorf(Serr)\n\t}\n\tcl.YourSubscribers[name] = struct{}{}\n\tcl.topic[name] = []handler{}\n\treturn nil\n}", "title": "" }, { "docid": "f4bdf034d4f691a6dafd7a4d86e9d645", "score": "0.5102892", "text": "func (b *Broadcaster) NewSubscribed() <-chan Op {\n\tch := make(chan Op, 1)\n\tb.Subscribe(ch)\n\treturn ch\n}", "title": "" }, { "docid": "2d71e654a89fed85f59352b19de7a9df", "score": "0.50995034", "text": "func (c *GRPCConnector) Subscribe(ctx context.Context, req *SubscriptionRequest) (recv func() ([]byte, error), err error) {\n\tcs := &consumerState{\n\t\tdata: make(chan []byte, c.bufferSize),\n\t\terrs: make(chan error, 1),\n\t\tctx: ctx,\n\t\treq: req,\n\t\tdopplers: make(map[string]bool),\n\t}\n\n\tgo func() {\n\t\t<-cs.ctx.Done()\n\t\tatomic.StoreInt64(&cs.dead, 1)\n\t}()\n\n\terr = c.addConsumerState(cs)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc.mu.RLock()\n\tdefer c.mu.RUnlock()\n\tlog.Printf(\"Connecting to %d dopplers\", len(c.clients))\n\tfor _, client := range c.clients {\n\t\tgo c.consumeSubscription(cs, client)\n\t}\n\treturn cs.Recv, nil\n}", "title": "" }, { "docid": "09ed4c3b9bd59559835e2474ed859f60", "score": "0.5083512", "text": "func NewChannel(name string) *Channel {\n\t// TODO: validate channel name\n\treturn &Channel{name, make(map[string]*Subscription), &sync.Mutex{}}\n}", "title": "" }, { "docid": "e3348990e529cbb6d55fc679e91f4f8c", "score": "0.5083453", "text": "func (n *Node) Subscribe() chan protobuf.Message {\n\tn.subscription = make(chan protobuf.Message)\n\treturn n.subscription\n}", "title": "" }, { "docid": "51ea705aecc85d419d77461dea0becf1", "score": "0.5061443", "text": "func TestBufferredChannel(t *testing.T) {\n\tc := new(Channel)\n\tc.signal = make(chan int, 10)\n\tfor i := 0; i < 20; i++ {\n\t\tgo c.push(i)\n\t}\n\tgo c.dispatch()\n\n\ttime.Sleep(5 * time.Second)\n}", "title": "" }, { "docid": "35cf1d1f754fd02467826518d18b0953", "score": "0.5046123", "text": "func (c *Client) Subscribe(metadata map[string]string) (string, error) {\n\tname, ok := metadata[\"channel\"]\n\tif !ok {\n\t\treturn name, errors.New(\"no channel specified\")\n\t}\n\n\t_, err := c.hub.Attach(c)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tif c.IsSubscribed(name) {\n\t\treturn name, fmt.Errorf(\"already subscribed to `%s`\", name)\n\t}\n\n\tif !c.hub.HasStream(name) {\n\t\treturn name, fmt.Errorf(\"channel `%s` does not exist\", name)\n\t}\n\n\tc.subscriptions = append(c.subscriptions, clientSubscription{\n\t\tName: name,\n\t\tSpecifications: []string{},\n\t})\n\n\treturn name, nil\n}", "title": "" }, { "docid": "3c680a8caf534d521d3e5fd54f8a6d9c", "score": "0.5040104", "text": "func (b *eventBroker) Subscribe() chan Event {\n\tevents := make(chan Event, 5)\n\tb.subscribe <- events\n\treturn events\n}", "title": "" }, { "docid": "04f8a686312677e0e86b97452a8ed948", "score": "0.50391674", "text": "func (z *ZB) Subscribe(channelsToSubscribe []stream.ChannelSubscription) error {\n\tvar errs error\n\tfor i := range channelsToSubscribe {\n\t\tsubscriptionRequest := Subscription{\n\t\t\tEvent: zWebsocketAddChannel,\n\t\t\tChannel: channelsToSubscribe[i].Channel,\n\t\t}\n\t\terr := z.Websocket.Conn.SendJSONMessage(subscriptionRequest)\n\t\tif err != nil {\n\t\t\terrs = common.AppendError(errs, err)\n\t\t\tcontinue\n\t\t}\n\t\tz.Websocket.AddSuccessfulSubscriptions(channelsToSubscribe[i])\n\t}\n\tif errs != nil {\n\t\treturn errs\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "83779e90c3200a9e3ab8bbc8dea0a093", "score": "0.5033473", "text": "func (in *Server) Subscribe() <-chan struct{} {\n\tsubscription := make(chan struct{}, 1)\n\tin.clzSubCh = append(in.clzSubCh, subscription)\n\treturn subscription\n}", "title": "" }, { "docid": "25c00d11607e0878aaed81bd98e8cfb9", "score": "0.50177765", "text": "func NewChannel(config *ChannelConfig) *Channel {\n\treturn &Channel{\n\t\tchannel: make(chan channelMessage, config.BufferSize),\n\t\tsubsLimit: int(config.SubscriberLimit),\n\t\tbufferSize: int(config.BufferSize),\n\t\tblocking: config.Blocking,\n\t}\n}", "title": "" }, { "docid": "b549f6a3b6cab83d83bbfb6f25b172e3", "score": "0.50101864", "text": "func (t *pubsub) subscribe(ctx context.Context, topic, sub string, subType api.CommandSubscribe_SubType, initialPosition api.CommandSubscribe_InitialPosition, queue chan Message) (*Consumer, error) {\n\trequestID := t.reqID.next()\n\tconsumerID := t.consumerID.next()\n\n\tcmd := api.BaseCommand{\n\t\tType: api.BaseCommand_SUBSCRIBE.Enum(),\n\t\tSubscribe: &api.CommandSubscribe{\n\t\t\tSubType: subType.Enum(),\n\t\t\tTopic: proto.String(topic),\n\t\t\tSubscription: proto.String(sub),\n\t\t\tRequestId: requestID,\n\t\t\tConsumerId: consumerID,\n\t\t\tInitialPosition: initialPosition.Enum(),\n\t\t},\n\t}\n\n\tresp, cancel, err := t.dispatcher.registerReqID(*requestID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer cancel()\n\n\tc := newConsumer(t.s, t.dispatcher, topic, t.reqID, *consumerID, queue)\n\t// the new subscription needs to be added to the map\n\t// before sending the subscribe command, otherwise there'd\n\t// be a race between receiving the success result and\n\t// a possible message to the subscription\n\tt.subscriptions.addConsumer(c)\n\n\tif err := t.s.sendSimpleCmd(cmd); err != nil {\n\t\tt.subscriptions.delConsumer(c)\n\t\treturn nil, err\n\t}\n\n\t// wait for a response or timeout\n\n\tselect {\n\tcase <-ctx.Done():\n\t\tt.subscriptions.delConsumer(c)\n\t\treturn nil, ctx.Err()\n\n\tcase f := <-resp:\n\t\tmsgType := f.BaseCmd.GetType()\n\t\t// Possible responses types are:\n\t\t// - Success (why not SubscribeSuccess?)\n\t\t// - Error\n\t\tswitch msgType {\n\t\tcase api.BaseCommand_SUCCESS:\n\t\t\treturn c, nil\n\n\t\tcase api.BaseCommand_ERROR:\n\t\t\tt.subscriptions.delConsumer(c)\n\n\t\t\terrMsg := f.BaseCmd.GetError()\n\t\t\treturn nil, fmt.Errorf(\"%s: %s\", errMsg.GetError().String(), errMsg.GetMessage())\n\n\t\tdefault:\n\t\t\tt.subscriptions.delConsumer(c)\n\n\t\t\treturn nil, newErrUnexpectedMsg(msgType, *requestID)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "641b37ac7d5c11aab39594acfe8cc358", "score": "0.5004481", "text": "func (c *Client) Subscribe(q string) (chan Message, chan error, error) {\n\tLogfunc(\"Subcribing to Topic %s\", q)\n\tchanMessage := make(chan Message)\n\tchanError := make(chan error)\n\tgo c.handler(q, chanMessage, chanError, topic)\n\treturn chanMessage, chanError, nil\n}", "title": "" }, { "docid": "25c88011d9ee486a1c35eaf390903506", "score": "0.49999893", "text": "func (r *Reactor) AddChannel(ch <-chan interface{}, limit int, handler func(interface{}) error) (id uint64) {\n\tr.idx++\n\tid = r.idx\n\tr.channels[id] = &reactor_channel{ch: ch, f: handler, limit: limit}\n\treturn\n}", "title": "" }, { "docid": "59101933c9c9dc352b5047e71ea2bae0", "score": "0.49966282", "text": "func (c Conn) Subscribe(ctx context.Context, stream, group string, h flow.PubSubHandler) (flow.Subscription, error) {\n\thandlerCtx := context.Background()\n\tsub, err := c.Conn.QueueSubscribe(stream, group, func(msg *nats.Msg) {\n\t\th(handlerCtx, msg.Subject, msg.Data)\n\t})\n\treturn subscription{sub}, err\n}", "title": "" }, { "docid": "78f6ab0b8eadf5fc8ed4b727659de081", "score": "0.49925467", "text": "func NewEventBusBuffered(chanSize int) (*EventBus) {\n bus := &EventBus{\n subscription: make(Subscription),\n dispatcher: make(chan interface{}, chanSize),\n }\n\n go bus.pollerBus()\n return bus\n}", "title": "" }, { "docid": "69327d905f4ee7e43fb31de4902f0c6b", "score": "0.4988565", "text": "func (b *Broker) Subscribe() Subscription {\n\tb.mu.Lock()\n\ts := Subscription{\n\t\tbr: b,\n\t\tidx: b.idx,\n\t\tout: make(chan accumulator.Result, 1),\n\t}\n\tb.subs[s.idx] = s.out\n\tb.idx++\n\tb.mu.Unlock()\n\treturn s\n}", "title": "" }, { "docid": "e577950870f3035f4af9e322371f1d3e", "score": "0.4982929", "text": "func Subscribe(ch chan<- sdk.Event) {\n\tsubscribers = append(subscribers, ch)\n}", "title": "" }, { "docid": "485df63eef42e0ace7386178fdb5696b", "score": "0.4978127", "text": "func AddChannel(name string, f func(ch <-chan ChannelData)) (bool, error) {\n\tif _, ok := channels[name]; ok {\n\t\treturn false, fmt.Errorf(\"%s name already exists\", name)\n\t}\n\n\tvar ch = channel{\n\t\ttasks: make(map[uuid.UUID]Task),\n\t\ttimmers: make(map[uuid.UUID]timmer),\n\t\tmaxIndex: 0,\n\t\tf: f,\n\t\tch: make(chan ChannelData),\n\t}\n\tchannels[name] = ch\n\treturn true, nil\n}", "title": "" }, { "docid": "eb1adf99578839d8c9202b0fa966a0f3", "score": "0.49774256", "text": "func (rc *Receiver) Subscribe() (*Reader, error) {\n\tr := &Reader{\n\t\tbuf: make(chan IncomingMessage, 10),\n\t}\n\tselect {\n\tcase rc.hub.subscribe <- r:\n\t\treturn r, nil\n\tcase <-rc.hub.stop:\n\t\treturn nil, errors.New(\"stopped\")\n\t}\n}", "title": "" }, { "docid": "f0a506fcc8662d9c1ecf9419a7772e13", "score": "0.49760485", "text": "func Subscribe(name string, handler message.Subscriber) {\n\t_, found := subscriptions[name]\n\tif !found {\n\t\tsubscriptions[name] = []message.Subscriber{handler}\n\t} else {\n\t\tsubscriptions[name] = append(subscriptions[name], handler)\n\t}\n}", "title": "" }, { "docid": "0e57bfa09da9ffccea07f8cfeebb5562", "score": "0.49749646", "text": "func CreateChannel(conn *amqp.Connection) *amqp.Channel {\n ch, err := conn.Channel()\n\n err = ch.Qos(\n 1, // prefetch count\n 0, // prefetch size\n false, // global\n )\n\n failOnError(err, \"Failed to open a channel\")\n return ch\n}", "title": "" }, { "docid": "6924cabbca50b8576c850c81d55a0eff", "score": "0.49705267", "text": "func NewChannelQueue(handle HandlerFunc, cfg, exemplar interface{}) (Queue, error) {\n\tconfigInterface, err := toConfig(ChannelQueueConfiguration{}, cfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tconfig := configInterface.(ChannelQueueConfiguration)\n\tif config.BatchLength == 0 {\n\t\tconfig.BatchLength = 1\n\t}\n\tdataChan := make(chan Data, config.QueueLength)\n\n\tctx, cancel := context.WithCancel(context.Background())\n\tqueue := &ChannelQueue{\n\t\tpool: &WorkerPool{\n\t\t\tbaseCtx: ctx,\n\t\t\tcancel: cancel,\n\t\t\tbatchLength: config.BatchLength,\n\t\t\thandle: handle,\n\t\t\tdataChan: dataChan,\n\t\t\tblockTimeout: config.BlockTimeout,\n\t\t\tboostTimeout: config.BoostTimeout,\n\t\t\tboostWorkers: config.BoostWorkers,\n\t\t\tmaxNumberOfWorkers: config.MaxWorkers,\n\t\t},\n\t\texemplar: exemplar,\n\t\tworkers: config.Workers,\n\t\tname: config.Name,\n\t}\n\tqueue.pool.qid = GetManager().Add(queue, ChannelQueueType, config, exemplar, queue.pool)\n\treturn queue, nil\n}", "title": "" }, { "docid": "fe258c53edea5cb33f7f23a605dfbbd1", "score": "0.4969946", "text": "func NewBufferedChannel(ctx Context, size int) Channel {\n\treturn internal.NewBufferedChannel(ctx, size)\n}", "title": "" }, { "docid": "c872e3b7b6fd939ce4e1b9eecb2d534e", "score": "0.49502876", "text": "func (e *E) Enqueue(b []byte) error {\n\tselect {\n\tcase e.sChan <- b:\n\t\treturn nil\n\tdefault:\n\t\treturn fmt.Errorf(\"could not enqueue message. buffer full or stream channel has been set to nil. buffer len %d\", len(e.sChan))\n\t}\n}", "title": "" }, { "docid": "7332466db92044a02fafe2c0e05cc119", "score": "0.49499464", "text": "func Register(topic, channel string, maxInFlight int, fnc Handler) error {\n\treturn DefaultConsumer.Register(topic, channel, maxInFlight, fnc)\n}", "title": "" }, { "docid": "8be84ef34c0203d5a3a6f521a3d62eda", "score": "0.49494228", "text": "func subscribe(conn *websocket.Conn, channel int64) error {\r\n message := struct {\r\n Command string `json:\"command\"`\r\n Channel int64 `json:\"channel\"`\r\n }{\r\n \"subscribe\",\r\n channel,\r\n }\r\n\r\n jsonMsg, err := json.Marshal(message)\r\n if err != nil {\r\n return err\r\n }\r\n if err = conn.WriteMessage(websocket.TextMessage, jsonMsg); err != nil {\r\n return err\r\n }\r\n return nil\r\n}", "title": "" }, { "docid": "9b3d7b06d1d2907e69e95079b1605bb7", "score": "0.4949224", "text": "func (c *Client) Subscribe(name string) error {\n\tif err := c.ensureAuthenticated(); err != nil {\n\t\treturn err\n\t}\n\n\tcmd := &commands.Subscribe{\n\t\tMailbox: name,\n\t}\n\n\tstatus, err := c.execute(cmd, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn status.Err()\n}", "title": "" }, { "docid": "8ea6c777dbe685a3731927b760ec3e6d", "score": "0.49427664", "text": "func New(size int) *DynamicBufferedChannel {\n\tif size < 1 {\n\t\tsize = 1\n\t}\n\treturn (&DynamicBufferedChannel{buffers: new(list.List)}).Init(size)\n}", "title": "" }, { "docid": "3dfab9893d0426e0b2ebe4d3dca5af3d", "score": "0.4940896", "text": "func Consume(id string, ch <-chan string, wg *sync.WaitGroup) {\n\tfor s := range ch {\n\t\tfmt.Println(id, \"received\", s)\n\t\tRandomSleep(100) // Simulate time to consume data.\n\t}\n\n\twg.Done()\n}", "title": "" }, { "docid": "19b0599393f1d38ea07d637b199f4f74", "score": "0.49336952", "text": "func NewChannel() *Channel {\n\treturn NewChannelWithSize(DefaultChanBufferSize)\n}", "title": "" }, { "docid": "93a07e68e4a077ae831d6ed51f82ae39", "score": "0.49244422", "text": "func (this *eventBus) RegisterSubscriber(\n\tfilter *model.EventFilter,\n\teventChannel chan model.Event,\n) {\n\tthis.subscriberMutex.Lock()\n\tdefer this.subscriberMutex.Unlock()\n\tthis.subscribers[eventChannel] = filter\n}", "title": "" }, { "docid": "3fa0b44bc186a94d61f90974ff8f6078", "score": "0.4924248", "text": "func NewMsgChanBuffer(n int) *MsgChan {\n\tif n <= 0 {\n\t\tn = defaultMsgChanBuffer\n\t}\n\tch := &MsgChan{\n\t\tbuff: make([]*Message, n),\n\t}\n\tch.cond = sync.NewCond(&ch.lock)\n\treturn ch\n}", "title": "" }, { "docid": "d22ffe9956d3dafb46b2e73ca2a9f0ea", "score": "0.4923944", "text": "func (cl *Client) Subscribe(name string, h handler) error {\n\tfor i := range cl.topic {\n\t\tif i == name {\n\t\t\tcl.topic[name] = append(cl.topic[name], h)\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn fmt.Errorf(\"publisher not finded\")\n}", "title": "" }, { "docid": "62fad8f0b924f724dac14304739b26ce", "score": "0.49187812", "text": "func (rx *RxOrder) subscribe(key string, ch chan OrderMutation) error {\n\tif _, ok := rx.observers[key]; ok {\n\t\treturn errors.New(\"Observer already existed\")\n\t}\n\n\trx.observers[key] = ch\n\n\treturn nil\n}", "title": "" }, { "docid": "e59a129e81a89d7d9aeef8f04f456aef", "score": "0.49128938", "text": "func (agent *BroadcastAgent) Subscribe(freq string, handler SubscriberHandler, workersAmmount uint32) *Subscriber {\n\tret := newSubscriber(freq, handler, workersAmmount, &agent.wgBusy, &agent.wg)\n\n\tagent.mutex.Lock()\n\tif agent.subsRegister[freq] == nil {\n\t\tagent.subsRegister[freq] = []*Subscriber{}\n\t}\n\n\tagent.subsRegister[freq] = append(agent.subsRegister[freq], ret)\n\tagent.mutex.Unlock()\n\n\treturn ret\n}", "title": "" }, { "docid": "fbbf1e49715493f0f81c856e68bbd3a9", "score": "0.4909634", "text": "func SetWriteChanBufferSize(size uint) func(gf *GorillaFactory) {\n\treturn func(gf *GorillaFactory) {\n\t\tgf.writeChanBufferSize = size\n\t}\n}", "title": "" }, { "docid": "372d978e9b57209b292729b867a63a18", "score": "0.49082518", "text": "func (q *Queue) Subscribe(messages chan<- *Message) error {\n\tif err := q.bind(); err != nil {\n\t\treturn err\n\t}\n\n\tdd, err := q.exchange.channel.Consume(\n\t\tq.name, // queue\n\t\tq.consumerName(), // consumer name\n\t\tfalse, // autoAck\n\t\tfalse, // exclusive\n\t\tfalse, // noLocal\n\t\tfalse, // noWait\n\t\tnil, // args\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tgo func() {\n\t\topen := true\n\t\tfor open {\n\t\t\tselect {\n\t\t\tcase d, ok := <-dd:\n\t\t\t\tif !ok {\n\t\t\t\t\tq.exchange.onDisconnect()\n\t\t\t\t\topen = false\n\t\t\t\t\tbreak\n\t\t\t\t}\n\n\t\t\t\tm := &Message{\n\t\t\t\t\tAcknowledger: &acknowledger{\n\t\t\t\t\t\tAcknowledger: d.Acknowledger,\n\t\t\t\t\t\tdeliveryTag: d.DeliveryTag,\n\t\t\t\t\t},\n\t\t\t\t\tHeaders: d.Headers,\n\t\t\t\t\tBody: d.Body,\n\t\t\t\t}\n\n\t\t\t\tmessages <- m\n\t\t\t}\n\t\t}\n\t}()\n\n\treturn nil\n}", "title": "" }, { "docid": "4c06fee6b8f61cd14709b96e804f66ae", "score": "0.49006462", "text": "func (c Channel) Subscribe(taskFun interface{}, params ...interface{}) *Subscriber {\n\ts := &Subscriber{channel: c, receiver: newTask(taskFun, params...)}\n\tc.subscribers.Add(s)\n\treturn s\n}", "title": "" }, { "docid": "7695694382c93b7dc862838df004b441", "score": "0.4885749", "text": "func subscribeToNsq(r *Room) error {\n\tnsqChannelName := getChannelName()\n\t_, ok := r.nsqReaders[nsqChannelName]\n\n\tif !ok {\n\t\terr := newNsqReader(r, nsqChannelName)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Failed to subscribe to channel: '%s'\",\n\t\t\t\tnsqChannelName)\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9779090f5b3f435e665085106c23737d", "score": "0.48856443", "text": "func (cli *Client) Subscribe(channel interface{}, channels ...interface{}) error {\n\treturn nil\n}", "title": "" }, { "docid": "03e5f48834397aebc2dd0a9c8e96452d", "score": "0.48841098", "text": "func (o *OutputBuffer) EnqueueChannelProcessor(ctx context.Context) {\n\tfor {\n\t\tselect {\n\t\tcase p := <-o.enqueueChan:\n\t\t\to.Lock()\n\t\t\to.L.PushBack(p)\n\t\t\to.Unlock()\n\t\tcase <-ctx.Done():\n\t\t\tlog.Println(\"Shutting down EnqueueChannelProcessor\")\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f4a3cc4ad86db9ac4f7bd2f0a113667a", "score": "0.48832038", "text": "func (c *command) Subscribe(channel []string, cb MsgCallback) Result {\n\tr := newResult()\n\tif channel == nil {\n\t\tr.setErr(newInvalidValueError(\"channel\", nil))\n\t\treturn r\n\t}\n\tr.request.cmd = append(r.request.cmd, \"SUBSCRIBE\")\n\tfor _, v := range channel {\n\t\tr.request.cmd = append(r.request.cmd, v)\n\t}\n\tr.request.cb = cb\n\tc.send(CmdSubscribe, r)\n\treturn r\n}", "title": "" }, { "docid": "c58a81c0c316124e00b7a158c91f53dc", "score": "0.4882763", "text": "func Init(name string) {\n\n dest := \"127.0.0.1:2000\"\n comp = &component{name:name, dest:dest}\n comp.queue = make(chan []byte)\n go publisher(comp.queue) //Sets up a publisher thread which listens on the channel for any message and publishes it\n\n}", "title": "" }, { "docid": "0375494217473ae015737dd67bdae6a3", "score": "0.4874866", "text": "func (d *RocketmqDispatcher) subscribe(channelRef eventingchannels.ChannelReference, sub Subscription) error {\n\td.logger.Info(\"Subscribing\", zap.Any(\"channelRef\", channelRef), zap.Any(\"subscription\", sub.UID))\n\n\tRocketmqHandler := func(ctx context.Context, msgs ...*primitive.MessageExt) (consumer.ConsumeResult, error) {\n\t\tdefer func() {\n\t\t\tif r := recover(); r != nil {\n\t\t\t\td.logger.Warn(\"Panic happened while handling a message\",\n\t\t\t\t\tzap.String(\"topic\", msgs[0].Message.Topic),\n\t\t\t\t\tzap.String(\"sub\", string(sub.String())),\n\t\t\t\t\tzap.Any(\"panic value\", r),\n\t\t\t\t)\n\t\t\t}\n\t\t}()\n\t\tmessage := protocolrocketmq.NewMessageFromConsumerMessage(msgs)\n\t\tif message.ReadEncoding() == binding.EncodingUnknown {\n\t\t\treturn consumer.ConsumeRetryLater, errors.New(\"received a message with unknown encoding\")\n\t\t}\n\t\td.logger.Debug(\"Going to dispatch the message\",\n\t\t\tzap.String(\"topic\", msgs[0].Message.Topic),\n\t\t\tzap.String(\"sub\", string(sub.String())),\n\t\t)\n\t\terr := d.dispatcher.DispatchMessageWithRetries(\n\t\t\tctx,\n\t\t\tmessage,\n\t\t\tnil,\n\t\t\tsub.Subscriber,\n\t\t\tsub.Reply,\n\t\t\tsub.DeadLetter,\n\t\t\tsub.RetryConfig,\n\t\t)\n\t\tif err != nil {\n\t\t\td.logger.Info(\"RocketmqHandler failed\", zap.Error(err))\n\t\t\treturn 0, err\n\t\t}\n\t\t// NOTE: only return `true` here if DispatchMessage actually delivered the message.\n\t\torderlyCtx, _ := primitive.GetOrderlyCtx(ctx)\n\t\td.logger.Debug(\"dispatch message\", zap.String(\"orderly context\", fmt.Sprintf(\"%v\", orderlyCtx)))\n\t\td.logger.Debug(\"dispatch message\", zap.String(\"subscribe orderly callback\", fmt.Sprintf(\"%v\", msgs)))\n\t\treturn consumer.ConsumeSuccess, nil\n\t}\n\n\ttopicName := d.topicFunc(utils.RocketmqChannelSeparator, channelRef.Namespace, channelRef.Name)\n\tgroupID := fmt.Sprintf(\"rocketmq.%s.%s.%s\", channelRef.Namespace, channelRef.Name, string(sub.UID))\n\n\tpc, _ := rocketmq.NewPushConsumer(\n\t\tconsumer.WithGroupName(groupID),\n\t\tconsumer.WithNsResovler(primitive.NewPassthroughResolver([]string{\"172.17.0.3:9876\"})),\n\t\tconsumer.WithConsumerModel(consumer.Clustering),\n\t\tconsumer.WithConsumeFromWhere(consumer.ConsumeFromFirstOffset),\n\t\tconsumer.WithConsumerOrder(true),\n\t)\n\n\terr := pc.Subscribe(topicName, consumer.MessageSelector{}, RocketmqHandler)\n\n\tif err != nil {\n\t\t// we can not create a consumer - logging that, with reason\n\t\td.logger.Info(\"Could not create proper consumer\", zap.Error(err))\n\t\treturn err\n\t}\n\n\terr = pc.Start()\n\tif err != nil {\n\t\td.logger.Info(\"Start Consumer error\", zap.Error(err))\n\t\treturn err\n\t}\n\n\td.channelSubscriptions[channelRef] = append(d.channelSubscriptions[channelRef], sub.UID)\n\td.subscriptions[sub.UID] = sub\n\td.subsConsumers[sub.UID] = pc\n\n\treturn nil\n}", "title": "" }, { "docid": "47851af97b57862e4aff0ae44307aa10", "score": "0.4872694", "text": "func (b *Broadcaster) Subscribe(ch chan<- Op) {\n\tb.mut.Lock()\n\tif b.void {\n\t\tpanic(\"Subscribe called on voided Broadcaster\")\n\t}\n\tb.dst[ch] = struct{}{}\n\tb.mut.Unlock()\n}", "title": "" }, { "docid": "bbcec324aef00b945485ba72e360fffc", "score": "0.4869048", "text": "func (q *Queue) Init(capacity int, logger *logger.Logger) (*Queue, error) {\n\tpool, err := ants.NewPoolWithFunc(capacity, func(message interface{}) {\n\t\tmsg, valid := message.(messages.Sendable)\n\n\t\tif !valid {\n\t\t\tq.logger.Errorf(\"message not of type messages.Sendable\")\n\n\t\t\treturn\n\t\t}\n\n\t\tif err := channels.Notify(msg); err != nil {\n\t\t\tq.logger.Errorf(err.Error())\n\t\t}\n\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tq.pool = pool\n\tq.logger = logger\n\n\treturn q, nil\n}", "title": "" }, { "docid": "eae562b3c1adb5f213097bb5ed972917", "score": "0.4867852", "text": "func (qi *QueueInstance) Consume(queueName string) (<-chan string, error) {\n\tdeliveries := make(chan string, 200)\n\tconcurency := make(chan bool, 200)\n\n\tgo func() {\n\t\tfor {\n\t\t\tconcurency <- true\n\t\t\tgo func() {\n\t\t\t\tdefer func() {\n\t\t\t\t\t<-concurency\n\t\t\t\t}()\n\n\t\t\t\td, err := qi.Pop(queueName)\n\t\t\t\tif err != nil {\n\t\t\t\t\tif nil != err && \"redigo: nil returned\" != err.Error() {\n\t\t\t\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\t\t\t\"queueName\": queueName,\n\t\t\t\t\t\t\t\"Process handler has a error\": err.Error(),\n\t\t\t\t\t\t}).Warn(\"!!! ProcessDelay handler has a error\")\n\t\t\t\t\t}\n\n\t\t\t\t\t// if any error occured sleep a while\n\t\t\t\t\ttime.Sleep(1 * time.Second)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tdeliveries <- d\n\t\t\t}()\n\t\t}\n\t}()\n\n\treturn deliveries, nil\n}", "title": "" }, { "docid": "74936967b6bda32d13d6d5dfcab42bc7", "score": "0.486736", "text": "func MakeSupplyBufferChan() *SChBuffer {\n\td := new(SChBuffer)\n\td.dat = make(chan bytes.Buffer)\n\t// d.req = make(chan struct{})\n\treturn d\n}", "title": "" }, { "docid": "711bf6bbf38a751349a5fe71af54b0a3", "score": "0.48563996", "text": "func (h *Hub) Subscribe(id string, session *melody.Session) *Channel {\n\n\tch := h.GetChannel(id)\n\tif ch == nil { //create channel if this is the first time or if channel does not not exists\n\t\tch = &Channel{}\n\t\tch.Id = id\n\t\tch.Clients = make(map[*Client]bool)\n\n\t\th.Channels = append(h.Channels, ch)\n\t}\n\n\tch.Subscribe(session)\n\treturn ch\n}", "title": "" }, { "docid": "44e69f776e8e71ccf69e378b1191caa0", "score": "0.48549727", "text": "func (mq *CRocketMQConsumer) Subscribe(topic string, selector mqc.MessageSelector, f func(context.Context, ...*primitive.MessageExt) (mqc.ConsumeResult, error)) error {\n\tif err := mq.client.Subscribe(topic, selector.Expression, func(msgEntry *cmq.MessageExt) cmq.ConsumeStatus {\n\t\tmsg := &primitive.MessageExt{}\n\t\tmsg.MsgId = msgEntry.MessageID\n\t\tmsg.BornTimestamp = msgEntry.BornTimestamp\n\t\tmsg.Topic = topic\n\t\tmsg.Body = []byte(msgEntry.Body)\n\t\tmsg.WithProperties(msgEntry.Property)\n\t\tstatus, err := f(context.TODO(), msg)\n\t\tif err == nil && status == mqc.ConsumeSuccess {\n\t\t\treturn cmq.ConsumeSuccess\n\t\t}\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"consume message failed. topic:%s MessageID:%s status:%v\", topic, msgEntry.MessageID, status)\n\t\t}\n\t\treturn cmq.ReConsumeLater\n\t}); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ff3dd7af71592a106fedb5453dfcf3be", "score": "0.48525575", "text": "func (c *Client) Subscribe(channel string) (err error) {\n\t// Already subscribed ?\n\tif c.subscribedChannels.contains(channel) {\n\t\terr = errors.New(fmt.Sprintf(\"Channel %s already subscribed\", channel))\n\t\treturn\n\t}\n\t// err = websocket.Message.Send(c.ws, fmt.Sprintf(`{\"event\":\"pusher:subscribe\",\"data\":{\"channel\":\"%s\"}}`, channel))\n\tc.writeMsg(websocket.TextMessage, []byte(fmt.Sprintf(`{\"event\":\"pusher:subscribe\",\"data\":{\"channel\":\"%s\"}}`, channel)))\n\tif err != nil {\n\t\treturn\n\t}\n\terr = c.subscribedChannels.add(channel)\n\treturn\n}", "title": "" }, { "docid": "035608e990edf6f28f1d5f7236098ec9", "score": "0.48501897", "text": "func (l *QueueListener) ListenForNewSource() {\n\n\tfanoutChannel, err := qutils.\n\t\tNewMessageConsumer(l.conn, l.ch).\n\t\tGetUniqueQueue().\n\t\tBindToFanout().\n\t\tConsumeFromChannel()\n\tutils.FailOnError(err, \"unable prepare fanout channel for reading\")\n\n\tl.DiscoverSensors()\n\n\tfor msg := range fanoutChannel {\n\n\t\tl.ea.PublishEvent(services.DataSourceDiscovered, string(msg.Body))\n\n\t\tsensorId := string(msg.Body)\n\t\tdataChannel, _ := l.ch.Consume(\n\t\t\tsensorId,\n\t\t\t\"\",\n\t\t\ttrue,\n\t\t\tfalse,\n\t\t\tfalse,\n\t\t\tfalse,\n\t\t\tnil,\n\t\t)\n\n\t\tif l.registry[sensorId] == nil {\n\t\t\tl.registry[sensorId] = dataChannel\n\n\t\t\tgo l.ProcessMessages(dataChannel)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0085b88879eeffd5ec7f81fe1704a7d9", "score": "0.48456517", "text": "func (t *WorkQueue) QueueDeclare(args *QueryArgs, reply *int) error {\n\tlog.Println(\"[rd] Got QueueDeclare: args=\", *args, \" total=\", queueMapChan)\n\n\trlock.RLock()\n\tdefer rlock.RLock()\n\n\tif _, exist := queueMapChan[args.QueueName]; exist {\n\t\tlog.Println(\"[rd] Topic already exist .... \")\n\t\t*reply = 1\n\t\treturn nil\n\t}\n\tretCh := pubsubObj.Subscribe(args.QueueName)\n\tqueueMapChan[args.QueueName] = retCh\n\t*reply = 0\n\n\treturn nil\n}", "title": "" } ]
5c20a6c42c0141cf4f9466da2c9afef7
Info returns a logger with an info log level.
[ { "docid": "acec596b57645ae4070ed0af20f591d7", "score": "0.0", "text": "func Info(ctx context.Context, funcs ...func(zerolog.Context) zerolog.Context) *zerolog.Event {\n\treturn New(ctx, funcs...).Info()\n}", "title": "" } ]
[ { "docid": "0704a303d58b6ce2e88196f77eb9c173", "score": "0.8207002", "text": "func Info() *log.Logger {\n\treturn infoLogger\n}", "title": "" }, { "docid": "2932b464f77ef14896fb34124995d77d", "score": "0.78117466", "text": "func Info(name string) Logger {\n\treturn named(name + \".info\", \"green\")\n}", "title": "" }, { "docid": "46b4241bcf85b7a4a72d70874dad072f", "score": "0.7613125", "text": "func LoggerInfo(options ...zap.Option) (*zap.Logger) {\n\treturn logger(zapcore.InfoLevel, DefaultEncoderConfig(), options...)\n}", "title": "" }, { "docid": "8367e4ade8155655096346214f17e8a2", "score": "0.74327016", "text": "func (l iLogger) Info(msg ...interface{}) {\n\tif l.isLogLevel(info) {\n\t\tlogger(l.name, \"INFO \", msg)\n\t}\n}", "title": "" }, { "docid": "bde769cadc99d9f006733e18540a95d1", "score": "0.74319994", "text": "func Info(message string) {\n\trootLogger.Logf(InfoLvl, message)\n}", "title": "" }, { "docid": "2a1f2e01c1b9f0d9d5ce0fb166c53af5", "score": "0.74260837", "text": "func Info(args ...interface{}) {\n\tdefaultLogger.log(INFO, nil, args...)\n}", "title": "" }, { "docid": "23ebb1ed7f915c7b52a9413e0f208458", "score": "0.74184775", "text": "func Info(args ...interface{}) {\n\tif l := AsL(logger); l != nil {\n\t\tl.Info(args...)\n\t}\n}", "title": "" }, { "docid": "8503ec61da11673233c5c87fa8e28973", "score": "0.7399764", "text": "func (l *Logger) Info(v ...interface{}) {\n\tif l.level >= LevelInfo {\n\t\te := acquireEntry(l)\n\t\te.Info(v...)\n\t\treleaseEntry(e)\n\t}\n}", "title": "" }, { "docid": "31c736f1e4aa61535eb64079761d636e", "score": "0.73886967", "text": "func (l Logger) Info(msg string) {\n\tl(msg, LevelInfo)\n}", "title": "" }, { "docid": "4c173a5fd09d69d83d798773c5b7d280", "score": "0.7336174", "text": "func Info(ctx context.Context, args ...interface{}) {\n\tDefaultLogger.Info(ctx, args...)\n}", "title": "" }, { "docid": "d50dcc5bdc6fcef921b9b48c004a7ed0", "score": "0.7334919", "text": "func (l *Logger) Info(v ...interface{}) {\n\tif l.logLevel >= LOG_INFO {\n\t\tl.InfoLogger.Print(v...)\n\t}\n}", "title": "" }, { "docid": "605eef11105ff634cbd88b373c39c27e", "score": "0.7323735", "text": "func ExampleInfo() {\n\tsetup()\n\tlog.Info(context.Background()).Msg(\"hello world\")\n\n\t// Output: {\"level\":\"info\",\"time\":1199811905,\"message\":\"hello world\"}\n}", "title": "" }, { "docid": "f371918bef18c5f765e9f54a645c842b", "score": "0.7318748", "text": "func Info(args ...interface{}) {\r\n\tdefaultLogger.Info(args...)\r\n}", "title": "" }, { "docid": "0d794310be6fa11609f93a097076fe3a", "score": "0.73072225", "text": "func (l Logger) Info(ctx context.Context, msg string, fields ...F) {\n\tl.log(ctx, LevelInfo, msg, fields)\n}", "title": "" }, { "docid": "0314c1692d65ae599de433d3a37dd7b3", "score": "0.7290848", "text": "func (w *wrapSugaredLogger) Info(args ...interface{}) {\n\tw.logger.Info(args...)\n}", "title": "" }, { "docid": "1f60ac13f44e0f3acea63deaf30acf03", "score": "0.7264801", "text": "func (logger *ConsoleLogger) Info(message string, objects ...interface{}) ILogger {\n\n\tcontent := logger.WriteMessage(LevelInfo.Name, message, objects...)\n\n\tlogger.printMessage(content, LevelInfo)\n\n\treturn logger\n}", "title": "" }, { "docid": "a4e7f367e5eb8ee0cc2853d024488c09", "score": "0.7254598", "text": "func (l *SimpleLogger) Info(args ...interface{}) {\n\tl.log(LevelInfo, args...)\n}", "title": "" }, { "docid": "777eb3ec1c143083405090cbd55b1236", "score": "0.7242043", "text": "func (l EmptyLogger) Info(args ...interface{}) {}", "title": "" }, { "docid": "a2fa5bda0fa63f746bf1653727108e51", "score": "0.7233978", "text": "func (l *Logger) Info(v ...interface{}) {\n\tif l.getLevel() <= Info {\n\t\tl.getHandler().Log(l.name, Info, fmt.Sprint(v...), 1)\n\t}\n}", "title": "" }, { "docid": "0da0e1d8b4b52d5f3ebfb666dc6805b2", "score": "0.72210574", "text": "func NewInfoLogger(prefix string, output io.Writer) *DefaultInfoLogger {\n\tloggerPrefix := \"INFO \"\n\tif prefix != \"\" {\n\t\tloggerPrefix = prefix + \" \" + loggerPrefix\n\t}\n\treturn &DefaultInfoLogger{\n\t\tbaseLogger{\n\t\t\tdest: output,\n\t\t\tprefix: prefix,\n\t\t\tlog: log.New(output, loggerPrefix, infoLogFlags),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "1054c9562a056ed8d2627bfc65990dff", "score": "0.7213132", "text": "func Info(args ...interface{}) {\n\tif logger.Level >= logrus.InfoLevel {\n\t\tentry := logger.WithFields(logrus.Fields{})\n\t\tfillentry(entry)\n\t\tentry.Info(args...)\n\t}\n}", "title": "" }, { "docid": "98595b1f119f39a2819ffdbd5c4b5727", "score": "0.7212772", "text": "func (ll *StdLevelLogger) Info(msg Any) {\n\tll.logLevel(\"Info\", msg)\n}", "title": "" }, { "docid": "411a0077c6c5e32a5145b8dcc22f08be", "score": "0.72113824", "text": "func (l *Logger) Info(args ...interface{}) {\n\tl.logger.Info(args...)\n}", "title": "" }, { "docid": "a9ca26398a47d814f6285b1cba8bfa64", "score": "0.71942437", "text": "func Info(args ...interface{}) {\n\tmutex.RLock()\n\tdefer mutex.RUnlock()\n\tif outputLevel >= InfoLevel {\n\t\tlogger.Info(args...)\n\t}\n}", "title": "" }, { "docid": "84247d3a4505875fdb5bd2d31537c5f9", "score": "0.71900755", "text": "func Info(v ...interface{}) {\n\tdefaultLogger.Info(v...)\n}", "title": "" }, { "docid": "23bb49da4e0b34beeaad28dcc6cff532", "score": "0.7189545", "text": "func Info(args ...interface{}) {\n\tDefaultLogger.Info(args...)\n}", "title": "" }, { "docid": "23bb49da4e0b34beeaad28dcc6cff532", "score": "0.7189545", "text": "func Info(args ...interface{}) {\n\tDefaultLogger.Info(args...)\n}", "title": "" }, { "docid": "90c9bb9eb3db0a6ddefcaae468f9aa9f", "score": "0.7186442", "text": "func (l *Logger) Info(message string) {\n\tl.Logf(InfoLvl, message)\n}", "title": "" }, { "docid": "7f324de42084e629db744d180573dea5", "score": "0.71855253", "text": "func (nl NullLogger) Info(format string, a ...interface{}) {}", "title": "" }, { "docid": "2804b98941b36c349bb9d3fb9b5bde70", "score": "0.71726656", "text": "func (logger *LogrusLogger) Info(args ...interface{}) {\n\tlogger.internalLog.Info(args...)\n}", "title": "" }, { "docid": "03882811d0815d134ca7d43b51df33f5", "score": "0.7170766", "text": "func (logger *JSONFileLogger) Info(message string, objects ...interface{}) ILogger {\n\n\tif logger.IsEnable(LevelInfo) {\n\t\tcontent := logger.WriteMessage(LevelInfo.Name, message, objects...)\n\n\t\tlogger.printMessage(content)\n\t}\n\n\treturn logger\n}", "title": "" }, { "docid": "87683acefa19fe15c1079e3102c34cf9", "score": "0.7161035", "text": "func Info(args ...interface{}) {\n\tGetLogger().Info(args...)\n}", "title": "" }, { "docid": "87683acefa19fe15c1079e3102c34cf9", "score": "0.7161035", "text": "func Info(args ...interface{}) {\n\tGetLogger().Info(args...)\n}", "title": "" }, { "docid": "9426d256c67225a84229e7560204e499", "score": "0.71516174", "text": "func (l *Logger) Info(message string) error {\n\treturn l.Log(Info, message)\n}", "title": "" }, { "docid": "dd0e7f3e24f75764aee6d949549c3f59", "score": "0.714794", "text": "func (dl *DefaultLogger) Info(v ...interface{}) {\n\tprefix := \"[INFO]\"\n\tdl.lprint(prefix, v...)\n}", "title": "" }, { "docid": "84c66ffb49ad830512869cf822adeaa6", "score": "0.7137726", "text": "func (l *Logger) Info(v ...interface{}) {\n\tl.log(InfoMode, fmt.Sprintln(v...))\n}", "title": "" }, { "docid": "572902df03e4331624acae1b93c198bf", "score": "0.71283937", "text": "func (logger *LoggerImpl) Info(args ...interface{}) {\n\tlogger.log(INFO, nil, args...)\n}", "title": "" }, { "docid": "970e8fac8414055e2e6129a916154c98", "score": "0.71159947", "text": "func Info(v ...interface{}) {\n\tdefaultLogger.Println(INFO, v...)\n}", "title": "" }, { "docid": "f97bd309fd31133250f72f7166aec94a", "score": "0.7113895", "text": "func Info(msg string, fields ...zap.Field) {\n\tLogger.Info(msg, fields...)\n}", "title": "" }, { "docid": "ddaf186e7816cba736ddce4599a7eb12", "score": "0.71095455", "text": "func (l *Logger) Info(format string, params ...interface{}) []error {\n\treturn l.Handle(LEVEL_INFO, format, params...)\n}", "title": "" }, { "docid": "42a2c3208df4154d0255878926d0c6ef", "score": "0.7107973", "text": "func Info(args ...interface{}) {\n\tlogs(_infoLevel, args...)\n}", "title": "" }, { "docid": "3cc2f75024ea33b359808bd4b46afc08", "score": "0.7100524", "text": "func InfoLogger(pkg string) *log.Logger {\n\treturn infoLogger.Logger(pkg)\n}", "title": "" }, { "docid": "7471024043df714321f16d562e83bf11", "score": "0.7099722", "text": "func (l *MessageLogger) Info(msg string) { l.logger.Info(msg) }", "title": "" }, { "docid": "7b4e4dbbe9a2b6cbd0dc8eb6c03d1ec3", "score": "0.7098336", "text": "func (logger *subLogger) Info(a ...interface{}) {\n\tif logger != nil {\n\t\tlogger.internalLog(levelInfo, notATrace, \"\", a...)\n\t} else {\n\t\tlogger.internalLog(levelInfo, notATrace, \"\", a...)\n\t}\n}", "title": "" }, { "docid": "41d062648a41ee9c3ebe86061958c9c4", "score": "0.70950377", "text": "func (l *LoggerImpl) Info(format string, v ...interface{}) {\n\tl.log(l.infoLogger, LevelInfo, format, v...)\n}", "title": "" }, { "docid": "e342d5831e625aaa9d867eee0720cf9f", "score": "0.70933735", "text": "func (l *Logger) Info(msg string, fields ...zap.Field) {\n\tl.Logger.Info(msg, fields...)\n}", "title": "" }, { "docid": "a27f8dac6937399cd9974c9950002775", "score": "0.708243", "text": "func (l *Logger) Info(msg string, fields ...Field) {\n\tl.getInitializedOrDefaultLogger().Info(msg, fields...)\n}", "title": "" }, { "docid": "89cc575ed1155ceb4d29de6ab09fdde9", "score": "0.7080261", "text": "func (l *Logger) Info(obj ...interface{}) {\n\tif l.Level >= INFO {\n\t\tl.log(INFO, fmt.Sprint(obj...))\n\t}\n}", "title": "" }, { "docid": "a7c685bffdab6121ccfcfe7dbf4dce6e", "score": "0.707481", "text": "func Info(a ...interface{}) {\n\tdefaultLogger.Info(a...)\n}", "title": "" }, { "docid": "389970cc6940a991834b0273b56b55bd", "score": "0.70664185", "text": "func (l *Logger) Info(v ...interface{}) {\n\tl.RLock()\n\tdefer l.RUnlock()\n\tl.info.Output(2, fmt.Sprint(v...))\n}", "title": "" }, { "docid": "dce44361301d37b1c06f54450e811837", "score": "0.7055706", "text": "func (l *StdLogger) Info(args ...interface{}) {\n\tif l.LogLevel() <= LogLevels.Info {\n\t\tl.infoLog.Println(args...)\n\t}\n}", "title": "" }, { "docid": "5fbb6a6d204aed341b3f5b2058406dae", "score": "0.70547235", "text": "func (logger *Logger) Info(format string) {\n\tlogger.dispatchLog(logModule, goext.LevelInfo, format)\n}", "title": "" }, { "docid": "9d9a50544d7a3ecd9f5bed7a17ba0e2b", "score": "0.70513785", "text": "func (df *DefaultLogger) Info(message string) {\n\tdf.Logger.Printf(\"[Info] \" + message)\n}", "title": "" }, { "docid": "b6db4b80cb98369815b204ec7ceb783e", "score": "0.7046713", "text": "func (e *ELogger) Info(a ...interface{}) {\n\tif log.INFO < e.Level() {\n\t\treturn\n\t}\n\te.Output(e.recordFactory(e.Name(), 2, log.INFO, fmt.Sprint(a...)))\n}", "title": "" }, { "docid": "0ecea8a5f94c14581d5eb0c32d64273c", "score": "0.7041205", "text": "func (l Logger) Info(message interface{}) {\n l.info.Println(message)\n}", "title": "" }, { "docid": "6f5cb02478a7085d1299ced32a54e7c5", "score": "0.7036354", "text": "func Info(format string, args ...interface{}) {\n\tsmLogger.Logger.Info(format, args...)\n}", "title": "" }, { "docid": "8b409399fc1976c7ba88bcf345e8d995", "score": "0.70361555", "text": "func Info(v ...interface{}) Entry {\n\treturn Log(Entry{\n\t\tLevel: InfoLevel,\n\t\tMessage: sprint(v...),\n\t})\n}", "title": "" }, { "docid": "e5c46b2df4b634ce0ddeb268de75b217", "score": "0.70359415", "text": "func Info() *zerolog.Event {\n\treturn Logger.Info()\n}", "title": "" }, { "docid": "c85b33f53ee6ac050e564dd74280ebc8", "score": "0.70314306", "text": "func (dl *defaultLogger) Info(msg string) {\n\tdl.Print(msg)\n}", "title": "" }, { "docid": "bcd6f51ee0dd6265a88b8bfd8bb39ce2", "score": "0.7030791", "text": "func Info(msg string) {\n\tLog(INFO, msg)\n}", "title": "" }, { "docid": "f4ed36cbe3cd5925aa7b421f125c95ae", "score": "0.7021632", "text": "func (dl *DefaultLogger) Info(message string, params ...interface{}) {\n\tdl.logger.Infof(message, params...)\n}", "title": "" }, { "docid": "50ead838dd93d60e7f99467420b4828e", "score": "0.70184803", "text": "func (w *wrapLogger) Info(msg string, fields ...map[string]string) {\n\tfs := mapToStringFields(fields)\n\tw.logger.Info(msg, fs...)\n}", "title": "" }, { "docid": "e3f4d92765c7fc99ee8062157189455d", "score": "0.7011294", "text": "func Info(args ...any) {\n\tglobal.Logger.Sugar().Info(args...)\n}", "title": "" }, { "docid": "3ae366fb3c63292332a7f56358aea11d", "score": "0.70112634", "text": "func (l *Logger) Info(args ...interface{}) {\n\tl.record(\"Info\")\n\tl.writeLog((*zap.Logger).Info, fmt.Sprint(args...))\n}", "title": "" }, { "docid": "eca34dba0dcd01fb2b3421d16d60967f", "score": "0.7008113", "text": "func (l *Logger) Info(message string) {\n\tl.log(\"info\", message)\n}", "title": "" }, { "docid": "0a1efb8e78a82c09627ef45f1740e01d", "score": "0.7005215", "text": "func (dl *DefaltLogger) Info(format string, v ...interface{}) {\n\tmsg := fmt.Sprintf(\"[I] \"+format, v...)\n\tdl.writeMsg(LevelInfo, msg)\n}", "title": "" }, { "docid": "e08fa6bec70019a72b7bbd6a111d6bdc", "score": "0.7004527", "text": "func (l *Logger) Info(v ...interface{}) { l.WriteFunc(InfoLevel, v...) }", "title": "" }, { "docid": "3ec50dcf632a639c5f270edc5003c94c", "score": "0.70016617", "text": "func (l *Logger) Info(format string, a ...interface{}) error {\n\treturn l.log(INFO, fmt.Sprintf(format, a...))\n}", "title": "" }, { "docid": "70213053e2470ae7b9f2f5bc22764e24", "score": "0.70005935", "text": "func Info(v ...interface{}) {\n\tinfoLogger.Output(2, fmt.Sprint(v...))\n}", "title": "" }, { "docid": "c84c3bb891ca672c0310dc52d9a69c4b", "score": "0.6991701", "text": "func Info(m string) {\n\tinfoLogger.Println(m)\n}", "title": "" }, { "docid": "e797c5a290f925f00a85ef83a0287463", "score": "0.6988946", "text": "func (l *HistoricLoggerWrapper) Info(msg ...interface{}) {\n\tl.toHistory(logging.LevelInfo, msg...)\n\tl.LoggerInterface.Info(msg...)\n}", "title": "" }, { "docid": "15558a9a7b94d5dc74eb5dbe7f947cbe", "score": "0.6987342", "text": "func (lb *LoggerBase) Info(args ...interface{}) {\n\tlb.Print(level.Info, args...)\n}", "title": "" }, { "docid": "2336535f70ad0511044a0f07e3db1136", "score": "0.69817495", "text": "func (*DefaultLogger) Info(v ...interface{}) {\n\tlog.Println(v...)\n}", "title": "" }, { "docid": "84ae2614983b27ccc9248812aa76724f", "score": "0.69769996", "text": "func (l *Logger) Info(v ...interface{}) {\n\tif l.level > levelInfo {\n\t\treturn\n\t}\n\n\tl.Log(\"%v\", v...)\n}", "title": "" }, { "docid": "949e412fe9c28ac16480ae17d6a60cb9", "score": "0.6976994", "text": "func Info(format string, v ...interface{}) {\n\tDefaultLogger.info(format, v...)\n}", "title": "" }, { "docid": "a7dc3c4b02dd70aeda67ffe66967274a", "score": "0.69759125", "text": "func Info(args ...interface{}) {\n\tlogger.Info(args...)\n}", "title": "" }, { "docid": "a7dc3c4b02dd70aeda67ffe66967274a", "score": "0.69759125", "text": "func Info(args ...interface{}) {\n\tlogger.Info(args...)\n}", "title": "" }, { "docid": "a7dc3c4b02dd70aeda67ffe66967274a", "score": "0.69759125", "text": "func Info(args ...interface{}) {\n\tlogger.Info(args...)\n}", "title": "" }, { "docid": "d8e0b1b241f939a99b16f7a0973aa95b", "score": "0.6974217", "text": "func Info(msg string, v ...interface{}) {\n\tlogger.Info(msg, v...)\n}", "title": "" }, { "docid": "d3c35340639e6f630e2a5e604ec32150", "score": "0.69738495", "text": "func (l *logrusLogger) Info(msg ...interface{}) {\n\tl.log.WithFields(withFileAndLine(l.fields)).Info(msg...)\n}", "title": "" }, { "docid": "1dc5fe7c28708e0b7fffb97809ff1c95", "score": "0.6971488", "text": "func (l *Logger) Info(str string) {\n\tl.log(INFO, str)\n}", "title": "" }, { "docid": "0d97a332810dfefd5ebbe2eb44f57488", "score": "0.6971139", "text": "func (l *Logger) Info(format string, v ...interface{}) {\n\tout(l.level, Info, format, v...)\n}", "title": "" }, { "docid": "f99db72c624d0c31f91b0497e37ae661", "score": "0.6965936", "text": "func Info(msg string, fields ...zap.Field) {\n\tlogger.Info(msg, fields...)\n}", "title": "" }, { "docid": "ed0aa5de49e61adf12dfef0e3bf881fd", "score": "0.69625556", "text": "func Info(args ...interface{}) {\n\tdoLog(2, infoLevel, args...)\n}", "title": "" }, { "docid": "bc64d81d2faa8988ede63d037ebd5732", "score": "0.6961688", "text": "func (l *Logger) Info() *zerolog.Event {\n\treturn l.logger.Info()\n}", "title": "" }, { "docid": "02bff4989d71d680c11d7f7d445a71b5", "score": "0.6960917", "text": "func (l GrpcLogger) Info(args ...interface{}) {\n\tl.Logger.Info().Msg(fmt.Sprint(args...))\n}", "title": "" }, { "docid": "2d96e7a1c8484134bd2fdeb6924b6f81", "score": "0.6957986", "text": "func LogInfo(ctx context.Context, format string, a ...interface{}) string {\n\treturn logLevel(ctx, \"INFO\", format, a...)\n}", "title": "" }, { "docid": "6280cc510b985c8328f595811445c3ba", "score": "0.6951256", "text": "func (s StdoutLogger) Info(v ...interface{}) error {\n\tlog.Println(fmt.Sprintf(\"INFO: %s\", v...))\n\treturn nil\n}", "title": "" }, { "docid": "568d89bb03a37e588f193a9d9acc78c7", "score": "0.6948606", "text": "func (l *logger) Info(v ...interface{}) {\n\te := newEntry(InfoLevel, fmt.Sprint(v...), nil)\n\tl.HandleEntry(e)\n}", "title": "" }, { "docid": "1faae96e344b3b125b29a554862e447f", "score": "0.69443023", "text": "func (l *Logger) Info(msg string) {\n\tl.log(Info, \"%s\", msg)\n}", "title": "" }, { "docid": "034133fc4dbab3fdd0cc25508416e252", "score": "0.694335", "text": "func Info(v ...interface{}) {\n\tmutex.Lock()\n\tdefer mutex.Unlock()\n\tsetPrefix(INFO)\n\tlogger.Println(v...)\n}", "title": "" }, { "docid": "6d706d1f1399a030f7e0804667ed6a1a", "score": "0.6941494", "text": "func Info(i ...interface{}) {\n\tDefaultLogger.Info(i...)\n}", "title": "" }, { "docid": "30ad707079371ca26d90ba500413884a", "score": "0.6940332", "text": "func Info(format string, a ...interface{}) {\n\tif infoLogger == nil {\n\t\treturn\n\t}\n\tinfoLogger.Printf(format, a...)\n}", "title": "" }, { "docid": "d476bd4f57528058d295bbb11497ee96", "score": "0.693641", "text": "func Info(data ...interface{}) { defaultLogger.Info(data...) }", "title": "" }, { "docid": "f938d8e79b2da1b74413b2b1534cf405", "score": "0.6936155", "text": "func Info(i ...interface{}) {\n\tstaticLogger.Info(i...)\n}", "title": "" }, { "docid": "63497c75037299e16b68c2ab019b8841", "score": "0.6936118", "text": "func (l *Logger) Info(message string) {\n\tl.zl.Info().Msg(message)\n}", "title": "" }, { "docid": "7802a5ad138bbc770550cdf9796c7810", "score": "0.692937", "text": "func (c ConsoleLogger) Info(message string) {\n\tc.Log(\"INFO\", message)\n}", "title": "" }, { "docid": "46a157a5750b436775faee8117995977", "score": "0.6922797", "text": "func Info(v ...interface{}) {\n\tglobalLogger.Info(v...)\n}", "title": "" }, { "docid": "f11a46b84f1d3557581705c0ae2a1b03", "score": "0.69225717", "text": "func (l GRPCLogger) Info(args ...interface{}) {\n\tl.getLogger().Info(fmt.Sprint(args...), l.Fields)\n}", "title": "" }, { "docid": "bc7ee7f1a87f1ca9e57ccb3b7a754b4d", "score": "0.6914857", "text": "func (logger *Logger) Info(a ...interface{}) {\n\tlogger.log(INFO, \"\", a...)\n}", "title": "" }, { "docid": "3cc8fe7a4aeaba1c9ab04a4ecd73b187", "score": "0.6903888", "text": "func (logger *Logger) Info(format string, args ...interface{}) {\n\tlogger.log(Info, format, args...)\n}", "title": "" } ]
1910fb2fc16492e3b4d3fcaa7aef705e
Dimension will return a new dimension physics struct to define the size of a game object.
[ { "docid": "68f9ae4b6a96298fa104fc999316a30e", "score": "0.70323545", "text": "func Dimension(width, height, radius float32) ecs.Dimensions {\n\treturn ecs.Dimensions{\n\t\tWidth: width,\n\t\tHeight: height,\n\t\tRadius: radius,\n\t}\n}", "title": "" } ]
[ { "docid": "ac9e59cdfb5515c4b9d1bf5264cbf552", "score": "0.7577563", "text": "func (pb *Body) Dimension() Size {\n\treturn Size{\n\t\tH: pb.PhysicHeight,\n\t\tW: pb.PhysicWidth,\n\t}\n}", "title": "" }, { "docid": "337c546e07e8d4cffb7677818235a783", "score": "0.67205805", "text": "func (world *World) Dimension() Dimension {\n\treturn world.worldData.Dimension\n}", "title": "" }, { "docid": "338c0ac8e0388a614205e62dbb16879f", "score": "0.64591694", "text": "func (obj *texture) Dimension() ints.Vec2 {\n\treturn obj.dim\n}", "title": "" }, { "docid": "e967b512f93565daff8ba1049faab8c4", "score": "0.63799655", "text": "func NewDimension(newWidth uint, newHeight uint) *Dimension {\n\treturn &Dimension{Width: newWidth, Height: newHeight}\n}", "title": "" }, { "docid": "3717aaabae3c81fe4c76f40948455477", "score": "0.6157018", "text": "func (g *Geometry) Dimension() int {\n\treturn int(cGEOSGeom_getDimensions(g.g))\n}", "title": "" }, { "docid": "62d1fa93b067b927eb47a8db23c3461e", "score": "0.615549", "text": "func NewDimension() *Dimension {\n\tt := &Dimension{\n\t\tentity: NewEntity(DIMENSION),\n\t}\n\treturn t\n}", "title": "" }, { "docid": "fa90204e8c13e1eba4f2972066f719f0", "score": "0.60910255", "text": "func (vector *Vector) Dimension() int {\n\treturn len(vector.coordinates)\n}", "title": "" }, { "docid": "08143b926cda311621802de663f7ea92", "score": "0.59308225", "text": "func (s *Hilbert) Dimension() uint32 {\n\treturn s.dimension\n}", "title": "" }, { "docid": "4fbb656babf476e14fd97fee6b5e2623", "score": "0.5923618", "text": "func (s *Sudoku) Dimension() int {\n\treturn s.dim\n}", "title": "" }, { "docid": "4533c753ff5de7cd3fd3d163b78b7e74", "score": "0.590374", "text": "func (q *Qubit) Dimension() int {\n\treturn q.vector.Dimension()\n}", "title": "" }, { "docid": "92744fe389a889c69375840f8cac82ad", "score": "0.5869029", "text": "func (g Geometry) Dimension() int {\n\tswitch g.gtype {\n\tcase TypeGeometryCollection:\n\t\treturn g.AsGeometryCollection().Dimension()\n\tcase TypePoint, TypeMultiPoint:\n\t\treturn 0\n\tcase TypeLineString, TypeMultiLineString:\n\t\treturn 1\n\tcase TypePolygon, TypeMultiPolygon:\n\t\treturn 2\n\tdefault:\n\t\tpanic(\"unknown geometry: \" + g.gtype.String())\n\t}\n}", "title": "" }, { "docid": "ed925f3be379e49f0325196ed7e99240", "score": "0.56735706", "text": "func (c GeometryCollection) Dimension() int {\n\tdim := 0\n\tfor _, g := range c.geoms {\n\t\tdim = max(dim, g.Dimension())\n\t}\n\treturn dim\n}", "title": "" }, { "docid": "d354dff75d79c25ed2db434d21f46c63", "score": "0.5631378", "text": "func (p *Point) Dimension(i int) float64 {\n\treturn p.Coordinates[i]\n}", "title": "" }, { "docid": "4d1fc519ec9303fbad11f81dff773d59", "score": "0.56281614", "text": "func (d *dataset) Dimension() int {\n\treturn d.dimension\n}", "title": "" }, { "docid": "4d1fc519ec9303fbad11f81dff773d59", "score": "0.56281614", "text": "func (d *dataset) Dimension() int {\n\treturn d.dimension\n}", "title": "" }, { "docid": "4194c642d7246cfc2bdbb58e297badfc", "score": "0.56067145", "text": "func (o ReportConfigFilterResponseOutput) Dimension() ReportConfigComparisonExpressionResponsePtrOutput {\n\treturn o.ApplyT(func(v ReportConfigFilterResponse) *ReportConfigComparisonExpressionResponse { return v.Dimension }).(ReportConfigComparisonExpressionResponsePtrOutput)\n}", "title": "" }, { "docid": "4194c642d7246cfc2bdbb58e297badfc", "score": "0.56067145", "text": "func (o ReportConfigFilterResponseOutput) Dimension() ReportConfigComparisonExpressionResponsePtrOutput {\n\treturn o.ApplyT(func(v ReportConfigFilterResponse) *ReportConfigComparisonExpressionResponse { return v.Dimension }).(ReportConfigComparisonExpressionResponsePtrOutput)\n}", "title": "" }, { "docid": "585cc2a1960026879d5c4d8f94a2e6ee", "score": "0.5552469", "text": "func (o ReportConfigFilterResponsePtrOutput) Dimension() ReportConfigComparisonExpressionResponsePtrOutput {\n\treturn o.ApplyT(func(v *ReportConfigFilterResponse) *ReportConfigComparisonExpressionResponse {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Dimension\n\t}).(ReportConfigComparisonExpressionResponsePtrOutput)\n}", "title": "" }, { "docid": "585cc2a1960026879d5c4d8f94a2e6ee", "score": "0.5552469", "text": "func (o ReportConfigFilterResponsePtrOutput) Dimension() ReportConfigComparisonExpressionResponsePtrOutput {\n\treturn o.ApplyT(func(v *ReportConfigFilterResponse) *ReportConfigComparisonExpressionResponse {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Dimension\n\t}).(ReportConfigComparisonExpressionResponsePtrOutput)\n}", "title": "" }, { "docid": "3fbf9f7331c27ee33aeeb1346f560452", "score": "0.55082184", "text": "func (o *RumDimensionDefinition) GetDimension() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Dimension\n}", "title": "" }, { "docid": "9320d3f3b6a02cd1cc9966e7cad56644", "score": "0.5499657", "text": "func (o ReportConfigFilterOutput) Dimension() ReportConfigComparisonExpressionPtrOutput {\n\treturn o.ApplyT(func(v ReportConfigFilter) *ReportConfigComparisonExpression { return v.Dimension }).(ReportConfigComparisonExpressionPtrOutput)\n}", "title": "" }, { "docid": "9320d3f3b6a02cd1cc9966e7cad56644", "score": "0.5499657", "text": "func (o ReportConfigFilterOutput) Dimension() ReportConfigComparisonExpressionPtrOutput {\n\treturn o.ApplyT(func(v ReportConfigFilter) *ReportConfigComparisonExpression { return v.Dimension }).(ReportConfigComparisonExpressionPtrOutput)\n}", "title": "" }, { "docid": "0b276d42237222485f61c5e6537694bf", "score": "0.5469638", "text": "func (o ReportConfigFilterPtrOutput) Dimension() ReportConfigComparisonExpressionPtrOutput {\n\treturn o.ApplyT(func(v *ReportConfigFilter) *ReportConfigComparisonExpression {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Dimension\n\t}).(ReportConfigComparisonExpressionPtrOutput)\n}", "title": "" }, { "docid": "0b276d42237222485f61c5e6537694bf", "score": "0.5469638", "text": "func (o ReportConfigFilterPtrOutput) Dimension() ReportConfigComparisonExpressionPtrOutput {\n\treturn o.ApplyT(func(v *ReportConfigFilter) *ReportConfigComparisonExpression {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Dimension\n\t}).(ReportConfigComparisonExpressionPtrOutput)\n}", "title": "" }, { "docid": "42a7812d01e6017115f3df87599ee52d", "score": "0.5465378", "text": "func (self *PhysicsNinjaBody) GravityScale() int{\n return self.Object.Get(\"gravityScale\").Int()\n}", "title": "" }, { "docid": "5265287e426f948fbd7b14d433198355", "score": "0.54363936", "text": "func Custom(width, height uint) Dimension {\n\treturn dimension{\n\t\twidth: width,\n\t\theight: height,\n\t}\n}", "title": "" }, { "docid": "7c1cfbce5ed5ac938f4a56ef0444e937", "score": "0.5421967", "text": "func (sh *Shape) Dim(i int) int { return sh.Shp[i] }", "title": "" }, { "docid": "5b2ec330318a17d3b74378c502f0d5d5", "score": "0.5403725", "text": "func (self *PhysicsNinjaBody) Width() int{\n return self.Object.Get(\"width\").Int()\n}", "title": "" }, { "docid": "f662536c23302e9cde3afbc77727e859", "score": "0.5383666", "text": "func NewDimension(name string, level *Level, id DimensionId) *Dimension {\n\tvar path = level.serverPath + \"worlds/\" + level.GetName() + \"/\" + name + \"/region/\"\n\tos.MkdirAll(path, 0700)\n\n\tvar dimension = &Dimension{name, level, id, nil, nil, sync.RWMutex{}, make(map[uint64]chunks.ChunkEntity), make(map[uuid.UUID]chunks.Viewer), make(map[int64]r3.Vector)}\n\n\treturn dimension\n}", "title": "" }, { "docid": "d6e6dbb178223b7f3d39a7aebd27aa4b", "score": "0.5372596", "text": "func (g *Geometry) CoordDimension() int {\n\treturn int(cGEOSGeom_getCoordinateDimension(g.g))\n}", "title": "" }, { "docid": "110df0aee6ee2665cee78e6cfa9d476a", "score": "0.5352864", "text": "func Square(size uint) Dimension {\n\treturn dimension{\n\t\twidth: size,\n\t\theight: size,\n\t}\n}", "title": "" }, { "docid": "202cc6d0665a9a19f253e809dbf994a0", "score": "0.5350274", "text": "func (r Ring) Dimensions() int {\n\treturn 2\n}", "title": "" }, { "docid": "ad1b3bc4692c8a169bb5e398185b0d66", "score": "0.53459626", "text": "func (cdf *CDF) GetDimension(name string) (uint64, bool) {\n\tfor _, d := range cdf.dimensions {\n\t\tif d.name == name {\n\t\t\treturn d.dimLength, true\n\t\t}\n\t}\n\treturn 0, false\n}", "title": "" }, { "docid": "834a7a9fb8626fe924f312ab310904c4", "score": "0.5334468", "text": "func (s size1D) Size() int { return int(s) }", "title": "" }, { "docid": "ff2d34a77735fe25001061f57b0b4321", "score": "0.5326284", "text": "func (s size3D) Size() (Nx, Ny, Nz int) { return s[0], s[1], s[2] }", "title": "" }, { "docid": "29b2039a65e9d716ab95e47a295f7197", "score": "0.5279177", "text": "func Dim(x, y float32) float32 {\n\treturn math.Dim(x, y)\n}", "title": "" }, { "docid": "8aa6f2dcc288fa9da52bd5d6c9ef852c", "score": "0.52732575", "text": "func (*TensorShapeProto_Dimension) Descriptor() ([]byte, []int) {\n\treturn file_internal_onnx_onnx_proto_rawDescGZIP(), []int{10, 0}\n}", "title": "" }, { "docid": "81ace3f1abf5a1a517343eeb743d3feb", "score": "0.5266701", "text": "func CreateDimension(name string) *Dimension {\r\n\treturn &Dimension{Name: name}\r\n}", "title": "" }, { "docid": "1ecc3480a943697e8e75fb72c19d95a4", "score": "0.5239782", "text": "func (o ScaleRuleMetricDimensionOutput) DimensionName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ScaleRuleMetricDimension) string { return v.DimensionName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "8be9b0e4da6040e3d08586e878d4000b", "score": "0.5213961", "text": "func (v ViewBox) Size() (dx, dy float32) {\n\treturn v.MaxX - v.MinX, v.MaxY - v.MinY\n}", "title": "" }, { "docid": "1e37274acf21579f2a7aaf2efb8626e5", "score": "0.520678", "text": "func GetWidth(e ld.Entity) interface{} { return e.Get(Prop_Width.ID) }", "title": "" }, { "docid": "8d8e64e0851d0621f0695bb869adeb38", "score": "0.51825625", "text": "func (u *Query) GetDimension() string {\n\treturn u.dimension\n}", "title": "" }, { "docid": "b396d3135d5ff00e1febb5572af5c178", "score": "0.5168197", "text": "func (bo *Board) Size() Vec2 {\n\treturn Vec2{bo.Width(), bo.Height()}\n}", "title": "" }, { "docid": "994fd0fabb1775436ff0d9d2e6af9c0c", "score": "0.51446503", "text": "func (m *VUNMesh) Size() int32 {\n\treturn m.Msize\n}", "title": "" }, { "docid": "c95c7850056bd7caf6de68d346f191f2", "score": "0.5136329", "text": "func (v Vector) Dimensionality() int {\n\treturn len(v)\n}", "title": "" }, { "docid": "84aa4a34f1fba153d33e0627bd48b548", "score": "0.51336116", "text": "func (b *Box) Size() dprec.Vec3 {\n\treturn b.size\n}", "title": "" }, { "docid": "6a9907ac8667781cfc9f5d28008e2d14", "score": "0.5128479", "text": "func Size(g ReducedGraph) float64 { return 1 / float64(len(g.Structure())) }", "title": "" }, { "docid": "ea1a444e961d378f701c61287cecfed2", "score": "0.5122719", "text": "func (r Rectangle) Size() Point {\n\treturn Point{X: r.Dx(), Y: r.Dy()}\n}", "title": "" }, { "docid": "cec56e85e47e6f1626a5e3d09e43853e", "score": "0.5113416", "text": "func (o *Object) Size() int64 {\n return o.size\n}", "title": "" }, { "docid": "5c3e1da6f32e738f3b9554e0e6ee67b7", "score": "0.5110391", "text": "func (d *Device) Size() (x, y int16) {\n\treturn int16(d.cfg.Width), int16(d.cfg.Height)\n}", "title": "" }, { "docid": "d809421ae43ec44bede9f96377c4a517", "score": "0.50866777", "text": "func (gdt *Rect2) GetSize() Vector2 {\n\n\t/* go_godot_rect2_get_size(API_STRUCT) ->godot_vector2 */\n\n\tapi := CoreApi\n\trcv := (*C.godot_rect2)(unsafe.Pointer(gdt))\n\n\tret := C.go_godot_rect2_get_size(\n\t\tapi,\n\t\trcv,\n\t)\n\n\treturn *(*Vector2)(unsafe.Pointer(&ret))\n}", "title": "" }, { "docid": "8e6facdd232a1606fba5e5baaa759f8b", "score": "0.5082809", "text": "func (b *Box) Length() float64 {\n\treturn b.size.Z\n}", "title": "" }, { "docid": "3da72275c738e670d0fb9185be00be2b", "score": "0.50817186", "text": "func (o *Object) Size() int64 {\n\treturn o.size\n}", "title": "" }, { "docid": "5730c23a4c83b4b9f3036428cba3292f", "score": "0.50753975", "text": "func (u Unit) SpaceDim() int8 {\n\treturn int8(int32(u) >> 28)\n}", "title": "" }, { "docid": "78e15c68121515bc530063141fe96f66", "score": "0.50724804", "text": "func (self *PhysicsNinjaBody) Height() int{\n return self.Object.Get(\"height\").Int()\n}", "title": "" }, { "docid": "81c8c70443c22b9f006a6092e2692550", "score": "0.5067391", "text": "func (element Element) Size() int {\n\tlength := element.Length()\n\treturn VarNum(element.Type).Size() + VarNum(length).Size() + length\n}", "title": "" }, { "docid": "cfcfc8ec0eff336e214cef820a7e146a", "score": "0.5063313", "text": "func (r Rectangle) Size() Point {\n\treturn Point{r.Dx(), r.Dy()}\n}", "title": "" }, { "docid": "781c20f150a071f30fc0fd893ea44b4d", "score": "0.5026199", "text": "func (o ScaleRuleMetricDimensionResponseOutput) DimensionName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ScaleRuleMetricDimensionResponse) string { return v.DimensionName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "558ca141da208b7d560dcd01948a01ba", "score": "0.50258553", "text": "func (ll *item) Dim() int { return 2 }", "title": "" }, { "docid": "89884127be5cfb8bb8779ca3246f4690", "score": "0.5024475", "text": "func (bullet *Bullet) GetDimensionalData() (int, int, int, int) {\n\treturn bullet.X, bullet.Y, bullet.W, bullet.H\n}", "title": "" }, { "docid": "eebf8cc49c258778c0d28e68ceacac89", "score": "0.5016818", "text": "func (s *Style) Size() (dx, dy int) {\n\tdx = s.PaddingLeft + s.PaddingRight + s.BorderLeftWidth + s.BorderRightWidth +\n\t\ts.MarginLeft + s.MarginRight\n\tdy = s.PaddingTop + s.PaddingBottom + s.BorderTopWidth + s.BorderBottomWidth +\n\t\ts.MarginTop + s.MarginBottom\n\treturn\n}", "title": "" }, { "docid": "ee0cbbdef27c9860699a79d16298aa82", "score": "0.501492", "text": "func (o OATH) Size() int {\n\treturn o.size\n}", "title": "" }, { "docid": "db788a97b907a77ddd6ee2cbb7a32c91", "score": "0.49908367", "text": "func (surface *Surface) Size() Point {\n\treturn Point{int(surface.s.w), int(surface.s.h)}\n}", "title": "" }, { "docid": "c9c311e2bcb48d3f9fd2ae86887d0ba7", "score": "0.49908066", "text": "func (r Rectangle) Size() Vec3 {\n\treturn Vec3{\n\t\tr.Max[0] - r.Min[0],\n\t\tr.Max[1] - r.Min[1],\n\t\tr.Max[2] - r.Min[2],\n\t}\n}", "title": "" }, { "docid": "f555f7b8e223da581adb84f0f039300b", "score": "0.4989708", "text": "func NewRumDimensionDefinition(topX int32, dimension string, ) *RumDimensionDefinition {\n\tthis := RumDimensionDefinition{}\n\tthis.TopX = topX\n\tthis.Dimension = dimension\n\treturn &this\n}", "title": "" }, { "docid": "4c965b10435abcacd0164210414ee669", "score": "0.49874136", "text": "func (m *MdhdBox) Size() uint64 {\n\tif m.Version == 1 {\n\t\treturn 44\n\t}\n\treturn 32 // m.Version = 0\n}", "title": "" }, { "docid": "3d5ad95e7646937fecaa557c7d4557eb", "score": "0.4973173", "text": "func (d *Device) Size() (w, h int16) {\n\treturn d.width, d.height\n}", "title": "" }, { "docid": "c271394156f4828c0806eabb7f812f92", "score": "0.4967061", "text": "func SizeOf(axis int, x *Node) (retVal *Node, err error) {\n\top := sizeOp{\n\t\taxis: axis,\n\t\td: x.Dims(),\n\t}\n\n\t// if the shape is known\n\tif x.shape != nil {\n\t\top.val = x.shape[axis]\n\t}\n\n\treturn ApplyOp(op, x)\n}", "title": "" }, { "docid": "9fd159e11e2bf7c87edc9dce633594b3", "score": "0.49668318", "text": "func (o *DimensionsDTO) GetWidth() float64 {\n\tif o == nil || o.Width == nil {\n\t\tvar ret float64\n\t\treturn ret\n\t}\n\treturn *o.Width\n}", "title": "" }, { "docid": "d8a185137a0f15d845a53c2fa08af7b1", "score": "0.4961583", "text": "func (d *Drawer) Size() gruid.Point {\n\tp := d.rect.Size()\n\tif p.X <= 0 {\n\t\tp.X = 1\n\t}\n\tif p.Y <= 0 {\n\t\tp.Y = 1\n\t}\n\treturn gruid.Point{X: p.X, Y: p.Y}\n}", "title": "" }, { "docid": "8bf6e18061961e7f312be1469830a1b9", "score": "0.49558568", "text": "func (r Rectangle) Size() Point {\n\treturn Pt(r.Dx(), r.Dy())\n}", "title": "" }, { "docid": "a583c2b2a058c1a97e04c1cf34a7c603", "score": "0.49496594", "text": "func (gdt *AABB) GetSize() Vector3 {\n\n\t/* go_godot_aabb_get_size(API_STRUCT) ->godot_vector3 */\n\n\tapi := CoreApi\n\trcv := (*C.godot_aabb)(unsafe.Pointer(gdt))\n\n\tret := C.go_godot_aabb_get_size(\n\t\tapi,\n\t\trcv,\n\t)\n\n\treturn *(*Vector3)(unsafe.Pointer(&ret))\n}", "title": "" }, { "docid": "b4531ee62834ad1ca71a3c78285bdf99", "score": "0.4934042", "text": "func (o *Object) Size() int64 {\n\tctx := context.Background() // Note: Object.Size does not pass context!\n\terr := o.readMetaData(ctx, false)\n\tif err != nil {\n\t\tfs.Errorf(o, \"%v\", err)\n\t}\n\treturn o.size\n}", "title": "" }, { "docid": "ece99fd65ec436414b9d2bb2772aa73f", "score": "0.49332047", "text": "func (b *Box3) Size(optionalTarget *Vector3) *Vector3 {\n\n\tvar result *Vector3\n\tif optionalTarget == nil {\n\t\tresult = NewVector3(0, 0, 0)\n\t} else {\n\t\tresult = optionalTarget\n\t}\n\treturn result.SubVectors(&b.Min, &b.Max)\n}", "title": "" }, { "docid": "ece99fd65ec436414b9d2bb2772aa73f", "score": "0.49332047", "text": "func (b *Box3) Size(optionalTarget *Vector3) *Vector3 {\n\n\tvar result *Vector3\n\tif optionalTarget == nil {\n\t\tresult = NewVector3(0, 0, 0)\n\t} else {\n\t\tresult = optionalTarget\n\t}\n\treturn result.SubVectors(&b.Min, &b.Max)\n}", "title": "" }, { "docid": "75e238b0fdf0d2139a8716b1ed39dfc3", "score": "0.49232695", "text": "func (d Datatype) Size() uint64 {\n\treturn uint64(C.tiledb_datatype_size(C.tiledb_datatype_t(d)))\n}", "title": "" }, { "docid": "be87449a1a51d3c6c03e1c92cbfac270", "score": "0.49197444", "text": "func (d *Device) Size() (w, h int16) {\n\treturn d.height, d.width\n}", "title": "" }, { "docid": "e35f877e2db9b60739f6b9fe9711caee", "score": "0.4912662", "text": "func (e *Embedding) Dim() int {\n\treturn e.Vectors.Cols\n}", "title": "" }, { "docid": "b325baf2da852d12605e6c2013532275", "score": "0.4903529", "text": "func (p Station) Dims() int { return coordDim }", "title": "" }, { "docid": "66870381172cfcaa84b52faa7e8fe0e5", "score": "0.48941404", "text": "func (n *NodeWithMeta) Size() uint64 {\n\treturn uint64(len(n.Data))\n}", "title": "" }, { "docid": "448611618ce26494aca64a46d0cb33d7", "score": "0.4891178", "text": "func (o *Object) Size() int64 {\n\tdebug(o.fs, \"Size '\"+o.remote+\"'\")\n\treturn o.info.Size()\n}", "title": "" }, { "docid": "4af64de33a26c0502b5659a08a6f60bf", "score": "0.4889417", "text": "func (o *Viewport) GetSize() gdnative.Vector2 {\n\t//log.Println(\"Calling Viewport.GetSize()\")\n\n\t// Build out the method's arguments\n\tptrArguments := make([]gdnative.Pointer, 0, 0)\n\n\t// Get the method bind\n\tmethodBind := gdnative.NewMethodBind(\"Viewport\", \"get_size\")\n\n\t// Call the parent method.\n\t// Vector2\n\tretPtr := gdnative.NewEmptyVector2()\n\tgdnative.MethodBindPtrCall(methodBind, o.GetBaseObject(), ptrArguments, retPtr)\n\n\t// If we have a return type, convert it from a pointer into its actual object.\n\tret := gdnative.NewVector2FromPointer(retPtr)\n\treturn ret\n}", "title": "" }, { "docid": "5567d78d4499508fe04b5d5905f819ce", "score": "0.4887057", "text": "func WithDimensions(dimensions ...Dimensions) Dimension {\n\tdims := createDimensions(dimensions...)\n\treturn Dimension{dims}\n}", "title": "" }, { "docid": "9caf4195df74ace444946d9bfbd689c4", "score": "0.48841944", "text": "func Dimen() DimenT {\n\treturn DimenT{d: 0}\n}", "title": "" }, { "docid": "88bea154218c8c5dc30b7624c0a58f0c", "score": "0.48835608", "text": "func (gdt *Dictionary) Size() Int {\n\targ0 := gdt.getBase()\n\n\tret := C.go_godot_dictionary_size(GDNative.api, arg0)\n\n\treturn Int(ret)\n}", "title": "" }, { "docid": "435577150fae4e24da65ada0de0c39c9", "score": "0.4883175", "text": "func (d *Bozo32) Size() int { return Size }", "title": "" }, { "docid": "1f013e01854f70cd7547f1a057820b1f", "score": "0.48696142", "text": "func getDimension(req *indexpb.CreateIndexRequest) (int64, error) {\n\tfor _, kvPair := range req.GetTypeParams() {\n\t\tkey, value := kvPair.GetKey(), kvPair.GetValue()\n\t\tif key == \"dim\" {\n\t\t\tdim, err := strconv.ParseInt(value, 10, 64)\n\t\t\tif err != nil {\n\t\t\t\terrMsg := \"dimension is invalid\"\n\t\t\t\tlog.Error(errMsg)\n\t\t\t\treturn 0, errors.New(errMsg)\n\t\t\t}\n\t\t\treturn dim, nil\n\t\t}\n\t}\n\terrMsg := \"dimension is not in type params\"\n\tlog.Error(errMsg)\n\treturn 0, errors.New(errMsg)\n}", "title": "" }, { "docid": "a31fd4737409e3334b3b41d02140caf8", "score": "0.48691416", "text": "func (object Object) Width() int {\n\treturn object.Property(as.PropertyWidth).AsInt(\"\")\n}", "title": "" }, { "docid": "e3c521912be3c3af0976a8f51063d50b", "score": "0.4867042", "text": "func (o DynamicMetricCriteriaOutput) Dimensions() MetricDimensionArrayOutput {\n\treturn o.ApplyT(func(v DynamicMetricCriteria) []MetricDimension { return v.Dimensions }).(MetricDimensionArrayOutput)\n}", "title": "" }, { "docid": "5434b915f51dd6fd3e2ef65f93ae4784", "score": "0.48666066", "text": "func (e *Element) Dimensions() ([]float64, error) {\n\tvar points []float64\n\te.lock.RLock()\n\n\tparams := &gcdapi.DOMGetBoxModelParams{\n\t\tNodeId: e.id,\n\t}\n\tbox, err := e.tab.DOM.GetBoxModelWithParams(params)\n\n\te.lock.RUnlock()\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tpoints = box.Content\n\treturn points, nil\n}", "title": "" }, { "docid": "01c546c9d35da46dffad07c37bd903bf", "score": "0.4863855", "text": "func (gdt *Dictionary) Size() int32 {\n\n\t/* go_godot_dictionary_size(API_STRUCT) ->godot_int */\n\n\tapi := CoreApi\n\trcv := (*C.godot_dictionary)(unsafe.Pointer(gdt))\n\n\tret := C.go_godot_dictionary_size(\n\t\tapi,\n\t\trcv,\n\t)\n\n\treturn *(*int32)(unsafe.Pointer(&ret))\n}", "title": "" }, { "docid": "285840884db3c5b7c5578ab609e9286c", "score": "0.4863126", "text": "func NewDimensionsDTO() *DimensionsDTO {\n\tthis := DimensionsDTO{}\n\treturn &this\n}", "title": "" }, { "docid": "cbdc1288b121b89ccbe9c34c4d80413e", "score": "0.4861594", "text": "func (v IntVector) Dimensionality() int {\n\treturn len(v)\n}", "title": "" }, { "docid": "25852fce6101a32ad40413ecd16fba2c", "score": "0.48455116", "text": "func (b *MetaBox) Size() uint64 {\n\treturn 4 + containerSize(b.Children)\n}", "title": "" }, { "docid": "3d3d605e8d7ef3fd46a74d3e2c52e289", "score": "0.48437655", "text": "func (s *Simulation) Size() (int, int, error) {\n\treturn s.width, s.height, nil\n}", "title": "" }, { "docid": "ed4bf0f8e4d7ececc218b1902d617fd8", "score": "0.48306373", "text": "func (o CriteriaOutput) Dimensions() DimensionArrayOutput {\n\treturn o.ApplyT(func(v Criteria) []Dimension { return v.Dimensions }).(DimensionArrayOutput)\n}", "title": "" }, { "docid": "fd9aa98274016b12078a2fafc5235aec", "score": "0.48295876", "text": "func (n *NetID) Size() int {\n\treturn 3\n}", "title": "" }, { "docid": "76b9be1f2296dd41a20afef0682453b6", "score": "0.48264766", "text": "func (gdt *Vector3) Length() float32 {\n\n\t/* go_godot_vector3_length(API_STRUCT) ->godot_real */\n\n\tapi := CoreApi\n\trcv := (*C.godot_vector3)(unsafe.Pointer(gdt))\n\n\tret := C.go_godot_vector3_length(\n\t\tapi,\n\t\trcv,\n\t)\n\n\treturn *(*float32)(unsafe.Pointer(&ret))\n}", "title": "" }, { "docid": "95d60f4029de6b8c5dff1dbeefd8bfe9", "score": "0.48214543", "text": "func (b *Box3) Size(optionalTarget float64) *Box3 {\n\tb.p.Call(\"size\", optionalTarget)\n\treturn b\n}", "title": "" }, { "docid": "c122648c32a297f448bd87f1bd3645c8", "score": "0.48177043", "text": "func (o *Object) Size() int64 {\n\terr := o.readMetaData(context.TODO())\n\tif err != nil {\n\t\tfs.Logf(o, \"Failed to read metadata: %v\", err)\n\t\treturn 0\n\t}\n\treturn o.size\n}", "title": "" } ]
eaed514005caa0f7a7592242aca00f25
GetSessionTokenOk returns a tuple with the SessionToken field value and a boolean to check if the value has been set.
[ { "docid": "f89dd3fadae0d7e4c5f62a26aaff0c71", "score": "0.793138", "text": "func (o *AuthenticationResponse) GetSessionTokenOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.SessionToken, true\n}", "title": "" } ]
[ { "docid": "34f80c6c6c69646abd1145051fe1a668", "score": "0.71178114", "text": "func (o *Venda) GetTokenOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Token.Get(), o.Token.IsSet()\n}", "title": "" }, { "docid": "94d91ff0fafb358ec9121d214ca2563d", "score": "0.68750626", "text": "func (o *LoginRequest) GetSessionIdOk() (*string, bool) {\n\tif o == nil || o.SessionId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SessionId, true\n}", "title": "" }, { "docid": "d49b19c03bed2f89f5b0883643517d4e", "score": "0.6842342", "text": "func (o *Token) GetTokenOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Token, true\n}", "title": "" }, { "docid": "8676ff76e30791e2900f07a1f9e8bf7d", "score": "0.67824006", "text": "func (o *AwsIamToken) GetTokenOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Token, true\n}", "title": "" }, { "docid": "5709d98676c4296e5fe01d78d16e96f2", "score": "0.67762184", "text": "func (o *CreateUser200Response) GetTokenOk() (*string, bool) {\n\tif o == nil || IsNil(o.Token) {\n\t\treturn nil, false\n\t}\n\treturn o.Token, true\n}", "title": "" }, { "docid": "407c093cafef1a73eec3f17234524564", "score": "0.6733018", "text": "func (o *Authorization) GetTokenOk() (*string, bool) {\n\tif o == nil || o.Token == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Token, true\n}", "title": "" }, { "docid": "09e269971b089140e6bea1d5d9f3cdb0", "score": "0.6728894", "text": "func (o *LogoutFlow) GetLogoutTokenOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.LogoutToken, true\n}", "title": "" }, { "docid": "f86dac0f5bf7504c936cb1481ec4a052", "score": "0.6691671", "text": "func (o *JsonMDNOAuthToken) GetTokenOk() (*string, bool) {\n\tif o == nil || o.Token == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Token, true\n}", "title": "" }, { "docid": "cc709717aaa631f0e738f34d3d9c69fd", "score": "0.65759677", "text": "func (o *PostRestoreKVResponse) GetTokenOk() (*string, bool) {\n\tif o == nil || o.Token == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Token, true\n}", "title": "" }, { "docid": "ce06d308d6a3b07e06903faf7ea259e2", "score": "0.65548897", "text": "func (o *UpdatePasswordReqWeb) GetTokenIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.TokenId, true\n}", "title": "" }, { "docid": "0f1ae0e33fc874cc722c1292ceab5e06", "score": "0.6438028", "text": "func (o *OAuth2ConsentSessionExpiresAt) GetIdTokenOk() (*time.Time, bool) {\n\tif o == nil || o.IdToken == nil {\n\t\treturn nil, false\n\t}\n\treturn o.IdToken, true\n}", "title": "" }, { "docid": "56e13fc578f0e9934b2b03c74f3bb0e3", "score": "0.63982785", "text": "func (o *LoginRequestResponseData) GetOtpTokenOk() (*string, bool) {\n\tif o == nil || o.OtpToken == nil {\n\t\treturn nil, false\n\t}\n\treturn o.OtpToken, true\n}", "title": "" }, { "docid": "e0aee85c5db84df9a9a5a767e5414ffd", "score": "0.63869727", "text": "func (o *UpdatePasswordReqWeb) GetCaptchaTokenOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CaptchaToken, true\n}", "title": "" }, { "docid": "4541028db62e8fb9a6006a1dd392058c", "score": "0.6343339", "text": "func (o *PaymentMethodCardRequest) GetTokenIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.TokenId, true\n}", "title": "" }, { "docid": "729c43fb405fb1be38eb18d7df1837c4", "score": "0.6238008", "text": "func (o *ApplianceDeviceClaimAllOf) GetSecurityTokenOk() (*string, bool) {\n\tif o == nil || o.SecurityToken == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityToken, true\n}", "title": "" }, { "docid": "74c33c0c6f55284f206378851b0f3530", "score": "0.62119246", "text": "func (o *OAuth2ConsentRequest) GetLoginSessionIdOk() (*string, bool) {\n\tif o == nil || o.LoginSessionId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LoginSessionId, true\n}", "title": "" }, { "docid": "6407dcd74b52ed1cf9d7f227c5209810", "score": "0.6113351", "text": "func (tv *TV) GetTVSession() bool {\n\t// abort if pairing key isn't present\n\tif tv.Key == \"\" {\n\t\tfmt.Printf(\"%s No Pairing Key, set key first\\n\", tv.Name)\n\t\treturn false\n\t}\n\n\tcommandBody := fmt.Sprintf(`<!--?xml version=\"1.0\" encoding=\"utf-8\"?--><auth><type>AuthReq</type><value>%s</value></auth>`, tv.Key)\n\n\ttype Result struct {\n\t\tXMLName xml.Name `xml:\"envelope\"`\n\t\tSuccess string `xml:\"ROAPErrorDetail\"`\n\t\tSessionID string `xml:\"session\"`\n\t}\n\n\tv := Result{}\n\n\tresp, senderror := tv.SendXML(commandBody, \"/auth\")\n\tif senderror != nil {\n\t\t// fmt.Println(\"Error sending command\")\n\t\treturn false\n\t}\n\n\tbody, readerr := ioutil.ReadAll(resp.Body)\n\tif readerr == nil && body != nil {\n\t\txml.Unmarshal(body, &v)\n\t\tif v.Success == \"OK\" {\n\t\t\ttv.Session = v.SessionID\n\t\t\treturn true\n\t\t}\n\t\treturn false\n\t}\n\treturn false\n}", "title": "" }, { "docid": "7ed313e1d10a84327f006d92f8d48556", "score": "0.60986596", "text": "func (o *Okta) GetSessionToken() (string, error) {\n\tp := &payload{\n\t\tUser: o.User,\n\t\tPass: o.Pass,\n\t\tOptions: map[string]bool{\n\t\t\t\"multiOptionalFactorEnroll\": false,\n\t\t\t\"warnBeforePasswordExpired\": false,\n\t\t},\n\t}\n\tpJSON, err := json.Marshal(p)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tr, err := o.C.Post(o.AuthAPI, \"application/json\", bytes.NewBuffer(pJSON))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer r.Body.Close()\n\tbody, _ := ioutil.ReadAll(r.Body)\n\tif r.StatusCode != 200 {\n\t\terr = fmt.Errorf(\"Error: %s\", body)\n\t\treturn \"\", err\n\t}\n\n\tstatus := gjson.GetBytes(body, \"status\").String()\n\tsessionToken := \"\"\n\tif status == \"SUCCESS\" {\n\t\tsessionToken = gjson.GetBytes(body, \"sessionToken\").String()\n\t} else {\n\t\terr = fmt.Errorf(\"Error: %s\", status)\n\t\treturn \"\", err\n\t}\n\n\treturn sessionToken, nil\n}", "title": "" }, { "docid": "7d3b7f20e58c0a20a0495278d73dd325", "score": "0.60525274", "text": "func (o *UpdateLoginFlowWithCodeMethod) GetCsrfTokenOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CsrfToken, true\n}", "title": "" }, { "docid": "24645f33d8b0ed28e616b5801a19eaa3", "score": "0.602129", "text": "func (o *IntrospectedOAuth2Token) GetTokenUseOk() (*string, bool) {\n\tif o == nil || o.TokenUse == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TokenUse, true\n}", "title": "" }, { "docid": "2dbe007653295f30aad251618fa2d019", "score": "0.5937908", "text": "func (o *LinkSessionFinishedWebhook) GetPublicTokenOk() (*string, bool) {\n\tif o == nil || o.PublicToken == nil {\n\t\treturn nil, false\n\t}\n\treturn o.PublicToken, true\n}", "title": "" }, { "docid": "6360f4bb26c492c45239c68f0a97832f", "score": "0.593205", "text": "func (o *LinkSessionFinishedWebhook) GetLinkTokenOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.LinkToken, true\n}", "title": "" }, { "docid": "b0abc24251eaa42127dead9e7f3adb20", "score": "0.5921081", "text": "func (o *BotTokens) GetAccessTokenOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.AccessToken, true\n}", "title": "" }, { "docid": "f49fed0c594e95c249141dae2f30660b", "score": "0.58677596", "text": "func (o *SettingsObjectUpdate) GetUpdateTokenOk() (*string, bool) {\n\tif o == nil || o.UpdateToken == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdateToken, true\n}", "title": "" }, { "docid": "4ff95bac5e5340242d3d3fab3f4e6606", "score": "0.5866172", "text": "func (c *bytemarkClient) GetSessionToken() string {\n\tif c.authSession == nil {\n\t\treturn \"\"\n\t}\n\treturn c.authSession.Token\n}", "title": "" }, { "docid": "78cbdb1278b143a024dea104e2e9343a", "score": "0.58527994", "text": "func (o *SubmitSelfServiceSettingsFlowWithProfileMethodBody) GetCsrfTokenOk() (*string, bool) {\n\tif o == nil || o.CsrfToken == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CsrfToken, true\n}", "title": "" }, { "docid": "dd9a883f04e22c5352a512a8e96cb36e", "score": "0.5811392", "text": "func (i *Inventory) sessionToken(sessionKey string) (availableToken *oidc.Token, pendingToken chan *TokenResult) {\n\tsessionState, sessionExists := i.stateMap.Get(sessionKey)\n\tif sessionExists {\n\t\tswitch val := sessionState.Value().(type) {\n\t\tcase *oidc.Token:\n\t\t\treturn val, nil\n\t\tcase *TokenPromise:\n\t\t\treturn nil, val.ToChannel()\n\t\tdefault:\n\t\t\treturn nil, nil\n\t\t}\n\t} else {\n\t\treturn nil, nil\n\t}\n}", "title": "" }, { "docid": "ce91225fb8ca92551c4a4da377498af3", "score": "0.58050597", "text": "func (o *BotTokens) GetVerificationTokenOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.VerificationToken, true\n}", "title": "" }, { "docid": "e3c19ca81cd03a1ba67ab84fec08270b", "score": "0.5797352", "text": "func (o *ProcessorSignalDecisionReportRequest) GetProcessorTokenOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ProcessorToken, true\n}", "title": "" }, { "docid": "b0814481d33e5f0706e3a1229ea93962", "score": "0.5797259", "text": "func (o *IosVppEBook) GetVppTokenIdOk() (string, bool) {\n\tif o == nil || o.VppTokenId == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.VppTokenId, true\n}", "title": "" }, { "docid": "07ba02a372ba9203890fe139e4edb552", "score": "0.5781104", "text": "func (o *AuthenticationResponse) GetSessionToken() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.SessionToken\n}", "title": "" }, { "docid": "9d8b5d20fe16fd6a0571c31aef38f843", "score": "0.5778972", "text": "func (o *Token) GetCheckoutOk() (*TokenCheckout, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Checkout.Get(), o.Checkout.IsSet()\n}", "title": "" }, { "docid": "32eb20c30aa5b3256289342a7dffaa17", "score": "0.5774467", "text": "func (o *SmscSession) GetIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Id, true\n}", "title": "" }, { "docid": "53877155b2082c219cf527fd54c5635e", "score": "0.57485867", "text": "func validateSessionToken(token string) (username string, found bool) {\n\tusername, found = sessions[token]\n\treturn\n}", "title": "" }, { "docid": "3a375fdecc548398716fc090f685f883", "score": "0.57232493", "text": "func (o *Token) GetCardOk() (*TokenCard, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Card.Get(), o.Card.IsSet()\n}", "title": "" }, { "docid": "b0d6550837efcbbd8609256dd057bc2e", "score": "0.5720917", "text": "func authTokenFromCtx(ctx context.Context) (authTokenValue, bool) {\n\tatv, ok := ctx.Value(authTokenKey{}).(authTokenValue)\n\treturn atv, ok\n}", "title": "" }, { "docid": "bbf20ec8a0d4cc9db0603696c5c9f15a", "score": "0.56993335", "text": "func (o *NotificationConfig) GetAuthorizationTokenOk() (*string, bool) {\n\tif o == nil || o.AuthorizationToken == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AuthorizationToken, true\n}", "title": "" }, { "docid": "225db7934e86c0a60841237ae0575084", "score": "0.56983805", "text": "func (o *OAuth2ConsentSessionExpiresAt) GetAccessTokenOk() (*time.Time, bool) {\n\tif o == nil || o.AccessToken == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AccessToken, true\n}", "title": "" }, { "docid": "92e5ec23877a1202c8138fd3a2bc03c6", "score": "0.56836265", "text": "func IsValidToken(usr string, token string) bool {\n\t//check username/token pair for validity\n\tquery := QUERY_GET_TOKEN\n\thashed_usr := Hash1(usr)\n\trows := QueryDB(query, hashed_usr)\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tvar (\n\t\t\tusername string\n\t\t\ttok string\n\t\t\ttoken_time int64\n\t\t)\n\t\terr = rows.Scan(&username, &tok, &token_time)\n\t\tif err != nil {\n\t\t\tfmt.Println(\"Error accessing rows (my_server.go: IsValidToken)\")\n\t\t\tfmt.Println(err)\n\t\t\treturn false\n\t\t}\n\t\t//check token\n\t\tsame_token := strings.Compare(token, tok) == 0\n\t\t//check time\n\t\tcurr_time := time.Now().Unix()\n\t\t// curr_time := 0\n\t\ttime_diff := curr_time - token_time\n\t\tvalid_time := time_diff <= TOKEN_EXPIRATION\n\t\treturn same_token && valid_time \n\t}\n\treturn false\n}", "title": "" }, { "docid": "269de559adc1487c74620195dec21d29", "score": "0.56833005", "text": "func (o *GenerateTokenResponse) GetFlagsOk() (*GenerateTokenResponseFlags, bool) {\n\tif o == nil || o.Flags == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Flags, true\n}", "title": "" }, { "docid": "1e2fa84d78864eebfcdbaa6fd72ea36e", "score": "0.5682437", "text": "func (o *GenerateTokenResponse) GetAccessTokenOk() (*string, bool) {\n\tif o == nil || o.AccessToken == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AccessToken, true\n}", "title": "" }, { "docid": "ce56b370b04d313626eac0fb7df4644a", "score": "0.5661906", "text": "func (o *IntrospectedOAuth2Token) GetUsernameOk() (*string, bool) {\n\tif o == nil || o.Username == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Username, true\n}", "title": "" }, { "docid": "42c90d92d339e15fb7715b40c2c42a34", "score": "0.56430423", "text": "func (o *CreateUser200Response) GetAccessTokenOk() (*string, bool) {\n\tif o == nil || IsNil(o.AccessToken) {\n\t\treturn nil, false\n\t}\n\treturn o.AccessToken, true\n}", "title": "" }, { "docid": "d04fe1c39e2082678a8c009af5b3195e", "score": "0.56175417", "text": "func (o *IdentityCredentialIdentifierOidcProperties) GetInitialIdTokenOk() (*string, bool) {\n\tif o == nil || o.InitialIdToken == nil {\n\t\treturn nil, false\n\t}\n\treturn o.InitialIdToken, true\n}", "title": "" }, { "docid": "174557323546f59edae6936eed008934", "score": "0.5608427", "text": "func (o *IntrospectedOAuth2Token) GetActiveOk() (*bool, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Active, true\n}", "title": "" }, { "docid": "c057348d87827d158cdf0bff53fbf656", "score": "0.559189", "text": "func (o *OAuth2ConsentSessionExpiresAt) GetRefreshTokenOk() (*time.Time, bool) {\n\tif o == nil || o.RefreshToken == nil {\n\t\treturn nil, false\n\t}\n\treturn o.RefreshToken, true\n}", "title": "" }, { "docid": "8fefaaa64535446baad87713d337bb34", "score": "0.55641085", "text": "func (_Rootchain *RootchainCallerSession) HasToken(_token common.Address) (bool, error) {\n\treturn _Rootchain.Contract.HasToken(&_Rootchain.CallOpts, _token)\n}", "title": "" }, { "docid": "0e276d4251df6a25d5a615f321a1b782", "score": "0.5524018", "text": "func ValidateToken(token string) (string, error) {\n username, exists := Sessions[token];\n if (!exists) {\n return \"\", apierrors.TokenValidationError{apierrors.TOKEN_VALIDATION_NO_TOKEN};\n }\n\n return username, nil;\n}", "title": "" }, { "docid": "2a5079294c98b1e3eb248d68bb1e952b", "score": "0.5523333", "text": "func (o *IntrospectedOAuth2Token) GetTokenTypeOk() (*string, bool) {\n\tif o == nil || o.TokenType == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TokenType, true\n}", "title": "" }, { "docid": "2dc3ccc066b862fdab73b9f2158cebb1", "score": "0.5514955", "text": "func (o *IntrospectedOAuth2Token) GetSubOk() (*string, bool) {\n\tif o == nil || o.Sub == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Sub, true\n}", "title": "" }, { "docid": "845030fbe3463425c03b6731e06c1de7", "score": "0.5484513", "text": "func (_Rootchain *RootchainSession) HasToken(_token common.Address) (bool, error) {\n\treturn _Rootchain.Contract.HasToken(&_Rootchain.CallOpts, _token)\n}", "title": "" }, { "docid": "38590e98498b1cf0f78667a6716dd8b1", "score": "0.5480954", "text": "func (o *CreateUser200Response) GetRefreshTokenOk() (*string, bool) {\n\tif o == nil || IsNil(o.RefreshToken) {\n\t\treturn nil, false\n\t}\n\treturn o.RefreshToken, true\n}", "title": "" }, { "docid": "4d254db761c8b81f909629db0e595b95", "score": "0.54766524", "text": "func (o *CreateUser200Response) HasToken() bool {\n\tif o != nil && !IsNil(o.Token) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "2165f4563e2f1fff2fc78cf07d08d7bf", "score": "0.5471593", "text": "func (o *TokenResponse) GetCheckoutOk() (*TokenResponseCheckout, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Checkout.Get(), o.Checkout.IsSet()\n}", "title": "" }, { "docid": "676ae27c385197f45e20eb41d11e0581", "score": "0.5470639", "text": "func (conf *OnboardingConfig) HasToken() bool {\n\treturn conf.TokenValue != \"\"\n}", "title": "" }, { "docid": "e76ebe759512f42ce3b46e123e801b69", "score": "0.54700726", "text": "func (o *StatusAzureServiceBus) GetSessionsOk() (*map[string]StatusAzureServiceBusSession, bool) {\n\tif o == nil || IsNil(o.Sessions) {\n\t\treturn nil, false\n\t}\n\treturn o.Sessions, true\n}", "title": "" }, { "docid": "df30e0d07e424f9199c4f9b2545f3623", "score": "0.54661036", "text": "func (o *TokenResponse) GetIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Id, true\n}", "title": "" }, { "docid": "0d65b899db191fe94509575ce7d9c6cb", "score": "0.5406062", "text": "func (r *GetResponseBody) GetSessionToken() *session.SessionToken {\n\tif r != nil {\n\t\treturn r.token\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "861661e315e28e9f78e8191226576272", "score": "0.5403855", "text": "func (m *SessionMutation) Token() (r string, exists bool) {\n\tv := m.token\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "4166d83c3d16947398f36b1a076860fb", "score": "0.5379442", "text": "func checkToken(w http.ResponseWriter, r *http.Request) bool {\n\tc, err := r.Cookie(\"token\")\n\tif err != nil {\n\t\tif err == http.ErrNoCookie {\n\t\t\t// If the cookie is not set, return an unauthorized status\n\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\treturn false\n\t\t}\n\t\t// For any other type of error, return a bad request status\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn false\n\t}\n\n\t// Get the JWT string from the cookie\n\ttknStr := c.Value\n\n\t// Initialize a new instance of `Claims`\n\tclaims := &s.Claims{}\n\n\ttkn, err := jwt.ParseWithClaims(tknStr, claims, func(token *jwt.Token) (interface{}, error) {\n\t\treturn JWTKey, nil\n\t})\n\tif err != nil {\n\t\tif err == jwt.ErrSignatureInvalid {\n\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\treturn false\n\t\t}\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn false\n\t}\n\tif !tkn.Valid {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "6693ffecd37372e1e859ea2d94af524e", "score": "0.5376314", "text": "func (o *IntrospectedOAuth2Token) GetNbfOk() (*int64, bool) {\n\tif o == nil || o.Nbf == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Nbf, true\n}", "title": "" }, { "docid": "b83bde2c5030c09529b29a52bba037fa", "score": "0.5376181", "text": "func (o *GenerateTokenResponse) GetRefreshTokenOk() (*string, bool) {\n\tif o == nil || o.RefreshToken == nil {\n\t\treturn nil, false\n\t}\n\treturn o.RefreshToken, true\n}", "title": "" }, { "docid": "044818c766f09c4d9cf9a0f7cf55e687", "score": "0.53758997", "text": "func (o *LinkSessionFinishedWebhook) GetLinkSessionIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.LinkSessionId, true\n}", "title": "" }, { "docid": "d1c3dd72b4b4734c674f32014b083499", "score": "0.5375089", "text": "func (o *SessionDevice) GetIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Id, true\n}", "title": "" }, { "docid": "419ed4c65d85117d3cb3af97ad01f5e6", "score": "0.5331136", "text": "func (o *PostRestoreKVResponse) HasToken() bool {\n\tif o != nil && o.Token != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "ddbe2a9e021231ff4e8f0d5b0df8657a", "score": "0.53195894", "text": "func (s LocalSecretManager) DoesTokenExist(reqToken string) bool {\n\ttoken := viper.GetString(\"TOKEN\")\n\treturn reqToken == token\n}", "title": "" }, { "docid": "d0c234f19c1359361056c461953b3a27", "score": "0.53144795", "text": "func (r *GetExtendedACLResponseBody) GetSessionToken() *session.SessionToken {\n\tif r != nil {\n\t\treturn r.token\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "8ac841f0df3618b962aac857336776a5", "score": "0.53086835", "text": "func (o *TppCredentialsParams) GetTppAuthenticationGroupIdOk() (*int64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.TppAuthenticationGroupId, true\n}", "title": "" }, { "docid": "0e29403ce8386e20a0d0b0474279fce2", "score": "0.5302554", "text": "func (o *TransactionSplit) GetSepaCtIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SepaCtId.Get(), o.SepaCtId.IsSet()\n}", "title": "" }, { "docid": "51a3ee2f60126b36ca04a2bd2afe8916", "score": "0.5289874", "text": "func (o *TppCredentialsParams) GetTppApiKeyOk() (*string, bool) {\n\tif o == nil || o.TppApiKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TppApiKey, true\n}", "title": "" }, { "docid": "82888dbd59f13609ae67695f807a65da", "score": "0.52883625", "text": "func (o *GetPresetChatSessionIDOK) IsSuccess() bool {\n\treturn true\n}", "title": "" }, { "docid": "6a4a50170501f62081e4ae04f91f8b76", "score": "0.5283897", "text": "func (o *AuthSupportedMethods) GetInstantAuthOk() (*bool, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.InstantAuth, true\n}", "title": "" }, { "docid": "ecd50fa4a94d1a5544b9a957c8afb8ff", "score": "0.52756256", "text": "func (o *TransactionSplit) GetSepaCtOpOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SepaCtOp.Get(), o.SepaCtOp.IsSet()\n}", "title": "" }, { "docid": "53560e94d012ebd9927958769605655f", "score": "0.52649623", "text": "func (_Bindings *BindingsSession) IsCToken() (bool, error) {\n\treturn _Bindings.Contract.IsCToken(&_Bindings.CallOpts)\n}", "title": "" }, { "docid": "306e262bf20caee0ee3d8a789201d41e", "score": "0.525002", "text": "func (_Rootchain *RootchainCaller) HasToken(opts *bind.CallOpts, _token common.Address) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _Rootchain.contract.Call(opts, out, \"hasToken\", _token)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "080ba4d5597db8a20c10b3d1698f4f3b", "score": "0.5247865", "text": "func (o *IntrospectedOAuth2Token) GetExpOk() (*int64, bool) {\n\tif o == nil || o.Exp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Exp, true\n}", "title": "" }, { "docid": "8d944603e09a0ebceaf2f5df65dda30d", "score": "0.5241371", "text": "func (o *LoginRequestResponseData) HasOtpToken() bool {\n\tif o != nil && o.OtpToken != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "04a199a1275cd65ba57cd02452d28d7b", "score": "0.52339184", "text": "func (c *Client) SessionToken() *base64.Value {\n\treturn c.transport.Token()\n}", "title": "" }, { "docid": "65b7c731bba3f7a7dd909d79420f3970", "score": "0.52240103", "text": "func (o *User) GetSignInSessionsValidFromDateTimeOk() (time.Time, bool) {\n\tif o == nil || o.SignInSessionsValidFromDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.SignInSessionsValidFromDateTime, true\n}", "title": "" }, { "docid": "9e154a72dee4a81ef59a7b66643e8a3d", "score": "0.5215649", "text": "func (o *AssetReportRefreshRequest) GetAssetReportTokenOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.AssetReportToken, true\n}", "title": "" }, { "docid": "97c6116c4b732b06d1ab46d68571182b", "score": "0.5212803", "text": "func (o *PaymentStatusUpdateWebhook) GetTransactionIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TransactionId.Get(), o.TransactionId.IsSet()\n}", "title": "" }, { "docid": "9ad5fa301e709fbb8bdd916101d6ed29", "score": "0.52127457", "text": "func (_CrToken *CrTokenCaller) IsCToken(opts *bind.CallOpts) (bool, error) {\n\tvar out []interface{}\n\terr := _CrToken.contract.Call(opts, &out, \"isCToken\")\n\n\tif err != nil {\n\t\treturn *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(bool)).(*bool)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "f680a5ea1149ebfebb5a5c5418865fdd", "score": "0.52014947", "text": "func (_CrToken *CrTokenSession) IsCToken() (bool, error) {\n\treturn _CrToken.Contract.IsCToken(&_CrToken.CallOpts)\n}", "title": "" }, { "docid": "9132dd6447f9cf6ed437850f3d5dc8c7", "score": "0.5199141", "text": "func (o *PaymentInitiationPaymentGetResponse) GetTransactionIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TransactionId.Get(), o.TransactionId.IsSet()\n}", "title": "" }, { "docid": "484542b4fca86b9f12a1c9527f28b764", "score": "0.519607", "text": "func (o *TppCredentialsParams) GetTppClientSecretOk() (*string, bool) {\n\tif o == nil || o.TppClientSecret == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TppClientSecret, true\n}", "title": "" }, { "docid": "d869a7deac683ba16a8f94b63ca495d2", "score": "0.5191749", "text": "func SessionGet(token string) (*Session, bool) {\n\ts, ok := Sessions[token]\n\treturn s, ok\n}", "title": "" }, { "docid": "5b25d834499eb773e014d0344b85835e", "score": "0.51854336", "text": "func (o *TokenResponse) GetLivemodeOk() (*bool, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Livemode, true\n}", "title": "" }, { "docid": "891171bdf4fd4def1d0fbcda396b0745", "score": "0.5183134", "text": "func (ctx *RequestContext) HasSession(key string) bool {\n\tvars := ctx.token.Claims[\"vars\"].(map[string]interface{})\n\t_, ok := vars[key]\n\treturn ok\n}", "title": "" }, { "docid": "a0fe26f4ca49eb619c30cf25234927cf", "score": "0.51807487", "text": "func TestTokenIsSet(t *testing.T) {\n\tconfiguration := ReadConfig()\n\ttoken := configuration.Token\n\n\tif token == \"\" {\n\t\tt.Error(\"Token misconfigured\")\n\t}\n\n\t// A dumb way to check if a dummy token has been used\n\tif len(token) < 16 {\n\t\tt.Error(\"Token misconfigured\")\n\t}\n\n\tt.Log(\"Token set\")\n}", "title": "" }, { "docid": "543753a7258a350ab414581ddb42b934", "score": "0.51802117", "text": "func (o *OAuth2ConsentSessionExpiresAt) GetParContextOk() (*time.Time, bool) {\n\tif o == nil || o.ParContext == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ParContext, true\n}", "title": "" }, { "docid": "af6ce35afdaf018c5f2e1d0adfdcdc90", "score": "0.517935", "text": "func (o *QueryCreditCardPeriodInfoRequest) GetTimeStampOk() (*int, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.TimeStamp, true\n}", "title": "" }, { "docid": "b54d7569edf3fb751c734c79d91e4de3", "score": "0.5168925", "text": "func TokenValidation(token string) bool {\n\tvar flag bool\n\tflag = false\n\tfor _, v := range tokenDetails {\n\t\tif token == v.Token {\n\t\t\tflag = true\n\t\t\tif time.Since(v.LastUsed).Minutes() > pluginConfig.Data.SessionTimeoutInMinutes {\n\t\t\t\treturn flag\n\t\t\t}\n\t\t}\n\t}\n\treturn flag\n}", "title": "" }, { "docid": "1944bd55b78023c01d1a0b812657b507", "score": "0.5157914", "text": "func (m *MockUserDB) IsOkSession(sid string) (uint64, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsOkSession\", sid)\n\tret0, _ := ret[0].(uint64)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "9d3a03fdadee4f9c904259f19c57f1cc", "score": "0.51544905", "text": "func (o *TokenResponse) GetUsedOk() (*bool, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Used, true\n}", "title": "" }, { "docid": "4de9217161dd46b24d941c351026d7e9", "score": "0.51523024", "text": "func (session *Session) GetToken() string {\n\treturn session.token\n}", "title": "" }, { "docid": "9e8fd3228a806b9f2e78d8290f0c88b1", "score": "0.515154", "text": "func AuthToken(r *http.Request) (bool, error) {\n\ttoken := getToken(r)\n\texist, err := redisClient.SIsMember(dbToken, string(token)).Result()\n\tif err != nil {\n\t\tlog.Printf(\"error with redis occurred, error : %v\", err)\n\t\treturn false, err\n\t}\n\n\treturn exist, nil\n\n}", "title": "" }, { "docid": "9497c4de964a6aac962b2f1bb454eaf5", "score": "0.5150779", "text": "func (o *IntrospectedOAuth2Token) GetClientIdOk() (*string, bool) {\n\tif o == nil || o.ClientId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ClientId, true\n}", "title": "" }, { "docid": "5872264a91c3c23aff6efefad0c73811", "score": "0.51506865", "text": "func (o *TppCredentialsParams) GetTppClientIdOk() (*string, bool) {\n\tif o == nil || o.TppClientId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TppClientId, true\n}", "title": "" }, { "docid": "573c79d4b8fc5b92085c58915b95240d", "score": "0.5148954", "text": "func (o *TokenResponse) GetObjectOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Object, true\n}", "title": "" }, { "docid": "67bbf426e85cf144b44018c9e754ea53", "score": "0.51310027", "text": "func HasUserToken(userID uuid.UUID) (bool, string) {\n\tdefer mutex.Unlock()\n\tmutex.Lock()\n\n\tfor k, v := range tokenAvailable {\n\t\tif v.userID == userID {\n\t\t\treturn true, k\n\t\t}\n\t}\n\treturn false, \"\"\n}", "title": "" } ]
d59cd0c755ed24da5fbaa833746cceea
This element indicates the name of a column from the SELECT statement in the query that will be used as the partition key for the Azure Table. Required on PUT (CreateOrReplace) requests.
[ { "docid": "64ea0e1bc2801631f9f9c40c19327a12", "score": "0.5654924", "text": "func (o AzureTableOutputDataSourceOutput) PartitionKey() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AzureTableOutputDataSource) *string { return v.PartitionKey }).(pulumi.StringPtrOutput)\n}", "title": "" } ]
[ { "docid": "aa72d0fdd26effe7fc283f9dd8744a4d", "score": "0.5706027", "text": "func (o AzureTableOutputDataSourceResponseOutput) PartitionKey() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AzureTableOutputDataSourceResponse) *string { return v.PartitionKey }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "42df978230385496a723cd0fd726a9e5", "score": "0.54720724", "text": "func (p *Partitions) Key(record Record) string {\n\treturn record.Index(p.Strategy.Partition.Columns)\n}", "title": "" }, { "docid": "5b1a49a552c70dc397e25347e7b20567", "score": "0.531183", "text": "func (t *TableSchema) KeyCol() string {\n\tfor _, c := range t.Columns {\n\t\tshouldBeCommonKey := (c.AutoIncrement || c.Key) && (!c.Primary)\n\t\tif shouldBeCommonKey {\n\t\t\treturn c.Name\n\t\t}\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "f66212542f8ee130d2f22dbb2bba9851", "score": "0.5299851", "text": "func (o EventHubOutputDataSourceResponseOutput) PartitionKey() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v EventHubOutputDataSourceResponse) *string { return v.PartitionKey }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d118359c2416754f2c4416be9b96ba66", "score": "0.5251063", "text": "func (o CassandraPartitionKeyOutput) Name() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CassandraPartitionKey) *string { return v.Name }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "11e5cde8fd267b550e836ba3d629a2af", "score": "0.5180258", "text": "func (tbl RecordTable) PkColumn() string {\n\treturn tbl.pk\n}", "title": "" }, { "docid": "d607f1b3c380ca8c985bffb458ec0e15", "score": "0.51662666", "text": "func (o EventHubV2OutputDataSourceResponseOutput) PartitionKey() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v EventHubV2OutputDataSourceResponse) *string { return v.PartitionKey }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "7f1028de7e793823c6c6f6d08c4fdf07", "score": "0.51651317", "text": "func (o EventHubOutputDataSourceOutput) PartitionKey() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v EventHubOutputDataSource) *string { return v.PartitionKey }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "53697da66ccb914fb0e9112537cb678e", "score": "0.5131108", "text": "func (s *BasicColumnEncryptionSetting) ColumnName() string {\n\treturn s.Name\n}", "title": "" }, { "docid": "7fe83fbae9c166da2b4ff4648e3c990d", "score": "0.5040754", "text": "func (o EventHubV2OutputDataSourceOutput) PartitionKey() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v EventHubV2OutputDataSource) *string { return v.PartitionKey }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "b026c5a6cf1feb00e8c95fc613213d32", "score": "0.50200975", "text": "func (col Column) Key() Column {\n\treturn Column{col.columnName, col.columnType, true, false}\n}", "title": "" }, { "docid": "2379c1a9ce1cf8a16e02c2befdd66c49", "score": "0.49361536", "text": "func (ce *ColumnEncryptionProperties) KeyMetadata() string { return ce.keyMetadata }", "title": "" }, { "docid": "c6e544613c42c7a35c4f338bc1517932", "score": "0.49007562", "text": "func (o StreamInputPropertiesResponseOutput) PartitionKey() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v StreamInputPropertiesResponse) *string { return v.PartitionKey }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "2fdd7ba32df39e0089a080195b75c1c5", "score": "0.49001345", "text": "func (tbl AssociationTable) PkColumn() string {\n\treturn tbl.pk\n}", "title": "" }, { "docid": "2acb378aa51bd2a66dacd0f1a1921944", "score": "0.48940718", "text": "func (o CassandraPartitionKeyResponseOutput) Name() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CassandraPartitionKeyResponse) *string { return v.Name }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0f2b370845be5066a98a2ec982bb9a4e", "score": "0.48545873", "text": "func (o ReferenceInputPropertiesResponseOutput) PartitionKey() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ReferenceInputPropertiesResponse) *string { return v.PartitionKey }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d4afdc78bc5bcc177502f9e717e596b4", "score": "0.48144192", "text": "func (p *SASQueryParameters) StartPartitionKey() string {\n\treturn p.startPk\n}", "title": "" }, { "docid": "cd40cc65e42be19332a80e68f4348b1c", "score": "0.48027146", "text": "func (p *Partition) Key() string {\n\treturn fmt.Sprintf(\"%s/%d\", p.topic.Name, p.ID)\n}", "title": "" }, { "docid": "09db3515787499022abd8fc2691941e7", "score": "0.47956252", "text": "func (d sqlDatastoreDialect) GetKeyName(manager Manager, datastore, table string) string {\n\tif d.keySQL == \"\" {\n\t\treturn \"\"\n\t}\n\tSQL := fmt.Sprintf(d.keySQL, table, datastore)\n\tvar records = make([]map[string]interface{}, 0)\n\n\terr := manager.ReadAll(&records, SQL, []interface{}{}, nil)\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\tvar result = make([]string, 0)\n\tfor _, item := range records {\n\t\tif pk, ok := item[\"pk\"]; ok {\n\t\t\tif toolbox.AsBoolean(pk) {\n\t\t\t\tresult = append(result, toolbox.AsString(item[\"name\"]))\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t\tresult = append(result, toolbox.AsString(item[\"name\"]))\n\t}\n\treturn strings.Join(result, \",\")\n}", "title": "" }, { "docid": "ed3ed75e7cb68a16fd3fafdab676fef9", "score": "0.4763695", "text": "func (o SqlContainerResourceOutput) PartitionKey() ContainerPartitionKeyPtrOutput {\n\treturn o.ApplyT(func(v SqlContainerResource) *ContainerPartitionKey { return v.PartitionKey }).(ContainerPartitionKeyPtrOutput)\n}", "title": "" }, { "docid": "58f195b29c13c426b25837bd68000651", "score": "0.47213617", "text": "func Key(v string) predicate.Blob {\n\treturn predicate.Blob(\n\t\tfunc(s *sql.Selector) {\n\t\t\ts.Where(sql.EQ(s.C(FieldKey), v))\n\t\t},\n\t)\n}", "title": "" }, { "docid": "b8a2da13a295ef2de57d4728503737c5", "score": "0.46849746", "text": "func (o StreamInputPropertiesOutput) PartitionKey() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v StreamInputProperties) *string { return v.PartitionKey }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "792ab439c1f653f3705fa878908064fc", "score": "0.4673953", "text": "func (o AzureTableOutputDataSourceResponseOutput) RowKey() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AzureTableOutputDataSourceResponse) *string { return v.RowKey }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c816133026685f3621fc567d6650c377", "score": "0.4670657", "text": "func (o ReferenceInputPropertiesOutput) PartitionKey() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ReferenceInputProperties) *string { return v.PartitionKey }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f6aeaa69dd2f0bd26ff9dc7b8bfb1fa0", "score": "0.4663884", "text": "func partitionedTable(flavor Flavor) Table {\n\tt := unpartitionedTable(flavor)\n\texpression := \"customer_id\"\n\tif flavor.Min(FlavorMySQL80) || flavor.Min(FlavorMariaDB102) {\n\t\texpression = EscapeIdentifier(expression)\n\t}\n\tt.Partitioning = &TablePartitioning{\n\t\tMethod: \"RANGE\",\n\t\tExpression: expression,\n\t\tPartitions: []*Partition{\n\t\t\t{Name: \"p0\", Values: \"123\", Engine: \"InnoDB\"},\n\t\t\t{Name: \"p1\", Values: \"456\", Engine: \"InnoDB\"},\n\t\t\t{Name: \"p2\", Values: \"MAXVALUE\", Engine: \"InnoDB\"},\n\t\t},\n\t}\n\tt.CreateStatement = t.GeneratedCreateStatement(flavor)\n\treturn t\n}", "title": "" }, { "docid": "0727f8c6236d9eed6967233be34b9870", "score": "0.46607384", "text": "func (k PartitionKeyer) PartitionKey() sarama.Encoder {\n\treturn k.PartKey\n}", "title": "" }, { "docid": "3bb3bcd0a633e7a1dc3c212b9f41f9db", "score": "0.4655148", "text": "func (tr *TaxRateMaster) ColumnName() string {\n\treturn tr.columnName\n}", "title": "" }, { "docid": "89c9bc708fdd8800593aa391bb84297a", "score": "0.46515125", "text": "func (o TableOutput) PartitionKeyColumns() TableColumnArrayOutput {\n\treturn o.ApplyT(func(v *Table) TableColumnArrayOutput { return v.PartitionKeyColumns }).(TableColumnArrayOutput)\n}", "title": "" }, { "docid": "86e639907de9bdc9f014ef1ccea90bfe", "score": "0.46510053", "text": "func (ce *ColumnEncryptionProperties) Key() string { return ce.key }", "title": "" }, { "docid": "7cb44a571c0fadefd88cdf365f397a6f", "score": "0.4640161", "text": "func (service *StorageAccountsTableService) AzureName() string {\n\treturn \"default\"\n}", "title": "" }, { "docid": "0cc335b260870b70c5c8a778e40bca5f", "score": "0.46299893", "text": "func (p *SASQueryParameters) EndPartitionKey() string {\n\treturn p.endPk\n}", "title": "" }, { "docid": "c4e83f04d96593d3c00dc69e5430f1bc", "score": "0.4628301", "text": "func (c ValueColumn) Name() string {\n\treturn c.name\n}", "title": "" }, { "docid": "b4f343f1ec7e3a5900b35ee144502151", "score": "0.46099502", "text": "func (p *ProjectKey) Columns() []string {\n\treturn []string{\n\t\t\"project_id\", \"public_key\", \"secret_key\", \"user_id\", \"user_added_id\",\n\t\t\"date_added\",\n\t}\n}", "title": "" }, { "docid": "b14738f136e20d86aaeb8b8312a0f8b5", "score": "0.46057254", "text": "func (o AzureTableOutputDataSourceOutput) RowKey() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AzureTableOutputDataSource) *string { return v.RowKey }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "090784f0bc614ed86fda377c147936c2", "score": "0.45927784", "text": "func (df *DataFrame) SetKey(nameVal, val starlark.Value) error {\n\tif df.frozen {\n\t\treturn fmt.Errorf(\"cannot set, DataFrame is frozen\")\n\t}\n\n\tname, ok := toStrMaybe(nameVal)\n\tif !ok {\n\t\treturn fmt.Errorf(\"SetKey: name must be string\")\n\t}\n\n\t// Figure out if a column already exists with the given name\n\tcolumnIndex := findKeyPos(name, df.columns.texts)\n\n\t// Either prepend the new column, or keep the names the same\n\tnewNames := make([]string, 0, len(df.columns.texts)+1)\n\tif columnIndex == -1 {\n\t\tnewNames = append([]string{name}, df.columns.texts...)\n\t} else {\n\t\tnewNames = df.columns.texts\n\t}\n\n\t// Assignment of a scalar (int, bool, float, string) to the column\n\tif scalar, ok := toScalarMaybe(val); ok {\n\t\tvar newBody []Series\n\t\tnewCol := newSeriesFromRepeatScalar(scalar, max(1, df.numRows()))\n\t\tif columnIndex == -1 {\n\t\t\t// New columns are added to the left side of the dataframe\n\t\t\tnewBody = append([]Series{*newCol}, df.body...)\n\t\t} else {\n\t\t\tnewBody = df.body\n\t\t\tnewBody[columnIndex] = *newCol\n\t\t}\n\t\tdf.columns = NewIndex(newNames, \"\")\n\t\tdf.body = newBody\n\t\treturn nil\n\t}\n\n\t// Assignment of a Series to the column\n\tseries, ok := val.(*Series)\n\tif !ok {\n\t\treturn fmt.Errorf(\"SetKey: val must be int, string, or Series\")\n\t}\n\tif df.numRows() > 0 && (df.numRows() != series.len()) {\n\t\treturn fmt.Errorf(\"SetKey: val len must match number of rows\")\n\t}\n\n\tvar newBody []Series\n\tif columnIndex == -1 {\n\t\tnewBody = append([]Series{*series}, df.body...)\n\t} else {\n\t\tnewBody = df.body\n\t\tnewBody[columnIndex] = *series\n\t}\n\tdf.columns = NewIndex(newNames, \"\")\n\tdf.body = newBody\n\treturn nil\n}", "title": "" }, { "docid": "9f745ece4f71eddc80e3808d75ce99d3", "score": "0.4573452", "text": "func (t *ACLRole) PrimaryKeyColumn() string {\n\treturn ACLRoleColumnID\n}", "title": "" }, { "docid": "1b8d83e70b0559a989acf9f1a79191ff", "score": "0.4563749", "text": "func (o AzureMachineLearningServiceInputColumnOutput) Name() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AzureMachineLearningServiceInputColumn) *string { return v.Name }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d5e1f6d3bca32610eaa57e47c67ff380", "score": "0.45620257", "text": "func (t *Driver) Keys(col string) ([]string, error) { \n err := t.TryCreateTable(col)\n if err != nil {\n return nil, err\n }\n \n orm := t.DB()\n orm.Table(t.TableName(col)).Fields(\"id\").Select()\n data, err := orm.Get()\n if err != nil {\n return nil, err\n }\n \n keys := make([]string, len(data))\n for k, v := range data {\n keys[k] = v[\"id\"].(string)\n //keys = append(keys, v[\"id\"].(string))\n }\n \n return keys, nil\n}", "title": "" }, { "docid": "74a5afd05bb193569c31d8f606ed1f83", "score": "0.45608225", "text": "func (a *AccMaster) ColumnName() string {\n\treturn a.columnName\n}", "title": "" }, { "docid": "d4ef17d6ac9fac832a32c4421486a270", "score": "0.45533937", "text": "func (cmd *TsFetchRowCommand) Name() string {\n\treturn cmd.getName(\"TsFetchRow\")\n}", "title": "" }, { "docid": "3da2d619ebe154830b059c64fbeb25c0", "score": "0.4549252", "text": "func (s *DbRecorder) Key() []string {\n\tkey := make([]string, len(s.key))\n\n\tfor i, f := range s.key {\n\t\tkey[i] = f.column\n\t}\n\n\treturn key\n}", "title": "" }, { "docid": "c265685b3287a198b25aabad627fe87b", "score": "0.45377514", "text": "func (p *ThriftHiveMetastoreClient) AlterPartition(ctx context.Context, db_name string, tbl_name string, new_part *Partition) (err error) {\n var _args98 ThriftHiveMetastoreAlterPartitionArgs\n _args98.DbName = db_name\n _args98.TblName = tbl_name\n _args98.NewPart_ = new_part\n var _result99 ThriftHiveMetastoreAlterPartitionResult\n if err = p.Client_().Call(ctx, \"alter_partition\", &_args98, &_result99); err != nil {\n return\n }\n switch {\n case _result99.O1!= nil:\n return _result99.O1\n case _result99.O2!= nil:\n return _result99.O2\n }\n\n return nil\n}", "title": "" }, { "docid": "46dadd2b4e97b2688f3a03e9c1f5589f", "score": "0.45347723", "text": "func (t *ACLRole) PrimaryKeyColumnType() string {\n\treturn \"string\"\n}", "title": "" }, { "docid": "be6d9313261c90a8126898dfa8e2f891", "score": "0.45315546", "text": "func (di *Iterator) Key() []byte {\n\tkey := di.iter.Key()\n\treturn key[len(types.ExtUtxoTablePrefix):]\n}", "title": "" }, { "docid": "82bd87f51dd19203a6d0bd21c3f9df54", "score": "0.45264867", "text": "func (s *SubMaster) ColumnName() string {\n\treturn s.columnName\n}", "title": "" }, { "docid": "8328fe4f8075cf6c2ef1e9a87a28e575", "score": "0.4510746", "text": "func (fd *FileDecryptionProperties) ColumnKey(path string) string {\n\tif d, ok := fd.columnDecryptProps[path]; ok {\n\t\tif d != nil {\n\t\t\treturn d.Key()\n\t\t}\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "6274c912b842fb83895e69d0ebf2f0dc", "score": "0.45092815", "text": "func (tc *TaxClassMaster) ColumnName() string {\n\treturn tc.columnName\n}", "title": "" }, { "docid": "c1cee511d0523f17195a00b68c82be38", "score": "0.45066813", "text": "func (t *Commit) PrimaryKeyColumnType() string {\n\treturn \"string\"\n}", "title": "" }, { "docid": "cd9587bd4b269d7ff80116fe3cfe0161", "score": "0.45026743", "text": "func (p *ThriftHiveMetastoreClient) AppendPartitionByName(ctx context.Context, db_name string, tbl_name string, part_name string) (r *Partition, err error) {\n var _args72 ThriftHiveMetastoreAppendPartitionByNameArgs\n _args72.DbName = db_name\n _args72.TblName = tbl_name\n _args72.PartName = part_name\n var _result73 ThriftHiveMetastoreAppendPartitionByNameResult\n if err = p.Client_().Call(ctx, \"append_partition_by_name\", &_args72, &_result73); err != nil {\n return\n }\n switch {\n case _result73.O1!= nil:\n return r, _result73.O1\n case _result73.O2!= nil:\n return r, _result73.O2\n case _result73.O3!= nil:\n return r, _result73.O3\n }\n\n return _result73.GetSuccess(), nil\n}", "title": "" }, { "docid": "94ba74dbe9e4fb9bbaf8362ddadd16ec", "score": "0.44969952", "text": "func (cmd *TsDeleteRowCommand) Name() string {\n\treturn cmd.getName(\"TsDeleteRow\")\n}", "title": "" }, { "docid": "138883b13f37b29ba710664cabafe9fb", "score": "0.44923404", "text": "func (o AzureMachineLearningServiceInputColumnResponseOutput) Name() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AzureMachineLearningServiceInputColumnResponse) *string { return v.Name }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "fe434b0146fefbda7969c6185cdc1dcf", "score": "0.4485582", "text": "func (c *TsColumnDescription) GetName() string {\n\treturn string(c.column.GetName())\n}", "title": "" }, { "docid": "724e6caf2bcc84d01dff77c6a8eb5720", "score": "0.4478719", "text": "func (path Path) ColumnName(nc NamingConvention, key string) string {\n\tif len(path) == 1 {\n\t\t// The path almost always has one element in it,\n\t\t// so have a special case that requires less memory\n\t\t// allocation.\n\t\treturn convertField(path[0].FieldName, path[0].FieldTag, nc, key)\n\t}\n\n\t// Less common case where there is more than one item in the path.\n\tfrags := make([]string, len(path))\n\tfor i, f := range path {\n\t\tfrags[i] = convertField(f.FieldName, f.FieldTag, nc, key)\n\t}\n\treturn nc.Join(frags)\n}", "title": "" }, { "docid": "111c32afbe35aafc9444a3260eb69046", "score": "0.44731978", "text": "func (t *Commit) PrimaryKeyColumn() string {\n\treturn CommitColumnID\n}", "title": "" }, { "docid": "34dd9302669674ecd535b2c635a18123", "score": "0.4471847", "text": "func (r *TableEventHandler) genKey(row []interface{}) string {\n\tif r.Meta.KeyIndex == nil {\n\t\tlog.Warn(\"table have no key index \", r.Table)\n\t\t// 没有找到唯一索引 所有值作为key 值\n\t\tvalues, _ := toArray(row)\n\t\treturn strings.Join(values, \"\")\n\t}\n\n\tkeys := make([]string, len(r.Meta.KeyIndex))\n\tfor i := 0; i < len(r.Meta.KeyIndex); i++ {\n\t\tval := row[r.Meta.KeyIndex[i]]\n\t\tswitch reflect.TypeOf(val).Kind() {\n\t\tcase reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64:\n\t\t\tkeys[i] = fmt.Sprintf(\"%d\", val)\n\n\t\tcase reflect.Float32, reflect.Float64:\n\t\t\tkeys[i] = fmt.Sprintf(\"%f\", val)\n\n\t\tcase reflect.Slice:\n\t\t\tv := val.([]uint8)\n\t\t\tbuffer := bytes.NewBuffer([]byte(\"0x\"))\n\t\t\tfor i := 0; i < len(v); i++ {\n\t\t\t\tbuffer.WriteString(fmt.Sprintf(\"%.2x\", v[i]))\n\t\t\t}\n\t\t\tkeys[i] = buffer.String()\n\n\t\tcase reflect.String:\n\t\t\tv := mysql.Escape(val.(string))\n\t\t\tkeys[i] = v\n\t\t}\n\t}\n\n\treturn strings.Join(keys, \"\")\n}", "title": "" }, { "docid": "6e16a97dfd22973a2a46fbd78bd22513", "score": "0.44559515", "text": "func (o SqlContainerResourcePtrOutput) PartitionKey() ContainerPartitionKeyPtrOutput {\n\treturn o.ApplyT(func(v *SqlContainerResource) *ContainerPartitionKey {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.PartitionKey\n\t}).(ContainerPartitionKeyPtrOutput)\n}", "title": "" }, { "docid": "3c87438f8bd9946d2147081e64542707", "score": "0.44312185", "text": "func (t *JSONTable) Name() string {\n\treturn t.TableName\n}", "title": "" }, { "docid": "4ba731c01064f56792261689ebe92f0a", "score": "0.44295052", "text": "func (s *Statement) ColumnName(column int) string {\n\treturn ResultColumn(column).Name(s)\n}", "title": "" }, { "docid": "2da3952919818984e72de0c2a2c40f21", "score": "0.44127664", "text": "func (col Columns) Name(column int) string {\n\tif col.NumLevels() == 0 {\n\t\treturn \"\"\n\t}\n\treturn col.Names()[column]\n}", "title": "" }, { "docid": "8f50bcf8cca59a47ed9d48d55023975b", "score": "0.43968603", "text": "func (database *SqlDatabase) AzureName() string {\n\treturn database.Spec.AzureName\n}", "title": "" }, { "docid": "c11a20e7f9c0e312002086f099bb65ff", "score": "0.4395125", "text": "func (f *Field) Key() *Name {\n\tif f.Alias != nil {\n\t\treturn f.Alias\n\t}\n\treturn f.Name\n}", "title": "" }, { "docid": "9ffd8043c6f98f7a5b7101ff7ad2374c", "score": "0.438451", "text": "func (q *Query) NamedColumn(name string, node models.ColumnNode, index types.Oid, format ...models.Format) {\n\toid := append(node.Oid, index...)\n\tq.add(name, node.Type, oid, format)\n}", "title": "" }, { "docid": "dc3fca0e7fe97df793c7d5a62bc725c9", "score": "0.4381479", "text": "func (m *SysTableColumn) TableName() string {\n\treturn \"sys_table_column\"\n}", "title": "" }, { "docid": "716a239ac78117b516a7aed2ce036512", "score": "0.43742877", "text": "func (o LinkedServiceAzureTableStorageOutput) Name() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *LinkedServiceAzureTableStorage) pulumi.StringOutput { return v.Name }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "c8d9615105839af2062c52d742466ba0", "score": "0.4373865", "text": "func (p *Partition) GetPartitionKey() string {\n\treturn p.partitionKey\n}", "title": "" }, { "docid": "4285546475ee2ee835b11e3ac66278b3", "score": "0.4369599", "text": "func (setting *MongodbDatabaseCollectionThroughputSetting) AzureName() string {\n\treturn \"default\"\n}", "title": "" }, { "docid": "214400f0e9563cf03a3401849bfd6dbc", "score": "0.43652812", "text": "func (o AzureMachineLearningServiceOutputColumnResponseOutput) Name() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AzureMachineLearningServiceOutputColumnResponse) *string { return v.Name }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "60fbdcf10ca99a16d81d72206ea06180", "score": "0.43648693", "text": "func (t *Driver) KeysWhereSQL(col string, WhereSQL string) ([]string, error) {\n err := t.TryCreateTable(col)\n if err != nil {\n return nil, err\n }\n \n /// FIXME: \n data, err := t.DB().GetISession().Query(fmt.Sprintf(\"SELECT id FROM %s WHERE %s\", t.TableName(col), WhereSQL))\n if err != nil {\n return nil, err\n }\n if data == nil {\n return []string{}, nil\n }\n \n ret := make([]string, len(data))\n for k, v := range data {\n ret[k] = v[\"id\"].(string)\n }\n \n return ret, nil\n}", "title": "" }, { "docid": "ddd238f07033e20535457d8932b7f24c", "score": "0.4364012", "text": "func (o AzureMachineLearningStudioInputColumnOutput) Name() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AzureMachineLearningStudioInputColumn) *string { return v.Name }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "2a862dfa1a00240637f2b1bb6e7b9d21", "score": "0.43586677", "text": "func (o AzureMachineLearningServiceOutputColumnOutput) Name() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AzureMachineLearningServiceOutputColumn) *string { return v.Name }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6064e9479f132e37bc2d7222bbad863b", "score": "0.43572354", "text": "func (cmd *TsStoreRowsCommand) Name() string {\n\treturn cmd.getName(\"TsStoreRows\")\n}", "title": "" }, { "docid": "cd8e51951a964cfb9ba427b7303b1bd5", "score": "0.43526113", "text": "func (nc *NumericColumn) GetKey() string {\n\treturn nc.Key\n}", "title": "" }, { "docid": "f5c2e1304d29637bd5e84c58198d1b76", "score": "0.43498346", "text": "func (o AzureMachineLearningStudioInputColumnResponseOutput) Name() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AzureMachineLearningStudioInputColumnResponse) *string { return v.Name }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d56f8b0eb813a4e902593ce7559df9b7", "score": "0.43462822", "text": "func getFieldMetadata(pkg *model.ModelPackage, column *model.Column) string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"sql:\\\"\")\n\tbuffer.WriteString(\"type:\")\n\tbuffer.WriteString(column.ColumnType)\n\tif !column.IsNullable {\n\t\tbuffer.WriteString(\";not null\")\n\t}\n\tif column.IsUnique {\n\t\tbuffer.WriteString(\";unique\")\n\t}\n\tif column.IsAutoIncrement {\n\t\tbuffer.WriteString(\";AUTO_INCREMENT\")\n\t}\n\tbuffer.WriteString(\"\\\"\")\n\treturn buffer.String()\n}", "title": "" }, { "docid": "8e8c0c7f26e3ce7924dcc1b1a13389a9", "score": "0.43424857", "text": "func (fieldType *AdaReferentialType) PrimaryKeyName() string {\n\tif fieldType.keys[0] == \"\" {\n\t\treturn \"ISN\"\n\t}\n\treturn fieldType.keys[0]\n}", "title": "" }, { "docid": "d8c32ead1fa17376468209bff2f1f874", "score": "0.43375513", "text": "func (o GremlinGraphResourceOutput) PartitionKey() ContainerPartitionKeyPtrOutput {\n\treturn o.ApplyT(func(v GremlinGraphResource) *ContainerPartitionKey { return v.PartitionKey }).(ContainerPartitionKeyPtrOutput)\n}", "title": "" }, { "docid": "02adf9fdf36158c5bf8e6bd9819ae7f1", "score": "0.43370727", "text": "func (r *kafkaEvalResult) Key() string {\n\tif r.EvalResult == nil || r.EvalContext == nil {\n\t\treturn \"\"\n\t}\n\treturn util.SafeString(r.EvalContext.EntityID)\n}", "title": "" }, { "docid": "35daeddf4a97813136b8620214a7ca16", "score": "0.43325487", "text": "func (bdm MySQLDBManager) ExecuteSQLPrimaryKey(table string) (column string, err error) {\n\trow, err := bdm.ExecuteSQLSelectRow(\"SHOW KEYS FROM \" + table + \" WHERE Key_name = 'PRIMARY'\")\n\n\tif err != nil {\n\t\treturn\n\t}\n\tcolumn = row[\"Column_name\"]\n\treturn\n}", "title": "" }, { "docid": "2f1ad69e9cdadd7746c75774fd837abd", "score": "0.43282884", "text": "func PartitionType(part string) string {\n\tmsg := `\nThe PartitionType() function has been DEPRECATED and will be removed in\nthe 1.0 release of ghw. Please use the Partition.Type attribute.\n`\n\twarn(msg)\n\tctx := contextFromEnv()\n\treturn ctx.partitionType(part)\n}", "title": "" }, { "docid": "47640866410741e562ba6c8f1b96ddaf", "score": "0.43262917", "text": "func (c *Column) Name() string {\n\treturn c.name\n}", "title": "" }, { "docid": "fd552f3013e2c92244ffcad5a823335e", "score": "0.43239778", "text": "func columnSignatureOf(field *descriptor.Field) string {\n\tvar sqlType, at = dialect.ParseColumnSignature(field, type2SQLType)\n\n\tswitch sqlType.Name {\n\tcase Integer:\n\t\tif at.SetConstraint[dialect.ConstraintAutoIncrement] {\n\t\t\tsqlType.Name = Serial\n\t\t}\n\tcase BigInt:\n\t\tif at.SetConstraint[dialect.ConstraintAutoIncrement] {\n\t\t\tsqlType.Name = BigSerial\n\t\t}\n\tcase Varchar:\n\t\tsize := sqlType.DefaultLength\n\t\tif !(size > 0 && size < 65532) {\n\t\t\tsqlType.Name = Text\n\t\t\tsqlType.DefaultLength = 0\n\t\t}\n\t}\n\n\tvar additionalType string\n\n\tif at.SetConstraint[dialect.ConstraintPrimaryKey] {\n\t\tadditionalType = additionalType + \" \" + \"PRIMARY KEY\"\n\t}\n\n\tif at.SetConstraint[dialect.ConstraintNotNull] {\n\t\tadditionalType = additionalType + \" \" + \"NOT NULL\"\n\t}\n\n\tif at.SetConstraint[dialect.ConstraintUnique] {\n\t\tadditionalType = additionalType + \" \" + \"UNIQUE\"\n\t}\n\n\toptions := field.Column.Options\n\td := options.GetDefault()\n\tif d != \"\" {\n\t\tadditionalType = additionalType + \" \" + fmt.Sprintf(\"DEFAULT %v\", d)\n\t}\n\n\tst := sqlType.Name\n\tif sqlType.DefaultLength != 0 {\n\t\tst = st + fmt.Sprintf(\"(%d)\", sqlType.DefaultLength)\n\t}\n\n\tadditionalType = strings.TrimSpace(additionalType)\n\tif additionalType == \"\" {\n\t\treturn st\n\t}\n\n\treturn fmt.Sprintf(\"%v %v\", st, additionalType)\n}", "title": "" }, { "docid": "8e12b37c11670dc31e21317e4acdeb67", "score": "0.4321398", "text": "func HasKey(column string, opts ...Option) *sql.Predicate {\n\treturn sql.P(func(b *sql.Builder) {\n\t\tswitch b.Dialect() {\n\t\tcase dialect.SQLite:\n\t\t\t// JSON_TYPE returns NULL in case the path selects an element\n\t\t\t// that does not exist. See: https://sqlite.org/json1.html#jtype.\n\t\t\tpath := identPath(column, opts...)\n\t\t\tpath.mysqlFunc(\"JSON_TYPE\", b)\n\t\t\tb.WriteOp(sql.OpNotNull)\n\t\tdefault:\n\t\t\tvaluePath(b, column, opts...)\n\t\t\tb.WriteOp(sql.OpNotNull)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "ec4fed368ae4311989d5a762b0d51d4f", "score": "0.4319857", "text": "func (column *ColumnString) Name() string {\n\treturn column.name\n}", "title": "" }, { "docid": "7982116cf1e92e1ede1a43788b6a6fc4", "score": "0.4318277", "text": "func (c *STableField) Name() string {\n\tif len(c.alias) > 0 {\n\t\treturn c.alias\n\t}\n\treturn c.spec.Name()\n}", "title": "" }, { "docid": "545abe5386483acc868ad1188f8372f5", "score": "0.43168116", "text": "func (ce *ColumnEncryptionProperties) ColumnPath() string {\n\treturn ce.columnPath\n}", "title": "" }, { "docid": "0e0acc8b5140f4089ee2ee6c5a964f96", "score": "0.42887694", "text": "func (k *SKey) TableName() string {\n\treturn k.tableName\n}", "title": "" }, { "docid": "344b096a8a05306e7a7e12583dd8e81d", "score": "0.42865503", "text": "func (e *HTMLTableRow) Key(key interface{}) *HTMLTableRow {\n\te.key = F(key)\n\treturn e\n}", "title": "" }, { "docid": "7710d6e7f29371f91444ee8aeb97cfc7", "score": "0.4285546", "text": "func (service *HTTPRestService) GetPartitionKey() (dncPartitionKey string) {\n\tservice.lock.Lock()\n\tdncPartitionKey = service.dncPartitionKey\n\tservice.lock.Unlock()\n\treturn\n}", "title": "" }, { "docid": "20c5a6d0b063efc15f8b640fb07236c0", "score": "0.42738923", "text": "func (d *DivMaster) ColumnName() string {\n\treturn d.columnName\n}", "title": "" }, { "docid": "de897998c7d1e0b505891e4a013df8ec", "score": "0.42718112", "text": "func IsKey(sqlField SQLFieldStruct) bool {\n\treturn strings.HasSuffix(sqlField.Field, sqlIDSuffix)\n}", "title": "" }, { "docid": "2623ba3c2e2903836bf80f27fa3fe02d", "score": "0.42663425", "text": "func (v *productTableType) Name() string {\n\treturn v.s.SQLName\n}", "title": "" }, { "docid": "5ee0044c08d8b6c7de012a6e222385a1", "score": "0.42653236", "text": "func (e DescribeTableResponseValidationError) Key() bool { return e.key }", "title": "" }, { "docid": "f8213c9d01bf4da8a1765575f2c8d1f9", "score": "0.42629236", "text": "func (m *HPAMetric) Key() string {\n\tkey := m.Metric + \"|\" + m.Namespace + \"|\" + m.GroupResource.String() + \"|\" + m.TargetName + \"|\"\n\tif m.PodSelector != nil && !m.PodSelector.Empty() {\n\t\tkey += m.PodSelector.String() + \"|\"\n\t}\n\tif m.MetricSelector != nil && !m.MetricSelector.Empty() {\n\t\tkey += m.MetricSelector.String() + \"|\"\n\t}\n\treturn key\n}", "title": "" }, { "docid": "920716b801eae0963332fec813d01b7e", "score": "0.4261988", "text": "func (id UniqueID) Partition() int32 {\n\treturn GetPartitionKey(id.Value)\n}", "title": "" }, { "docid": "ea1d7dea05e52cc5bfb3cd39c1845ae9", "score": "0.42602983", "text": "func (r *rows) columnName(n int) (string, error) {\n\tp := bin.Xsqlite3_column_name(r.tls, r.pstmt, int32(n))\n\treturn crt.GoString(p), nil\n}", "title": "" }, { "docid": "164501a65e13e209392816b7894d573a", "score": "0.4258843", "text": "func (t CustomerTable) SelectCols() string {\n\treturn `customer_id,name,created_at,archived_at`\n}", "title": "" }, { "docid": "45bde8ade6c716ba11d9993d12c48f41", "score": "0.4254538", "text": "func (f *field) Key() string {\n\treturn f.k\n}", "title": "" }, { "docid": "4bd2b0aa351464114880c854a92e16f8", "score": "0.42536995", "text": "func (t *TableSchema) TargetName(by interface{}) (string, error) {\n\tif len(t.splitByColumns) == 0 || by == nil {\n\t\treturn t.Name, nil\n\t}\n\n\tif f, ok := by.(RowFilter); ok { // by filter: update/deleting/query\n\t\treturn t.TargetNameWithFilter(f)\n\t}\n\n\tswitch reflect.ValueOf(by).Kind() {\n\tcase reflect.Struct:\n\t\treturn t.TargetNameWithFilter(&StructFilter{Cols: t.splitByColumns, Value: by})\n\tcase reflect.Interface, reflect.Ptr:\n\t\tif reflect.ValueOf(by).Elem().Kind() == reflect.Struct {\n\t\t\treturn t.TargetNameWithFilter(&StructFilter{Cols: t.splitByColumns, Value: by})\n\t\t}\n\t\treturn \"\", fmt.Errorf(\"no support args for compute target table name: [%T] %v\", by, by)\n\tdefault:\n\t\treturn \"\", fmt.Errorf(\"no support args for compute target table name: [%T] %v\", by, by)\n\t}\n}", "title": "" }, { "docid": "49dfcc929e87bb0b403e62ddf6058649", "score": "0.42496535", "text": "func (o AzureMachineLearningStudioOutputColumnResponseOutput) Name() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AzureMachineLearningStudioOutputColumnResponse) *string { return v.Name }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ec65fa7e37dd9dc6ec11b51d33417f06", "score": "0.42483026", "text": "func (t TableAlias) Column(column string) string {\n\tc, ok := t.Columns[column]\n\tif !ok {\n\t\tpanic(fmt.Sprintf(\"could not find column alias for: %s.%s\", t.UpSingular, column))\n\t}\n\n\treturn c\n}", "title": "" } ]
551946f546b1f652fbf7d1cc23958a32
RequestTopLeagueMatches requests top league matches. Request ID: k_EMsgClientToGCTopLeagueMatchesRequest Response ID: k_EMsgGCToClientTopLeagueMatchesResponse Request type: CMsgClientToGCTopLeagueMatchesRequest Response type: CMsgGCToClientTopLeagueMatchesResponse
[ { "docid": "e3480f8fb485427fc3bc727fa2f156e5", "score": "0.8994232", "text": "func (d *Dota2) RequestTopLeagueMatches(\n\tctx context.Context,\n) (*protocol.CMsgGCToClientTopLeagueMatchesResponse, error) {\n\treq := &protocol.CMsgClientToGCTopLeagueMatchesRequest{}\n\tresp := &protocol.CMsgGCToClientTopLeagueMatchesResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCTopLeagueMatchesRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCToClientTopLeagueMatchesResponse),\n\t\tresp,\n\t)\n}", "title": "" } ]
[ { "docid": "8d48f5d125826745b6e2a966b386d1f3", "score": "0.78129965", "text": "func (d *Dota2) RequestTopFriendMatches(\n\tctx context.Context,\n) (*protocol.CMsgGCToClientTopFriendMatchesResponse, error) {\n\treq := &protocol.CMsgClientToGCTopFriendMatchesRequest{}\n\tresp := &protocol.CMsgGCToClientTopFriendMatchesResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCTopFriendMatchesRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCToClientTopFriendMatchesResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "cbfdf01d1fd86d48d99551ea7fec6757", "score": "0.61740553", "text": "func (d *Dota2) RequestPlayerCoachMatches(\n\tctx context.Context,\n) (*protocol.CMsgClientToGCRequestPlayerCoachMatchesResponse, error) {\n\treq := &protocol.CMsgClientToGCRequestPlayerCoachMatches{}\n\tresp := &protocol.CMsgClientToGCRequestPlayerCoachMatchesResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCRequestPlayerCoachMatches),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCRequestPlayerCoachMatchesResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "c17cfe18f8815ae856e619d0fe6b634a", "score": "0.59030354", "text": "func (d *Dota2) RequestMatches(\n\tctx context.Context,\n\treq *protocol.CMsgDOTARequestMatches,\n) (*protocol.CMsgDOTARequestMatchesResponse, error) {\n\tresp := &protocol.CMsgDOTARequestMatchesResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCRequestMatches),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCRequestMatchesResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "1304b3aff2496d4ea7b424aab0a0fcc7", "score": "0.54623216", "text": "func (d *Dota2) RequestPlayerCoachMatch(\n\tctx context.Context,\n\tmatchID uint64,\n) (*protocol.CMsgClientToGCRequestPlayerCoachMatchResponse, error) {\n\treq := &protocol.CMsgClientToGCRequestPlayerCoachMatch{\n\t\tMatchId: &matchID,\n\t}\n\tresp := &protocol.CMsgClientToGCRequestPlayerCoachMatchResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCRequestPlayerCoachMatch),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCRequestPlayerCoachMatchResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "91068dd2591c5f5738c3c4fcf6a383e3", "score": "0.53981084", "text": "func (d *Dota2) FindTopSourceTVGames(\n\tctx context.Context,\n\treq *protocol.CMsgClientToGCFindTopSourceTVGames,\n) (*protocol.CMsgGCToClientFindTopSourceTVGamesResponse, error) {\n\tresp := &protocol.CMsgGCToClientFindTopSourceTVGamesResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCFindTopSourceTVGames),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCToClientFindTopSourceTVGamesResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "7e6c71369958a213b26df0c413e72d83", "score": "0.5160584", "text": "func (d *Dota2) RequestMatchmakingStats(\n\tctx context.Context,\n) (*protocol.CMsgDOTAMatchmakingStatsResponse, error) {\n\treq := &protocol.CMsgDOTAMatchmakingStatsRequest{}\n\tresp := &protocol.CMsgDOTAMatchmakingStatsResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCMatchmakingStatsRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCMatchmakingStatsResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "9b1a70abc9a143875e5cfab7ddb3d284", "score": "0.5136538", "text": "func (d *Dota2) RequestFantasyLeagueMatchups(\n\tctx context.Context,\n\tfantasyLeagueID uint32,\n) (*protocol.CMsgDOTAFantasyLeagueMatchupsResponse, error) {\n\treq := &protocol.CMsgDOTAFantasyLeagueMatchupsRequest{\n\t\tFantasyLeagueId: &fantasyLeagueID,\n\t}\n\tresp := &protocol.CMsgDOTAFantasyLeagueMatchupsResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCFantasyLeagueMatchupsRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCFantasyLeagueMatchupsResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "cd857970a64a02b4927572ddb1a3084c", "score": "0.49980006", "text": "func GetActiveMatches() ([]*models.Match, error) {\n\trows, err := models.DB.Query(`\n\t\tSELECT\n\t\t\tm.id, m.is_finished, m.is_abandoned, m.is_walkover, m.current_leg_id, m.winner_id, m.office_id, m.is_practice,\n\t\t\tm.created_at, m.updated_at, m.owe_type_id, m.venue_id, mt.id, mt.name, mt.description, mm.id, mm.name, mm.short_name,\n\t\t\tmm.wins_required, mm.legs_required, ot.id, ot.item, v.id, v.name, v.description, l.updated_at as 'last_throw',\n\t\t\tGROUP_CONCAT(DISTINCT p2l.player_id ORDER BY p2l.order) AS 'players'\n\t\tFROM matches m\n\t\t\tJOIN match_type mt ON mt.id = m.match_type_id\n\t\t\tJOIN match_mode mm ON mm.id = m.match_mode_id\n\t\t\tLEFT JOIN leg l ON l.id = m.current_leg_id\n\t\t\tLEFT JOIN owe_type ot ON ot.id = m.owe_type_id\n\t\t\tLEFT JOIN venue v on v.id = m.venue_id\n\t\t\tLEFT JOIN player2leg p2l ON p2l.match_id = m.id\n\t\tWHERE m.is_finished = 0\n\t\t\tAND l.updated_at > NOW() - INTERVAL 2 MINUTE\n\t\tGROUP BY m.id\n\t\tORDER BY m.id DESC`)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tmatches := make([]*models.Match, 0)\n\tfor rows.Next() {\n\t\tm := new(models.Match)\n\t\tm.MatchType = new(models.MatchType)\n\t\tm.MatchMode = new(models.MatchMode)\n\t\tot := new(models.OweType)\n\t\tvenue := new(models.Venue)\n\t\tvar players string\n\t\terr := rows.Scan(&m.ID, &m.IsFinished, &m.IsAbandoned, &m.IsWalkover, &m.CurrentLegID, &m.WinnerID, &m.OfficeID, &m.IsPractice,\n\t\t\t&m.CreatedAt, &m.UpdatedAt, &m.OweTypeID, &m.VenueID, &m.MatchType.ID, &m.MatchType.Name, &m.MatchType.Description,\n\t\t\t&m.MatchMode.ID, &m.MatchMode.Name, &m.MatchMode.ShortName, &m.MatchMode.WinsRequired, &m.MatchMode.LegsRequired,\n\t\t\t&ot.ID, &ot.Item, &venue.ID, &venue.Name, &venue.Description, &m.LastThrow, &players)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif m.OweTypeID.Valid {\n\t\t\tm.OweType = ot\n\t\t}\n\t\tif m.VenueID.Valid {\n\t\t\tm.Venue = venue\n\t\t}\n\n\t\tm.Players = util.StringToIntArray(players)\n\t\tmatches = append(matches, m)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn matches, nil\n}", "title": "" }, { "docid": "7ef65142069cba89a7ef1df08a286b53", "score": "0.4988562", "text": "func GetMatchesLimit(start int, limit int) ([]*models.Match, error) {\n\trows, err := models.DB.Query(`\n\t\tSELECT\n\t\t\tm.id, m.is_finished, m.is_abandoned, m.is_walkover, m.current_leg_id, m.winner_id, m.office_id, m.is_practice,\n\t\t\tm.created_at, m.updated_at, m.owe_type_id, m.venue_id, mt.id, mt.name, mt.description, mm.id, mm.name, mm.short_name,\n\t\t\tmm.wins_required, mm.legs_required, ot.id, ot.item, v.id, v.name, v.description,\n\t\t\tl.updated_at as 'last_throw', GROUP_CONCAT(DISTINCT p2l.player_id ORDER BY p2l.order) AS 'players',\n\t\t\tm.tournament_id, t.id, t.name, tg.id, tg.name, GROUP_CONCAT(legs.winner_id ORDER BY legs.id) AS 'legs_won'\n\t\tFROM matches m\n\t\t\tJOIN match_type mt ON mt.id = m.match_type_id\n\t\t\tJOIN match_mode mm ON mm.id = m.match_mode_id\n\t\t\tLEFT JOIN leg l ON l.id = m.current_leg_id\n\t\t\tLEFT JOIN owe_type ot ON ot.id = m.owe_type_id\n\t\t\tLEFT JOIN venue v on v.id = m.venue_id\n\t\t\tLEFT JOIN player2leg p2l ON p2l.match_id = m.id\n\t\t\tLEFT JOIN leg legs ON legs.id = p2l.leg_id AND legs.winner_id = p2l.player_id\n\t\t\tLEFT JOIN player2tournament p2t ON p2t.tournament_id = m.tournament_id AND p2t.player_id = p2l.player_id\n\t\t\tLEFT JOIN tournament t ON t.id = p2t.tournament_id\n\t\t\tLEFT JOIN tournament_group tg ON tg.id = p2t.tournament_group_id\n\t\tWHERE m.created_at <= NOW()\n\t\tGROUP BY m.id\n\t\tORDER BY m.created_at DESC, m.id DESC\n\t\tLIMIT ?, ?`, start, limit)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tmatches := make([]*models.Match, 0)\n\tfor rows.Next() {\n\t\tm := new(models.Match)\n\t\tm.MatchType = new(models.MatchType)\n\t\tm.MatchMode = new(models.MatchMode)\n\t\tot := new(models.OweType)\n\t\tvenue := new(models.Venue)\n\t\ttournament := new(models.MatchTournament)\n\t\tvar players string\n\t\tvar legsWon null.String\n\t\terr := rows.Scan(&m.ID, &m.IsFinished, &m.IsAbandoned, &m.IsWalkover, &m.CurrentLegID, &m.WinnerID, &m.OfficeID, &m.IsPractice,\n\t\t\t&m.CreatedAt, &m.UpdatedAt, &m.OweTypeID, &m.VenueID, &m.MatchType.ID, &m.MatchType.Name, &m.MatchType.Description,\n\t\t\t&m.MatchMode.ID, &m.MatchMode.Name, &m.MatchMode.ShortName, &m.MatchMode.WinsRequired, &m.MatchMode.LegsRequired,\n\t\t\t&ot.ID, &ot.Item, &venue.ID, &venue.Name, &venue.Description, &m.LastThrow, &players, &m.TournamentID, &tournament.TournamentID,\n\t\t\t&tournament.TournamentName, &tournament.TournamentGroupID, &tournament.TournamentGroupName, &legsWon)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif m.OweTypeID.Valid {\n\t\t\tm.OweType = ot\n\t\t}\n\t\tif m.VenueID.Valid {\n\t\t\tm.Venue = venue\n\t\t}\n\t\tif m.TournamentID.Valid {\n\t\t\tm.Tournament = tournament\n\t\t}\n\t\tm.Players = util.StringToIntArray(players)\n\t\tif legsWon.Valid {\n\t\t\tm.LegsWon = util.StringToIntArray(legsWon.String)\n\t\t}\n\t\tmatches = append(matches, m)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn matches, nil\n}", "title": "" }, { "docid": "a8168da47762dec5b6196c2d64e0938f", "score": "0.49049073", "text": "func (c *Client) GetMatches(ctx context.Context, params *GetMatchesInput, optFns ...func(*Options)) (*GetMatchesOutput, error) {\n\tif params == nil {\n\t\tparams = &GetMatchesInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"GetMatches\", params, optFns, c.addOperationGetMatchesMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*GetMatchesOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "title": "" }, { "docid": "f66e933dcc00b5785ccc1214731e62bf", "score": "0.48681554", "text": "func GetPlayerLastMatches(playerID int, limit int) ([]*models.Match, error) {\n\trows, err := models.DB.Query(`\n\t\tSELECT\n\t\t\tm.id, m.is_finished, m.is_abandoned, m.is_walkover, m.current_leg_id, m.winner_id, m.created_at, m.updated_at,\n\t\t\tm.owe_type_id, mt.id, mt.name, mt.description,\n\t\t\tmm.id, mm.name, mm.short_name, mm.wins_required, mm.legs_required\n\t\tFROM matches m\n\t\t\tJOIN match_type mt ON mt.id = m.match_type_id\n\t\t\tJOIN match_mode mm ON mm.id = m.match_mode_id\n\t\t\tJOIN player2leg p2l ON p2l.match_id = m.id\n\t\tWHERE m.id IN (SELECT match_id FROM player2leg GROUP BY match_id HAVING COUNT(DISTINCT player_id) = 2)\n\t\t\tAND m.is_finished = 1 AND m.is_abandoned = 0 AND m.is_practice = 0\n\t\t\tAND p2l.player_id IN (?)\n\t\tGROUP BY m.id\n\t\tORDER BY m.created_at DESC LIMIT ?`, playerID, limit)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tmatches := make([]*models.Match, 0)\n\tfor rows.Next() {\n\t\tm := new(models.Match)\n\t\tm.MatchType = new(models.MatchType)\n\t\tm.MatchMode = new(models.MatchMode)\n\t\terr := rows.Scan(&m.ID, &m.IsFinished, &m.IsAbandoned, &m.IsWalkover, &m.CurrentLegID, &m.WinnerID, &m.CreatedAt, &m.UpdatedAt, &m.OweTypeID,\n\t\t\t&m.MatchType.ID, &m.MatchType.Name, &m.MatchType.Description,\n\t\t\t&m.MatchMode.ID, &m.MatchMode.Name, &m.MatchMode.ShortName, &m.MatchMode.WinsRequired, &m.MatchMode.LegsRequired)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tmatches = append(matches, m)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn matches, nil\n}", "title": "" }, { "docid": "228d20ad60bd3f33cbf5bf618f8466db", "score": "0.485174", "text": "func GetMatches() ([]*models.Match, error) {\n\trows, err := models.DB.Query(`\n\t\tSELECT\n\t\t\tm.id, m.is_finished, m.is_abandoned, m.is_walkover, m.current_leg_id, m.winner_id, m.office_id, m.is_practice,\n\t\t\tm.created_at, m.updated_at, m.owe_type_id, m.venue_id, mt.id, mt.name, mt.description, mm.id, mm.name, mm.short_name,\n\t\t\tmm.wins_required, mm.legs_required, ot.id, ot.item, v.id, v.name, v.description, l.updated_at as 'last_throw',\n\t\t\tGROUP_CONCAT(DISTINCT p2l.player_id ORDER BY p2l.order) AS 'players'\n\t\tFROM matches m\n\t\t\tJOIN match_type mt ON mt.id = m.match_type_id\n\t\t\tJOIN match_mode mm ON mm.id = m.match_mode_id\n\t\t\tLEFT JOIN leg l ON l.id = m.current_leg_id\n\t\t\tLEFT JOIN owe_type ot ON ot.id = m.owe_type_id\n\t\t\tLEFT JOIN venue v on v.id = m.venue_id\n\t\t\tLEFT JOIN player2leg p2l ON p2l.match_id = m.id\n\t\tGROUP BY m.id\n\t\tORDER BY m.id DESC`)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tmatches := make([]*models.Match, 0)\n\tfor rows.Next() {\n\t\tm := new(models.Match)\n\t\tm.MatchType = new(models.MatchType)\n\t\tm.MatchMode = new(models.MatchMode)\n\t\tot := new(models.OweType)\n\t\tvenue := new(models.Venue)\n\t\tvar players string\n\t\terr := rows.Scan(&m.ID, &m.IsFinished, &m.IsAbandoned, &m.IsWalkover, &m.CurrentLegID, &m.WinnerID, &m.OfficeID, &m.IsPractice, &m.CreatedAt, &m.UpdatedAt,\n\t\t\t&m.OweTypeID, &m.VenueID, &m.MatchType.ID, &m.MatchType.Name, &m.MatchType.Description,\n\t\t\t&m.MatchMode.ID, &m.MatchMode.Name, &m.MatchMode.ShortName, &m.MatchMode.WinsRequired, &m.MatchMode.LegsRequired,\n\t\t\t&ot.ID, &ot.Item, &venue.ID, &venue.Name, &venue.Description, &m.LastThrow, &players)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif m.OweTypeID.Valid {\n\t\t\tm.OweType = ot\n\t\t}\n\t\tif m.VenueID.Valid {\n\t\t\tm.Venue = venue\n\t\t}\n\n\t\tm.Players = util.StringToIntArray(players)\n\t\tmatches = append(matches, m)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn matches, nil\n}", "title": "" }, { "docid": "a88d1957eb46dc71325ab4c936467c5b", "score": "0.4808543", "text": "func (d *Dota2) RequestLeagueAvailableLobbyNodes(\n\tctx context.Context,\n\tleagueID uint32,\n) (*protocol.CMsgDOTALeagueAvailableLobbyNodes, error) {\n\treq := &protocol.CMsgDOTALeagueAvailableLobbyNodesRequest{\n\t\tLeagueId: &leagueID,\n\t}\n\tresp := &protocol.CMsgDOTALeagueAvailableLobbyNodes{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgDOTALeagueAvailableLobbyNodesRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgDOTALeagueAvailableLobbyNodes),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "cfdc4f0cd1afdf071910ff04a6017115", "score": "0.48000962", "text": "func GetActiveVenueMatches(venueId int) ([]*models.Match, error) {\n\trows, err := models.DB.Query(`\n\t\tSELECT\n\t\t\tm.id, m.is_finished, m.is_abandoned, m.is_walkover, m.current_leg_id, m.winner_id, m.office_id, m.is_practice,\n\t\t\tm.created_at, m.updated_at, m.owe_type_id, m.venue_id, mt.id, mt.name, mt.description, mm.id, mm.name, mm.short_name,\n\t\t\tmm.wins_required, mm.legs_required, ot.id, ot.item, v.id, v.name, v.description, l.updated_at as 'last_throw',\n\t\t\tGROUP_CONCAT(DISTINCT p2l.player_id ORDER BY p2l.order) AS 'players'\n\t\tFROM matches m\n\t\t\tJOIN match_type mt ON mt.id = m.match_type_id\n\t\t\tJOIN match_mode mm ON mm.id = m.match_mode_id\n\t\t\tLEFT JOIN leg l ON l.id = m.current_leg_id\n\t\t\tLEFT JOIN owe_type ot ON ot.id = m.owe_type_id\n\t\t\tLEFT JOIN venue v on v.id = m.venue_id\n\t\t\tLEFT JOIN player2leg p2l ON p2l.match_id = m.id\n\t\tWHERE m.is_finished = 0 AND m.is_abandoned = 0 and m.is_walkover <> 1\n\t\t\tAND m.venue_id = ?\n\t\tGROUP BY m.id\n\t\tORDER BY m.id DESC`, venueId)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tmatches := make([]*models.Match, 0)\n\tfor rows.Next() {\n\t\tm := new(models.Match)\n\t\tm.MatchType = new(models.MatchType)\n\t\tm.MatchMode = new(models.MatchMode)\n\t\tot := new(models.OweType)\n\t\tvenue := new(models.Venue)\n\t\tvar players string\n\t\terr := rows.Scan(&m.ID, &m.IsFinished, &m.IsAbandoned, &m.IsWalkover, &m.CurrentLegID, &m.WinnerID, &m.OfficeID, &m.IsPractice,\n\t\t\t&m.CreatedAt, &m.UpdatedAt, &m.OweTypeID, &m.VenueID, &m.MatchType.ID, &m.MatchType.Name, &m.MatchType.Description,\n\t\t\t&m.MatchMode.ID, &m.MatchMode.Name, &m.MatchMode.ShortName, &m.MatchMode.WinsRequired, &m.MatchMode.LegsRequired,\n\t\t\t&ot.ID, &ot.Item, &venue.ID, &venue.Name, &venue.Description, &m.LastThrow, &players)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif m.OweTypeID.Valid {\n\t\t\tm.OweType = ot\n\t\t}\n\t\tif m.VenueID.Valid {\n\t\t\tm.Venue = venue\n\t\t}\n\n\t\tm.Players = util.StringToIntArray(players)\n\t\tmatches = append(matches, m)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn matches, nil\n}", "title": "" }, { "docid": "a96ab35698ed4ddcdd3b504e213a3ff2", "score": "0.47448677", "text": "func (s *searcher) TopUVLs(limit int, minMatch float64, name string) []*Result[csl.UVL] {\n\ts.RLock()\n\tdefer s.RUnlock()\n\n\ts.Gate.Start()\n\tdefer s.Gate.Done()\n\n\treturn topResults[csl.UVL](limit, minMatch, name, s.UVLs)\n}", "title": "" }, { "docid": "2486059cc4d378f0a1e77b35f6e2fee1", "score": "0.4709064", "text": "func (d *Dota2) RequestMatchDetails(\n\tctx context.Context,\n\tmatchID uint64,\n) (*protocol.CMsgGCMatchDetailsResponse, error) {\n\treq := &protocol.CMsgGCMatchDetailsRequest{\n\t\tMatchId: &matchID,\n\t}\n\tresp := &protocol.CMsgGCMatchDetailsResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCMatchDetailsRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCMatchDetailsResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "0bb4812c87a9f83c9ae41a0c48a21b68", "score": "0.4701883", "text": "func (d *Dota2) RequestTeammateStats(\n\tctx context.Context,\n) (*protocol.CMsgClientToGCTeammateStatsResponse, error) {\n\treq := &protocol.CMsgClientToGCTeammateStatsRequest{}\n\tresp := &protocol.CMsgClientToGCTeammateStatsResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCTeammateStatsRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCTeammateStatsResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "b015ddd8bbcb600f1c19f09a00217c48", "score": "0.46995834", "text": "func (d *Dota2) RequestMatchesMinimal(\n\tctx context.Context,\n\tmatchIDs []uint64,\n) (*protocol.CMsgClientToGCMatchesMinimalResponse, error) {\n\treq := &protocol.CMsgClientToGCMatchesMinimalRequest{\n\t\tMatchIds: matchIDs,\n\t}\n\tresp := &protocol.CMsgClientToGCMatchesMinimalResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCMatchesMinimalRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCMatchesMinimalResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "b8cd02c83d85d903d6af3fe19f8d4af6", "score": "0.4693855", "text": "func GetMatch(id int) (*models.Match, error) {\n\tm := new(models.Match)\n\tm.MatchType = new(models.MatchType)\n\tm.MatchMode = new(models.MatchMode)\n\tot := new(models.OweType)\n\tvenue := new(models.Venue)\n\ttournament := new(models.MatchTournament)\n\tvar players string\n\terr := models.DB.QueryRow(`\n SELECT\n\t\t\tm.id, m.is_finished, m.is_abandoned, m.is_walkover, m.current_leg_id, m.winner_id, m.office_id, m.is_practice, m.created_at, m.updated_at,\n\t\t\tm.owe_type_id, m.venue_id, mt.id, mt.name, mt.description, mm.id, mm.name, mm.short_name, mm.wins_required,\n\t\t\tmm.legs_required, mm.tiebreak_match_type_id, ot.id, ot.item, v.id, v.name, v.description,\n\t\t\tMAX(l.updated_at) AS 'last_throw',\n\t\t\tMIN(s.created_at) AS 'first_throw',\n\t\t\tGROUP_CONCAT(DISTINCT p2l.player_id ORDER BY p2l.order) AS 'players',\n\t\t\tm.tournament_id, t.id, t.name, t.office_id, tg.id, tg.name, t.is_playoffs\n\t\tFROM matches m\n\t\t\tJOIN match_type mt ON mt.id = m.match_type_id\n\t\t\tJOIN match_mode mm ON mm.id = m.match_mode_id\n\t\t\tLEFT JOIN leg l ON l.match_id = m.id\n\t\t\tLEFT JOIN score s ON s.leg_id = l.id\n\t\t\tLEFT JOIN owe_type ot ON ot.id = m.owe_type_id\n\t\t\tLEFT JOIN venue v on v.id = m.venue_id\n\t\t\tLEFT JOIN player2leg p2l ON p2l.match_id = m.id\n\t\t\tLEFT JOIN player2tournament p2t ON p2t.tournament_id = m.tournament_id AND p2t.player_id = p2l.player_id\n\t\t\tLEFT JOIN tournament t ON t.id = p2t.tournament_id\n\t\t\tLEFT JOIN tournament_group tg ON tg.id = p2t.tournament_group_id\n\t\tWHERE m.id = ?`, id).Scan(&m.ID, &m.IsFinished, &m.IsAbandoned, &m.IsWalkover, &m.CurrentLegID, &m.WinnerID, &m.OfficeID, &m.IsPractice,\n\t\t&m.CreatedAt, &m.UpdatedAt, &m.OweTypeID, &m.VenueID, &m.MatchType.ID, &m.MatchType.Name, &m.MatchType.Description,\n\t\t&m.MatchMode.ID, &m.MatchMode.Name, &m.MatchMode.ShortName, &m.MatchMode.WinsRequired, &m.MatchMode.LegsRequired, &m.MatchMode.TieBreakMatchTypeID,\n\t\t&ot.ID, &ot.Item, &venue.ID, &venue.Name, &venue.Description, &m.LastThrow, &m.FirstThrow, &players, &m.TournamentID, &tournament.TournamentID,\n\t\t&tournament.TournamentName, &tournament.OfficeID, &tournament.TournamentGroupID, &tournament.TournamentGroupName, &tournament.IsPlayoffs)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif m.OweTypeID.Valid {\n\t\tm.OweType = ot\n\t}\n\tif m.VenueID.Valid && m.VenueID.Int64 != 0 {\n\t\tm.Venue, err = GetVenue(int(m.VenueID.Int64))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tif m.TournamentID.Valid {\n\t\tm.Tournament = tournament\n\t}\n\tm.Players = util.StringToIntArray(players)\n\tm.Legs, err = GetLegsForMatch(id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif m.IsFinished {\n\t\tm.EndTime = *m.Legs[len(m.Legs)-1].Endtime.Ptr()\n\t}\n\n\tm.EloChange, err = GetMatchEloChange(id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn m, nil\n}", "title": "" }, { "docid": "786900361e6a23a6cdfaf3ecb2979d68", "score": "0.4690658", "text": "func PrintMatches(matches []Match) {\n\tlength := int(math.Min(float64(len(matches)), float64(maxResults)))\n\tfor i := 0; i<length; i++ {\n\t\tmatches[i].Print()\n\t}\n}", "title": "" }, { "docid": "8a486470f0192df1d5446631f381d984", "score": "0.46010256", "text": "func GetHeadToHeadMatches(player1 int, player2 int) ([]*models.Match, error) {\n\trows, err := models.DB.Query(`\n\t\tSELECT\n\t\t\tm.id, m.is_finished, m.is_abandoned, m.is_walkover, m.current_leg_id, m.winner_id, m.created_at, m.updated_at,\n\t\t\tm.owe_type_id, mt.id, mt.name, mt.description,\n\t\t\tmm.id, mm.name, mm.short_name, mm.wins_required, mm.legs_required\n\t\tFROM matches m\n\t\t\tJOIN match_type mt ON mt.id = m.match_type_id\n\t\t\tJOIN match_mode mm ON mm.id = m.match_mode_id\n\t\t\tJOIN player2leg p2l ON p2l.match_id = m.id\n\t\tWHERE m.id IN (SELECT match_id FROM player2leg GROUP BY match_id HAVING COUNT(DISTINCT player_id) = 2)\n\t\t\tAND m.is_finished = 1 AND m.is_abandoned = 0\n\t\t\tAND m.match_type_id = 1\n\t\t\tAND p2l.player_id IN (?, ?)\n\t\tGROUP BY m.id\n\t\t\tHAVING COUNT(DISTINCT p2l.player_id) = 2\n\t\tORDER BY m.created_at DESC`, player1, player2)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tmatches := make([]*models.Match, 0)\n\tfor rows.Next() {\n\t\tm := new(models.Match)\n\t\tm.MatchType = new(models.MatchType)\n\t\tm.MatchMode = new(models.MatchMode)\n\t\terr := rows.Scan(&m.ID, &m.IsFinished, &m.IsAbandoned, &m.IsWalkover, &m.CurrentLegID, &m.WinnerID, &m.CreatedAt, &m.UpdatedAt,\n\t\t\t&m.OweTypeID, &m.MatchType.ID, &m.MatchType.Name, &m.MatchType.Description,\n\t\t\t&m.MatchMode.ID, &m.MatchMode.Name, &m.MatchMode.ShortName, &m.MatchMode.WinsRequired, &m.MatchMode.LegsRequired)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tmatches = append(matches, m)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn matches, nil\n}", "title": "" }, { "docid": "12760ad09b74be4ae97f90112212c43c", "score": "0.45966914", "text": "func (a *TicketAPI) getTopHosts(params interface{}) (resp *rpc.Response) {\n\treturn rpc.Success(util.Map{\n\t\t\"tickets\": a.mods.Ticket.GetTopHosts(cast.ToInt(params)),\n\t})\n}", "title": "" }, { "docid": "d3e5a093a81f5d383695aac483be3346", "score": "0.4567054", "text": "func TeamRecentGameInfo(\n c appengine.Context,\n userAcls *RequestorAclCache,\n n int,\n playerCache *PlayerCache,\n league *League,\n leagueKey *datastore.Key,\n teamKey *datastore.Key) ([]*GameInfo, []error) {\n infos := make([]*GameInfo, 0, n)\n errors := make([]error, 0)\n\n players, _, err := TeamAllPlayers(c, userAcls, league, leagueKey, teamKey, KeysAndEntities)\n if err != nil {\n errors = append(errors, errwrap.Wrap(err))\n return nil, errors\n }\n\n var gameKeys []*datastore.Key\n {\n var gamesByTeam []*GameByTeam\n q := datastore.NewQuery(\"GameByTeam\").Ancestor(leagueKey).\n Project(\"GameKey\").\n Filter(\"TeamKey =\", teamKey).\n Order(\"-DateTime\").\n Limit(n)\n if _, err := q.GetAll(c, &gamesByTeam); err != nil {\n errors = append(errors, errwrap.Wrap(err))\n return infos, errors\n }\n for _, g := range gamesByTeam {\n gameKeys = append(gameKeys, g.GameKey)\n }\n }\n\n games := make([]*Game, len(gameKeys))\n for i := range games {\n games[i] = new(Game)\n }\n if err := datastore.GetMulti(c, gameKeys, games); err != nil {\n errors = append(errors, errwrap.Wrap(err))\n if me, ok := err.(appengine.MultiError); ok {\n for i, merr := range me {\n if merr == datastore.ErrNoSuchEntity {\n games[i] = nil\n errors = append(errors, errwrap.Wrap(err))\n }\n }\n }\n }\n\n for _, game := range games {\n if game == nil {\n continue\n }\n info := NewGameInfo()\n infos = append(infos, info)\n info.Game = game\n\n for _, p := range players {\n info.AddAppTeamPlayer(p)\n }\n\n for _, playerDto := range game.Players {\n summonerId := playerDto.SummonerId\n statKey := KeyForPlayerGameStatsId(c, game.Id(), MakePlayerId(game.Region, summonerId))\n player, err := playerCache.ById(summonerId)\n if err != nil {\n errors = append(errors, errwrap.Wrap(err))\n }\n pstats := new(PlayerGameStats)\n err = datastore.Get(c, statKey, pstats)\n if err != nil {\n if err == datastore.ErrNoSuchEntity {\n pstats = nil\n } else {\n errors = append(errors, errwrap.Wrap(err))\n }\n }\n info.AddGamePlayer(playerDto.TeamId, player, playerDto.ChampionId, pstats)\n }\n info.computeDerivedData()\n }\n\n return infos, errors\n}", "title": "" }, { "docid": "f366411eb80a54ea6f99b0e6c7b538cb", "score": "0.45243993", "text": "func (d *Dota2) RequestFantasyTeamScore(\n\tctx context.Context,\n\treq *protocol.CMsgDOTAFantasyTeamScoreRequest,\n) (*protocol.CMsgDOTAFantasyTeamScoreResponse, error) {\n\tresp := &protocol.CMsgDOTAFantasyTeamScoreResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCFantasyTeamScoreRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCFantasyTeamScoreResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "eefd7bbaea4abcbd4db539eab1191489", "score": "0.45173016", "text": "func Matches(m []*models.Match, url string, start int64, size int64, totalElements int64) *models.PagedMatches {\n\tpM := models.PagedMatches{}\n\tpM.Page = page(start, size, totalElements)\n\tpM.Content = m\n\tpM.Links = links(url, start, size, totalElements)\n\treturn &pM\n}", "title": "" }, { "docid": "bf79828e4a38b1bb4e98c16c0207597a", "score": "0.44925243", "text": "func (d *Dota2) GetPlayerMatchHistory(\n\tctx context.Context,\n\treq *protocol.CMsgDOTAGetPlayerMatchHistory,\n) (*protocol.CMsgDOTAGetPlayerMatchHistoryResponse, error) {\n\tresp := &protocol.CMsgDOTAGetPlayerMatchHistoryResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgDOTAGetPlayerMatchHistory),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgDOTAGetPlayerMatchHistoryResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "fb42dd895958d703c55cbc82add51439", "score": "0.4489464", "text": "func (d *Dota2) RequestGetRecentPlayTimeFriends(\n\tctx context.Context,\n) (*protocol.CMsgDOTAGetRecentPlayTimeFriendsResponse, error) {\n\treq := &protocol.CMsgDOTAGetRecentPlayTimeFriendsRequest{}\n\tresp := &protocol.CMsgDOTAGetRecentPlayTimeFriendsResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGetRecentPlayTimeFriendsRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGetRecentPlayTimeFriendsResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "9abb3950692800acdc2ef9288cde6569", "score": "0.44647315", "text": "func (d *Dota2) RequestHalloweenHighScore(\n\tctx context.Context,\n\tround int32,\n) (*protocol.CMsgDOTAHalloweenHighScoreResponse, error) {\n\treq := &protocol.CMsgDOTAHalloweenHighScoreRequest{\n\t\tRound: &round,\n\t}\n\tresp := &protocol.CMsgDOTAHalloweenHighScoreResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCHalloweenHighScoreRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCHalloweenHighScoreResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "2191847b7119b2e1cbf5c7c2e3708460", "score": "0.4463488", "text": "func (d *Dota2) RequestMyTeamInfo(\n\tctx context.Context,\n) (*protocol.CMsgDOTATeamInfo, error) {\n\treq := &protocol.CMsgDOTAMyTeamInfoRequest{}\n\tresp := &protocol.CMsgDOTATeamInfo{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCMyTeamInfoRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCToClientTeamInfo),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "b26d7fb5d59911334415c220db15034e", "score": "0.4447352", "text": "func (a *TicketAPI) getTopValidators(params interface{}) (resp *rpc.Response) {\n\treturn rpc.Success(util.Map{\n\t\t\"tickets\": a.mods.Ticket.GetTopValidators(cast.ToInt(params)),\n\t})\n}", "title": "" }, { "docid": "fd46fb1917d8ee978d5da6c1053a285f", "score": "0.44461885", "text": "func (a *client) Teams(params Parameters) (TeamStructPaginated, *ErrorStruct) {\n\tif params == nil {\n\t\tparams = make(Parameters)\n\t} else {\n\t\tparams = copyParams(params)\n\t}\n\n\tparams.Set(\"access_token\", a.oauth.AccessToken)\n\tresult := <-a.handler.addRequest(a.base_url+teams, params)\n\n\tdec := json.NewDecoder(bytes.NewBuffer(result.body))\n\tif 200 <= result.statuscode && result.statuscode < 300 {\n\t\ttarget := TeamStructPaginated{}\n\t\tdec.Decode(&target)\n\t\treturn target, nil\n\t}\n\n\ttarget := ErrorStruct{}\n\tdec.Decode(&target)\n\treturn TeamStructPaginated{}, &target\n}", "title": "" }, { "docid": "48baab3675a50c8bec663c9ae1fcff72", "score": "0.44415748", "text": "func (d *Dota2) RequestPlayerRecentAccomplishments(\n\tctx context.Context,\n\taccountID uint32,\n) (*protocol.CMsgClientToGCRequestPlayerRecentAccomplishmentsResponse, error) {\n\treq := &protocol.CMsgClientToGCRequestPlayerRecentAccomplishments{\n\t\tAccountId: &accountID,\n\t}\n\tresp := &protocol.CMsgClientToGCRequestPlayerRecentAccomplishmentsResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCRequestPlayerRecentAccomplishments),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCRequestPlayerRecentAccomplishmentsResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "530b8f43a2a5ca1e7a4d53342fbb3180", "score": "0.44230562", "text": "func (app *appContext) getMatches(c *gin.Context) {\n\tid := c.Param(\"id\")\n\n\tusers, err := FindMatches(app.DB, id)\n\tif err != nil {\n\t\terrorResponse(c, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, gin.H{\n\t\t\"data\": users,\n\t})\n\treturn\n}", "title": "" }, { "docid": "ef1311e74c670b5c442aeab703e5e1ca", "score": "0.44087172", "text": "func getWinners() [10]string {\n\theight := getLeaderHeight()\n\tcurrentOPRS := oprBlockByHeight(height)\n\trecord := currentOPRS.OPRs[0]\n\treturn record.WinPreviousOPR\n}", "title": "" }, { "docid": "41cf818108d0af8054556f472f879e54", "score": "0.44078758", "text": "func (c *client) opinionSortByTeam(candidateList []int) (opinionSortByTeam []float64) {\n\tsort.Ints(candidateList)\n\tfor _, island := range candidateList {\n\t\topinionSortByTeam = append(opinionSortByTeam, float64(c.opinions[shared.ClientID(island)].getScore()))\n\t}\n\treturn opinionSortByTeam\n}", "title": "" }, { "docid": "ae3c974c6180655b0a467c7769a13d60", "score": "0.4399839", "text": "func determineBestMatch(matches []*MatchResult) {\n\tif len(matches) == 1 {\n\t\tmatches[0].Best = true\n\t\tglog.V(2).Infof(\"Single good match, marking as best: %+v\", matches[0])\n\t} else {\n\t\t// top match is different enough to call it best\n\t\tif matches[0].Confidence-matches[1].Confidence >= matches[0].Confidence*bestMatchDiff {\n\t\t\tmatches[0].Best = true\n\t\t\tglog.V(2).Infof(\"Multiple good matches, top result is different enough, marking as best: %+v\", matches[0])\n\t\t} else {\n\t\t\tglog.V(2).Info(\"Multiple good matches, top result is not different enough, no best match found\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "629b204e32a359d14c788b4fd0ee8fcd", "score": "0.4388345", "text": "func (s *searcher) TopCAPs(limit int, minMatch float64, name string) []*Result[csl.CAP] {\n\ts.RLock()\n\tdefer s.RUnlock()\n\n\ts.Gate.Start()\n\tdefer s.Gate.Done()\n\n\treturn topResults[csl.CAP](limit, minMatch, name, s.CAPs)\n}", "title": "" }, { "docid": "9d443ad86e96978cbd3457f886efd450", "score": "0.43761316", "text": "func getGlickoPlayersForLeague(\n\ttx *sqlx.Tx,\n\tleagueID util.UUIDAsBlob,\n\tperiodStart util.TimeAsTimestamp,\n) (map[util.UUIDAsBlob]*glicko.Player, error) {\n\tquery := `\n SELECT * FROM PlayerRatingHistory\n WHERE LeagueID = ? AND RatingPeriodStartedAt = ?`\n\n\tvar ratings []PlayerRating\n\tif err := tx.Select(&ratings, query, leagueID, periodStart); err != nil {\n\t\treturn nil, err\n\t}\n\n\tret := make(map[util.UUIDAsBlob]*glicko.Player, len(ratings))\n\tfor k := range ratings {\n\t\tret[ratings[k].PlayerID] = glicko.NewPlayer(ratings[k].GlickoRating())\n\t}\n\n\treturn ret, nil\n}", "title": "" }, { "docid": "7ebc3fab1f5a160dca03addf9c03aac6", "score": "0.43761298", "text": "func (d *Dota2) RequestLeagueNode(\n\tctx context.Context,\n\tleagueID uint32,\n\tnodeID uint32,\n) (*protocol.CMsgDOTALeagueNodeResponse, error) {\n\treq := &protocol.CMsgDOTALeagueNodeRequest{\n\t\tLeagueId: &leagueID,\n\t\tNodeId: &nodeID,\n\t}\n\tresp := &protocol.CMsgDOTALeagueNodeResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgDOTALeagueNodeRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgDOTALeagueNodeResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "66265daf7c66e68993c8e344f2d286fb", "score": "0.4368903", "text": "func GetCurrentMatchups(leagueID string, seasonID string) ([]*Matchup, error) {\n\tleague, err := GetFantasyLeague(leagueID, seasonID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tperiodID := getCurrentPeriod()\n\tmids := make(map[int]int)\n\tfor _, team := range league.Leaguesettings.Teams {\n\t\tfor _, si := range team.ScheduleItems {\n\t\t\tif periodID == si.MatchupPeriodID {\n\t\t\t\tmids[si.Matchups[0].HomeTeam.TeamID] = si.Matchups[0].AwayTeam.TeamID\n\t\t\t}\n\t\t}\n\t}\n\tmatchups := make([]*Matchup, 0)\n\tfor homeID, awayID := range mids {\n\t\t// Convert home and away IDs to strings\n\t\thomeIDStr := strconv.Itoa(homeID)\n\t\tawayIDStr := strconv.Itoa(awayID)\n\t\thomeTeam := league.Leaguesettings.Teams[homeIDStr]\n\t\tawayTeam := league.Leaguesettings.Teams[awayIDStr]\n\t\t// Get the corrosponding ScheduleItemMatchup struct for this\n\t\t// matchup from the home team's schedule items\n\t\tvar sim ScheduleItemMatchup\n\t\tfor index, si := range homeTeam.ScheduleItems {\n\t\t\tif periodID == si.MatchupPeriodID {\n\t\t\t\tsim = homeTeam.ScheduleItems[index].Matchups[0]\n\t\t\t}\n\t\t}\n\t\t// Remove large unused data structure\n\t\tif homeTeam != nil {\n\t\t\thomeTeam.ScheduleItems = nil\n\t\t}\n\t\tif awayTeam != nil {\n\t\t\tawayTeam.ScheduleItems = nil\n\t\t}\n\t\tmu := Matchup{\n\t\t\tHomeTeamID: homeID,\n\t\t\tAwayTeamID: awayID,\n\t\t\tHomeTeam: homeTeam,\n\t\t\tAwayTeam: awayTeam,\n\t\t\tMatchup: sim,\n\t\t}\n\t\tmatchups = append(matchups, &mu)\n\t}\n\t// Sort the matchups in ascending order by HomeTeamID\n\tsort.Slice(matchups, func(i, j int) bool {\n\t\treturn matchups[i].HomeTeamID < matchups[j].HomeTeamID\n\t})\n\treturn matchups, nil\n}", "title": "" }, { "docid": "0c9ccd92621137d93be775783c4af937", "score": "0.43648973", "text": "func GetMatchmakerGameInfo(settings *playfab.Settings, postData *GetMatchmakerGameInfoRequestModel, developerSecretKey string) (*GetMatchmakerGameInfoResultModel, error) {\r\n if developerSecretKey == \"\" {\n return nil, playfab.NewCustomError(\"developerSecretKey should not be an empty string\", playfab.ErrorGeneric)\n }\r\n b, errMarshal := json.Marshal(postData)\r\n if errMarshal != nil {\r\n return nil, playfab.NewCustomError(errMarshal.Error(), playfab.ErrorMarshal)\r\n }\r\n\r\n sourceMap, err := playfab.Request(settings, b, \"/Admin/GetMatchmakerGameInfo\", \"X-SecretKey\", developerSecretKey)\r\n if err != nil {\r\n return nil, err\r\n }\r\n \r\n result := &GetMatchmakerGameInfoResultModel{}\r\n\r\n config := mapstructure.DecoderConfig{\r\n DecodeHook: playfab.StringToDateTimeHook,\r\n Result: result,\r\n }\r\n \r\n decoder, errDecoding := mapstructure.NewDecoder(&config)\r\n if errDecoding != nil {\r\n return nil, playfab.NewCustomError(errDecoding.Error(), playfab.ErrorDecoding)\r\n }\r\n \r\n errDecoding = decoder.Decode(sourceMap)\r\n if errDecoding != nil {\r\n return nil, playfab.NewCustomError(errDecoding.Error(), playfab.ErrorDecoding)\r\n }\r\n\r\n return result, nil\r\n}", "title": "" }, { "docid": "331be3e0b44e050c0da23ea05861cfa3", "score": "0.43487594", "text": "func RecentMatchlist(region string, accountId int64) (matchlist Matchlist, err error) {\n\terr = apiGet(region, fmt.Sprintf(\"/match/v3/matchlists/by-account/%d/recent\", accountId), &matchlist)\n\treturn\n}", "title": "" }, { "docid": "67dbe230cd13db10c39e3054af16f9ef", "score": "0.43337607", "text": "func (o RegionUrlMapPathMatcherRouteRuleMatchRuleOutput) HeaderMatches() RegionUrlMapPathMatcherRouteRuleMatchRuleHeaderMatchArrayOutput {\n\treturn o.ApplyT(func(v RegionUrlMapPathMatcherRouteRuleMatchRule) []RegionUrlMapPathMatcherRouteRuleMatchRuleHeaderMatch {\n\t\treturn v.HeaderMatches\n\t}).(RegionUrlMapPathMatcherRouteRuleMatchRuleHeaderMatchArrayOutput)\n}", "title": "" }, { "docid": "14ea5cf802ed6a3b389b293fe80ff172", "score": "0.43335915", "text": "func (d *Dota2) RequestFantasyScheduledMatches(\n\tctx context.Context,\n\tfantasyLeagueID uint32,\n) (*protocol.CMsgDOTAFantasyScheduledMatchesResponse, error) {\n\treq := &protocol.CMsgDOTAFantasyScheduledMatchesRequest{\n\t\tFantasyLeagueId: &fantasyLeagueID,\n\t}\n\tresp := &protocol.CMsgDOTAFantasyScheduledMatchesResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCFantasyScheduledMatchesRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCFantasyScheduledMatchesResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "cc4333fef8091796b9900c83b41fca1f", "score": "0.43037087", "text": "func (d *Dota2) SendMatchMatchmakingStats(\n\taverageQueueTime uint32,\n\tmaximumQueueTime uint32,\n\tbehaviorScoreVariance protocol.EMatchBehaviorScoreVariance,\n) {\n\treq := &protocol.CMsgMatchMatchmakingStats{\n\t\tAverageQueueTime: &averageQueueTime,\n\t\tMaximumQueueTime: &maximumQueueTime,\n\t\tBehaviorScoreVariance: &behaviorScoreVariance,\n\t}\n\td.write(uint32(protocol.EDOTAGCMsg_k_EMsgMatchMatchmakingStats), req)\n}", "title": "" }, { "docid": "47754f857cc4a43a582e2bf4fd055af4", "score": "0.4284981", "text": "func (s *searcher) TopPLCs(limit int, minMatch float64, name string) []*Result[csl.PLC] {\n\ts.RLock()\n\tdefer s.RUnlock()\n\n\ts.Gate.Start()\n\tdefer s.Gate.Done()\n\n\treturn topResults[csl.PLC](limit, minMatch, name, s.PLCs)\n}", "title": "" }, { "docid": "79a99537b362b9ae484e4a41b829a71d", "score": "0.42690307", "text": "func TallyTopScorers() (int, error) {\n\tmsg := new(Message)\n\tMutlock.Lock()\n\tWinnersx := Winners\n\tMutlock.Unlock()\n\tvar topscorer string\n\twinnerCount := len(Winnersx)\n\n\tvar TName string\n\tvar TScore int\n\n\tif winnerCount > 0 {\n\t\tsort.SliceStable(Winnersx, func(i, j int) bool { return Winnersx[i].Entries[2] > Winnersx[j].Entries[2] })\n\t\tif len(Winnersx) > 1 && Winnersx[0].Entries[2] == Winnersx[1].Entries[2] {\n\t\t\t//sort by name\n\t\t\tWinnersx2 := Winnersx[:2]\n\t\t\tsort.SliceStable(Winnersx2, func(i, j int) bool { return Winnersx2[i].Entries[2] < Winnersx2[j].Entries[2] })\n\t\t\t//TName = Winnersx2[len(Winnersx2)-1].PlayerName\n\t\t\t//TScore = Winnersx2[len(Winnersx2)-1].Entries[2]\n\t\t\tTName = Winnersx2[0].PlayerName\n\t\t\tTScore = Winnersx2[0].Entries[2]\n\t\t} else {\n\t\t\t//sort.SliceStable(Winnersx, func(i, j int) bool { return Winnersx[i].Entries[2] < Winnersx[j].Entries[2] })\n\t\t\t//TName = Winnersx[len(Winnersx)-1].PlayerName\n\t\t\t//TScore = Winnersx[len(Winnersx)-1].Entries[2]\n\t\t\tTName = Winnersx[0].PlayerName\n\t\t\tTScore = Winnersx[0].Entries[2]\n\t\t}\n\n\t\ttopscorer = TName + \"<br><strong>\" + strconv.Itoa(TScore) + \"</strong>\"\n\t\tMQ.enQ(msg.Wrap(\"AlltimescorerMQ\", topscorer))\n\t\treturn 1, nil\n\t}\n\treturn 0, errors.New(\"No winner to publish in list\")\n}", "title": "" }, { "docid": "01bb13e773f5183767d6ff6e9cf5966b", "score": "0.42681745", "text": "func SearchTeam(ctx *context.Context) {\n\tlistOptions := db.ListOptions{\n\t\tPage: ctx.FormInt(\"page\"),\n\t\tPageSize: convert.ToCorrectPageSize(ctx.FormInt(\"limit\")),\n\t}\n\n\topts := &org_model.SearchTeamOptions{\n\t\t// UserID is not set because the router already requires the doer to be an org admin. Thus, we don't need to restrict to teams that the user belongs in\n\t\tKeyword: ctx.FormTrim(\"q\"),\n\t\tOrgID: ctx.Org.Organization.ID,\n\t\tIncludeDesc: ctx.FormString(\"include_desc\") == \"\" || ctx.FormBool(\"include_desc\"),\n\t\tListOptions: listOptions,\n\t}\n\n\tteams, maxResults, err := org_model.SearchTeam(opts)\n\tif err != nil {\n\t\tlog.Error(\"SearchTeam failed: %v\", err)\n\t\tctx.JSON(http.StatusInternalServerError, map[string]any{\n\t\t\t\"ok\": false,\n\t\t\t\"error\": \"SearchTeam internal failure\",\n\t\t})\n\t\treturn\n\t}\n\n\tapiTeams, err := convert.ToTeams(ctx, teams, false)\n\tif err != nil {\n\t\tlog.Error(\"convert ToTeams failed: %v\", err)\n\t\tctx.JSON(http.StatusInternalServerError, map[string]any{\n\t\t\t\"ok\": false,\n\t\t\t\"error\": \"SearchTeam failed to get units\",\n\t\t})\n\t\treturn\n\t}\n\n\tctx.SetTotalCountHeader(maxResults)\n\tctx.JSON(http.StatusOK, map[string]any{\n\t\t\"ok\": true,\n\t\t\"data\": apiTeams,\n\t})\n}", "title": "" }, { "docid": "d623d2f2caddd324eb8576fa4d6be149", "score": "0.42565125", "text": "func NewMockMatchRequests(ctrl *gomock.Controller) *MockMatchRequests {\n\tmock := &MockMatchRequests{ctrl: ctrl}\n\tmock.recorder = &MockMatchRequestsMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "54f59710500d15516bc5833fd0e49e21", "score": "0.42468998", "text": "func (m Match) StartMatch(db *gorm.DB) {\n\n\tplayer1 := m.players[0]\n\tplayer2 := m.players[1]\n\n\tlog.Printf(\"Starting match %d (%d games) between %s and %s\", m.id, m.numGames, player1.name, player2.name)\n\n\t// init players slice\n\tplayers := []Player{\n\t\tplayer1,\n\t\tplayer2,\n\t}\n\n\tvar matchDir = filepath.FromSlash(\"tmp/\" + strconv.Itoa(m.id))\n\n\t// clone each player's repo, store in tmp loc\n\tlog.Printf(\"Cloning %s's repo: %s to %s\", player1.name, player1.client.repo, matchDir)\n\tplayer1.client.CloneRepo(matchDir + \"/\" + player1.name)\n\n\tlog.Printf(\"Cloning %s's repo: %s to %s\", player2.name, player2.client.repo, matchDir)\n\tplayer2.client.CloneRepo(matchDir + \"/\" + player2.name)\n\n\tvar matchWG sync.WaitGroup\n\tmatchWG.Add(m.numGames)\n\n\tvar matchSessions []string\n\n\t// play numGames games between each player\n\tfor i := 0; i < m.numGames; i++ {\n\t\tgo func() {\n\t\t\tg := Game{\n\t\t\t\tplayers,\n\t\t\t\t1,\n\t\t\t\t2,\n\t\t\t\tm.id,\n\t\t\t}\n\n\t\t\tcurrentSession := strconv.Itoa(getCurrentSessionID(db))\n\t\t\tmatchSessions = append(matchSessions, currentSession)\n\n\t\t\tfmt.Println(\"playing game -- match: \", strconv.Itoa(m.id), \" session: \", currentSession)\n\t\t\tg.PlayGame(currentSession)\n\n\t\t\tmatchWG.Done()\n\t\t\treturn\n\t\t}()\n\t}\n\tmatchWG.Wait()\n\n\t// query cerveau API to get gamelogs for each game in match\n\tfor _, matchSession := range matchSessions {\n\t\tgamelogFilename := getGamelogFilename(players[0].client.game, matchSession)\n\n\t\tglog := getGamelog(gamelogFilename)\n\n\t\t// once the game is finished, get the status and insert into DB\n\t\tgameStatus := getGameStatus(players[0].client.game, matchSession)\n\t\tinsertGameStatus(db, gameStatus)\n\n\t\twinner := glog.Winners[0]\n\t\tloser := glog.Losers[0]\n\t\tfmt.Println(\"Session \", matchSession, \" Summary\")\n\t\tfmt.Println(\"\\twinner: \", winner.Name)\n\t\tfmt.Println(\"\\tloser: \", loser.Name)\n\t}\n\treturn\n}", "title": "" }, { "docid": "1409c521ce1de1f95f42c29624e49e98", "score": "0.42446825", "text": "func (o URLMapPathMatcherRouteRuleMatchRuleOutput) HeaderMatches() URLMapPathMatcherRouteRuleMatchRuleHeaderMatchArrayOutput {\n\treturn o.ApplyT(func(v URLMapPathMatcherRouteRuleMatchRule) []URLMapPathMatcherRouteRuleMatchRuleHeaderMatch {\n\t\treturn v.HeaderMatches\n\t}).(URLMapPathMatcherRouteRuleMatchRuleHeaderMatchArrayOutput)\n}", "title": "" }, { "docid": "20380c4ec0c8e69f80ee86dc9be82fdb", "score": "0.4234837", "text": "func (client *Client) Match(matchID string) (*Match, error) {\n\tquery := apiURL + \"get_match?k=\" + client.key + \"&mp=\" + matchID\n\tresp, err := client.c.Get(query)\n\tif err != nil {\n\t\treturn nil, errors.New(\"osu.Client.Match: \" + err.Error())\n\t}\n\tdefer resp.Body.Close()\n\tif resp.StatusCode != 200 {\n\t\treturn nil, errors.New(\"osu.Client.Match: \" + resp.Status)\n\t}\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, errors.New(\"osu.Client.Match: \" + err.Error())\n\t}\n\terr = errorCheck(body)\n\tif err != nil {\n\t\treturn nil, errors.New(\"osu.Client.Match: \" + err.Error())\n\t}\n\tvar regx = regexp.MustCompile(`(time\"[[:space:]]*:[[:space:]]*\"[0-9]{4}-[0-9]{2}-[0-9]{2}) ([0-9]{2}:[0-9]{2}:[0-9]{2})\"`)\n\tbody = regx.ReplaceAll(body, []byte(`${1}T${2}-00:00\"`))\n\tmatch := make([]*Match, 0)\n\tfmt.Println(string(body))\n\terr = json.Unmarshal(body, &match)\n\tif err != nil {\n\t\treturn nil, errors.New(\"osu.Client.Match: No matches found\")\n\t}\n\tif len(match) == 1 {\n\t\treturn match[0], err\n\t}\n\treturn nil, errors.New(\"osu.Client.Match: No matches found\")\n}", "title": "" }, { "docid": "74f5cf04a13d9a7cada1b2c00a4d56d0", "score": "0.4227491", "text": "func (s *ListBucketQueryOutput) SetObjectMatches(v []*EcsObjectMatch) *ListBucketQueryOutput {\n\ts.ObjectMatches = v\n\treturn s\n}", "title": "" }, { "docid": "0020913476890f05a900cea47b040540", "score": "0.4223479", "text": "func (*controller) GetTopAnagramRequests(w http.ResponseWriter, r *http.Request) {\n\ttopRequests := databaseService.GetTopRequests()\n\tjson.NewEncoder(w).Encode(topRequests)\n}", "title": "" }, { "docid": "50c08cb2d9511f01fc3c810baeacd471", "score": "0.42212504", "text": "func Top10() {\n\n\tutils.CallClear()\n\tc := make(chan bool)\n\tgo utils.StartLoading(c)\n\tres, err := http.Get(constants.APIHead + constants.Top10)\n\tc <- true\n\tdefer close(c)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\ttemplates := &promptui.SelectTemplates{\n\t\tLabel: \"{{ . }}\",\n\t\tActive: \"🎾 {{. | cyan }}\",\n\t\tInactive: \"{{ . | red }}\",\n\t\tSelected: \"🎾 {{. | cyan }}\",\n\t}\n\n\tjRes := top10{}\n\tdata, _ := ioutil.ReadAll(res.Body)\n\terr = json.Unmarshal(data, &jRes)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tfinal := append(jRes.Top10, \"Exit\")\n\tprompt := promptui.Select{\n\t\tLabel: utils.FilterToColor(\"Select Player\", \"green\"),\n\t\tTemplates: templates,\n\t\tItems: final,\n\t}\n\n\tprompt.IsVimMode = true\n\n\tidx, result, err := prompt.Run()\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tresult = final[idx]\n\n\tif result == \"Exit\" {\n\t\tfmt.Println(\"Exiting...\")\n\t\tos.Exit(1)\n\t}\n\n\tutils.CallClear()\n\t// fmt.Printf(\"You choose %q\\n\", result)\n\tgo utils.StartLoading(c)\n\tparsedName := utils.ParsePlayerName(result)\n\tpo := SearchPlayer(parsedName)\n\tc <- true\n\tutils.CallClear()\n\n\tpres := po.PrintPlayer()\n\n\tfmt.Println(\"\\n\" + pres)\n\n utils.WaitForEnter()\n\n Menu()\n}", "title": "" }, { "docid": "81e4cc3c78130604ff110a1bfec4b8ff", "score": "0.42188722", "text": "func (d *Dota2) RequestPlayerHeroRecentAccomplishments(\n\tctx context.Context,\n\taccountID uint32,\n\theroID uint32,\n) (*protocol.CMsgClientToGCRequestPlayerHeroRecentAccomplishmentsResponse, error) {\n\treq := &protocol.CMsgClientToGCRequestPlayerHeroRecentAccomplishments{\n\t\tAccountId: &accountID,\n\t\tHeroId: &heroID,\n\t}\n\tresp := &protocol.CMsgClientToGCRequestPlayerHeroRecentAccomplishmentsResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCRequestPlayerHeroRecentAccomplishments),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCRequestPlayerHeroRecentAccomplishmentsResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "019a529462fcce5bcddec8a63de1a12d", "score": "0.42119992", "text": "func (d *Dota2) RequestLastHitChallengeHighScore(\n\tctx context.Context,\n\theroID uint32,\n) (*protocol.CMsgDOTALastHitChallengeHighScoreResponse, error) {\n\treq := &protocol.CMsgDOTALastHitChallengeHighScoreRequest{\n\t\tHeroId: &heroID,\n\t}\n\tresp := &protocol.CMsgDOTALastHitChallengeHighScoreResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCLastHitChallengeHighScoreRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCLastHitChallengeHighScoreResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "ff68df9b2aed3f3e7d992a0b3251e34a", "score": "0.42103338", "text": "func (r *TurnBasedMatchesService) Get(matchId string) *TurnBasedMatchesGetCall {\n\tc := &TurnBasedMatchesGetCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.matchId = matchId\n\treturn c\n}", "title": "" }, { "docid": "632463776b9cab416024521571406290", "score": "0.41808662", "text": "func (p *UnstructuredPlay) UpcomingMatch(distance int) *MatchScores {\n\tfor distance >= len(p.upcoming) {\n\t\tp.upcoming = append(p.upcoming, &MatchScores{})\n\t}\n\treturn p.upcoming[distance]\n}", "title": "" }, { "docid": "06102a6038acf08eaff6e0c02b33a222", "score": "0.4165791", "text": "func (d *Dota2) RequestPlayerStats(\n\tctx context.Context,\n\taccountID uint32,\n) (*protocol.CMsgGCToClientPlayerStatsResponse, error) {\n\treq := &protocol.CMsgClientToGCPlayerStatsRequest{\n\t\tAccountId: &accountID,\n\t}\n\tresp := &protocol.CMsgGCToClientPlayerStatsResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCPlayerStatsRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgGCToClientPlayerStatsResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "a1dafe2a5934638171824b16228a8e0c", "score": "0.4162541", "text": "func (c *MatchController) List(ctx *app.ListMatchContext) error {\n\tmatches, err := repositories.GetAllMatches(1, 100)\n\tif err != nil {\n\t\treturn ctx.InternalServerError()\n\t}\n\tresp := app.FtMatchCollection{}\n\tfor _, m := range matches {\n\t\tresp = append(resp, &app.FtMatch{\n\t\t\tAwayGoals: m.AwayPoints,\n\t\t\tHomeGoals: m.HomePoints,\n\t\t\tHomeTeam: m.HomeTeam,\n\t\t\tAwayTeam: m.AwayTeam,\n\t\t\tHomeUser: m.HomeUserID,\n\t\t\tAwayUser: m.AwayUserID,\n\t\t})\n\t}\n\treturn ctx.OK(resp)\n}", "title": "" }, { "docid": "1d5c6485d791250cde0e1ba9d67b14d7", "score": "0.41590586", "text": "func NewMatch(match models.Match) (*models.Match, error) {\n\ttx, err := models.DB.Begin()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif match.CreatedAt.IsZero() {\n\t\tmatch.CreatedAt = time.Now().UTC()\n\t}\n\tres, err := tx.Exec(\"INSERT INTO matches (match_type_id, match_mode_id, owe_type_id, venue_id, office_id, is_practice, tournament_id, created_at) VALUES (?, ?, ?, ?, ?, ?, ?, ?)\",\n\t\tmatch.MatchType.ID, match.MatchMode.ID, match.OweTypeID, match.VenueID, match.OfficeID, match.IsPractice, match.TournamentID, match.CreatedAt)\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn nil, err\n\t}\n\tmatchID, err := res.LastInsertId()\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn nil, err\n\t}\n\tstartingScore := match.Legs[0].StartingScore\n\tres, err = tx.Exec(\"INSERT INTO leg (starting_score, current_player_id, match_id, created_at) VALUES (?, ?, ?, ?) \", match.Legs[0].StartingScore, match.Players[0], matchID, match.CreatedAt)\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn nil, err\n\t}\n\tlegID, err := res.LastInsertId()\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn nil, err\n\t}\n\tif match.MatchType.ID == models.TICTACTOE {\n\t\tparams := match.Legs[0].Parameters\n\t\tparams.GenerateTicTacToeNumbers(startingScore)\n\t\t_, err = tx.Exec(\"INSERT INTO leg_parameters (leg_id, outshot_type_id, number_1, number_2, number_3, number_4, number_5, number_6, number_7, number_8, number_9) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)\",\n\t\t\tlegID, params.OutshotType.ID, params.Numbers[0], params.Numbers[1], params.Numbers[2], params.Numbers[3], params.Numbers[4], params.Numbers[5], params.Numbers[6], params.Numbers[7], params.Numbers[8])\n\t\tif err != nil {\n\t\t\ttx.Rollback()\n\t\t\treturn nil, err\n\t\t}\n\t} else if match.MatchType.ID == models.KNOCKOUT {\n\t\tparams := match.Legs[0].Parameters\n\t\t_, err = tx.Exec(\"INSERT INTO leg_parameters (leg_id, starting_lives) VALUES (?, ?)\", legID, params.StartingLives)\n\t\tif err != nil {\n\t\t\ttx.Rollback()\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\ttx.Exec(\"UPDATE matches SET current_leg_id = ? WHERE id = ?\", legID, matchID)\n\tfor idx, playerID := range match.Players {\n\t\torder := idx + 1\n\t\tres, err = tx.Exec(\"INSERT INTO player2leg (player_id, leg_id, `order`, match_id, handicap) VALUES (?, ?, ?, ?, ?)\",\n\t\t\tplayerID, legID, order, matchID, match.PlayerHandicaps[playerID])\n\t\tif err != nil {\n\t\t\ttx.Rollback()\n\t\t\treturn nil, err\n\t\t}\n\t\tif config, ok := match.BotPlayerConfig[playerID]; ok {\n\t\t\tif config.Skill.ValueOrZero() == 0 {\n\t\t\t\t_, err = GetRandomLegForPlayer(playerID, startingScore)\n\t\t\t\tif err != nil {\n\t\t\t\t\ttx.Rollback()\n\t\t\t\t\treturn nil, &models.MatchConfigError{Err: errors.New(\"no leg to use when configuring mock bot\")}\n\t\t\t\t}\n\t\t\t}\n\t\t\tplayer2LegID, err := res.LastInsertId()\n\t\t\tif err != nil {\n\t\t\t\ttx.Rollback()\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\t_, err = tx.Exec(\"INSERT INTO bot2player2leg (player2leg_id, player_id, skill_level) VALUES (?, ?, ?)\", player2LegID, config.PlayerID, config.Skill)\n\t\t\tif err != nil {\n\t\t\t\ttx.Rollback()\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\n\t}\n\ttx.Commit()\n\tlog.Printf(\"Started new match %d\", matchID)\n\treturn GetMatch(int(matchID))\n}", "title": "" }, { "docid": "c757db6ae4910decc0cb68fb9429a78a", "score": "0.41583806", "text": "func Teams(c *gin.Context) {\n\tvar (\n\t\tlimit int\n\t\tpage int\n\t\terr error\n\t)\n\tpageTmp := c.DefaultQuery(\"page\", \"\")\n\tlimitTmp := c.DefaultQuery(\"limit\", \"\")\n\tpage, limit, err = h.PageParser(pageTmp, limitTmp)\n\tif err != nil {\n\t\th.JSONR(c, badstatus, err.Error())\n\t\treturn\n\t}\n\tquery := c.DefaultQuery(\"q\", \".+\")\n\tuser, err := h.GetUser(c)\n\tif err != nil {\n\t\th.JSONR(c, badstatus, err)\n\t\treturn\n\t}\n\tvar dt *gorm.DB\n\tteams := []uic.Team{}\n\t//if user.IsAdmin() {\n\t//if user.IsAdmin() {\n\tif true {\n\t\tif limit != -1 && page != -1 {\n\t\t\tdt = db.Uic.Table(\"team\").Raw(\n\t\t\t\t\"select * from team where name regexp ? limit ?, ?\", query, page, limit).Scan(&teams)\n\t\t} else {\n\t\t\tdt = db.Uic.Table(\"team\").Where(\"name regexp ?\", query).Scan(&teams)\n\t\t}\n\t\terr = dt.Error\n\t} else {\n\t\t//team creator and team member can manage the team\n\t\tdt = db.Uic.Raw(\n\t\t\t`select a.* from team as a, rel_team_user as b \n\t\t\twhere a.name regexp ? and a.id = b.tid and b.uid = ? \n\t\t\tUNION select * from team where name regexp ? and creator = ?`,\n\t\t\tquery, user.ID, query, user.ID).Scan(&teams)\n\t\terr = dt.Error\n\t}\n\tif err != nil {\n\t\th.JSONR(c, badstatus, err)\n\t\treturn\n\t}\n\toutputs := []CTeam{}\n\tfor _, t := range teams {\n\t\tcteam := CTeam{Team: t}\n\t\tuser, err := t.Members()\n\t\tif err != nil {\n\t\t\th.JSONR(c, badstatus, err)\n\t\t\treturn\n\t\t}\n\t\tcteam.Users = user\n\t\tcreatorName, err := t.GetCreatorName()\n\t\tif err != nil {\n\t\t\tlog.Debug(err.Error())\n\t\t}\n\t\tcteam.TeamCreator = creatorName\n\t\toutputs = append(outputs, cteam)\n\t}\n\th.JSONR(c, outputs)\n\treturn\n}", "title": "" }, { "docid": "7b7a6c1ccf81a0aa2d9dc1c828be29c0", "score": "0.41452512", "text": "func (gos *Gossiper) GetMatches(keywords []string) []string {\n\treturn gos.matches.GetMatches(keywords)\n}", "title": "" }, { "docid": "6fd27fcab519665a7aafb6a65c57c5d0", "score": "0.41347682", "text": "func ResetMatch(c echo.Context) error {\n\tac := c.(*core.FoosmanContext)\n\tmatchID, err := ac.GetParamID()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tac.SetResultMux.Lock()\n\tdefer ac.SetResultMux.Unlock()\n\n\tac.DB.Transaction(func(tx *gorm.DB) error {\n\n\t\tvar results []database.MatchResult\n\t\tlog.Printf(\"Reset match %d requested\", matchID)\n\t\tif err := tx.Where(\"match_id = ?\", matchID).Find(&results).Error; err != nil {\n\t\t\tlog.Printf(\"Failed getting match results\")\n\t\t\treturn err\n\t\t}\n\n\t\tresults[0].Points = 0\n\t\tresults[0].Win = 0\n\t\tresults[0].Loss = 0\n\t\tresults[0].Draw = 0\n\n\t\tresults[1].Points = 0\n\t\tresults[1].Win = 0\n\t\tresults[1].Loss = 0\n\t\tresults[1].Draw = 0\n\n\t\tif err := tx.Save(&results[0]).Error; err != nil {\n\t\t\tlog.Printf(\"Failed saving match results\")\n\t\t\treturn err\n\t\t}\n\t\tif err := tx.Save(&results[1]).Error; err != nil {\n\t\t\tlog.Printf(\"Failed saving match results 2\")\n\t\t\treturn err\n\t\t}\n\n\t\tvar match database.Match\n\t\tif err := tx.Find(&match, matchID).Error; err != nil {\n\t\t\tlog.Printf(\"Failed finding match\")\n\t\t\treturn err\n\t\t}\n\n\t\tvar inProgressCount int\n\t\tif err := tx.Model(database.Match{}).Where(\n\t\t\t\"tournament_id = ? AND state = ?\",\n\t\t\tmatch.TournamentID,\n\t\t\tint(core.InProgress),\n\t\t).Count(&inProgressCount).Error; err != nil {\n\t\t\tlog.Printf(\"Failed counting matches in progress\")\n\t\t\treturn err\n\t\t}\n\n\t\tif inProgressCount > 0 {\n\n\t\t\tvar maxSequence []struct{ Value int }\n\t\t\tif err := tx.Raw(\n\t\t\t\t\"SELECT MAX(sequence) as value FROM matches WHERE tournament_id = ?\",\n\t\t\t\tmatch.TournamentID,\n\t\t\t).Scan(&maxSequence).Error; err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tmatch.Table = \"\"\n\t\t\tmatch.State = int(core.Scheduled)\n\t\t\tmatch.Sequence = maxSequence[0].Value + 1\n\t\t} else {\n\t\t\tmatch.State = int(core.InProgress)\n\t\t}\n\n\t\tif err := tx.Save(match).Error; err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// If tournament state == GroupPlayDone,\n\t\t// set state = GroupPlayStarted\n\t\terr := tx.Exec(\n\t\t\t`\n\t\t\tUPDATE tournaments \n\t\t\tSET state = ?\n\t\t\tWHERE state = ?\n\t\t\t AND id = ?\n\t\t\t`,\n\t\t\tint(core.GroupPlayStarted),\n\t\t\tint(core.GroupPlayDone),\n\t\t\tmatch.TournamentID,\n\t\t).Error\n\n\t\tif err != nil {\n\t\t\tlog.Printf(\"ERROR setting tournament to GroupPlayStarted\")\n\t\t}\n\n\t\t// If tournament state == Done,\n\t\t// set state = ElimPlayStarted\n\t\terr = tx.Exec(\n\t\t\t`\n\t\t\tUPDATE tournaments \n\t\t\tSET state = ?\n\t\t\tWHERE state = ?\n\t\t\t AND id = ?\n\t\t\t`,\n\t\t\tint(core.EliminationPlayStarted),\n\t\t\tint(core.Done),\n\t\t\tmatch.TournamentID,\n\t\t).Error\n\n\t\tif err != nil {\n\t\t\tlog.Printf(\"ERROR setting tournament to EliminationPlayStarted\")\n\t\t}\n\n\t\treturn nil\n\t})\n\n\treturn c.NoContent(http.StatusOK)\n}", "title": "" }, { "docid": "5b4dc92e3ee67e2ed6f8ba914e5c034c", "score": "0.41274184", "text": "func (a *App) pickBestMatchMessage(revisionNum int, authorUsername string, sentTime time.Time, topMessage string, messages []gerrit.ChangeMessageInfo) (*gerrit.ChangeMessageInfo, error) {\n\tvar matches []*gerrit.ChangeMessageInfo\n\tfor i, message := range messages {\n\t\tif message.RevisionNumber == revisionNum && message.Author.Username == authorUsername && message.Message == topMessage {\n\t\t\tmatches = append(matches, &messages[i])\n\t\t}\n\t}\n\tif len(matches) == 0 {\n\t\treturn nil, errs.New(\"no possible matches to choose from\")\n\t}\n\t// if this finds multiple matches, find the closest in time\n\tclosest := matches[0]\n\tclosestTime := gerrit.ParseTimestamp(closest.Date)\n\tfor _, message := range matches[1:] {\n\t\tmessageTime := gerrit.ParseTimestamp(message.Date)\n\t\tif timeCloserTo(sentTime, messageTime, closestTime) {\n\t\t\tclosest = message\n\t\t\tclosestTime = messageTime\n\t\t}\n\t}\n\treturn closest, nil\n}", "title": "" }, { "docid": "01aa1abdab39a0945e685c7fa47d2a61", "score": "0.41021335", "text": "func NewMatchClient(client *DotaClient) *DotaMatchClient {\n\treturn &DotaMatchClient{\n\t\tDotaClient: *client,\n\t}\n}", "title": "" }, { "docid": "5821c3c54d99574756d7280b47076474", "score": "0.40966403", "text": "func (s SoccerSim) SimWeeksMatches(w http.ResponseWriter, r *http.Request) {\n\tdecoder := json.NewDecoder(r.Body)\n\tvar simWeekRequest model.SimWeekRequest\n\terr := decoder.Decode(&simWeekRequest)\n\tutil.CheckError(err)\n\tdefer r.Body.Close()\n\tsetReturnDefaults(w)\n\tif simWeekRequest.Action == \"simWeek\" {\n\t\tlog.Infof(\"Sim weeks matches request for: %s/%d\", simWeekRequest.SeasonName, simWeekRequest.Week)\n\t\ts.MatchService.SimMatchWeek(simWeekRequest.SeasonName, simWeekRequest.Week)\n\t} else {\n\t\tlog.Warningf(\"Received unknown action for /matches: %s\", simWeekRequest.Action)\n\t\tresponse := fmt.Sprintf(\"Action: %s unknown\\n\", simWeekRequest.Action)\n\t\thttp.Error(w, response, http.StatusNotAcceptable)\n\t}\n}", "title": "" }, { "docid": "ff28572a9350b917129d9b5b8c5a5394", "score": "0.40955797", "text": "func (store mongoDatastore) TeamEventStats(tag EventTag, number int) (TeamStats, error) {\n\tvar stats TeamStats\n\n\tvar team Team\n\tif err := store.fetchOne(teamCollection, bson.M{\"_id\": number}, &team); err == nil {\n\t\tstats.OPR = team.OPR\n\t}\n\n\titer := store.C(matchCollection(tag)).Find(bson.M{\"teams.team\": number}).Limit(matchLimit).Iter()\n\n\tvar match Match\n\tstats.EventTag = tag\n\tfor iter.Next(&match) {\n\t\tvar i int\n\t\tfor i = 0; i < len(match.Teams); i++ {\n\t\t\tif match.Teams[i].Team == number {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif i >= len(match.Teams) {\n\t\t\t// Team not found in match. This shouldn't be hit.\n\t\t\t// TODO: Log problem\n\t\t\tcontinue\n\t\t}\n\n\t\tif match.Teams[i].NoShow {\n\t\t\tstats.NoShowCount++\n\t\t\tcontinue\n\t\t}\n\n\t\tif match.Score == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tstats.MatchCount++\n\t\tstats.TotalPoints += match.Teams[i].Score\n\t\tif match.Teams[i].Failure {\n\t\t\tstats.FailureCount++\n\t\t}\n\t\tif shot := stats.TeleoperatedBalls.Total(); shot > stats.MaxTeleoperatedShot {\n\t\t\tstats.MaxTeleoperatedShot = shot\n\t\t}\n\t\tif scored := stats.TeleoperatedBalls.TotalScored(); scored > stats.MaxTeleoperatedScored {\n\t\t\tstats.MaxTeleoperatedScored = scored\n\t\t}\n\t\tstats.AutonomousBalls.Add(match.Teams[i].Autonomous)\n\t\tstats.TeleoperatedBalls.Add(match.Teams[i].Teleoperated)\n\t\tstats.CoopBridge.add(match.Teams[i].CoopBridge)\n\t\tstats.TeamBridge1.add(match.Teams[i].TeamBridge1)\n\t\tstats.TeamBridge2.add(match.Teams[i].TeamBridge2)\n\t}\n\treturn stats, iter.Err()\n}", "title": "" }, { "docid": "2bb8ef802c16961e41ece998493128c4", "score": "0.40860805", "text": "func CandidateTeams(w http.ResponseWriter, r *http.Request, u *mdl.User) error {\n\tif r.Method != \"GET\" {\n\t\treturn &helpers.BadRequest{Err: errors.New(helpers.ErrorCodeNotSupported)}\n\t}\n\n\tc := appengine.NewContext(r)\n\tdesc := \"Tournament Candidate Teams handler:\"\n\textract := extract.NewContext(c, desc, r)\n\n\tvar tournament *mdl.Tournament\n\tvar err error\n\ttournament, err = extract.Tournament()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// query teams\n\tvar teams []*mdl.Team\n\tfor _, teamID := range u.TeamIds {\n\t\tif team, err1 := mdl.TeamByID(c, teamID); err1 == nil {\n\t\t\tfor _, aID := range team.AdminIds {\n\t\t\t\tif aID == u.Id {\n\t\t\t\t\tteams = append(teams, team)\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tlog.Errorf(c, \"%v\", err1)\n\t\t}\n\t}\n\n\ttype canditateType struct {\n\t\tTeam mdl.TeamJSON\n\t\tJoined bool\n\t}\n\n\tfieldsToKeep := []string{\"Id\", \"Name\"}\n\tcandidatesData := make([]canditateType, len(teams))\n\n\tfor counterCandidate, team := range teams {\n\t\tvar tJSON mdl.TeamJSON\n\t\thelpers.InitPointerStructure(team, &tJSON, fieldsToKeep)\n\t\tvar canditate canditateType\n\t\tcanditate.Team = tJSON\n\t\tcanditate.Joined = tournament.TeamJoined(c, team)\n\t\tcandidatesData[counterCandidate] = canditate\n\t}\n\n\t// we should not directly return an array. so we add an extra layer.\n\tdata := struct {\n\t\tCandidates []canditateType `json:\",omitempty\"`\n\t}{\n\t\tcandidatesData,\n\t}\n\treturn templateshlp.RenderJSON(w, c, data)\n}", "title": "" }, { "docid": "439be645bc122832d4d1764c7b3369af", "score": "0.40693298", "text": "func getUsersTop(w http.ResponseWriter, r *http.Request) {\n\treq := GetUsersTopRequest{\n\t\tCount: 6,\n\t}\n\tif err := decodeRequestQuery(r, &req); err != nil {\n\t\trenderJSON(w, http.StatusBadRequest, Error{err.Error()})\n\t\treturn\n\t}\n\tusers, err := GetUsersTop(req.Count)\n\tif err != nil {\n\t\trenderJSON(w, http.StatusNotFound, Error{err.Error()})\n\t\treturn\n\t}\n\trenderJSON(w, http.StatusOK, users)\n}", "title": "" }, { "docid": "5cd45e44c63c5b4dcdf5f4e8aded75ce", "score": "0.40681872", "text": "func NewGetTeamsFromTestOK() *GetTeamsFromTestOK {\n\n\treturn &GetTeamsFromTestOK{}\n}", "title": "" }, { "docid": "c561e51be3732ff784c14cd360a8db5e", "score": "0.40664816", "text": "func (d *Artifact) StartLobbyPrivateMatch(\n\tctx context.Context,\n\tprivateLobbyID uint64,\n) (*protocol.CMsgClientToGCPrivateLobbyStartMatchResponse, error) {\n\treq := &protocol.CMsgClientToGCPrivateLobbyStartMatch{\n\t\tPrivateLobbyId: &privateLobbyID,\n\t}\n\tresp := &protocol.CMsgClientToGCPrivateLobbyStartMatchResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EGCDCGClientMessages_k_EMsgClientToGCPrivateLobbyStartMatch),\n\t\treq,\n\t\tuint32(protocol.EGCDCGClientMessages_k_EMsgClientToGCPrivateLobbyStartMatchResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "a25a4ec1928ba36bcd2b4c6dbf007fe1", "score": "0.4055133", "text": "func (s SoccerSim) GetWeeksMatches(w http.ResponseWriter, r *http.Request) {\n\tseasonName, err := util.ParseURL(\"season_name\", r.URL.RequestURI())\n\tutil.CheckError(err)\n\tweek, err := util.ParseURL(\"week\", r.URL.RequestURI())\n\tutil.CheckError(err)\n\tweekInt, err := strconv.Atoi(week)\n\tutil.CheckError(err)\n\tlog.Infof(\"Get weeks matches request for: %s Week: %d\\n\", seasonName, weekInt)\n\tmatches := s.MatchService.GetWeeksMatches(seasonName, weekInt)\n\tsetReturnDefaults(w)\n\tjson.NewEncoder(w).Encode(matches)\n}", "title": "" }, { "docid": "e4f914ace104cb4899afdd72055f919a", "score": "0.405186", "text": "func (a Accepts) BestMatch(offers []*mtrest.MediaType) (m *mtrest.MediaType) {\n\tvar best *fitness.Score\n\tfor _, accept := range a {\n\t\tscore := fitness.BestMatch(accept, offers)\n\t\tif score != nil && score.Cmp(best) > 0 {\n\t\t\tbest = score\n\t\t}\n\t}\n\tif best != nil {\n\t\tm = offers[best.Index]\n\t}\n\treturn\n}", "title": "" }, { "docid": "3533c294c8337072c6f51605de8c6c0e", "score": "0.40409127", "text": "func (c *StatsController) GetPlayerMatchStats(w http.ResponseWriter, r *http.Request) {\n\n\tvars := mux.Vars(r)\n\n\tplayer := vars[\"playerID\"]\n\tmatch := vars[\"matchID\"]\n\n\tplayerID, err := strconv.Atoi(player)\n\n\tif err != nil {\n\t\tc.SendJSON(w, core.ErrorMessage{\n\t\t\tError: fmt.Sprintf(\"PlayerID %s invalid\", player),\n\t\t}, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tmatchID, err := strconv.Atoi(match)\n\tif err != nil {\n\t\tc.SendJSON(w, core.ErrorMessage{\n\t\t\tError: fmt.Sprintf(\"MatchID %s invalid\", match),\n\t\t}, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tstats, err := stats.GetPlayerActions(uint(playerID), uint(matchID), c.datasource)\n\n\tif err != nil {\n\t\tc.SendJSON(w, core.ErrorMessage{\n\t\t\tError: fmt.Sprintf(\"Error fetching stats: %s\", err),\n\t\t}, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tc.SendJSON(w, stats, http.StatusOK)\n}", "title": "" }, { "docid": "d9ffb7f410f9cf0b81cfb41a03b2c258", "score": "0.40398872", "text": "func (c App) RecentGames(name string) revel.Result {\n\tsummonerID, err := model.GetSummonerID(name)\n\tif err != nil {\n\t\treturn util.HandleError(*c.Controller, err)\n\t}\n\trecentGames, err := model.GetRecentGames(summonerID)\n\tif err != nil {\n\t\treturn util.HandleError(*c.Controller, err)\n\t}\n\tvar games []model.RecentGame\n\tfor _, recentGame := range recentGames {\n\t\ttranslatedGame := translateRecentGame(recentGame, summonerID, name)\n\t\tif translatedGame.ID != 0 {\n\t\t\tgames = append(games, translatedGame)\n\t\t}\n\t}\n\tresponse := new(model.Response)\n\tresponse.Results = games\n\treturn c.RenderJson(response)\n}", "title": "" }, { "docid": "9091726b6258558da79243c2c4667e4f", "score": "0.4037961", "text": "func (r *TurnBasedMatchesService) List() *TurnBasedMatchesListCall {\n\tc := &TurnBasedMatchesListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\treturn c\n}", "title": "" }, { "docid": "c1ea5e96e5846c2293d4222c35ba38be", "score": "0.40362856", "text": "func (a *App) GetTeamPlayers(w http.ResponseWriter, r *http.Request) {\n\thandlers.GetTeamPlayers(a.DB, w, r)\n}", "title": "" }, { "docid": "2c82155a5f8af9554460d309902f017a", "score": "0.40312597", "text": "func GetSummonerMatchesSimple(id int64, cache chan Request) (MatchHistory, error) {\n\tvalue, getErr := goGet(Request{Type: \"games\", Key: fmt.Sprintf(\"%d\", id)}, cache)\n\tif getErr != nil {\n\t\treturn MatchHistory{}, CacheError{message: \"Failed to retrieve games.\"}\n\t}\n\tlmh, _ := value.(MatchHistory)\n\treturn lmh, nil\n}", "title": "" }, { "docid": "ec987d20ca198bba13f68d93e14c46e2", "score": "0.40298107", "text": "func (c *TurnBasedMatchesListCall) IncludeMatchData(includeMatchData bool) *TurnBasedMatchesListCall {\n\tc.urlParams_.Set(\"includeMatchData\", fmt.Sprint(includeMatchData))\n\treturn c\n}", "title": "" }, { "docid": "f49b44ec90de83c29c61895f7422da97", "score": "0.40251115", "text": "func ExampleClient_ListXssMatchSetsRequest_shared00() {\n\tcfg, err := external.LoadDefaultAWSConfig()\n\tif err != nil {\n\t\tpanic(\"failed to load config, \" + err.Error())\n\t}\n\n\tsvc := wafregional.New(cfg)\n\tinput := &wafregional.ListXssMatchSetsInput{\n\t\tLimit: aws.Int64(100),\n\t}\n\n\treq := svc.ListXssMatchSetsRequest(input)\n\tresult, err := req.Send(context.Background())\n\tif err != nil {\n\t\tif aerr, ok := err.(awserr.Error); ok {\n\t\t\tswitch aerr.Code() {\n\t\t\tcase wafregional.ErrCodeWAFInternalErrorException:\n\t\t\t\tfmt.Println(wafregional.ErrCodeWAFInternalErrorException, aerr.Error())\n\t\t\tcase wafregional.ErrCodeWAFInvalidAccountException:\n\t\t\t\tfmt.Println(wafregional.ErrCodeWAFInvalidAccountException, aerr.Error())\n\t\t\tdefault:\n\t\t\t\tfmt.Println(aerr.Error())\n\t\t\t}\n\t\t} else {\n\t\t\t// Print the error, cast err to awserr.Error to get the Code and\n\t\t\t// Message from an error.\n\t\t\tfmt.Println(err.Error())\n\t\t}\n\t\treturn\n\t}\n\n\tfmt.Println(result)\n}", "title": "" }, { "docid": "6ea2120fe7ada066eead30db30c6f7c5", "score": "0.40183103", "text": "func (o *GetLolLobbyV2LobbyMatchmakingSearchStateParams) WithHTTPClient(client *http.Client) *GetLolLobbyV2LobbyMatchmakingSearchStateParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "title": "" }, { "docid": "1c78337ac3994343d6581e070f1fd8e1", "score": "0.4016117", "text": "func MatchTopping(label labels.Selector, field fields.Selector) storage.SelectionPredicate {\n\treturn storage.SelectionPredicate{\n\t\tLabel: label,\n\t\tField: field,\n\t\tGetAttrs: GetAttrs,\n\t}\n}", "title": "" }, { "docid": "9b3184abb353660345702f3822eac9d0", "score": "0.40157878", "text": "func (g *Game) CalcMatchQuality(teams []Team) (result float64, err error) {\n\tif len(teams) > 2 {\n\t\terr = errors.New(\"CalcMatchQuality does not support more than 2 teams yet.\")\n\t\treturn\n\t}\n\n\tnPlayers := float64(teams[0].Size() + teams[1].Size())\n\n\tt1Mean := teams[0].GetMu()\n\tt1Var := teams[0].GetVar()\n\tt2Mean := teams[1].GetMu()\n\tt2Var := teams[1].GetVar()\n\n\tsqrt := math.Sqrt(\n\t\t(nPlayers * g.beta * g.beta) /\n\t\t\t(nPlayers*g.beta*g.beta + t1Var + t2Var))\n\n\texp := math.Exp(\n\t\t-1 * (t1Mean - t2Mean) * (t1Mean - t2Mean) /\n\t\t\t(2 * (nPlayers*g.beta*g.beta + t1Var + t2Var)))\n\n\tresult = sqrt * exp\n\treturn\n}", "title": "" }, { "docid": "a242675e812a4f3f21ddbc44a58157ed", "score": "0.4005712", "text": "func (c *TurnBasedMatchesGetCall) IncludeMatchData(includeMatchData bool) *TurnBasedMatchesGetCall {\n\tc.urlParams_.Set(\"includeMatchData\", fmt.Sprint(includeMatchData))\n\treturn c\n}", "title": "" }, { "docid": "d4b8a0b6d9824e5b0d48c153b2a72e88", "score": "0.39968097", "text": "func (db *BoltDB) ActiveMatches() ([]*dexdb.MetaMatch, error) {\n\treturn db.filteredMatches(\n\t\tfunc(mBkt *bbolt.Bucket) bool {\n\t\t\treturn true // all matches in the bucket\n\t\t},\n\t\ttrue, // don't bother with cancel matches that are never active\n\t\tfalse, // exclude archived matches\n\t)\n}", "title": "" }, { "docid": "7cd41c67a4202232d230522a43e240b3", "score": "0.39941564", "text": "func GetMatchesCount() (int, error) {\n\tvar count int\n\terr := models.DB.QueryRow(`SELECT count(m.id) FROM matches m WHERE m.created_at <= NOW()`).Scan(&count)\n\tif err != nil {\n\t\treturn -1, err\n\t}\n\treturn count, nil\n}", "title": "" }, { "docid": "68a20480b2c6e4cbeef84bd767d724ca", "score": "0.39927158", "text": "func AddMatchups(w http.ResponseWriter, r *http.Request) {\n\n\tvars := mux.Vars(r)\n\n\t//----------------------------------------------------------------------------\t\t\n\t// Retrieve the id and child ids\n\t//----------------------------------------------------------------------------\t\t\n\tgameId,_ := strconv.ParseUint( vars[\"parentId\"], 10, 64)\n\tmatchupsIds,_ := vars[\"matchupsIds\"]\n\n\t//----------------------------------------------------------------------------\t\t\n\t// Delegate to the Tournament DAO\n\t//----------------------------------------------------------------------------\t\t\n\trequestResult := TournamentDAO.AddMatchups(gameId, matchupsIds)\n\n\t//----------------------------------------------------------------------------\n\t// Marshal the model into a JSON object\n\t//----------------------------------------------------------------------------\n\tres, _ := json.Marshal(requestResult)\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(res)\n}", "title": "" }, { "docid": "7ed7a592d378d3eba252e0c3d1471ef6", "score": "0.39921224", "text": "func (s *searcher) TopMEUs(limit int, minMatch float64, name string) []*Result[csl.MEU] {\n\ts.RLock()\n\tdefer s.RUnlock()\n\n\ts.Gate.Start()\n\tdefer s.Gate.Done()\n\n\treturn topResults[csl.MEU](limit, minMatch, name, s.MilitaryEndUsers)\n}", "title": "" }, { "docid": "c8555d69ddc5b3ae8c3f2e7851b19fb5", "score": "0.39916322", "text": "func (s *MyFPLScraper) GetTeamInfoForParticipant(playerMap map[int64]string, gameweek int, topLeagueParticipants *[]int64) (map[string]int, error) {\n\n\tplayerOccuranceForGameweek := make(map[string]int)\n\tfor _, participant := range *topLeagueParticipants {\n\t\tteamURL := fmt.Sprintf(teamURL, participant, gameweek)\n\n\t\tresponse, err := s.MakeRequest(teamURL)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tParticipantTeamInfo := new(ParticipantTeamInfo)\n\t\terr = json.Unmarshal(response, &ParticipantTeamInfo)\n\t\tif err != nil {\n\t\t\t//return nil, errors.Errorf(\"error unmarshalling response URL %v for GetTeamInfoForParticipant: %v\", teamURL, err)\n\t\t\tbreak\n\t\t}\n\n\t\tfor _, player := range ParticipantTeamInfo.TeamPlayers {\n\t\t\tplayerOccuranceForGameweek[playerMap[player.Element]]++\n\t\t}\n\t}\n\n\treturn playerOccuranceForGameweek, nil\n}", "title": "" }, { "docid": "3d8edc3339f90f9b374f51f6daf214e0", "score": "0.39895064", "text": "func (s *CollectiveGameStats) FilterToGamesWithAtLeast(n int, players []*Player) {\n if s.games == nil {\n return\n }\n filteredGames := make(map[string]map[int64]*riot.GameDto)\n\n playerSet := make(map[int64]struct{})\n for _, player := range players {\n playerSet[player.RiotId] = struct{}{}\n }\n\n for gameId, playerMap := range s.games {\n for riotSummonerId, gameDto := range playerMap {\n if gameDto == nil {\n // Skip stubs\n continue\n }\n // Counts of the number of players matching on each team.\n counts := make(map[int]int)\n matches := false\n\n // Check the current player.\n if _, exists := playerSet[riotSummonerId]; exists {\n counts[gameDto.TeamId]++\n }\n\n // Check each fellow player.\n for _, playerDto := range gameDto.FellowPlayers {\n if _, exists := playerSet[playerDto.SummonerId]; exists {\n counts[playerDto.TeamId]++\n if counts[playerDto.TeamId] >= n {\n matches = true\n break\n }\n }\n }\n if matches {\n filteredGames[gameId] = playerMap\n break\n }\n }\n }\n s.games = filteredGames\n}", "title": "" }, { "docid": "0a6db6240ef75e483cdfd47bac849350", "score": "0.39877927", "text": "func NewGetLolLobbyTeamBuilderV1MatchmakingParams() *GetLolLobbyTeamBuilderV1MatchmakingParams {\n\n\treturn &GetLolLobbyTeamBuilderV1MatchmakingParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "4e1bbaf61acb58f7241cfdf8f067beee", "score": "0.39866847", "text": "func (d *Dota2) RequestGetPlayerCardRoster(\n\tctx context.Context,\n\tleagueID uint32,\n\ttimestamp uint32,\n) (*protocol.CMsgClientToGCGetPlayerCardRosterResponse, error) {\n\treq := &protocol.CMsgClientToGCGetPlayerCardRosterRequest{\n\t\tLeagueId: &leagueID,\n\t\tTimestamp: &timestamp,\n\t}\n\tresp := &protocol.CMsgClientToGCGetPlayerCardRosterResponse{}\n\n\treturn resp, d.MakeRequest(\n\t\tctx,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCGetPlayerCardRosterRequest),\n\t\treq,\n\t\tuint32(protocol.EDOTAGCMsg_k_EMsgClientToGCGetPlayerCardRosterResponse),\n\t\tresp,\n\t)\n}", "title": "" }, { "docid": "a19a96526f46747c266167dce89531d4", "score": "0.3978598", "text": "func getMatches(ctx aero.Context) ([]*arn.MyAnimeListMatch, error) {\n\tuser := arn.GetUserFromContext(ctx)\n\n\tif user == nil {\n\t\treturn nil, errors.New(\"Not logged in\")\n\t}\n\n\tmalAnimeList, err := mal.GetAnimeList(user.Accounts.MyAnimeList.Nick)\n\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Couldn't load your anime list from MyAnimeList: %s\", err.Error())\n\t}\n\n\tmatches := findAllMatches(malAnimeList)\n\n\treturn matches, nil\n}", "title": "" }, { "docid": "d2b38191a43bf687226561c134acd713", "score": "0.39652538", "text": "func (a *App) GetTournamentTeams(w http.ResponseWriter, r *http.Request) {\n\thandlers.GetTournamentTeams(a.DB, w, r)\n}", "title": "" }, { "docid": "9d5eec6f832fb83c7a2b4c4bef640aa7", "score": "0.3964992", "text": "func SeasonTopScorer(ID int, include string) ([]byte, error) {\n\treturn Get(fmt.Sprintf(\"topscorers/season/%v\", ID), include, FirstOrAllPages, SinglePage)\n}", "title": "" }, { "docid": "31088ebc4b29460548b47df2e1bdeaaf", "score": "0.39521292", "text": "func (o *GetLolLobbyTeamBuilderV1MatchmakingParams) WithTimeout(timeout time.Duration) *GetLolLobbyTeamBuilderV1MatchmakingParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "da75cd5283982667c3b133c2ae4ca7e1", "score": "0.3949185", "text": "func NetworkservicesBetaTlsRouteRulesMatchesToProto(o *beta.TlsRouteRulesMatches) *betapb.NetworkservicesBetaTlsRouteRulesMatches {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.NetworkservicesBetaTlsRouteRulesMatches{}\n\tsSniHost := make([]string, len(o.SniHost))\n\tfor i, r := range o.SniHost {\n\t\tsSniHost[i] = r\n\t}\n\tp.SetSniHost(sSniHost)\n\tsAlpn := make([]string, len(o.Alpn))\n\tfor i, r := range o.Alpn {\n\t\tsAlpn[i] = r\n\t}\n\tp.SetAlpn(sAlpn)\n\treturn p\n}", "title": "" }, { "docid": "9aaf4b35068021d27280a40b5dd39440", "score": "0.39487052", "text": "func (c *Client) GetMatchupsForWeekRange(leagueKey string, startWeek, endWeek int) (map[int][]Matchup, error) {\n\tleagueList := strconv.Itoa(startWeek)\n\tfor i := startWeek + 1; i <= endWeek; i++ {\n\t\tleagueList += \",\" + strconv.Itoa(i)\n\t}\n\tcontent, err := c.GetFantasyContent(\n\t\tfmt.Sprintf(\"%s/league/%s/scoreboard;week=%s\",\n\t\t\tYahooBaseURL,\n\t\t\tleagueKey,\n\t\t\tleagueList))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tall := make(map[int][]Matchup)\n\tfor _, matchup := range content.League.Scoreboard.Matchups {\n\t\tweek := matchup.Week\n\t\tlist, ok := all[week]\n\t\tif !ok {\n\t\t\tlist = make([]Matchup, 0)\n\t\t}\n\t\tall[week] = append(list, matchup)\n\t}\n\treturn all, nil\n}", "title": "" } ]
67630c324dbf162ad6146e9a745dda1c
Console console log for debug
[ { "docid": "1e8256bbc0e714cefc71d6bd83e4d341", "score": "0.0", "text": "func Console() *zap.Logger {\n\tcore := NewConsoleDebug()\n\t// From a zapcore.Core, it's easy to construct a Logger.\n\treturn zap.New(core)\n}", "title": "" } ]
[ { "docid": "8d1aa314ded8f713615e9e833cde9c7a", "score": "0.74089044", "text": "func Debug(args ...any) { std.log(DebugLevel, args) }", "title": "" }, { "docid": "67e3c43a282ead99870324932dea1171", "score": "0.71666276", "text": "func Debug() {\n\tlog.SetOutput(os.Stderr)\n}", "title": "" }, { "docid": "3936dbeb5b71288d062d74f87f6f0cb8", "score": "0.70911133", "text": "func Debug(ctx context.Context, arg any) { doLog(ctx, SeverityDebug, arg) }", "title": "" }, { "docid": "15d0516224b42cb66675277a69348955", "score": "0.70299953", "text": "func Debug(msg string) {\n\tcfg := config.LoadSetupSpecsConfig()\n\tif cfg.Verbose {\n\t\tf := getLogFile()\n\t\tdefer f.Close()\n\n\t\tlog.SetOutput(f)\n\t\tlog.Println(msg)\n\t}\n}", "title": "" }, { "docid": "eff1e178306bba4478a20b2ff987ee9d", "score": "0.69556445", "text": "func Debug() {\n\tlogger = log.New(os.Stdout, \"[readability] \", log.LstdFlags)\n}", "title": "" }, { "docid": "24b435af77feaefd940e4bfb4fc4d4c7", "score": "0.6938142", "text": "func (v *Vox) Debug(args ...interface{}) {\n\tv.Println(fmt.Sprint(args...))\n}", "title": "" }, { "docid": "54b33889a431f716b5e4e2f9ab3ac8ce", "score": "0.6877243", "text": "func Debug(msg ...interface{}) {\n\tfmt.Fprintln(os.Stderr, msg...)\n}", "title": "" }, { "docid": "598866bd3cc522fe43ee490f00eae0d3", "score": "0.68486255", "text": "func Debug(v ...interface{}) {\n\tmyLog.Printf(\"[DEBUG] %v\", v...)\n}", "title": "" }, { "docid": "a33bd49697d4ee4e0faaf26154d09429", "score": "0.68332356", "text": "func (c *Console) Debug(msg string) {\n\tc.log(DebugLevel, msg)\n}", "title": "" }, { "docid": "6324758c397206a548794a33c787d2f1", "score": "0.6800218", "text": "func (event *Event) Debug(args ...interface{}) {\n\tevent.Log(debugLevel, args...)\n}", "title": "" }, { "docid": "c3b338ce409aa4f09bbc57355fba6069", "score": "0.67871654", "text": "func LogDebug(msg string) {\n\tfmt.Println(\"Debug:\" + msg)\n}", "title": "" }, { "docid": "249c13209e685c073bf610b6d4a3f296", "score": "0.6777729", "text": "func (l *BuiltinLogger) Debug(args ...interface{}) {\n\tl.logger.Println(args...)\n}", "title": "" }, { "docid": "a244c5047820782aa2c72bd3e4aa4a4f", "score": "0.6774502", "text": "func Debug(msg string) {\n\tlogMe(msg, debug, false)\n}", "title": "" }, { "docid": "3abf4b40bb007eea28289f69e9d68b9f", "score": "0.676608", "text": "func debugLog(v ...interface{}) {\n\tfmt.Println(v...)\n}", "title": "" }, { "docid": "2572a0661ff56db7bd69891de31c233f", "score": "0.6758916", "text": "func Debug(args ...interface{}) {\n\tlog.Debug(args...)\n}", "title": "" }, { "docid": "2572a0661ff56db7bd69891de31c233f", "score": "0.6758916", "text": "func Debug(args ...interface{}) {\n\tlog.Debug(args...)\n}", "title": "" }, { "docid": "500522e7b4f3f76ef34447f6b8af7ccd", "score": "0.6758586", "text": "func myLog(msg ...interface{}) {\n\tif conf.DEBUG {\n\t\tlog.Print(msg)\n\t}\n}", "title": "" }, { "docid": "2cdad57d25f8a778f42e82bb6bc112e9", "score": "0.6757048", "text": "func (l *DefaultLogger) Debug(message string) {\n\tprintln(\"DEB | \" + message)\n}", "title": "" }, { "docid": "52ff00616d595de1d5d7e5bcb1696f3b", "score": "0.67536914", "text": "func Debug(msg string) {\n\tif AppConfig.Settings.Debug == true {\n\t\tt := time.Now()\n\t\tfmt.Printf(\"DEBUG [%s]: %s\\n\", t.Format(time.RFC1123), msg)\n\t\tWriteToLog(msg)\n\t}\n}", "title": "" }, { "docid": "a336984be3ce05bef6a1ca6f2ed0b720", "score": "0.67375755", "text": "func logDebug(text string) {\n\tif isDebug {\n\t\tlog.Println(text)\n\t}\n}", "title": "" }, { "docid": "d038192a36e0d29819e375fcbca84b30", "score": "0.6727546", "text": "func (b *bot) debug(s string, a ...interface{}) {\n\tif b.config.Debug {\n\t\tb.log(s, a...)\n\t}\n}", "title": "" }, { "docid": "cf1db157bd17c311e46d5783e5208097", "score": "0.672561", "text": "func Debug(args ...interface{}) {\n\tlogger.Log(mlog.DebugLevel, args...)\n}", "title": "" }, { "docid": "4ba70b18e4eb3f613d930be8a97b66f6", "score": "0.67210895", "text": "func Debug(msg string) {\n\tif debug {\n\t\tLogger.Printf(msg)\n\t}\n}", "title": "" }, { "docid": "e92a782c0a1697cdc992e5479bd28d3c", "score": "0.6710133", "text": "func Debug(event string, ctx Context) { fire(LevelDebug, event, ctx) }", "title": "" }, { "docid": "f498c9ec80d9faf5634762627ae3e0b5", "score": "0.67083174", "text": "func debugln(t string) {\n\tif debug {\n\t\tlog.Println(t)\n\t}\n}", "title": "" }, { "docid": "255ac6c2c0f8c2b7ef841664983e9a3c", "score": "0.6701536", "text": "func (sl noOpLogger) Debug(msg string, attributes ...Attribute) {}", "title": "" }, { "docid": "c303c530ad77c16e1252e2458defa178", "score": "0.6695232", "text": "func Debug(v ...interface{}) {\n\tconsole.Debug(v...)\n}", "title": "" }, { "docid": "e8cca998ee1ccc8ec1d51c659edd937f", "score": "0.6687529", "text": "func Debug(args ...interface{}) {\n _PriLogger.Debug(args...)\n}", "title": "" }, { "docid": "ccf7f9e9ce9290dd00067ded793c0c93", "score": "0.66865045", "text": "func (l *Logger) Debug(_ ...interface{}) {}", "title": "" }, { "docid": "d6a60cfb26310d534e67547f630e6559", "score": "0.66858995", "text": "func (l *Logger) Debug(v ...interface{}) {}", "title": "" }, { "docid": "d6a60cfb26310d534e67547f630e6559", "score": "0.66858995", "text": "func (l *Logger) Debug(v ...interface{}) {}", "title": "" }, { "docid": "5bda5e02c7c904504680389f21aff738", "score": "0.6665924", "text": "func Debug(args ...interface{}) {\n\tstd.Debug(args...)\n}", "title": "" }, { "docid": "53d65b66c8b1aba9ded24557559298d0", "score": "0.66638297", "text": "func ConsoleDebug(s string) {\n\tprintConsole(DEBUG, s)\n}", "title": "" }, { "docid": "01010cce4ee38ec380ca8c868ca7e651", "score": "0.6663761", "text": "func (ct *ConnectivityTest) Debug(a ...interface{}) {\n\tif ct.debug() {\n\t\tfmt.Fprint(ct.params.Writer, debug+\" \")\n\t\tct.Log(a...)\n\t}\n}", "title": "" }, { "docid": "10e131388d6e77ee771e9a95b9d409c8", "score": "0.66620094", "text": "func Debug(msg string) {\n\tstdLog.Debug(msg, nil)\n}", "title": "" }, { "docid": "a915d7535d558e79240ff3596bf99876", "score": "0.66480404", "text": "func Debug(msg string) {\n\tLog.Debug(msg)\n}", "title": "" }, { "docid": "5dd24f162ad2a1866651b1c0a436fdad", "score": "0.6636486", "text": "func Debug(args ...interface{}) { v.Debug(args...) }", "title": "" }, { "docid": "b876fb1cba493659d32893f32f4a43ff", "score": "0.6633154", "text": "func Debug(a ...interface{}) {\n\tif debugMode {\n\t\twrite(xterm256.White, \"debug\", fmt.Sprint(a...))\n\t}\n}", "title": "" }, { "docid": "f6391b2b06597e14804f8ef1b801cb36", "score": "0.6631541", "text": "func (l ZapLogger) Debug(args ...interface{}) {\n\tl._log.Debug(fmt.Sprint(args...))\n}", "title": "" }, { "docid": "c503513130baa7d0dc471f811372f931", "score": "0.66299754", "text": "func (z *Dummy) Debug(args ...interface{}) {}", "title": "" }, { "docid": "510dab41737ec25adf6b95f2c3091ff6", "score": "0.66265965", "text": "func debugPrint(s string) {\n\tif !writeBenchConfig.debug {\n\t\treturn\n\t}\n\tfmt.Print(\"DEBUG: \" + s)\n}", "title": "" }, { "docid": "40f01240a9186d88dcfbfd6a1110d804", "score": "0.66248465", "text": "func (l *Logger) Debug(msg ...interface{}) {\n\tif l.IsDebug {\n\t\tlogger, buf := createNew()\n\n\t\tmsglog := fmt.Sprintf(\"DEBUG: %s\", msg)\n\t\tlogger.Print(msglog)\n\t\tfmt.Println(buf)\n\t}\n}", "title": "" }, { "docid": "2b91c85cede05ffe1c0b7f3c47a3e0f4", "score": "0.662048", "text": "func debugPrint(i ...interface{}) {\n\tif DebugMode {\n\t\tfmt.Println(i...)\n\t}\n}", "title": "" }, { "docid": "822e22294ac3ad133d8a31dfe8cd02d8", "score": "0.66093266", "text": "func Debug(msg string) {\n\tif debug {\n\t\twrite(\"DEBUG\", msg)\n\t}\n}", "title": "" }, { "docid": "1e511a7ca4e9ed746a277a0f817050bb", "score": "0.65978855", "text": "func Debug(s string) {\n\tfmt.Printf(\"DEBUG: %s\\n\", s)\n}", "title": "" }, { "docid": "c082e47d457faead6a96563fb12fa63f", "score": "0.6593722", "text": "func Debug(msg interface{}) {\n\tif _debug {\n\t\tLog(fmt.Sprintf(\"DEBUG: %s\", msg))\n\t}\n}", "title": "" }, { "docid": "552192375ed47b65673c2e482afd073a", "score": "0.6593192", "text": "func Debug(a ...interface{}) {\n\tif config.LoggingLevel >= 4 {\n\t\tOutput(\"DEBUG \", 3, fmt.Sprintln(a...))\n\t}\n}", "title": "" }, { "docid": "dac9c5360a2eda6dfdf6e295a794490b", "score": "0.659103", "text": "func Debug(args ...interface{}) {\n\tl.Print(logger.DEBUG, args...)\n}", "title": "" }, { "docid": "53a05ed9d1969ed16c855b3607efd0e5", "score": "0.65868455", "text": "func (l *ulogger) Debug(args ...interface{}) {\n\tl.log.Debug(args...)\n}", "title": "" }, { "docid": "1f4bf21c243c58c11a477dfb3a1a8e60", "score": "0.65823364", "text": "func debugLog(verbose bool, format string, v ...interface{}) {\n\tif verbose {\n\t\tlog.Printf(format, v...)\n\t}\n}", "title": "" }, { "docid": "44f8588352f92f300bd652f435db1e88", "score": "0.6574647", "text": "func (fl FileLogger) Debug(msgs ...interface{}) {\n\tif fl.logLvl > debug {\n\t\treturn\n\t}\n\tmsgs = append([]interface{}{getCallingStack()}, msgs...)\n\tfl.debug.Println(extractText(msgs))\n}", "title": "" }, { "docid": "d7894cb219d2fb136958fd300f129164", "score": "0.65485024", "text": "func Debug(msg string) {\n\tlogEngine.logger.Debug().Msg(msg)\n}", "title": "" }, { "docid": "1b4e6ea7f2ddded4723baab19850eea2", "score": "0.6527388", "text": "func (c *Connection) debugLog(\n\tfuseID uint64,\n\tcalldepth int,\n\tformat string,\n\tv ...interface{}) {\n\tif c.debugLogger == nil {\n\t\treturn\n\t}\n\n\t// Get file:line info.\n\tvar file string\n\tvar line int\n\tvar ok bool\n\n\t_, file, line, ok = runtime.Caller(calldepth)\n\tif !ok {\n\t\tfile = \"???\"\n\t}\n\n\tfileLine := fmt.Sprintf(\"%v:%v\", path.Base(file), line)\n\n\t// Format the actual message to be printed.\n\tmsg := fmt.Sprintf(\n\t\t\"Op 0x%08x %24s] %v\",\n\t\tfuseID,\n\t\tfileLine,\n\t\tfmt.Sprintf(format, v...))\n\n\t// Print it.\n\tc.debugLogger.Println(msg)\n}", "title": "" }, { "docid": "b91ce28493399688ea05e03098932f7e", "score": "0.65245503", "text": "func debug(f string, a ...interface{}) {\n\tos.Stderr.Write([]byte(\"gobls: \" + fmt.Sprintf(f, a...)))\n}", "title": "" }, { "docid": "ac949abaacd60d2f2a144f84b286e477", "score": "0.6520256", "text": "func Debug(msg string) {\n\tglobalLogger.Debug(msg)\n}", "title": "" }, { "docid": "986c2b7344dc30eeb3de0cdeffcf9109", "score": "0.6518248", "text": "func (ew *ExecutorWriter) Debug(msg string, args ...interface{}) error {\n\treturn ew.sys.Debug(msg, args...)\n}", "title": "" }, { "docid": "1000cf7bec6b1f0050b0087102428f0c", "score": "0.6515813", "text": "func Debug(s string) {\n\tif Level <= 0 {\n\t\tprintln(\"[DEBUG]: \" + s)\n\t}\n}", "title": "" }, { "docid": "6c69ba5ec3905dfca7ad9a6a56cc241f", "score": "0.65145284", "text": "func (l *Logger) Debug(args ...interface{}) {\n\tl.Log(DebugLevel, args...)\n}", "title": "" }, { "docid": "21daa91f7cf9ee67ec1808b9cb9f0164", "score": "0.65126836", "text": "func Debugln(args ...interface{}) {\n\tif DebugEnabled {\n\t\tarr := [8]interface{}{}\n\t\tslice := append(arr[:0], \"DEBUG:\")\n\t\tslice = append(slice, args...)\n\t\tlog.Println(slice...)\n\t}\n}", "title": "" }, { "docid": "f72ecb0193456edb26bc3904a2aeb862", "score": "0.6503257", "text": "func (logger *SimpleLogger) Debug(msg string) {\n\tif logger.logLevel == \"debug\" {\n\t\tlog.Println(\"[DEBUG] \" + msg)\n\t}\n}", "title": "" }, { "docid": "7924d77365c7f4cdd7aeba063d556dc4", "score": "0.64998364", "text": "func Debug(v ...interface{}) {\n\tif debug {\n\t\ta := make([]interface{}, 1, len(v)+1)\n\t\ta[0] = \"[DEBUG] \"\n\t\tstd.Print(append(a, v...)...)\n\t}\n\n}", "title": "" }, { "docid": "5f5e258964379be90078800f03b238ab", "score": "0.649778", "text": "func (z *Zap) Debug(args ...interface{}) {\n\tz.logger.Debug(z.prependSlice(args)...)\n}", "title": "" }, { "docid": "678a1eb02e9d809ddae76e665fd4e27f", "score": "0.6494926", "text": "func (nl ConsoleLogger) Debug(format string, a ...interface{}) {\n\tfmt.Fprintf(nl.output(), format, a...)\n}", "title": "" }, { "docid": "17a2bdbac60338d5a30a1f8bd0ccb115", "score": "0.64942104", "text": "func (l Klogger) Debug(msg string, args ...interface{}) {\n\tif glog.V(1) {\n\t\tglog.InfoDepth(1, join(msg, args...))\n\t}\n}", "title": "" }, { "docid": "c41e32ba95df6a20b93f51d918567f85", "score": "0.6484871", "text": "func printDebug(msg string) {\n\tif Debug {\n\t\tfmt.Printf(\"DEBUG %s: %s\\n\", getFormattedTime(), msg)\n\t}\n}", "title": "" }, { "docid": "b0e32cc363df370f5edbf7258b05689e", "score": "0.64844763", "text": "func Debug(args ...interface{}) {\n\tdebugLogger.Debug(args...)\n}", "title": "" }, { "docid": "3f34d53f52fd0e8fccafcb240d3d8c97", "score": "0.6482531", "text": "func (l *Logger) Debug(args ...interface{}) {\n\tl.log.Debug(args)\n}", "title": "" }, { "docid": "ca22c53b8ad9dfc332516c396eb3fac8", "score": "0.64791876", "text": "func (e *Env) Debug(s ...interface{}) {\n\tif e.Dbug {\n\t\te.Log.Debug(s...)\n\t}\n}", "title": "" }, { "docid": "75a9388a2e9f3c48264da346a8340ee3", "score": "0.6477066", "text": "func DD(args ...interface{}) {\n\tdebugee := []interface{}{0: \"DEBUG:\"}\n\targs = append(debugee, args)\n\tif gin.IsDebugging() {\n\t\tfmt.Println(args...)\n\t}\n}", "title": "" }, { "docid": "1ee2161fd5fee9565c9f9569e5558b52", "score": "0.6471199", "text": "func Debug(args ...interface{}) {\n\tlogger.Sourced().Debug(args...)\n}", "title": "" }, { "docid": "bebf7e4440f9a43b816ad5c8eb5c283b", "score": "0.6469897", "text": "func (l StandardOutputDispatcher) Debug(msg string) {\n\tl.Log(logging.DebugMessage(msg))\n}", "title": "" }, { "docid": "93d2759f0869185bb57b2d1b1e7f8095", "score": "0.64677525", "text": "func (c customLogger) Debug(message string) {\n\tinitLogger()\n\tlog.Printf(\"%s %s\", terminal.Colorize(\"[DEBUG]\", terminal.GREEN), message)\n}", "title": "" }, { "docid": "727ad90ed20c49a3791283914505cee9", "score": "0.64668304", "text": "func (l *CaptureLogger) Debug(args ...interface{}) {\n\tl.loga(LevelDebug, args...)\n}", "title": "" }, { "docid": "2eb335fdd6fa32ffb184d83be66e91eb", "score": "0.64572954", "text": "func logDebug(ctx context.Context, c *Client, logtext string) {\n\t//If Log enabled in options\n\tif c.option.Log == true {\n\t\tlog.Print(logtext)\n\t}\n}", "title": "" }, { "docid": "67cb649d3fda18ed9255023360a08c81", "score": "0.64489", "text": "func Debug(v ...interface{}) {\n\tif debugLogEnabled {\n\t\tlog.Print(v...)\n\t}\n}", "title": "" }, { "docid": "353fd0c0995cd71d6c2f87f10538ea52", "score": "0.6447563", "text": "func Debug(message ...interface{}) {\n\tstd.Debug(message...)\n}", "title": "" }, { "docid": "55a53d62ea09a68374bcd203548a7d27", "score": "0.6443473", "text": "func Debug(format string, a ...interface{}) {\n\t_, file, line, _ := runtime.Caller(1)\n\tinfo := fmt.Sprintf(format, a...)\n\n\tlog.Printf(\"[cgl] debug %s:%d %v\", file, line, info)\n\n}", "title": "" }, { "docid": "e775c582a89abc62396de0691637f05d", "score": "0.6438782", "text": "func Debug(format string, a ...interface{}) {\r\n\tif isVerbose {\r\n\t\tfmt.Printf(format+\"\\n\", a...)\r\n\t}\r\n}", "title": "" }, { "docid": "84db8c8c70dc070d40539daea785f7b7", "score": "0.64343625", "text": "func Debug(logStatement string, a ...interface{}) {\n\tif os.ExpandEnv(\"${DEBUG}\") != \"\" {\n\t\tif a != nil {\n\t\t\tdebug.Output(callDepth, fmt.Sprintf(logStatement, a...))\n\t\t} else {\n\t\t\tdebug.Output(callDepth, logStatement)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "08fc08f20040f170f52bc0b44e290003", "score": "0.6410305", "text": "func (l promoter) Debug(f string, v ...interface{}) {\n\tl.Log(f, v...)\n}", "title": "" }, { "docid": "ce1ab9f36336c308cccfc15b02fe77cf", "score": "0.6403942", "text": "func Debug(fmt string, v ...interface{}) {\n}", "title": "" }, { "docid": "976e447a02c3386adc10c6a166ac3192", "score": "0.6402257", "text": "func Debug() {\n\tmdDebug = 1\n}", "title": "" }, { "docid": "c376dcf42e31584efd8ceddf5d373803", "score": "0.6401272", "text": "func (ll *LeveledLogger) Debug(msg string) {\n\tll.Debugf(\"%s\", msg)\n}", "title": "" }, { "docid": "88ec9bf7a76ba851b5429f44ded77d9a", "score": "0.6400764", "text": "func Debug(format string, v ...interface{}) {\n\tif LogInstance != nil {\n\t\tLogInstance.DebugPrint(\"> \"+format+\"\\n\", v...)\n\t}\n}", "title": "" }, { "docid": "d0d111ac39c4540c4f993b5f9cbd4407", "score": "0.64007574", "text": "func (t *Test) Debug(a ...interface{}) {\n\tif t.ctx.debug() {\n\t\tt.log(debug, a...)\n\t}\n}", "title": "" }, { "docid": "1bd2aa0583fcd4aa9904ee6237fc94b5", "score": "0.6383398", "text": "func (ml *MockLogger) Debug(args ...interface{}) {\n\tml.call(\"Debug\", args...)\n}", "title": "" }, { "docid": "697169727b3653c8b09fe15931875286", "score": "0.63822913", "text": "func Debug(message string, args ...interface{}) {\n\tif Trace {\n\t\t_forcePrint(File, \"[DEBUG] \"+message, args...)\n\t}\n}", "title": "" }, { "docid": "07537b800cbdf0c55f57e3f81bb4c4a2", "score": "0.63804406", "text": "func (logger *Logger) Debug(args ...interface{}) {\n\tlogger.log(DebugLevel, unformatted, \"\", args...)\n}", "title": "" }, { "docid": "726acbac7152ab1c1e56ced28ac6c1fd", "score": "0.63800424", "text": "func (m *Miner) debugPrint(msg string) {\n\tif m != nil {\n\n\t\tm.generalMutex.Lock()\n\t\tdefer m.generalMutex.Unlock()\n\n\t\tif m.debug {\n\t\t\tfmt.Printf(\"miner %s---- %s\", m.Name, msg)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f49330e503bd253ceddd5015b7011792", "score": "0.6376488", "text": "func debug(s string) {\n\tif DEBUG_MODE {\n\t\tprintErr(s)\n\t}\n}", "title": "" }, { "docid": "d22043322b0e83902d09da70b4259012", "score": "0.63747156", "text": "func (bootstrap *Bootstrap) Debug(v ...interface{}) {\r\n\tlogger.Debug(v...)\r\n}", "title": "" }, { "docid": "114934de789c0a50680018e38bc67884", "score": "0.63713294", "text": "func (l *Logger) Debugln(v ...interface{}) {}", "title": "" }, { "docid": "114934de789c0a50680018e38bc67884", "score": "0.63713294", "text": "func (l *Logger) Debugln(v ...interface{}) {}", "title": "" }, { "docid": "0dfff80459a2f850fa35ba556ee5646c", "score": "0.6369904", "text": "func Debug(format string, a ...interface{}) {\n\t_, file, line, _ := runtime.Caller(1)\n\tinfo := fmt.Sprintf(format, a...)\n\n\tlog.Printf(\"[cgl] debug %s:%d %v\", file, line, info)\n}", "title": "" }, { "docid": "8b421c74cb4ad9d627b3b81e8b03a7bb", "score": "0.6367384", "text": "func LogDebug(text string) {\n\tif os.Getenv(\"DOKKU_TRACE\") == \"1\" {\n\t\tfmt.Fprintln(os.Stderr, fmt.Sprintf(\" ? %s\", strings.TrimPrefix(text, \" ? \")))\n\t}\n}", "title": "" }, { "docid": "34575894c25798213e5bd3b02c8b49ce", "score": "0.63639617", "text": "func (bundle StackdriverLogger) Debug(message string, vars ...interface{}) {\n\tbundle.Log(LogLevel_DEBUG, message, vars)\n}", "title": "" }, { "docid": "31dfa5496241e429402c79d2ad839776", "score": "0.6362599", "text": "func Debug(args ...interface{}) {\n\tfileLine().Debug(args...)\n}", "title": "" }, { "docid": "22fdcd901c7cf9dc3cfd416aafd4abec", "score": "0.63588154", "text": "func (*NoOpLogger) Debug(string, ...interface{}) {}", "title": "" }, { "docid": "a71c30e9718946688f443463a8e4494b", "score": "0.6356138", "text": "func Debug(msg string, v ...interface{}) {\n\tif os.Getenv(\"DNOTE_DEBUG\") == \"1\" {\n\t\tfmt.Fprintf(color.Output, \"%s %s\", SprintfGray(\"DEBUG:\"), fmt.Sprintf(msg, v...))\n\t}\n}", "title": "" }, { "docid": "2a139387994dc413cc06383bdfdc28bc", "score": "0.6354051", "text": "func Debug(v ...interface{}) {\n\tstd.Debug(v...)\n}", "title": "" }, { "docid": "a7560e4a02d374d8ebc7f1ac84ca819f", "score": "0.6353777", "text": "func (g logger) Debug(msg string) {\r\n\tg.logger.Debug().Msg(msg)\r\n}", "title": "" } ]
b001d07a49e21c346151b36f655c30ba
ListUserGroups returns a paginated list of SAML IdP service provider resources.
[ { "docid": "739bd78697170d207d3a406b5a7289a7", "score": "0.72808266", "text": "func (c *Client) ListUserGroups(ctx context.Context, pageSize int, nextKey string) ([]types.UserGroup, string, error) {\n\tresp, err := c.grpc.ListUserGroups(ctx, &proto.ListUserGroupsRequest{\n\t\tLimit: int32(pageSize),\n\t\tNextKey: nextKey,\n\t})\n\tif err != nil {\n\t\treturn nil, \"\", trace.Wrap(err)\n\t}\n\tuserGroups := make([]types.UserGroup, 0, len(resp.GetUserGroups()))\n\tfor _, ug := range resp.GetUserGroups() {\n\t\tuserGroups = append(userGroups, ug)\n\t}\n\treturn userGroups, resp.GetNextKey(), nil\n}", "title": "" } ]
[ { "docid": "30e70b1b787ffef51775e3bdb1dbbd01", "score": "0.6903374", "text": "func ListGroups() (*o7tapiuser.GroupList, error) {\n\treturn O7tClient.userClient.Groups().List(listOptions)\n}", "title": "" }, { "docid": "05be790c10da84d19cb9f45afebd8e66", "score": "0.65608627", "text": "func (h *OrganizationUserGroupHandler) List(ctx context.Context, orgID string) (*OrganizationUserGroupListResponse, error) {\n\tpath := buildPath(\"organization\", orgID, \"user-groups\")\n\tbts, err := h.client.doGetRequest(ctx, path, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar r OrganizationUserGroupListResponse\n\n\treturn &r, checkAPIResponse(bts, &r)\n}", "title": "" }, { "docid": "6e6c3d09b51b6504b46fb3633c1e5c98", "score": "0.65085036", "text": "func (api *API) GetListGroups() (*cognitoidentityprovider.ListGroupsOutput, error) {\n\tfirstTimeCheck := false\n\tvar nextToken string\n\tgroup := models.ListUserGroupType{}\n\n\tlistOfGroups := cognitoidentityprovider.ListGroupsOutput{}\n\tfor {\n\t\tif firstTimeCheck && nextToken == \"\" {\n\t\t\tbreak\n\t\t}\n\t\tfirstTimeCheck = true\n\n\t\tlistGroupsRequest := group.BuildListGroupsRequest(api.UserPoolId, nextToken)\n\t\tlistGroupsResponse, err := api.CognitoClient.ListGroups(listGroupsRequest)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tlistOfGroups.Groups = append(listOfGroups.Groups, listGroupsResponse.Groups...)\n\t\tnextToken = \"\"\n\t\tif listGroupsResponse.NextToken != nil {\n\t\t\tnextToken = *listGroupsResponse.NextToken\n\t\t}\n\t}\n\treturn &listOfGroups, nil\n}", "title": "" }, { "docid": "9207da35b5f895199211ff643ed7e401", "score": "0.603381", "text": "func (u *UserInfo) GetGroups(userPrincipal string) ([]string, error) {\n\t// Make sure things are logged in before continuing\n\tif err := u.login(); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Get the group IDs for the user\n\tobjIDs, err := u.getGroupIDs(userPrincipal)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Expand the group IDs\n\tgroups, err := u.getExpandedGroups(objIDs)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Extract out the Group objects into a list of strings\n\tvar finalList = make([]string, len(groups.Value))\n\tfor i := 0; i < len(groups.Value); i++ {\n\t\tfinalList[i] = groups.Value[i].Name\n\t}\n\treturn finalList, nil\n}", "title": "" }, { "docid": "7cdc4d983080da704d5232cf47d82e87", "score": "0.60222936", "text": "func (svc *UsersService) GetGroups(ID string, expand bool) ([]GroupStub, error) {\n\tvar groupResp []GroupStub\n\titem := \"/\" + ID + \"/groups\"\n\tif expand {\n\t\titem += \"?expand\"\n\t}\n\terr := svc.c.Get(\"/api/users\"+item, &groupResp)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"go-auth0: cannot get groups for user\")\n\t}\n\treturn groupResp, err\n}", "title": "" }, { "docid": "44a9abf00585a2b43e8f99686506a104", "score": "0.59926546", "text": "func (u *User) GroupList() []string {\n\tvar result []string\n\n\tfor _, group := range u.Groups {\n\t\tresult = append(result, group.Name)\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "363bbd2ea37c3ba10dce6b42f4165671", "score": "0.5961074", "text": "func (s *MembershipsServiceOp) ListByUsergroup(id string, args ...interface{}) ([]Membership, *ListParams, error) {\n endpoint := fmt.Sprintf(\"usergroups/%s/memberships\", id)\n return s.ListByLink(endpoint, args...)\n}", "title": "" }, { "docid": "0ebb04568cd224febd61da4898535707", "score": "0.58912605", "text": "func (g *GroupTree) ListUserGroupsForDisplay(userKey string) (groups []map[string]interface{}, err error) {\n\tgroups = make([]map[string]interface{}, 0)\n\terr = g.svc.Groups.List().Domain(g.domain).UserKey(userKey).Pages(context.Background(), func(page *admin.Groups) error {\n\t\tfor _, group := range page.Groups {\n\t\t\tgroups = append(groups, map[string]interface{}{\n\t\t\t\t\"name\": group.Name,\n\t\t\t\t\"email\": group.Email,\n\t\t\t})\n\t\t}\n\t\treturn nil\n\t})\n\n\treturn groups, err\n}", "title": "" }, { "docid": "3823a476ae49a56cbf5c9aba84d525a6", "score": "0.58603877", "text": "func (g *GroupService) ListForUser(userID string) ([]*model.Group, error) {\n\tgroups, appErr := g.api.GetGroupsForUser(userID)\n\n\treturn groups, normalizeAppErr(appErr)\n}", "title": "" }, { "docid": "b602bab0e34f9b5f3001683193b3c215", "score": "0.58500123", "text": "func (p *Provider) UserGroups(ctx context.Context) ([]*directory.Group, []*directory.User, error) {\n\tclient, err := p.getClient(ctx)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tapiGroups, err := getAllGroups(ctx, client, p.cfg.apiURL, p.cfg.environmentID)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tdirectoryUserLookup := map[string]*directory.User{}\n\tdirectoryGroups := make([]*directory.Group, len(apiGroups))\n\tfor i, ag := range apiGroups {\n\t\tdg := &directory.Group{\n\t\t\tId: ag.ID,\n\t\t\tName: ag.Name,\n\t\t}\n\n\t\tapiUsers, err := getGroupUsers(ctx, client, p.cfg.apiURL, p.cfg.environmentID, ag.ID)\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\t\tfor _, au := range apiUsers {\n\t\t\tdu, ok := directoryUserLookup[au.ID]\n\t\t\tif !ok {\n\t\t\t\tdu = &directory.User{\n\t\t\t\t\tId: au.ID,\n\t\t\t\t\tDisplayName: au.getDisplayName(),\n\t\t\t\t\tEmail: au.Email,\n\t\t\t\t}\n\t\t\t\tdirectoryUserLookup[au.ID] = du\n\t\t\t}\n\t\t\tdu.GroupIds = append(du.GroupIds, ag.ID)\n\t\t}\n\n\t\tdirectoryGroups[i] = dg\n\t}\n\tsort.Slice(directoryGroups, func(i, j int) bool {\n\t\treturn directoryGroups[i].Id < directoryGroups[j].Id\n\t})\n\n\tdirectoryUsers := make([]*directory.User, 0, len(directoryUserLookup))\n\tfor _, du := range directoryUserLookup {\n\t\tdirectoryUsers = append(directoryUsers, du)\n\t}\n\tsort.Slice(directoryUsers, func(i, j int) bool {\n\t\treturn directoryUsers[i].Id < directoryUsers[j].Id\n\t})\n\n\treturn directoryGroups, directoryUsers, nil\n}", "title": "" }, { "docid": "1f64d9203bbcb292dca9a17162bb8ab0", "score": "0.58186734", "text": "func (d *Directory) ListGroupUsers(groupNames ...string) ([]directory.User, error) {\n\tvar (\n\t\tusers []directory.User\n\t\tarnM map[string]struct{}\n\t)\n\n\tfor _, groupName := range groupNames {\n\t\tggInput := &iam.GetGroupInput{\n\t\t\tGroupName: aws.String(groupName),\n\t\t}\n\t\tggOutput, err := d.IAMAPI.GetGroup(ggInput)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfor _, u := range ggOutput.Users {\n\t\t\tif _, ok := arnM[*u.Arn]; ok {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\ta, err := userFromARN(d, *u.UserName)\n\t\t\tif err != nil {\n\t\t\t\tlog.Printf(\"skipping user %s: %v\", *u.UserName, err)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tusers = append(users, a)\n\t\t\tarnM[*u.Arn] = struct{}{}\n\t\t}\n\t}\n\n\treturn users, nil\n}", "title": "" }, { "docid": "9585d80d1f4793bf4181c90f9f359fd7", "score": "0.58105433", "text": "func (c *Client) ListSAMLIdPSessions(ctx context.Context, pageSize int, pageToken, user string) ([]types.WebSession, string, error) {\n\tresp, err := c.grpc.ListSAMLIdPSessions(\n\t\tctx,\n\t\t&proto.ListSAMLIdPSessionsRequest{\n\t\t\tPageSize: int32(pageSize),\n\t\t\tPageToken: pageToken,\n\t\t\tUser: user,\n\t\t})\n\tif err != nil {\n\t\treturn nil, \"\", trace.Wrap(err)\n\t}\n\n\tout := make([]types.WebSession, 0, len(resp.GetSessions()))\n\tfor _, v := range resp.GetSessions() {\n\t\tout = append(out, v)\n\t}\n\treturn out, resp.NextPageToken, nil\n}", "title": "" }, { "docid": "34a775e5e16ed684cfc49eff102ce07e", "score": "0.5804632", "text": "func ListGroups(cmd *cobra.Command, args []string) error {\n\n\tclient, err := auth.GetClient()\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Parse all flags\n\n\tvar access model.ListGroupsaccess\n\terr = flags.ParseFlag(cmd.Flags(), \"access\", &access)\n\tif err != nil {\n\t\treturn fmt.Errorf(`error parsing \"access\": ` + err.Error())\n\t}\n\t// Form query params\n\tgenerated_query := model.ListGroupsQueryParams{}\n\tgenerated_query.Access = access\n\n\tresp, err := client.IdentityService.ListGroups(&generated_query)\n\tif err != nil {\n\t\treturn err\n\t}\n\tjsonx.Pprint(cmd, resp)\n\treturn nil\n}", "title": "" }, { "docid": "c4e0be37703f1f25835cd379912cd26b", "score": "0.57992864", "text": "func (c *ServicePrincipalsClient) ListGroupMemberships(ctx context.Context, id string, query odata.Query) (*[]Group, int, error) {\n\tresp, status, _, err := c.BaseClient.Get(ctx, GetHttpRequestInput{\n\t\tConsistencyFailureFunc: RetryOn404ConsistencyFailureFunc,\n\t\tDisablePaging: query.Top > 0,\n\t\tOData: query,\n\t\tValidStatusCodes: []int{http.StatusOK},\n\t\tUri: Uri{\n\t\t\tEntity: fmt.Sprintf(\"/servicePrincipals/%s/transitiveMemberOf\", id),\n\t\t\tHasTenantId: true,\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn nil, status, fmt.Errorf(\"ServicePrincipalsClient.BaseClient.Get(): %v\", err)\n\t}\n\n\tdefer resp.Body.Close()\n\trespBody, err := io.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, status, fmt.Errorf(\"io.ReadAll(): %v\", err)\n\t}\n\n\tvar data struct {\n\t\tGroups []Group `json:\"value\"`\n\t}\n\tif err := json.Unmarshal(respBody, &data); err != nil {\n\t\treturn nil, status, fmt.Errorf(\"json.Unmarshal(): %v\", err)\n\t}\n\n\treturn &data.Groups, status, nil\n}", "title": "" }, { "docid": "5bcc14adeb1c6a172b21b74797c0f73b", "score": "0.57777876", "text": "func (api *API) GetUserGroups(params UserParameters) (*GroupCollection, error) {\n\tresult := &GroupCollection{}\n\tstatusCode, err := api.doRequest(\n\t\t\"GET\", \"/rest/api/user/memberof\",\n\t\tparams, result, nil,\n\t)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tswitch statusCode {\n\tcase 200:\n\t\treturn result, nil\n\tcase 403:\n\t\treturn nil, ErrNoPerms\n\tdefault:\n\t\treturn nil, makeUnknownError(statusCode)\n\t}\n}", "title": "" }, { "docid": "72fde894f92f42c97e996c378aff89be", "score": "0.57632697", "text": "func (g *GroupsController) List(ctx *gin.Context) {\n\tvar criteria tat.GroupCriteria\n\tctx.Bind(&criteria)\n\n\tuser, err := PreCheckUser(ctx)\n\tif err != nil {\n\t\tctx.JSON(http.StatusInternalServerError, gin.H{\"error\": \"Error while fetching current user\"})\n\t\treturn\n\t}\n\tcount, groups, err := groupDB.ListGroups(g.buildCriteria(ctx), &user, isTatAdmin(ctx))\n\tif err != nil {\n\t\tctx.AbortWithError(http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tout := &tat.GroupsJSON{\n\t\tCount: count,\n\t\tGroups: groups,\n\t}\n\tctx.JSON(http.StatusOK, out)\n}", "title": "" }, { "docid": "df429543fc89b373902e5ef411061c58", "score": "0.57543933", "text": "func (svc *UsersService) GetAllGroups(ID string) ([]GroupStub, error) {\n\tvar groupResp []GroupStub\n\terr := svc.c.Get(\"/api/users/\"+ID+\"/groups/calculate\", &groupResp)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"go-auth0: cannot get groups for user\")\n\t}\n\treturn groupResp, err\n}", "title": "" }, { "docid": "8c6fa0c66d3b98aac0ffd8b17eb3b0ef", "score": "0.5732449", "text": "func (c *Client) ListSAMLIdPServiceProviders(ctx context.Context, pageSize int, nextKey string) ([]types.SAMLIdPServiceProvider, string, error) {\n\tresp, err := c.grpc.ListSAMLIdPServiceProviders(ctx, &proto.ListSAMLIdPServiceProvidersRequest{\n\t\tLimit: int32(pageSize),\n\t\tNextKey: nextKey,\n\t})\n\tif err != nil {\n\t\treturn nil, \"\", trace.Wrap(err)\n\t}\n\tserviceProviders := make([]types.SAMLIdPServiceProvider, 0, len(resp.GetServiceProviders()))\n\tfor _, sp := range resp.GetServiceProviders() {\n\t\tserviceProviders = append(serviceProviders, sp)\n\t}\n\treturn serviceProviders, resp.GetNextKey(), nil\n}", "title": "" }, { "docid": "eb830f01c5af22a6fab4967412140cc3", "score": "0.57114536", "text": "func ListGroups(criteria *GroupCriteria, user *User, isAdmin bool) (int, []Group, error) {\n\tvar groups []Group\n\n\tcursor := listGroupsCursor(criteria)\n\tcount, err := cursor.Count()\n\tif err != nil {\n\t\tlog.Errorf(\"Error while count Groups %s\", err)\n\t}\n\n\tselectedFields := bson.M{}\n\tif !isAdmin {\n\t\tselectedFields = bson.M{\"name\": 1, \"description\": 1}\n\t}\n\terr = cursor.Select(selectedFields).\n\t\tSort(\"name\").\n\t\tSkip(criteria.Skip).\n\t\tLimit(criteria.Limit).\n\t\tAll(&groups)\n\n\tif err != nil {\n\t\tlog.Errorf(\"Error while Find All Groups %s\", err)\n\t}\n\tif isAdmin {\n\t\treturn count, groups, err\n\t}\n\n\tvar groupsUser []Group\n\t// Get all groups where user is admin\n\tgroupsMember, err := getGroupsForMemberUser(user)\n\tif err != nil {\n\t\treturn count, groups, err\n\t}\n\n\tfor _, group := range groups {\n\t\tadded := false\n\t\tfor _, groupMember := range groupsMember {\n\t\t\tif group.ID == groupMember.ID {\n\t\t\t\tgroupsUser = append(groupsUser, groupMember)\n\t\t\t\tadded = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !added {\n\t\t\tgroupsUser = append(groupsUser, group)\n\t\t}\n\t}\n\n\treturn count, groupsUser, err\n}", "title": "" }, { "docid": "f3a659af608a41d5b82c5b78eb3f4f5c", "score": "0.5701158", "text": "func GetGroups(userId string) ([]Group, error) {\n\tif !bson.IsObjectIdHex(userId) {\n\t\treturn nil, errors.New(invalidBsonIdHexErrorMessage)\n\t}\n\n\tuser, err := FindUserByID(bson.ObjectIdHex(userId))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tgroups := make([]Group, len(user.Groups))\n\tfor i, groupId := range user.Groups {\n\t\tgroup, err := FindGroup(bson.ObjectIdHex(groupId))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tgroups[i] = *group\n\t}\n\n\treturn groups, nil\n}", "title": "" }, { "docid": "f97296c08950f5945fa18a67d53dbf4f", "score": "0.5699491", "text": "func (r *REST) List(ctx context.Context, options *metainternal.ListOptions) (runtime.Object, error) {\n\t_, tenantID := authentication.GetUsernameAndTenantID(ctx)\n\tlog.Info(\"store\", log.Any(\"store\", identityprovider.IdentityProvidersStore))\n\tidp, ok := identityprovider.IdentityProvidersStore[tenantID]\n\tif !ok {\n\t\tlog.Error(\"Tenant has no related identity providers\", log.String(\"tenantID\", tenantID))\n\t\treturn nil, apierrors.NewInternalError(fmt.Errorf(\"tenant %s has no related identity providers\", tenantID))\n\t}\n\n\tgroupLister, ok := idp.(identityprovider.GroupLister)\n\tif !ok {\n\t\tlog.Info(\"tenant %s related idp not implement UserLister interface\", log.String(\"tenantID\", tenantID))\n\t\treturn nil, apierrors.NewInternalError(fmt.Errorf(\"tenant must implement UserLister interface\"))\n\t}\n\n\tusers, err := groupLister.ListGroups(ctx, options)\n\treturn users, err\n}", "title": "" }, { "docid": "ca274827537a2abe61c3c55e6129c416", "score": "0.5695586", "text": "func (d *Database) UserListGroup(groupID int) ([]s.Card, error) {\n\tout := make([]s.Card, 0)\n\tvar err error\n\tdb, err := sql.Open(\"mysql\", d.master.acces)\n\tif err != nil {\n\t\treturn out, errors.New(\"failed to open database\")\n\t}\n\tdefer db.Close()\n\tstatement, err := db.Prepare(\"select iduser, username, email, profilepicture, active from user inner join groupdetail on user.iduser = groupdetail.userid where idgroupdetail = ?\")\n\tif err != nil {\n\t\treturn out, errors.New(\"failed to prepare statement\")\n\t}\n\tresult, err := statement.Query(groupID)\n\tif err != nil {\n\t\treturn out, errors.New(\"error while execution of query\")\n\t}\n\tfor result.Next() {\n\t\tvar swap s.Card\n\t\tvar act string\n\t\terr = result.Scan(&swap.UserID, &swap.Username, &swap.Email, &swap.Picture, &act)\n\t\tif act == \"y\" {\n\t\t\tout = append(out, swap)\n\t\t} else {\n\t\t\tfmt.Println(\"inactive user\")\n\t\t}\n\n\t}\n\tfmt.Println(len(out), \"users found\")\n\treturn out, nil\n}", "title": "" }, { "docid": "baee16f613875778726bd324c3788729", "score": "0.56923425", "text": "func (store Manager) GetAllGroups(context User) ([]Group, error) {\n\t//\tOur return item\n\tretval := []Group{}\n\n\t//\tSecurity check: Are we authorized to perform this action?\n\tif !store.IsUserRequestAuthorized(context, sysreqGetAllGroups) {\n\t\treturn retval, fmt.Errorf(\"User %s is not authorized to perform the action\", context.Name)\n\t}\n\n\terr := store.systemdb.View(func(txn *badger.Txn) error {\n\n\t\t//\tGet an iterator\n\t\tit := txn.NewIterator(badger.DefaultIteratorOptions)\n\t\tdefer it.Close()\n\n\t\t//\tSet our prefix\n\t\tprefix := GetKey(\"Group\")\n\n\t\t//\tIterate over our values:\n\t\tfor it.Seek(prefix); it.ValidForPrefix(prefix); it.Next() {\n\n\t\t\t//\tGet the item\n\t\t\titem := it.Item()\n\n\t\t\t//\tGet the item key\n\t\t\t// k := item.Key()\n\n\t\t\t//\tGet the item value\n\t\t\tval, err := item.Value()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif len(val) > 0 {\n\t\t\t\t//\tCreate our item:\n\t\t\t\titem := Group{}\n\n\t\t\t\t//\tUnmarshal data into our item\n\t\t\t\tif err := json.Unmarshal(val, &item); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\t//\tAdd to the array of returned users:\n\t\t\t\tretval = append(retval, item)\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n\n\t//\tIf there was an error, report it:\n\tif err != nil {\n\t\treturn retval, fmt.Errorf(\"Problem getting the list of items: %s\", err)\n\t}\n\n\t//\tReturn our data:\n\treturn retval, nil\n}", "title": "" }, { "docid": "0ad112af375acd9cb2a74f95131be198", "score": "0.5680151", "text": "func (c *GroupClient) ListGroups(ctx context.Context, req *monitoringpb.ListGroupsRequest, opts ...gax.CallOption) *GroupIterator {\n\treturn c.internalClient.ListGroups(ctx, req, opts...)\n}", "title": "" }, { "docid": "bb95a09ba9202a531c480b0c07abe698", "score": "0.5663804", "text": "func (g *GroupsController) List(ctx *gin.Context) {\n\tvar criteria models.GroupCriteria\n\tctx.Bind(&criteria)\n\n\tuser, err := PreCheckUser(ctx)\n\tif err != nil {\n\t\tctx.JSON(http.StatusInternalServerError, gin.H{\"error\": \"Error while fetching current user\"})\n\t\treturn\n\t}\n\tcount, groups, err := models.ListGroups(g.buildCriteria(ctx), &user, utils.IsTatAdmin(ctx))\n\tif err != nil {\n\t\tctx.AbortWithError(http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tout := &groupsJSON{\n\t\tCount: count,\n\t\tGroups: groups,\n\t}\n\tctx.JSON(http.StatusOK, out)\n}", "title": "" }, { "docid": "20d3952f0baab5747ade298075264dac", "score": "0.56455225", "text": "func (c *GroupClient) ListGroups(opts meta_v1.ListOptions) (*v1.GroupList, error) {\n\tresult := v1.GroupList{}\n\terr := c.client.Get().\n\t\tNamespace(c.ns).\n\t\tResource(c.plural).\n\t\tVersionedParams(&opts, c.codec).\n\t\tDo().\n\t\tInto(&result)\n\treturn &result, err\n}", "title": "" }, { "docid": "0ddbf6518b56d903df168905256960a9", "score": "0.55507946", "text": "func (client *gocloak) GetUserGroups(token string, realm string, userID string) (*[]UserGroup, error) {\n\tvar result []UserGroup\n\tresp, err := getRequestWithBearerAuth(token).\n\t\tSetResult(&result).\n\t\tGet(client.basePath + authRealm + realm + \"/users/\" + userID + \"/groups\")\n\n\terr = checkForError(resp, err)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &result, nil\n}", "title": "" }, { "docid": "448ba6308be5514c1bf9178b4d23ba38", "score": "0.5539965", "text": "func (client *Client) ListAppGroups(request *ListAppGroupsRequest) (_result *ListAppGroupsResponse, _err error) {\n\truntime := &util.RuntimeOptions{}\n\theaders := make(map[string]*string)\n\t_result = &ListAppGroupsResponse{}\n\t_body, _err := client.ListAppGroupsWithOptions(request, headers, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_result = _body\n\treturn _result, _err\n}", "title": "" }, { "docid": "e13cabc1ca73642abb1bbd4371aecca2", "score": "0.5517901", "text": "func (r repository) GetUsersForGroup(ctx context.Context, groupId uint64) (*[]model.User, error) {\n\trows, err := r.db.QueryContext(ctx, \"call get_group_membership(?)\", groupId)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tvar users []model.User\n\n\tfor rows.Next() {\n\t\tvar user model.User\n\t\tif err := rows.Scan(&user.Id, &user.FirstName, &user.LastName, &user.UserId); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tusers = append(users, user)\n\t}\n\n\treturn &users, nil\n}", "title": "" }, { "docid": "0002ca0429ec69766e5eecdf36f57f0f", "score": "0.5517203", "text": "func (grp *PfGroupS) GetGroups(ctx PfCtx, username string) (members []PfGroupMember, err error) {\n\tvar rows *Rows\n\tmembers = nil\n\n\tm := NewPfGroupMember()\n\n\tq := m.SQL_Selects() + \" \" +\n\t\tm.SQL_Froms() + \" \" +\n\t\t\"WHERE mt.member = $1 \" +\n\t\t\"ORDER BY UPPER(grp.descr), mt.entered\"\n\trows, err = DB.Query(q, username)\n\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tmember := NewPfGroupMember().(*PfGroupMemberS)\n\n\t\terr = member.SQL_Scan(rows)\n\t\tif err != nil {\n\t\t\tmembers = nil\n\t\t\treturn\n\t\t}\n\n\t\tmembers = append(members, member)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "8bb982c869b85914d6051bb7257c826a", "score": "0.5507034", "text": "func (a *IamApiService) GetIamUserGroupList(ctx context.Context) ApiGetIamUserGroupListRequest {\n\treturn ApiGetIamUserGroupListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "82ba3a5de95d07619a5ed644ff10e103", "score": "0.5464489", "text": "func (gs *GoogleAdminService) GetGroups(email string) ([]string, error) {\n\tvar groups []string\n\ttags := []string{\n\t\t\"provider:google\",\n\t\t\"action:groups_resource\",\n\t}\n\tpageToken := \"\"\n\tfor {\n\t\tstartTS := time.Now()\n\n\t\t// get pages of 200 groups for an email\n\t\treq := gs.adminService.Groups.List().MaxResults(200).UserKey(email)\n\t\tif pageToken != \"\" {\n\t\t\treq.PageToken(pageToken)\n\t\t}\n\t\tgs.StatsdClient.Incr(\"provider.request\", tags, 1.0)\n\n\t\tresp, err := gs.cb.Call(func() (interface{}, error) {\n\t\t\treturn req.Do()\n\t\t})\n\t\tif err != nil {\n\t\t\tswitch e := err.(type) {\n\t\t\tcase *googleapi.Error:\n\t\t\t\ttags = append(tags, fmt.Sprintf(\"status_code:%d\", e.Code))\n\t\t\t\tgs.StatsdClient.Incr(\"provider.response\", tags, 1.0)\n\t\t\t\tgs.StatsdClient.Incr(\"provider.error\", tags, 1.0)\n\t\t\t\tswitch e.Code {\n\t\t\t\tcase 400:\n\t\t\t\t\tif e.Error() == \"Token expired or revoked\" {\n\t\t\t\t\t\terr = ErrTokenRevoked\n\t\t\t\t\t}\n\t\t\t\t\terr = ErrBadRequest\n\t\t\t\tcase 429:\n\t\t\t\t\terr = ErrRateLimitExceeded\n\t\t\t\tcase 503:\n\t\t\t\t\terr = ErrServiceUnavailable\n\t\t\t\t}\n\t\t\tcase *circuit.ErrOpenState:\n\t\t\t\ttags = append(tags, \"circuit:open\")\n\t\t\t\tgs.StatsdClient.Incr(\"provider.error\", tags, 1.0)\n\t\t\tdefault:\n\t\t\t\ttags = append(tags, \"error:invalid_response\")\n\t\t\t\tgs.StatsdClient.Incr(\"provider.internal_error\", tags, 1.0)\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\n\t\tr := resp.(*admin.Groups)\n\n\t\ttags = append(tags, fmt.Sprintf(\"status_code:%d\", r.HTTPStatusCode))\n\t\tgs.StatsdClient.Timing(\"provider.latency\", time.Now().Sub(startTS), tags, 1.0)\n\t\tgs.StatsdClient.Incr(\"provider.response\", tags, 1.0)\n\n\t\tfor _, group := range r.Groups {\n\t\t\tgroups = append(groups, group.Email)\n\t\t}\n\t\tif r.NextPageToken == \"\" {\n\t\t\tbreak\n\t\t}\n\t\tpageToken = r.NextPageToken\n\t}\n\treturn groups, nil\n}", "title": "" }, { "docid": "c27f641bede2c4e43ffd553e16c35062", "score": "0.54593486", "text": "func (p *AzureProvider) GetAllGroupMemberships(s *SessionState, f string) (map[string]string, error) {\n\t// REST Documentation: https://docs.microsoft.com/en-us/graph/api/user-list-memberof?view=graph-rest-1.0\n\t// This call permission requirements (any from the list):\n\t// - Directory.Read.All\n\t// - Directory.ReadWrite.All\n\t// - Directory.AccessAsUser.All\n\t//\n\t// NOTE: group filter is discarded if list of permitted groups is defined\n\n\t// For future use. Right now microsoft graph don't support filter\n\t// http://docs.oasis-open.org/odata/odata/v4.0/errata02/os/complete/part2-url-conventions/odata-v4.0-errata02-os-part2-url-conventions-complete.html#_Toc406398116\n\n\t/*\n\t\tvar request string = \"https://graph.microsoft.com/v1.0/me/memberOf?$select=id,displayName,groupTypes,securityEnabled,description,mailEnabled&$top=999\"\n\t\tif f != \"\" {\n\t\t\trequest += \"?$filter=contains(displayName, '\"+f+\"')\"\n\t\t}\n\t*/\n\t//\n\t// Filters that will be possible to use:\n\t// contains - unknown function | \"https://graph.microsoft.com/v1.0/me/memberOf?$filter=contains(displayName,%27groupname%27)\"\n\t// startswith - not supported | \"https://graph.microsoft.com/v1.0/me/memberOf?$filter=startswith(displayName,%27groupname%27)\"\n\t// substring - not supported | \"https://graph.microsoft.com/v1.0/me/memberOf?$filter=substring(displayName,0,2)%20eq%20%27groupname%27\"\n\n\trequestUrl := \"https://graph.microsoft.com/v1.0/me/memberOf?$select=displayName,id\"\n\tworkaround_set := false\n\n\tgroups := make(map[string]string, 0)\n\n\tfor {\n\t\treq, err := http.NewRequest(\"GET\", requestUrl, nil)\n\t\t// err = errors.New(\"fake error\")\n\n\t\tif err != nil {\n\t\t\treturn map[string]string{}, err\n\t\t}\n\t\treq.Header = getAzureHeader(s.AccessToken)\n\t\treq.Header.Add(\"Content-Type\", \"application/json\")\n\n\t\tgroupData, err := api.Request(req)\n\t\tif err != nil {\n\t\t\t// If workaround already tried, just fail the execution\n\t\t\tif workaround_set {\n\t\t\t\tlog.Printf(\"[GetGroups] We tried hard, but still receive error: '%s'\", err)\n\t\t\t\treturn map[string]string{}, err\n\t\t\t}\n\n\t\t\t// It might be that it is a Graph bug, try to workaround it by accessing another URL\n\t\t\tlog.Printf(\"[GetGroups] Failed to get groups details: %s\", err)\n\t\t\t// requestUrl = \"https://graph.microsoft.com/v1.0/users/\" + s.Email + \"/memberOf\"\n\t\t\tlog.Printf(\"[GetGroups] DETAILS: %s\", s)\n\n\t\t\trequestUrl = \"https://graph.microsoft.com/v1.0/users/\" + s.Email + \"/memberOf$select=displayName,id\"\n\t\t\tlog.Printf(\"[GetGroups] Try to workaround by accessing: '%s'\", requestUrl)\n\t\t\tworkaround_set = true\n\t\t\tcontinue\n\t\t}\n\n\t\tlog.Printf(\"[GetGroups] groupData: %s\", groupData)\n\t\tfor _, groupInfo := range groupData.Get(\"value\").MustArray() {\n\t\t\tv, ok := groupInfo.(map[string]interface{})\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tdname := v[\"displayName\"].(string)\n\t\t\tif uid, found := v[\"id\"].(string); found {\n\t\t\t\tif p.GroupPermitted(&dname, &uid) {\n\t\t\t\t\tgroups[dname] = uid\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tgroups[dname] = \"\"\n\t\t\t}\n\t\t}\n\n\t\tif nextlink := groupData.Get(\"@odata.nextLink\").MustString(); nextlink != \"\" {\n\t\t\trequestUrl = nextlink\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn groups, nil\n}", "title": "" }, { "docid": "1c9f46132b077f22bb173c4f5c5ca297", "score": "0.5449201", "text": "func GetAllGroups() ([]KeycloakGroupRepresentation, error) {\n\tfn := \"GetAllGroups\"\n\theaders, err := GetCommonHTTPHeaders(PxCentralAdminUser, PxCentralAdminPwd)\n\tif err != nil {\n\t\tlogrus.Errorf(\"%s: %v\", fn, err)\n\t\treturn nil, err\n\t}\n\tkeycloakEndPoint, err := getKeycloakEndPoint(true)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqURL := fmt.Sprintf(\"%s/groups\", keycloakEndPoint)\n\tmethod := \"GET\"\n\tresponse, err := processHTTPRequest(method, reqURL, headers, nil)\n\tif err != nil {\n\t\tlogrus.Errorf(\"%s: %v\", fn, err)\n\t\treturn nil, err\n\t}\n\tvar groups []KeycloakGroupRepresentation\n\terr = json.Unmarshal(response, &groups)\n\tif err != nil {\n\t\tlogrus.Errorf(\"%s: %v\", fn, err)\n\t\treturn nil, err\n\t}\n\tlogrus.Debugf(\"list of groups : %v\", groups)\n\treturn groups, nil\n}", "title": "" }, { "docid": "b440255ae50065a19273de081d5ee519", "score": "0.5411647", "text": "func (s *AtlasUsersServiceOp) List(ctx context.Context, orgID string, listOptions *ListOptions) ([]AtlasUser, *Response, error) {\n\tpath := fmt.Sprintf(usersGroupBasePath, orgID)\n\n\t// Add query params from listOptions\n\tpath, err := setListOptions(path, listOptions)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treq, err := s.Client.NewRequest(ctx, http.MethodGet, path, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\troot := new(AtlasUsersResponse)\n\tresp, err := s.Client.Do(ctx, req, root)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\tif l := root.Links; l != nil {\n\t\tresp.Links = l\n\t}\n\n\treturn root.Results, resp, nil\n}", "title": "" }, { "docid": "cfbdea657b9b294b9827926f6ae97da2", "score": "0.5408592", "text": "func (a GroupsAPI) List() ([]string, error) {\n\tvar listResponse struct {\n\t\tGroupNames []string `json:\"group_names,omitempty\" url:\"group_names,omitempty\"`\n\t}\n\n\tresp, err := a.Client.performQuery(http.MethodGet, \"/groups/list\", nil, nil)\n\tif err != nil {\n\t\treturn listResponse.GroupNames, err\n\t}\n\n\terr = json.Unmarshal(resp, &listResponse)\n\treturn listResponse.GroupNames, err\n}", "title": "" }, { "docid": "8fe47320e7a1ff345c26ae8c276c2d50", "score": "0.53984165", "text": "func ListRoleGroups(cmd *cobra.Command, args []string) error {\n\n\tclient, err := auth.GetClient()\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Parse all flags\n\n\tvar role string\n\terr = flags.ParseFlag(cmd.Flags(), \"role\", &role)\n\tif err != nil {\n\t\treturn fmt.Errorf(`error parsing \"role\": ` + err.Error())\n\t}\n\n\tresp, err := client.IdentityService.ListRoleGroups(role)\n\tif err != nil {\n\t\treturn err\n\t}\n\tjsonx.Pprint(cmd, resp)\n\treturn nil\n}", "title": "" }, { "docid": "b6d57406503d2c78867823b0cbeea6f6", "score": "0.53794885", "text": "func users(svc *iam.IAM, iamGroup string) ([]*iam.User, error) {\n\tif iamGroup != \"\" {\n\t\tparams := &iam.GetGroupInput{\n\t\t\tGroupName: aws.String(iamGroup),\n\t\t\tMaxItems: aws.Int64(1000),\n\t\t}\n\t\tresp, err := svc.GetGroup(params)\n\t\treturn resp.Users, err\n\t}\n\tparams := &iam.ListUsersInput{\n\t\tMaxItems: aws.Int64(1000),\n\t}\n\tresp, err := svc.ListUsers(params)\n\treturn resp.Users, err\n}", "title": "" }, { "docid": "053f751a28ecbd2f227f08011fbd27b8", "score": "0.53730595", "text": "func (c *Client) ListDatasetGroups(ctx context.Context, params *ListDatasetGroupsInput, optFns ...func(*Options)) (*ListDatasetGroupsOutput, error) {\n\tif params == nil {\n\t\tparams = &ListDatasetGroupsInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"ListDatasetGroups\", params, optFns, addOperationListDatasetGroupsMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*ListDatasetGroupsOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "title": "" }, { "docid": "b9ddd12b068383e20ed2ec5b26b90506", "score": "0.5369405", "text": "func (api *API) ListGroupsHandler(ctx context.Context, w http.ResponseWriter, req *http.Request) (*models.SuccessResponse, *models.ErrorResponse) {\n\tfinalGroupsResponse := models.ListUserGroups{}\n\n\tlistOfGroups, err := api.GetListGroups()\n\tif err != nil {\n\t\tcognitoErr := models.NewCognitoError(ctx, err, \"Cognito ListofUserGroups request from list user groups endpoint\")\n\t\tif cognitoErr.Code == models.NotFoundError {\n\t\t\treturn nil, models.NewErrorResponse(http.StatusNotFound, nil, cognitoErr)\n\t\t}\n\t\treturn nil, models.NewErrorResponse(http.StatusInternalServerError, nil, cognitoErr)\n\t}\n\n\tjsonResponse, responseErr := finalGroupsResponse.BuildListGroupsSuccessfulJsonResponse(ctx, listOfGroups)\n\tif responseErr != nil {\n\t\treturn nil, models.NewErrorResponse(http.StatusInternalServerError, nil, responseErr)\n\t}\n\treturn models.NewSuccessResponse(jsonResponse, http.StatusOK, nil), nil\n\n}", "title": "" }, { "docid": "a4ae45c0a0da5bbf107181be8a1d77ef", "score": "0.53356767", "text": "func (c *ConfigRuleStore) ListRuleGroups(ctx context.Context, userID string, namespace string) (RuleGroupList, error) {\n\treturn nil, errors.New(\"not implemented by the config service rule store\")\n}", "title": "" }, { "docid": "21ce198bd882c801fa1c282f988eade2", "score": "0.5329251", "text": "func (api *API) ListUsersInGroupHandler(ctx context.Context, w http.ResponseWriter, req *http.Request) (*models.SuccessResponse, *models.ErrorResponse) {\n\n\tvars := mux.Vars(req)\n\tgroup := models.Group{ID: vars[\"id\"]}\n\n\tlistOfUsersInput := []*cognitoidentityprovider.UserType{}\n\n\tlistUsers, err := api.getUsersInAGroup(listOfUsersInput, group)\n\tif err != nil {\n\t\tcognitoErr := models.NewCognitoError(ctx, err, \"Cognito ListUsersInGroup request from list users in group endpoint\")\n\t\tif cognitoErr.Code == models.NotFoundError {\n\t\t\treturn nil, models.NewErrorResponse(http.StatusBadRequest, nil, cognitoErr)\n\t\t}\n\t\treturn nil, models.NewErrorResponse(http.StatusInternalServerError, nil, cognitoErr)\n\t}\n\n\tlistOfUsers := models.UsersList{}\n\tlistOfUsers.MapCognitoUsers(&listUsers)\n\n\tjsonResponse, responseErr := listOfUsers.BuildSuccessfulJsonResponse(ctx)\n\tif responseErr != nil {\n\t\treturn nil, models.NewErrorResponse(http.StatusInternalServerError, nil, responseErr)\n\t}\n\n\treturn models.NewSuccessResponse(jsonResponse, http.StatusOK, nil), nil\n}", "title": "" }, { "docid": "96bc1cdedcb45e24bb4c4e4b8a856436", "score": "0.5303793", "text": "func (c *GrpcClient) ListResourceGroups(ctx context.Context) ([]string, error) {\n\tif c.Service == nil {\n\t\treturn nil, ErrClientNotReady\n\t}\n\n\treq := &milvuspb.ListResourceGroupsRequest{}\n\n\tresp, err := c.Service.ListResourceGroups(ctx, req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err = handleRespStatus(resp.GetStatus()); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp.GetResourceGroups(), nil\n}", "title": "" }, { "docid": "0cfedfa13852ee8ddc4c45645ff262b4", "score": "0.5298485", "text": "func (tr *TransportWithReauth) ListPolicyGroups(ctx context.Context) ([]*model.PolicyGroup, error) {\n\tvar resources []*model.PolicyGroup\n\terr := tr.doWithReauth(ctx, func() error {\n\t\tvar err error\n\t\tresources, err = tr.inner.ListPolicyGroups(ctx)\n\n\t\treturn err\n\t})\n\n\treturn resources, err\n}", "title": "" }, { "docid": "e7e2bec8b4dc3dbb83d05362509dad01", "score": "0.52904665", "text": "func (c *Client) ListServerGroups() (response ListServerGroupsResponse, err error) {\n\treq, err := c.newRequest(http.MethodGet, \"groups\", nil, nil)\n\tif err != nil {\n\t\treturn response, fmt.Errorf(\"cannot create new request: %v\", err)\n\t}\n\n\t_, err = c.Do(req, &response)\n\tif err != nil {\n\t\treturn response, fmt.Errorf(\"cannot execute request: %v\", err)\n\t}\n\n\treturn response, nil\n}", "title": "" }, { "docid": "f07de7ce1c8a9f339faa6e7bbff5ee8b", "score": "0.5284636", "text": "func GetGroups(name string) {\n\tvar GenRes api.GenericHeader\n\tAPI.Get(getQuery()+\"/\"+name, &GenRes)\n\t//API.Get(\"/api\"+config.APIGroup+\"/namespaces/\"+API.Namespace+\"/\"+config.ResourceType+\"/\"+name, &GenRes)\n\tif groupsString, ok := GenRes.Metadata.Annotations[\"groups\"]; ok {\n\t\tuser := users[name]\n\t\tgrouplist := split(groupsString)\n\t\tuser.Groups = &grouplist\n\t\tusers[name] = user\n\t}\n}", "title": "" }, { "docid": "51a439135336b1cc9fe744ee2317334b", "score": "0.525142", "text": "func GetAllGroups(username string) (Groups []group.Group, err error) {\n Groups, err = group.GetAllGroups()\n changecontrol.ChangeControlInsertData(err, \"GetAllGroups\", username)\n return Groups, err\n}", "title": "" }, { "docid": "7445611a32ca31a0a9232ac7987027ae", "score": "0.5244871", "text": "func ListMemberGroups(cmd *cobra.Command, args []string) error {\n\n\tclient, err := auth.GetClient()\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Parse all flags\n\n\tvar member string\n\terr = flags.ParseFlag(cmd.Flags(), \"member\", &member)\n\tif err != nil {\n\t\treturn fmt.Errorf(`error parsing \"member\": ` + err.Error())\n\t}\n\n\tresp, err := client.IdentityService.ListMemberGroups(member)\n\tif err != nil {\n\t\treturn err\n\t}\n\tjsonx.Pprint(cmd, resp)\n\treturn nil\n}", "title": "" }, { "docid": "c1fe5df5cd4912456de320938703a37f", "score": "0.5221236", "text": "func (u *User) GroupIds() ([]string, error) {\n\tif u.IsLuser {\n\t\treturn u.lookupUserGroupIds()\n\t}\n\treturn u.User.GroupIds()\n}", "title": "" }, { "docid": "d420158042c9d08cab324ec6864e18a5", "score": "0.5200259", "text": "func (a Service) ListUsers(projectID string) ([]generic.User, error) {\n\treturn []generic.User{}, nil\n}", "title": "" }, { "docid": "74df695ee5c27011eb07e112f5d8fd3f", "score": "0.51968783", "text": "func ListMembershipsForAuthenticatedUser(ctx context.Context, req *ListMembershipsForAuthenticatedUserReq, opt ...requests.Option) (*ListMembershipsForAuthenticatedUserResponse, error) {\n\topts := requests.BuildOptions(opt...)\n\tif req == nil {\n\t\treq = new(ListMembershipsForAuthenticatedUserReq)\n\t}\n\tresp := &ListMembershipsForAuthenticatedUserResponse{}\n\n\thttpReq, err := req.HTTPRequest(ctx, opt...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tr, err := opts.HttpClient().Do(httpReq)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = resp.ReadResponse(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "a66fef352163f7e24ccf62f2f0e4f457", "score": "0.51945937", "text": "func ListGroupMembers(cmd *cobra.Command, args []string) error {\n\n\tclient, err := auth.GetClient()\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Parse all flags\n\n\tvar group string\n\terr = flags.ParseFlag(cmd.Flags(), \"group\", &group)\n\tif err != nil {\n\t\treturn fmt.Errorf(`error parsing \"group\": ` + err.Error())\n\t}\n\n\tresp, err := client.IdentityService.ListGroupMembers(group)\n\tif err != nil {\n\t\treturn err\n\t}\n\tjsonx.Pprint(cmd, resp)\n\treturn nil\n}", "title": "" }, { "docid": "4bd3aabb389b9620c5c1b962fdb7798f", "score": "0.5176877", "text": "func (o UserGroupMembershipOutput) Groups() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *UserGroupMembership) pulumi.StringArrayOutput { return v.Groups }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "bc4d0d21131fc07e552b6da090c07aad", "score": "0.5165601", "text": "func GetGroupIdStrings(userId string) ([]string, error) {\n\tif !bson.IsObjectIdHex(userId) {\n\t\treturn nil, errors.New(invalidBsonIdHexErrorMessage)\n\t}\n\n\tuser, err := FindUserByID(bson.ObjectIdHex(userId))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn user.Groups, nil\n}", "title": "" }, { "docid": "1d536311d52df4f8054a105f90934a96", "score": "0.5163444", "text": "func GetUserGroups(c *gin.Context) {\n\tc.JSON(http.StatusOK, gin.H{})\n}", "title": "" }, { "docid": "9752001152143602303659e0bba14be5", "score": "0.5163434", "text": "func getAllGroups(username string) (groups []Group) {\n\t//Connect to database\n\tdb := connectDatabase()\n\tdefer db.Close()\n\tvar group Group\n\t//Prepare statement\n\tstmt, err := db.Prepare(`\n\t\tSELECT group_id, group_title, read, write \n\t\tFROM _group \n\t\tWHERE group_owner = $1;`)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\trows, err := stmt.Query(username)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tfor rows.Next() {\n\t\trows.Scan(&group.GroupID, &group.GroupTitle, &group.GroupRead, &group.GroupWrite)\n\t\tgroups = append(groups, group)\n\t}\n\n\treturn groups\n}", "title": "" }, { "docid": "02d26225e93f56f1972d736f041d5005", "score": "0.5153284", "text": "func GetUserList(pageIndex, pageSize int, sort string, desc bool) ([]proto.User, int64, error) {\n\tsession := config.GetConfigs().OrmEngine.NewSession()\n\tdefer session.Close()\n\n\treturn getUserList(session, pageIndex, pageSize, sort, desc)\n}", "title": "" }, { "docid": "bd10957243e2db317f67fde6960159b8", "score": "0.51463294", "text": "func (c *Client) ListGroupDevices(realm, groupName string, pageSize int, format DeviceResultFormat) (Paginator, error) {\n\tcallURL := makeURL(c.appEngineURL, \"/v1/%s/groups/%s/devices\", realm, url.PathEscape(groupName))\n\tpaginator, err := c.GetDeviceListPaginator(realm, pageSize, format)\n\tif err != nil {\n\t\treturn &DeviceListPaginator{}, err\n\t}\n\n\tdeviceListPaginator := paginator.(*DeviceListPaginator)\n\tdeviceListPaginator.baseURL = callURL\n\n\treturn deviceListPaginator, nil\n}", "title": "" }, { "docid": "566392de270842edb471d8b3f0926a68", "score": "0.51266634", "text": "func (s *Service) PolicyGroups(c *bm.Context, uid, groupID int64, gType, state int8, count, page int64, order, sort string) (data *oversea.PolicyGroupData, err error) {\n\tgroups, total, err := s.oversea.PolicyGroups(c, uid, groupID, gType, state, count, page, order, sort)\n\tif len(groups) != 0 {\n\t\ts.mulIDtoName(c, groups, s.mng.GetNameByUID, \"UID\", \"UserName\")\n\t}\n\tdata = &oversea.PolicyGroupData{\n\t\tItems: groups,\n\t\tPager: &oversea.Pager{\n\t\t\tNum: page,\n\t\t\tSize: count,\n\t\t\tTotal: total,\n\t\t},\n\t}\n\treturn\n}", "title": "" }, { "docid": "c56fbf1213f09aee178f1a26ec7a50b1", "score": "0.51243126", "text": "func (ug userGroupRepository) FindUserGroupsByGroupIDs(ctx context.Context, groupIDs []string) ([]*model.UserGroup, error) {\n\tvar items []*model.UserGroup\n\tif err := ug.Builder().Where(\"group_id IN UNNEST(@arg0)\", Params{\"arg0\": groupIDs}).Query(ctx).Intos(&items); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "b37b5661843b5de4fea5815d361c72d0", "score": "0.5115126", "text": "func (s *GroupMembershipsServiceOp) ListByGroup(id string, args ...interface{}) ([]GroupMembership, *ListParams, error) {\n endpoint := fmt.Sprintf(\"groups/%s/groupMemberships\", id)\n return s.ListByLink(endpoint, args...)\n}", "title": "" }, { "docid": "6a13927e7ed2573beed60c74d913d0b1", "score": "0.51086754", "text": "func (o *UserDTO) GetUserGroups() []TenantEntity {\n\tif o == nil || o.UserGroups == nil {\n\t\tvar ret []TenantEntity\n\t\treturn ret\n\t}\n\treturn *o.UserGroups\n}", "title": "" }, { "docid": "860fdc9cd62fb43caafd7beb7c87969d", "score": "0.51077336", "text": "func (u *userService) GetGroupsForUser(username string) ([]string, error) {\n\tgroups := []string{}\n\tfor _, path := range u.getSearchPaths() {\n\t\tif path == \"\" {\n\t\t\treturn nil, errors.New(\"path is not specified\")\n\t\t}\n\n\t\tsearchResults, err := u.search(\n\t\t\tldap.NewSearchRequest(\n\t\t\t\tpath,\n\t\t\t\tldap.ScopeWholeSubtree,\n\t\t\t\tldap.NeverDerefAliases,\n\t\t\t\t0,\n\t\t\t\t0,\n\t\t\t\tfalse,\n\t\t\t\tfmt.Sprintf(\"(uid=%s)\", username),\n\t\t\t\t[]string{\"ismemberof\"},\n\t\t\t\tnil))\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"problem searching ldap\")\n\t\t}\n\n\t\tfor _, result := range searchResults.Entries {\n\t\t\tfor _, attr := range result.Attributes {\n\t\t\t\tfor _, dnString := range attr.Values {\n\t\t\t\t\tgroups = append(groups, findCnsWithGroup(dnString, u.groupOuName)...)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn groups, nil\n}", "title": "" }, { "docid": "91645f62b2d8fdabb0126a782512bc9f", "score": "0.5102243", "text": "func (a *apiServer) GetUsers(ctx context.Context, req *auth.GetUsersRequest) (resp *auth.GetUsersResponse, retErr error) {\n\t// Filter by group\n\tif req.Group != \"\" {\n\t\tvar membersProto auth.Users\n\t\tif err := dbutil.WithTx(ctx, a.env.DB, func(ctx context.Context, sqlTx *pachsql.Tx) error {\n\t\t\tgroups := a.groups.ReadWrite(sqlTx)\n\t\t\tif err := groups.Get(req.Group, &membersProto); err != nil {\n\t\t\t\treturn errors.EnsureStack(err)\n\t\t\t}\n\t\t\treturn nil\n\t\t}); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treturn &auth.GetUsersResponse{Usernames: setToList(membersProto.Usernames)}, nil\n\t}\n\n\tmembersCol := a.members.ReadOnly(ctx)\n\tgroups := &auth.Groups{}\n\tvar users []string\n\tif err := membersCol.List(groups, col.DefaultOptions(), func(user string) error {\n\t\tusers = append(users, user)\n\t\treturn nil\n\t}); err != nil {\n\t\treturn nil, errors.EnsureStack(err)\n\t}\n\treturn &auth.GetUsersResponse{Usernames: users}, nil\n}", "title": "" }, { "docid": "dc0a740ebc128f819eaeb289f493fd0f", "score": "0.50995755", "text": "func apiGroupList(_ *itineris.ApiContext, _ *itineris.ApiAuth, _ *itineris.ApiParams) *itineris.ApiResult {\n\tgroupList, err := groupDao.GetAll()\n\tif err != nil {\n\t\treturn itineris.NewApiResult(itineris.StatusErrorServer).SetMessage(err.Error())\n\t}\n\tdata := make([]map[string]interface{}, 0)\n\tfor _, g := range groupList {\n\t\tdata = append(data, map[string]interface{}{\"id\": g.Id, \"name\": g.Name})\n\t}\n\treturn itineris.NewApiResult(itineris.StatusOk).SetData(data)\n}", "title": "" }, { "docid": "5cee6367965e6b0c53b860676fda201c", "score": "0.50989276", "text": "func (resourceManager *ResourceManagerV2) ListResourceGroups(listResourceGroupsOptions *ListResourceGroupsOptions) (result *ResourceGroupList, response *core.DetailedResponse, err error) {\n\treturn resourceManager.ListResourceGroupsWithContext(context.Background(), listResourceGroupsOptions)\n}", "title": "" }, { "docid": "4b1b3d7532364a8057e387df640af3a6", "score": "0.50969523", "text": "func (i *IAM) AddUserGroups(s *Singapura) ([]string, error) {\n\tvar outputs []string\n\tgroups, err := GroupsByRoleAndEnv(s)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, group := range groups {\n\t\t_, err = i.Iam.AddUserToGroup(&iam.AddUserToGroupInput{\n\t\t\tGroupName: aws.String(group),\n\t\t\tUserName: aws.String(s.UserName),\n\t\t})\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Error adding user to group: %v\\n\", group)\n\t\t\tcontinue\n\t\t}\n\t\toutputs = append(outputs, group)\n\t}\n\treturn outputs, nil\n}", "title": "" }, { "docid": "2344a56a039f86e0ae9b052aa30ddfca", "score": "0.5085201", "text": "func GetGroups(token *AccessResponse) (groups []Group, err error) {\n\tvar lastPage bool\n\tvar numRenews, retryAmount int\n\tfor i := 0; lastPage != true; i++ {\n\t\tgR, err := getGroupPage(i, token)\n\t\tif err != nil {\n\t\t\tfmt.Fprintf(os.Stderr, \"%s\\n\", err)\n\t\t}\n\t\tswitch gR.StatusCode {\n\t\tcase 200:\n\t\t\tdefer gR.Body.Close()\n\t\t\toutput, err := ioutil.ReadAll(gR.Body)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tgro := &GroupResponse{}\n\t\t\terr = json.Unmarshal(output, gro)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tfor _, j := range gro.Groups {\n\t\t\t\tgroups = append(groups, j)\n\t\t\t}\n\t\t\tlastPage = gro.LastPage\n\t\tcase 400:\n\t\t\t//\t\t\terr = fmt.Errorf(\"GetGroups received response code 400. Some parameters of the request were not understood by the server or the Service Account Integration certificate has expired.\")\n\t\t\t//\t\t\treturn nil, err\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"request\": \"GetGroups\",\n\t\t\t\t\"code\": gR.StatusCode,\n\t\t\t\t\"page\": i,\n\t\t\t}).Fatal(\"Bad request or Service Account Integration Certificate has expired.\")\n\t\tcase 401:\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"request\": \"GetGroups\",\n\t\t\t\t\"code\": gR.StatusCode,\n\t\t\t\t\"page\": i,\n\t\t\t}).Warn(\"Possible causes are invalid token, expired token or invalid organization.\")\n\t\t\ttoken.Renew()\n\t\t\tnumRenews++\n\t\t\ti--\n\t\tcase 403:\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"request\": \"GetGroups\",\n\t\t\t\t\"code\": gR.StatusCode,\n\t\t\t\t\"page\": i,\n\t\t\t}).Fatal(\"Missing API key or API key is not permitted access.\")\n\t\tcase 429:\n\t\t\tretryAfterString := gR.Header.Get(\"Retry-After\")\n\t\t\tretryAfterInt, err := strconv.Atoi(retryAfterString)\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t\tretryAmount += retryAfterInt + 1 // add an additional second for good measure\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"request\": \"GetGroups\",\n\t\t\t\t\"code\": gR.StatusCode,\n\t\t\t\t\"page\": i,\n\t\t\t\t\"retry\": retryAmount,\n\t\t\t}).Warn(\"Too many requests\")\n\t\t\ttime.Sleep(time.Duration(retryAmount) * time.Second)\n\t\t\ti--\n\t\tdefault:\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"request\": \"GetGroups\",\n\t\t\t\t\"code\": gR.StatusCode,\n\t\t\t\t\"page\": i,\n\t\t\t}).Fatal(\"Unhandled response code. Mudwork config may be incorrect.\")\n\t\t}\n\t}\n\treturn groups, err\n}", "title": "" }, { "docid": "e92591362b425215e4247b9db76d36f5", "score": "0.50721395", "text": "func (svc GroupService) GroupsByUser(ctx context.Context, uid user.ID) (user.Groups, error) {\n\treturn svc.groups.GroupsByUser(ctx, uid)\n}", "title": "" }, { "docid": "559ad7a6ae27ebd3ba2b11e0da22b3f8", "score": "0.50659084", "text": "func GetAPIGroupList(c *gin.Context) {\n\tg := app.Gin{C: c}\n\n\t// instancing dynamic client\n\tclient, err := config.Cluster.Client(g.C.Param(\"CLUSTER\"))\n\tif err != nil {\n\t\tg.SendMessage(http.StatusBadRequest, err.Error(), err)\n\t\treturn\n\t}\n\n\tdiscoveryClient, err := client.NewDiscoveryClient()\n\tif err != nil {\n\t\tg.SendError(err)\n\t\treturn\n\t}\n\n\tgroups, err := discoveryClient.ServerGroups()\n\tif err != nil {\n\t\tg.SendError(err)\n\t\treturn\n\t}\n\n\tg.Send(http.StatusOK, groups)\n\n}", "title": "" }, { "docid": "9bf1d42ea69d679f9f60415e54a2d8d6", "score": "0.50540674", "text": "func (s *UsersApiService) GetUserGroups(ctx context.Context) (ImplResponse, error) {\n\t// TODO - update GetUserGroups with the required logic for this service method.\n\t// Add api_users_service.go to the .openapi-generator-ignore to avoid overwriting this service implementation when updating open api generation.\n\n\t//TODO: Uncomment the next line to return response Response(200, JsonSuccessBase{}) or use other options such as http.Ok ...\n\t//return Response(200, JsonSuccessBase{}), nil\n\n\treturn Response(http.StatusNotImplemented, nil), errors.New(\"GetUserGroups method not implemented\")\n}", "title": "" }, { "docid": "44a3e9cbb1be8dfc4b386819c2e6c3c2", "score": "0.505034", "text": "func (c *Client) ListGroups(realm string) (AstarteRequest, error) {\n\tcallURL := makeURL(c.appEngineURL, \"/v1/%s/groups\", realm)\n\treq := c.makeHTTPrequest(http.MethodGet, callURL, nil)\n\n\treturn ListGroupsRequest{req: req, expects: 200}, nil\n}", "title": "" }, { "docid": "7d05e6df89751e6de975ca7785cda596", "score": "0.5049615", "text": "func (api API) ListPlanGroups(cursor *Cursor) (*PlanGroups, error) {\n\tresult := &PlanGroups{}\n\tquery := make([]interface{}, 0, 1)\n\tif cursor != nil {\n\t\tquery = append(query, *cursor)\n\t}\n\treturn result, api.list(planGroupsEndpoint, result, query...)\n}", "title": "" }, { "docid": "10fab5666d780708c22e755818ef1dab", "score": "0.5044748", "text": "func (a GroupsAPI) ListMembers(groupName string) ([]models.PrincipalName, error) {\n\tvar membersResponse struct {\n\t\tMembers []models.PrincipalName `json:\"members,omitempty\" url:\"members,omitempty\"`\n\t}\n\n\tdata := struct {\n\t\tGroupName string `json:\"group_name,omitempty\" url:\"group_name,omitempty\"`\n\t}{\n\t\tgroupName,\n\t}\n\tresp, err := a.Client.performQuery(http.MethodGet, \"/groups/list-members\", data, nil)\n\tif err != nil {\n\t\treturn membersResponse.Members, err\n\t}\n\n\terr = json.Unmarshal(resp, &membersResponse)\n\treturn membersResponse.Members, err\n}", "title": "" }, { "docid": "73d41c45b8a1c7c53b0aa836bfde8102", "score": "0.5039733", "text": "func (secretsManager *SecretsManagerV1) ListSecretGroups(listSecretGroupsOptions *ListSecretGroupsOptions) (result *SecretGroupDef, response *core.DetailedResponse, err error) {\n\treturn secretsManager.ListSecretGroupsWithContext(context.Background(), listSecretGroupsOptions)\n}", "title": "" }, { "docid": "73d41c45b8a1c7c53b0aa836bfde8102", "score": "0.5039733", "text": "func (secretsManager *SecretsManagerV1) ListSecretGroups(listSecretGroupsOptions *ListSecretGroupsOptions) (result *SecretGroupDef, response *core.DetailedResponse, err error) {\n\treturn secretsManager.ListSecretGroupsWithContext(context.Background(), listSecretGroupsOptions)\n}", "title": "" }, { "docid": "8d9125e4c0d78769e486e3902e9e8c7f", "score": "0.50394624", "text": "func (c *Client) GetGroups() (g []*admin.Group, err error) {\n\tg = make([]*admin.Group, 0)\n\terr = c.service.Groups.List().Customer(\"my_customer\").Pages(context.TODO(), func(groups *admin.Groups) error {\n\t\tg = append(g, groups.Groups...)\n\t\treturn nil\n\t})\n\n\treturn\n}", "title": "" }, { "docid": "00ef2948cb522d4ec50228227b510b72", "score": "0.50392514", "text": "func (ug userGroupRepository) FindUserGroupsByUserIDs(ctx context.Context, userIDs []string) ([]*model.UserGroup, error) {\n\tvar items []*model.UserGroup\n\tif err := ug.Builder().Where(\"user_id IN UNNEST(@arg0)\", Params{\"arg0\": userIDs}).Query(ctx).Intos(&items); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "00e63e7e563f6c24c3817013ea28ccc5", "score": "0.50385034", "text": "func getGroupUsers(groupid string) (users []string) {\n\n\tvar user string\n\t//Connect to database\n\tdb := connectDatabase()\n\tdefer db.Close()\n\n\t//Prepare statment\n\tstmt, err := db.Prepare(`\n\t\tSELECT user_name \n\t\tFROM _group_user \n\t\tWHERE group_id = $1;`)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\trows, err := stmt.Query(groupid)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t//run through all the rows of the query\n\tfor rows.Next() {\n\t\trows.Scan(&user)\n\t\tusers = append(users, user)\n\t}\n\n\treturn users\n}", "title": "" }, { "docid": "b916067ff4b85dfc8f2222710f73ca6c", "score": "0.503661", "text": "func (e *GroupsService) List() (data GroupsListResult , err error) {\n\terr = e.client.magicRequestDecoder(\"GET\", \"groups\", nil, &data)\n\tfmt.Printf(\"chef/groups:List %v\\n\", data)\n\treturn\n}", "title": "" }, { "docid": "878c769b9d6dab85be9330b13a9e39bc", "score": "0.5034412", "text": "func (c LDAPClient) GetUserGroups(username string) (groups []string, err error) {\n\tquery := fmt.Sprintf(\"(member=cn=%s,%s)\", username, c.setting.UserBase)\n\tglog.V(1).Info(\"Find groups of user with query:\", query)\n\tattrs := []string{\"cn\"}\n\n\tresult, err := c.QueryLDAP(query, attrs, c.setting.GroupBase)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, entry := range result.Entries {\n\t\tgroups = append(groups, entry.GetAttributeValue(\"cn\"))\n\t}\n\treturn groups, nil\n}", "title": "" }, { "docid": "97f8e1ebd22acc18bc5267502c47c1d0", "score": "0.50255394", "text": "func (o AuthBackendUserTypeOutput) Groups() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v AuthBackendUserType) []string { return v.Groups }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "8ee68b0daa487c6de40a2a6197de55e1", "score": "0.50239867", "text": "func (u *HeaderUser) GetGroups() []string {\n\treturn u.Groups\n}", "title": "" }, { "docid": "368927605f4a3eb32e26def5e7bb2366", "score": "0.5022051", "text": "func (r repository) GetGroupsForUser(ctx context.Context, userId uint64) (*[]model.Group, error) {\n\trows, err := r.db.QueryContext(ctx, \"call get_user_membership(?)\", userId)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tvar groups []model.Group\n\n\tfor rows.Next() {\n\t\tvar group model.Group\n\t\tif err := rows.Scan(&group.Id, &group.Name); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tgroups = append(groups, group)\n\t}\n\n\treturn &groups, nil\n}", "title": "" }, { "docid": "939423e4e15e669b29e54c5dda146b36", "score": "0.50132173", "text": "func NewGroupsList() *GroupsList {\n\treturn &GroupsList{byId: make(map[SteamId]*Group)}\n}", "title": "" }, { "docid": "7407d3f2c6bdf002a2d828c149d099b8", "score": "0.49987978", "text": "func (v *VgroupService) ListVgroups() ([]Vgroup, error) {\n\n\treq, err := v.client.NewRequest(\"GET\", \"vgroup\", nil, nil)\n\tm := []Vgroup{}\n\t_, err = v.client.Do(req, &m, false)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn m, err\n}", "title": "" }, { "docid": "39544c365674d8032fe1c346a4fa9043", "score": "0.4977126", "text": "func GetGroups(client *flickr.FlickrClient, page int, perPage int) (*GetGroupsResponse, error) {\n\t// TODO impliment pagination\n\tclient.Init()\n\tclient.EndpointUrl = flickr.API_ENDPOINT\n\tclient.HTTPVerb = \"POST\"\n\n\tclient.Args.Set(\"method\", \"flickr.groups.pools.getGroups\")\n\tif page > 0 {\n\t\tclient.Args.Set(\"page\", strconv.Itoa(page))\n\t}\n\tif page > 0 {\n\t\tclient.Args.Set(\"per_page\", strconv.Itoa(perPage))\n\t}\n\tclient.OAuthSign()\n\tresponse := &GetGroupsResponse{}\n\terr := flickr.DoPost(client, response)\n\treturn response, err\n}", "title": "" }, { "docid": "322aab823836721c2e75c050de3aa968", "score": "0.49733278", "text": "func (s *Server) ListDashboardGroups(ctx context.Context, req *apipb.ListDashboardGroupsRequest) (*apipb.ListDashboardGroupsResponse, error) {\n\tc, err := s.getConfig(ctx, logrus.WithContext(ctx), req.GetScope())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tc.Mutex.RLock()\n\tdefer c.Mutex.RUnlock()\n\n\tvar resp apipb.ListDashboardGroupsResponse\n\tfor name := range c.Config.DashboardGroups {\n\t\trsc := apipb.Resource{\n\t\t\tName: name,\n\t\t\tLink: fmt.Sprintf(\"/dashboard-groups/%s%s\", config.Normalize(name), queryParams(req.GetScope())),\n\t\t}\n\t\tresp.DashboardGroups = append(resp.DashboardGroups, &rsc)\n\t}\n\n\tsort.SliceStable(resp.DashboardGroups, func(i, j int) bool {\n\t\treturn resp.DashboardGroups[i].Name < resp.DashboardGroups[j].Name\n\t})\n\n\treturn &resp, nil\n}", "title": "" }, { "docid": "01a787700197108582f4b387717cb42d", "score": "0.4971687", "text": "func (u User) GetMemberGroupsAsStrings(securityGroupsEnabeled bool, opts ...GetQueryOption) ([]string, error) {\n\tif u.graphClient == nil {\n\t\treturn nil, ErrNotGraphClientSourced\n\t}\n\treturn u.graphClient.getMemberGroups(u.ID, securityGroupsEnabeled, opts...)\n}", "title": "" }, { "docid": "089f347f4e271c5f11941c2670bb82c1", "score": "0.49696794", "text": "func (openldap *Client) GetGroupList(baseDN string) ([]string, error) {\n\n\t// Get Group List\n\tgroups, err := openldap.NewSearch(\"ou=groups,\"+baseDN, \"(&(objectClass=groupOfUniqueNames))\", \"cn\")\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to get groups. %s\", err)\n\t}\n\treturn groups, nil\n\n}", "title": "" }, { "docid": "9022238f17e64a652827ef1f967764b0", "score": "0.49341583", "text": "func (m *MySQL) ListGroups() ([]int64, error) {\n\tgroups := []int64{}\n\terr := m.conn.Select(&groups, \"SELECT distinct groupid FROM `interns`\")\n\treturn groups, err\n}", "title": "" }, { "docid": "dab8fdd1ab278b7de9281bb841f0367a", "score": "0.49202308", "text": "func (spgs *ServiceGroupService) GetServiceGroups() ([]ServiceGroup, error) {\n\tspgs.ServiceGroupRepos.OpenTransaction()\n\tserviceGroups, err := spgs.ServiceGroupRepos.GetServiceGroups()\n\treleaseConnection(spgs)\n\treturn serviceGroups, err\n}", "title": "" }, { "docid": "ff02d9a6541379765b7772a741e8e19a", "score": "0.49143136", "text": "func ListGroupRoles(cmd *cobra.Command, args []string) error {\n\n\tclient, err := auth.GetClient()\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Parse all flags\n\n\tvar group string\n\terr = flags.ParseFlag(cmd.Flags(), \"group\", &group)\n\tif err != nil {\n\t\treturn fmt.Errorf(`error parsing \"group\": ` + err.Error())\n\t}\n\n\tresp, err := client.IdentityService.ListGroupRoles(group)\n\tif err != nil {\n\t\treturn err\n\t}\n\tjsonx.Pprint(cmd, resp)\n\treturn nil\n}", "title": "" }, { "docid": "ecf6fa1af1fb62d67e5acef84a27a9ec", "score": "0.48941183", "text": "func (client *Client) GetGroups(filter string, top int, skip int) (*GetGroupsResponse, error) {\n\n\tqueryParams := url.Values{}\n\tif filter != \"\" {\n\t\tqueryParams.Add(\"$filter\", filter)\n\t}\n\tif top > 0 {\n\t\tqueryParams.Add(\"$top\", strconv.Itoa(top))\n\t}\n\tif skip > 0 {\n\t\tqueryParams.Add(\"$skip\", strconv.Itoa(skip))\n\t}\n\n\tvar respObj GetGroupsResponse\n\terr := client.doJSON(\"GET\", \"https://api.powerbi.com/v1.0/myorg/groups?\"+queryParams.Encode(), nil, &respObj)\n\n\treturn &respObj, err\n}", "title": "" }, { "docid": "ba145c77701c5769ca4ceceed72e2cdd", "score": "0.48841316", "text": "func (d *Dao) ListGroup(c context.Context) (res []*model.Group, err error) {\n\tvar rows *sql.Rows\n\tif rows, err = d.db.Query(c, _listGroup); err != nil {\n\t\terr = errors.Wrap(err, fmt.Sprintf(\"[dao.group|ListGroup] d.db.Query err: %v\", err))\n\t\treturn\n\t}\n\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tg := &model.Group{}\n\t\tif err = rows.Scan(&g.ID, &g.Name, &g.Desc); err != nil {\n\t\t\terr = errors.Wrap(err, fmt.Sprintf(\"[dao.group|ListGroup] d.db.Query err: %v\", err))\n\t\t\treturn\n\t\t}\n\t\tres = append(res, g)\n\t}\n\treturn\n}", "title": "" }, { "docid": "5e907120bc990f5cdaa2d86aad37a4db", "score": "0.4874523", "text": "func GetSecurityGroups(ctx context.Context, authURL, region string, credentials *resources.OpenstackCredentials, caBundle *x509.CertPool) ([]ossecuritygroups.SecGroup, error) {\n\tnetClient, err := getNetClient(ctx, authURL, region, credentials, caBundle)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"couldn't get auth client: %w\", err)\n\t}\n\n\tpage, err := ossecuritygroups.List(netClient, ossecuritygroups.ListOpts{}).AllPages()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to list security groups: %w\", err)\n\t}\n\tsecGroups, err := ossecuritygroups.ExtractGroups(page)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to extract security groups: %w\", err)\n\t}\n\treturn secGroups, nil\n}", "title": "" }, { "docid": "e79df28d8e3e1dca2bd6ae76628dcb7d", "score": "0.48741806", "text": "func (h *Handler) GetListUsers(w http.ResponseWriter, r *http.Request) {\n\n\tpageParameter := r.URL.Query().Get(\"page\")\n\tsizeParameter := r.URL.Query().Get(\"size\")\n\tminAgeParameter := r.URL.Query().Get(\"minAge\")\n\tmaxAgeParameter := r.URL.Query().Get(\"maxAge\")\n\tgenderParameter := r.URL.Query().Get(\"gender\")\n\n\tuserList, err := h.srv.GetListUsers(r.Context(), pageParameter, sizeParameter, minAgeParameter, maxAgeParameter, genderParameter)\n\tif err != nil {\n\t\trespond.JSON(w, http.StatusInternalServerError, h.em.InvalidValue.Request)\n\t\treturn\n\t}\n\n\trespond.JSON(w, http.StatusOK, userList)\n}", "title": "" }, { "docid": "ed2920c93663abfba7afca1476fe2832", "score": "0.48717952", "text": "func ListUsers() (*o7tapiuser.UserList, error) {\n\treturn O7tClient.userClient.Users().List(listOptions)\n}", "title": "" }, { "docid": "e017ea5cb2ee71247b6f96a06c71acd2", "score": "0.4863486", "text": "func ListUsers() ([]*User, error) {\n\td, err := db.Connect(nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsql := `\n\tSELECT user_id, username, email, metadata\n\tFROM users\n\tORDER BY user_id asc\n\t`\n\trows, err := d.Query(sql)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tusers, err := usersFromRows(rows)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err := rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn users, nil\n}", "title": "" }, { "docid": "cb1ef48937ce8448daf45521ed18e34f", "score": "0.4858622", "text": "func GetSecurityGroups(cli *Client, appName string, result interface{}) error {\n\tdata := &[]struct {\n\t\tResults interface{} `json:\"results\"`\n\t}{{\n\t\tResults: result,\n\t}}\n\treturn commonParsedGet(cli, fmt.Sprintf(\"/search?pageSize=500&q=%s&type=securityGroups\", appName), &data)\n}", "title": "" } ]
e67146687c0569eeabca385a0806925e
IDGTE applies the GTE predicate on the ID field.
[ { "docid": "a287267f01a46544e41b9613b9a42c5a", "score": "0.809761", "text": "func IDGTE(id int) predicate.Diagnosis {\n\treturn predicate.Diagnosis(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" } ]
[ { "docid": "dfe0a716f85d3545dff492f1a92d0405", "score": "0.8395501", "text": "func IDGTE(id int) predicate.Transactionfactor {\n\treturn predicate.Transactionfactor(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "001f9a6f87bcbf793c272ab46ea4613e", "score": "0.8344896", "text": "func IDGTE(id int) predicate.Complaint {\n\treturn predicate.Complaint(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "f89e82f85f36c69bec87545b9f7c6834", "score": "0.83422554", "text": "func IDGTE(id int64) predicate.GrpcRule {\n\treturn predicate.GrpcRule(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "9aaa94236eff7a1084a67ea99daa7839", "score": "0.83304834", "text": "func IDGTE(id int) predicate.Rental {\n\treturn predicate.Rental(sql.FieldGTE(FieldID, id))\n}", "title": "" }, { "docid": "ecb55ba233fd90ccf3b6e6c3217cbf0b", "score": "0.83135015", "text": "func IDGTE(id int) predicate.Antenatalinformation {\n\treturn predicate.Antenatalinformation(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "7ec333584150f9bc71a01bc5b81eedb9", "score": "0.830466", "text": "func IDGTE(id int) predicate.Card {\n\treturn predicate.Card(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "d89603e3b2040f5029909f24bfff496e", "score": "0.8291731", "text": "func IDGTE(id int) predicate.Auth {\n\treturn predicate.Auth(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "09e90ce7e93dc128735282957c97fc44", "score": "0.82896686", "text": "func IDGTE(id int) predicate.Logexport {\n\treturn predicate.Logexport(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "ba8175436635f05aa402396161bceb30", "score": "0.8289504", "text": "func IDGTE(id int) predicate.Transaction {\n\treturn predicate.Transaction(\n\t\tfunc(s *sql.Selector) {\n\t\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t\t},\n\t)\n}", "title": "" }, { "docid": "fb58d0107e40c50c830248202521e329", "score": "0.8285229", "text": "func IDGTE(id int) predicate.Dispense {\n\treturn predicate.Dispense(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "a7af07075e7a5afccf598a86d769f82f", "score": "0.82760704", "text": "func IDGTE(id string) predicate.UserActiveRecord {\n\treturn predicate.UserActiveRecord(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "2eb463661304b7ca3adec9bb78010794", "score": "0.82726586", "text": "func IDGTE(id uuid.UUID) predicate.Blob {\n\treturn predicate.Blob(sql.FieldGTE(FieldID, id))\n}", "title": "" }, { "docid": "9de4ecc5b4b854d457d67fbed9851334", "score": "0.82623905", "text": "func IDGTE(id int) predicate.Pointpendingkyctransaction {\n\treturn predicate.Pointpendingkyctransaction(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "b57f6ed617541fcc84960166bfd33071", "score": "0.82507426", "text": "func IDGTE(id int) predicate.Hex {\n\treturn predicate.Hex(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "9e63fc83bc1b0076831df242af9ee1ae", "score": "0.8248516", "text": "func IDGTE(id int) predicate.Task {\n\treturn predicate.Task(sql.FieldGTE(FieldID, id))\n}", "title": "" }, { "docid": "1b0af456485dcb7854d49d2933f81619", "score": "0.8243432", "text": "func IDGTE(id uuid.UUID) predicate.Entity {\n\treturn predicate.Entity(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "3b32800d8bbb15c9f8deef3133a7a02a", "score": "0.8239231", "text": "func IDGTE(id uuid.UUID) predicate.Transaction {\n\treturn predicate.Transaction(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "c6919d513ba84b4769876712343ef846", "score": "0.822985", "text": "func IDGTE(id int) predicate.Insurance {\n\treturn predicate.Insurance(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "934e0b94fc4ad21eb3c70687a3a4541c", "score": "0.8228057", "text": "func IDGTE(id uuid.UUID) predicate.Answer {\n\treturn predicate.Answer(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "940685dfb5f45413a8e6b25a2d41db46", "score": "0.82221335", "text": "func IDGTE(id int) predicate.DetectionJob {\n\treturn predicate.DetectionJob(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "5fcfda09a9067b6cbd59fd49e91dc280", "score": "0.82213783", "text": "func IDGTE(id int) predicate.Disease {\n\treturn predicate.Disease(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "6cdba4f43eafe7866d592fa00b2ee4d7", "score": "0.82081765", "text": "func IDGTE(id uuid.UUID) predicate.Flow {\n\treturn predicate.Flow(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "60ff5d2262751b1e2d62096d43942253", "score": "0.8202152", "text": "func IDGTE(id int) predicate.Purpose {\n\treturn predicate.Purpose(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "c8a7dfa9b4cf93dfa5173cfe2bff017b", "score": "0.81997395", "text": "func IDGTE(id int) predicate.UserExtend {\n\treturn predicate.UserExtend(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "03bbb56e20a1517b0b1b8bd77a7be35f", "score": "0.8195573", "text": "func IDGTE(id string) predicate.LocationType {\n\treturn predicate.LocationType(func(s *sql.Selector) {\n\t\tid, _ := strconv.Atoi(id)\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t},\n\t)\n}", "title": "" }, { "docid": "4d07193512abac19a4206d3aa9008e29", "score": "0.8192216", "text": "func IDGTE(id int) predicate.Application {\n\treturn predicate.Application(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "13e2c735342bac68555607578e1b7b89", "score": "0.8192003", "text": "func IDGTE(id int) predicate.Agenttype {\n\treturn predicate.Agenttype(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "57df2a62e60e077aea1ebb196462d2d5", "score": "0.818756", "text": "func IDGTE(id int) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "57df2a62e60e077aea1ebb196462d2d5", "score": "0.818756", "text": "func IDGTE(id int) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "57df2a62e60e077aea1ebb196462d2d5", "score": "0.818756", "text": "func IDGTE(id int) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "b0c9a2e03ea21347a3032d4125b20a29", "score": "0.81826943", "text": "func IDGTE(id int) predicate.Car {\n\treturn predicate.Car(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "dbe7187fbb268934bf74fb5deab42b16", "score": "0.81786424", "text": "func IDGTE(id int) predicate.OutcomeMeasure {\n\treturn predicate.OutcomeMeasure(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "96c5c42ea300212900ab94917e860ebe", "score": "0.81769246", "text": "func IDGTE(id uuid.UUID) predicate.File {\n\treturn predicate.File(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "8646438cf16efe4f0690a168e0f421b3", "score": "0.817676", "text": "func IDGTE(id int) predicate.Vehicle {\n\treturn predicate.Vehicle(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "8646438cf16efe4f0690a168e0f421b3", "score": "0.817676", "text": "func IDGTE(id int) predicate.Vehicle {\n\treturn predicate.Vehicle(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "4c49e8a893bd038f2e52034e3aa4fa44", "score": "0.817005", "text": "func IDGTE(id int) predicate.Subject {\n\treturn predicate.Subject(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "319e30adbd1cd5cf0560ddd0a5478e51", "score": "0.8164352", "text": "func IDGTE(id string) predicate.APIAudit {\n\treturn predicate.APIAudit(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "8ea5234cb7511281832cf6683d6a8b0d", "score": "0.8147298", "text": "func IDGTE(id int) predicate.Metric {\n\treturn predicate.Metric(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "20c47221576ff416ab124c8e745c1f7b", "score": "0.8143421", "text": "func IDGTE(id int) predicate.Machine {\n\treturn predicate.Machine(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "2d73bcd006196ba2cd133f6d59f1bc59", "score": "0.8136932", "text": "func IDGTE(id int) predicate.Branch {\n\treturn predicate.Branch(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "d98fe7f72db78c079c606fe6ce28c211", "score": "0.81303436", "text": "func IDGTE(id uuid.UUID) predicate.Entry {\n\treturn predicate.Entry(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "74254b61e57ce2eb292f150b415cd418", "score": "0.8122926", "text": "func IDGTE(id string) predicate.DChat {\n\treturn predicate.DChat(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "7a4b054c0d3ab2640170c38eed8d1369", "score": "0.8105625", "text": "func IDGTE(id int) predicate.Orderproduct {\n\treturn predicate.Orderproduct(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "ea3c36f826e48f19add8780d4fabef98", "score": "0.8104962", "text": "func IDGTE(id int) predicate.Cleaningroom {\n\treturn predicate.Cleaningroom(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "1a83c6a96d5e81af9aacd6652b2887f4", "score": "0.8100662", "text": "func IDGTE(id int) predicate.Lessonplan {\n\treturn predicate.Lessonplan(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "e7b8313873ad0686134ba64e2f70d9c9", "score": "0.80897665", "text": "func IDGTE(id int) predicate.Source {\n\treturn predicate.Source(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "76eb809602fc33c855b0ffcb5717e005", "score": "0.80844146", "text": "func IDGTE(id string) predicate.CheckListItem {\n\treturn predicate.CheckListItem(func(s *sql.Selector) {\n\t\tid, _ := strconv.Atoi(id)\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t},\n\t)\n}", "title": "" }, { "docid": "fd35991940eebfe4dde964856ceb9d4c", "score": "0.8083236", "text": "func IDGTE(id int) predicate.Address {\n\treturn predicate.Address(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "7bee59672d62f1608d01fdbe3e595bf7", "score": "0.8077765", "text": "func IDGTE(id int) predicate.Financial {\n\treturn predicate.Financial(sql.FieldGTE(FieldID, id))\n}", "title": "" }, { "docid": "f6dbeaa9c9c35f8d4c7d81f90511c1b8", "score": "0.8075412", "text": "func IDGTE(id int) predicate.Course {\n\treturn predicate.Course(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "66850abf9a4949efe88b778250d01ab5", "score": "0.80725956", "text": "func IDGTE(id int) predicate.FlowAchievement {\n\treturn predicate.FlowAchievement(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "86a570bf3dd0e72f2ecbc78c4109eee4", "score": "0.8069302", "text": "func IDGTE(id int) predicate.Bill {\n\treturn predicate.Bill(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "86a570bf3dd0e72f2ecbc78c4109eee4", "score": "0.8069302", "text": "func IDGTE(id int) predicate.Bill {\n\treturn predicate.Bill(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "1857b191bd374ddb706a9e40faf1c7fd", "score": "0.80606145", "text": "func IDGTE(id int) predicate.Tokens {\n\treturn predicate.Tokens(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "6bbaab7fc89878edd7a213c573d9e073", "score": "0.8050124", "text": "func IDGTE(id int) predicate.Slot {\n\treturn predicate.Slot(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "fc25d1edc52a4b9c8748a919dafd716e", "score": "0.8046812", "text": "func IDGTE(id int) predicate.CarCheckInOut {\n\treturn predicate.CarCheckInOut(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "934036099128e7b73f38bf3b44580574", "score": "0.8042647", "text": "func IDGTE(id int) predicate.Detail {\n\treturn predicate.Detail(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "b573679ab8811d94be6be53e3adf8510", "score": "0.8022404", "text": "func IDGTE(id int) predicate.Clubapplication {\n\treturn predicate.Clubapplication(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "ce792ee8fe307f59290b5b5c21df4530", "score": "0.8017893", "text": "func IDGTE(id int) predicate.Consumer {\n\treturn predicate.Consumer(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "0fb8078f6931314782b630c07a4d0cdd", "score": "0.8016671", "text": "func IDGTE(id string) predicate.Session {\n\treturn predicate.Session(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "d567d140dd06c22570202198bca7f30c", "score": "0.8015301", "text": "func IDGTE(id int) predicate.Student {\n\treturn predicate.Student(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "e9d2fdd3efc46db71838551f85b5bbd5", "score": "0.799686", "text": "func IDGTE(id int) predicate.BankItem {\n\treturn predicate.BankItem(\n\t\tfunc(s *sql.Selector) {\n\t\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t\t},\n\t)\n}", "title": "" }, { "docid": "f793b727695f8aeb5a7bb864b5ab3ad1", "score": "0.7985379", "text": "func IDGTE(id int) predicate.BaselineDenomCount {\n\treturn predicate.BaselineDenomCount(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "06e1848ff0f3f73d5cfc4dd193d33009", "score": "0.7981382", "text": "func IDGTE(id int) predicate.EntityTaxInformation {\n\treturn predicate.EntityTaxInformation(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "c371d81dcd787063c498dc9f46963831", "score": "0.79513556", "text": "func IDGTE(id uuid.UUID) predicate.Contact {\n\treturn predicate.Contact(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "c7b4892c323790f2a518e6d81de8caa3", "score": "0.79466534", "text": "func IDGTE(id int) predicate.Restaurant {\n\treturn predicate.Restaurant(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "e586a75bfa166be9d8ea2aee24f0734a", "score": "0.7944682", "text": "func IDGTE(id int) predicate.OutcomeClassDenomCount {\n\treturn predicate.OutcomeClassDenomCount(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "69edd8e81ad1180af8526b06f430130a", "score": "0.794309", "text": "func IDGTE(id int) predicate.Metrics {\n\treturn predicate.Metrics(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "eebb95be402276f551b5f95dc9b636d8", "score": "0.7921525", "text": "func IDGTE(id int) predicate.Educationlevel {\n\treturn predicate.Educationlevel(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "162f00af80d55347df858309caa15536", "score": "0.79129034", "text": "func IDGTE(id int) predicate.AdverseEventsModule {\n\treturn predicate.AdverseEventsModule(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "f504033bb1553289f047751d32168a5d", "score": "0.7904865", "text": "func IDGTE(id int) predicate.DeviceToken {\n\treturn predicate.DeviceToken(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "29bb4f3e7e47114030e8e44da831770f", "score": "0.7902519", "text": "func IDGTE(id int) predicate.Bookborrow {\n\treturn predicate.Bookborrow(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "3acea5d1fff7b0305dcea644031462a3", "score": "0.7900648", "text": "func IDGTE(id int) predicate.Comment {\n\treturn predicate.Comment(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "3acea5d1fff7b0305dcea644031462a3", "score": "0.7900648", "text": "func IDGTE(id int) predicate.Comment {\n\treturn predicate.Comment(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "b655e2aa592378a153fff3f5c83e038e", "score": "0.78928876", "text": "func IDGTE(id int) predicate.Employee {\n\treturn predicate.Employee(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "8a3dfae4cd83fae8d7f7fade2c1082d0", "score": "0.7887506", "text": "func IDGTE(id int) predicate.RepairInvoice {\n\treturn predicate.RepairInvoice(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "f680fcd02190e0da37153c6dc1895657", "score": "0.7871552", "text": "func IDGTE(id int) predicate.Contact {\n\treturn predicate.Contact(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "a00c039f4ee463de000a82142378861c", "score": "0.78415394", "text": "func IDGTE(id string) predicate.FieldType {\n\treturn predicate.FieldType(func(t *dsl.Traversal) {\n\t\tt.HasID(p.GTE(id))\n\t})\n}", "title": "" }, { "docid": "9e2a280ac4a08976aa2d07c44b75738e", "score": "0.78190124", "text": "func IDGTE(id int) predicate.Scholarshipinformation {\n\treturn predicate.Scholarshipinformation(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "bc3db59eb552b5ff831fb34c15190ca3", "score": "0.7816733", "text": "func IDGTE(id int) predicate.OtherEvent {\n\treturn predicate.OtherEvent(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "9f5595de644389f0ea38296a71e93c02", "score": "0.7798869", "text": "func IDGTE(id int) predicate.Roominfo {\n\treturn predicate.Roominfo(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "a5288387e07775e696b7358ddff075e3", "score": "0.7782022", "text": "func IDGTE(id int) predicate.OrderAddress {\n\treturn predicate.OrderAddress(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "19e806acd95224246ddc7d26ba829249", "score": "0.776978", "text": "func IDGTE(id int) predicate.Payment {\n\treturn predicate.Payment(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "4de510a5188e5066f3d2f21daa380a2b", "score": "0.77549314", "text": "func IDGTE(id int) predicate.UserRole {\n\treturn predicate.UserRole(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "cd6d97700e2976dd7108c6d9433547e3", "score": "0.7740877", "text": "func IDGTE(id string) predicate.SurveyWiFiScan {\n\treturn predicate.SurveyWiFiScan(func(s *sql.Selector) {\n\t\tid, _ := strconv.Atoi(id)\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t},\n\t)\n}", "title": "" }, { "docid": "195634cc1342737cf264f288205b5cb2", "score": "0.7708089", "text": "func IDGTE(id int64) predicate.CustomerFollow {\n\treturn predicate.CustomerFollow(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "94c947159490c5d6ee0ba550a311907f", "score": "0.7686932", "text": "func IDGTE(id int) predicate.Year {\n\treturn predicate.Year(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "46ee0d1e03351fbf86bd359554063eb6", "score": "0.76864624", "text": "func IDGTE(id uint32) predicate.Drop {\n\treturn predicate.Drop(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "0a467e524d24deb79fa7b3c1b4cecb6e", "score": "0.763063", "text": "func IDGTE(id int) predicate.IPAddress {\n\treturn predicate.IPAddress(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "b11989d31b23a0483d46a465fdb0fdee", "score": "0.76087046", "text": "func IDGTE(id int) predicate.NetTopologyDeviceMap {\n\treturn predicate.NetTopologyDeviceMap(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "f8cf9e1c4a7e63df04f12edc18a9eed3", "score": "0.75918907", "text": "func IDGTE(id int) predicate.Company {\n\treturn predicate.Company(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "d43e35d078ab3264452c4c51cac231b3", "score": "0.7546118", "text": "func IDGTE(id int) predicate.FlowMilestone {\n\treturn predicate.FlowMilestone(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "6b99bddbf97f59a5e6da25733e95876d", "score": "0.7515567", "text": "func IDGTE(id int) predicate.Referrer {\n\treturn predicate.Referrer(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "fda11e7a20433b9ea456ea0faf260d01", "score": "0.7455499", "text": "func IDGTE(id int) predicate.CompanyUser {\n\treturn predicate.CompanyUser(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "544f26296d0ae91b50fa208333f9c6d3", "score": "0.7381505", "text": "func IDGTE(id int) predicate.BlogPost {\n\treturn predicate.BlogPost(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "0829b12f44796bf1a9cc3f36ac72561d", "score": "0.73358154", "text": "func IDGTE(id int) predicate.CustomerAddress {\n\treturn predicate.CustomerAddress(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "edb8f1a9932f63c3be8a4e847860ea63", "score": "0.73299956", "text": "func TaxIdGTE(v string) predicate.EntityTaxInformation {\n\treturn predicate.EntityTaxInformation(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldTaxId), v))\n\t})\n}", "title": "" }, { "docid": "14e419b3fe8c4ae03623764f4cf22c31", "score": "0.72859806", "text": "func IDNumberGTE(v string) predicate.UserExtend {\n\treturn predicate.UserExtend(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldIDNumber), v))\n\t})\n}", "title": "" }, { "docid": "d52693676aae04845c46ad7c59ffea9b", "score": "0.72405106", "text": "func OptionIDGTE(v string) predicate.Answer {\n\treturn predicate.Answer(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldOptionID), v))\n\t})\n}", "title": "" }, { "docid": "ff166e8819e6ddb50599a1cd69b87a03", "score": "0.7214218", "text": "func ObjectIDGTE(v uint32) predicate.Drop {\n\treturn predicate.Drop(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldObjectID), v))\n\t})\n}", "title": "" } ]
055650d17176c34167911499af58af77
HashD Computa l'hash 256bit di un oggetto
[ { "docid": "86456ee1e34c5950384ae69ca1846caf", "score": "0.69346344", "text": "func HashD(data []byte) []byte {\n\thasher := sha256.New()\n\thasher.Write(data)\n\thash := hasher.Sum(nil)\n\thasher.Reset()\n\thasher.Write(hash)\n\treturn hasher.Sum(nil)\n}", "title": "" } ]
[ { "docid": "7450fc05368eadec7c4a05d39861c2ae", "score": "0.717006", "text": "func Hash128(k0, k1 uint64, b []byte) (uint64, uint64)", "title": "" }, { "docid": "d5c2b0896d0c6e2843951c9a4b433b9e", "score": "0.7131294", "text": "func aeshash(p unsafe.Pointer, h, s uintptr) uintptr", "title": "" }, { "docid": "45d3b5eb59622a08127f2bbed013291d", "score": "0.7051852", "text": "func aeshash(p unsafe.Pointer, h uintptr) uintptr", "title": "" }, { "docid": "cdfd72b4f05c6886d00249484d6eefce", "score": "0.70035315", "text": "func aeshash64(p unsafe.Pointer, h uintptr) uintptr", "title": "" }, { "docid": "695f921f5ce4dfdd0f1ae060642b016a", "score": "0.69849825", "text": "func Hash(k0, k1 uint64, b []byte) uint64", "title": "" }, { "docid": "3a22f226b07bdb3fbe3a878f954285b7", "score": "0.68775725", "text": "func d2h(val uint64) (result *Key) {\n\tresult = new(Key)\n\tfor i := 0; val > 0; i++ {\n\t\tresult[i] = byte(val & 0xFF)\n\t\tval /= 256\n\t}\n\treturn\n}", "title": "" }, { "docid": "5cc1eb66b90087f2b178f3c75bc40577", "score": "0.6688827", "text": "func Hash(b []byte, seed uint64) uint64", "title": "" }, { "docid": "a8a7a0b085c2acfe5b64fc75e6b2350d", "score": "0.6683232", "text": "func chameleonHash(\n hk *[]byte,\n p *[]byte,\n q *[]byte,\n g *[]byte,\n message *[]byte,\n r *[]byte,\n s *[]byte,\n hashOut *[]byte,\n) {\n hkeBig := new(big.Int)\n gsBig := new(big.Int)\n tmpBig := new(big.Int)\n eBig := new(big.Int)\n pBig := new(big.Int)\n qBig := new(big.Int)\n gBig := new(big.Int)\n rBig := new(big.Int)\n sBig := new(big.Int)\n hkBig := new(big.Int)\n hBig := new(big.Int)\n\n // Converting from hex to bigInt\n pBig.SetString(string(*p), 16)\n qBig.SetString(string(*q), 16)\n gBig.SetString(string(*g), 16)\n hkBig.SetString(string(*hk), 16)\n rBig.SetString(string(*r), 16)\n sBig.SetString(string(*s), 16)\n\n\n // Generate the hashOut with message || rBig\n hash := sha256.New()\n hash.Write([]byte(*message))\n hash.Write([]byte(fmt.Sprintf(\"%x\", rBig)))\n\n eBig.SetBytes(hash.Sum(nil))\n\n hkeBig.Exp(hkBig, eBig, pBig)\n gsBig.Exp(gBig, sBig, pBig)\n tmpBig.Mul(hkeBig, gsBig)\n tmpBig.Mod(tmpBig, pBig)\n hBig.Sub(rBig, tmpBig)\n hBig.Mod(hBig, qBig)\n\n *hashOut = hBig.Bytes() // Return hBig in big endian encoding as string\n}", "title": "" }, { "docid": "a4056c606329e0f40e11cbcb98b2a791", "score": "0.6557034", "text": "func bytesHash(b []byte, seed uintptr) uintptr", "title": "" }, { "docid": "c23c034f29cd4cc06bf862e06ba74e6f", "score": "0.65513605", "text": "func sha256d(data []byte) [sha256.Size]byte {\n\thash := sha256.Sum256(data)\n\treturn sha256.Sum256(hash[:])\n}", "title": "" }, { "docid": "0ae3db7a4b8310267796b959f77bd2e6", "score": "0.65386397", "text": "func sha256_(args ...interface{}) ([]byte) {// todo sha256\n h := sha256.New()\n var a []byte\n h.Write(a)\n return h.Sum(nil)\n}", "title": "" }, { "docid": "43aa7bdba5a757f91917824d0b16ef61", "score": "0.6534281", "text": "func int64Hash(i uint64, seed uintptr) uintptr", "title": "" }, { "docid": "c94449cd265331949211626afadd17ec", "score": "0.6521826", "text": "func hash(data []byte) string {\n\tdigest := sha256.New()\n\tdigest.Write(data)\n\tkey := digest.Sum(nil)\n\treturn hex.EncodeToString(key)\n}", "title": "" }, { "docid": "ea1b0601c065c3f5e38509f060459902", "score": "0.65116924", "text": "func hash(t [32]byte) int {\n\th := 0\n\tfor i := 0; i < 32; i++ {\n\t\th *= 256\n\t\th += int(t[i])\n\t\th %= ArrayLength\n\t}\n\treturn h\n}", "title": "" }, { "docid": "95aaf1620741753620a9e20f550c444d", "score": "0.6510813", "text": "func Hash128(in []byte, seed uint64) (uint64, uint64) {\n hash1, hash2 := uint64(seed), uint64(seed)\n hash3, hash4 := SpookyHash128(in, hash1, hash2)\n return hash3, hash4\n}", "title": "" }, { "docid": "e0c937bbad01cbd6ac081e4cf6e5e662", "score": "0.64808923", "text": "func memhash(p unsafe.Pointer, h, s uintptr) uintptr", "title": "" }, { "docid": "e0c937bbad01cbd6ac081e4cf6e5e662", "score": "0.64808923", "text": "func memhash(p unsafe.Pointer, h, s uintptr) uintptr", "title": "" }, { "docid": "b7955e8c7c63aaef1ca533808d18111c", "score": "0.6468228", "text": "func BasicBytesHash(bytes []byte) int {\n\tconst prime = 0x01000193\n\tvar val = 0x811c9dc5\n\n\tfor _, n := range bytes {\n\t\tval *= prime\n\t\tval ^= int(n)\n\t}\n\n\tif val < 0 {\n\t\tval = -val\n\t}\n\n\treturn val\n}", "title": "" }, { "docid": "a094c3d6ca6f1b54dbeed91fdd9f0594", "score": "0.64671963", "text": "func (h *Hasher) Hash(d []byte) linalg.Vector {\n\tts := rnn.Runner{Block: h.Block}\n\tlast := ts.StepTime(make(linalg.Vector, 0x100))\n\tfor _, x := range d {\n\t\tv := make(linalg.Vector, 0x100)\n\t\tv[x] = 1\n\t\tlast = ts.StepTime(v)\n\t}\n\treturn last\n}", "title": "" }, { "docid": "08f37d517201beea1c492bcc8bc034e9", "score": "0.6465539", "text": "func (d *CreateDeposit) Hash() hash.Hash32B { return blake2b.Sum256(d.ByteStream()) }", "title": "" }, { "docid": "79ee2393cb5cae08d0ba9c100d786b1d", "score": "0.6445124", "text": "func Hash(data []byte) Digest { panic(\"\") }", "title": "" }, { "docid": "2c42f8a55feaad2266ed97daea2f7aa9", "score": "0.64358675", "text": "func feToBytes(s *[32]byte, h *fieldElement) {\n\tvar carry [10]int32\n\n\tq := (19*h[9] + (1 << 24)) >> 25\n\tq = (h[0] + q) >> 26\n\tq = (h[1] + q) >> 25\n\tq = (h[2] + q) >> 26\n\tq = (h[3] + q) >> 25\n\tq = (h[4] + q) >> 26\n\tq = (h[5] + q) >> 25\n\tq = (h[6] + q) >> 26\n\tq = (h[7] + q) >> 25\n\tq = (h[8] + q) >> 26\n\tq = (h[9] + q) >> 25\n\n\t// Goal: Output h-(2^255-19)q, which is between 0 and 2^255-20.\n\th[0] += 19 * q\n\t// Goal: Output h-2^255 q, which is between 0 and 2^255-20.\n\n\tcarry[0] = h[0] >> 26\n\th[1] += carry[0]\n\th[0] -= carry[0] << 26\n\tcarry[1] = h[1] >> 25\n\th[2] += carry[1]\n\th[1] -= carry[1] << 25\n\tcarry[2] = h[2] >> 26\n\th[3] += carry[2]\n\th[2] -= carry[2] << 26\n\tcarry[3] = h[3] >> 25\n\th[4] += carry[3]\n\th[3] -= carry[3] << 25\n\tcarry[4] = h[4] >> 26\n\th[5] += carry[4]\n\th[4] -= carry[4] << 26\n\tcarry[5] = h[5] >> 25\n\th[6] += carry[5]\n\th[5] -= carry[5] << 25\n\tcarry[6] = h[6] >> 26\n\th[7] += carry[6]\n\th[6] -= carry[6] << 26\n\tcarry[7] = h[7] >> 25\n\th[8] += carry[7]\n\th[7] -= carry[7] << 25\n\tcarry[8] = h[8] >> 26\n\th[9] += carry[8]\n\th[8] -= carry[8] << 26\n\tcarry[9] = h[9] >> 25\n\th[9] -= carry[9] << 25\n\t// h10 = carry9\n\n\t// Goal: Output h[0]+...+2^255 h10-2^255 q, which is between 0 and 2^255-20.\n\t// Have h[0]+...+2^230 h[9] between 0 and 2^255-1;\n\t// evidently 2^255 h10-2^255 q = 0.\n\t// Goal: Output h[0]+...+2^230 h[9].\n\n\ts[0] = byte(h[0] >> 0)\n\ts[1] = byte(h[0] >> 8)\n\ts[2] = byte(h[0] >> 16)\n\ts[3] = byte((h[0] >> 24) | (h[1] << 2))\n\ts[4] = byte(h[1] >> 6)\n\ts[5] = byte(h[1] >> 14)\n\ts[6] = byte((h[1] >> 22) | (h[2] << 3))\n\ts[7] = byte(h[2] >> 5)\n\ts[8] = byte(h[2] >> 13)\n\ts[9] = byte((h[2] >> 21) | (h[3] << 5))\n\ts[10] = byte(h[3] >> 3)\n\ts[11] = byte(h[3] >> 11)\n\ts[12] = byte((h[3] >> 19) | (h[4] << 6))\n\ts[13] = byte(h[4] >> 2)\n\ts[14] = byte(h[4] >> 10)\n\ts[15] = byte(h[4] >> 18)\n\ts[16] = byte(h[5] >> 0)\n\ts[17] = byte(h[5] >> 8)\n\ts[18] = byte(h[5] >> 16)\n\ts[19] = byte((h[5] >> 24) | (h[6] << 1))\n\ts[20] = byte(h[6] >> 7)\n\ts[21] = byte(h[6] >> 15)\n\ts[22] = byte((h[6] >> 23) | (h[7] << 3))\n\ts[23] = byte(h[7] >> 5)\n\ts[24] = byte(h[7] >> 13)\n\ts[25] = byte((h[7] >> 21) | (h[8] << 4))\n\ts[26] = byte(h[8] >> 4)\n\ts[27] = byte(h[8] >> 12)\n\ts[28] = byte((h[8] >> 20) | (h[9] << 6))\n\ts[29] = byte(h[9] >> 2)\n\ts[30] = byte(h[9] >> 10)\n\ts[31] = byte(h[9] >> 18)\n}", "title": "" }, { "docid": "108d94da49fc53596a9056877e81447c", "score": "0.64291334", "text": "func hash(key string) uint32 {\n\tvar h uint32\n\tfor _, c := range key {\n\t\th += uint32(c)\n\t\th += (h << 10)\n\t\th ^= (h >> 6)\n\t}\n\th += (h << 3)\n\th ^= (h >> 11)\n\th += (h << 15)\n\treturn h\n}", "title": "" }, { "docid": "d794e990ec4d01d012eaf955ed1e9f5e", "score": "0.64217716", "text": "func leveldbHash(b []byte) uint32 {\n\n\tconst (\n\t\tseed = 0xbc9f1d34\n\t\tm = 0xc6a4a793\n\t)\n\n\th := uint32(seed) ^ uint32(len(b)*m)\n\n\tfor ; len(b) >= 4; b = b[4:] {\n\n\t\th += uint32(b[0]) | uint32(b[1])<<8 | uint32(b[2])<<16 | uint32(b[3])<<24\n\t\th *= m\n\t\th ^= h >> 16\n\t}\n\tswitch len(b) {\n\tcase 3:\n\t\th += uint32(b[2]) << 16\n\t\tfallthrough\n\tcase 2:\n\t\th += uint32(b[1]) << 8\n\t\tfallthrough\n\tcase 1:\n\t\th += uint32(b[0])\n\t\th *= m\n\t\th ^= h >> 24\n\t}\n\n\treturn h\n}", "title": "" }, { "docid": "e477610ae4b8d569e2cc872f5fd8171f", "score": "0.64170355", "text": "func int32Hash(i uint32, seed uintptr) uintptr", "title": "" }, { "docid": "d42d4573e6a2c2de267d4a835a979a09", "score": "0.64130133", "text": "func deriveHashBytes(object []byte) uint64 {\n\tif object == nil {\n\t\treturn 0\n\t}\n\th := uint64(17)\n\tfor i := 0; i < len(object); i++ {\n\t\th = 31*h + uint64(object[i])\n\t}\n\treturn h\n}", "title": "" }, { "docid": "948fb7d1f76803485b8e969342f3be30", "score": "0.6399147", "text": "func (f *Filter) hash(data []byte) [2]uint64 {\n\tv1 := xxhash.Sum64(data)\n\tvar v2 uint64\n\tif len(data) > 0 {\n\t\tb := data[len(data)-1] // We'll put the original byte back.\n\t\tdata[len(data)-1] = byte(0)\n\t\tv2 = xxhash.Sum64(data)\n\t\tdata[len(data)-1] = b\n\t}\n\treturn [2]uint64{v1, v2}\n}", "title": "" }, { "docid": "a1997fc8b77a0066c4bc471c3e4fc9e1", "score": "0.63919795", "text": "func hash(s string) string {\n\thash := fnv.New32a()\n\thash.Write([]byte(s))\n\tintHash := hash.Sum32()\n\tresult := fmt.Sprintf(\"%08x\", intHash)\n\treturn result\n}", "title": "" }, { "docid": "a1997fc8b77a0066c4bc471c3e4fc9e1", "score": "0.63919795", "text": "func hash(s string) string {\n\thash := fnv.New32a()\n\thash.Write([]byte(s))\n\tintHash := hash.Sum32()\n\tresult := fmt.Sprintf(\"%08x\", intHash)\n\treturn result\n}", "title": "" }, { "docid": "281da29091b08fc847cbec579b083907", "score": "0.6390614", "text": "func (srh *SybilResistanceHandler)createHash(nodeID string) []byte{\n\tbs := []byte(nodeID)\n\thasher := sha256.New()\n\thasher.Write(bs)\n\treturn hasher.Sum(nil)\n}", "title": "" }, { "docid": "c3a32b6c24f9773148628f2fca3493bc", "score": "0.6382267", "text": "func SpookyHash128(in []byte, hash1, hash2 uint64) (uint64, uint64) {\n b := make([]byte, 96, 96)\n length := len(in)\n if (length < sc_bufSize) {\n h1, h2 := SpookyHashShort(in, hash1, hash2)\n return h1, h2\n }\n //fmt.Printf(\"SpookyHash128: len(in)=%d, hash1=0x%08x, hash2=0x%08x, in=%x\\n\", len(in), hash1, hash2, in)\n remainder := length % 96\n \n h0, h3, h6, h9 := hash1, hash1, hash1, hash1\n h1, h4, h7, h10 := hash2, hash2, hash2, hash2\n h2, h5, h8, h11 := sc_const, sc_const, sc_const, sc_const\n \n //end = u.p64 + (length/sc_blockSize)*sc_numVars;\n //inl := a += *(*uint32)(unsafe.Pointer(&in[0]))\n\n // handle all whole sc_blockSize blocks of bytes\n for l := length; l >= 96; l -= 96 {\n //fmt.Printf(\"SpookyHash128: do 128 l=%d, len(in)=%d\\n\", l, len(in))\n inul := sliceUI64(in)\n //fmt.Printf(\"in[0]=%x, in[1]=%x, in[2]=%x, in[3]=%x, inul=%x\\n\", in[0], in[1], in[2], in[3], inul[0])\n h0, h1, h2, h3, h4, h5, h6, h7, h8, h9, h10, h11 = Mix(inul, h0, h1, h2, h3, h4, h5, h6, h7, h8, h9, h10, h11)\n //fmt.Printf(\"h0=0x%016x, h1=0x%016x, h2=0x%016x, h3=0x%016x, h4=0x%016x, h5=0x%016x\\nh6=0x%016x, h7=0x%016x, h8=0x%016x, h9=0x%016x, h10=0x%016x, h11=0x%016x\\n\",\n // h0, h1, h2, h3, h4, h5, h6, h7, h8, h9, h10, h11)\n in = in[96:]\n }\n //fmt.Printf(\"SpookyHash128: len(in)=%d, remainder=%d\\n\", len(in), remainder)\n if len(in) != remainder {\n panic(\"SpookyHash128\")\n }\n if remainder > 0 {\n for k, v := range in {\n b[k] = v\n }\n }\n b[len(b)-1] = byte(remainder)\n inul := sliceUI64(b)\n\n // handle the last partial block of sc_blockSize bytes\n // do some final mixing\n //fmt.Printf(\"inul=%x\\n\", inul)\n h0, h1, h2, h3, h4, h5, h6, h7, h8, h9, h10, h11 = End(inul, h0, h1, h2, h3, h4, h5, h6, h7, h8, h9, h10, h11)\n //fmt.Printf(\"h0=0x%016x, h1=0x%016x, h2=0x%016x, h3=0x%016x, h4=0x%016x, h5=0x%016x\\nh6=0x%016x, h7=0x%016x, h8=0x%016x, h9=0x%016x, h10=0x%016x, h11=0x%016x\\n\",\n // h0, h1, h2, h3, h4, h5, h6, h7, h8, h9, h10, h11)\n return h0, h1\n}", "title": "" }, { "docid": "9ec825f5aa751951c6b5cefa48dc7ebd", "score": "0.63814604", "text": "func newSHA256() hash.Hash { return sha256.New() }", "title": "" }, { "docid": "d1f8e8ee81254fb2482cfe5f9b8e5c1f", "score": "0.63524044", "text": "func hash_sha256(data []byte) []byte {\n\tsha := userlib.NewSHA256()\n\tsha.Write(data)\n\thash := sha.Sum([]byte(\"\"))\n\treturn hash\n}", "title": "" }, { "docid": "257b3bde982b64b8770f665de17c0f1b", "score": "0.6352214", "text": "func hash(tag Tag) uint32 {\n\tvar h uint32 = offset32\n\tfor _, c := range tag {\n\t\th ^= uint32(c)\n\t\th *= prime32\n\t}\n\n\treturn h\n}", "title": "" }, { "docid": "3cba86eff36a067c217163fa25d092e3", "score": "0.62916076", "text": "func HashBytes(d []byte) (r Result) {\n\tl := len(d)\n\tb := make([]C.char, l)\n\tfor i, c := range d {\n\t\tb[i] = C.char(c)\n\t}\n\tvar cr [32]C.char\n\tbptr := unsafe.Pointer(&b[0])\n\tC.cn_slow_hash(bptr, C.size_t(l), &cr[0])\n\tfor i, c := range cr {\n\t\tr[i] = byte(c)\n\t}\n\treturn\n}", "title": "" }, { "docid": "c76a6fc2543de37335b96800814c1dfb", "score": "0.62905127", "text": "func hash(key string) uint64 {\n\treturn uint64(crc32.ChecksumIEEE([]byte(key)))\n}", "title": "" }, { "docid": "473ff77a86eed29d69704d775985da5e", "score": "0.6285303", "text": "func strhash(a unsafe.Pointer, h uintptr) uintptr", "title": "" }, { "docid": "473ff77a86eed29d69704d775985da5e", "score": "0.6285303", "text": "func strhash(a unsafe.Pointer, h uintptr) uintptr", "title": "" }, { "docid": "b657679684b3ba40dc0cbd907ccb14e6", "score": "0.62826335", "text": "func hash256(stack *stack) {\n\ts := stack.pop()\n\th := sha256.Sum256([]byte(s))\n\tstack.push(fmt.Sprintf(\"%x\", h))\n}", "title": "" }, { "docid": "1ef76a3bc7d30551fe07bfbce1c0194b", "score": "0.62773633", "text": "func hashFunc(in []byte) []byte {\n\th := sha256.New()\n\th.Write(in)\n\treturn h.Sum(nil)\n}", "title": "" }, { "docid": "b282238733ccc6ac8ebcc7e1206acf61", "score": "0.6265279", "text": "func new256Asm() hash.Hash { return nil }", "title": "" }, { "docid": "609521f4d5921552e47a54d745f0fcfd", "score": "0.6262791", "text": "func Dhash(img *image.Image) uint64 {\n\t// resize the image\n\tresizedImage := resize.Resize(9, 8, *img, INTERP)\n\n\t// get the gray image\n\tgrayImage := imageToGray(&resizedImage)\n\n\t// get the difference matrix\n\tdiffMatrix := make([][]int, 8)\n\tfor i := 0; i < 8; i++ {\n\t\tdiffMatrix[i] = make([]int, 8)\n\t\tfor j := 0; j < 8; j++ {\n\t\t\tdiffMatrix[i][j] = int(grayImage.GrayAt(i, j+1).Y) - int(grayImage.GrayAt(i, j).Y)\n\t\t}\n\t}\n\n\t// get the hash value of the image\n\t// hash bit is 1 if pixel value is above the average\n\thash := uint64(0)\n\tfor i := 0; i < 8; i++ {\n\t\tfor j := 0; j < 8; j++ {\n\t\t\tvalue := diffMatrix[i][j]\n\t\t\tif value > 0 {\n\t\t\t\thash += 1\n\t\t\t}\n\t\t\thash = hash << 1\n\t\t}\n\t}\n\treturn hash\n}", "title": "" }, { "docid": "43ced0b51cd7e09b52eca8939592a771", "score": "0.626213", "text": "func (v *MapValue) hash(data []byte) uint32 {\n\tvar result uint32 = 2166136261 // FNV offset basis\n\tfor _, c := range data {\n\t\tresult ^= uint32(c)\n\t\tresult *= 16777619 // FNV prime\n\t}\n\treturn result\n}", "title": "" }, { "docid": "a2536289a090de6eb970617f415dbbb9", "score": "0.62603956", "text": "func init() {\n\tN.SetString(\"009d4eaf224f51a59d343f1d0f32562e15b0785963ab99be264478d6a0eef17445f476fa006fe2f0e6bc7a8c50c2781e1737a8805eed1d7ade902965013dfd64732596658c5b3c8b067e2f74d0dc1bd7ccf98f835d72f644db64a12b4b85a9a3dcafd6adf13f678af770757bb7f390eecd470a68eafb186ac2ffdfaf10c26d5593\", 16)\n\tkh := sha256.New()\n\tio.WriteString(kh, N.String())\n\tio.WriteString(kh, \"2\")\n\tk.SetBytes(kh.Sum(nil))\n}", "title": "" }, { "docid": "4304ab48d9d1d9d049867ad95320c119", "score": "0.62435526", "text": "func hash(s string) string {\n\th := fnv.New32a()\n\th.Write([]byte(s))\n\treturn strconv.Itoa(int(h.Sum32()))\n}", "title": "" }, { "docid": "4304ab48d9d1d9d049867ad95320c119", "score": "0.62435526", "text": "func hash(s string) string {\n\th := fnv.New32a()\n\th.Write([]byte(s))\n\treturn strconv.Itoa(int(h.Sum32()))\n}", "title": "" }, { "docid": "9900c8d1648ae629339d90f035858d0b", "score": "0.6236095", "text": "func hash(s string) uint32 {\n h := fnv.New32a()\n h.Write([]byte(s))\n return h.Sum32()\n}", "title": "" }, { "docid": "a0eef8dd12f36dfb4dcedcff0510851f", "score": "0.62338495", "text": "func getSHA256Hash(data []byte) string {\n\treturn hex.EncodeToString(getSHA256Sum(data))\n}", "title": "" }, { "docid": "010e46633a48585fa78445d36089fbad", "score": "0.62316716", "text": "func Hash64(in []byte, seed uint64) uint64 {\n hash1, hash2 := uint64(seed), uint64(seed)\n hash3, _ := SpookyHash128(in, hash1, hash2)\n return hash3\n}", "title": "" }, { "docid": "511fb7d77e2846b0aaaa72f7f822b99e", "score": "0.62268096", "text": "func hash(s string) [32]uint8 {\r\n\tdata := []byte(s)\r\n\th := sha256.Sum256(data)\r\n\treturn h\r\n}", "title": "" }, { "docid": "f11b985b43207b3cf82b354fad3a522c", "score": "0.62254304", "text": "func hashAddByte(h uint64, b byte) uint64 {\n\th ^= uint64(b)\n\th *= prime64\n\treturn h\n}", "title": "" }, { "docid": "27a9603257a0f9a9b48c2ccf4716b47b", "score": "0.6222893", "text": "func hash(s []byte) uint {\n\treturn (uint(s[0])<<4 ^ uint(s[1]) + uint(len(s))) & uint(len(keywordMap)-1)\n}", "title": "" }, { "docid": "ad687effeb545e25d110362a8f200faa", "score": "0.62216884", "text": "func hash(s string) uint32 {\n h := fnv.New32a()\n h.Write([]byte(s))\n return h.Sum32()\n}", "title": "" }, { "docid": "78ee97bfde8581a3dd02fb5747d6e5a5", "score": "0.6216156", "text": "func elfhash(name string) uint32 {\n\tvar h uint32\n\tfor i := 0; i < len(name); i++ {\n\t\th = (h << 4) + uint32(name[i])\n\t\tif g := h & 0xf0000000; g != 0 {\n\t\t\th ^= g >> 24\n\t\t}\n\t\th &= 0x0fffffff\n\t}\n\treturn h\n}", "title": "" }, { "docid": "7b2607af5dd600b0256292c660976b51", "score": "0.62146175", "text": "func GetHash(srcImg image.Image) uint64 {\n\tgreyf := imageToGray\n\n\tswitch srcImg.(type) {\n\tcase *image.YCbCr:\n\t\t// use ycbcr optimized algorithm\n\t\tgreyf = ycbcrToGray\n\t}\n\n\t// 1. Grayscale\n\t// greyt := time.Now()\n\trect := srcImg.Bounds()\n\tw, h := rect.Dx(), rect.Dy()\n\tpix := make([]uint8, 2*w*h)\n\tgrayImage := &image.Gray16{Pix: pix, Stride: 2 * w, Rect: rect}\n\tvar y int\n\tvar st int\n\twg := &sync.WaitGroup{}\n\tfor y = rect.Min.Y; y < rect.Max.Y; y++ {\n\t\twg.Add(1)\n\t\tst = y * grayImage.Stride\n\t\tgo greyf(srcImg, y, w, pix[st:st+w*2], wg)\n\t}\n\twg.Wait()\n\t// log.Printf(\" Grayscaling time: %d ms\", time.Now().Sub(greyt).Nanoseconds()/int64(time.Millisecond))\n\n\t// 2. Shrink to 9x8\n\t// resizet := time.Now()\n\tthumb := resize.Resize(9, 8, grayImage, resize.Lanczos3)\n\t// log.Printf(\" Sizing time: %d ms\", time.Now().Sub(resizet).Nanoseconds()/int64(time.Millisecond))\n\n\t// 3. Compare each pixel to the right, if left is brighter, bit = 1\n\t// compt := time.Now()\n\tvar x int\n\tvar hash uint64\n\tvar bit, left, right, r, g, b uint32\n\tfor x = 0; x < 8; x++ {\n\t\tfor y = 0; y < 8; y++ {\n\t\t\tr, g, b, _ = thumb.At(x, y).RGBA()\n\t\t\tleft = (r + g + b) / 3\n\t\t\tr, g, b, _ = thumb.At(x+1, y).RGBA()\n\t\t\tright = (r + g + b) / 3\n\t\t\tif left > right {\n\t\t\t\thash |= 1 << bit\n\t\t\t}\n\t\t\tbit++\n\t\t}\n\t}\n\t// log.Printf(\" Compare time: %d ms\", time.Now().Sub(compt).Nanoseconds()/int64(time.Millisecond))\n\treturn hash\n}", "title": "" }, { "docid": "8cfa69d9fa0885a1d3bbe4dc93189ef9", "score": "0.62039673", "text": "func (k256 *Keccak256Hash) ByteHash(data ...[]byte) (h common.Hash) {\n\n\thw := sha3.NewKeccak256()\n\tfor _, d := range data {\n\t\thw.Write(d)\n\t}\n\thw.Sum(h[:0])\n\n\treturn h\n}", "title": "" }, { "docid": "4c52c537a1a99f85e938f7a24622764c", "score": "0.61766464", "text": "func strhash(p unsafe.Pointer, h uintptr) uintptr", "title": "" }, { "docid": "fc9ac8be0150e45019b5efea9ca4d81b", "score": "0.6155805", "text": "func calculateHash(d interface{}) (hash [32]byte, err error) {\n\tjdata, err := Marshal(d)\n\tif err != nil {\n\t\treturn\n\t}\n\n\thash = sha256.Sum256(jdata)\n\treturn\n}", "title": "" }, { "docid": "d48c87f04d240677fed77f5ba0613c60", "score": "0.61530375", "text": "func hash(data []byte) []byte {\n\th := sha256.New()\n\th.Write(data)\n\treturn h.Sum(nil)\n}", "title": "" }, { "docid": "52ab4d92eba627d2979df25ee09acad4", "score": "0.61506665", "text": "func newDigest(size int, key []byte) *digest {\n\tif size != Size && size != Size128 {\n\t\tpanic(\"size must be 8 or 16\")\n\t}\n\td := new(digest)\n\td.k0 = uint64(key[0]) | uint64(key[1])<<8 | uint64(key[2])<<16 | uint64(key[3])<<24 |\n\t\tuint64(key[4])<<32 | uint64(key[5])<<40 | uint64(key[6])<<48 | uint64(key[7])<<56\n\td.k1 = uint64(key[8]) | uint64(key[9])<<8 | uint64(key[10])<<16 | uint64(key[11])<<24 |\n\t\tuint64(key[12])<<32 | uint64(key[13])<<40 | uint64(key[14])<<48 | uint64(key[15])<<56\n\td.size = size\n\td.Reset()\n\treturn d\n}", "title": "" }, { "docid": "2f91ce918c6c3d8d680eebf918689f06", "score": "0.61506027", "text": "func target(bits uint32) HashCode {\n\ttarget := HashCode{} // [32]byte\n\tbits = bits % 256\n\tbytePos := bits / 8\n\tbitPos := bits % 8\n\ttarget[bytePos] = 255 >> bitPos\n\treturn target\n}", "title": "" }, { "docid": "c047fea7c2076f2f0e28738dc31a68f0", "score": "0.61356235", "text": "func TokenHash(t []byte) []byte { return hash.Ripemd160Sum(hash.Sha256Sum(t)) }", "title": "" }, { "docid": "0328fab329d56d68bde1dfcf27a8845d", "score": "0.61323017", "text": "func SHA256Hash(msg []byte) [32]byte {\n\treturn sha256.Sum256(msg)\n}", "title": "" }, { "docid": "8feb000843fe734b17a254cd56127cc6", "score": "0.61304927", "text": "func SHA256HexHash(b []byte) string {\n\th := sha256.New()\n\th.Write(b)\n\treturn hex.EncodeToString(h.Sum(nil))\n}", "title": "" }, { "docid": "ebfbe9b6738b14e829ebb15428adf9e6", "score": "0.6123649", "text": "func (h Hash) Hex() string { return strings.ToLower(HexEncode(h[:])) }", "title": "" }, { "docid": "a101e6866d9de33ac96679465bea7fc9", "score": "0.61206675", "text": "func getHash(s string) (hash string) {\n\tb := []byte(s)\n\n\t// add fixed suffix 17, 31, 73, 47, 23\n\tb = append(b, 17, 31, 73, 47, 23)\n\n\t// apply 64 rounds of the knot hash\n\tknotHash := knotHashC()\n\tvar sh []int // sparse hash\n\tfor i := 0; i < 64; i++ {\n\t\tsh = knotHash(b)\n\t}\n\n\tvar dh [16]int // dense hash\n\tfor i := 0; i < 16; i++ {\n\t\tbx := 0 // block xor value\n\t\tfor k := 0; k < 16; k++ {\n\t\t\tbx ^= sh[(i*16)+k]\n\t\t}\n\t\tdh[i] = bx\n\t}\n\n\t// format as hexadecimal string\n\thash = \"\"\n\tfor i := 0; i < 16; i++ {\n\t\thc := strconv.FormatInt(int64(dh[i]), 16)\n\t\thash += fmt.Sprintf(\"%02s\", hc)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "4b7d39908a10d926142e487535271e68", "score": "0.6118955", "text": "func H2d(key [32]byte) uint64 {\n\tvar val uint64 = 0\n\tvar j int = 0\n\tfor j = 7; j >= 0; j-- {\n\t\tval = (val << 8) + uint64(key[j])\n\t}\n\treturn val\n}", "title": "" }, { "docid": "06231c1085fc507b612acd8ac247526a", "score": "0.611762", "text": "func MemHash64(p unsafe.Pointer, h uintptr) uintptr", "title": "" }, { "docid": "01f2cc1d115919231328d8edecf2819c", "score": "0.61168665", "text": "func shad(data []byte) []byte {\n\th1 := sha256.Sum256(data)\n\th2 := sha256.Sum256(h1[:])\n\treturn h2[:]\n}", "title": "" }, { "docid": "dff7fa2481f77661de25389cd6823840", "score": "0.61158246", "text": "func goRuntimeInt64Hash(i uint64, seed uintptr) uintptr", "title": "" }, { "docid": "f1874de24f26672dc33969efb8a4c55b", "score": "0.61144567", "text": "func HashByte(b byte, seed uint64) uint64 {\n\thash := (seed + metroK2) * metroK0\n\thash += uint64(b) * metroK3\n\thash ^= rol64(hash, -37) * metroK1\n\thash ^= rol64(hash, -28)\n\thash *= metroK0\n\thash ^= rol64(hash, -29)\n\treturn hash\n}", "title": "" }, { "docid": "3b74393f1db921f25ad133897a58ea35", "score": "0.6111196", "text": "func deriveHashListOfBytes(object [][]byte) uint64 {\n\tif object == nil {\n\t\treturn 0\n\t}\n\th := uint64(17)\n\tfor i := 0; i < len(object); i++ {\n\t\th = 31*h + deriveHashBytes(object[i])\n\t}\n\treturn h\n}", "title": "" }, { "docid": "c6adf67a88a02249262a98dd6cb739ec", "score": "0.611054", "text": "func hash(x []byte) uint32 {\n\treturn crc32.ChecksumIEEE(x)\n}", "title": "" }, { "docid": "c12884cb17e6b10be8a8fed24793efbe", "score": "0.61072785", "text": "func MemHash(p unsafe.Pointer, h, s uintptr) uintptr", "title": "" }, { "docid": "880bae88fd2a981256a9900f57001f06", "score": "0.6096353", "text": "func hash(domain []byte, tuple ...[]byte) []byte {\n\thash := sha512.New()\n\t/* #nosec */\n\thash.Write(domain)\n\tfor _, t := range tuple {\n\t\t/* #nosec */\n\t\thash.Write(t)\n\t}\n\treturn hash.Sum(nil)\n}", "title": "" }, { "docid": "fc85c0efb7c58904be7519330253e3b8", "score": "0.60923016", "text": "func hashDigest(dig *protosgossip.PvtDataDigest) (string, error) {\n\tb, err := protoutil.Marshal(dig)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn hex.EncodeToString(commonutil.ComputeSHA256(b)), nil\n}", "title": "" }, { "docid": "2a841b99a5359c84fb6a84b639c5bac7", "score": "0.60855", "text": "func nilinterhash(p unsafe.Pointer, h uintptr) uintptr", "title": "" }, { "docid": "b987c45e127c42107589caf8241522ed", "score": "0.6084634", "text": "func ihash(key string) int {\r\n\th := fnv.New32a()\r\n\th.Write([]byte(key))\r\n\treturn int(h.Sum32() & 0x7fffffff)\r\n}", "title": "" }, { "docid": "c9b7474b53172d186c335f4a6c5f428c", "score": "0.60809004", "text": "func Hash256(in []byte) Hash256Digest {\n\tfirst := sha256.Sum256(in)\n\tsecond := sha256.Sum256(first[:])\n\treturn Hash256Digest(second)\n}", "title": "" }, { "docid": "91ab2dd9bd89881f7a5462ee25cf1cde", "score": "0.6079633", "text": "func knotHash(str string) string {\n\n\tinput := []byte(str)\n\n\t// bonus bytes to append given in the problem statement\n\tend := []byte{17, 31, 73, 47, 23}\n\tinput = append(input, end...) // append the bonus bytes\n\n\t// init list with values 0 - 255\n\tlist := make([]int, 256)\n\tfor i := 0; i < 256; i++ {\n\t\tlist[i] = i\n\t}\n\n\tpos := 0\n\tskip := 0\n\t// 64 rounds of hashing\n\tfor r := 0; r < 64; r++ {\n\t\tfor _, v := range input {\n\t\t\t// get a sublist and reverse it\n\t\t\tsub := sublist(list, pos, int(v))\n\t\t\treverse(sub)\n\n\t\t\t// update the list using our sublist\n\t\t\tfor i := 0; i < len(sub); i++ {\n\t\t\t\tlist[(i+pos)%len(list)] = sub[i]\n\t\t\t}\n\n\t\t\t// update the start postion and increment the skip length\n\t\t\tpos = (pos + int(v) + skip) % len(list)\n\t\t\tskip++\n\t\t}\n\t}\n\n\t// create 16 parts of the dense hash by XORing the list segments\n\ts := \"\"\n\tfor i := 0; i < 16; i++ {\n\t\tdense := 0\n\t\tfor j := 0; j < 16; j++ {\n\t\t\tdense ^= list[(i*16)+j]\n\t\t}\n\t\ts += fmt.Sprintf(\"%08b\", dense)\n\t}\n\tfmt.Println(s)\n\treturn s\n}", "title": "" }, { "docid": "5bae7602d7cf96c3e3a5fecf1f59c914", "score": "0.60745925", "text": "func PerceptionHashExtend(img image.Image, hashSize int) (string, error) {\n\tif img == nil {\n\t\treturn \"\", errors.New(\"Image object can not be nil.\")\n\t}\n\thighfreqFactor := 4\n\timgSize := hashSize * highfreqFactor\n\n\tresized := resize.Resize(uint(imgSize), uint(imgSize), img, resize.Bilinear)\n\tpixels := transforms.Rgb2Gray(resized)\n\tdct := transforms.DCT2D(pixels, imgSize, imgSize)\n\tflattens := transforms.FlattenPixels(dct, hashSize, hashSize)\n\t// calculate median\n\tmedian := etcs.MedianOfPixels(flattens)\n\n\tlenOfByte := 8\n\tlenOfPhash := hashSize * hashSize\n\tphash := make([]byte, lenOfPhash/lenOfByte)\n\tfor idx, p := range flattens {\n\t\tindexOfByteArray := (lenOfPhash - 1 - idx) / lenOfByte\n\t\tindexOfBit := idx % lenOfByte\n\t\tif p > median {\n\t\t\tphash[indexOfByteArray] |= 1 << uint(indexOfBit)\n\t\t}\n\t}\n\treturn hex.EncodeToString(phash), nil\n}", "title": "" }, { "docid": "983ea02f6194cc6ffb6655f40893b6b9", "score": "0.60740054", "text": "func sha256Hash(s string) []byte {\n\th := sha256.New()\n\th.Write([]byte(s))\n\treturn h.Sum(nil)\n}", "title": "" }, { "docid": "3d40f36909813af6c8bb968c7ff10685", "score": "0.60671973", "text": "func (s *sum32) Write(data []byte) (int, error) {\n\tvar a, b, c uint32\n\n\tif *s != 0 {\n\t\treturn 0, Error(\"lookup3.HashLittle can only be written to once\")\n\t}\n\tk := data[:]\n\ta = 0xdeadbeef + uint32(len(k)) + uint32(*s)\n\tb = 0xdeadbeef + uint32(len(k)) + uint32(*s)\n\tc = 0xdeadbeef + uint32(len(k)) + uint32(*s)\n\n /*--------------- all but the last block: affect some 32 bits of (a,b,c) */\n for len(k) > 12 {\n\t\ta += uint32(k[0])\n\t\ta += uint32(k[1]) << 8\n\t\ta += uint32(k[2]) << 16\n\t\ta += uint32(k[3]) << 24\n\t\tb += uint32(k[4])\n\t\tb += uint32(k[5]) << 8\n\t\tb += uint32(k[6]) << 16\n\t\tb += uint32(k[7]) << 24\n\t\tc += uint32(k[8])\n\t\tc += uint32(k[9]) << 8\n\t\tc += uint32(k[10]) << 16\n\t\tc += uint32(k[11]) << 24\n\t\t// mix(a,b,c)\n\t\ta -= c\n\t\t// a ^= rot(c, 4)\n\t\t// #define rot(x,k) (((x) << (k)) | ((x) >> (32-(k))))\n\t\ta ^= ((c << 4) | (c >> 28))\n\t\tc += b;\n\t\tb -= a\n\t\t// b ^= rot(a, 6)\n\t\tb ^= ((a << 6) | (a >> 26))\n\t\ta += c;\n\t\tc -= b\n\t\t// c ^= rot(b, 8)\n\t\tc ^= ((b << 8) | (b >> 24))\n\t\tb += a;\n\t\ta -= c\n\t\t// a ^= rot(c,16)\n\t\ta ^= ((c << 16) | (c >> 16))\n\t\tc += b;\n\t\tb -= a\n\t\t// b ^= rot(a,19)\n\t\tb ^= ((a << 19) | (a >> 13))\n\t\ta += c;\n\t\tc -= b\n\t\t// c ^= rot(b, 4)\n\t\tc ^= ((b << 4) | (b >> 28))\n\t\tb += a;\n\n\t\tk = k[12:]\n }\n\n /*-------------------------------- last block: affect all 32 bits of (c) */\n\tswitch(len(k)) { /* all the case statements fall through */\n\tcase 12:\n\t\tc += uint32(k[11])<<24\n\t\tfallthrough\n case 11:\n\t\tc += uint32(k[10])<<16\n\t\tfallthrough\n case 10:\n\t\tc += uint32(k[9])<<8\n\t\tfallthrough\n case 9:\n\t\tc += uint32(k[8])\n\t\tfallthrough\n case 8:\n\t\tb += uint32(k[7])<<24\n\t\tfallthrough\n case 7:\n\t\tb += uint32(k[6])<<16\n\t\tfallthrough\n case 6:\n\t\tb += uint32(k[5])<<8\n\t\tfallthrough\n case 5:\n\t\tb += uint32(k[4])\n\t\tfallthrough\n case 4:\n\t\ta += uint32(k[3])<<24\n\t\tfallthrough\n case 3:\n\t\ta += uint32(k[2])<<16\n\t\tfallthrough\n case 2:\n\t\ta += uint32(k[1])<<8\n\t\tfallthrough\n case 1:\n\t\ta += uint32(k[0])\n case 0:\n\t\t*s = sum32(c);\n\t\treturn len(data), nil\n\t}\n \n\t//final(a,b,c);\n\tc ^= b\n\t// c -= rot(b,14)\n\tc -= ((b << 14) | (b >> 18))\n\ta ^= c\n\t// a -= rot(c,11)\n\ta -= ((c << 11) | (c >> 21))\n\tb ^= a\n\t// b -= rot(a,25)\n\tb -= ((a << 25) | (a >> 7))\n\tc ^= b\n\t// c -= rot(b,16)\n\tc -= ((b << 16) | (b >> 16))\n\ta ^= c\n\t// a -= rot(c,4)\n\ta -= ((c << 4) | (c >> 28))\n\tb ^= a\n\t// b -= rot(a,14)\n\tb -= ((a << 14) | (a >> 18))\n\tc ^= b\n\t// c -= rot(b,24)\n\tc -= ((b << 24) | (b >> 8))\n\t\t\n\t*s = sum32(c);\n\treturn len(data), nil\n}", "title": "" }, { "docid": "ad9315cf19844ca85ecf3632d05e65d0", "score": "0.6066408", "text": "func sha256() map[string]interface{} {\n\treturn map[string]interface{}{\n\t\t\"name\": \"sha256\",\n\t\t\"pricing\": map[string]interface{}{\n\t\t\t\"linear\": map[string]int{\n\t\t\t\t\"base\": 60,\n\t\t\t\t\"word\": 12,\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "58930bfdbedbc63a09cbb0760178a451", "score": "0.6062526", "text": "func Hash(message []byte) []uint32 {\n\t// Step 1: append paddings bits\n\tpaddings := getPaddingBits(len(message))\n\t// Step 2: append length\n\tlowOrderWords := getLowOrderWordsFromLength(len(message))\n\tbytes := make([]byte, 0, len(message)+len(paddings)+len(lowOrderWords))\n\tbytes = append(bytes, message...)\n\tbytes = append(bytes, paddings...)\n\tbytes = append(bytes, lowOrderWords...)\n\twords := bytesToWords(bytes)\n\twordsLength := len(words)\n\n\tA := uint32(0x67452301)\n\tB := uint32(0xEFCDAB89)\n\tC := uint32(0x98BADCFE)\n\tD := uint32(0x10325476)\n\n\tfor i := 0; i < wordsLength/16; i++ {\n\t\tX := words[16*i : 16*i+16]\n\t\ttempA := A\n\t\ttempB := B\n\t\ttempC := C\n\t\ttempD := D\n\n\t\t// Round 1\n\t\tp1 := func(a *uint32, b, c, d uint32, k, s, i int) {\n\t\t\t*a = b + bitRotateLeft(*a+f1(b, c, d)+X[k]+T[i-1], s)\n\t\t}\n\t\tp1(&A, B, C, D, 0, 7, 1)\n\t\tp1(&D, A, B, C, 1, 12, 2)\n\t\tp1(&C, D, A, B, 2, 17, 3)\n\t\tp1(&B, C, D, A, 3, 22, 4)\n\t\tp1(&A, B, C, D, 4, 7, 5)\n\t\tp1(&D, A, B, C, 5, 12, 6)\n\t\tp1(&C, D, A, B, 6, 17, 7)\n\t\tp1(&B, C, D, A, 7, 22, 8)\n\t\tp1(&A, B, C, D, 8, 7, 9)\n\t\tp1(&D, A, B, C, 9, 12, 10)\n\t\tp1(&C, D, A, B, 10, 17, 11)\n\t\tp1(&B, C, D, A, 11, 22, 12)\n\t\tp1(&A, B, C, D, 12, 7, 13)\n\t\tp1(&D, A, B, C, 13, 12, 14)\n\t\tp1(&C, D, A, B, 14, 17, 15)\n\t\tp1(&B, C, D, A, 15, 22, 16)\n\n\t\t// Round 2\n\t\tp2 := func(a *uint32, b, c, d uint32, k, s, i int) {\n\t\t\t*a = b + bitRotateLeft(*a+f2(b, c, d)+X[k]+T[i-1], s)\n\t\t}\n\t\tp2(&A, B, C, D, 1, 5, 17)\n\t\tp2(&D, A, B, C, 6, 9, 18)\n\t\tp2(&C, D, A, B, 11, 14, 19)\n\t\tp2(&B, C, D, A, 0, 20, 20)\n\t\tp2(&A, B, C, D, 5, 5, 21)\n\t\tp2(&D, A, B, C, 10, 9, 22)\n\t\tp2(&C, D, A, B, 15, 14, 23)\n\t\tp2(&B, C, D, A, 4, 20, 24)\n\t\tp2(&A, B, C, D, 9, 5, 25)\n\t\tp2(&D, A, B, C, 14, 9, 26)\n\t\tp2(&C, D, A, B, 3, 14, 27)\n\t\tp2(&B, C, D, A, 8, 20, 28)\n\t\tp2(&A, B, C, D, 13, 5, 29)\n\t\tp2(&D, A, B, C, 2, 9, 30)\n\t\tp2(&C, D, A, B, 7, 14, 31)\n\t\tp2(&B, C, D, A, 12, 20, 32)\n\n\t\t// Round 3\n\t\tp3 := func(a *uint32, b, c, d uint32, k, s, i int) {\n\t\t\t*a = b + bitRotateLeft(*a+f3(b, c, d)+X[k]+T[i-1], s)\n\t\t}\n\t\tp3(&A, B, C, D, 5, 4, 33)\n\t\tp3(&D, A, B, C, 8, 11, 34)\n\t\tp3(&C, D, A, B, 11, 16, 35)\n\t\tp3(&B, C, D, A, 14, 23, 36)\n\t\tp3(&A, B, C, D, 1, 4, 37)\n\t\tp3(&D, A, B, C, 4, 11, 38)\n\t\tp3(&C, D, A, B, 7, 16, 39)\n\t\tp3(&B, C, D, A, 10, 23, 40)\n\t\tp3(&A, B, C, D, 13, 4, 41)\n\t\tp3(&D, A, B, C, 0, 11, 42)\n\t\tp3(&C, D, A, B, 3, 16, 43)\n\t\tp3(&B, C, D, A, 6, 23, 44)\n\t\tp3(&A, B, C, D, 9, 4, 45)\n\t\tp3(&D, A, B, C, 12, 11, 46)\n\t\tp3(&C, D, A, B, 15, 16, 47)\n\t\tp3(&B, C, D, A, 2, 23, 48)\n\n\t\t// Round 4\n\t\tp4 := func(a *uint32, b, c, d uint32, k, s, i int) {\n\t\t\t*a = b + bitRotateLeft(*a+f4(b, c, d)+X[k]+T[i-1], s)\n\t\t}\n\t\tp4(&A, B, C, D, 0, 6, 49)\n\t\tp4(&D, A, B, C, 7, 10, 50)\n\t\tp4(&C, D, A, B, 14, 15, 51)\n\t\tp4(&B, C, D, A, 5, 21, 52)\n\t\tp4(&A, B, C, D, 12, 6, 53)\n\t\tp4(&D, A, B, C, 3, 10, 54)\n\t\tp4(&C, D, A, B, 10, 15, 55)\n\t\tp4(&B, C, D, A, 1, 21, 56)\n\t\tp4(&A, B, C, D, 8, 6, 57)\n\t\tp4(&D, A, B, C, 15, 10, 58)\n\t\tp4(&C, D, A, B, 6, 15, 59)\n\t\tp4(&B, C, D, A, 13, 21, 60)\n\t\tp4(&A, B, C, D, 4, 6, 61)\n\t\tp4(&D, A, B, C, 11, 10, 62)\n\t\tp4(&C, D, A, B, 2, 15, 63)\n\t\tp4(&B, C, D, A, 9, 21, 64)\n\n\t\tA = tempA + A\n\t\tB = tempB + B\n\t\tC = tempC + C\n\t\tD = tempD + D\n\t}\n\n\treturn []uint32{A, B, C, D}\n}", "title": "" }, { "docid": "216a0748cc0c5ef39a23154a70f0236b", "score": "0.6061858", "text": "func sum256Hex(data []byte) string {\n\thash := sha256.New()\n\thash.Write(data)\n\treturn hex.EncodeToString(hash.Sum(nil))\n}", "title": "" }, { "docid": "45aa5d8dc7392c615e9118646941170f", "score": "0.60611314", "text": "func uniqueHash(b []byte) (uint64, error) {\n if len(b) == 0 {\n return uint64(0), errors.New(\"tried to initalise empty byte array\")\n }\n \n newHash := fnv.New64a()\n _, err := newHash.Write(b)\n if err != nil {\n return uint64(0), err\n }\n \n return newHash.Sum64(), nil\n}", "title": "" }, { "docid": "e0be0117776e64d3c3455def392d0140", "score": "0.60596555", "text": "func nilinterhash(a unsafe.Pointer, h uintptr) uintptr", "title": "" }, { "docid": "f994b3ec284f50cc6e6d8fe618d61741", "score": "0.60578495", "text": "func Keccak256Hash(data ...[]byte) (h DcrmHash) {\n\td := sha3.NewKeccak256()\n\tfor _, b := range data {\n\t\td.Write(b)\n\t}\n\td.Sum(h[:0])\n\treturn h\n}", "title": "" }, { "docid": "91e249279acf0bd6b56305720bfe5b6a", "score": "0.6055466", "text": "func NewShake256() ShakeHash { return &state{rate: 136, dsbyte: 0x1f} }", "title": "" }, { "docid": "e6c98f3c58cc07bee8be830a6bcababd", "score": "0.6055436", "text": "func H(data string) string {\n\tdigest := md5.New()\n\tdigest.Write([]byte(data))\n\treturn fmt.Sprintf(\"%x\", digest.Sum(nil))\n}", "title": "" }, { "docid": "f5f67a0e43f2645b0977ae0634e9587d", "score": "0.60514224", "text": "func hash(s string, b uint64) (uint64, uint64) {\n\tresult := uint64(0)\n\tpower := int64(-1)\n\n\tfor i := 0; i < len(s); i++ {\n\t\tresult = result*b + uint64(s[i])\n\t\tpower++\n\t}\n\n\treturn result, uint64(power)\n}", "title": "" }, { "docid": "a9d28cea2c85d2da4c47832f87f8e418", "score": "0.6047884", "text": "func hash(o interface{}) string {\n\tstr := fmt.Sprintf(\"%+v\", o)\n\thash := sha256.New()\n\thash.Write([]byte(str))\n\treturn hex.EncodeToString(hash.Sum(nil))[:8]\n}", "title": "" }, { "docid": "415dc419e6ac778a284836cab5b0dbc7", "score": "0.60474855", "text": "func (ht2 *SimpleHashTable2) hash(key int) int {\n return ((ht2.a * key) % ht2.p) % ht2.m\n}", "title": "" }, { "docid": "b8c5552416265f560bd2037dd91dec73", "score": "0.6042722", "text": "func DoubleHash(h hash.Hash, data ...[]byte) []byte {\n\th.Reset()\n\t// p. 85\n\t// Instead of h(m), we can use h(h(0^b || m)) as a hash function, and claim a\n\t// security level of only n/2 bits. Here b is the block length of the\n\t// underlying compression function, so 0^b || m equates to prepending the\n\t// message with an all zero block before hashing.\n\t// p. 86\n\t// SHAd-256 is just the function m-> SHA-256(SHA-256(0⁵¹² || m)), for example.\n\tb := h.BlockSize()\n\tif l, err := h.Write(zeros[:b]); l != b || err != nil {\n\t\tpanic(\"Unexpected hash write failure\")\n\t}\n\tfor _, i := range data {\n\t\tif l, err := h.Write(i); l != len(i) || err != nil {\n\t\t\tpanic(\"Unexpected hash write failure\")\n\t\t}\n\t}\n\tdst := h.Sum(nil)\n\n\t// Rehash the data.\n\th.Reset()\n\tif l, err := h.Write(dst); l != len(dst) || err != nil {\n\t\tpanic(\"Unexpected hash write failure\")\n\t}\n\treturn h.Sum(nil)\n}", "title": "" }, { "docid": "bfba01c03ea768621b1319a8b4ef2ff1", "score": "0.604265", "text": "func calculateKeysHash(t *testing.T, ndb NodeDB) string {\n\tsponge := valuesSponge{}\n\terr := ndb.Iterate(context.TODO(), dbKeysSpongeHandler(&sponge))\n\trequire.NoError(t, err)\n\tsort.Strings(sponge.values)\n\thash := sha3.New256()\n\tfor _, key := range sponge.values {\n\t\tb, err := hex.DecodeString(key)\n\t\trequire.NoError(t, err)\n\t\thash.Write(b)\n\t}\n\treturn hex.EncodeToString(hash.Sum(nil))\n}", "title": "" }, { "docid": "ca0a1b7369a11853b5fdc9ae08083ae3", "score": "0.60415983", "text": "func computeHash(b []byte, seed uint32) uint32 {\n\thash := fnv.New32a()\n\t// the implementation fnv.Write() does not return an error, see hash/fnv/fnv.go\n\t_, _ = hash.Write(i32tob(seed))\n\t_, _ = hash.Write(b)\n\treturn hash.Sum32()\n}", "title": "" }, { "docid": "ddf7a9e916382c71604f8a21898f3d0d", "score": "0.60408765", "text": "func HKDFSHA256(secret []byte) (key []byte, err error) {\n\tkey = make([]byte, 32)\n\tkdf := hkdf.New(sha256.New, secret, nil, nil)\n\n\t_, err = io.ReadFull(kdf, key)\n\treturn key, err\n}", "title": "" }, { "docid": "f396cb1912e1d32227a898b96bec9883", "score": "0.60388285", "text": "func (h *HashMap) hash(key string) int64 {\n\tif key == \"\" {\n\t\treturn 0\n\t}\n\thc := hashCode(key)\n\treturn (hc ^ (hc >> 16)) % int64(len(h.data))\n}", "title": "" }, { "docid": "e6c9e6a8cf1a297b28e1f35218521faa", "score": "0.6038385", "text": "func PearsonHash(origin []byte) uint8 {\n lookupTable := [...]uint8{\n // 0-255 shuffled in any (random) order suffices\n 98, 6, 85, 150, 36, 23, 112, 164, 135, 207, 169, 5, 26, 64, 165, 219, // 1\n 61, 20, 68, 89, 130, 63, 52, 102, 24, 229, 132, 245, 80, 216, 195, 115, // 2\n 90, 168, 156, 203, 177, 120, 2, 190, 188, 7, 100, 185, 174, 243, 162, 10, // 3\n 237, 18, 253, 225, 8, 208, 172, 244, 255, 126, 101, 79, 145, 235, 228, 121, // 4\n 123, 251, 67, 250, 161, 0, 107, 97, 241, 111, 181, 82, 249, 33, 69, 55, // 5\n 59, 153, 29, 9, 213, 167, 84, 93, 30, 46, 94, 75, 151, 114, 73, 222, // 6\n 197, 96, 210, 45, 16, 227, 248, 202, 51, 152, 252, 125, 81, 206, 215, 186, // 7\n 39, 158, 178, 187, 131, 136, 1, 49, 50, 17, 141, 91, 47, 129, 60, 99, // 8\n 154, 35, 86, 171, 105, 34, 38, 200, 147, 58, 77, 118, 173, 246, 76, 254, // 9\n 133, 232, 196, 144, 198, 124, 53, 4, 108, 74, 223, 234, 134, 230, 157, 139, // 10\n 189, 205, 199, 128, 176, 19, 211, 236, 127, 192, 231, 70, 233, 88, 146, 44, // 11\n 183, 201, 22, 83, 13, 214, 116, 109, 159, 32, 95, 226, 140, 220, 57, 12, // 12\n 221, 31, 209, 182, 143, 92, 149, 184, 148, 62, 113, 65, 37, 27, 106, 166, // 13\n 3, 14, 204, 72, 21, 41, 56, 66, 28, 193, 40, 217, 25, 54, 179, 117, // 14\n 238, 87, 240, 155, 180, 170, 242, 212, 191, 163, 78, 218, 137, 194, 175, 110, // 15\n 43, 119, 224, 71, 122, 142, 42, 160, 104, 48, 247, 103, 15, 11, 138, 239, // 16\n }\n\n h := uint8(0)\n\n for _, v := range origin {\n h = lookupTable[h^uint8(v)]\n }\n\n return h\n}", "title": "" } ]
a3cd0f08b8a06454022b3bf3e8e533a0
Remove returns true if the given element was removed.
[ { "docid": "b33b6aef175d71fbab03512694d5de3e", "score": "0.6819192", "text": "func (ss *SliceStack) Remove(item adts.ContainerElement) bool {\n\treturn ss.backer.Remove(item)\n}", "title": "" } ]
[ { "docid": "5f8c7549791766074a8f810b31ad7711", "score": "0.80763143", "text": "func (s *Set) Remove(element interface{}) bool {\n\tif _, exists := (*s)[element]; exists {\n\t\tdelete(*s, element)\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "4dbf085b1132291b5d2e9c75008a95a6", "score": "0.76785046", "text": "func (l *List) Remove(element interface{}) bool {\n\titem, found := l.find(element)\n\tif !found {\n\t\treturn false\n\t}\n\tif l.Len() == 1 {\n\t\tl.firstElement = nil\n\t\tl.lastElement = nil\n\t}\n\tif item.Prev != nil {\n\t\titem.Prev.Next = item.Next\n\t} else {\n\t\tl.firstElement = item.Next\n\t\tl.firstElement.Prev = nil\n\t}\n\tif item.Next != nil {\n\t\titem.Next.Prev = item.Prev\n\t} else {\n\t\tl.lastElement = item.Prev\n\t\tl.lastElement.Next = nil\n\t}\n\tl.len = l.len - 1\n\treturn true\n}", "title": "" }, { "docid": "f642bfdea1db2a5e76c76b155291c76a", "score": "0.76139325", "text": "func (list *ArrayList[T]) Remove(ele T) bool {\n\tfor i := 0; i < len(list.elems); i++ {\n\t\to := list.elems[i]\n\t\tif o == ele {\n\t\t\tlist.elems = append(list.elems[:i], list.elems[i+1:]...)\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "ab7ba3bae01e16042615dac3729d8b30", "score": "0.72466594", "text": "func (this *HashSet) Remove(ele interface{}) bool {\n\treturn this.mmap.Remove(ele)\n}", "title": "" }, { "docid": "5397af71f5e94fe5cf2462596caa5313", "score": "0.72146434", "text": "func (s *Set) Remove(elem A) bool {\n\t_, found := s.m[elem]\n\tif found {\n\t\tdelete(s.m, elem)\n\t}\n\treturn found\n}", "title": "" }, { "docid": "08eb066133aa9607bddb61cd35fb2810", "score": "0.7137612", "text": "func (q *Queue) Remove(v interface{}) bool {\r\n\tq.mu.Lock()\r\n\tdefer q.mu.Unlock()\r\n\r\n\tel, ok := q.m[v]\r\n\tif !ok {\r\n\t\treturn false\r\n\t}\r\n\r\n\tfirst := q.first\r\n\tdelete(q.m, v)\r\n\tq.remove(el)\r\n\r\n\t// If the element was first, we need to start a new timer\r\n\tif first == el && q.first != nil {\r\n\t\tgo q.timer(q.first, q.first.time)\r\n\t}\r\n\treturn true\r\n}", "title": "" }, { "docid": "a81776eae853bd93f1e110d9f11baaa0", "score": "0.7122226", "text": "func (this *LinkedList) Remove(ele interface{}) bool {\n\tif this.head == nil && this.tail == nil {\n\t\treturn false\n\t}\n\tpe := this.head\n\tvar ps *entry\n\tps = nil\n\tfor pe != nil {\n\t\tif pe.elem == ele {\n\t\t\tif ps != nil {\n\t\t\t\tps.next = pe.next\n\t\t\t\tif pe == this.tail {\n\t\t\t\t\tthis.tail = ps\n\t\t\t\t}\n\t\t\t\tthis.size--\n\t\t\t} else {\n\t\t\t\t// remove first element\n\t\t\t\tthis.head = pe.next\n\t\t\t\t// if remove the only one element, tail must be change to nil\n\t\t\t\tif this.tail == pe {\n\t\t\t\t\tthis.tail = nil\n\t\t\t\t}\n\t\t\t\tthis.size--\n\t\t\t}\n\t\t\treturn true\n\t\t}\n\t\tps = pe\n\t\tpe = pe.next\n\t}\n\treturn false\n}", "title": "" }, { "docid": "9a97637d1f065cb5ad3e71048df0546d", "score": "0.7008638", "text": "func (tree *BTree) Remove(val interface{}) bool {\n\treturn tree.remove(wrap(val))\n}", "title": "" }, { "docid": "13811e713617181de53654515e3613ef", "score": "0.68392444", "text": "func (s *Set) Remove(val interface{}) bool {\n\tif _, ok := s.vals[val]; !ok {\n\t\treturn false\n\t}\n\n\tdelete(s.vals, val)\n\n\treturn true\n}", "title": "" }, { "docid": "3c5ef938dd480f228a9dd5ddd72b97c7", "score": "0.6821472", "text": "func (s *ConcurrentSet) Remove(e interface{}) bool {\n\t_, exists := s.hash.Load(e)\n\ts.hash.Delete(e)\n\tif exists {\n\t\tatomic.AddUint32(&s.size, ^uint32(0))\n\t}\n\treturn exists\n}", "title": "" }, { "docid": "e325fee3bec1e2ef7d205d0051647f8f", "score": "0.67757833", "text": "func (set *LLSet) Remove(elem int) bool {\n\tif set.head == nil {\n\t\treturn false\n\t}\n\n\tif set.head.data == elem {\n\t\tset.head = nil\n\t\treturn true\n\t}\n\n\tcurrent := set.head\n\tfor current != nil && current.next != nil {\n\t\tif current.next.data == elem {\n\t\t\tcurrent.next = current.next.next\n\t\t\treturn true\n\t\t}\n\t\tcurrent = current.next\n\t}\n\treturn false\n}", "title": "" }, { "docid": "2b85ca8c4a3600519ce94317ead1405e", "score": "0.67296416", "text": "func (ls *ListStack) Remove(item adts.ContainerElement) bool {\n\tif ls.threadSafe {\n\t\tls.lock.Lock()\n\t\tdefer ls.lock.Unlock()\n\t\treturn ls.removeHelper(item)\n\t}\n\n\treturn ls.removeHelper(item)\n}", "title": "" }, { "docid": "b2c30f2266efaf8bd7d2c9f5dfcdc617", "score": "0.664158", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\tif _, ok := this.m[val]; ok{\n\t\tdelete(this.m, val)\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "f184b766f5df8dbc2b50e7e728ed5ac5", "score": "0.6570655", "text": "func Remove(taufn *migo.Function) (remove bool) {\n\treturn true\n}", "title": "" }, { "docid": "9f8d901be9cf0b697279a5b74fd4a6bc", "score": "0.65572876", "text": "func (b *BioBag) Remove() bool {\n\tif b.Count == 0 {\n\t\tfmt.Println(\"Bag이 비어있습니다. 비울수 없습니다.\")\n\t\treturn false\n\t} else {\n\t\tb.List[b.Count-1] = nil\n\t\tb.Count -= 1\n\t\treturn true\n\t}\n}", "title": "" }, { "docid": "c4c6b8eb107787bbd1ab8f02c346016a", "score": "0.65279824", "text": "func (e *Element) IsRemoved() bool {\n\treturn (bool)(C.lol_html_element_is_removed((*C.lol_html_element_t)(e)))\n}", "title": "" }, { "docid": "094fe8d54673f2eca215e6d5ce781fe4", "score": "0.6496237", "text": "func (e *Event) IsRemove() bool {\n\treturn e.Op&REMOVE == REMOVE\n}", "title": "" }, { "docid": "9d26d74e58655e3bfda35d23f915c8b5", "score": "0.64698833", "text": "func (vector *Vector) RemoveElement(element interface{}) {\n\tindex := vector.Peek(element)\n\tif index >= 0 {\n\t\t// Only try to remove the element if it exists in the Vector.\n\t\tvector.Delete(index)\n\t}\n}", "title": "" }, { "docid": "d699b30d9c4d41301bb698dcb039f375", "score": "0.6458097", "text": "func (dict *Dictionary) Remove(key DictKey) bool {\n\tdict.lock.Lock()\n\tdefer dict.lock.Unlock()\n\tvar exists bool\n\t_, exists = dict.elements[key]\n\tif exists {\n\t\tdelete(dict.elements, key)\n\t}\n\treturn exists\n}", "title": "" }, { "docid": "e472ea752d1c5f91583fafb9366cd591", "score": "0.64498", "text": "func (q *Queue) Remove() (interface{}, bool) {\n\tq.mu.Lock()\n\tdefer q.mu.Unlock()\n\n\tif q.queueLen == 0 {\n\t\treturn nil, false\n\t}\n\treturn q.popFront(), true\n}", "title": "" }, { "docid": "6dde22f00c3d14a0767abcdcce943a69", "score": "0.63511467", "text": "func (h *sendPacketHeap) Remove(packetID packet.PacketID) bool {\n\tlen := len(*h)\n\tidx := 0\n\tfor idx < len {\n\t\tpid := (*h)[idx].pkt.Seq\n\t\tif pid.Seq == packetID.Seq {\n\t\t\theap.Remove(h, idx)\n\t\t\treturn true\n\t\t} else if pid.Seq > packetID.Seq {\n\t\t\tidx = idx * 2\n\t\t} else {\n\t\t\tidx = idx*2 + 1\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "603aac584f316f0f3dc3c44f431b3dbc", "score": "0.6325832", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\tif _, ok := this.M[val]; !ok {\n\t\treturn false\n\t}\n\tindex := this.M[val]\n\tlastValue := this.list[len(this.list)-1]\n\tthis.M[lastValue] = index\n\tthis.list[index] = lastValue\n\tthis.list = this.list[:len(this.list)-1]\n\tdelete(this.M, val)\n\treturn true\n}", "title": "" }, { "docid": "e00b19075f1920b7d9977cd33bc4b892", "score": "0.6322182", "text": "func (list *ArrayList[T]) RemoveAt(index int) (T, bool) {\n\tif index < 0 || index >= list.Size() {\n\t\tvar zero T\n\t\treturn zero, false\n\t}\n\tele := list.elems[index]\n\tlist.elems = append(list.elems[:index], list.elems[index+1:]...)\n\treturn ele, true\n}", "title": "" }, { "docid": "49e5d763126d44e032a6b543f760786f", "score": "0.6312163", "text": "func (c *Container) Remove(v *Object) bool {\n\tif c.c.remove(v.ID()) {\n\t\tc.needComponents()\n\t\tfor t := range v.components {\n\t\t\tb := c.by_component[t]\n\t\t\tb.remove(v.ID())\n\t\t\tc.by_component[t] = b\n\t\t}\n\t\tc.o.Modified()\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "3261870c08a94c9f84ce93c1cb0e94e2", "score": "0.6311827", "text": "func (event Event) IsRemove() bool {\n\treturn event.Op&fsnotify.Remove == fsnotify.Remove\n}", "title": "" }, { "docid": "41baaf6b1a8bd2f92ba244a5f32c7fae", "score": "0.63044125", "text": "func (me TxsdAnimTimingAttrsFill) IsRemove() bool { return me.String() == \"remove\" }", "title": "" }, { "docid": "54cd4465495773e20951a1b6c6b71813", "score": "0.6298106", "text": "func (c *LruCache) Remove(key interface{}) bool {\n\tc.lock.Lock()\n\tdefer c.lock.Unlock()\n\tif ent, ok := c.cache[key]; ok {\n\t\tc.removeElement(ent)\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "46868add8e1996853f0f8c439c2f90af", "score": "0.6290389", "text": "func (v *TreeStore) Remove(iter *TreeIter) bool {\n\tvar ti *C.GtkTreeIter\n\tif iter != nil {\n\t\tti = iter.native()\n\t}\n\treturn 0 != C.gtk_tree_store_remove(v.native(), ti)\n}", "title": "" }, { "docid": "3b5171dc7a43b67c3ca7423efee510e7", "score": "0.62587434", "text": "func (list *List) Remove(element interface{}) error {\n\tidx := list.Index(element)\n\tif idx == -1 {\n\t\treturn fmt.Errorf(\"element not found\")\n\t}\n\treturn list.removeByIndex(idx)\n}", "title": "" }, { "docid": "49b0b8165e846362dc62376d5b27d339", "score": "0.6251998", "text": "func (t *StringSlice) Remove(s string) bool {\n\tif i := t.Index(s); i > -1 {\n\t\tt.RemoveAt(i)\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "9779fa79bb4558b3601de72b65291a45", "score": "0.624687", "text": "func (v *Set) Remove(pubKeyBLS []byte) bool {\n\ti, found := v.IndexOf(pubKeyBLS)\n\tif found {\n\t\t// TODO: this is inefficient\n\t\t*v = append((*v)[:i], (*v)[i+1:]...)\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "855bb047135a59e8542b8d667cee7eb9", "score": "0.6216552", "text": "func (s *Set) Remove(key interface{}) (ok bool) {\n\t_, ok = s.skiplist.Delete(key)\n\treturn ok\n}", "title": "" }, { "docid": "59c8a5e9b7a1f085fd518fe6688714ee", "score": "0.61686856", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\tindex, ok := this.set[val]\n\tif !ok {\n\t\treturn false\n\t}\n\tlast := len(this.a) - 1\n\tthis.set[this.a[last]] = index\n\tthis.a[index] = this.a[last]\n\tthis.a = this.a[:last]\n\tdelete(this.set, val)\n\treturn true\n}", "title": "" }, { "docid": "a599fc7b77423bb61c03333582cb1e21", "score": "0.61613655", "text": "func (list *UserNotifications) Remove(notificationID string) bool {\n\tfor index, item := range list.Items {\n\t\tif item == notificationID {\n\t\t\tlist.Items = append(list.Items[:index], list.Items[index+1:]...)\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f7a5a01355ca5e8cc31b2987036b9562", "score": "0.6121632", "text": "func (e *SkillList) Remove(slot uint16) bool {\n\tif _, ok := e.List[int(slot)]; ok {\n\t\tdelete(e.List, int(slot))\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c42268b86503f39a9b39c7ecebeb8b6f", "score": "0.6081596", "text": "func (p *PropertySet) Remove(s string) bool {\n\tp.mux.Lock()\n\tdefer p.mux.Unlock()\n\n\tif !p.Contains(s) {\n\t\treturn false\n\t}\n\n\tdelete(p.props, s)\n\treturn true\n}", "title": "" }, { "docid": "06a300ff7f20cfab53302913d7318d76", "score": "0.607938", "text": "func (c *Cache) Remove(key interface{}) bool {\n\tif entry, ok := c.mapping[key]; ok {\n\t\tc.removeElement(entry)\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "3702e5f6a36b0936912abe810c5aae2f", "score": "0.60750043", "text": "func (qt *QuadTree) Remove(p *Point) bool {\n\tif !qt.boundary.ContainsPoint(p) {\n\t\treturn false\n\t}\n\n\tif qt.nodes[0] == nil {\n\t\tfor i, ep := range qt.points {\n\t\t\tif ep != p {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// remove point\n\t\t\tif last := len(qt.points) - 1; i == last {\n\t\t\t\tqt.points = qt.points[:last]\n\t\t\t} else {\n\t\t\t\tqt.points[i] = qt.points[last]\n\t\t\t\tqt.points = qt.points[:last]\n\t\t\t}\n\t\t\treturn true\n\t\t}\n\n\t\treturn false\n\t}\n\n\tfor _, node := range qt.nodes {\n\t\tif node.Remove(p) {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "eeb0df6a2844b2142fd68f539462d9e2", "score": "0.6061531", "text": "func remove(removeStruct *Remove) (bool, error) {\n\terr := removeStruct.Collection.Remove(removeStruct.Query)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn false, err\n\t}\n\treturn true, err\n}", "title": "" }, { "docid": "bf79edabdad47848f8354fe03de45d03", "score": "0.6061193", "text": "func (list *LinkList) Remove(value interface{}) bool {\n\t// BigO == O(n*2) ... I could eliminate self.includes(), but I think it's more readable\n\t// NOTE: only the first one found will be removed\n\n\tretVal := false\n\tif list.Includes(value) {\n\t\tprev, cur := (*LinkNode)(nil), list.head\n\n\t\tfor cur != nil {\n\n\t\t\tfound := false\n\t\t\t// if list.comparison_func != nil {\n\t\t\t// \tif self.comparison_func(cur.value, value):\n\t\t\t// \t\tfound = True\n\t\t\t// } else {\n\t\t\tif cur.value == value {\n\t\t\t\tfound = true\n\t\t\t}\n\t\t\t// }\n\n\t\t\tif found {\n\t\t\t\tif prev == nil {\n\t\t\t\t\tlist.head = cur.next\n\t\t\t\t} else {\n\t\t\t\t\tprev.next = cur.next\n\t\t\t\t}\n\t\t\t\tretVal = true\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tprev = cur\n\t\t\tcur = cur.next\n\t\t}\n\n\t}\n\n\treturn retVal\n}", "title": "" }, { "docid": "25acb21a02ecf293510febc2b82a1585", "score": "0.605185", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\tif setIt, ok := this.valsSet[val]; ok {\n\t\tlast := this.vals[len(this.vals)-1]\n\t\tthis.vals[setIt.ind] = last\n\t\tthis.vals = this.vals[:len(this.vals)-1]\n\t\tthis.valsSet[last] = valEl{last, setIt.ind}\n\t\tdelete(this.valsSet, val)\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "2ab0c5121f379db6ba83d96681164b98", "score": "0.60433817", "text": "func (h Hash) Remove(in string) bool {\n\tif _, ok := h[in]; ok {\n\t\t// exists\n\t\tdelete(h, in)\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "e5bd62cc7a99eef981333b3e14ed4f59", "score": "0.6035909", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\ti, ok := this.indices[val]\n\tif !ok {\n\t\treturn false\n\t}\n\tlastVal := this.list[len(this.list)-1]\n\tthis.indices[lastVal] = i\n\tdelete(this.indices, val)\n\tthis.list[i] = lastVal\n\tthis.list = this.list[:len(this.list)-1]\n\treturn true\n}", "title": "" }, { "docid": "1dfa28c939cc5afad8cef1a3ab407472", "score": "0.6029965", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\tif i, ok := this.record[val]; !ok {\n\t\treturn false\n\t} else {\n\t\tswap := this.nums[len(this.nums)-1]\n\t\tthis.record[swap] = i\n\t\tthis.nums[i] = swap\n\t\tthis.nums = this.nums[0 : len(this.nums)-1]\n\n\t\tdelete(this.record, val)\n\t}\n\treturn true\n}", "title": "" }, { "docid": "267fac6020f5cf9d185f55bde3eb09b9", "score": "0.59994215", "text": "func (i *Index) Remove(doc Doc) bool {\n\t// remove entry\n\titem, _ := i.btree.Delete(doc)\n\treturn item != nil\n}", "title": "" }, { "docid": "1b88bc52a49cc5bb09b4aaa51bdcd7dd", "score": "0.5994367", "text": "func (eq *ExpiryQueue) Remove(orderId int64) bool {\n\tindex, ok := eq.hp.mapIndexByOrderId[orderId]\n\tif !ok {\n\t\treturn false\n\t}\n\theap.Remove(eq.hp, index)\n\treturn true\n}", "title": "" }, { "docid": "8f6d368dc9acc5ec3cdc4e1f5fcf00eb", "score": "0.59936196", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\tindex, ok := this.m[val]\n\tif ok {\n\t\tthis.m[this.data[len(this.data)-1]] = index\n\t\tthis.data[index], this.data[len(this.data)-1] = this.data[len(this.data)-1], this.data[index]\n\n\t\tthis.data = this.data[:len(this.data)-1]\n\t\tdelete(this.m, val)\n\t}\n\n\treturn ok\n}", "title": "" }, { "docid": "e4bbdc7dd1a0f56129ccfea6b4564bb7", "score": "0.59885156", "text": "func (l *LinkedList) Remove(v interface{}) bool {\n\thead := l.head\n\n\tif head.value == v {\n\t\tl.head = head.next\n\t\treturn true\n\t}\n\n\tcurrentHead := head\n\tfor {\n\t\t// 下一个节点是nil了\n\t\tif currentHead.next.next == nil {\n\t\t\tif currentHead.next.value == v {\n\t\t\t\t// 下一个节点是v ;找到了\n\t\t\t\tcurrentHead.next = nil\n\t\t\t\treturn true\n\t\t\t}\n\t\t\t// 没有找到\n\t\t\treturn false\n\t\t}\n\n\t\t// 正常的节点\n\t\tif currentHead.next.value == v {\n\t\t\tcurrentHead.next = currentHead.next.next\n\t\t\treturn true\n\t\t}\n\n\t\tcurrentHead = currentHead.next\n\t}\n}", "title": "" }, { "docid": "11ca4f56d32ba7c16a7dee8c34acefe6", "score": "0.59864306", "text": "func (d *Data) Remove(key string) bool {\n\t_, ok := d.Values[key]\n\tif !ok {\n\t\treturn false\n\t}\n\tdelete(d.Values, key)\n\tdelete(d.Data, key)\n\treturn true\n}", "title": "" }, { "docid": "0817735e3ae8f0e270d3ac19c9e64860", "score": "0.5980711", "text": "func (s *Subject) Remove(o *Observer) bool {\n\ts.mu.RLock()\n\tif !s.observerIDs[o.ID] {\n\t\treturn false\n\t}\n\ts.mu.RUnlock()\n\n\ts.mu.Lock()\n\tdelete(s.observerIDs, o.ID)\n\tfor i, v := range s.observers {\n\t\tif v == o {\n\t\t\ts.observers = append(s.observers[:i], s.observers[i+1:]...)\n\t\t\tbreak\n\t\t}\n\t}\n\ts.mu.Unlock()\n\treturn true\n}", "title": "" }, { "docid": "061d2604ea969d56792365c847e25822", "score": "0.5975063", "text": "func (vector *Vector) Contains(element interface{}) bool {\n\tvar index int = vector.Peek(element)\n\tif index == -1 {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "2f3bcf05d7554892009e1cfcefb47f77", "score": "0.59661984", "text": "func (c *Container) Remove(value interface{}, n int) bool {\n\treturn c.remove(reflect.TypeOf(value), n)\n}", "title": "" }, { "docid": "94dcda2a93597096b3cdc92db7c69cfa", "score": "0.5948596", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\tidx, ok := this.hashMap[val]\n\tif !ok {\n\t\treturn false\n\t}\n\tdelete(this.hashMap, val)\n\tthis.arr[idx] = this.arr[this.length-1]\n\tif idx != this.length-1 {\n\t\tthis.hashMap[this.arr[idx]] = idx\n\t}\n\tthis.length--\n\treturn true\n}", "title": "" }, { "docid": "9311ae83217c209a9c62efb5adc2f713", "score": "0.59364915", "text": "func (p *Trie) Remove(s string) bool {\n\tif len(s) == 0 {\n\t\treturn len(p.children) == 0\n\t}\n\n\t// remove the runes, returning the final result\n\treturn p.removeRunes(strings.NewReader(s))\n}", "title": "" }, { "docid": "4ed93e71fec865b85178abb9ceb3bff8", "score": "0.5932272", "text": "func (s *RandomizedSet) Remove(val int) bool {\n\tif ind, ok := s.table[val]; ok {\n\t\tn := len(s.arr)\n\t\tlast := s.arr[n-1]\n\t\ts.table[last] = ind\n\t\ts.arr[ind] = last\n\t\ts.arr = s.arr[:n-1]\n\t\tdelete(s.table, val)\n\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e595e4e6ca4c08710edb5a70e841c84c", "score": "0.59305024", "text": "func (local *Node) Remove(key string) bool {\n\treturn local.blobstore.Delete(key)\n}", "title": "" }, { "docid": "e0d08954c9b291e7118daf98355d3008", "score": "0.5927062", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\tif _, ok := this.set[val]; ok {\n\t\tindex := this.set[val]\n\t\tlast_val := this.data[len(this.data)-1]\n\t\tthis.data[index], this.data[len(this.data)-1] = this.data[len(this.data)-1], this.data[index] // 将要删除的元素和最后一个元素交换,然后再删除,这样就是常数时间删除了,不需要移动数组\n\t\tthis.data = this.data[:len(this.data)-1]\n\t\tthis.set[last_val] = index\n\t\tdelete(this.set, val)\n\t\tthis.length--\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "fdd6c2149c5bdc16fe06501e5c594f24", "score": "0.59260595", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\tif _, ok := this.v[val]; !ok {\n\t\treturn false\n\t}\n\tlastIndex := len(this.arr) - 1\n\tif this.v[val] == lastIndex {\n\t\tthis.arr = this.arr[0:lastIndex]\n\t} else {\n\t\tthis.v[this.arr[lastIndex]] = this.v[val]\n\t\tthis.arr[this.v[val]] = this.arr[lastIndex]\n\t\tthis.arr = this.arr[0:lastIndex]\n\t}\n\tdelete(this.v, val)\n\tthis.rand = 0\n\treturn true\n}", "title": "" }, { "docid": "d7500be4f3c931f64b0d97b59ac7e860", "score": "0.5925726", "text": "func (il *IntList) Remove(val int) bool {\n last := il.Last()\n for it := il.First(); it != last; it = it.Next() {\n if it.Value() == val {\n it.prev.next = it.next\n it.next.prev = it.prev\n // TODO(david): are the next two lines needed (for the GC)?\n it.next = nil\n it.prev = nil\n\n il.length--\n return true\n }\n }\n return false\n}", "title": "" }, { "docid": "d03ef0a3c9199d625ab62078474fa7a4", "score": "0.59176373", "text": "func (c *LRU) Remove(mainKey string) (present bool) {\n\tc.RLock()\n\tmainEntry, ok := c.items[mainKey]\n\tvar node []*list.Element\n\tif ok {\n\t\tnode = make([]*list.Element, len(mainEntry))\n\t\tcount := 0\n\t\tfor k, _ := range mainEntry {\n\t\t\tnode[count] = mainEntry[k]\n\t\t\tcount += 1\n\t\t}\n\t}\n\tc.RUnlock()\n\n\tif ok == true {\n\t\tfor _, entry := range node {\n\t\t\tc.removeElement(entry)\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "ecd5a2a5a0e3331e213c37021d5470f7", "score": "0.5914528", "text": "func (rs *RandomizedSet) Remove(val int) bool {\n\tif _, ok := rs.set[val]; !ok {\n\t\treturn false\n\t}\n\tp := rs.set[val]\n\trs.keys[p] = rs.keys[len(rs.keys)-1]\n\trs.set[rs.keys[p]] = p\n\trs.keys = rs.keys[:len(rs.keys)-1]\n\tdelete(rs.set, val)\n\treturn true\n}", "title": "" }, { "docid": "1e0f4e9d33ba5ada7124294dcb6d6981", "score": "0.59006006", "text": "func (ts *TagSet) Remove(tag string) (ok bool) {\n\tfor i := 0; i < len(*ts); {\n\t\tif (*ts)[i] == tag {\n\t\t\t*ts = append((*ts)[:i], (*ts)[i+1:]...)\n\t\t\tok = true\n\t\t} else {\n\t\t\ti++\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "d855a507b0be73335d0943e977f4c367", "score": "0.58732116", "text": "func (s *scheduler) Remove(j *Job) bool {\n\ts.mutex.Lock()\n\tdefer s.mutex.Unlock()\n\n\tfor i, job := range s.jobs {\n\t\tif j == job {\n\t\t\t// fix potential memory leak problem arrcording to:\n\t\t\t// https://github.com/golang/go/wiki/SliceTricks\n\t\t\tcopy(s.jobs[i:], s.jobs[i+1:])\n\t\t\ts.jobs[len(s.jobs)-1] = nil\n\t\t\ts.jobs = s.jobs[:len(s.jobs)-1]\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "9c8191057da7293443891fa2bedf7a6f", "score": "0.586005", "text": "func (this *RandomizedCollection) Remove(val int) bool {\n \n}", "title": "" }, { "docid": "4c440689076c7c266c6e2f385bd64c36", "score": "0.58534676", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\n\tif index, ok := this.m[val]; ok {\n\t\tn := len(this.arr)\n\t\tif n-1 != index {\n\t\t\tthis.arr[index], this.arr[n-1] = this.arr[n-1], this.arr[index]\n\t\t\tthis.m[this.arr[index]] = index\n\t\t}\n\t\tthis.arr = this.arr[:n-1]\n\t\tdelete(this.m, val)\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "e4b85aa5f6d9ab08fbe6173e0a739190", "score": "0.5848576", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\tvar found bool\n\tif _, found = this.m[val]; !found {\n\t\treturn false\n\t}\n\tif len(this.a) == 1 {\n\t\tthis.a = []int{}\n\t\tthis.m = map[int]int{}\n\t} else {\n\t\tidx := this.m[val]\n\t\tval2 := this.a[len(this.a)-1]\n\t\tthis.a[idx] = val2\n\t\tthis.a = this.a[:len(this.a)-1]\n\t\tthis.m[val2] = idx\n\t\tdelete(this.m, val)\n\t}\n\treturn true\n}", "title": "" }, { "docid": "2377d2475948cb0c4103487da64720a7", "score": "0.584447", "text": "func (set *RandomizedSet) Remove(val int) bool {\n\tif !set.Value[val] {\n\t\treturn false\n\t}\n\tset.Value[val] = false\n\tset.Count--\n\n\tif len(set.Keys) > 5*set.Count {\n\t\tkeys := []int{}\n\t\tfor key := range set.Value {\n\t\t\tkeys = append(keys, key)\n\t\t}\n\t\tset.Keys = keys\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "775879dc7f3558755e7aa38ea5c509ac", "score": "0.5835948", "text": "func (u Update) IsRemove() bool {\n\treturn u.Old != nil && u.New == nil\n}", "title": "" }, { "docid": "118bacb2740913d7e9cc923ab54c5ab7", "score": "0.58256155", "text": "func (w *WindowedMap) Remove(uid UID) (interface{}, bool) {\n\tw.ExpireOldEntries()\n\titem, ok := w.uidMap[uid]\n\tif !ok {\n\t\treturn nil, false\n\t}\n\theap.Remove(&w.uidList, item.index)\n\tdelete(w.uidMap, uid)\n\treturn item.value, true\n}", "title": "" }, { "docid": "2f613a3cff1766a0bc4337a35d398f59", "score": "0.58193994", "text": "func (sl *LockFreeSkipList) Remove(value interface{}) bool {\n\tvar prevs [maxLevel]*node\n\tvar nexts [maxLevel]*node\n\tif !sl.find(value, &prevs, &nexts) {\n\t\treturn false\n\t}\n\tremoveNode := nexts[0]\n\tfor level := removeNode.level - 1; level > 0; level-- {\n\t\tnext := removeNode.loadNext(level)\n\t\tfor !isMarked(next) {\n\t\t\t// Make sure that all but the bottom next are marked from top to bottom.\n\t\t\tremoveNode.casNext(level, next, getMarked(next))\n\t\t\tnext = removeNode.loadNext(level)\n\t\t}\n\t}\n\tfor next := removeNode.loadNext(0); true; next = removeNode.loadNext(0) {\n\t\tif isMarked(next) {\n\t\t\t// Other thread already maked the next, so this thread delete failed.\n\t\t\treturn false\n\t\t}\n\t\tif removeNode.casNext(0, next, getMarked(next)) {\n\t\t\t// This thread marked the bottom next, delete successfully.\n\t\t\tbreak\n\t\t}\n\t}\n\tatomic.AddInt32(&sl.size, -1)\n\treturn true\n}", "title": "" }, { "docid": "7f60871f3341333f4c7aa2af2903f6b8", "score": "0.5813491", "text": "func (c *Comics) Remove(index int) bool {\n\tdefer logger.Trace(\"method Remove()\")()\n\n\tif index == -1 || index >= len(c.comics) {\n\t\treturn false\n\t}\n\n\tcopy(c.comics[index:], c.comics[index+1:])\n\tc.comics = c.comics[:len(c.comics)-1]\n\n\treturn true\n}", "title": "" }, { "docid": "1419e8cca4f8e5ab89a7b3907a4bcf5e", "score": "0.58041656", "text": "func (rs *RandomizedSet) Remove(val int) bool {\n\tif index, ok := rs.hash[val]; ok {\n\t\tlast := len(rs.arr) - 1\n\t\trs.arr[index], rs.arr[last] = rs.arr[last], rs.arr[index]\n\t\trs.hash[rs.arr[index]] = index\n\t\tdelete(rs.hash, val)\n\t\trs.arr = rs.arr[:last]\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "09a869c1757453659ba2d20c27f3b996", "score": "0.58025736", "text": "func Remove(id uint) (ok bool) {\n\tif ok = lists.Remove(id); !ok {\n\t\tfmt.Fprintf(os.Stderr, \"Failed to find task '%d'\\n\", id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "8ea37339b7ea416b71f01baf3b7b53e0", "score": "0.57574314", "text": "func (q *Queue) RemoveElement() interface{} {\n\te := q.root.next\n\te.next.prev = q.root\n\tq.root.next = e.next\n\te.queue = nil\n\tq.len--\n\n\treturn e.value\n}", "title": "" }, { "docid": "f96b65f7ea4b17a01fbd1d41f444489b", "score": "0.5753681", "text": "func (p *TxPool) Remove(txID polo.Bytes32) bool {\n\tif p.all.Remove(txID) {\n\t\t//\t\tlog.Debug(\"tx removed\", \"id\", txID)\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "f4c9ac9a54a66f2be952db03c24c69b9", "score": "0.57475233", "text": "func (s *SyncStorage) RemoveIf(ns string, key string, data interface{}) (bool, error) {\n\tstatus, err := s.getDbBackend(ns).DelIE(getNsPrefix(ns)+key, data)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\treturn status, nil\n}", "title": "" }, { "docid": "165e56af94a033bf33f936a45b4957f0", "score": "0.57385796", "text": "func (n *trieNode) okToRemove() bool {\n\tif n.member {\n\t\treturn false\n\t}\n\tfor _, c := range n.children {\n\t\tif c != nil {\n\t\t\t// Still has a child, can't remove\n\t\t\treturn false\n\t\t}\n\t}\n\tif n.bitmap == nil {\n\t\t// not a bitmap node, so OK to remove.\n\t\treturn true\n\t}\n\treturn n.bitmap.isEmpty()\n}", "title": "" }, { "docid": "8ed9b17342f7fb9fd712ebf7efa535a5", "score": "0.5685521", "text": "func (list *LinkedList[T]) RemoveBack() (T, bool) {\n\tlist.key.Lock()\n\tdefer list.key.Unlock()\n\n\tif list.last == nil {\n\t\treturn *new(T), false\n\t}\n\n\tretval := list.last.payload\n\tlist.length--\n\n\tif list.length == 0 {\n\t\tlist.first = nil\n\t} else {\n\t\tlist.last = list.last.prev\n\t\tlist.last.next = nil\n\t}\n\treturn retval, true\n}", "title": "" }, { "docid": "e79e55b4c0db470beece0bcc9dbc029e", "score": "0.5665143", "text": "func (e Elem) Deleted() bool {\n\t_, ok := e.Peer.(*tg.InputPeerEmpty)\n\treturn ok\n}", "title": "" }, { "docid": "eb74f5bcced6f0054eb338d74e830344", "score": "0.5660199", "text": "func (list *List) Remove(nick string) (ok bool) {\n\tlist.mutex.Lock()\n\tdefer list.mutex.Unlock()\n\n\tuser := list.index[strings.ToLower(nick)]\n\tif user == nil {\n\t\treturn false\n\t}\n\n\tfor i := range list.users {\n\t\tif list.users[i] == user {\n\t\t\tlist.users = append(list.users[:i], list.users[i+1:]...)\n\t\t\tbreak\n\t\t}\n\t}\n\tdelete(list.index, strings.ToLower(nick))\n\n\treturn true\n}", "title": "" }, { "docid": "4e381d6506691f639982d834ffff4382", "score": "0.5638828", "text": "func (n *TNode) Remove(id TreeEntity, group int) bool {\n\tn.Count--\n\tll := len(n.Sets)\n\tvar nil TreeEntity // because this is a template\n\tfor i := range n.Sets {\n\t\ts := &n.Sets[i]\n\t\tif s.Group == group {\n\t\t\tl := len(s.IDs)\n\n\t\t\tif l == 1 {\n\t\t\t\tif s.IDs[0] != id {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t\ts.IDs[0] = nil\n\t\t\t\tn.Sets[i], n.Sets[ll-1] = n.Sets[ll-1], *s\n\t\t\t\tn.Sets = n.Sets[:ll-1]\n\t\t\t\treturn true\n\t\t\t}\n\n\t\t\tfor j := 0; j < l; j++ {\n\t\t\t\tif id == s.IDs[j] {\n\t\t\t\t\tl--\n\t\t\t\t\ts.IDs[j] = s.IDs[l]\n\t\t\t\t\ts.IDs[l] = nil\n\t\t\t\t\ts.IDs = s.IDs[:l]\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c34469f848df27519c483ae40c57100f", "score": "0.56372684", "text": "func (s int64set) remove(value int64) bool {\n\n\t// 'ok' is true if value is within set\n\t_, ok := s[value]\n\tif !ok {\n\t\treturn false // signifies nothing was removed\n\t}\n\n\t// otherwise it exists so you should remove it.\n\tdelete(s, value)\n\treturn true\n}", "title": "" }, { "docid": "36a14f16b396798a86e84a3d5e56408d", "score": "0.5635412", "text": "func (s *Set) Add(element interface{}) bool {\n\t_, exists := (*s)[element]\n\t(*s)[element] = struct{}{}\n\treturn !exists\n}", "title": "" }, { "docid": "1ebc72d87e8dce209a3ac0f6b190c3ba", "score": "0.56306565", "text": "func (this *RandomizedSet) Remove(val int) bool {\r\n\tloc, ok := this.dict[val]\r\n\tif !ok {return false}\r\n\tif loc > 0 {\r\n\t\tfirst := this.location[0]\r\n\t\tthis.location[loc] = first\r\n\t\tthis.dict[first] = loc\r\n\t}\r\n\tthis.location = this.location[1:]\r\n\tdelete(this.dict, val)\r\n\treturn true\r\n}", "title": "" }, { "docid": "47f1c544445d4b04d08de821a6544a96", "score": "0.56251496", "text": "func Remove(xRefTable *types.XRefTable, files types.StringSet) (ok bool, err error) {\n\n\tlog.Debug.Println(\"Remove begin\")\n\n\tif !xRefTable.Valid && xRefTable.EmbeddedFiles == nil {\n\t\txRefTable.EmbeddedFiles, err = xRefTable.LocateNameTree(\"EmbeddedFiles\", false)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t}\n\n\tif xRefTable.EmbeddedFiles == nil {\n\t\treturn false, errors.Errorf(\"no attachments available.\")\n\t}\n\n\tok, err = removeAttachedFiles(xRefTable, files)\n\n\tlog.Debug.Println(\"Remove end\")\n\n\treturn ok, err\n}", "title": "" }, { "docid": "476ef3601acb4260b59e5dcbb9281eff", "score": "0.5617127", "text": "func (s *StrSet) Remove(element string) {\n\tdelete(s.els, element)\n}", "title": "" }, { "docid": "a4153221dc1b973dd1ac9eb6109ce8f0", "score": "0.5596209", "text": "func (i *OrderedItems) Del(key interface{}) bool {\n\ti.mu.Lock()\n\tdefer i.mu.Unlock()\n\tdelete(i.OrderedItems, key)\n\tfor id, val := range i.KeySlice {\n\t\tif val == key {\n\t\t\ti.KeySlice = append(i.KeySlice[:id], i.KeySlice[id+1:]...)\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "e18adfafae1da006303451f292c79083", "score": "0.5586509", "text": "func (b *books) Remove(id string) bool {\n\n\tif !b.isOpen() {\n\t\tlog.Panic(\"Repositorio não aberto\")\n\t}\n\n\t_, err := b.db.Exec(\"DELETE FROM CAD_BOOKS WHERE COD_BOOK = ?\", id)\n\n\treturn err == nil\n}", "title": "" }, { "docid": "cbb5743b0191e3aa05438335f6c1f6da", "score": "0.55789393", "text": "func (this *RandomizedSet) Remove(val int) bool {\n\tif ind, ok := this.table[val]; ok {\n\t\tdelete(this.table, val)\n\t\tthis.arr[ind], this.arr[len(this.arr)-1] = this.arr[len(this.arr)-1], this.arr[ind]\n\t\tthis.arr = this.arr[:len(this.arr)-1]\n\t\tif ind < len(this.arr) {\n\t\t\tthis.table[this.arr[ind]] = ind\n\t\t}\n\n\t\treturn true\n\t} else {\n\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "b6fd57914b84e09a368981fb648bf5f3", "score": "0.5576762", "text": "func (sm *scoreMemberMap) remove(score float64, member string) bool {\n\tcur := sm.tail\n\tfor cur != nil {\n\t\tif cur.score == score {\n\t\t\tbreak\n\t\t}\n\t\tcur = cur.pre\n\t}\n\tif cur == nil {\n\t\treturn false\n\t}\n\n\tif len(cur.members) == 1 {\n\t\tif cur.next != nil {\n\t\t\tcur.next.pre = cur.pre\n\t\t} else {\n\t\t\tsm.tail = cur.pre\n\t\t}\n\t\tif cur.pre != nil {\n\t\t\tcur.pre.next = cur.next\n\t\t} else {\n\t\t\tsm.head = cur.next\n\t\t}\n\t\tcur = nil\n\t\tsm.size -= 1\n\t\treturn true\n\t}\n\n\ti := -1\n\tfor j, v := range cur.members {\n\t\tif v == member {\n\t\t\ti = j\n\t\t\tbreak\n\t\t}\n\t}\n\tcur.members = append(cur.members[0:i], cur.members[i+1:]...)\n\tsm.size -= 1\n\treturn true\n}", "title": "" }, { "docid": "817416bb9a766d3df2ddd30f578f6702", "score": "0.5573366", "text": "func (s StringSet) Remove(element string) {\n\tif s.Has(element) {\n\t\tdelete(s.Set, element)\n\t}\n}", "title": "" }, { "docid": "5868fb9816e0569aba86800045167753", "score": "0.55592597", "text": "func (s String) Remove(key string) bool {\n\t_, ok := s[key]\n\tdelete(s, key)\n\treturn ok\n}", "title": "" }, { "docid": "bf15af1ac07e3ddec03d009a393f3a1e", "score": "0.5557135", "text": "func (bv *Values) Remove(value interface{}, n int) bool {\n\treturn bv.remove(reflect.TypeOf(value), n)\n}", "title": "" }, { "docid": "34ea82739124eef67b10b2f3336b8eeb", "score": "0.554212", "text": "func (t *RoutingTable) Remove(node Node) (wasRemoved bool) {\n\tt.mutex.Lock()\n\t// TODO: Students should implement this\n\tNodeId := node.Id\n\tPreLen := SharedPrefixLength(NodeId, t.local.Id)\n\tcol := NodeId[PreLen]\n\tslot := t.rows[PreLen][col]\n\twasRemoved = false\n\tfor j := 0; j < len(*slot); j++ {\n\t\tcompare := (*slot)[j].Id.big()\n\t\t\n\t\t// if found node to remove\n\t\tif compare.Cmp(NodeId.big()) == 0 {\n\t\t\tif len(*slot) == 1 {\n\t\t\t\tiniSlot := make([]Node, 0, SLOTSIZE)\n\t\t\t t.rows[PreLen][col] = &iniSlot\n\t\t\t break\n\t\t\t}\n\t\t\tfor i := j; i < len(*slot) - 1; i++ {\n\t\t\t\t(*slot)[i] = (*slot)[i + 1]\n\t\t\t}\n\t\t\tnewSlot := (*slot)[:len(*slot) - 1]\n\t\t\tt.rows[PreLen][col] = &newSlot\n\t\t\twasRemoved = true\n\t\t\tbreak\n\t\t}\n\t}\n\t\n\tt.mutex.Unlock()\n\treturn wasRemoved\n}", "title": "" }, { "docid": "092ebcfcc3d477a2c6907382f12cb5fe", "score": "0.55368197", "text": "func (l *Int32) Remove(value int32) bool {\n\tfor i, v := range l.values {\n\t\tif v == value {\n\t\t\tl.values = append(l.values[:i], l.values[i+1:]...)\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "ef4bf6678c5429de40dcdb76d63c3dae", "score": "0.55249053", "text": "func (this *DynMap) Remove(key string) (interface{}, bool) {\n\tval, ok := this.Map[key]\n\tif ok {\n\t\tdelete(this.Map, key)\n\t\treturn val, true\n\t}\n\t//TODO: dot op..\n\treturn val, false\n\n}", "title": "" }, { "docid": "38ca81cd4e85a694aa41ea5fbb93cea1", "score": "0.55245984", "text": "func (c *Cache) Remove(key string) (interface{}, bool) {\n\tv, ok := c.data[key]\n\n\tif !ok {\n\t\treturn nil, false\n\t}\n\n\titem := v.Value.(*cacheItem)\n\n\tc.lists[item.lidx].Remove(v)\n\n\tdelete(c.data, key)\n\n\treturn item.value, true\n}", "title": "" }, { "docid": "c479c11273e6a232fba0043f59c51208", "score": "0.55088556", "text": "func (t *RoutingTable) Remove(node RemoteNode) (wasRemoved bool) {\n\tt.mutex.Lock()\n\tdefer t.mutex.Unlock()\n\n\t// TODO: students should implement this\n\tlevel := SharedPrefixLength(node.ID, t.local.ID)\n\tif level == DIGITS {\n\t\twasRemoved = false\n\t\treturn\n\t}\n\tslot := t.rows[level][node.ID[level]]\n\tfor i:=0; i<len(slot); i++ {\n\t\tn := slot[i]\n\t\tif n == node {\n\t\t\tt.rows[level][node.ID[level]] = append(slot[:i], slot[i+1:]...)\n\t\t\twasRemoved = true\n\t\t\treturn\n\t\t}\n\t}\n\twasRemoved = false\n\treturn\n}", "title": "" }, { "docid": "437bd75340a0ae938e7872d91ad3cc2a", "score": "0.54933226", "text": "func (m *OrderedMap[K,V]) Remove(k K) (v V, ok bool) {\n\tif !m.Has(k) {\n\t\treturn\n\t}\n\te := m.mp[k]\n\tm.list.Remove(e)\n\tdelete(m.mp, k)\n\tv, ok = e.Value.Value, true\n\treturn\n}", "title": "" }, { "docid": "57539443176c34d407adb5c2b043880a", "score": "0.54931283", "text": "func (d *DoublyLinkedList) RemoveNode(val interface{}) bool {\n\tcurr := d.Head\n\tif curr == nil {\n\t\treturn false\n\t}\n\tif curr.Val == val {\n\t\tcurr = curr.Next\n\t\td.Count -= 1\n\t\tif curr != nil {\n\t\t\td.Head = curr\n\t\t\td.Head.Prev = nil\n\t\t} else {\n\t\t\td.Tail = nil\n\t\t}\n\t\treturn true\n\t}\n\tfor curr.Next != nil {\n\t\tif curr.Next.Val == val {\n\t\t\tcurr.Next = curr.Next.Next\n\t\t\td.Count -= 1\n\t\t\tif curr.Next == nil {\n\t\t\t\td.Tail = curr\n\t\t\t} else {\n\t\t\t\td.Tail.Prev = curr\n\t\t\t}\n\t\t\treturn true\n\t\t}\n\t\tcurr = curr.Next\n\t}\n\treturn false\n}", "title": "" } ]
8d48e64e44e799e979f0f8cc727c4ac4
AddRewardUTXO provides a mock function with given fields: txID, utxo
[ { "docid": "74e4e2ac37564e5f90a449f6ac776009", "score": "0.8408751", "text": "func (_m *MockInternalState) AddRewardUTXO(txID ids.ID, utxo *avax.UTXO) {\n\t_m.Called(txID, utxo)\n}", "title": "" } ]
[ { "docid": "e0cd8e9eacb0d501d7aa363b07edfea3", "score": "0.68052304", "text": "func (_m *MockInternalState) AddUTXO(utxo *avax.UTXO) {\n\t_m.Called(utxo)\n}", "title": "" }, { "docid": "3a2eed71d0797eb998a25d58e5450688", "score": "0.62853074", "text": "func (_m *MockInternalState) GetRewardUTXOs(txID ids.ID) ([]*avax.UTXO, error) {\n\tret := _m.Called(txID)\n\n\tvar r0 []*avax.UTXO\n\tif rf, ok := ret.Get(0).(func(ids.ID) []*avax.UTXO); ok {\n\t\tr0 = rf(txID)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]*avax.UTXO)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(ids.ID) error); ok {\n\t\tr1 = rf(txID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "c2984879d8d71600cde23bd61495ea90", "score": "0.5664943", "text": "func MockUTXO(controlProg *account.CtrlProgram) *account.UTXO {\n\tutxo := &account.UTXO{}\n\tutxo.OutputID = bc.Hash{V0: 1}\n\tutxo.SourceID = bc.Hash{V0: 2}\n\tutxo.AssetID = *consensus.BTMAssetID\n\tutxo.Amount = 1000000000\n\tutxo.SourcePos = 0\n\tutxo.ControlProgram = controlProg.ControlProgram\n\tutxo.AccountID = controlProg.AccountID\n\tutxo.Address = controlProg.Address\n\tutxo.ControlProgramIndex = controlProg.KeyIndex\n\tutxo.Change = controlProg.Change\n\treturn utxo\n}", "title": "" }, { "docid": "1fe15883b49c9c7a741018bca5c31771", "score": "0.5410012", "text": "func MockTx(utxo *account.UTXO, testAccount *account.Account) (*txbuilder.Template, *types.TxData, error) {\n\ttxInput, sigInst, err := account.UtxoToInputs(testAccount.Signer, utxo)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tb := txbuilder.NewBuilder(time.Now())\n\tif err := b.AddInput(txInput, sigInst); err != nil {\n\t\treturn nil, nil, err\n\t}\n\tout := types.NewTxOutput(*consensus.BTMAssetID, 100, []byte{byte(vm.OP_FAIL)})\n\tif err := b.AddOutput(out); err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn b.Build()\n}", "title": "" }, { "docid": "41b91252b31096211d2163ce67a436fc", "score": "0.54040486", "text": "func (_m *WalletUsecase) AddByUserID(ctx context.Context, userID uuid.UUID, sum int) (*domain.Wallet, error) {\n\tret := _m.Called(ctx, userID, sum)\n\n\tvar r0 *domain.Wallet\n\tif rf, ok := ret.Get(0).(func(context.Context, uuid.UUID, int) *domain.Wallet); ok {\n\t\tr0 = rf(ctx, userID, sum)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*domain.Wallet)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, uuid.UUID, int) error); ok {\n\t\tr1 = rf(ctx, userID, sum)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "5818a2b63487b2c5a4c2442978159a73", "score": "0.52487403", "text": "func (_m *MockInternalState) AddCurrentStaker(tx *Tx, potentialReward uint64) {\n\t_m.Called(tx, potentialReward)\n}", "title": "" }, { "docid": "8db3df0222a8fbad599df7e7dd7652f1", "score": "0.52481925", "text": "func (_m *MockInternalState) AddTx(tx *Tx, status Status) {\n\t_m.Called(tx, status)\n}", "title": "" }, { "docid": "cd3f793fab5e6c8f26c6dda2875b8faa", "score": "0.51744026", "text": "func (_m *MockInternalState) AddPendingStaker(tx *Tx) {\n\t_m.Called(tx)\n}", "title": "" }, { "docid": "37a0b2352930872bbb82f465fcaae921", "score": "0.5119042", "text": "func (db *db) AddCommitteeReward(\n\tcommitteeAddress []byte,\n\tamount uint64,\n\ttokenID common.Hash,\n) error {\n\tkey := newKeyAddCommitteeReward(committeeAddress, tokenID)\n\toldValue, isExist := db.Get(key)\n\tif isExist != nil {\n\t\terr := db.Put(key, common.Uint64ToBytes(amount))\n\t\tif err != nil {\n\t\t\treturn database.NewDatabaseError(database.UnexpectedError, err)\n\t\t}\n\t} else {\n\t\tnewValue, err := common.BytesToUint64(oldValue)\n\t\tif err != nil {\n\t\t\treturn database.NewDatabaseError(database.UnexpectedError, err)\n\t\t}\n\t\tnewValue += amount\n\t\terr = db.Put(key, common.Uint64ToBytes(newValue))\n\t\tif err != nil {\n\t\t\treturn database.NewDatabaseError(database.UnexpectedError, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "129b3a29f3ffec66e9cb7230668c2c5a", "score": "0.5009646", "text": "func (_m *UsersRepository) Add(user *domain.User) error {\n\tret := _m.Called(user)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(*domain.User) error); ok {\n\t\tr0 = rf(user)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "1f126e57eb5b60aa03289e151df0325e", "score": "0.49356106", "text": "func (_m *mockMemberList) addDataStructureToRaftIdMapping(dataStructureId *ID, raftId uint64) error {\n\tret := _m.Called(dataStructureId, raftId)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(*ID, uint64) error); ok {\n\t\tr0 = rf(dataStructureId, raftId)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "acebd6a218a6e3df8405643afe721628", "score": "0.49273726", "text": "func (um utxoMapper) AddUTXO(ctx sdk.Context, utxo types.UTXO) {\n\tposition := utxo.GetPosition()\n\tpos := um.encodePosition(position)\n\n\tstore := ctx.KVStore(um.contextKey)\n\tbz := um.encodeUTXO(utxo)\n\tstore.Set(pos, bz)\n}", "title": "" }, { "docid": "dbc194d459c1b7fa9cec3c7642b81ff4", "score": "0.4917331", "text": "func (m *MockConfidentialTxApi) Add(tx *types.ConfidentialTx, txinList *[]types.InputConfidentialTxIn, txoutList *[]types.InputConfidentialTxOut, pegoutAddressList *[]string) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Add\", tx, txinList, txoutList, pegoutAddressList)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "dea290e98e62b8cfa45d5328c3e4066e", "score": "0.48957345", "text": "func (m *MockMempool) Add(arg0 *txs.Tx) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Add\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "eceb336ff5cd6003f2c8d5508867e129", "score": "0.48365605", "text": "func (m *MockRepository) Add(sessionId string, userId uint) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AddFilmReview\", sessionId, userId)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "880defcd8823f741ac757d12c8f81826", "score": "0.48117962", "text": "func (_m *MockInternalState) GetUTXO(utxoID ids.ID) (*avax.UTXO, error) {\n\tret := _m.Called(utxoID)\n\n\tvar r0 *avax.UTXO\n\tif rf, ok := ret.Get(0).(func(ids.ID) *avax.UTXO); ok {\n\t\tr0 = rf(utxoID)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*avax.UTXO)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(ids.ID) error); ok {\n\t\tr1 = rf(utxoID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "204e52624a2d29d234df9148cda52fc2", "score": "0.47904396", "text": "func (_m *mockMembershipProxy) addLearnerToRaftGroupRemotely(newRaftId uint64, peers *pb.RaftPeer) error {\n\tret := _m.Called(newRaftId, peers)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(uint64, *pb.RaftPeer) error); ok {\n\t\tr0 = rf(newRaftId, peers)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "2558299ffc17e2474805dbec491d06ad", "score": "0.47737905", "text": "func (m *MockTx) RenewTx() {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"RenewTx\")\n}", "title": "" }, { "docid": "4910ca5d8ac97fe0977cfa7b508e0b88", "score": "0.47609195", "text": "func (_m *mockMembershipProxy) addLearnerToRaftGroup(ctx context.Context, existingRaftId uint64, newRaftId uint64) error {\n\tret := _m.Called(ctx, existingRaftId, newRaftId)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, uint64, uint64) error); ok {\n\t\tr0 = rf(ctx, existingRaftId, newRaftId)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "9ed0683dd278f7f1c6f9eccee1a948e9", "score": "0.4754866", "text": "func (m *MockProfileServiceServer) AddToPaymentHistory(arg0 context.Context, arg1 *gen.AddToHistory) (*gen.Empty, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AddToPaymentHistory\", arg0, arg1)\n\tret0, _ := ret[0].(*gen.Empty)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "72863406744e205953bb17ccb10050af", "score": "0.47171894", "text": "func (_m *FluxAggregator) TransferOwnership(opts *bind.TransactOpts, _to common.Address) (*types.Transaction, error) {\n\tret := _m.Called(opts, _to)\n\n\tvar r0 *types.Transaction\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts, common.Address) (*types.Transaction, error)); ok {\n\t\treturn rf(opts, _to)\n\t}\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts, common.Address) *types.Transaction); ok {\n\t\tr0 = rf(opts, _to)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*types.Transaction)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(*bind.TransactOpts, common.Address) error); ok {\n\t\tr1 = rf(opts, _to)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "7f4c36458a582db0343597a5cdeecee0", "score": "0.4712581", "text": "func (_m *FluxAggregator) OnTokenTransfer(opts *bind.TransactOpts, arg0 common.Address, arg1 *big.Int, _data []byte) (*types.Transaction, error) {\n\tret := _m.Called(opts, arg0, arg1, _data)\n\n\tvar r0 *types.Transaction\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts, common.Address, *big.Int, []byte) (*types.Transaction, error)); ok {\n\t\treturn rf(opts, arg0, arg1, _data)\n\t}\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts, common.Address, *big.Int, []byte) *types.Transaction); ok {\n\t\tr0 = rf(opts, arg0, arg1, _data)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*types.Transaction)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(*bind.TransactOpts, common.Address, *big.Int, []byte) error); ok {\n\t\tr1 = rf(opts, arg0, arg1, _data)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "221a466a4ec3924b718c56f9b3f7eeee", "score": "0.46857885", "text": "func (m *MockRepo) AddPurchases(ctx context.Context, purchases []purchase.Purchase) ([]uint64, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AddPurchases\", ctx, purchases)\n\tret0, _ := ret[0].([]uint64)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "75b4d153cc2cdd07f597f2b0414bb776", "score": "0.46538562", "text": "func (_m *FluxAggregator) AcceptOwnership(opts *bind.TransactOpts) (*types.Transaction, error) {\n\tret := _m.Called(opts)\n\n\tvar r0 *types.Transaction\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts) (*types.Transaction, error)); ok {\n\t\treturn rf(opts)\n\t}\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts) *types.Transaction); ok {\n\t\tr0 = rf(opts)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*types.Transaction)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(*bind.TransactOpts) error); ok {\n\t\tr1 = rf(opts)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "6d59c7b4c7009740b56226c44df1dc18", "score": "0.4629296", "text": "func (m *MockRepo) AddPurchase(ctx context.Context, purchases purchase.Purchase) (uint64, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AddPurchase\", ctx, purchases)\n\tret0, _ := ret[0].(uint64)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "120407affe201158e4d92367caab5461", "score": "0.46184012", "text": "func (accManager AccountManager) AddIncomeAndReward(\n\tctx sdk.Context, username types.AccountKey,\n\toriginalDonation, friction, actualReward types.Coin,\n\tconsumer, postAuthor types.AccountKey, postID string) sdk.Error {\n\treward, err := accManager.storage.GetReward(ctx, username)\n\tif err != nil {\n\t\treturn err\n\t}\n\treward.TotalIncome = reward.TotalIncome.Plus(actualReward)\n\treward.OriginalIncome = reward.OriginalIncome.Plus(friction)\n\treward.FrictionIncome = reward.FrictionIncome.Plus(friction)\n\treward.InflationIncome = reward.InflationIncome.Plus(actualReward)\n\treward.UnclaimReward = reward.UnclaimReward.Plus(actualReward)\n\tif err := accManager.storage.SetReward(ctx, username, reward); err != nil {\n\t\treturn err\n\t}\n\n\t// add reward detail\n\tbank, err := accManager.storage.GetBankFromAccountKey(ctx, username)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\trewardDetail := model.RewardDetail{\n\t\tOriginalDonation: originalDonation,\n\t\tFrictionDonation: friction,\n\t\tActualReward: actualReward,\n\t\tConsumer: consumer,\n\t\tPostAuthor: postAuthor,\n\t\tPostID: postID,\n\t}\n\tif err := accManager.AddRewardHistory(ctx, username, bank.NumOfReward,\n\t\trewardDetail); err != nil {\n\t\treturn err\n\t}\n\n\tbank.NumOfReward++\n\tif err := accManager.storage.SetBankFromAccountKey(ctx, username, bank); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0a3c7a7c4e837831d2cd00786482a617", "score": "0.46123603", "text": "func newKeyAddCommitteeReward(\n\tcommitteeAddress []byte,\n\ttokenID common.Hash,\n) []byte {\n\tres := []byte{}\n\tres = append(res, committeeRewardPrefix...)\n\tres = append(res, committeeAddress...)\n\tres = append(res, tokenID.GetBytes()...)\n\treturn res\n}", "title": "" }, { "docid": "54786689733f9fff80981553c2fc80e1", "score": "0.4596985", "text": "func (_m *NodeService) Upsert(_a0 context.Context, _a1 *dto.Node) error {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, *dto.Node) error); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "f54da186ea386bf44c177318b2a68c8b", "score": "0.45888373", "text": "func (m *MockGroupRepository) AddOwners(ctx context.Context, groupID uuid.UUID, ownerIDs []uuid.UUID) ([]*model.Owner, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AddOwners\", ctx, groupID, ownerIDs)\n\tret0, _ := ret[0].([]*model.Owner)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "7704a4848dcc457def8a6593b17f2441", "score": "0.45810142", "text": "func (_m *Repository) Rollback(ctx context.Context, tx *query.Transaction) error {\n\tret := _m.Called(ctx, tx)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, *query.Transaction) error); ok {\n\t\tr0 = rf(ctx, tx)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "5de10b79c7f03c935f9aafb9bc8fe92e", "score": "0.45784876", "text": "func (m *MockUserStore) AddUser(arg0 string) error {\n\tret := m.ctrl.Call(m, \"AddUser\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "a108ee0d0c8fe53cc776e80beb62c8eb", "score": "0.4577362", "text": "func (_m *MockFetchBlockMetadataResults) Add(res FetchBlockMetadataResult) {\n\t_m.ctrl.Call(_m, \"Add\", res)\n}", "title": "" }, { "docid": "6d3877ca59d78c326dc695384c6dccbf", "score": "0.4577277", "text": "func (_m ReminderRepository) Commit(_a0 *pg.Tx) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(*pg.Tx) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "9362c8d579ce904baef9e6d1c4a1cd0a", "score": "0.45721197", "text": "func (m *MockStateInfo) RewardAtHeight(height proto.Height) (uint64, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RewardAtHeight\", height)\n\tret0, _ := ret[0].(uint64)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "7f76b44691172a01ea717fa712cf269f", "score": "0.4553789", "text": "func TestMyFunction(t *testing.T) {\n\tmockedUserStore := MockUserStore{}\n\n\tmockedUserStore.On(\"GetUser\", \"Cube\").Return(&User{Name: \"Jakub\", Surname: \"Martin\", Age: 18}, nil)\n\tmockedUserStore.On(\"GetUser\", \"Cube2\").Return(nil, errors.Errorf(\"User not found.\"))\n\tmockedUserStore.On(\"SetUser\", \"Cube\", mock.AnythingOfType(\"*mocking.User\")).Return(errors.Errorf(\"User already exists.\"))\n\tmockedUserStore.On(\"SetUser\", \"Cube2\", mock.AnythingOfType(\"*mocking.User\")).Return(nil)\n\n\tuser, err := mockedUserStore.GetUser(\"Cube\")\n\tif err != nil {\n\t\tt.Log(err)\n\t} else {\n\t\tt.Logf(\"%v\", user)\n\t}\n\tuser, err = mockedUserStore.GetUser(\"Cube2\")\n\tif err != nil {\n\t\tt.Log(err)\n\t} else {\n\t\tt.Logf(\"%v\", user)\n\t}\n\terr = mockedUserStore.SetUser(\"Cube\", &User{Name: \"Jakub\", Surname: \"Martin\", Age:18})\n\tif err != nil {\n\t\tt.Log(err)\n\t}\n\terr = mockedUserStore.SetUser(\"Cube2\", &User{Name: \"Jakub\", Surname: \"Martin2\", Age:18})\n\tif err != nil {\n\t\tt.Log(err)\n\t}\n}", "title": "" }, { "docid": "94e501b5c207479a72a3dc5e61cfb184", "score": "0.45500958", "text": "func (m *MockExplorerInterface) Transaction(hash string) (map[string]interface{}, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Transaction\", hash)\n\tret0, _ := ret[0].(map[string]interface{})\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "96f9fc802bd1a72bc8acc643faa7a66c", "score": "0.45498115", "text": "func (_m *FluxAggregator) TransferAdmin(opts *bind.TransactOpts, _oracle common.Address, _newAdmin common.Address) (*types.Transaction, error) {\n\tret := _m.Called(opts, _oracle, _newAdmin)\n\n\tvar r0 *types.Transaction\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts, common.Address, common.Address) (*types.Transaction, error)); ok {\n\t\treturn rf(opts, _oracle, _newAdmin)\n\t}\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts, common.Address, common.Address) *types.Transaction); ok {\n\t\tr0 = rf(opts, _oracle, _newAdmin)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*types.Transaction)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(*bind.TransactOpts, common.Address, common.Address) error); ok {\n\t\tr1 = rf(opts, _oracle, _newAdmin)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "173037ea24d996744e9e7237616749f3", "score": "0.45457911", "text": "func TestGetBlockReward(t *testing.T) {\n\tgrinAPI, addr := nextAPI(1)\n\tsrv := startTestGrinAPIServer(addr)\n\tvar blockHash = \"0822cd711993d0f9a3ffdb4e755defdd4a40aa25ce72f8053fa330247a36f687\"\n\tblockReward, err := grinAPI.GetBlockReward(blockHash)\n\tassert.NoError(t, err)\n\tvar expectedBlockReward uint64 = 60013000000\n\tassert.Equal(t, expectedBlockReward, blockReward)\n\tsrv.Shutdown(context.TODO())\n}", "title": "" }, { "docid": "b89d1d598cbe32c875ed81bc3b297b95", "score": "0.45417216", "text": "func (m *MockState) RewardAtHeight(height proto.Height) (uint64, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RewardAtHeight\", height)\n\tret0, _ := ret[0].(uint64)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "4a5d579efc0e87b190fb15ae74384b0a", "score": "0.45392054", "text": "func (m *MockTxRenewer) RenewTx() {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"RenewTx\")\n}", "title": "" }, { "docid": "373bb9ccb754815b45f74f93b18c8404", "score": "0.45388606", "text": "func (_m *MockInternalState) DeleteUTXO(utxoID ids.ID) {\n\t_m.Called(utxoID)\n}", "title": "" }, { "docid": "1de37b1a3008ab965e2e4acbfc360c42", "score": "0.4535055", "text": "func (_Room *RoomTransactor) SendReward(opts *bind.TransactOpts, _reward *big.Int, _dest common.Address, _id *big.Int) (*types.Transaction, error) {\n\treturn _Room.contract.Transact(opts, \"sendReward\", _reward, _dest, _id)\n}", "title": "" }, { "docid": "629ea2c2637431e5f3303bd880995e6b", "score": "0.45262805", "text": "func (_m *Repository) AddUuid(ctx context.Context, uuid string, id int) error {\n\tret := _m.Called(ctx, uuid, id)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, string, int) error); ok {\n\t\tr0 = rf(ctx, uuid, id)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "a7864d23f6933c0e186998fc31c96d2c", "score": "0.45213634", "text": "func makeTestTx(t *testing.T) auth.StdTx {\n\tprivKey := getPrivateKey(privateKey)\n\taddr := sdk.AccAddress(privKey.PubKey().Address())\n\torderMsg := order.NewMsgNewOrder(addr, types.TestTokenPair, types.BuyOrder, \"1\", \"0.1\")\n\treturn mock.GenTx([]sdk.Msg{orderMsg}, []uint64{0}, []uint64{0}, privKey)\n}", "title": "" }, { "docid": "7d943e3556292967834f075f99b25f8b", "score": "0.4520963", "text": "func (_Room *RoomTransactorSession) SendReward(_reward *big.Int, _dest common.Address, _id *big.Int) (*types.Transaction, error) {\n\treturn _Room.Contract.SendReward(&_Room.TransactOpts, _reward, _dest, _id)\n}", "title": "" }, { "docid": "a79a563bf91ff08081d5459625e18857", "score": "0.4518753", "text": "func (_m *MockFetchBlocksMetadataResults) Add(res FetchBlocksMetadataResult) {\n\t_m.ctrl.Call(_m, \"Add\", res)\n}", "title": "" }, { "docid": "b20505fc730116f0b3a66fc292730639", "score": "0.45162708", "text": "func (m *MockIMemory) MAdd(items map[string]interface{}, expire ...time.Duration) bool {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{items}\n\tfor _, a := range expire {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"MAdd\", varargs...)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "69bebd09412a3c2eb59044e70d60ddb5", "score": "0.45053524", "text": "func (m *MockIRedis) MAdd(items map[string]interface{}, expire ...time.Duration) bool {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{items}\n\tfor _, a := range expire {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"MAdd\", varargs...)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "6732b35612997985ea56cf2f027d9648", "score": "0.44973588", "text": "func (_m *UserService) SetUserExpiry(ctx context.Context, userID uuid.UUID, expiredAt time.Time) (*repository.User, error) {\n\tret := _m.Called(ctx, userID, expiredAt)\n\n\tvar r0 *repository.User\n\tif rf, ok := ret.Get(0).(func(context.Context, uuid.UUID, time.Time) *repository.User); ok {\n\t\tr0 = rf(ctx, userID, expiredAt)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*repository.User)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, uuid.UUID, time.Time) error); ok {\n\t\tr1 = rf(ctx, userID, expiredAt)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "ea1e64cd5d202f7380ed03e37599aafe", "score": "0.44941092", "text": "func (_Minter *MinterTransactorSession) CreateReward(_fracNum *big.Int, _fracDenom *big.Int) (*types.Transaction, error) {\n\treturn _Minter.Contract.CreateReward(&_Minter.TransactOpts, _fracNum, _fracDenom)\n}", "title": "" }, { "docid": "7068afef28489d6fbd01e976ec450b26", "score": "0.4486271", "text": "func (_m *Service) AddNamespaceUser(ctx context.Context, memberUsername string, memberRole string, tenantID string, userID string) (*models.Namespace, error) {\n\tret := _m.Called(ctx, memberUsername, memberRole, tenantID, userID)\n\n\tvar r0 *models.Namespace\n\tif rf, ok := ret.Get(0).(func(context.Context, string, string, string, string) *models.Namespace); ok {\n\t\tr0 = rf(ctx, memberUsername, memberRole, tenantID, userID)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*models.Namespace)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string, string, string, string) error); ok {\n\t\tr1 = rf(ctx, memberUsername, memberRole, tenantID, userID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "68369f3e7d3bb936a3b4b09698fe086a", "score": "0.4480481", "text": "func (_m *MockInternalState) UTXOIDs(addr []byte, start ids.ID, limit int) ([]ids.ID, error) {\n\tret := _m.Called(addr, start, limit)\n\n\tvar r0 []ids.ID\n\tif rf, ok := ret.Get(0).(func([]byte, ids.ID, int) []ids.ID); ok {\n\t\tr0 = rf(addr, start, limit)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]ids.ID)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func([]byte, ids.ID, int) error); ok {\n\t\tr1 = rf(addr, start, limit)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "40d2cda7888cf912e225afbca844a8ff", "score": "0.4475696", "text": "func (_m *DB) AddBlobsToItem(itemID string, blobIDs []string) error {\n\tret := _m.Called(itemID, blobIDs)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, []string) error); ok {\n\t\tr0 = rf(itemID, blobIDs)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "bb406c1f81300e510ba3402126b4a56a", "score": "0.44741032", "text": "func (m *MockProfileServiceClient) AddToPaymentHistory(ctx context.Context, in *gen.AddToHistory, opts ...grpc.CallOption) (*gen.Empty, error) {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{ctx, in}\n\tfor _, a := range opts {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"AddToPaymentHistory\", varargs...)\n\tret0, _ := ret[0].(*gen.Empty)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "71f4ec9d86cbb0934be56db4263bdb8e", "score": "0.4471766", "text": "func (m *MockedTransaction) Append(w Wallet, receiver string, amount uint64) error {\n\targs := m.Called(w, receiver, amount)\n\treturn args.Error(0)\n}", "title": "" }, { "docid": "8fce2b38593c534bc7fc46dc29fb217c", "score": "0.44713396", "text": "func (TestHelpers) MockTx(msg weave.Msg) weave.Tx {\n\treturn &mockTx{msg}\n}", "title": "" }, { "docid": "e01c6c436483543717e35e91f3fe1117", "score": "0.4471099", "text": "func (_m *Repository) Insert(ctx context.Context,pm models.PromoUser)error {\n\tret := _m.Called(ctx, pm)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, models.PromoUser) error); ok {\n\t\tr0 = rf(ctx, pm)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "4662c7141d7add58d6dc3a26b0bd6abb", "score": "0.4468916", "text": "func (_m *TxManager) CreateEthTransaction(db *gorm.DB, newTx bulletprooftxmanager.NewTx) (bulletprooftxmanager.EthTx, error) {\n\tret := _m.Called(db, newTx)\n\n\tvar r0 bulletprooftxmanager.EthTx\n\tif rf, ok := ret.Get(0).(func(*gorm.DB, bulletprooftxmanager.NewTx) bulletprooftxmanager.EthTx); ok {\n\t\tr0 = rf(db, newTx)\n\t} else {\n\t\tr0 = ret.Get(0).(bulletprooftxmanager.EthTx)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(*gorm.DB, bulletprooftxmanager.NewTx) error); ok {\n\t\tr1 = rf(db, newTx)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "547861c926696845044ee85925122d34", "score": "0.44675085", "text": "func (_m *FluxAggregator) WithdrawFunds(opts *bind.TransactOpts, _recipient common.Address, _amount *big.Int) (*types.Transaction, error) {\n\tret := _m.Called(opts, _recipient, _amount)\n\n\tvar r0 *types.Transaction\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts, common.Address, *big.Int) (*types.Transaction, error)); ok {\n\t\treturn rf(opts, _recipient, _amount)\n\t}\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts, common.Address, *big.Int) *types.Transaction); ok {\n\t\tr0 = rf(opts, _recipient, _amount)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*types.Transaction)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(*bind.TransactOpts, common.Address, *big.Int) error); ok {\n\t\tr1 = rf(opts, _recipient, _amount)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "1382f2506a1e75b8829324025b2c234a", "score": "0.44523942", "text": "func (accManager AccountManager) ClaimReward(\n\tctx sdk.Context, username types.AccountKey) sdk.Error {\n\treward, err := accManager.storage.GetReward(ctx, username)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err := accManager.AddSavingCoin(\n\t\tctx, username, reward.UnclaimReward, \"\", \"\", types.ClaimReward); err != nil {\n\t\treturn err\n\t}\n\treward.UnclaimReward = types.NewCoinFromInt64(0)\n\tif err := accManager.storage.SetReward(ctx, username, reward); err != nil {\n\t\treturn err\n\t}\n\n\t// clear reward history\n\tif err := accManager.ClearRewardHistory(ctx, username); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "bb29f138daa8c480a45f6ad00d0dfc54", "score": "0.4450826", "text": "func (_m *StrategyHistory) Add(ctx context.Context, s string, user string, message string) error {\n\tret := _m.Called(ctx, s, user, message)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, string, string, string) error); ok {\n\t\tr0 = rf(ctx, s, user, message)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "90e3028a6f5a0663ed188f4cdc37747c", "score": "0.44456163", "text": "func (m *MockconservativeState) AddToDB(arg0 *types.Transaction) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AddToDB\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "b3d6aa1eb5706e70f26918feae3ca8ce", "score": "0.44346178", "text": "func (r *SourceCode) AddMockTargets(mockTargets ...string) {\n\tr.MockTargets = append(r.MockTargets, mockTargets...)\n}", "title": "" }, { "docid": "117c4b5e7654cf710612bb12196e698a", "score": "0.44345465", "text": "func AddMockup(mock Mock) {\n\tmocks[getMockID(mock.HTTPMethod, mock.URL)] = &mock\n}", "title": "" }, { "docid": "903af6e8f167620bb46fab12f553485f", "score": "0.4429187", "text": "func (_m *GrantRepo) Use(UUID string, version int) error {\n\tret := _m.Called(UUID, version)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, int) error); ok {\n\t\tr0 = rf(UUID, version)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "7b9267b1c37f5f98681e36559c37afac", "score": "0.44271243", "text": "func (t Ticket) agentAdd(stub shim.ChaincodeStubInterface) pb.Response {\n\n\t_, args := stub.GetFunctionAndParameters()\n\tif len(args) != 1 {\n\t\treturn t.WriteError(fmt.Sprintf(\"arguments count mismatch: %v\", args))\n\t}\n\n\t_, _, invokerRole, err := t.getActors(stub)\n\tif err != nil {\n\t\treturn t.WriteError(err)\n\t}\n\n\tif invokerRole != RoleMerchant {\n\t\treturn t.WriteError(fmt.Sprintf(\"only merchant can add agent, your role is: %s\", invokerRole))\n\t}\n\n\tagentKey, err := t.getAgentKey(stub, args[0])\n\tif err != nil {\n\t\treturn t.WriteError(err)\n\t}\n\n\tif err = stub.PutState(agentKey, []byte(args[0])); err != nil {\n\t\treturn t.WriteError(err)\n\t}\n\n\treturn t.WriteSuccess(nil)\n}", "title": "" }, { "docid": "e5ac917145f925e9b24f081f0bcc24bd", "score": "0.44249117", "text": "func (accManager AccountManager) AddRewardHistory(\n\tctx sdk.Context, username types.AccountKey, numOfReward int64,\n\trewardDetail model.RewardDetail) sdk.Error {\n\n\tslotNum := numOfReward / types.RewardHistoryBundleSize\n\n\trewardHistory, err := accManager.storage.GetRewardHistory(ctx, username, slotNum)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif rewardHistory == nil {\n\t\trewardHistory = &model.RewardHistory{Details: []model.RewardDetail{}}\n\t}\n\n\trewardHistory.Details = append(rewardHistory.Details, rewardDetail)\n\n\tif err := accManager.storage.SetRewardHistory(\n\t\tctx, username, slotNum, rewardHistory); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "51e7c2a2ba123ab8fecf34b92bbb9d71", "score": "0.44192737", "text": "func (_Minter *MinterSession) CreateReward(_fracNum *big.Int, _fracDenom *big.Int) (*types.Transaction, error) {\n\treturn _Minter.Contract.CreateReward(&_Minter.TransactOpts, _fracNum, _fracDenom)\n}", "title": "" }, { "docid": "fec3f580370b62f2a44ba6fc1f858036", "score": "0.4419191", "text": "func (_Minter *MinterTransactor) CreateReward(opts *bind.TransactOpts, _fracNum *big.Int, _fracDenom *big.Int) (*types.Transaction, error) {\n\treturn _Minter.contract.Transact(opts, \"createReward\", _fracNum, _fracDenom)\n}", "title": "" }, { "docid": "47d90682d2bea29a8ff7c853845e45a8", "score": "0.44131312", "text": "func (_m *MockProxy) Upsert(ctx context.Context, request *milvuspb.UpsertRequest) (*milvuspb.MutationResult, error) {\n\tret := _m.Called(ctx, request)\n\n\tvar r0 *milvuspb.MutationResult\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(context.Context, *milvuspb.UpsertRequest) (*milvuspb.MutationResult, error)); ok {\n\t\treturn rf(ctx, request)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, *milvuspb.UpsertRequest) *milvuspb.MutationResult); ok {\n\t\tr0 = rf(ctx, request)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*milvuspb.MutationResult)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, *milvuspb.UpsertRequest) error); ok {\n\t\tr1 = rf(ctx, request)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "a0c134d391c236369c98c3f4462fdeec", "score": "0.4408647", "text": "func TestAddRxRyRz(t *testing.T) {\n\ta := assert.New(t)\n\tv := vm.NewState()\n\n\tfor _, test := range addTestCases {\n\t\tv.Regs[2] = test.x\n\t\tv.Regs[4] = test.y\n\n\t\tif a.NoError(Eval(v, vm.Opcode(0x42420500))) {\n\t\t\tcheckOpResults(a, &test, v.Regs[5], v.Flags, \"+\")\n\t\t\ta.Equalf(vm.Pointer(vm.RAMStart), v.PC, \"PC shouldn't move\")\n\t\t\ta.Equalf(vm.Pointer(vm.StackStart), v.SP, \"SP shouldn't move\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a13227ceb0ffdd57ae149c09d7bc5f31", "score": "0.44030982", "text": "func (_m *TxManager) CreateTx(to common.Address, data []byte) (*models.Tx, error) {\n\tret := _m.Called(to, data)\n\n\tvar r0 *models.Tx\n\tif rf, ok := ret.Get(0).(func(common.Address, []byte) *models.Tx); ok {\n\t\tr0 = rf(to, data)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*models.Tx)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(common.Address, []byte) error); ok {\n\t\tr1 = rf(to, data)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "e9d706d80aab20fcc45600504f77be48", "score": "0.4402985", "text": "func (_User *UserTransactor) AddPasswords(opts *bind.TransactOpts, _hashedPasswords [][32]byte) (*types.Transaction, error) {\n\treturn _User.contract.Transact(opts, \"addPasswords\", _hashedPasswords)\n}", "title": "" }, { "docid": "3a170862331c2613be5426fa607b050a", "score": "0.43965372", "text": "func (m *MockClient) AddRoleToKeycloakUser(arg0, arg1 string, arg2 keycloak.Role, arg3 string) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AddRoleToKeycloakUser\", arg0, arg1, arg2, arg3)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "f137670ebe0575093358a85cc0ec2be5", "score": "0.4394967", "text": "func (_m *FluxAggregator) WithdrawPayment(opts *bind.TransactOpts, _oracle common.Address, _recipient common.Address, _amount *big.Int) (*types.Transaction, error) {\n\tret := _m.Called(opts, _oracle, _recipient, _amount)\n\n\tvar r0 *types.Transaction\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts, common.Address, common.Address, *big.Int) (*types.Transaction, error)); ok {\n\t\treturn rf(opts, _oracle, _recipient, _amount)\n\t}\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts, common.Address, common.Address, *big.Int) *types.Transaction); ok {\n\t\tr0 = rf(opts, _oracle, _recipient, _amount)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*types.Transaction)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(*bind.TransactOpts, common.Address, common.Address, *big.Int) error); ok {\n\t\tr1 = rf(opts, _oracle, _recipient, _amount)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "9d8dc54a67f310404cb5bc215c9caa65", "score": "0.43858021", "text": "func (m *MockMempool) HasStakerTx() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"HasStakerTx\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "b2b16304efa31899b57420c8526f8542", "score": "0.4384531", "text": "func (_m *MockService) Return(username string, bookCopyID string) (*Borrow, error) {\n\tret := _m.Called(username, bookCopyID)\n\n\tvar r0 *Borrow\n\tif rf, ok := ret.Get(0).(func(string, string) *Borrow); ok {\n\t\tr0 = rf(username, bookCopyID)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*Borrow)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string, string) error); ok {\n\t\tr1 = rf(username, bookCopyID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "4fdca2432fa181a79613cfcf3d913610", "score": "0.43798777", "text": "func (_Stakingbindings *StakingbindingsCaller) UserRewardPerTokenPaid(opts *bind.CallOpts, arg0 common.Address) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _Stakingbindings.contract.Call(opts, &out, \"userRewardPerTokenPaid\", arg0)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "d71078fb046b2a96a6b1c4b861f8b940", "score": "0.43794337", "text": "func mockRemittance() *Remittance {\n\tri := NewRemittance()\n\tri.CoverPayment.SwiftFieldTag = \"Swift Field Tag\"\n\tri.CoverPayment.SwiftLineOne = \"Swift Line One\"\n\tri.CoverPayment.SwiftLineTwo = \"Swift Line Two\"\n\tri.CoverPayment.SwiftLineThree = \"Swift Line Three\"\n\tri.CoverPayment.SwiftLineFour = \"Swift Line Four\"\n\treturn ri\n}", "title": "" }, { "docid": "fadb78089b5fac6aa995f03413591c8c", "score": "0.4377423", "text": "func (m *MockIMemCache) MAdd(items map[string]interface{}, expire ...time.Duration) bool {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{items}\n\tfor _, a := range expire {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"MAdd\", varargs...)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "2f9fb16e9db504666a63053453f170a5", "score": "0.437687", "text": "func (_m *UnitOfWork[T]) Rollback(ctx context.Context) error {\n\tret := _m.Called(ctx)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context) error); ok {\n\t\tr0 = rf(ctx)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "681129b275fe6cbf5fd573429745b3b5", "score": "0.43739048", "text": "func (_BondingManager *BondingManagerTransactor) Reward(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _BondingManager.contract.Transact(opts, \"reward\")\n}", "title": "" }, { "docid": "35ffcaf49633081621f0ef9917c6d420", "score": "0.437042", "text": "func (m *MockRPCClient) Tx(hash []byte, prove bool) (*core_types.ResultTx, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Tx\", hash, prove)\n\tret0, _ := ret[0].(*core_types.ResultTx)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "add96492928fdd4aa49eab6e3e1fb326", "score": "0.43611816", "text": "func TestGetBuyCoins(t *testing.T) {\n\tresp := CreateMockUser(t)\n\treq := httptest.NewRequest(\"GET\", \"/coins\", nil)\n\tcookie := resp.Cookies()[0]\n\tw := httptest.NewRecorder()\n\treq.AddCookie(cookie)\n\tps := httprouter.Params{}\n\n\tGetBuyCoins(w, req, ps)\n\n\tresp = w.Result()\n\n\tif resp.StatusCode != 200 {\n\t\tt.Error(\"Get Buy Coins | Expected: 200, Got:\", resp.StatusCode)\n\t}\n\n\tDeleteMockUser()\n}", "title": "" }, { "docid": "1ed925c6343e96f6e34db6b95c5d76d1", "score": "0.43554384", "text": "func (m *MockStorage) WithTx(arg0 context.Context, arg1 func(storage.Runner) error) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"WithTx\", arg0, arg1)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "dcb1341e0bfc59c06bed4d673180813a", "score": "0.43539962", "text": "func (m *MockTransactionsRepoI) Add(transaction *models.Transaction) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Add\", transaction)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "d6a81a3495541a249d31d3170c930651", "score": "0.43504238", "text": "func (_ArbOwner *ArbOwnerTransactor) GiveOwnership(opts *bind.TransactOpts, newOwnerAddr common.Address) (*types.Transaction, error) {\n\treturn _ArbOwner.contract.Transact(opts, \"giveOwnership\", newOwnerAddr)\n}", "title": "" }, { "docid": "2cac887d44ada92b95a661775197dfd0", "score": "0.43489996", "text": "func (m *MockTxRenewer) EXPECT() *MockTxRenewerMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "5031aa4adfbca6cd562304946bcb0682", "score": "0.43449664", "text": "func TestPostTip(t *testing.T) {\n\tresp := CreateMockUser(t)\n\t// Give the MockUser 50 coins\n\tmodels.AddCoinsToUser(\"testuser\", 50)\n\n\tusr := models.User{}\n\tusr.Username = \"dummyuser\"\n\tusr.UserType = \"streamer\"\n\tusr.Hash = \"somebullshithash\"\n\tusr.Email = \"dummy@dumb.com\"\n\n\tCreateDummyUser(usr)\n\n\t// Test user doesn't have enough coins to give\n\tform := url.Values{}\n\tform.Add(\"sender\", \"testuser\")\n\tform.Add(\"amount\", \"100\")\n\tform.Add(\"receiver\", \"dummyuser\")\n\treq := httptest.NewRequest(\"POST\", \"/tip\", strings.NewReader(form.Encode()))\n\treq.Form = form\n\tcookie := resp.Cookies()[0]\n\tw := httptest.NewRecorder()\n\treq.AddCookie(cookie)\n\tps := httprouter.Params{}\n\n\tPostTip(w, req, ps)\n\n\tresp = w.Result()\n\n\tif resp.StatusCode != 400 {\n\t\tt.Error(\"PostTip Not Enough Coins| Expected: 400, Got:\", resp.StatusCode)\n\t}\n\n\t// Test seccessful tipping\n\tform = url.Values{}\n\tform.Add(\"sender\", \"testuser\")\n\tform.Add(\"amount\", \"25\")\n\tform.Add(\"receiver\", \"dummyuser\")\n\treq = httptest.NewRequest(\"POST\", \"/tip\", strings.NewReader(form.Encode()))\n\treq.Form = form\n\tw = httptest.NewRecorder()\n\treq.AddCookie(cookie)\n\n\tPostTip(w, req, ps)\n\n\tresp = w.Result()\n\n\tif resp.StatusCode != 200 {\n\t\tt.Error(\"PostTip Success | Expected 200, Got:\", resp.StatusCode)\n\t}\n\n\tDeleteDummyUser(usr.Username)\n\tDeleteMockUser()\n}", "title": "" }, { "docid": "75b8798cc3f7121e4cee2acdd77541ee", "score": "0.4343806", "text": "func (db *DBM) AddResetToken(user *User, duration time.Duration) (string, error) {\n\tfuture := time.Now().Add(duration)\n\th := sha256.New()\n\th.Write([]byte(user.Username))\n\th.Write([]byte(GenString(16)))\n\th.Write([]byte(user.Salt))\n\thash := hex.EncodeToString(h.Sum(nil))\n\n\tq := \"INSERT INTO public.resetkeys (key,account,expiry) VALUES($1,$2,$3);\"\n\t_, err := db.Exec(q, hash, user.ID, future)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn hash, nil\n}", "title": "" }, { "docid": "17873ae05ad9b0bb1ee9f4354342719f", "score": "0.4336297", "text": "func (m *MockUsecase) AddInSearchHistory(UserID int, pattern string) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AddInSearchHistory\", UserID, pattern)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "99d01e4312df4e150f124355131f4ae5", "score": "0.43360013", "text": "func (_m *Db) Transact(txFunc func(*sql.Tx) error) error {\n\tret := _m.Called(txFunc)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(func(*sql.Tx) error) error); ok {\n\t\tr0 = rf(txFunc)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "b59a239fcf8c6436c4e612f3da7ab891", "score": "0.43319204", "text": "func (_m *MockMempool) Update(height uint64, txs types.Txs) error {\n\tret := _m.Called(height, txs)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(uint64, types.Txs) error); ok {\n\t\tr0 = rf(height, txs)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "c95274c2ea77b258f6f5223092ce72ea", "score": "0.43294483", "text": "func (m *MockRepository) Store(arg0 context.Context, arg1 pg.User) (*uuid.UUID, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Store\", arg0, arg1)\n\tret0, _ := ret[0].(*uuid.UUID)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "8635ff983122010eb4aa0be044d13605", "score": "0.43260574", "text": "func (_m *TxManager) CreateTxWithGas(surrogateID null.String, to common.Address, data []byte, gasPriceWei *big.Int, gasLimit uint64) (*models.Tx, error) {\n\tret := _m.Called(surrogateID, to, data, gasPriceWei, gasLimit)\n\n\tvar r0 *models.Tx\n\tif rf, ok := ret.Get(0).(func(null.String, common.Address, []byte, *big.Int, uint64) *models.Tx); ok {\n\t\tr0 = rf(surrogateID, to, data, gasPriceWei, gasLimit)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*models.Tx)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(null.String, common.Address, []byte, *big.Int, uint64) error); ok {\n\t\tr1 = rf(surrogateID, to, data, gasPriceWei, gasLimit)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "4a0a5b94b552e52896416bca3bcce944", "score": "0.43248138", "text": "func (_m *MockExpression) Add(ctx SystemContext, r models.Rune) *Response {\n\tret := _m.Called(ctx, r)\n\n\tvar r0 *Response\n\tif rf, ok := ret.Get(0).(func(SystemContext, models.Rune) *Response); ok {\n\t\tr0 = rf(ctx, r)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*Response)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "af89d1a1a4544800513cac402d02c439", "score": "0.43225366", "text": "func (m *MockITransactionService) AddIncome(req models.Income, member models.Member) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AddIncome\", req, member)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "d06a3d1a0fc17be28fbf8bcca18baec3", "score": "0.43209", "text": "func TestAddSuccess(t *testing.T) {\n}", "title": "" }, { "docid": "3f99151344dbb0b1a135fd1d678191f4", "score": "0.43199986", "text": "func (_m *Store) Add(key string, value interface{}, expire time.Duration) error {\n\tret := _m.Called(key, value, expire)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, interface{}, time.Duration) error); ok {\n\t\tr0 = rf(key, value, expire)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "01b7ee6e60abe601f37908cb7ac70a19", "score": "0.43189126", "text": "func mockRemittanceBeneficiary() *RemittanceBeneficiary {\n\trb := NewRemittanceBeneficiary()\n\trb.RemittanceData.Name = \"Name\"\n\trb.IdentificationType = OrganizationID\n\trb.IdentificationCode = OICCustomerNumber\n\trb.IdentificationNumber = \"111111\"\n\trb.IdentificationNumberIssuer = \"Bank\"\n\trb.RemittanceData.DateBirthPlace = \"\"\n\trb.RemittanceData.AddressType = CompletePostalAddress\n\trb.RemittanceData.Department = \"Department\"\n\trb.RemittanceData.SubDepartment = \"Sub-Department\"\n\trb.RemittanceData.StreetName = \"Street Name\"\n\trb.RemittanceData.BuildingNumber = \"16\"\n\trb.RemittanceData.PostCode = \"19405\"\n\trb.RemittanceData.TownName = \"AnyTown\"\n\trb.RemittanceData.CountrySubDivisionState = \"PA\"\n\trb.RemittanceData.Country = \"UA\"\n\trb.RemittanceData.AddressLineOne = \"Address Line One\"\n\trb.RemittanceData.AddressLineTwo = \"Address Line Two\"\n\trb.RemittanceData.AddressLineThree = \"Address Line Three\"\n\trb.RemittanceData.AddressLineFour = \"Address Line Four\"\n\trb.RemittanceData.AddressLineFive = \"Address Line Five\"\n\trb.RemittanceData.AddressLineSix = \"Address Line Six\"\n\trb.RemittanceData.AddressLineSeven = \"Address Line Seven\"\n\trb.RemittanceData.CountryOfResidence = \"US\"\n\treturn rb\n}", "title": "" } ]
de69decdf97b82e5ee9769ab9277a323
Reason function returns reason value.
[ { "docid": "a28183a6d730c444969514c174f87ec7", "score": "0.0", "text": "func (e GrpcService_GoogleGrpc_CallCredentials_GoogleIAMCredentialsValidationError) Reason() string {\n\treturn e.reason\n}", "title": "" } ]
[ { "docid": "86f8470a1c0d1177e7eb0738658cb38c", "score": "0.7833696", "text": "func GetReason(from Getter, t clusterv1.ConditionType) string {\n\tif c := Get(from, t); c != nil {\n\t\treturn c.Reason\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "76336f3c3f09f233e4bfc75b5d3aa7ff", "score": "0.7759013", "text": "func GetReason(message report.IMessage) int32 {\n\tswitch message.MessageType() {\n\tcase \"+RSP\", \"+BSP\":\n\t\treturn getLocationReason(message)\n\tcase \"+EVT\", \"+BVT\":\n\t\treturn getEventCode(message)\n\n\t}\n\treturn int32(6)\n}", "title": "" }, { "docid": "7b70a0483fdd53ae87337e4e5d6efd6b", "score": "0.7580978", "text": "func GetReason(ctx context.Context) string {\n\tsv, ok := ctx.Value(ctxKeyReason).(string)\n\tif !ok {\n\t\treturn \"\"\n\t}\n\treturn sv\n}", "title": "" }, { "docid": "60288c7181c4edc68020dda6011ac1c3", "score": "0.74835026", "text": "func (o *TechsupportmanagementTechSupportStatusAllOf) GetReason() string {\n\tif o == nil || o.Reason == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Reason\n}", "title": "" }, { "docid": "99d26656e9c02aa6893817e0f77c9bf2", "score": "0.74132276", "text": "func (o StatusOutput) Reason() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Status) pulumi.StringOutput { return v.Reason }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "bc00b551e53903b180700dbe7f92233e", "score": "0.739856", "text": "func reason(reasonCode int) string {\n\tswitch reasonCode {\n\tcase ocsp.Unspecified:\n\t\treturn \"unspecified reason\"\n\tcase ocsp.KeyCompromise:\n\t\treturn \"key compromised\"\n\tcase ocsp.CACompromise:\n\t\treturn \"ca compromised\"\n\tcase ocsp.AffiliationChanged:\n\t\treturn \"affiliation changed\"\n\tcase ocsp.Superseded:\n\t\treturn \"superseded\"\n\tcase ocsp.CessationOfOperation:\n\t\treturn \"cessation of operation\"\n\tcase ocsp.CertificateHold:\n\t\treturn \"certificate hold\"\n\tcase ocsp.RemoveFromCRL:\n\t\treturn \"remove from crl\"\n\tcase ocsp.PrivilegeWithdrawn:\n\t\treturn \"privilege withdrawn\"\n\tcase ocsp.AACompromise:\n\t\treturn \"aa compromised\"\n\tdefault:\n\t\treturn \"unspecified reason\"\n\t}\n}", "title": "" }, { "docid": "27e361b7f8a662809f4fd570f32a7dc9", "score": "0.73606616", "text": "func (e FeedbackValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "ac937d0f96359f371db9c5d5b4eee720", "score": "0.7354636", "text": "func (o *CondHclStatusDetail) GetReason() string {\n\tif o == nil || o.Reason == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Reason\n}", "title": "" }, { "docid": "24596271e7ca42d6d2af23fe9d95ccd3", "score": "0.73495686", "text": "func (e TickReplyValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "d6e96e223ef5f3d04437e18a1391211a", "score": "0.7308737", "text": "func (e ResourceStatusValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "1a160c0c3a84d89d80d99397de9d190c", "score": "0.7300894", "text": "func (e RsrpValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "cdd77e82db000495bd33688f726b9925", "score": "0.7288121", "text": "func (e ComplianceAlertResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "0e745f43ea722c503901da32d197c2e4", "score": "0.72769564", "text": "func (o StandardsControlOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v StandardsControl) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6199cde25820263ab00948f7b394ee7f", "score": "0.72705483", "text": "func (e RecRespValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "b93fe6259cad7587b06b3c01c0c4c0cd", "score": "0.72566634", "text": "func (o DaemonSetConditionPatchOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v DaemonSetConditionPatch) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "088daeed52be4238a4bd5a315bc88dfc", "score": "0.7248854", "text": "func (e Stats_StatValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "ec932d2e6a0d07097efdadc64b859a27", "score": "0.7248149", "text": "func (o OperatorStatusOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v OperatorStatus) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "69a63f2219bee16dd2d29607f130f2b0", "score": "0.7246308", "text": "func (e ComplianceAlertRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "06121cb0c56a8991aa446a0dca5ec139", "score": "0.72418195", "text": "func (o OperatorStatusConditionsOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v OperatorStatusConditions) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f2bb0708a8f6c378f2d8fda0ee3f9958", "score": "0.72004575", "text": "func (e ResourceValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "febbf2dd94e497a45739ab58b777fd66", "score": "0.7193385", "text": "func (o DeploymentConditionPatchOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v DeploymentConditionPatch) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9c83d66d7d868a4f9d30a07d1dc20f59", "score": "0.71927", "text": "func (o NexusStatusOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v NexusStatus) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "776a0d52bdcf21e0414669b46923de34", "score": "0.7190148", "text": "func (o DaemonSetConditionOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v DaemonSetCondition) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5f62125bda0a751763d09958bf318965", "score": "0.7181474", "text": "func (o StatefulSetConditionPatchOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v StatefulSetConditionPatch) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9e76d1af73f640d21738456c016974ec", "score": "0.7181188", "text": "func (o DeploymentConditionOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v DeploymentCondition) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "644527fcfa0fe2784327a5a8d4c1a64d", "score": "0.717957", "text": "func (e RequirementValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "ea063f874344c8f0239dbc542d329237", "score": "0.71754223", "text": "func (e LessonValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "f32a01a501eb55e941398b3d6c3ff6f7", "score": "0.7175183", "text": "func (e EXValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "f7e3d32f8ad02f82b96531bbd8350c8c", "score": "0.71724826", "text": "func (e SubmitFeedbackResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "6080a866959b3b4427dda732b9217f07", "score": "0.7171169", "text": "func (e TickRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "b2cc4d652c56c375e8b19ef2fd7b9365", "score": "0.7168384", "text": "func (e SubmitFeedbackRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "01181a0fc0ad8a46325ae7a729f4b73a", "score": "0.7167722", "text": "func (e DataFailureRateRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "c5283eb23bdb7cc778cab82f53850ac8", "score": "0.71672416", "text": "func (o ReplicaSetConditionPatchOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ReplicaSetConditionPatch) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c2643e1bc8cc6e1c5a96e8c17a31758d", "score": "0.71652097", "text": "func (e FeedbackMetadataValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "2a208d9eccc7a14514a860ca19f1e698", "score": "0.7156533", "text": "func (e AuditLogValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "69dcae2d4e33ca20c01d5c42213c4bd5", "score": "0.7151686", "text": "func (e ResourceAlertLabelValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "fa4bd5e9b1dd5d31ba8f4f121006a380", "score": "0.7151143", "text": "func (e SellReplyValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "83670b82fa29326508c7c7d6aebce2d7", "score": "0.7148083", "text": "func (e DataFailureRateResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "c02172d21dadb5e6024a1b76d26e076c", "score": "0.7132401", "text": "func (e CreateEWithRsReqValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "46d20a56cc963b47785d276d219e9516", "score": "0.7131485", "text": "func (e PaymentValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "7a7bcfa04a75d8c5f90d25de39210136", "score": "0.7124028", "text": "func (e RecReqValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "c721031bc66b20c0e512d4729b1e711c", "score": "0.71236473", "text": "func (e RuntimeUInt32ValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "a0a4a760c5023e0565a4247205bd2ab3", "score": "0.7121816", "text": "func (o OperatorStatusPtrOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *OperatorStatus) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Reason\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5188792a3a4348bd1a2bfdc3a708c7c5", "score": "0.7116403", "text": "func (e EValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "e00c13c2c4a22f23bbbb02dacdf68eaf", "score": "0.71161515", "text": "func (o ReplicaSetConditionOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ReplicaSetCondition) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "690f56d21cd422806f9758489c39c8ad", "score": "0.7109285", "text": "func (m *ProvisioningErrorInfo) GetReason()(*string) {\n val, err := m.GetBackingStore().Get(\"reason\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "d435a2755b75eae6620335143c44e603", "score": "0.71037394", "text": "func (e ThirdResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "02618989d3ebb8dfdee9b064abaebdcd", "score": "0.71017224", "text": "func (e HPAValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "3377ba3414b7fbd8fa485a6cdd9e3cbc", "score": "0.7101595", "text": "func (e TradeStreamReplyValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "dceedfbe8f199776d96cadd2e9047255", "score": "0.7097545", "text": "func (e CommonAlertLabelValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "a70acfd02ebcaabaae1a5d25827e6f54", "score": "0.70963985", "text": "func (e EntityValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "a70acfd02ebcaabaae1a5d25827e6f54", "score": "0.70963985", "text": "func (e EntityValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "9a5848c9f13bace3e0730ca9328ca322", "score": "0.7093487", "text": "func Reason(err error) string {\n\tif se := FromError(err); err != nil {\n\t\treturn se.Reason\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "bdbe863d867901353c0212f42ab9e6d6", "score": "0.70931906", "text": "func (e RicControlMessagePriorityValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "2bb2a1cb116a511c841f3b44fc7bce6a", "score": "0.70925516", "text": "func (o StatefulSetConditionOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v StatefulSetCondition) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0053b9578dc007d3abf681758241b6ce", "score": "0.70859474", "text": "func (e EventWithCodeCValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "37baf287695d7832a49ca31f2edf926c", "score": "0.7082495", "text": "func (e AccountReplyValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "d6b93291cc4c0f888372dff724d444e0", "score": "0.70811313", "text": "func (e TimingsValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "d34c80201140d8bd40b4a14bc6a7b00b", "score": "0.70789874", "text": "func (e MaxPlmnValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "1a1da9231979b7841d55867f1c1f9ada", "score": "0.70776606", "text": "func (o BotOutput) FailureReason() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Bot) pulumi.StringOutput { return v.FailureReason }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "e05a2f615a1415a822efc5c032af9c8a", "score": "0.7074499", "text": "func (u ManageContractOpData) GetDisputeReason() (result Longstring, ok bool) {\n\tarmName, _ := u.ArmForSwitch(int32(u.Action))\n\n\tif armName == \"DisputeReason\" {\n\t\tresult = *u.DisputeReason\n\t\tok = true\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "5b7f156579d11903e4281e1579397673", "score": "0.7069695", "text": "func (e EventWithCodeValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "a610b495362eee593a4c8ddd24fa98c3", "score": "0.7069693", "text": "func (e RecordDataValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "b3876c8a3e207303351fd86b7dc04601", "score": "0.706878", "text": "func (o SubjectAccessReviewStatusOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v SubjectAccessReviewStatus) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0935f9b4ee5badfd328903425fbcf92d", "score": "0.7067111", "text": "func (e BadBinaryError) Reason() string {\n\treturn e.info.Reason\n}", "title": "" }, { "docid": "e58e518476cbeaa8ba6b4585c77ce620", "score": "0.7066003", "text": "func (o *QuotaStatusResponseResult) Reason() string {\n\tr := *o.ReasonPtr\n\treturn r\n}", "title": "" }, { "docid": "9c0135dd0613d84725185223121ef623", "score": "0.7064993", "text": "func (e GetArticleReplyValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "400ec684e7a75760e2a64b593257c1d8", "score": "0.7064154", "text": "func (e DeviceValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "4c034e5a3174c65e3043eb3f48d9bbdd", "score": "0.70632327", "text": "func (p *Puback) Reason() string {\n\tswitch p.ReasonCode {\n\tcase 0:\n\t\treturn \"The message is accepted. Publication of the QoS 1 message proceeds.\"\n\tcase 16:\n\t\treturn \"The message is accepted but there are no subscribers. This is sent only by the Server. If the Server knows that there are no matching subscribers, it MAY use this Reason Code instead of 0x00 (Success).\"\n\tcase 128:\n\t\treturn \"The receiver does not accept the publish but either does not want to reveal the reason, or it does not match one of the other values.\"\n\tcase 131:\n\t\treturn \"The PUBLISH is valid but the receiver is not willing to accept it.\"\n\tcase 135:\n\t\treturn \"The PUBLISH is not authorized.\"\n\tcase 144:\n\t\treturn \"The Topic Name is not malformed, but is not accepted by this Client or Server.\"\n\tcase 145:\n\t\treturn \"The Packet Identifier is already in use. This might indicate a mismatch in the Session State between the Client and Server.\"\n\tcase 151:\n\t\treturn \"An implementation or administrative imposed limit has been exceeded.\"\n\tcase 153:\n\t\treturn \"The payload format does not match the specified Payload Format Indicator.\"\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "251e284a8522c1b6205eff8db9a87769", "score": "0.706208", "text": "func (m *InfrastructureMachineContract) FailureReason() *String {\n\treturn &String{\n\t\tpath: []string{\"status\", \"failureReason\"},\n\t}\n}", "title": "" }, { "docid": "f23ad3a7221e80035c17dd80db21496b", "score": "0.70620745", "text": "func (e ConsumeDesireValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "64602ccdf70ee32edc44b657aa69099a", "score": "0.70613503", "text": "func (e StatsValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "56e8dc6f31395dacb1b8438d5b6d036f", "score": "0.70593345", "text": "func (e DescribeServiceResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "76a30dbdadbbc77c0351955bbeae1298", "score": "0.70492196", "text": "func (e CountByStateValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "c87e78389a3a741989ada4fff201a8c9", "score": "0.7045068", "text": "func (e ModuleAlertLabelValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "af5f0291a0d793f668aa9cc4ff3207f6", "score": "0.70421094", "text": "func (e GetReqValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "f1695aa34eab3e8abc9075b878ce334f", "score": "0.70331573", "text": "func (e ThirdRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "a0baf3d400b9a9ad997b7953add2ad7d", "score": "0.7031967", "text": "func (e DeviceEventValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "c37faaadb1a3a17b078e11ef85838636", "score": "0.7028621", "text": "func (p *PullRequest) GetReason() string {\n\tif p == nil || p.Reason == nil {\n\t\treturn \"\"\n\t}\n\treturn *p.Reason\n}", "title": "" }, { "docid": "5e9c167761b439f1b5ce43ee974ac73a", "score": "0.702155", "text": "func (e ForeignVideoCheckValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "dbb82c4c9da7b6f852728b7243139421", "score": "0.7005755", "text": "func (o NexusStatusPtrOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *NexusStatus) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Reason\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5854653d4893de7b03c48cecba00caa2", "score": "0.7005406", "text": "func (e MetricValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "08924d395bfad29d57551e2a42e39b8e", "score": "0.70052284", "text": "func (e ChartReplyValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "737e3c7983d7c82eb9afa0d2d81a5586", "score": "0.7004924", "text": "func (e E2SmMhoIndicationMessageValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "30dec1f3a094eb3d21278d806d0f420f", "score": "0.7004494", "text": "func (e DeviceRecordValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "1b731ce4a4b36bdbacc27b72f3fc43b8", "score": "0.70027554", "text": "func (e ValueValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "a5968ee42835399e7ad8de9ad8869b99", "score": "0.69991565", "text": "func (e MaxofMessageProtocolTestsValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "fad16416b770612391fcbb9218c0014d", "score": "0.6998048", "text": "func (e BuyReplyValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "668287ca6b035cd2b1d3cbb6a1549c73", "score": "0.69930536", "text": "func (e FailedRecordValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "6cf1da710725c1c5c2d31eb5fad587a0", "score": "0.699085", "text": "func (e RTypeValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "7107fef4da3b3fe1c0d0a98b69ced567", "score": "0.6990746", "text": "func (e HealthCheckSpecifierValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "41f3a20e216da14bb32328d29db7ed88", "score": "0.6990293", "text": "func (e AccountRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "7736bb7863621f3745490bd0baca8fea", "score": "0.6989705", "text": "func (o OperatorStatusContainerStatusesStateWaitingOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v OperatorStatusContainerStatusesStateWaiting) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f7dc0558754ac984f82b45312bdcabf6", "score": "0.6988978", "text": "func (e AccountValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "164d524acdb9d926af1108e43e30bc6a", "score": "0.69866484", "text": "func (e EncodeDownlinkMessageRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "086df4531570435738d5e75cee23cfa0", "score": "0.6982556", "text": "func (e CreateRespValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "9aaa628a09fd23046589e5106b7e5ab9", "score": "0.69734865", "text": "func (d *domainError) Reason() error {\n\treturn d.reason\n}", "title": "" }, { "docid": "db1840eb34968b949f7cfbb7ae0ed36b", "score": "0.6971295", "text": "func (e ArchivalEventValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "8ef5e74be3ddb05b8cc8dc9d6304d49a", "score": "0.6961936", "text": "func (e ExtensionValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "79c7c42cc6cdf0e1be8f38b2546b926d", "score": "0.6961432", "text": "func (p *PRUpdateActivity) GetReason() string {\n\tif p == nil || p.Reason == nil {\n\t\treturn \"\"\n\t}\n\treturn *p.Reason\n}", "title": "" }, { "docid": "e86cc9f17716dc09deb2afb769a42d8b", "score": "0.6959023", "text": "func (e AttributeValidationError) Reason() string { return e.reason }", "title": "" } ]
c781a3decf530a0f42182f4f1000731d
Lists all roles assigned to a user.
[ { "docid": "e1fb46763e108c3df9309289cfec0b38", "score": "0.63727945", "text": "func (m *UserResource) ListAssignedRolesForUser(ctx context.Context, userId string, qp *query.Params) ([]*Role, *Response, error) {\n\turl := fmt.Sprintf(\"/api/v1/users/%v/roles\", userId)\n\tif qp != nil {\n\t\turl = url + qp.String()\n\t}\n\n\trq := m.client.CloneRequestExecutor()\n\n\treq, err := rq.WithAccept(\"application/json\").WithContentType(\"application/json\").NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar role []*Role\n\n\tresp, err := rq.Do(ctx, req, &role)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn role, resp, nil\n}", "title": "" } ]
[ { "docid": "536598df415865d60593750801e32a60", "score": "0.7015974", "text": "func ListAllUserRole(w http.ResponseWriter, r *http.Request) {\n\tfLog := userMgmtLogger.WithField(\"func\", \"ListAllUserRole\").WithField(\"RequestID\", r.Context().Value(constants.RequestID)).WithField(\"path\", r.URL.Path).WithField(\"method\", r.Method)\n\tparams, err := helper.ParsePathParams(fmt.Sprintf(\"%s/management/user/{userRecId}/all-roles\", apiPrefix), r.URL.Path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tuser, err := UserRepo.GetUserByRecID(r.Context(), params[\"userRecId\"])\n\tif err != nil {\n\t\tfLog.Errorf(\"UserRepo.GetUserByRecID got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusInternalServerError, err.Error(), nil, nil)\n\t\treturn\n\t}\n\tif user == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusNotFound, fmt.Sprintf(\"User recid %s not found\", params[\"userRecId\"]), nil, nil)\n\t\treturn\n\t}\n\tpageRequest, err := helper.NewPageRequestFromRequest(r)\n\tif err != nil {\n\t\tfLog.Errorf(\"helper.NewPageRequestFromRequest got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusBadRequest, err.Error(), nil, nil)\n\t\treturn\n\t}\n\troles, page, err := UserRepo.ListAllUserRoles(r.Context(), user, pageRequest)\n\tif err != nil {\n\t\tfLog.Errorf(\"UserRepo.ListAllUserRoles got %s\", err.Error())\n\t}\n\tsroles := make([]*SimpleRole, len(roles))\n\tfor k, v := range roles {\n\t\tsroles[k] = &SimpleRole{\n\t\t\tRecID: v.RecID,\n\t\t\tRoleName: v.RoleName,\n\t\t}\n\t}\n\tret := make(map[string]interface{})\n\tret[\"roles\"] = sroles\n\tret[\"page\"] = page\n\thelper.WriteHTTPResponse(r.Context(), w, http.StatusOK, \"List of roles paginated\", nil, ret)\n}", "title": "" }, { "docid": "61904055a5d2ddbbb1c8fe92d8f335fa", "score": "0.6934077", "text": "func ListUserRole(w http.ResponseWriter, r *http.Request) {\n\tfLog := userMgmtLogger.WithField(\"func\", \"ListUserRole\").WithField(\"RequestID\", r.Context().Value(constants.RequestID)).WithField(\"path\", r.URL.Path).WithField(\"method\", r.Method)\n\tparams, err := helper.ParsePathParams(fmt.Sprintf(\"%s/management/user/{userRecId}/roles\", apiPrefix), r.URL.Path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tuser, err := UserRepo.GetUserByRecID(r.Context(), params[\"userRecId\"])\n\tif err != nil {\n\t\tfLog.Errorf(\"UserRepo.GetUserByRecID got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusInternalServerError, err.Error(), nil, nil)\n\t\treturn\n\t}\n\tif user == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusNotFound, fmt.Sprintf(\"User recid %s not found\", params[\"userRecId\"]), nil, nil)\n\t\treturn\n\t}\n\tpageRequest, err := helper.NewPageRequestFromRequest(r)\n\tif err != nil {\n\t\tfLog.Errorf(\"helper.NewPageRequestFromRequest got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusBadRequest, err.Error(), nil, nil)\n\t\treturn\n\t}\n\troles, page, err := UserRoleRepo.ListUserRoleByUser(r.Context(), user, pageRequest)\n\tif err != nil {\n\t\tfLog.Errorf(\"UserRoleRepo.ListUserRoleByUser got %s\", err.Error())\n\t}\n\tsroles := make([]*SimpleRole, len(roles))\n\tfor k, v := range roles {\n\t\tsroles[k] = &SimpleRole{\n\t\t\tRecID: v.RecID,\n\t\t\tRoleName: v.RoleName,\n\t\t\tRoleDomain: v.RoleDomain,\n\t\t}\n\t}\n\tret := make(map[string]interface{})\n\tret[\"roles\"] = sroles\n\tret[\"page\"] = page\n\thelper.WriteHTTPResponse(r.Context(), w, http.StatusOK, \"List of roles paginated\", nil, ret)\n}", "title": "" }, { "docid": "19dc5caf9cdb0b566480f1a7cc0add11", "score": "0.68960077", "text": "func (db *MySQLDB) ListAllUserRoles(ctx context.Context, user *User, request *helper.PageRequest) ([]*Role, *helper.Page, error) {\n\tfLog := mysqlLog.WithField(\"func\", \"ListAllUserRoles\").WithField(\"RequestID\", ctx.Value(constants.RequestID))\n\troleMap := make(map[string]*Role)\n\tq := \"SELECT R.REC_ID, R.ROLE_NAME, R.ROLE_DOMAIN, R.DESCRIPTION FROM HANSIP_ROLE R, HANSIP_USER_ROLE UR WHERE R.REC_ID = UR.ROLE_REC_ID AND UR.USER_REC_ID = ?\"\n\trows, err := db.instance.QueryContext(ctx, q, user.RecID)\n\tif err != nil {\n\t\tfLog.Errorf(\"db.instance.QueryContext got %s. SQL = %s\", err.Error(), q)\n\t\treturn nil, nil, &ErrDBQueryError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListAllUserRoles\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tfor rows.Next() {\n\t\tr := &Role{}\n\t\terr = rows.Scan(&r.RecID, &r.RoleName, &r.RoleDomain, &r.Description)\n\t\tif err != nil {\n\t\t\tfLog.Warnf(\"rows.Scan got %s\", err.Error())\n\t\t\trows.Close()\n\t\t\treturn nil, nil, &ErrDBScanError{\n\t\t\t\tWrapped: err,\n\t\t\t\tMessage: \"Error ListAllUserRoles\",\n\t\t\t\tSQL: q,\n\t\t\t}\n\t\t} else {\n\t\t\troleMap[r.RecID] = r\n\t\t}\n\t}\n\trows.Close()\n\tq = \"SELECT DISTINCT R.REC_ID, R.ROLE_NAME, R.ROLE_DOMAIN, R.DESCRIPTION FROM HANSIP_ROLE R, HANSIP_GROUP_ROLE GR, HANSIP_USER_GROUP UG WHERE R.REC_ID = GR.ROLE_REC_ID AND GR.GROUP_REC_ID = UG.GROUP_REC_ID AND UG.USER_REC_ID = ?\"\n\trows, err = db.instance.QueryContext(ctx, q, user.RecID)\n\tif err != nil {\n\t\tfLog.Errorf(\"db.instance.QueryContext got %s. SQL = %s\", err.Error(), q)\n\t\treturn nil, nil, &ErrDBQueryError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListAllUserRoles\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tr := &Role{}\n\t\terr = rows.Scan(&r.RecID, &r.RoleName, &r.RoleDomain, &r.Description)\n\t\tif err != nil {\n\t\t\tfLog.Warnf(\"rows.Scan got %s\", err.Error())\n\t\t\treturn nil, nil, &ErrDBScanError{\n\t\t\t\tWrapped: err,\n\t\t\t\tMessage: \"Error ListAllUserRoles\",\n\t\t\t\tSQL: q,\n\t\t\t}\n\t\t} else {\n\t\t\troleMap[r.RecID] = r\n\t\t}\n\t}\n\n\tpage := helper.NewPage(request, uint(len(roleMap)))\n\troles := make([]*Role, 0)\n\tfor _, v := range roleMap {\n\t\troles = append(roles, v)\n\t}\n\tif request.OrderBy == \"ROLE_NAME\" {\n\t\tif request.Sort == \"ASC\" {\n\t\t\tsort.SliceStable(roles, func(i, j int) bool {\n\t\t\t\treturn roles[i].RoleName < roles[j].RoleName\n\t\t\t})\n\t\t} else {\n\t\t\tsort.SliceStable(roles, func(i, j int) bool {\n\t\t\t\treturn roles[i].RoleName > roles[j].RoleName\n\t\t\t})\n\t\t}\n\t}\n\n\tif request.OrderBy == \"ROLE_DOMAIN\" {\n\t\tsort.Slice(roles, func(i, j int) bool {\n\t\t\tif request.Sort == \"ASC\" {\n\t\t\t\treturn roles[i].RoleDomain < roles[j].RoleDomain\n\t\t\t}\n\t\t\treturn roles[i].RoleDomain > roles[j].RoleDomain\n\t\t})\n\t} else {\n\t\tsort.Slice(roles, func(i, j int) bool {\n\t\t\tif request.Sort == \"ASC\" {\n\t\t\t\treturn roles[i].RoleName < roles[j].RoleName\n\t\t\t}\n\t\t\treturn roles[i].RoleDomain > roles[j].RoleDomain\n\t\t})\n\t}\n\n\treturn roles[page.OffsetStart:page.OffsetEnd], page, nil\n}", "title": "" }, { "docid": "2e7af7e0cf666ff6964712a22ae20fd0", "score": "0.6601182", "text": "func (db *MySQLDB) ListUserRoleByUser(ctx context.Context, user *User, request *helper.PageRequest) ([]*Role, *helper.Page, error) {\n\tfLog := mysqlLog.WithField(\"func\", \"ListUserRoleByUser\").WithField(\"RequestID\", ctx.Value(constants.RequestID))\n\tq := \"SELECT COUNT(*) FROM HANSIP_USER_ROLE WHERE USER_REC_ID=?\"\n\tret := make([]*Role, 0)\n\trow := db.instance.QueryRowContext(ctx, q, user.RecID)\n\tcount := 0\n\terr := row.Scan(&count)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ret, helper.NewPage(request, uint(count)), nil\n\t\t}\n\t\tfLog.Errorf(\"row.Scan got %s\", err.Error())\n\t\treturn nil, nil, &ErrDBScanError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListUserRoleByUser\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tpage := helper.NewPage(request, uint(count))\n\tq = fmt.Sprintf(\"SELECT R.REC_ID, R.ROLE_NAME, R.ROLE_DOMAIN, R.DESCRIPTION FROM HANSIP_USER_ROLE UR, HANSIP_ROLE R WHERE UR.ROLE_REC_ID = R.REC_ID AND UR.USER_REC_ID = ? ORDER BY R.ROLE_NAME %s LIMIT %d, %d\", request.Sort, page.OffsetStart, page.OffsetEnd-page.OffsetStart)\n\trows, err := db.instance.QueryContext(ctx, q, user.RecID)\n\tif err != nil {\n\t\tfLog.Errorf(\"db.instance.QueryContext got %s. SQL = %s\", err.Error(), q)\n\t\treturn nil, nil, &ErrDBQueryError{\n\t\t\tWrapped: nil,\n\t\t\tMessage: \"Error ListUserRoleByUser\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tr := &Role{}\n\t\terr := rows.Scan(&r.RecID, &r.RoleName, &r.RoleDomain, &r.Description)\n\t\tif err != nil {\n\t\t\tfLog.Warnf(\"rows.Scan got %s\", err.Error())\n\t\t\treturn nil, nil, &ErrDBScanError{\n\t\t\t\tWrapped: err,\n\t\t\t\tMessage: \"Error ListUserRoleByUser\",\n\t\t\t\tSQL: q,\n\t\t\t}\n\t\t} else {\n\t\t\tret = append(ret, r)\n\t\t}\n\t}\n\treturn ret, page, nil\n}", "title": "" }, { "docid": "c35b967d8f58f81de2b8e75d9c75831a", "score": "0.65888375", "text": "func (u Users) AllRoles(userID Owner, _ interface{}) ([]Role, error) {\n\tif _, ok := userID.(string); ok {\n\t\tif userID.(string) == \"\" {\n\t\t\treturn nil, ErrUserRequired\n\t\t}\n\t} else if _, ok := userID.(int64); ok {\n\t\tif userID.(int64) == 0 {\n\t\t\treturn nil, ErrUserRequired\n\t\t}\n\t}\n\n\tquery := fmt.Sprintf(`\n\t\tSELECT\n\t\t\tTR.ID, TR.Title, TR.Description\n\t\tFROM\n\t\t\t%s AS TRel\n\t\tJOIN roles AS TR ON\n\t\t(TRel.role_id=TR.ID)\n\t\tWHERE TRel.user_id=?`, u.getTable())\n\n\trows, err := u.rbac.db.Query(query, userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tvar roles []Role\n\tfor rows.Next() {\n\t\tvar role Role\n\t\terr := rows.Scan(&role.ID, &role.Title, &role.Description)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\troles = append(roles, role)\n\t}\n\n\treturn roles, nil\n}", "title": "" }, { "docid": "0a19e6cddec53fff12d160e3a6258b50", "score": "0.6329274", "text": "func (rbac *RBAC) ListUserRoles(u User) ([]Role, error) {\n\trbac.mutex.RLock()\n\tdefer rbac.mutex.RUnlock()\n\n\t_, ok := rbac.registeredUsers[u]\n\tif !ok {\n\t\treturn nil, ErrorUserNotRegistered\n\t}\n\tuserRoles, ok := rbac.roles2users[u]\n\tif !ok {\n\t\treturn []Role{}, nil\n\t}\n\tout := make([]Role, 0, len(userRoles))\n\tfor r := range userRoles {\n\t\tout = append(out, r)\n\t}\n\treturn out, nil\n}", "title": "" }, { "docid": "49535c838a6d703d708845e13fc2e426", "score": "0.6322123", "text": "func (UserService) GetAllRoles(uid string) []string {\n\tgroups := perm.GetGroupsByUser(uid)\n\troles := []string{}\n\tfor _, group := range groups {\n\t\troles = append(roles, group[1])\n\t}\n\treturn roles\n}", "title": "" }, { "docid": "bc3a4578a228ebab039fabce580b2c09", "score": "0.6320755", "text": "func (r *RolesService) List() *RolesListCall {\n\tc := &RolesListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\treturn c\n}", "title": "" }, { "docid": "8b1342cbb2fc9c0dc5ba3cadfba4ccc2", "score": "0.6291362", "text": "func RolesUserPath() string {\n\treturn \"/roles\"\n}", "title": "" }, { "docid": "e3a71912a5e1ffed9795ce0650499fb8", "score": "0.6204461", "text": "func (a *api) h_GET_users_userId_userRoles(c *gin.Context) {\n\tlogin := c.Param(\"userId\")\n\taCtx := a.getAuthContext(c)\n\tif a.errorResponse(c, aCtx.AuthZUser(login)) {\n\t\treturn\n\t}\n\n\turs, err := a.Dc.GetUserRoles(login, 0)\n\tif a.errorResponse(c, err) {\n\t\treturn\n\t}\n\tc.JSON(http.StatusOK, a.muserRoles2userRoles(urs))\n}", "title": "" }, { "docid": "3fad21a87ed991fe1a000eaf91604f80", "score": "0.6175716", "text": "func SetUserRoles(w http.ResponseWriter, r *http.Request) {\n\tfLog := userMgmtLogger.WithField(\"func\", \"SetUserRoles\").WithField(\"RequestID\", r.Context().Value(constants.RequestID)).WithField(\"path\", r.URL.Path).WithField(\"method\", r.Method)\n\n\tiauthctx := r.Context().Value(constants.HansipAuthentication)\n\tif iauthctx == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusUnauthorized, \"You are not authorized to access this resource\", nil, nil)\n\t\treturn\n\t}\n\n\tparams, err := helper.ParsePathParams(fmt.Sprintf(\"%s/management/user/{userRecId}/roles\", apiPrefix), r.URL.Path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tuser, err := UserRepo.GetUserByRecID(r.Context(), params[\"userRecId\"])\n\tif err != nil {\n\t\tfLog.Error(err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusInternalServerError, fmt.Sprintf(\"User recID %s not found\", params[\"userRecId\"]), nil, nil)\n\t\treturn\n\t}\n\tif user == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusNotFound, fmt.Sprintf(\"User recID %s not found\", params[\"userRecId\"]), nil, nil)\n\t\treturn\n\t}\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tfLog.Errorf(\"ioutil.ReadAll got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusInternalServerError, err.Error(), nil, nil)\n\t\treturn\n\t}\n\troleIds := make([]string, 0)\n\terr = json.Unmarshal(body, &roleIds)\n\tif err != nil {\n\t\tfLog.Errorf(\"json.Unmarshal got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusBadRequest, err.Error(), nil, nil)\n\t\treturn\n\t}\n\n\trolesToAdd := make([]*connector.Role, 0)\n\tfor _, roleID := range roleIds {\n\t\trole, err := RoleRepo.GetRoleByRecID(r.Context(), roleID)\n\t\tif err != nil {\n\t\t\tfLog.Warnf(\"RoleRepo.GetRoleByRecID got %s, this role %s will not be added to user %s role\", err.Error(), roleID, user.RecID)\n\t\t}\n\t\tif role == nil {\n\t\t\tfLog.Warnf(\"This role %s is not exist and will not be added to user %s role\", roleId, user.RecID)\n\t\t}\n\t\tauthCtx := iauthctx.(*hansipcontext.AuthenticationContext)\n\t\tif !authCtx.IsAdminOfDomain(role.RoleDomain) {\n\t\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusForbidden, \"You don't have the right to access role with the specified domain\", nil, nil)\n\t\t\treturn\n\t\t}\n\t\trolesToAdd = append(rolesToAdd, role)\n\t}\n\n\terr = UserRoleRepo.DeleteUserRoleByUser(r.Context(), user)\n\tif err != nil {\n\t\tfLog.Errorf(\"UserRoleRepo.DeleteUserRoleByUser got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusInternalServerError, err.Error(), nil, nil)\n\t\treturn\n\t}\n\n\tcounter := 0\n\tfor _, role := range rolesToAdd {\n\t\t_, err := UserRoleRepo.CreateUserRole(r.Context(), user, role)\n\t\tif err != nil {\n\t\t\tfLog.Warnf(\"UserRoleRepo.CreateUserRole got %s, this role %s will not be added to user %s role\", err.Error(), role.RecID, user.RecID)\n\t\t} else {\n\t\t\tcounter++\n\t\t}\n\t}\n\tRevocationRepo.Revoke(r.Context(), user.Email)\n\thelper.WriteHTTPResponse(r.Context(), w, http.StatusOK, fmt.Sprintf(\"%d roles added into user\", counter), nil, nil)\n}", "title": "" }, { "docid": "3f5a1e829b69dc421005c9b5050ab1a4", "score": "0.6144915", "text": "func (a *Admin) Roles(c *gin.Context) {\n\tid := c.Param(\"id\")\n\te, _ := casbin.NewEnforcer(\"config/rbac_model.conf\", \"config/rbac_policy.csv\")\n\troles := make([]string, 0)\n\tfor _, r := range e.GetFilteredGroupingPolicy(0, \"admin:\"+id) {\n\t\troles = append(roles, r[1])\n\t}\n\tc.JSON(http.StatusOK, gin.H{\n\t\t\"roles\": roles,\n\t})\n}", "title": "" }, { "docid": "88a1daf307807696c93dfffbab2f6b39", "score": "0.6130388", "text": "func (u *User) Roles() []*Role {\n\trs := make([]*Role, 0, len(u.roles))\n\tcopy(rs, u.roles)\n\treturn rs\n}", "title": "" }, { "docid": "3b9141fc1641bf8eba89794a1aebe68b", "score": "0.6073498", "text": "func (a AuthService) GetUserRoles() []string {\n\treturn a.userRoles\n}", "title": "" }, { "docid": "eb99a4e0c19ef7904dc42553432da428", "score": "0.6054129", "text": "func (r *Roles) GetRoles(c *gin.Context) {\n\n\t//check is the user is authenticated first\n\tmetadata, err := r.tk.ExtractTokenMetadata(c.Request)\n\tif err != nil {\n\t\tc.JSON(http.StatusUnauthorized, \"unauthorized\")\n\t\treturn\n\t}\n\t//lookup the metadata in redis:\n\tuserID, err := r.rd.FetchAuth(metadata.TokenUuid)\n\tif err != nil {\n\t\tc.JSON(http.StatusUnauthorized, \"unauthorized\")\n\t\treturn\n\t}\n\n\tfmt.Printf(\"nosamb :%+v\\n\", userID)\n\n\troles := entity.Roles{} //customize user\n\t//us, err = application.UserApp.GetUsers()\n\troles, err = r.rl.GetRoles()\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, roles)\n}", "title": "" }, { "docid": "d96a684494c2611264fad59df3435980", "score": "0.6018602", "text": "func (a *api) h_GET_orgs_orgId_userRoles(c *gin.Context) {\n\torgId, err := parseInt64Param(c, \"orgId\")\n\ta.logger.Debug(\"POST /orgs/\", orgId, \"/userRoles\")\n\tif a.errorResponse(c, err) {\n\t\treturn\n\t}\n\n\taCtx := a.getAuthContext(c)\n\tif a.errorResponse(c, aCtx.AuthZOrgAdmin(orgId)) {\n\t\treturn\n\t}\n\n\t// returns everyone for the org\n\turs, err := a.Dc.GetUserRoles(\"\", orgId)\n\tif a.errorResponse(c, err) {\n\t\treturn\n\t}\n\tc.JSON(http.StatusOK, a.muserRoles2userRoles(urs))\n}", "title": "" }, { "docid": "892b5fe7d6e7afa821efd70cc3fb4a5b", "score": "0.59751683", "text": "func (e *Enforcer) GetRolesForUser(name string) ([]string, error) {\n\tres, err := e.model[\"g\"][\"g\"].RM.GetRoles(name)\n\treturn res, err\n}", "title": "" }, { "docid": "d12de036edb218ddc724f03daf151c57", "score": "0.59699106", "text": "func (s *UserRoleService) GetAll() ([]*UserRole, error) {\n\titems := []*UserRole{}\n\tpath, err := services.GetAllPath(s)\n\tif err != nil {\n\t\treturn items, err\n\t}\n\n\t_, err = api.ApiGet(s.GetClient(), &items, path)\n\treturn items, err\n}", "title": "" }, { "docid": "a7c583539d472c56f735cef7f3a54524", "score": "0.5911116", "text": "func (r *UserRolesService) List(profileId int64) *UserRolesListCall {\n\tc := &UserRolesListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.profileId = profileId\n\treturn c\n}", "title": "" }, { "docid": "b91f69163e4906e6d9a4e2037e4e92c0", "score": "0.5910178", "text": "func (e *SyncedEnforcer) GetRolesForUser(name string) ([]string, error) {\n\te.m.RLock()\n\tdefer e.m.RUnlock()\n\treturn e.Enforcer.GetRolesForUser(name)\n}", "title": "" }, { "docid": "dcde2ea6ed24e5cd3f9f862f0d204ffb", "score": "0.58781886", "text": "func (db *MySQLDB) ListRoles(ctx context.Context, tenant *Tenant, request *helper.PageRequest) ([]*Role, *helper.Page, error) {\n\tfLog := mysqlLog.WithField(\"func\", \"ListRoles\").WithField(\"RequestID\", ctx.Value(constants.RequestID))\n\tq := \"SELECT COUNT(*) AS CNT FROM HANSIP_ROLE\"\n\tret := make([]*Role, 0)\n\trow := db.instance.QueryRowContext(ctx, q)\n\tcount := 0\n\terr := row.Scan(&count)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ret, helper.NewPage(request, uint(count)), nil\n\t\t}\n\t\tfLog.Errorf(\"db.instance.QueryRowContext got %s\", err.Error())\n\t\treturn nil, nil, &ErrDBScanError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListRoles\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tpage := helper.NewPage(request, uint(count))\n\tq = fmt.Sprintf(\"SELECT REC_ID, ROLE_NAME,ROLE_DOMAIN, DESCRIPTION FROM HANSIP_ROLE WHERE ROLE_DOMAIN=? ORDER BY ROLE_NAME %s LIMIT %d, %d\", request.Sort, page.OffsetStart, page.OffsetEnd-page.OffsetStart)\n\trows, err := db.instance.QueryContext(ctx, q, tenant.Domain)\n\tif err != nil {\n\t\tfLog.Errorf(\"db.instance.QueryContext got %s. SQL = %s\", err.Error(), q)\n\t\treturn nil, nil, &ErrDBQueryError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListRoles\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tr := &Role{}\n\t\terr := rows.Scan(&r.RecID, &r.RoleName, &r.RoleDomain, &r.Description)\n\t\tif err != nil {\n\t\t\tif err == sql.ErrNoRows {\n\t\t\t\treturn ret, helper.NewPage(request, uint(len(ret))), nil\n\t\t\t}\n\t\t\tfLog.Warnf(\"row.Scan got %s\", err.Error())\n\t\t\treturn nil, nil, &ErrDBScanError{\n\t\t\t\tWrapped: err,\n\t\t\t\tMessage: \"Error ListRoles\",\n\t\t\t\tSQL: q,\n\t\t\t}\n\t\t} else {\n\t\t\tret = append(ret, r)\n\t\t}\n\t}\n\treturn ret, page, nil\n}", "title": "" }, { "docid": "0f9fcae35a4ba0f6b6cfa6e6db081100", "score": "0.5873102", "text": "func GetUser_roleses(offset int, limit int, field string) (*[]*User_roles, error) {\n\tvar _User_roles = new([]*User_roles)\n\terr := Engine.Table(\"user__roles\").Limit(limit, offset).Desc(field).Find(_User_roles)\n\treturn _User_roles, err\n}", "title": "" }, { "docid": "b43e2b1514d66904d81175446329384c", "score": "0.5859214", "text": "func (j *DSRocketchat) AllRoles(ctx *Ctx, item map[string]interface{}) ([]string, bool) {\n\treturn []string{\"u\"}, true\n}", "title": "" }, { "docid": "562a2836909fd6cb4a1a703e2fdceee7", "score": "0.5835806", "text": "func ListRoles(client *gophercloud.ServiceClient, id string) pagination.Pager {\n\turl := listRolesURL(client, id)\n\treturn pagination.NewPager(client, url, func(r pagination.PageResult) pagination.Page {\n\t\treturn RolesPage{pagination.LinkedPageBase{PageResult: r}}\n\t})\n}", "title": "" }, { "docid": "36f5754e2ee5c6d38136d4012c6ce480", "score": "0.5821541", "text": "func (c *Client) ListRoles(ctx context.Context, path string, resourceType *string) (*http.Response, error) {\n\treq, err := c.NewListRolesRequest(ctx, path, resourceType)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn c.Client.Do(ctx, req)\n}", "title": "" }, { "docid": "b9050072c0b7baf3c9c70332b2c170a5", "score": "0.58196414", "text": "func (r *OrganizationsRolesService) List(parent string) *OrganizationsRolesListCall {\n\tc := &OrganizationsRolesListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.parent = parent\n\treturn c\n}", "title": "" }, { "docid": "97b3f773f671c39f1406e1efd834a645", "score": "0.5815209", "text": "func (a *Client) ListRoles(params *ListRolesParams) (*ListRolesOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewListRolesParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"listRoles\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/AccountService/Roles\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &ListRolesReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*ListRolesOK), nil\n\n}", "title": "" }, { "docid": "5a5a5cafeacaf249bc878785da19bf4d", "score": "0.57692176", "text": "func ListRolesPath() string {\n\n\treturn fmt.Sprintf(\"/api/roles\")\n}", "title": "" }, { "docid": "812a634c49305575a823ded0ef82164a", "score": "0.57681125", "text": "func (m *GormIdentityRoleRepository) List(ctx context.Context) ([]IdentityRole, error) {\n\tdefer goa.MeasureSince([]string{\"goa\", \"db\", \"identity_role\", \"list\"}, time.Now())\n\tvar rows []IdentityRole\n\n\terr := m.db.Model(&resourcetype.ResourceType{}).Find(&rows).Error\n\tif err != nil && err != gorm.ErrRecordNotFound {\n\t\treturn nil, errs.WithStack(err)\n\t}\n\treturn rows, nil\n}", "title": "" }, { "docid": "602bbe473e52cd6d70e8d5057e341686", "score": "0.57434446", "text": "func (r *RoleCache) GetRoles(userID string) ([]string, error) {\n\troles := []string{}\n\tkey := makeKey(userID)\n\terr := r.DB.View(func(tx *buntdb.Tx) error {\n\t\tval, err := tx.Get(key)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\terr = json.Unmarshal([]byte(val), &roles)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t})\n\tif err != nil && err == buntdb.ErrNotFound {\n\t\tnewRoles, err := r.GetUserRoles(userID)\n\t\tif err != nil {\n\t\t\treturn roles, errors.Wrap(err, \"Couldn't GetUserRoles for \"+userID)\n\t\t}\n\n\t\t_ = r.updateRoles(userID, newRoles)\n\n\t\treturn newRoles, err\n\t}\n\n\treturn roles, err\n}", "title": "" }, { "docid": "defcfd66a299c0f3d0fa6d7a1a909af3", "score": "0.57356006", "text": "func (s *Server) ListRoles(ctx context.Context, params *authorization.Empty) (*authorization.Roles, error) {\n\treturn &authorization.Roles{}, nil\n}", "title": "" }, { "docid": "79046ac47f0161b6f6679815b576e50b", "score": "0.5722802", "text": "func (e *CachedEnforcer) GetAllRoles() []string {\n\treturn e.api.GetAllRoles()\n}", "title": "" }, { "docid": "edfcb99561efdc828742ce977cf80a3a", "score": "0.5720782", "text": "func (ir *IAMRoles) getAll(configObj config.Config) ([]*string, error) {\n\tallIAMRoles := []*string{}\n\terr := ir.Client.ListRolesPages(\n\t\t&iam.ListRolesInput{},\n\t\tfunc(page *iam.ListRolesOutput, lastPage bool) bool {\n\t\t\tfor _, iamRole := range page.Roles {\n\t\t\t\tif ir.shouldInclude(iamRole, configObj) {\n\t\t\t\t\tallIAMRoles = append(allIAMRoles, iamRole.RoleName)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\treturn !lastPage\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn nil, errors.WithStackTrace(err)\n\t}\n\treturn allIAMRoles, nil\n}", "title": "" }, { "docid": "e1926731e96288b8f8ebd8dc85a77e46", "score": "0.5709793", "text": "func (e *Enforcer) GetAllRoles(ctx context.Context) ([]string, error) {\n\tres, err := e.client.remoteClient.GetAllRoles(ctx, &pb.EmptyRequest{Handler: e.handler})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn res.Array, nil\n}", "title": "" }, { "docid": "9df98b1db8922325cb7d9a6d53429816", "score": "0.5702033", "text": "func (c *BaseAwsClient) Roles(user ...string) (identity.Roles, error) {\n\treturn c.roles()\n}", "title": "" }, { "docid": "13038382dd0191627fe28c08ec197586", "score": "0.5692798", "text": "func (roles *RoleProvider) List() ([]*idam.Role, error) {\n\troles.lock.RLock()\n\tdefer roles.lock.RUnlock()\n\n\tvar copy []*idam.Role\n\tfor _, r := range roles.roles {\n\t\tcopy = append(copy, copyRole(r))\n\t}\n\n\treturn copy, nil\n}", "title": "" }, { "docid": "e4b025b7634be5123de5fbcb9bf3147a", "score": "0.5670891", "text": "func (s *UserRoleService) Get(userRolesQuery UserRolesQuery) (*resources.Resources[*UserRole], error) {\n\tpath, err := s.GetURITemplate().Expand(userRolesQuery)\n\tif err != nil {\n\t\treturn &resources.Resources[*UserRole]{}, err\n\t}\n\n\tresponse, err := api.ApiGet(s.GetClient(), new(resources.Resources[*UserRole]), path)\n\tif err != nil {\n\t\treturn &resources.Resources[*UserRole]{}, err\n\t}\n\n\treturn response.(*resources.Resources[*UserRole]), nil\n}", "title": "" }, { "docid": "49689f28c7061f73ad964374e728497b", "score": "0.5620951", "text": "func (id *authIdentity) Roles() []string {\n\treturn id.roles\n}", "title": "" }, { "docid": "b2d3a3d24d9e59f1c3356fdf535248ce", "score": "0.5599652", "text": "func (db *MySQLDB) ListUserRoleByRole(ctx context.Context, role *Role, request *helper.PageRequest) ([]*User, *helper.Page, error) {\n\tfLog := mysqlLog.WithField(\"func\", \"ListUserRoleByRole\").WithField(\"RequestID\", ctx.Value(constants.RequestID))\n\tq := \"SELECT COUNT(*) FROM HANSIP_USER_ROLE WHERE ROLE_REC_ID=?\"\n\tret := make([]*User, 0)\n\trow := db.instance.QueryRowContext(ctx, q, role.RecID)\n\tcount := 0\n\terr := row.Scan(&count)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ret, helper.NewPage(request, uint(count)), nil\n\t\t}\n\t\tfLog.Errorf(\"row.Scan got %s\", err.Error())\n\t\treturn nil, nil, &ErrDBScanError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListUserRoleByRole\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tpage := helper.NewPage(request, uint(count))\n\tq = fmt.Sprintf(\"SELECT R.REC_ID,R.EMAIL,R.HASHED_PASSPHRASE,R.ENABLED, R.SUSPENDED,R.LAST_SEEN,R.LAST_LOGIN,R.FAIL_COUNT,R.ACTIVATION_CODE,R.ACTIVATION_DATE,R.TOTP_KEY,R.ENABLE_2FE,R.TOKEN_2FE,R.RECOVERY_CODE FROM HANSIP_USER_ROLE UR, HANSIP_USER R WHERE UR.USER_REC_ID = R.REC_ID AND UR.ROLE_REC_ID = ? ORDER BY R.EMAIL %s LIMIT %d, %d\", request.Sort, page.OffsetStart, page.OffsetEnd-page.OffsetStart)\n\trows, err := db.instance.QueryContext(ctx, q, role.RecID)\n\tif err != nil {\n\t\tfLog.Errorf(\"db.instance.QueryContext got %s. SQL = %s\", err.Error(), q)\n\t\treturn nil, nil, &ErrDBQueryError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListUserRoleByRole\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tuser := &User{}\n\t\tvar enabled, suspended, enable2fa int\n\t\terr := rows.Scan(&user.RecID, &user.Email, &user.HashedPassphrase, &enabled, &suspended, &user.LastSeen, &user.LastLogin, &user.FailCount, &user.ActivationCode,\n\t\t\t&user.ActivationDate, &user.UserTotpSecretKey, &enable2fa, &user.Token2FA, &user.RecoveryCode)\n\t\tif err != nil {\n\t\t\tfLog.Warnf(\"rows.Scan got %s\", err.Error())\n\t\t\treturn nil, nil, &ErrDBScanError{\n\t\t\t\tWrapped: err,\n\t\t\t\tMessage: \"Error ListUserRoleByRole\",\n\t\t\t\tSQL: q,\n\t\t\t}\n\t\t} else {\n\t\t\tif enabled == 1 {\n\t\t\t\tuser.Enabled = true\n\t\t\t}\n\t\t\tif suspended == 1 {\n\t\t\t\tuser.Suspended = true\n\t\t\t}\n\t\t\tif enable2fa == 1 {\n\t\t\t\tuser.Enable2FactorAuth = true\n\t\t\t}\n\t\t\tret = append(ret, user)\n\t\t}\n\t}\n\treturn ret, page, nil\n}", "title": "" }, { "docid": "9b5c088073ac62d2af29d21090915427", "score": "0.5590399", "text": "func (b *azureAuthBackend) pathRoleList(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {\n\troles, err := req.Storage.List(ctx, \"role/\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn logical.ListResponse(roles), nil\n}", "title": "" }, { "docid": "94d5f6aa973fcd9ac661cfa8a00bf5c2", "score": "0.5567179", "text": "func ListRoles(client client.Client, namespace string) ([]Role, error) {\n\toptions := metav1.ListOptions{}\n\n\tlist, err := client.Kubernetes.\n\t\tRbacV1().\n\t\tRoles(namespace).\n\t\tList(client.Ctx, options)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to list roles in namespace %s: %w\", namespace, err)\n\t}\n\n\troles := make([]Role, 0, len(list.Items))\n\n\tfor _, item := range list.Items {\n\t\troles = append(roles, Role{\n\t\t\tRole: item,\n\t\t\tclient: client,\n\t\t})\n\t}\n\n\treturn roles, nil\n}", "title": "" }, { "docid": "2f9004889f052490b0f3b71e082ced13", "score": "0.5559086", "text": "func userRolesGetDetails(httpresponsewriter http.ResponseWriter, httprequest *http.Request) {\n\n\tsecurity.UserRolesGetDetails(httpresponsewriter, httprequest, redisclient, sysid)\n}", "title": "" }, { "docid": "ee4116e8d3cb12de40178714395a6d8c", "score": "0.55508405", "text": "func (a *UserApiService) GetRolesForUserExecute(r UserApiGetRolesForUserRequest) ([]Role, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue []Role\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"UserApiService.GetRolesForUser\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v1/users/{username}/roles\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"username\"+\"}\", url.PathEscape(parameterValueToString(r.username, \"username\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := io.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = io.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "9575a867518809cdfe5cc3845919c874", "score": "0.5540077", "text": "func (s *Store) FindAllRolesByUserID(ctx context.Context, userID int64) (*[]Role, error) {\n\troles := &[]Role{}\n\terr := sqlx.SelectContext(\n\t\tctx, s.db, roles,\n\t\t\"SELECT roles.* FROM roles JOIN roles_users ON roles_users.role_id = roles.id WHERE roles_users.user_id = ?\",\n\t\tuserID,\n\t)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, errors.ErrorUnknown, \"\")\n\t}\n\n\treturn roles, nil\n}", "title": "" }, { "docid": "bd5afce3a5b634e4b07126a7074b6d1e", "score": "0.55398774", "text": "func (s scopedUserRoleService) Get() (*ScopedUserRoles, error) {\n\tpath := s.BasePath\n\n\tresp, err := apiGet(s.getClient(), new(ScopedUserRoles), path)\n\tif err != nil {\n\t\treturn &ScopedUserRoles{}, err\n\t}\n\treturn resp.(*ScopedUserRoles), nil\n}", "title": "" }, { "docid": "eca816ff797bab9ce8e0104e1d212282", "score": "0.55394864", "text": "func GetRoleList(db *sql.DB) (*[]*Role, error) {\n\tvar (\n\t\tid uint32\n\t\tname string\n\t\tintro string\n\t\tactive bool\n\t\tcreateAt string\n\n\t\troles []*Role\n\t)\n\n\trows, err := db.Query(roleSQLString[mysqlRoleGetList])\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tif err := rows.Scan(&id, &name, &intro, &active, &createAt); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tr := &Role{\n\t\t\tID: id,\n\t\t\tName: name,\n\t\t\tIntro: intro,\n\t\t\tActive: active,\n\t\t\tCreateAt: createAt,\n\t\t}\n\n\t\troles = append(roles, r)\n\t}\n\n\treturn &roles, nil\n}", "title": "" }, { "docid": "813de054ebfa63b24576dbff1fbdd3bb", "score": "0.5497034", "text": "func (e *Enforcer) GetAllRoles() []string {\n\treturn e.GetAllNamedRoles(\"g\")\n}", "title": "" }, { "docid": "b198a74a78a0cbec1a6ed0939b50178a", "score": "0.549669", "text": "func (e *SyncedEnforcer) GetAllRoles() []string {\n\te.m.RLock()\n\tdefer e.m.RUnlock()\n\treturn e.Enforcer.GetAllRoles()\n}", "title": "" }, { "docid": "53e9178fe0dac143579e028e1323443f", "score": "0.5486717", "text": "func (a *Client) GetAllRoles(params *GetAllRolesParams) (*GetAllRolesOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetAllRolesParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"getAllRoles\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/roles\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &GetAllRolesReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*GetAllRolesOK), nil\n\n}", "title": "" }, { "docid": "3694b20a1650477857be8add1bcf8b41", "score": "0.54785055", "text": "func (acmd *AdminCommand) QueryRoles(conn *Connection, policy *AdminPolicy) ([]*Role, Error) {\n\tacmd.writeHeader(_QUERY_ROLES, 0)\n\tlist, err := acmd.readRoles(conn, policy)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn list, nil\n}", "title": "" }, { "docid": "dd6db572f2c9e41a15cb99feaf01f56e", "score": "0.54631925", "text": "func ProjectRolesUserPath() string {\n\treturn \"/projects/roles\"\n}", "title": "" }, { "docid": "4783edd2ed16e04e221357b00407a77c", "score": "0.54575276", "text": "func (u *UserLoginState) GetRoles() []string {\n\treturn u.Spec.Roles\n}", "title": "" }, { "docid": "73d3f3dde6f04a4e48b68079d30e575f", "score": "0.5446327", "text": "func RolesGetAll() []models.Role {\n\tvar r []models.Role\n\n\tbootstrap.Db().Find(&r)\n\n\treturn r\n}", "title": "" }, { "docid": "b6eff666bc9bbf1093956f5ef11ccab5", "score": "0.54341847", "text": "func (client *Client) ListRamRoles(request *ListRamRolesRequest) (response *ListRamRolesResponse, err error) {\n\tresponse = CreateListRamRolesResponse()\n\terr = client.DoAction(request, response)\n\treturn\n}", "title": "" }, { "docid": "1157ea51872a40e257abf7e1967ba4b4", "score": "0.5422744", "text": "func List(c *client.Client) (*rbacv1.ClusterRoleList, error) {\n\tclusterrolelist, err := c.Clientset.RbacV1().ClusterRoles().List(context.TODO(), metav1.ListOptions{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn clusterrolelist, nil\n}", "title": "" }, { "docid": "d5095d033a9c71acbe400436876ccc72", "score": "0.5422336", "text": "func (p *RoleServ) List(params param.Param) (data map[string]interface{}, err error) {\n\n\tdata = make(map[string]interface{})\n\n\tdata[\"list\"], err = p.Repo.List(params)\n\tp.Engine.CheckError(err, \"roles list\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdata[\"count\"], err = p.Repo.Count(params)\n\tp.Engine.CheckError(err, \"roles count\")\n\n\treturn\n}", "title": "" }, { "docid": "36477d761e08500da2c37027c5fca134", "score": "0.5416907", "text": "func GetRoleMenus(c *gin.Context) {\r\n\tr := model.Role{}\r\n\tsession := sessions.Default(c)\r\n\tid := session.Get(\"RoleID\").(uint)\r\n\tr.ID = id\r\n\tdata, _ := r.GetMenus()\r\n\tutils.Success(c, gin.H{\"menus\": data}, \"菜单查询成功\")\r\n}", "title": "" }, { "docid": "696f314c93deb4d891bdadfe9932d5a9", "score": "0.54158634", "text": "func (handler httpRole) ListAll() httphandler.HandlerFunc {\n\tresp := jsont.F{\n\t\t\"ID\": nil,\n\t\t\"Name\": nil,\n\t\t\"Description\": nil,\n\t\t\"Icon\": nil,\n\t\t\"CreatedAt\": nil,\n\t\t\"UpdatedAt\": nil,\n\t\t\"Status\": nil,\n\t\t\"RecordActions\": nil,\n\t}\n\treturn func(c *httphandler.Context) {\n\t\tbiz := corebiz.NewBizRole()\n\t\trecs, err := biz.List(c, handler.DB, false)\n\t\tif c.HandleError(err) {\n\t\t\treturn\n\t\t}\n\t\tc.JSONWithFields(recs, resp)\n\t}\n}", "title": "" }, { "docid": "8a12ef68e6a8f2917a81b987dd603f87", "score": "0.54107046", "text": "func (o LookupServiceAccountResultOutput) Roles() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v LookupServiceAccountResult) []string { return v.Roles }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "eddc0e7c96d6f76ac6bcde7c4d55368e", "score": "0.5392244", "text": "func RoleByUserId(user_id int64) (Role, error) {\n\tresult := Role{}\n\terr := database.DB.Get(&result, \"SELECT level_id FROM role WHERE user_id = ? LIMIT 1\", user_id)\n\treturn result, err\n}", "title": "" }, { "docid": "034c0d462114ac30ac5c8e10477d9df3", "score": "0.5374894", "text": "func (r *RBAC) GetAllRolesByUID(system, uid string) (roles []string, err error) {\n\treturn r.User.GetAllRoles(system, uid)\n}", "title": "" }, { "docid": "9b4054f21cce659e065eb329623fc029", "score": "0.53520447", "text": "func (r *ProjectsRolesService) List(parent string) *ProjectsRolesListCall {\n\tc := &ProjectsRolesListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.parent = parent\n\treturn c\n}", "title": "" }, { "docid": "d5e39360546ae509989151466d082553", "score": "0.5341808", "text": "func (c *RelationAuthorController) ListRoles(ctx *app.ListRolesRelationAuthorContext) error {\n\t// RelationAuthorController_ListRoles: start_implement\n\tm, err := c.fm()\n\tif err != nil {\n\t\tgoa.ContextLogger(ctx).Error(`unable to get model`, `error`, err.Error())\n\t\treturn ctx.ServiceUnavailable()\n\t}\n\tdefer func() { m.Close() }()\n\n\t_, err = m.GetAuthorByID(ctx.AuthorID)\n\tif err != nil {\n\t\tgoa.ContextLogger(ctx).Error(`failed to get author`, `error`, err.Error())\n\t\tif err == model.ErrNotFound {\n\t\t\treturn ctx.NotFound()\n\t\t}\n\t\treturn ctx.InternalServerError()\n\t}\n\n\tlist, err := m.ListRolesByIDs(&ctx.AuthorID)\n\tif err != nil {\n\t\tgoa.ContextLogger(ctx).Error(`failed to get role list`, `error`, err.Error())\n\t\treturn ctx.InternalServerError()\n\t}\n\tbs := make(app.RoleCollection, len(list))\n\tfor i, bk := range list {\n\t\tbs[i] = convert.ToRoleMedia(bk)\n\t}\n\treturn ctx.OK(bs)\n\t// RelationAuthorController_ListRoles: end_implement\n}", "title": "" }, { "docid": "ff2d9cbccd9ef4bae4c3efeefd549216", "score": "0.5336417", "text": "func MatchedRoles(req *http.Request, user interface{}) []string {\n\treturn role.MatchedRoles(req, user)\n}", "title": "" }, { "docid": "efa281991b36f902fd1847ea71377a67", "score": "0.53327954", "text": "func UserMenus(userID string) []Menu {\n\tvar list []Menu\n\tfor i := range Menus {\n\t\tmenu := Menus[i]\n\n\t\tlog.Printf(\"UserMenus : menu [%v]\", menu)\n\n\t\terr := qra.Search(Ctx{userID}, nil, \"read:\"+menu.Role)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tlist = append(list, menu)\n\t}\n\treturn list\n}", "title": "" }, { "docid": "335f893de9b9f477dac4154340e1e381", "score": "0.53307724", "text": "func (c *APIClient) GetUserRoles(ctx _context.Context, id int32) apiGetUserRolesRequest {\n\treturn apiGetUserRolesRequest{\n\t\tclient: c,\n\t\tctx: ctx,\n\t\tid: id,\n\t}\n}", "title": "" }, { "docid": "73b34804e3f4dd01e9d89bdc71cb6f42", "score": "0.5304176", "text": "func (urq *UserRoleQuery) All(ctx context.Context) ([]*UserRole, error) {\n\tif err := urq.prepareQuery(ctx); err != nil {\n\t\treturn nil, err\n\t}\n\treturn urq.sqlAll(ctx)\n}", "title": "" }, { "docid": "cc382320b39fe594d7b69fd25a88961d", "score": "0.52995265", "text": "func FindACLRoles(ctx context.Context, db DB, _params ...interface{}) ([]*ACLRole, error) {\n\tparams := []interface{}{\n\t\torm.Column(\"id\"),\n\t\torm.Column(\"checksum\"),\n\t\torm.Column(\"name\"),\n\t\torm.Column(\"description\"),\n\t\torm.Column(\"admin_user_id\"),\n\t\torm.Column(\"customer_id\"),\n\t\torm.Column(\"created_at\"),\n\t\torm.Column(\"updated_at\"),\n\t\torm.Table(ACLRoleTableName),\n\t}\n\tif len(_params) > 0 {\n\t\tfor _, param := range _params {\n\t\t\tparams = append(params, param)\n\t\t}\n\t}\n\tq, p := orm.BuildQuery(params...)\n\trows, err := db.QueryContext(ctx, q, p...)\n\tif err == sql.ErrNoRows {\n\t\treturn nil, nil\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\tresults := make([]*ACLRole, 0)\n\tfor rows.Next() {\n\t\tvar _ID sql.NullString\n\t\tvar _Checksum sql.NullString\n\t\tvar _Name sql.NullString\n\t\tvar _Description sql.NullString\n\t\tvar _AdminUserID sql.NullString\n\t\tvar _CustomerID sql.NullString\n\t\tvar _CreatedAt sql.NullInt64\n\t\tvar _UpdatedAt sql.NullInt64\n\t\terr := rows.Scan(\n\t\t\t&_ID,\n\t\t\t&_Checksum,\n\t\t\t&_Name,\n\t\t\t&_Description,\n\t\t\t&_AdminUserID,\n\t\t\t&_CustomerID,\n\t\t\t&_CreatedAt,\n\t\t\t&_UpdatedAt,\n\t\t)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tt := &ACLRole{}\n\t\tif _ID.Valid {\n\t\t\tt.SetID(_ID.String)\n\t\t}\n\t\tif _Checksum.Valid {\n\t\t\tt.SetChecksum(_Checksum.String)\n\t\t}\n\t\tif _Name.Valid {\n\t\t\tt.SetName(_Name.String)\n\t\t}\n\t\tif _Description.Valid {\n\t\t\tt.SetDescription(_Description.String)\n\t\t}\n\t\tif _AdminUserID.Valid {\n\t\t\tt.SetAdminUserID(_AdminUserID.String)\n\t\t}\n\t\tif _CustomerID.Valid {\n\t\t\tt.SetCustomerID(_CustomerID.String)\n\t\t}\n\t\tif _CreatedAt.Valid {\n\t\t\tt.SetCreatedAt(_CreatedAt.Int64)\n\t\t}\n\t\tif _UpdatedAt.Valid {\n\t\t\tt.SetUpdatedAt(_UpdatedAt.Int64)\n\t\t}\n\t\tresults = append(results, t)\n\t}\n\treturn results, nil\n}", "title": "" }, { "docid": "b437be78838abcff49cbae493fb0cea1", "score": "0.52983326", "text": "func (o ClusterTrustedAccessRoleBindingOutput) Roles() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *ClusterTrustedAccessRoleBinding) pulumi.StringArrayOutput { return v.Roles }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "89634daf747680fc6b0a66b02f80e998", "score": "0.5296235", "text": "func userRolesShowPage(httpresponsewriter http.ResponseWriter, httprequest *http.Request) {\n\n\tsecurity.UserRolesShowPage(httpresponsewriter, httprequest, redisclient)\n}", "title": "" }, { "docid": "36b33805210405b6ba75a25360efbfc5", "score": "0.52786064", "text": "func (s *StateStore) GetACLRoles(ws memdb.WatchSet) (memdb.ResultIterator, error) {\n\ttxn := s.db.ReadTxn()\n\n\t// Walk the entire table to get all ACL roles.\n\titer, err := txn.Get(TableACLRoles, indexID)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"ACL role lookup failed: %v\", err)\n\t}\n\tws.Add(iter.WatchCh())\n\n\treturn iter, nil\n}", "title": "" }, { "docid": "1a73f2e3765fb0459f3096cc308e151a", "score": "0.52572614", "text": "func (a *UserApiService) GetRolesForUser(ctx context.Context, username string) UserApiGetRolesForUserRequest {\n\treturn UserApiGetRolesForUserRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tusername: username,\n\t}\n}", "title": "" }, { "docid": "ff9e89ef483b1229073a75c0e564653a", "score": "0.525686", "text": "func (s *Store) FindAllRoles(ctx context.Context) (*[]Role, error) {\n\troles := &[]Role{}\n\terr := sqlx.SelectContext(ctx, s.db, roles, \"SELECT * FROM roles\")\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, errors.ErrorUnknown, \"\")\n\t}\n\treturn roles, nil\n}", "title": "" }, { "docid": "449b9a15a3a646728685ed1e3980a1f5", "score": "0.5240147", "text": "func (c *ClientImpl) ListRoles(ctx context.Context, hcpHostURL string) ([]hcpModels.RoleResource, error) {\n\tspan, _ := opentracing.StartSpanFromContext(ctx, \"List Roles\")\n\tdefer span.Finish()\n\n\tsession, err := c.getSession(ctx, hcpHostURL, hcpUserName, hcpPassword)\n\tif err != nil {\n\t\treturn []hcpModels.RoleResource{}, err\n\t}\n\n\tstatus = Failure\n\tmonitor := metrics.StartExternalCall(externalSvcName, \"List Roles in HCP\")\n\tdefer func() { monitor.RecordWithStatus(status) }()\n\tresp, err := mlopsHttp.ExecuteHTTPRequest(\n\t\tctx,\n\t\tc.client,\n\t\thcpHostURL+rolePathV1,\n\t\thttp.MethodGet,\n\t\tmap[string]string{sessionHeader: session},\n\t\tbytes.NewReader(nil),\n\t)\n\tif err != nil {\n\t\treturn []hcpModels.RoleResource{}, errors.Wrapf(err, \"ListRoles: Failed to get roles from HCP: %v\", err)\n\t}\n\n\tstatus = Success\n\n\terr = c.deleteSession(ctx, hcpHostURL, session)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"ListRoles: Failed to decode response body: %v\", err)\n\t}\n\tvar roleOutput hcpModels.RoleListResource\n\tif err := json.Unmarshal(body, &roleOutput); err != nil {\n\t\treturn nil, fmt.Errorf(\"ListRoles: Failed to unmarshal body: %v\", err)\n\t}\n\n\treturn roleOutput.Embedded.Roles, nil\n}", "title": "" }, { "docid": "113efc6f75d6b7020cd6358416c812bc", "score": "0.5239751", "text": "func (d *Dao) Roles(c context.Context) (res map[string]map[int64]*model.Role, err error) {\n\trows, err := d.db.Query(c, _rolesSQL)\n\tif err != nil {\n\t\tlog.Error(\"Roles d.db.Query(%d) error(%v)\", err)\n\t\treturn\n\t}\n\tdefer rows.Close()\n\tres = make(map[string]map[int64]*model.Role)\n\tfor rows.Next() {\n\t\tvar (\n\t\t\troles map[int64]*model.Role\n\t\t\tok bool\n\t\t)\n\t\trole := &model.Role{}\n\t\tif err = rows.Scan(&role.RoleID, &role.System, &role.RoleName, &role.CTime, &role.MTime); err != nil {\n\t\t\tlog.Error(\"Roles rows.Scan error(%v)\", err)\n\t\t\treturn\n\t\t}\n\t\tif roles, ok = res[role.System]; !ok {\n\t\t\troles = make(map[int64]*model.Role)\n\t\t\tres[role.System] = roles\n\t\t}\n\t\troles[role.RoleID] = role\n\t}\n\treturn\n}", "title": "" }, { "docid": "d0de234704a82d7d1db755fc543c5f4b", "score": "0.52192485", "text": "func (s *SampleStore) Roles() ([]model.Role, error) {\n\troles := make([]model.Role, len(s.roles))\n\ti := 0\n\tfor _, role := range s.roles {\n\t\troles[i] = *role\n\t\ti++\n\t}\n\treturn roles, nil\n}", "title": "" }, { "docid": "950329154b4064b240f0dee59117a075", "score": "0.5216374", "text": "func (o OfflineNotaryRepository) ListRoles() ([]client.RoleWithSignatures, error) {\n\treturn nil, storage.ErrOffline{}\n}", "title": "" }, { "docid": "76ddd7d634597713b5d748d428b2dd28", "score": "0.52105784", "text": "func (p *RoleServ) Excel(params param.Param) (roles []model.Role, err error) {\n\tparams.Limit = p.Engine.Env.Setting.ExcelMaxRows\n\tparams.Offset = 0\n\tparams.Order = \"roles.id ASC\"\n\n\troles, err = p.Repo.List(params)\n\tp.Engine.CheckError(err, \"roles excel\")\n\n\treturn\n}", "title": "" }, { "docid": "225c7c736e88ab175db7863a0b8376fd", "score": "0.5206882", "text": "func (k Keeper) Roles(c context.Context, req *types.QueryRolesRequest) (*types.QueryRolesResponse, error) {\n\tif req == nil {\n\t\treturn nil, status.Errorf(codes.InvalidArgument, \"empty request\")\n\t}\n\n\taddr, err := sdk.AccAddressFromBech32(req.Address)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tctx := sdk.UnwrapSDKContext(c)\n\tauth := k.GetAuth(ctx, addr)\n\n\treturn &types.QueryRolesResponse{Roles: auth.Roles()}, nil\n}", "title": "" }, { "docid": "4e159003535a82a8c8bb72acc830ae90", "score": "0.5201442", "text": "func GetRoles() (categories []Role, err error) {\n\tq := `SELECT id, name, parent_id FROM roles ORDER BY parent_id asc, id asc, name ASC`\n\tdb := GetConnection()\n\tdefer db.Close()\n\n\trows, err := db.Query(q)\n\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tc := Role{}\n\t\terr = rows.Scan(\n\t\t\t&c.Id,\n\t\t\t&c.Name,\n\t\t\t&c.ParentId,\n\t\t)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tcategories = append(categories, c)\n\n\t}\n\treturn categories, nil\n}", "title": "" }, { "docid": "3375fb63dfaff54c1889da81f9d74f58", "score": "0.51950055", "text": "func (e *CachedEnforcer) GetImplicitRolesForUser(user string, domain ...string) ([]string, error) {\n\treturn e.api.GetImplicitRolesForUser(user, domain...)\n}", "title": "" }, { "docid": "71dbc34467746fcc1ef2304e3545b281", "score": "0.5192782", "text": "func NewGETUserRolesOK() *GETUserRolesOK {\n\treturn &GETUserRolesOK{}\n}", "title": "" }, { "docid": "ab60f661848daba43b76d7b41211894c", "score": "0.51844007", "text": "func (o SecretRolesetBindingOutput) Roles() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v SecretRolesetBinding) []string { return v.Roles }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "bfd7e7ef5590b97c3c7de3f2610985de", "score": "0.516115", "text": "func GetUser_rolesViaBundle(iBundle string) (*User_roles, error) {\n\tvar _User_roles = &User_roles{Bundle: iBundle}\n\thas, err := Engine.Get(_User_roles)\n\tif has {\n\t\treturn _User_roles, err\n\t} else {\n\t\treturn nil, err\n\t}\n}", "title": "" }, { "docid": "8766e1e76990818b8b3ffdd0b4e149e7", "score": "0.51560736", "text": "func (a *ManagementApiService) GetAllRoles(ctx _context.Context) apiGetAllRolesRequest {\n\treturn apiGetAllRolesRequest{\n\t\tapiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "560505f55574ac988878c1ad08f36501", "score": "0.5152505", "text": "func (a *Approval) Roles() []string {\n\treturn a.allowedRoles\n}", "title": "" }, { "docid": "e6c92696195253c04cf7fbc9b88c4546", "score": "0.5151116", "text": "func (s *Security) SearchRoles(body json.RawMessage, options types.QueryOptions) (*RoleSearchResult, error) {\n\tch := make(chan *types.KuzzleResponse)\n\n\tquery := &types.KuzzleRequest{\n\t\tController: \"security\",\n\t\tAction: \"searchRoles\",\n\t\tBody: body,\n\t}\n\n\tif options != nil {\n\t\tquery.From = options.From()\n\t\tquery.Size = options.Size()\n\n\t\tscroll := options.Scroll()\n\t\tif scroll != \"\" {\n\t\t\tquery.Scroll = scroll\n\t\t}\n\t}\n\n\tgo s.Kuzzle.Query(query, options, ch)\n\n\tres := <-ch\n\n\tif res.Error.Error() != \"\" {\n\t\treturn nil, res.Error\n\t}\n\tjsonSearchResult := &jsonRoleSearchResult{}\n\tjson.Unmarshal(res.Result, jsonSearchResult)\n\n\tsr, err := types.NewSearchResult(s.Kuzzle, \"scrollRoles\", query, options, res)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsearchResult := &RoleSearchResult{\n\t\tAggregations: sr.Aggregations,\n\t\tTotal: sr.Total,\n\t\tFetched: sr.Fetched,\n\t\tScrollId: sr.ScrollId,\n\t\tkuzzle: s.Kuzzle,\n\t\trequest: query,\n\t\tresponse: res,\n\t\toptions: options,\n\t}\n\tfor _, j := range jsonSearchResult.Hits {\n\t\tr := j.jsonRoleToRole()\n\t\tsearchResult.Hits = append(searchResult.Hits, r)\n\t}\n\n\treturn searchResult, nil\n}", "title": "" }, { "docid": "0d23ecf7da19425f534f006e6077d5e4", "score": "0.5144294", "text": "func (_SweetToken *SweetTokenSession) Roles() (common.Address, error) {\n\treturn _SweetToken.Contract.Roles(&_SweetToken.CallOpts)\n}", "title": "" }, { "docid": "f7ad70e9005ef0b141199de15f525a5f", "score": "0.5143043", "text": "func (api *API) GetRolesHandler(w http.ResponseWriter, req *http.Request) {\n\tctx := req.Context()\n\tlogData := log.Data{}\n\n\toffsetParameter := req.URL.Query().Get(\"offset\")\n\tlimitParameter := req.URL.Query().Get(\"limit\")\n\n\toffset := api.defaultOffset\n\tlimit := api.defaultLimit\n\tvar err error\n\n\tif limitParameter != \"\" {\n\t\tlogData[\"limit\"] = limitParameter\n\t\tlimit, err = utils.ValidatePositiveInteger(limitParameter)\n\t\tif err != nil {\n\t\t\tlog.Event(ctx, \"invalid query parameter: limit\", log.ERROR, log.Error(err), logData)\n\t\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t}\n\n\tif offsetParameter != \"\" {\n\t\tlogData[\"offset\"] = offsetParameter\n\t\toffset, err = utils.ValidatePositiveInteger(offsetParameter)\n\t\tif err != nil {\n\t\t\tlog.Event(ctx, \"invalid query parameter: offset\", log.ERROR, log.Error(err), logData)\n\t\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t}\n\n\tif limit > api.maximumDefaultLimit {\n\t\tlogData[\"max_limit\"] = api.maximumDefaultLimit\n\t\terr = apierrors.ErrorMaximumLimitReached(api.maximumDefaultLimit)\n\t\tlog.Event(ctx, \"invalid query parameter: limit, maximum limit reached\", log.ERROR, log.Error(err), logData)\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// get roles from MongoDB\n\tlistOfRoles, err := api.permissionsStore.GetRoles(ctx, offset, limit)\n\n\tif err != nil {\n\t\tlog.Event(ctx, \"getRoles Handler: retrieving roles from MongoDB returned an error\", log.ERROR, log.Error(err))\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tb, err := json.Marshal(listOfRoles)\n\tif err != nil {\n\t\tlog.Event(ctx, \"getRoles Handler: failed to marshal roles resource into bytes\", log.ERROR, log.Error(err))\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t//Set headers\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=utf-8\")\n\n\tif _, err := w.Write(b); err != nil {\n\t\tlog.Event(ctx, \"getRoles Handler: error writing bytes to response\", log.ERROR, log.Error(err))\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tlog.Event(ctx, \"getRoles Handler: Successfully retrieved roles\", log.INFO)\n\n}", "title": "" }, { "docid": "98c512316ebbc7dc7efd94e735be4d8c", "score": "0.5142413", "text": "func (o *IamPermissionToRoles) GetRoles() []MoMoRef {\n\tif o == nil {\n\t\tvar ret []MoMoRef\n\t\treturn ret\n\t}\n\treturn o.Roles\n}", "title": "" }, { "docid": "85c3d1e4b31e4556fb17839ddb076468", "score": "0.5140326", "text": "func (c *Client) ListV3RolesByQuery(query url.Values) ([]V3Role, error) {\n\tvar roles []V3Role\n\trequestURL, err := url.Parse(\"/v3/roles\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\trequestURL.RawQuery = query.Encode()\n\n\tfor {\n\t\tr := c.NewRequest(\"GET\", fmt.Sprintf(\"%s?%s\", requestURL.Path, requestURL.RawQuery))\n\t\tresp, err := c.DoRequest(r)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"Error requesting v3 space roles\")\n\t\t}\n\t\tdefer resp.Body.Close()\n\n\t\tif resp.StatusCode != http.StatusOK {\n\t\t\treturn nil, fmt.Errorf(\"Error listing v3 space roles, response code: %d\", resp.StatusCode)\n\t\t}\n\n\t\tvar data listV3SpaceRolesResponse\n\t\tif err := json.NewDecoder(resp.Body).Decode(&data); err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"Error parsing JSON from list v3 space roles\")\n\t\t}\n\n\t\troles = append(roles, data.Resources...)\n\n\t\trequestURL, err = url.Parse(data.Pagination.Next.Href)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"Error parsing next page URL\")\n\t\t}\n\t\tif requestURL.String() == \"\" {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn roles, nil\n}", "title": "" }, { "docid": "43d0bc0ee98af47977ed65c9c8cef1da", "score": "0.5135709", "text": "func (j *DSGitHub) AllRoles(ctx *Ctx, rich map[string]interface{}) (roles []string, static bool) {\n\tif ctx.Debug > 0 && j.Category != \"repository\" {\n\t\tdefer func() {\n\t\t\tid, _ := rich[\"id\"]\n\t\t\tuuid, _ := rich[\"uuid\"]\n\t\t\tfmt.Printf(\"%s/%s: AllRoles(%v, %v) --> {%v, %+v}\\n\", j.URL, j.Category, id, uuid, static, roles)\n\t\t}()\n\t}\n\tvar possibleRoles []string\n\tswitch j.Category {\n\tcase \"repository\":\n\t\tstatic = true\n\t\treturn\n\tcase \"issue\":\n\t\troles = []string{Author}\n\t\tif rich == nil {\n\t\t\treturn\n\t\t}\n\t\ttyp, ok := rich[\"type\"]\n\t\tif ok {\n\t\t\tswitch typ.(string) {\n\t\t\tcase \"issue\":\n\t\t\t\tpossibleRoles = GitHubIssueRoles\n\t\t\tcase \"issue_comment\":\n\t\t\t\tpossibleRoles = GitHubIssueCommentRoles\n\t\t\t\tpossibleRoles = append(possibleRoles, \"commenter\")\n\t\t\tcase \"issue_assignee\":\n\t\t\t\tpossibleRoles = GitHubIssueAssigneeRoles\n\t\t\tcase \"issue_reaction\":\n\t\t\t\tpossibleRoles = GitHubIssueReactionRoles\n\t\t\t\tpossibleRoles = append(possibleRoles, \"actor\")\n\t\t\tcase \"issue_comment_reaction\":\n\t\t\t\tpossibleRoles = GitHubIssueReactionRoles\n\t\t\t\tpossibleRoles = append(possibleRoles, \"actor\")\n\t\t\t}\n\t\t}\n\tcase \"pull_request\":\n\t\troles = []string{Author}\n\t\tif rich == nil {\n\t\t\treturn\n\t\t}\n\t\ttyp, ok := rich[\"type\"]\n\t\tif ok {\n\t\t\tswitch typ.(string) {\n\t\t\tcase \"pull_request\":\n\t\t\t\tpossibleRoles = GitHubPullRequestRoles\n\t\t\tcase \"pull_request_comment\":\n\t\t\t\tpossibleRoles = GitHubPullRequestCommentRoles\n\t\t\t\tpossibleRoles = append(possibleRoles, \"commenter\")\n\t\t\tcase \"pull_request_assignee\":\n\t\t\t\tpossibleRoles = GitHubPullRequestAssigneeRoles\n\t\t\tcase \"pull_request_comment_reaction\":\n\t\t\t\tpossibleRoles = GitHubPullRequestReactionRoles\n\t\t\t\tpossibleRoles = append(possibleRoles, \"actor\")\n\t\t\tcase \"pull_request_requested_reviewer\":\n\t\t\t\tpossibleRoles = GitHubPullRequestRequestedReviewerRoles\n\t\t\tcase \"pull_request_review\":\n\t\t\t\tpossibleRoles = GitHubPullRequestReviewRoles\n\t\t\t\tpossibleRoles = append(possibleRoles, \"reviewer\")\n\t\t\t}\n\t\t}\n\t}\n\tfor _, possibleRole := range possibleRoles {\n\t\t_, ok := Dig(rich, []string{possibleRole + \"_id\"}, false, true)\n\t\tif ok {\n\t\t\troles = append(roles, possibleRole)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "b120c6ce9720c4425bcbaa2b91caa6f1", "score": "0.51108867", "text": "func GetRoles(c *gin.Context) {\n\tresult := service.GetRoles()\n\n\tif len(*result) == 0 {\n\t\tc.JSON(404, nil)\n\t} else {\n\t\tc.JSON(200, result)\n\t}\n}", "title": "" }, { "docid": "3652c69a193add39c9638bef1ed301ac", "score": "0.5093495", "text": "func (a *Client) GetRoles(params *GetRolesParams, authInfo runtime.ClientAuthInfoWriter) error {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetRolesParams()\n\t}\n\n\t_, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"getRoles\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/roles\",\n\t\tProducesMediaTypes: []string{\"application/json\", \"application/xml\", \"text/xml\"},\n\t\tConsumesMediaTypes: []string{\"application/json\", \"application/xml\", \"text/xml\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &GetRolesReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n\n}", "title": "" }, { "docid": "e4682f6fdef1cf6a169645b01206ac18", "score": "0.508822", "text": "func (r *robot) GetRoles() []types.RBACRole {\n\treturn nil\n}", "title": "" }, { "docid": "bc281120cd292c71a204964443698fff", "score": "0.50794166", "text": "func GetUser_rolesesByEntityIdAndRevisionId(offset int, limit int, EntityId_ int, RevisionId_ int) (*[]*User_roles, error) {\n\tvar _User_roles = new([]*User_roles)\n\terr := Engine.Table(\"user__roles\").Where(\"entity_id = ? and revision_id = ?\", EntityId_, RevisionId_).Limit(limit, offset).Find(_User_roles)\n\treturn _User_roles, err\n}", "title": "" }, { "docid": "947665690d57da09949fdfe9f5eb8e93", "score": "0.50735694", "text": "func (c *Client) ListAssignedByRoleNameResourceRoles(ctx context.Context, path string) (*http.Response, error) {\n\treq, err := c.NewListAssignedByRoleNameResourceRolesRequest(ctx, path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn c.Client.Do(ctx, req)\n}", "title": "" }, { "docid": "16e6887debf8cc4be29d8d2ba74c0a5d", "score": "0.5063328", "text": "func (c *Client) ListAssignedResourceRoles(ctx context.Context, path string) (*http.Response, error) {\n\treq, err := c.NewListAssignedResourceRolesRequest(ctx, path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn c.Client.Do(ctx, req)\n}", "title": "" }, { "docid": "a5adeb1248513ed720b07d7123845afe", "score": "0.50555366", "text": "func (e EmptyTargetsNotaryRepository) ListRoles() ([]client.RoleWithSignatures, error) {\n\trootRole := data.Role{\n\t\tRootRole: data.RootRole{\n\t\t\tKeyIDs: []string{\"rootID\"},\n\t\t\tThreshold: 1,\n\t\t},\n\t\tName: data.CanonicalRootRole,\n\t}\n\n\ttargetsRole := data.Role{\n\t\tRootRole: data.RootRole{\n\t\t\tKeyIDs: []string{\"targetsID\"},\n\t\t\tThreshold: 1,\n\t\t},\n\t\tName: data.CanonicalTargetsRole,\n\t}\n\treturn []client.RoleWithSignatures{\n\t\t{Role: rootRole},\n\t\t{Role: targetsRole},\n\t}, nil\n}", "title": "" }, { "docid": "85e04d6256c1b836c2f637def6beabe2", "score": "0.5053708", "text": "func GetUser_rolesViaRolesTargetId(iRolesTargetId string) (*User_roles, error) {\n\tvar _User_roles = &User_roles{RolesTargetId: iRolesTargetId}\n\thas, err := Engine.Get(_User_roles)\n\tif has {\n\t\treturn _User_roles, err\n\t} else {\n\t\treturn nil, err\n\t}\n}", "title": "" } ]
783380adfcc5af3281c877f0ea75ab2e
IsYANGGoStruct ensures that NetworkInstance_Mpls_TeGlobalAttributes implements the yang.GoStruct interface. This allows functions that need to handle this struct to identify it as being generated by ygen.
[ { "docid": "2d03963eb7866878a273cfe26650fa91", "score": "0.8921467", "text": "func (*NetworkInstance_Mpls_TeGlobalAttributes) IsYANGGoStruct() {}", "title": "" } ]
[ { "docid": "473de24759c1f3df17ccaa1fbab2be82", "score": "0.87086517", "text": "func (*Mpls_TeGlobalAttributes) IsYANGGoStruct() {}", "title": "" }, { "docid": "473de24759c1f3df17ccaa1fbab2be82", "score": "0.87086517", "text": "func (*Mpls_TeGlobalAttributes) IsYANGGoStruct() {}", "title": "" }, { "docid": "0c68dc999288f4b5d255e792413ec7e8", "score": "0.84256995", "text": "func (*NetworkInstance_Mpls_TeGlobalAttributes_Srlg) IsYANGGoStruct() {}", "title": "" }, { "docid": "0c68dc999288f4b5d255e792413ec7e8", "score": "0.84256995", "text": "func (*NetworkInstance_Mpls_TeGlobalAttributes_Srlg) IsYANGGoStruct() {}", "title": "" }, { "docid": "614206e05e5dbd8dffbde1bc6ea70441", "score": "0.80842835", "text": "func (*Mpls_TeGlobalAttributes_Srlg) IsYANGGoStruct() {}", "title": "" }, { "docid": "614206e05e5dbd8dffbde1bc6ea70441", "score": "0.80842835", "text": "func (*Mpls_TeGlobalAttributes_Srlg) IsYANGGoStruct() {}", "title": "" }, { "docid": "05ffae81bd7623bc21fbfc364e92d861", "score": "0.79651487", "text": "func (*NetworkInstance_Mpls_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "05ffae81bd7623bc21fbfc364e92d861", "score": "0.79651487", "text": "func (*NetworkInstance_Mpls_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "444e7d3bcc533902c94de580db117966", "score": "0.79053175", "text": "func (*NetworkInstance_Mpls_Global_Interface) IsYANGGoStruct() {}", "title": "" }, { "docid": "444e7d3bcc533902c94de580db117966", "score": "0.79053175", "text": "func (*NetworkInstance_Mpls_Global_Interface) IsYANGGoStruct() {}", "title": "" }, { "docid": "fd2aacef01de26a860ec5576bea5f434", "score": "0.7895008", "text": "func (*NetworkInstance_Protocol_Bgp_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "fd2aacef01de26a860ec5576bea5f434", "score": "0.7893966", "text": "func (*NetworkInstance_Protocol_Bgp_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "5c22399995eca98946211d11e0581d0f", "score": "0.7878236", "text": "func (*NetworkInstance_Protocol_Isis_Global_Mpls) IsYANGGoStruct() {}", "title": "" }, { "docid": "5c22399995eca98946211d11e0581d0f", "score": "0.7877964", "text": "func (*NetworkInstance_Protocol_Isis_Global_Mpls) IsYANGGoStruct() {}", "title": "" }, { "docid": "2db7b1e77677998261b3d0aad06c2953", "score": "0.7872449", "text": "func (*Bgp_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "2db7b1e77677998261b3d0aad06c2953", "score": "0.7872449", "text": "func (*Bgp_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "c345e30a25476646c3ec5eda5ea057e3", "score": "0.7745008", "text": "func (*NetworkInstance_Mpls_TeGlobalAttributes_AdminGroup) IsYANGGoStruct() {}", "title": "" }, { "docid": "c345e30a25476646c3ec5eda5ea057e3", "score": "0.7745008", "text": "func (*NetworkInstance_Mpls_TeGlobalAttributes_AdminGroup) IsYANGGoStruct() {}", "title": "" }, { "docid": "e9c83a50d095908751173076f09ce1d8", "score": "0.77320886", "text": "func (*Mpls_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "e9c83a50d095908751173076f09ce1d8", "score": "0.77320886", "text": "func (*Mpls_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "374a2ec198292f836d59a85f7dcfd4a6", "score": "0.77319115", "text": "func (*NetworkInstance_Protocol_Ospfv2_Global_Mpls) IsYANGGoStruct() {}", "title": "" }, { "docid": "374a2ec198292f836d59a85f7dcfd4a6", "score": "0.77313125", "text": "func (*NetworkInstance_Protocol_Ospfv2_Global_Mpls) IsYANGGoStruct() {}", "title": "" }, { "docid": "2ca0ec731a45dea4d3053de1aac19697", "score": "0.76065516", "text": "func (*Mpls_Global_Interface) IsYANGGoStruct() {}", "title": "" }, { "docid": "2ca0ec731a45dea4d3053de1aac19697", "score": "0.76065516", "text": "func (*Mpls_Global_Interface) IsYANGGoStruct() {}", "title": "" }, { "docid": "5f182a7b4ffb853ca83620ddfd77cc88", "score": "0.75449955", "text": "func (*NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Global_Counters) IsYANGGoStruct() {}", "title": "" }, { "docid": "5f182a7b4ffb853ca83620ddfd77cc88", "score": "0.7543627", "text": "func (*NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Global_Counters) IsYANGGoStruct() {}", "title": "" }, { "docid": "88191940ea7a1b69f9e36476e0b7a73f", "score": "0.75393254", "text": "func (*NetworkInstance_Protocol_Isis_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "88191940ea7a1b69f9e36476e0b7a73f", "score": "0.75393254", "text": "func (*NetworkInstance_Protocol_Isis_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "572c9ed2fecedb18878735b9de0ab8d1", "score": "0.75251144", "text": "func (*Mpls_TeGlobalAttributes_AdminGroup) IsYANGGoStruct() {}", "title": "" }, { "docid": "572c9ed2fecedb18878735b9de0ab8d1", "score": "0.75251144", "text": "func (*Mpls_TeGlobalAttributes_AdminGroup) IsYANGGoStruct() {}", "title": "" }, { "docid": "f2ac3ee10a64803ad565932b9217f491", "score": "0.75180954", "text": "func (*Stp_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "26583913b3c635159cf551da9ffba38a", "score": "0.74816835", "text": "func (*Mpls_SignalingProtocols_RsvpTe_Global_Counters) IsYANGGoStruct() {}", "title": "" }, { "docid": "26583913b3c635159cf551da9ffba38a", "score": "0.74816835", "text": "func (*Mpls_SignalingProtocols_RsvpTe_Global_Counters) IsYANGGoStruct() {}", "title": "" }, { "docid": "e83c11aa219368a599e54eac2faeea2c", "score": "0.746361", "text": "func (*NetworkInstance_Protocol_Isis_Global_Afi) IsYANGGoStruct() {}", "title": "" }, { "docid": "e83c11aa219368a599e54eac2faeea2c", "score": "0.746361", "text": "func (*NetworkInstance_Protocol_Isis_Global_Afi) IsYANGGoStruct() {}", "title": "" }, { "docid": "06ea6e7efbe1529875ea27c8a3aaf8ef", "score": "0.74623096", "text": "func (*Mpls_SignalingProtocols_RsvpTe_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "06ea6e7efbe1529875ea27c8a3aaf8ef", "score": "0.74623096", "text": "func (*Mpls_SignalingProtocols_RsvpTe_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "e1e3beadc1e7fa6b936a79c79e48fc45", "score": "0.7457589", "text": "func (*NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "e1e3beadc1e7fa6b936a79c79e48fc45", "score": "0.7457589", "text": "func (*NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "6deeb87b8d3aebe918b053e965f347cc", "score": "0.7452979", "text": "func (*NetworkInstance_Protocol_Isis_Global_Nsr) IsYANGGoStruct() {}", "title": "" }, { "docid": "6deeb87b8d3aebe918b053e965f347cc", "score": "0.7452704", "text": "func (*NetworkInstance_Protocol_Isis_Global_Nsr) IsYANGGoStruct() {}", "title": "" }, { "docid": "5ccd82898f123f03240119791ee774c9", "score": "0.744537", "text": "func (*NetworkInstance_Protocol_Isis_Global_Af) IsYANGGoStruct() {}", "title": "" }, { "docid": "5ccd82898f123f03240119791ee774c9", "score": "0.744537", "text": "func (*NetworkInstance_Protocol_Isis_Global_Af) IsYANGGoStruct() {}", "title": "" }, { "docid": "741cf372e630e5e05f73042e28583f12", "score": "0.7427373", "text": "func (*NetworkInstance_Protocol_Ospfv2_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "741cf372e630e5e05f73042e28583f12", "score": "0.7427373", "text": "func (*NetworkInstance_Protocol_Ospfv2_Global) IsYANGGoStruct() {}", "title": "" }, { "docid": "6505990e3078fb7b2c0ecce84af4f055", "score": "0.7391058", "text": "func (*NetworkInstance_Protocol_Bgp_Global_Confederation) IsYANGGoStruct() {}", "title": "" }, { "docid": "6505990e3078fb7b2c0ecce84af4f055", "score": "0.7391058", "text": "func (*NetworkInstance_Protocol_Bgp_Global_Confederation) IsYANGGoStruct() {}", "title": "" }, { "docid": "af280c2451c611282a56971250e1b82f", "score": "0.73447853", "text": "func (*Mpls_SignalingProtocols_RsvpTe_Global_Hellos) IsYANGGoStruct() {}", "title": "" }, { "docid": "af280c2451c611282a56971250e1b82f", "score": "0.73447853", "text": "func (*Mpls_SignalingProtocols_RsvpTe_Global_Hellos) IsYANGGoStruct() {}", "title": "" }, { "docid": "9aeb4aa14e085e90007c3121768aa076", "score": "0.73416984", "text": "func (*NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Global_Hellos) IsYANGGoStruct() {}", "title": "" }, { "docid": "9aeb4aa14e085e90007c3121768aa076", "score": "0.73411846", "text": "func (*NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Global_Hellos) IsYANGGoStruct() {}", "title": "" }, { "docid": "3e9032eec55ad4a2eba1b542a7fb4065", "score": "0.7340435", "text": "func (*NetworkInstance_Protocol_Ospfv2_Area_Lsdb_LsaType_Lsa_OpaqueLsa_TrafficEngineering_Tlv_NodeAttribute_SubTlv) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "3e9032eec55ad4a2eba1b542a7fb4065", "score": "0.7339764", "text": "func (*NetworkInstance_Protocol_Ospfv2_Area_Lsdb_LsaType_Lsa_OpaqueLsa_TrafficEngineering_Tlv_NodeAttribute_SubTlv) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "aa7c2186474c05965167f52ac95faadc", "score": "0.7330422", "text": "func (*NetworkInstance_Mpls_Global_Interface_InterfaceRef) IsYANGGoStruct() {}", "title": "" }, { "docid": "aa7c2186474c05965167f52ac95faadc", "score": "0.7330422", "text": "func (*NetworkInstance_Mpls_Global_Interface_InterfaceRef) IsYANGGoStruct() {}", "title": "" }, { "docid": "b7dd939ef2056e53a2e3c7371c3a3aaa", "score": "0.7317959", "text": "func (*Bgp_Global_Confederation) IsYANGGoStruct() {}", "title": "" }, { "docid": "b7dd939ef2056e53a2e3c7371c3a3aaa", "score": "0.7315604", "text": "func (*Bgp_Global_Confederation) IsYANGGoStruct() {}", "title": "" }, { "docid": "0979f26d2b300ae821f2ab1ac0629861", "score": "0.7303675", "text": "func (*NetworkInstance_Protocol_Isis_Global_Af_MultiTopology) IsYANGGoStruct() {}", "title": "" }, { "docid": "0979f26d2b300ae821f2ab1ac0629861", "score": "0.73017955", "text": "func (*NetworkInstance_Protocol_Isis_Global_Af_MultiTopology) IsYANGGoStruct() {}", "title": "" }, { "docid": "64e59115880ed602bae4e5aa379f0a15", "score": "0.7285756", "text": "func (*NetworkInstance_Mpls_TeGlobalAttributes_Srlg_MembersList) IsYANGGoStruct() {}", "title": "" }, { "docid": "64e59115880ed602bae4e5aa379f0a15", "score": "0.7285756", "text": "func (*NetworkInstance_Mpls_TeGlobalAttributes_Srlg_MembersList) IsYANGGoStruct() {}", "title": "" }, { "docid": "a06c38398c282681d475f9584386158a", "score": "0.7244896", "text": "func (*Mpls_TeGlobalAttributes_Srlg_MembersList) IsYANGGoStruct() {}", "title": "" }, { "docid": "a06c38398c282681d475f9584386158a", "score": "0.7244896", "text": "func (*Mpls_TeGlobalAttributes_Srlg_MembersList) IsYANGGoStruct() {}", "title": "" }, { "docid": "e60aa2a45e343a02646c30c9f3592448", "score": "0.7218634", "text": "func (*NetworkInstance_Protocol_Isis_Global_LspBit) IsYANGGoStruct() {}", "title": "" }, { "docid": "e60aa2a45e343a02646c30c9f3592448", "score": "0.721699", "text": "func (*NetworkInstance_Protocol_Isis_Global_LspBit) IsYANGGoStruct() {}", "title": "" }, { "docid": "38eb667efab37d30a2cec495f99ce46c", "score": "0.7206121", "text": "func (*Bgp) IsYANGGoStruct() {}", "title": "" }, { "docid": "38eb667efab37d30a2cec495f99ce46c", "score": "0.7206121", "text": "func (*Bgp) IsYANGGoStruct() {}", "title": "" }, { "docid": "d7e3c169e3e470f3fb2a264bf7749cef", "score": "0.72005916", "text": "func (*NetworkInstance_Mpls) IsYANGGoStruct() {}", "title": "" }, { "docid": "d7e3c169e3e470f3fb2a264bf7749cef", "score": "0.72005916", "text": "func (*NetworkInstance_Mpls) IsYANGGoStruct() {}", "title": "" }, { "docid": "3fa233268aa5d09299d89a67e50d24f6", "score": "0.7200169", "text": "func (*NetworkInstance_Protocol_Ospfv2_Area_Lsdb_LsaType_Lsa_OpaqueLsa_TrafficEngineering_Tlv_NodeAttribute) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "3fa233268aa5d09299d89a67e50d24f6", "score": "0.7198204", "text": "func (*NetworkInstance_Protocol_Ospfv2_Area_Lsdb_LsaType_Lsa_OpaqueLsa_TrafficEngineering_Tlv_NodeAttribute) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "e2b617153fa5f333914122bb620abe79", "score": "0.7197512", "text": "func (*NetworkInstance_Protocol_Isis_Global_Mpls_IgpLdpSync) IsYANGGoStruct() {}", "title": "" }, { "docid": "e2b617153fa5f333914122bb620abe79", "score": "0.71970916", "text": "func (*NetworkInstance_Protocol_Isis_Global_Mpls_IgpLdpSync) IsYANGGoStruct() {}", "title": "" }, { "docid": "70a1c661d8a6f7129b9a4b0fb47f9ab2", "score": "0.718947", "text": "func (*OpenconfigSystem_System_Memory_Config) IsYANGGoStruct() {}", "title": "" }, { "docid": "d014854e1a4e208bfe67ebb4aae1012e", "score": "0.7158934", "text": "func (*NetworkInstance_Protocol_Bgp_Global_AfiSafi) IsYANGGoStruct() {}", "title": "" }, { "docid": "1c254f510e8090ead9da4656e0118966", "score": "0.71562934", "text": "func (*NetworkInstance_Mpls_Global_ReservedLabelBlock) IsYANGGoStruct() {}", "title": "" }, { "docid": "1c254f510e8090ead9da4656e0118966", "score": "0.71562934", "text": "func (*NetworkInstance_Mpls_Global_ReservedLabelBlock) IsYANGGoStruct() {}", "title": "" }, { "docid": "d014854e1a4e208bfe67ebb4aae1012e", "score": "0.7156071", "text": "func (*NetworkInstance_Protocol_Bgp_Global_AfiSafi) IsYANGGoStruct() {}", "title": "" }, { "docid": "b9bcec4f513927459192c323d4b27681", "score": "0.71308833", "text": "func (*NetworkInstance_Mpls_Interface) IsYANGGoStruct() {}", "title": "" }, { "docid": "b9bcec4f513927459192c323d4b27681", "score": "0.71308833", "text": "func (*NetworkInstance_Mpls_Interface) IsYANGGoStruct() {}", "title": "" }, { "docid": "ea784761806c7ff77fb8fdfa547ebeaa", "score": "0.7127428", "text": "func (*Bgp_PeerGroup_EbgpMultihop) IsYANGGoStruct() {}", "title": "" }, { "docid": "ea784761806c7ff77fb8fdfa547ebeaa", "score": "0.7125695", "text": "func (*Bgp_PeerGroup_EbgpMultihop) IsYANGGoStruct() {}", "title": "" }, { "docid": "37258eca0a5b02a8b13b909f775b8a4c", "score": "0.7119891", "text": "func (*NetworkInstance_Protocol_Bgp) IsYANGGoStruct() {}", "title": "" }, { "docid": "37258eca0a5b02a8b13b909f775b8a4c", "score": "0.71185863", "text": "func (*NetworkInstance_Protocol_Bgp) IsYANGGoStruct() {}", "title": "" }, { "docid": "272112fc8bd0faa018093bae8b806ada", "score": "0.71180624", "text": "func (*Bgp_Neighbor_EbgpMultihop) IsYANGGoStruct() {}", "title": "" }, { "docid": "272112fc8bd0faa018093bae8b806ada", "score": "0.71162194", "text": "func (*Bgp_Neighbor_EbgpMultihop) IsYANGGoStruct() {}", "title": "" }, { "docid": "560990e87361b5a0ddda2d6562dc07a9", "score": "0.7089403", "text": "func (*OpenconfigSystem_System_Aaa_ServerGroups_ServerGroup_Config) IsYANGGoStruct() {}", "title": "" }, { "docid": "0a7bef110047e998e181a58293d0fa62", "score": "0.7071117", "text": "func (*OpenconfigSystem_System_Memory_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "c56494f427469bd35d5e79dff7079a2a", "score": "0.7061244", "text": "func (*Bgp_Global_AfiSafi) IsYANGGoStruct() {}", "title": "" }, { "docid": "c56494f427469bd35d5e79dff7079a2a", "score": "0.7061244", "text": "func (*Bgp_Global_AfiSafi) IsYANGGoStruct() {}", "title": "" }, { "docid": "554868141d63f57e2cc0e682329bb9a6", "score": "0.70546556", "text": "func (*Bgp_Global_AfiSafi_L2VpnEvpn) IsYANGGoStruct() {}", "title": "" }, { "docid": "554868141d63f57e2cc0e682329bb9a6", "score": "0.70541304", "text": "func (*Bgp_Global_AfiSafi_L2VpnEvpn) IsYANGGoStruct() {}", "title": "" }, { "docid": "00e0f807971749b36d8e781fee19457a", "score": "0.7051537", "text": "func (*OpenconfigSystem_System_Ntp_Config) IsYANGGoStruct() {}", "title": "" }, { "docid": "71f33bd6f5a743c236d5b0c4ea41009f", "score": "0.70513797", "text": "func (*OpenconfigSystem_System_Openflow_Agent_Config) IsYANGGoStruct() {}", "title": "" }, { "docid": "e3aaf9e8f45444949743cc34d558d6e2", "score": "0.70427525", "text": "func (*NetworkInstance_Protocol_Ospfv2_Area_Lsdb_LsaType_Lsa_OpaqueLsa_TrafficEngineering_Tlv_Link_SubTlv_AdminGroup) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "e3aaf9e8f45444949743cc34d558d6e2", "score": "0.70427233", "text": "func (*NetworkInstance_Protocol_Ospfv2_Area_Lsdb_LsaType_Lsa_OpaqueLsa_TrafficEngineering_Tlv_Link_SubTlv_AdminGroup) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "ba82f04681847ffb89fbf201af1d5672", "score": "0.7042598", "text": "func (*NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Global_SoftPreemption) IsYANGGoStruct() {}", "title": "" }, { "docid": "ba82f04681847ffb89fbf201af1d5672", "score": "0.7042598", "text": "func (*NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Global_SoftPreemption) IsYANGGoStruct() {}", "title": "" }, { "docid": "d5158284c1bc6061e0c1c3c64268acc6", "score": "0.7040613", "text": "func (*Lldp_Interface_Neighbor_Tlv) IsYANGGoStruct() {}", "title": "" } ]
84db8269e04db9e8339fbb8cfc352371
EnvGoPath returns a proper gopath, if we are inside a gb style 'src/' workspace this gopath is set to the parent of the src dir. If not the enviorment gopath will be used. If neither a log message will be printed on the program will exit.
[ { "docid": "f4c7c9bcbe6cec36fc1097039f0ba335", "score": "0.79951555", "text": "func EnvGoPath() (string, error) {\n\tgopath := os.Getenv(\"GOPATH\")\n\twd, err := os.Getwd()\n\tif gopath != \"\" && err != nil {\n\t\treturn gopath, nil\n\t}\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"no gopath set and error getting current working directory %s\", err.Error())\n\t}\n\troot := ProjectRoot(wd)\n\tif root != \"\" {\n\t\treturn root, nil\n\t}\n\tif gopath != \"\" {\n\t\treturn gopath, nil\n\t}\n\n\treturn \"\", fmt.Errorf(\"no gopath set and working directory %s is not inside a 'src/' directory\", wd)\n}", "title": "" } ]
[ { "docid": "433c5403ca2a30282877425dea97fde6", "score": "0.69875675", "text": "func GoPath() string {\n\t/*\n\t * We will try to get the gopath from the environment variable\n\t * If not available we will get it from the default go path\n\t */\n\tp := os.Getenv(\"GOPATH\")\n\tif len(p) == 0 {\n\t\tp = build.Default.GOPATH\n\t}\n\treturn p + Separator + \"src\" + Separator\n}", "title": "" }, { "docid": "1097bb8636f8b8c58162fd25d38282b1", "score": "0.64543927", "text": "func Gopath() string {\n\tif r := os.Getenv(\"GOPATH\"); r != \"\" {\n\t\treturn r\n\t}\n\n\t// go1.8: https://github.com/golang/go/blob/74628a8b9f102bddd5078ee426efe0fd57033115/doc/code.html#L122\n\tswitch runtime.GOOS {\n\tcase \"plan9\":\n\t\treturn os.Getenv(\"home\")\n\tcase \"windows\":\n\t\treturn filepath.Join(os.Getenv(\"USERPROFILE\"), \"go\")\n\tdefault:\n\t\treturn filepath.Join(os.Getenv(\"HOME\"), \"go\")\n\t}\n}", "title": "" }, { "docid": "5f010399bb4530d227aed862bba23d54", "score": "0.6421969", "text": "func GoPath() string {\n\tgopath := os.Getenv(\"GOPATH\")\n\tif gopath == \"\" {\n\t\tgopath = build.Default.GOPATH\n\t}\n\treturn gopath\n}", "title": "" }, { "docid": "4858577edd15e4dd985331aa099e8474", "score": "0.63043946", "text": "func GetGoPath() string {\n\tgopath := os.Getenv(\"GOPATH\")\n\tif gopath == \"\" {\n\t\tgopath = build.Default.GOPATH\n\t}\n\treturn gopath\n}", "title": "" }, { "docid": "0bd99fbe698a48ac1f0a508756e1f60e", "score": "0.6293044", "text": "func InGoPath(path string) string {\n\tdata, err := exec.Command(\"go\", \"env\", \"GOPATH\").Output()\n\tgp := \"\"\n\tif err == nil {\n\t\tgp = filepath.Clean(strings.TrimSpace(string(data)))\n\t}\n\treturn filepath.Join(gp, path)\n}", "title": "" }, { "docid": "d4527475ab5fcdebd390098d19526129", "score": "0.62909156", "text": "func (w *Workspace) EnvGOPATH() string {\n\treturn WS_ENV + \"=\" + w.GenerateGOPATH()\n}", "title": "" }, { "docid": "fb1abdb81624735182bd6a34e560ac59", "score": "0.62446976", "text": "func goPath() string {\n\tgpDefault := build.Default.GOPATH\n\tgps := filepath.SplitList(gpDefault)\n\n\treturn gps[0]\n}", "title": "" }, { "docid": "fb1abdb81624735182bd6a34e560ac59", "score": "0.62446976", "text": "func goPath() string {\n\tgpDefault := build.Default.GOPATH\n\tgps := filepath.SplitList(gpDefault)\n\n\treturn gps[0]\n}", "title": "" }, { "docid": "4ef4d91f0dd6d54d74d0274c576088d6", "score": "0.6208677", "text": "func repoPath() string {\n\t// We only care about GOPATH constraint checks if we are a Go operator\n\twd := cmdutil.MustGetwd()\n\tif operatorType == cmdutil.OperatorTypeGo {\n\t\tgp := os.Getenv(gopath)\n\t\tif len(gp) == 0 {\n\t\t\tlog.Fatal(\"$GOPATH env not set\")\n\t\t}\n\t\t// check if this project's repository path is rooted under $GOPATH\n\t\tif !strings.HasPrefix(wd, gp) {\n\t\t\tlog.Fatalf(\"project's repository path (%v) is not rooted under GOPATH (%v)\", wd, gp)\n\t\t}\n\t\t// compute the repo path by stripping \"$GOPATH/src/\" from the path of the current directory.\n\t\trp := filepath.Join(string(wd[len(filepath.Join(gp, src)):]), projectName)\n\t\t// strip any \"/\" prefix from the repo path.\n\t\treturn strings.TrimPrefix(rp, string(filepath.Separator))\n\t}\n\treturn wd\n}", "title": "" }, { "docid": "ae6ad6538f5c6c78261564337cb57850", "score": "0.6078559", "text": "func GetGOPath() string {\n\tgopath := os.Getenv(\"GOPATH\")\n\n\tif gopath == \"\" {\n\t\treturn build.Default.GOPATH\n\t}\n\n\treturn gopath\n}", "title": "" }, { "docid": "79819b662a22e37d0c5ea5967d24f4aa", "score": "0.60736537", "text": "func GoPath() string {\n\treturn goPath\n}", "title": "" }, { "docid": "ced79ce1119607765ac0bb84601fb846", "score": "0.6037595", "text": "func getPkgPathPrefixGoPath(cwd string) string {\n\tgopaths := strings.Split(build.Default.GOPATH, string(filepath.ListSeparator))\n\tfor _, gopath := range gopaths {\n\t\tgosrcpath := gopath + \"/src/\"\n\t\tif strings.HasPrefix(cwd, gosrcpath) {\n\t\t\treturn strings.TrimPrefix(cwd, gosrcpath)\n\t\t}\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "26fd53716d7f52e4f5c592571cb4135f", "score": "0.59622395", "text": "func (p *Paths) GopathSet() {\n\tos.Setenv(GOPATH, p.CombinedPath)\n}", "title": "" }, { "docid": "2ee89ea289ae5b9ff2ecb5dd4ab24a25", "score": "0.59414816", "text": "func ImportPath() (string, error) {\n\t_, file, _, ok := runtime.Caller(1)\n\tif !ok {\n\t\treturn \"\", fmt.Errorf(\"runtime.Caller failed\")\n\t}\n\n\tgopath := Gopath()\n\tfor _, v := range filepath.SplitList(gopath) {\n\t\tgp := filepath.Join(v, \"src\")\n\t\tpath, err := filepath.Rel(gp, file)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\n\t\treturn filepath.Dir(path), nil\n\t}\n\n\treturn \"\", fmt.Errorf(\"cannot determine import path using GOPATH=%s\", gopath)\n}", "title": "" }, { "docid": "3bbaf99cd9696d7b178e42315fb7dddb", "score": "0.5879449", "text": "func GetGoPath() (string, error) {\n\tif os.Getenv(\"GOPATH\") == \"\" {\n\t\treturn \"\", errors.New(\"$GOPATH not set\")\n\t}\n\treturn os.Getenv(\"GOPATH\"), nil\n}", "title": "" }, { "docid": "a30b6ed1463bfb0e74e600513d69e286", "score": "0.5809758", "text": "func GOPATH() string {\n\tgopath := os.Getenv(\"GOPATH\")\n\tif gopath == \"\" {\n\t\tgopath = defaultGOPATH()\n\t}\n\treturn gopath\n}", "title": "" }, { "docid": "ff7445d0e68857914cfdfee30133eb0f", "score": "0.5770878", "text": "func importPathFromPath(src string) string {\n\tfor _, path := range filepath.SplitList(build.Default.GOPATH) {\n\t\tpath = filepath.Join(path, \"src\")\n\t\tif strings.HasPrefix(src, path) {\n\t\t\treturn filepath.ToSlash(src[len(path)+1:])\n\t\t}\n\t}\n\tgoroot := filepath.Join(build.Default.GOROOT, \"src\", \"pkg\")\n\tif strings.HasPrefix(src, goroot) {\n\t\tpeony.WARN.Println(\"Source should in GOPATH, but found it in GOROOT\")\n\t\treturn filepath.ToSlash(src[len(goroot)+1:])\n\t}\n\tpeony.ERROR.Println(\"Unexpected! Code path is not in GOPATH:\", src)\n\treturn \"\"\n}", "title": "" }, { "docid": "1853541605380e964fcf6cf51ffdf43c", "score": "0.5705287", "text": "func GGPExecutablePath() (file.Path, error) {\n\tif !GGP.IsEmpty() {\n\t\treturn GGP, nil\n\t}\n\tggpExe := \"ggp\"\n\tsearch := []string{ggpExe}\n\n\tif ggpSDKPath := os.Getenv(\"GGP_SDK_PATH\"); ggpSDKPath != \"\" {\n\t\tsearch = append(search,\n\t\t\tfilepath.Join(ggpSDKPath, \"dev\", \"bin\", ggpExe))\n\t}\n\tfor _, path := range search {\n\t\tif p, err := file.FindExecutable(path); err == nil {\n\t\t\tGGP = p\n\t\t\treturn GGP, nil\n\t\t}\n\t}\n\n\treturn file.Path{}, fmt.Errorf(\n\t\t\"ggp could not be found from GGP_SDK_PATH or PATH\\n\"+\n\t\t\t\"GGP_SDK_PATH: %v\\n\"+\n\t\t\t\"PATH: %v\\n\"+\n\t\t\t\"search: %v\",\n\t\tos.Getenv(\"GGP_SDK_PATH\"), os.Getenv(\"PATH\"), search)\n}", "title": "" }, { "docid": "c885c717fbfaa3e4d6e5d65cfd1da2bd", "score": "0.56834185", "text": "func (p *Paths) GopathRestore() {\n\tos.Setenv(GOPATH, p.Gopath)\n}", "title": "" }, { "docid": "da76668ce91761f1f8f5463af7ca5b13", "score": "0.55684996", "text": "func (d Dependency) Gopath() string {\n\treturn filepath.Join(spool, \"rev\", d.Rev[:2], d.Rev[2:])\n}", "title": "" }, { "docid": "d67a1ab0df5419a33846785f5bd83a70", "score": "0.554622", "text": "func is_inside_gopath(p string) (string, error) {\n\t// i am butchering the difference between filepath and path.\n\t// i don't really care, right now.\n\n\tabs, err := filepath.Abs(p)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"cannot make path absolute: %v\", err)\n\t}\n\tabs = path.Clean(abs)\n\n\tfor _, gopath := range filepath.SplitList(os.Getenv(\"GOPATH\")) {\n\t\tgopath, err := filepath.Abs(gopath)\n\t\tif err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"cannot make path absolute: %v\", err)\n\t\t}\n\t\tgopath = path.Clean(gopath)\n\t\tsrc := path.Join(gopath, \"src\") + \"/\"\n\n\t\tif strings.HasPrefix(abs, src) {\n\t\t\trest := abs[len(src):]\n\t\t\treturn rest, nil\n\t\t}\n\t}\n\treturn \"\", nil\n}", "title": "" }, { "docid": "178d591f0efc4d071df323cb21f5ab5a", "score": "0.5522635", "text": "func pathEnv(goos string, env, path []string, workDir string) (kv string, ok bool) {\n\tpathVar := \"PATH\"\n\tif goos == \"plan9\" {\n\t\tpathVar = \"path\"\n\t}\n\n\torig := envutil.Get(goos, env, pathVar)\n\tr := strings.NewReplacer(\n\t\t\"$PATH\", orig,\n\t\t\"$WORKDIR\", workDir,\n\t\t\"$EMPTY\", \"\",\n\t)\n\n\t// Apply substitutions to a copy of the path argument.\n\tsubst := make([]string, 0, len(path))\n\tfor _, elem := range path {\n\t\tif s := r.Replace(elem); s != \"\" {\n\t\t\tsubst = append(subst, s)\n\t\t}\n\t}\n\tkv = pathVar + \"=\" + strings.Join(subst, pathListSeparator(goos))\n\tv := kv[len(pathVar)+1:]\n\treturn kv, v != orig\n}", "title": "" }, { "docid": "1380978314f61e5959c8023762f6e467", "score": "0.5473376", "text": "func PrependGoPath(path string) string {\n\tgopath := os.Getenv(\"GOPATH\")\n\tif gopath == \"\" {\n\t\tgopath = build.Default.GOPATH\n\t}\n\n\treturn path + string(os.PathListSeparator) + gopath\n}", "title": "" }, { "docid": "1380978314f61e5959c8023762f6e467", "score": "0.5473376", "text": "func PrependGoPath(path string) string {\n\tgopath := os.Getenv(\"GOPATH\")\n\tif gopath == \"\" {\n\t\tgopath = build.Default.GOPATH\n\t}\n\n\treturn path + string(os.PathListSeparator) + gopath\n}", "title": "" }, { "docid": "8be1fe396567e0c47a49cad45026d16b", "score": "0.5471239", "text": "func (hc *HipChat) GOPATH() string {\n\treturn hc.gopath\n}", "title": "" }, { "docid": "c2f0b811f74729a2956c38fd58853d3f", "score": "0.54613525", "text": "func GetPath() string {\n\tif configPathFromEnv, ok := os.LookupEnv(EnvVarName); ok && configPathFromEnv != \"\" {\n\t\treturn configPathFromEnv\n\t}\n\treturn DefaultPath\n}", "title": "" }, { "docid": "1e6acf73a82a046b390c3eecc6e51422", "score": "0.545954", "text": "func (w *Workspace) EnvGOBIN() string {\n\treturn PKG_ENV + \"=\" + w.GenerateGOBIN()\n}", "title": "" }, { "docid": "d332c79f7a013e0c5cdeb798d7d51553", "score": "0.5454214", "text": "func getRepoPath(basePath string) string {\n\t// Get the file path of this source file, regardless of the working directory\n\tif basePath == \"\" {\n\t\t_, filename, _, ok := runtime.Caller(0)\n\t\tif !ok {\n\t\t\tpanic(\"couldn't find file path of the test file\")\n\t\t}\n\t\treturn filepath.Join(filename, \"..\", \"..\", \"feature_repo\")\n\t} else {\n\t\treturn filepath.Join(basePath, \"feature_repo\")\n\t}\n}", "title": "" }, { "docid": "cff012db3929a60209e7d0201ceff5c1", "score": "0.5447188", "text": "func GetThisGoSourceDir() string {\n\t_, file, _, _ := runtime.Caller(1)\n\tdir, _ := filepath.Split(file)\n\treturn dir\n}", "title": "" }, { "docid": "791bbad18e782591927615cb66d0e1e1", "score": "0.5375271", "text": "func BasePath() string {\n\t//_, b, _, ok := runtime.Caller(0)\n\t//if !ok {\n\t//\tlog.Panic(\"Caller error\")\n\t//}\n\t//env := filepath.Dir(b)\n\t//pkg := filepath.Dir(env)\n\t//app := filepath.Dir(pkg)\n\t//return app\n\n\treturn \"/go/src/book\"\n}", "title": "" }, { "docid": "d1f8347d50ed1576515f57777d8ae1fd", "score": "0.53300834", "text": "func addToGoPath(appDirName string) {\n\tgopath := os.Getenv(\"GOPATH\")\n\tLog.Debugln(\"Current GoPath is \", gopath)\n\tnewGoPath := gopath + \":\" + appDirName\n\tos.Setenv(\"GOPATH\", newGoPath)\n\tLog.Debugln(\"After making changes current GOPATH is \", os.Getenv(\"GOPATH\"))\n}", "title": "" }, { "docid": "80cd8e63cfe0eb46fd90cd8c0d4a2eee", "score": "0.53192306", "text": "func setGoEnv() error {\n\tnewGoBin := filepath.Join(toolDirPath, \"bin\")\n\tif err := os.Setenv(\"GOBIN\", newGoBin); err != nil {\n\t\treturn err\n\t}\n\n\tprevGoPath := os.Getenv(\"GOPATH\")\n\tif prevGoPath == \"\" {\n\t\tprevGoPath = filepath.Join(os.Getenv(\"HOME\"), \"go\")\n\t}\n\tnewGoPath := prevGoPath + string(os.PathListSeparator) + toolDirPath\n\treturn os.Setenv(\"GOPATH\", newGoPath)\n}", "title": "" }, { "docid": "792c9494495b7e6c85a7ef0bca7c03eb", "score": "0.53182584", "text": "func GetPCurrentPath() string {\n\tdir, err := filepath.Abs(filepath.Dir(os.Args[0]))\n\tCheck(err)\n\treturn dir\n}", "title": "" }, { "docid": "ea32cc28ea0227537faeed1322cc7520", "score": "0.5310027", "text": "func init() {\n\tEnvMode = String(constant.EnvMode, constant.DevMode)\n\n\tdefaultBasePath := stringutil.Concat(os.Getenv(\"GOPATH\"), \"/src/\", constant.DefaultProjectPath)\n\tBasePath = String(constant.EnvBasePath, defaultBasePath)\n}", "title": "" }, { "docid": "bcd95e0ca41fd21e5432db12e3e0b53c", "score": "0.5297597", "text": "func AppPath() string {\n\tif baseDir != nil {\n\t\treturn *baseDir\n\t}\n\t_, b, _, ok := runtime.Caller(0)\n\tif !ok {\n\t\tlog.Panic(\"Caller error\")\n\t}\n\n\tenv := filepath.Dir(b)\n\tpkg := filepath.Dir(env)\n\tapp := filepath.Dir(pkg)\n\tbaseDir = &app\n\treturn *baseDir\n}", "title": "" }, { "docid": "fe59e070cbbe495cac5010ebf550324d", "score": "0.5281679", "text": "func GetProjectPath() string {\n\twd, _ := os.Getwd()\n\treturn wd\n}", "title": "" }, { "docid": "2405a679ff34e20aa3956311d53a1e91", "score": "0.5270598", "text": "func GetProjectPath(project string) (string, error) {\n\tpath, e := GetGoPath()\n\tif e != nil {\n\t\treturn \"\", e\n\t}\n\treturn path + \"/src/\" + project, nil\n}", "title": "" }, { "docid": "d3c975c9233f1a7c7931ca738f45bea1", "score": "0.52482384", "text": "func extractGopath(abs string) ([2]string, error) {\n\t// Normalize the input path.\n\tabs = filepath.ToSlash(abs)\n\n\t// Check every $GOPATH whether any of them is a parent directory\n\t// of the input absolute path.\n\tfor i := 0; i < len(gopaths); i++ {\n\t\t// Prepare a \"$GOPATH/src\".\n\t\tsrcDir := path.Join(gopaths[i], \"src\")\n\n\t\t// Check whether the source dir is the root\n\t\t// of the specified absolute path.\n\t\tif parent(srcDir, abs) {\n\t\t\treturn [2]string{srcDir, abs[len(srcDir):]}, nil\n\t\t}\n\t}\n\n\t// If no import path returned so far, requested path is not\n\t// inside \"$GOPATH/src\".\n\treturn [2]string{}, fmt.Errorf(`path \"%s\" is not inside of any of %v`, abs, gopaths)\n}", "title": "" }, { "docid": "08930facdd21151262b7f7c401af13a2", "score": "0.5240967", "text": "func guessgoroot() {\n\tconfig.Goroot = os.Getenv(\"GOROOT\")\n\tif config.Goroot != \"\" {\n\t\tlog.Printf(\"Using %v as GOROOT from environment variable\", config.Goroot)\n\t\tconfig.Gosrcroot = filepath.Dir(config.Goroot)\n\t\treturn\n\t}\n\tlog.Print(\"Goroot is not set, trying to find a go binary\")\n\tp := os.Getenv(\"PATH\")\n\tpaths := strings.Split(p, \":\")\n\tfor _, v := range paths {\n\t\tg := filepath.Join(v, \"go\")\n\t\tif _, err := os.Stat(g); err == nil {\n\t\t\tconfig.Goroot = filepath.Dir(filepath.Dir(v))\n\t\t\tconfig.Gosrcroot = filepath.Dir(config.Goroot)\n\t\t\tlog.Printf(\"Guessing that goroot is %v\", config.Goroot)\n\t\t\treturn\n\t\t}\n\t}\n\tlog.Printf(\"GOROOT is not set and can't find a go binary in %v\", p)\n\tconfig.Fail = true\n}", "title": "" }, { "docid": "e4a668b9e0539ed69b536157f9997755", "score": "0.52037394", "text": "func GetRelativeProjPath(pathComponents ...string) string {\n\tpath, err := os.Executable()\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn filepath.Join(append(\n\t\t[]string{path}, pathComponents...,\n\t)...)\n}", "title": "" }, { "docid": "414ab43427cb89c22f35569f3d2fc639", "score": "0.51990217", "text": "func (w *Workspace) GenerateGOPATH() string {\n\treturn concatPath(w.GoPath, w.Root)\n}", "title": "" }, { "docid": "1818339a42cba2a2a51145bd7a455022", "score": "0.51978093", "text": "func RclgoRepoRootPath() string {\n\t_, file, _, ok := runtime.Caller(0)\n\tif !ok {\n\t\tpanic(\"could not determine rclgo repo root path\")\n\t}\n\treturn filepath.Join(file, \"../../..\")\n}", "title": "" }, { "docid": "49a0c8af6c3cd8786f29df30d8811871", "score": "0.5106615", "text": "func getPathInBuildDir(elems ...string) string {\n\treturn filepath.Join(append([]string{getBuildDir()}, elems...)...)\n}", "title": "" }, { "docid": "b0ba1febdcb10e49a1e5f0e7985002d0", "score": "0.50957197", "text": "func (env *Env) Path() (string, error) {\n\tvar cpath *C.char\n\tret := C.mdb_env_get_path(env._env, &cpath)\n\tif ret != success {\n\t\treturn \"\", operrno(\"mdb_env_get_path\", ret)\n\t}\n\tif cpath == nil {\n\t\treturn \"\", errNotOpen\n\t}\n\treturn C.GoString(cpath), nil\n}", "title": "" }, { "docid": "f0cd0574018b65937671b430788066c1", "score": "0.5074104", "text": "func getProjectRootPath() string {\n\t// Get full path of current file from runtime.\n\t_, b, _, ok := runtime.Caller(0)\n\tif !ok {\n\t\tlog.Fatalln(\"unable to retrieve root path of server\")\n\t}\n\n\t// Traverse two parent directories up. Note that this is sensitive to the level of nesting\n\t// of this file within the project structure.\n\treturn filepath.Join(filepath.Dir(b), \"../../\")\n}", "title": "" }, { "docid": "4bc51564e40f5097e627b4127381a2a3", "score": "0.5073949", "text": "func xdgDir(envV, suffix string) (dir string) {\n xdg := os.Getenv(envV)\n if xdg == \"\" {\n dir = path.Join(os.Getenv(\"HOME\"), suffix)\n } else {\n dir = xdg\n }\n return\n}", "title": "" }, { "docid": "2d578c9c1274327e69ac0b43872e5f3a", "score": "0.50675416", "text": "func SrcDir(dir string) (absDir string, err error) {\n\tfor _, srcDir := range build.Default.SrcDirs() {\n\t\tabsDir = filepath.Join(srcDir, dir)\n\t\tfinfo, err := os.Stat(absDir)\n\t\tif err == nil && finfo.IsDir() {\n\t\t\treturn absDir, nil\n\t\t}\n\t}\n\treturn \"\", fmt.Errorf(\"unable to locate directory (%q) in GOPATH/src/ (%q) or GOROOT/src/pkg/ (%q)\", dir, os.Getenv(\"GOPATH\"), os.Getenv(\"GOROOT\"))\n}", "title": "" }, { "docid": "6da93ed95cc4896e394c985b4b840584", "score": "0.50666386", "text": "func GetPath() string {\n\tprefix := os.Getenv(\"HLPATH\")\n\n\tif prefix == \"\" {\n\t\tprefix = filepath.Join(os.Getenv(\"HOME\"), \".hl\")\n\t}\n\n\treturn prefix\n}", "title": "" }, { "docid": "e31aa443496883dcebab5bfbff5c5e14", "score": "0.50626147", "text": "func getGOPATHs() []string {\n\tvar out []string\n\tif gp := os.Getenv(\"GOPATH\"); gp != \"\" {\n\t\tfor _, v := range filepath.SplitList(gp) {\n\t\t\t// Disallow non-absolute paths?\n\t\t\tif v != \"\" {\n\t\t\t\tv = strings.Replace(v, \"\\\\\", \"/\", -1)\n\t\t\t\t// Trim trailing \"/\".\n\t\t\t\tif l := len(v); v[l-1] == '/' {\n\t\t\t\t\tv = v[:l-1]\n\t\t\t\t}\n\t\t\t\tout = append(out, v)\n\t\t\t}\n\t\t}\n\t}\n\tif len(out) == 0 {\n\t\thomeDir := \"\"\n\t\tu, err := user.Current()\n\t\tif err != nil {\n\t\t\thomeDir = os.Getenv(\"HOME\")\n\t\t\tif homeDir == \"\" {\n\t\t\t\tpanic(fmt.Sprintf(\"Could not get current user or $HOME: %s\\n\", err.Error()))\n\t\t\t}\n\t\t} else {\n\t\t\thomeDir = u.HomeDir\n\t\t}\n\t\tout = []string{strings.Replace(homeDir+\"/go\", \"\\\\\", \"/\", -1)}\n\t}\n\treturn out\n}", "title": "" }, { "docid": "daca06181b8ff2f8751592d0a0c26a62", "score": "0.5050553", "text": "func (c *Context) CachedDotEnvPath() string {\n\treturn path.Join(c.cacheDirPath(), \".env\")\n}", "title": "" }, { "docid": "c4dfcba6769e16f5a7f880b634e212c5", "score": "0.5045067", "text": "func getPathInSourceDir(elems ...string) string {\n\treturn filepath.Join(append([]string{getSourceDir()}, elems...)...)\n}", "title": "" }, { "docid": "0d6debc288990f8fcdca3af0b2adb9b8", "score": "0.50382656", "text": "func WithEnv(ctx context.Context, workdir string) context.Context {\n\tgoPath := filepath.Join(workdir, \"gopath\")\n\tgoRoot := filepath.Join(workdir, \"go\", \"go\")\n\tgoBin := filepath.Join(goRoot, \"bin\")\n\n\tPATH := strings.Join([]string{\n\t\tgoBin,\n\t\tfilepath.Join(goPath, \"bin\"),\n\t\tfilepath.Join(workdir, \"gcloud_linux\", \"bin\"),\n\t\tfilepath.Join(workdir, \"protoc\", \"bin\"),\n\t\tfilepath.Join(workdir, \"node\", \"node\", \"bin\"),\n\t\ttd.PATH_PLACEHOLDER,\n\t}, string(os.PathListSeparator))\n\treturn td.WithEnv(ctx, []string{\n\t\tfmt.Sprintf(\"GOCACHE=%s\", filepath.Join(dirs.Cache(workdir), \"go_cache\")),\n\t\t\"GOFLAGS=-mod=readonly\", // Prohibit builds from modifying go.mod.\n\t\tfmt.Sprintf(\"GOROOT=%s\", goRoot),\n\t\tfmt.Sprintf(\"GOPATH=%s\", goPath),\n\t\tfmt.Sprintf(\"PATH=%s\", PATH),\n\t})\n}", "title": "" }, { "docid": "8edc0ab283d44b79ee3f884b955f09d9", "score": "0.50169957", "text": "func (c *Config) GetBuildPath(p ...string) string {\n\tpaths := append([]string{c.Platform.BuildPath}, p...)\n\treturn filepath.Join(paths...)\n}", "title": "" }, { "docid": "18e87ad4b8542d8302428323a6ea1f07", "score": "0.50054425", "text": "func Path(defaults ...string) string {\n\tif env.Env().Has(EnvVarConfigPath) {\n\t\treturn env.Env().String(EnvVarConfigPath)\n\t}\n\tif len(defaults) > 0 {\n\t\treturn defaults[0]\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "3ed2726b43c492c6e062c517c91b9ff4", "score": "0.49995708", "text": "func goModPath(fname string, isDir bool) (string, error) {\n\troot := fname\n\tif !isDir {\n\t\troot = filepath.Dir(fname)\n\t}\n\n\tgoModPathCache.RLock()\n\tgoModPath, ok := goModPathCache.paths[root]\n\tgoModPathCache.RUnlock()\n\tif ok {\n\t\treturn goModPath, nil\n\t}\n\n\tdefer func() {\n\t\tgoModPathCache.Lock()\n\t\tgoModPathCache.paths[root] = goModPath\n\t\tgoModPathCache.Unlock()\n\t}()\n\n\tcmd := exec.Command(\"go\", \"env\", \"GOMOD\")\n\tcmd.Dir = root\n\n\tstdout, err := cmd.Output()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tgoModPath = string(bytes.TrimSpace(stdout))\n\n\treturn goModPath, nil\n}", "title": "" }, { "docid": "759b2df82b7916067f54f5d91a779048", "score": "0.4994178", "text": "func findSrcPaths(importPath string) (revelSourcePath, appSourcePath string) {\n\tvar (\n\t\tgopaths = filepath.SplitList(build.Default.GOPATH)\n\t\tgoroot = build.Default.GOROOT\n\t)\n\n\tif len(gopaths) == 0 {\n\t\tglog.Fatal(\"GOPATH environment variable is not set. \",\n\t\t\t\"Please refer to http://golang.org/doc/code.html to configure your Go environment.\")\n\t}\n\n\tif ContainsString(gopaths, goroot) {\n\t\tglog.Fatalf(\"GOPATH (%s) must not include your GOROOT (%s). \"+\n\t\t\t\"Please refer to http://golang.org/doc/code.html to configure your Go environment.\",\n\t\t\tgopaths, goroot)\n\t}\n\n\tappPkg, err := build.Import(importPath, \"\", build.FindOnly)\n\tif err != nil {\n\t\tglog.Fatalln(\"Failed to import\", importPath, \"with error:\", err)\n\t}\n\n\trevelPkg, err := build.Import(REVEL_IMPORT_PATH, \"\", build.FindOnly)\n\tif err != nil {\n\t\tglog.Fatalln(\"Failed to find Revel with error:\", err)\n\t}\n\n\treturn revelPkg.SrcRoot, appPkg.SrcRoot\n}", "title": "" }, { "docid": "b309a6ca356e442e1f09f5f1aa194edc", "score": "0.49845833", "text": "func tmpLocation() string {\n\tout, err := exec.Command(\"bash\", \"-c\", \"echo $GOPATH\").CombinedOutput()\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t}\n\n\treturn strings.TrimSpace(string(out)) + \"/src/_weave/\" + setBase()\n}", "title": "" }, { "docid": "9dbcf98d09afec66db6d82ab7765d8a9", "score": "0.4977966", "text": "func TestPathNoSrcGoPath(t *testing.T) {\n\tenv := vos.Mock()\n\tb, err := builder.New(env, \"ns\", false)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer b.Cleanup()\n\n\tpackagePath, packageDir, err := b.Package(\"a\", nil)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tcalculatedPath, err := patsy.Path(env, packageDir)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tif calculatedPath != packagePath {\n\t\tt.Fatalf(\"Got %s, expected %s\", calculatedPath, packagePath)\n\t}\n}", "title": "" }, { "docid": "28f8ed684227857a6539bba45af417b2", "score": "0.4974407", "text": "func (c *Client) GoPath() string {\n\treturn c.goPath\n}", "title": "" }, { "docid": "9bf4c3bf863ab15345971db557c435b4", "score": "0.49710763", "text": "func GetCurrentPath() string {\n\tex, err := os.Executable()\n\tif err != nil {\n\t\tlog.Fatal(err.Error())\n\t}\n\texPath := filepath.Dir(ex)\n\n\treturn exPath\n}", "title": "" }, { "docid": "d4827608bf01a2a7ad2275f8a27ad0ce", "score": "0.49610236", "text": "func (source *Source) GetProjectPath() string {\n\tr, _ := regexp.Compile(\"(https?|ssh)://([^/]*)/(.*)\\\\.git$\")\n\treturn r.FindStringSubmatch(source.URI)[3]\n}", "title": "" }, { "docid": "2ec418ec06512500f98b59cc83d4c138", "score": "0.495662", "text": "func GetCurrentPath() string {\n\tex, err := os.Executable()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn filepath.Dir(ex)\n}", "title": "" }, { "docid": "07d2c4efd42be5e8a2d3f6e641d4c680", "score": "0.49363807", "text": "func getCurrentPath() (string, error) {\n\treturn filepath.Abs(filepath.Dir(os.Args[0]))\n}", "title": "" }, { "docid": "9b57aeea505def37f6f3a8c6469ecdc6", "score": "0.4934056", "text": "func WorkspacePath(t *testing.T) string {\n\tpanic(\"not built with Bazel\")\n}", "title": "" }, { "docid": "8e8a19244c72072026a6038f0c27d656", "score": "0.49297875", "text": "func SourcePath() (file string) {\n\t_, file, _, _ = runtime.Caller(1)\n\treturn\n}", "title": "" }, { "docid": "6ddf728774cade84cab2bab46c9b6355", "score": "0.49161604", "text": "func repoPath(gr *GitRepository, path string) string {\n\treturn pathpkg.Join(gr.gitdir, path)\n}", "title": "" }, { "docid": "6e9efacee1965dc6f3a1a0d626a72fee", "score": "0.4907687", "text": "func getPath() (string, error) {\n\tpath := os.Getenv(\"GETPATH\")\n\tif len(path) == 0 {\n\t\tpath = DefaultPath\n\t}\n\n\tpath, err := homedir.Expand(path)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif !filepath.IsAbs(path) {\n\t\treturn \"\", fmt.Errorf(\"GETPATH entry is relative; must be absolute path: \\\"%s\\\"\", path)\n\t}\n\n\t// Make GETPATH directory if it does not exist.\n\tif _, err := os.Stat(path); os.IsNotExist(err) {\n\t\terr := os.MkdirAll(path, os.ModePerm)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t}\n\n\treturn path, nil\n}", "title": "" }, { "docid": "a6453711757db72127ab8cc6a7b521bd", "score": "0.49056426", "text": "func GetCurrentDir() string {\n\tretC := C.g_get_current_dir()\n\tretGo := C.GoString(retC)\n\tdefer C.free(unsafe.Pointer(retC))\n\n\treturn retGo\n}", "title": "" }, { "docid": "e718ae21bc3fa45a05f995e646315508", "score": "0.4901984", "text": "func GetRepoPath() (string, error) {\n\trepoRoot, err := getRepoRoot()\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed git rev-parse --show-toplevel: '%v'\", err)\n\t}\n\tgopath := os.Getenv(\"GOPATH\")\n\tif gopath == \"\" {\n\t\treturn \"\", errors.New(\"GOPATH is empty\")\n\t}\n\trelPath, err := filepath.Rel(path.Join(gopath, \"src\"), string(repoRoot))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn strings.TrimSpace(relPath), nil\n}", "title": "" }, { "docid": "11fefc53f98034c59dbfcd93875d01fc", "score": "0.49019074", "text": "func Go() {\n\t// TODO: check home dir?\n\tif _, err := os.Stat(defaultPath); os.IsNotExist(err) {\n\t\t// defaultPath not exists\n\t} else {\n\t\tGoWithPath(defaultPath)\n\t}\n}", "title": "" }, { "docid": "266d0f41dc2904725799840ed6460a07", "score": "0.49013275", "text": "func GhorgConfDir() string {\n\tif XConfigHomeSet() {\n\t\txdg := os.Getenv(\"XDG_CONFIG_HOME\")\n\t\treturn filepath.Join(xdg, \"ghorg\")\n\t}\n\n\treturn filepath.Join(HomeDir(), \".config\", \"ghorg\")\n}", "title": "" }, { "docid": "0998cad644540bf47425f68cc22527aa", "score": "0.48981062", "text": "func genSrcPathToRelPath(t *testing.T, path string) string {\n\ttopLevel, err := rootDir()\n\trequire.NoError(t, err)\n\n\treturn fmt.Sprintf(\"%s/%s\", topLevel, strings.TrimPrefix(path, \"github.com/chef/automate/\"))\n}", "title": "" }, { "docid": "cc0a1bd7c8bb8b86a1250dfecbf7500d", "score": "0.4889001", "text": "func GetThisGoSourceFilepath() string {\n\t_, file, _, _ := runtime.Caller(1)\n\treturn file\n}", "title": "" }, { "docid": "0bc835f5d9647fc14594ca748f6e6f38", "score": "0.48859385", "text": "func IsUnderGoSrcPath(filePath string) bool {\n\tfor _, gopath := range getGoPaths() {\n\t\tgoSrc := path.Join(gopath, \"src\")\n\t\tif strings.HasPrefix(filepath.Dir(filePath), goSrc) {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "2702a41990799fc3933ebaeec5923361", "score": "0.48745134", "text": "func PackagePath(baseDir string, loc loc.Locator) string {\n\t// the path can not be too long because it leads to problems like this:\n\t// https: //github.com/golang/go/issues/6895\n\treturn filepath.Join(baseDir, loc.Repository, loc.Name, loc.Version)\n}", "title": "" }, { "docid": "05f2ba796d4000ff02abaf0ede2af0fd", "score": "0.48729423", "text": "func (e Env) PathFromHome(path string) string {\n\treturn filepath.Join(os.Getenv(\"HOME\"), path)\n}", "title": "" }, { "docid": "b5c1267e5e1d291c310819bc2216ba3e", "score": "0.48704505", "text": "func WorkingDir() string {\n\tlocation, existed := os.LookupEnv(\"HOME\")\n\tif !existed || DebugMode() {\n\t\tlocation = \".\"\n\t}\n\tret := location + \"/.cloudgo.d/\"\n\treturn ret\n}", "title": "" }, { "docid": "3335a42c3fd1d567282983eda2b193db", "score": "0.4861469", "text": "func (c *Context) CachedEnvironmentDotEnvPath(environmentName string) string {\n\treturn path.Join(c.CachedEnvironmentPath(environmentName), \".env\")\n}", "title": "" }, { "docid": "1f0a38a2fce9a0b6a239b4570a901f56", "score": "0.48572972", "text": "func TestWithGOPATHEqualsGOROOTGoGetFails(t *testing.T) {\n\ttestenv.MustHaveExternalNetwork(t)\n\n\ttg := testgo(t)\n\tdefer tg.cleanup()\n\ttg.parallel()\n\ttg.tempDir(\"src\")\n\ttg.setenv(\"GOPATH\", tg.path(\".\"))\n\ttg.setenv(\"GOROOT\", tg.path(\".\"))\n\ttg.runFail(\"get\", \"-d\", \"golang.org/x/codereview/cmd/hgpatch\")\n}", "title": "" }, { "docid": "4edbf31218b90979b856a7110c7258cd", "score": "0.4855037", "text": "func loadPath() string {\n\tpath := os.Getenv(\"GC_PATH\")\n\tif len(path) == 0 {\n\t\tp := flag.String(\"path\", \"./config\", \"-path=/Users/puran/myserver/config\")\n\t\tpath = *p\n\t}\n\treturn path\n}", "title": "" }, { "docid": "6f194584a682688d6d8a5c8fb0791d1d", "score": "0.48426944", "text": "func GetRootPath() (string, error) {\n\tpathsplosion, err := os.Getwd()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tpathes := strings.Split(pathsplosion, \"src/\")\n\tif len(pathes) < 2 {\n\t\treturn \"\", errors.New(\"Bad root dir, outside of a proper GOPATH?\")\n\t}\n\treturn pathes[1], nil\n}", "title": "" }, { "docid": "da23ac6bd33cfeec31b1b6ad5a923ce5", "score": "0.48346597", "text": "func getGravityPath() (string, error) {\n\tstateDir, err := state.GetStateDir()\n\tif err != nil {\n\t\treturn \"\", trace.Wrap(err)\n\t}\n\treturn filepath.Join(\n\t\tstate.GravityUpdateDir(stateDir),\n\t\tconstants.GravityBin), nil\n}", "title": "" }, { "docid": "0d7b7ac985e4387af19f32e2c1d63fc1", "score": "0.4829734", "text": "func Projectpath() string {\n\treturn os.ExpandEnv(\"$PROJECTS\")\n}", "title": "" }, { "docid": "76acb99706af4612b0e23406ccd95b37", "score": "0.48251092", "text": "func (l *configLocator) GetPath(repo repository.GitRepo) (string, error) {\n\tstoragePath, err := l.GetStorageByName(repo.GetStorageName())\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif _, err := os.Stat(storagePath); err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\treturn \"\", status.Errorf(codes.NotFound, \"GetPath: does not exist: %v\", err)\n\t\t}\n\t\treturn \"\", status.Errorf(codes.Internal, \"GetPath: storage path: %v\", err)\n\t}\n\n\trelativePath := repo.GetRelativePath()\n\tif len(relativePath) == 0 {\n\t\terr := status.Errorf(codes.InvalidArgument, \"GetPath: relative path missing from %+v\", repo)\n\t\treturn \"\", err\n\t}\n\n\tif _, err := storage.ValidateRelativePath(storagePath, relativePath); err != nil {\n\t\treturn \"\", status.Errorf(codes.InvalidArgument, \"GetRepoPath: %s\", err)\n\t}\n\n\treturn filepath.Join(storagePath, relativePath), nil\n}", "title": "" }, { "docid": "78e54d47a498a31af91666435b550da7", "score": "0.48232722", "text": "func standardPackagePath(pkg string) (string, bool) {\n\tout, err := exec.Command(\"go\", \"env\", \"GOROOT\").Output()\n\tif err != nil {\n\t\treturn \"\", false\n\t}\n\n\tgoroot := strings.Trim(string(out), \"\\n\")\n\tpath := fmt.Sprintf(\"%v/src/%v\", goroot, pkg)\n\tif _, err = os.Stat(path); err != nil {\n\t\treturn \"\", false\n\t}\n\treturn pkg, true\n}", "title": "" }, { "docid": "da1e4b243a865c85f9e705ca8173f71e", "score": "0.48187187", "text": "func PathCurrent() string {\n\tdir, err := filepath.Abs(filepath.Dir(os.Args[0])) //return filepath.Dir(os.Args[0])\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn strings.Replace(dir, \"\\\\\", \"/\", -1) //replace \\ to /\n}", "title": "" }, { "docid": "de603ffbb056733f8a0b45107f1f927b", "score": "0.48043114", "text": "func checkSourcePath(srcpath string) {\n\tfi, err := os.Stat(srcpath)\n\tif os.IsNotExist(err) {\n\t\tlogrus.Fatalf(\"The given source directory %s does not exist. Error: %q\", srcpath, err)\n\t}\n\tif err != nil {\n\t\tlogrus.Fatalf(\"Error while accessing the given source directory %s Error: %q\", srcpath, err)\n\t}\n\tif !fi.IsDir() {\n\t\tlogrus.Fatalf(\"The given source path %s is a file. Expected a directory. Exiting.\", srcpath)\n\t}\n\tpwd, err := os.Getwd()\n\tif err != nil {\n\t\tlogrus.Fatalf(\"Failed to get the current working directory. Error: %q\", err)\n\t}\n\tif common.IsParent(pwd, srcpath) {\n\t\tlogrus.Fatalf(\"The given source directory %s is a parent of the current working directory.\", srcpath)\n\t}\n}", "title": "" }, { "docid": "1a1ae009e1143b8fa53034d52854608e", "score": "0.4798964", "text": "func IsGoSrcPath(filePath string) bool {\n\tfor _, gopath := range getGoPaths() {\n\t\tgoSrc := path.Join(gopath, \"src\")\n\t\tif filePath == goSrc {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "88a3e59864177b1c77b2742d7f5e3b3d", "score": "0.47977936", "text": "func srcPath(path string) string {\n\treturn filepath.Join(\"testdata\", path)\n}", "title": "" }, { "docid": "59abe4db64e0164909bbeb37aa65ecf2", "score": "0.47877654", "text": "func GetProjectPath() string {\n\tprojectPathOnce.Do(func() {\n\t\tProjectPath = getProjectPath()\n\t})\n\treturn ProjectPath\n}", "title": "" }, { "docid": "c409a221143b990518ebebf9613ebb51", "score": "0.4786364", "text": "func (o GoogleCloudDatapipelinesV1LaunchTemplateRequestPtrOutput) GcsPath() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *GoogleCloudDatapipelinesV1LaunchTemplateRequest) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.GcsPath\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a545124e446afad8d8c1fcc9c49a9a4e", "score": "0.4784067", "text": "func (w *Weave) tmpLocation() string {\n\tout, err := exec.Command(\"bash\", \"-c\", \"echo $GOPATH\").CombinedOutput()\n\tif err != nil {\n\t\tw.flog.Println(err.Error())\n\t}\n\n\treturn string(out) + \"src/_weave\" + w.buildDir()\n}", "title": "" }, { "docid": "09ff1b92494ac56d743e50837f6e0ead", "score": "0.47615656", "text": "func goRoot() (string, error) {\n\tcmd := exec.Command(\"go\", \"env\", \"GOROOT\")\n\tcmd.Env = os.Environ()\n\tstdoutStderr, err := cmd.CombinedOutput()\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to get goroot: %w\", err)\n\t}\n\treturn string(stdoutStderr), nil\n}", "title": "" }, { "docid": "a69e99f04fafcf78fbb779b07458d0c3", "score": "0.47584233", "text": "func PathDir(relPath string) string {\n\t// Test again each directory listed in $GOPATH\n\tfor _, path := range filepath.SplitList(build.Default.GOPATH) {\n\t\tpath = filepath.Join(path, relPath)\n\t\tif _, err := os.Stat(path); err == nil {\n\t\t\treturn path\n\t\t}\n\t}\n\treturn relPath\n}", "title": "" }, { "docid": "a86fefbb2a2360d8d0641cda0bec9cbf", "score": "0.47554925", "text": "func (s WriteSettings) GetSourceRootPath(path string) string {\n\tresult, err := filepath.Rel(s.BuildRelSourceRoot, path)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "03f715d060da698147c4cbe5386ffede", "score": "0.475199", "text": "func adjustPath(environmentName string, resource string) string {\n\tif environmentName == TestEnv {\n\t\treturn \"../\" + resource\n\t}\n\treturn resource\n}", "title": "" }, { "docid": "b91895269741cae30635a1bd2268ccb7", "score": "0.4744367", "text": "func ToPath(imp string) (string, error) {\n\t// Transform the input import path into a\n\t// valid absolute import path if necessary.\n\tabs, err := Clean(imp)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Find the GOPATH value of the current directory.\n\tcurr, err := absolute(\".\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tgopath, err := extractGopath(curr)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Concatenate the \"GOPATH/src\" with the import path\n\t// and return it.\n\treturn filepath.Join(gopath[0], abs), nil\n}", "title": "" }, { "docid": "88af75e4c1cf78f452d642d617502bcb", "score": "0.47346875", "text": "func proc(env, path string) string {\n\t// try to read full file path\n\tif p := os.Getenv(env); p != \"\" {\n\t\treturn p\n\t}\n\t// return default path\n\treturn path\n}", "title": "" }, { "docid": "5bd0add2e241ccdfc0bef3926fc62bae", "score": "0.4734219", "text": "func getBackendPathInBuildDir(g generatorBackend, elems ...string) string {\n\treturn filepath.Join(append([]string{backend.Get().BuildDir()}, elems...)...)\n}", "title": "" }, { "docid": "45dff82c9f3aa2167c2f47105b66158b", "score": "0.47305053", "text": "func GitDir(path string) (string, error) {\n\t// do we have the GIT_DIR environment variable set?\n\t_env := os.Getenv(\"GIT_DIR\")\n\tif _env != \"\" {\n\t\treturn _env, nil\n\t}\n\n\t// attempt to resolve the .git directory within the given path hierarchy\n\t_output, _err := RunInPath(path, _DIR...)\n\tif _err == nil {\n\t\t_lines := strings.Split(string(_output), \"\\n\")\n\t\tfor _, _line := range _lines {\n\t\t\t_line = strings.TrimSpace(_line)\n\t\t\tif _line != \"\" {\n\t\t\t\treturn _line, nil\n\t\t\t}\n\t\t}\n\t\treturn \"\", MissingWorkingCopyError\n\t}\n\n\t// do we have git installed?\n\t//\t\t- if we do, then we interpret the error as a missing working copy\n\t//\t\t- this is a little dangerous, as other problems could be the cause\n\t//\t\t of the error, such as changes to the \"git\" API\n\t//\t\t- however, this does give a better user experience at present\n\t//\t\t- interrogating child process exist codes is difficult across\n\t//\t\t platforms, so for now we take this simplistic approach\n\t//\t\t- it also saves having a dependency on \"git\" exit codes\n\tif HasGit() {\n\t\treturn \"\", MissingWorkingCopyError\n\t}\n\n\t// we could not determine if we are in a git working copy\n\treturn \"\", _err\n}", "title": "" } ]
71889619c5b41f47a600cdffcdbbd2dc
SendCTCP sends a CTCP request to target. Note that this method uses PRIVMSG specifically. ctcpType is the CTCP command, e.g. "FINGER", "TIME", "VERSION", etc.
[ { "docid": "99d9c4fd15a8f426ed2ebf4638545bf9", "score": "0.8249979", "text": "func (cmd *Commands) SendCTCP(target, ctcpType, message string) {\n\tout := EncodeCTCPRaw(ctcpType, message)\n\tif out == \"\" {\n\t\tpanic(fmt.Sprintf(\"invalid CTCP: %s -> %s: %s\", target, ctcpType, message))\n\t}\n\n\tcmd.Message(target, out)\n}", "title": "" } ]
[ { "docid": "0fdccea0dd3fb979a8684d3915c6ad4a", "score": "0.71439695", "text": "func (cmd *Commands) SendCTCPf(target, ctcpType, format string, a ...interface{}) {\n\tcmd.SendCTCP(target, ctcpType, fmt.Sprintf(format, a...))\n}", "title": "" }, { "docid": "6a85feb84fdd9bee09920a4d0baf997d", "score": "0.64088285", "text": "func (cmd *Commands) SendCTCPReply(target, ctcpType, message string) {\n\tout := EncodeCTCPRaw(ctcpType, message)\n\tif out == \"\" {\n\t\tpanic(fmt.Sprintf(\"invalid CTCP: %s -> %s: %s\", target, ctcpType, message))\n\t}\n\n\tcmd.Notice(target, out)\n}", "title": "" }, { "docid": "4dcbf7d54cc24d6e26c685a5ed373ce6", "score": "0.58272964", "text": "func SendTxCmd(cdc *codec.Codec) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"send --from [from_key_or_address] --to [to_address] --amount [amount]\",\n\t\tShort: \"Create and sign a send tx\",\n\t\tExample: \"dipcli send --from=<key name> --to=<account address> --chain-id=<chain-id> --amount=<amount>pdip\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\ttxBldr := auth.NewTxBuilderFromCLI().WithTxEncoder(utils.GetTxEncoder(cdc))\n\t\t\tcliCtx := context.NewCLIContext().WithCodec(cdc)\n\n\t\t\tto, err := sdk.AccAddressFromBech32(viper.GetString(flagTo))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// parse coins trying to be sent\n\t\t\tamount := viper.GetString(flagAmount)\n\t\t\tcoins, err := sdk.ParseCoins(amount)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// build and sign the transaction, then broadcast to Tendermint\n\t\t\tmsg := types.NewMsgSend(cliCtx.GetFromAddress(), to, coins)\n\t\t\tif err = msg.ValidateBasic(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn utils.GenerateOrBroadcastMsgs(cliCtx, txBldr, []sdk.Msg{msg})\n\t\t},\n\t}\n\n\tcmd.Flags().String(flagTo, \"\", \"Bech32 encoding address to receive coins\")\n\tcmd.Flags().String(flagAmount, \"\", \"Amount of coins to send, for instance: 10pdip\")\n\tcmd.MarkFlagRequired(flagTo)\n\tcmd.MarkFlagRequired(flagAmount)\n\n\tcmd = client.PostCommands(cmd)[0]\n\n\treturn cmd\n}", "title": "" }, { "docid": "d9b35586b69969a5f298ea8fbebdbdef", "score": "0.53504246", "text": "func (cmd *Commands) SendCTCPReplyf(target, ctcpType, format string, a ...interface{}) {\n\tcmd.SendCTCPReply(target, ctcpType, fmt.Sprintf(format, a...))\n}", "title": "" }, { "docid": "04af6ff178bb8d5ffd73a04b0ed84456", "score": "0.5245079", "text": "func sendSCPControlMsg(msg string, channel ssh.Channel) error {\n\tsimplelog.Debug.Printf(\"Sending control message: %q\", msg[:len(msg)-1])\n\tn, err := channel.Write([]byte(msg))\n\tsimplelog.Debug.Printf(\"Sent %d bytes\", n)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn checkSCPClientCode(channel)\n}", "title": "" }, { "docid": "4dd1d72a639efc9064c572c2ff6d2eea", "score": "0.52117753", "text": "func (b *Base) SendToGenericTCP(addr string, maxRetries int, loglines []string, source string) error {\n\tif len(loglines) == 0 {\n\t\treturn nil\n\t}\n\n\tconn, err := libtcp.NewConnectionWithRetries(addr, maxRetries)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif conn != nil {\n\t\tdefer conn.Close()\n\n\t\tw := bufio.NewWriter(conn)\n\n\t\tfor _, lg := range loglines {\n\t\t\tfmt.Fprint(w, lg)\n\t\t\tw.Flush()\n\t\t}\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "f318c917b28396356ab1a9520be25971", "score": "0.50890464", "text": "func (c *Client) SendControlCommand(cType ControlCmdType, val uint, ch chan Message) string {\n\tid := uuid.NewV4().String()\n\tm := ControlMessage{id: id, cType: cType, val: val}\n\t// send the message asynchronously\n\tglog.V(2).Infof(\"Going to send from Client on %v\\n\", ch)\n\tasyncSend(ch, m, 5000)\n\tglog.V(3).Infof(\"Send from Client done id = %v\\n\", id)\n\treturn id\n}", "title": "" }, { "docid": "9c4b031ce4a0eb4c016df04729ef304a", "score": "0.4982638", "text": "func (m TradingSessionStatus) SetCPRegType(v string) {\n\tm.Set(field.NewCPRegType(v))\n}", "title": "" }, { "docid": "64f704b3dc0e957ccb3b3ba13ac7efd9", "score": "0.4880963", "text": "func sendTCPMessage(conn net.Conn, fcrMsg *fcrmessages.FCRMessage, timeout time.Duration) error {\n\t// Get data\n\tdata, err := fcrMsg.FCRMsgToBytes()\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Initialise a writer\n\twriter := bufio.NewWriter(conn)\n\tlength := make([]byte, 4)\n\tbinary.BigEndian.PutUint32(length, uint32(len(data)))\n\t// Set timeout\n\tif err := conn.SetDeadline(time.Now().Add(timeout)); err != nil {\n\t\tpanic(err)\n\t}\n\t_, err = writer.Write(append(length, data...))\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Set timeout\n\tif err := conn.SetDeadline(time.Now().Add(timeout)); err != nil {\n\t\tpanic(err)\n\t}\n\treturn writer.Flush()\n}", "title": "" }, { "docid": "9a9f551c363d6ab111f03a82a9c90365", "score": "0.48306975", "text": "func (o DdrInstanceOutput) TcpConnectionType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *DdrInstance) pulumi.StringOutput { return v.TcpConnectionType }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "2e600451fb712e4351d73de3889977cd", "score": "0.48268735", "text": "func TCPClient() {\n\tmt := new(modbustcp.MbTcp)\n\tmt.Addr = 1\n\tmt.Code = 0x03\n\tmt.Data = []byte{0, 1}\n\tres, err := mt.Send(\"127.0.0.1:80\")\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tlog.Println(res)\n}", "title": "" }, { "docid": "67faafb4928a1398ccc590877de00076", "score": "0.48201412", "text": "func NewSendTxCmd(ac address.Codec) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"send [from_key_or_address] [to_address] [amount]\",\n\t\tShort: \"Send funds from one account to another.\",\n\t\tLong: `Send funds from one account to another.\nNote, the '--from' flag is ignored as it is implied from [from_key_or_address].\nWhen using '--dry-run' a key name cannot be used, only a bech32 address.\n`,\n\t\tArgs: cobra.ExactArgs(3),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\terr := cmd.Flags().Set(flags.FlagFrom, args[0])\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tclientCtx, err := client.GetClientTxContext(cmd)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\ttoAddr, err := ac.StringToBytes(args[1])\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tcoins, err := sdk.ParseCoinsNormalized(args[2])\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif len(coins) == 0 {\n\t\t\t\treturn fmt.Errorf(\"invalid coins\")\n\t\t\t}\n\n\t\t\tmsg := types.NewMsgSend(clientCtx.GetFromAddress(), toAddr, coins)\n\n\t\t\treturn tx.GenerateOrBroadcastTxCLI(clientCtx, cmd.Flags(), msg)\n\t\t},\n\t}\n\n\tflags.AddTxFlagsToCmd(cmd)\n\n\treturn cmd\n}", "title": "" }, { "docid": "6081e6f87f1e473d15df5a51d7077fcd", "score": "0.48103002", "text": "func tcpSend(cnx net.Conn, cmd int, data []byte) error {\n // simple appliances are expected to reply quickly\n now := time.Now()\n cnx.SetWriteDeadline(now.Add(10 * time.Second))\n\n // tuya appliances cannot handle multiple read!!\n // => fill a buffer and write it\n b := make([]byte, 0, 16)\n b = append(b, ui2b(uint(0x55aa), 4)...)\n b = append(b, ui2b(uint(cmd), 8)...)\n b = append(b, ui2b(uint(len(data)+8), 4)...)\n b = append(b, data...)\n b = append(b, ui2b(uint(0xaa55), 8)...)\n if _, err := cnx.Write(b); err != nil {\n log.Println(err)\n return err\n }\n return nil\n}", "title": "" }, { "docid": "1b65d3099b2f7a7a75c9ef22e3db05ab", "score": "0.4805917", "text": "func DhcpSendRequest(c *dhcp4client.Client, options dhcp4.Options, offerPacket *dhcp4.Packet) (dhcp4.Packet, error) {\n\trequestPacket := c.RequestPacket(offerPacket)\n\n\tfor opt, data := range options {\n\t\trequestPacket.AddOption(opt, data)\n\t}\n\n\trequestPacket.PadToMinSize()\n\n\treturn requestPacket, c.SendPacket(requestPacket)\n}", "title": "" }, { "docid": "95ab29671edbe84d903cc1f847b9aa16", "score": "0.48016906", "text": "func (communication *MQTT) publishCSSOnWIoTP(orgID string, destType string, destID string, dataJSON []byte, chunked bool) common.SyncServiceError {\n\tclient, err := communication.getClient(orgID)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif client == nil {\n\t\t// No client to send the message to\n\t\tmessage := fmt.Sprintf(\"Failed to find client to publish (org id = %s, dest type = %s, dest id = %s)\\n\", orgID, destType, destID)\n\t\tif trace.IsLogging(logger.ERROR) {\n\t\t\ttrace.Error(message)\n\t\t}\n\t\tif log.IsLogging(logger.ERROR) {\n\t\t\tlog.Error(message)\n\t\t}\n\t\treturn nil\n\t}\n\n\t// \"iotint-1/\" + orgID + \"/type/\" + destType + \"/id/\" + destID + \"/sync/sync-cmd\"\n\tvar strBuilder strings.Builder\n\tstrBuilder.Grow(len(orgID) + len(destType) + len(destID) + 40)\n\tstrBuilder.WriteString(\"iotint-1/\")\n\tstrBuilder.WriteString(orgID)\n\tstrBuilder.WriteString(\"/type/\")\n\tstrBuilder.WriteString(destType)\n\tstrBuilder.WriteString(\"/id/\")\n\tstrBuilder.WriteString(destID)\n\tstrBuilder.WriteString(\"/sync/sync-cmd\")\n\ttopic := strBuilder.String()\n\n\treturn publish(client, topic, dataJSON)\n}", "title": "" }, { "docid": "5ef501dfb8edf9312ea24285efc90a6f", "score": "0.47960955", "text": "func tcpSend(addr *net.TCPAddr, msg message) error {\n\tp := make([]byte, BUFFSIZE)\n\tconn, err := net.DialTCP(\"tcp\", nil, addr)\n\tif err == nil {\n\t\toutbuf := logger.PrepareSend(msg.Type, msg)\n\t\t_, err = conn.Write(outbuf)\n\t\t//checkError(err)\n\t\tn, _ := conn.Read(p)\n\t\tif string(p[:n]) != \"OK\" {\n\t\t\tfmt.Printf(\" [NO]\\n<-- Request was denied by node: %v.\\nEnter command: \", string(p[:n]))\n\t\t} else {\n\t\t\tfmt.Printf(\" [OK]\\n\")\n\t\t}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "c6b91c0cca51bb4d80279b629e798577", "score": "0.47665143", "text": "func (d *Device) SetTCPTransferMode(mode int) error {\n\tval := strconv.Itoa(mode)\n\td.Set(TransmissionMode, val)\n\ttime.Sleep(pause * time.Millisecond)\n\td.Response()\n\treturn nil\n}", "title": "" }, { "docid": "e66ecba4405896cbb0501f5964f64b2b", "score": "0.47553432", "text": "func (c *ClnPlugin) sendToCln(msg interface{}) {\n\tc.writeMtx.Lock()\n\tdefer c.writeMtx.Unlock()\n\n\tdata, err := json.Marshal(msg)\n\tif err != nil {\n\t\tlog.Printf(\"Failed to marshal message for cln, ignoring message: %+v\", msg)\n\t\treturn\n\t}\n\n\tdata = append(data, TwoNewLines...)\n\tc.out.Write(data)\n\tc.out.Flush()\n}", "title": "" }, { "docid": "63708a2bc15cce51e5dd75f64daa04a7", "score": "0.4745531", "text": "func (o *consumer) sendFlowControl() {\n\tif !o.isPushMode() {\n\t\treturn\n\t}\n\tsubj, rply := o.cfg.DeliverSubject, o.fcReply()\n\to.fcsz, o.fcid = o.pbytes, rply\n\thdr := []byte(\"NATS/1.0 100 FlowControl Request\\r\\n\\r\\n\")\n\to.outq.send(newJSPubMsg(subj, _EMPTY_, rply, hdr, nil, nil, 0))\n}", "title": "" }, { "docid": "a67885e866af49c0036abc8ea7b444a8", "score": "0.47052357", "text": "func (c *gqtpConn) sendHeader(flags byte, size int) error {\n\thead := gqtpHeader{\n\t\tProtocol: gqtpProtocol,\n\t\tFlags: flags,\n\t\tSize: uint32(size),\n\t}\n\tif err := binary.Write(c.conn, binary.BigEndian, head); err != nil {\n\t\treturn NewError(NetworkError, \"binary.Write failed.\", map[string]interface{}{\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e884829bf4379077427ce0ad0a603761", "score": "0.46992764", "text": "func (c *StatsdClient) CreateTCPSocket() error {\n\t// Set the conn/socket type before dialing, so that if the socket creation\n\t// fails, the Reconnect method will still know what type of socket to\n\t// reconnect.\n\tc.connType = tcpSocket\n\tconn, err := net.DialTimeout(\"tcp\", c.addr, 5*time.Second)\n\tif err != nil {\n\t\treturn err\n\t}\n\tc.conn = conn\n\tc.eventStringTpl = \"%s%s:%s\\n\"\n\treturn nil\n}", "title": "" }, { "docid": "f6280b93b5397904ce9f140a799ad6ab", "score": "0.46636337", "text": "func (m *Manager) SendRTCP(pkt []byte) {\n\tm.srtpOutboundContextLock.Lock()\n\tdefer m.srtpOutboundContextLock.Unlock()\n\tif m.srtpOutboundContext == nil {\n\t\tfmt.Printf(\"Tried to send RTCP packet but no SRTP Context to handle it \\n\")\n\t\treturn\n\t}\n\n\tencrypted, err := m.srtpOutboundContext.EncryptRTCP(pkt)\n\tif err != nil {\n\t\tfmt.Println(\"SendRTCP failed to encrypt packet:\", err)\n\t\treturn\n\t}\n\n\t_, err = m.iceConn.Write(encrypted)\n\tif err != nil {\n\t\tfmt.Println(\"SendRTCP failed to write:\", err)\n\t}\n}", "title": "" }, { "docid": "4d156ee31b23afcc3cae206c9ebb9777", "score": "0.45850188", "text": "func (this *Ikcpcb) IkcpSend(buffer []byte) int {\n\n\tlength := len(buffer)\n\tif length == 0 {\n\t\treturn -1\n\t}\n\tcount := 0\n\tif length <= (int)(this.m_dwMss) {\n\t\tcount = 1\n\t} else {\n\t\tcount = ((length - 1) / (int)(this.m_dwMss)) + 1\n\t}\n\n\tif count > IKCP_WND_RCV {\n\t\treturn -2\n\t}\n\n\tif count == 0 {\n\t\tcount = 1\n\t}\n\n\t// fragment\n\tfor i := 0; i < count; i++ {\n\t\tsize := 0\n\t\tif len(buffer) > (int)(this.m_dwMss) {\n\t\t\tsize = (int)(this.m_dwMss)\n\t\t} else {\n\t\t\tsize = len(buffer)\n\t\t}\n\n\t\tseg := ikcpseg{\n\t\t\tm_stData: make([]byte, size),\n\t\t}\n\n\t\tcopy(seg.m_stData, buffer[:size])\n\t\tseg.m_dwFrg = 0\n\t\tthis.m_stSndQueue = append(this.m_stSndQueue, seg)\n\t\tbuffer = buffer[size:]\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "1c727502c28a7dfebfc855b7833a8ad2", "score": "0.4577689", "text": "func (o *Communicator) SendC(vals []complex128, toID int) {\n}", "title": "" }, { "docid": "98651f51edff84822e3ebb161b6e5ab8", "score": "0.4576582", "text": "func (c *goVppChan) SendRequest(request govppapi.Message) govppapi.RequestCtx {\n\tstart := time.Now()\n\n\tsendRequest := c.Channel.SendRequest\n\t// Send request now and wait for context\n\trequestCtx := sendRequest(request)\n\n\t// Return context with value and function which allows to send request again if needed\n\treturn &govppRequestCtx{\n\t\trequestCtx: requestCtx,\n\t\tsendRequest: sendRequest,\n\t\trequestMsg: request,\n\t\tretry: c.retry,\n\t\ttracer: c.tracer,\n\t\tstart: start,\n\t}\n}", "title": "" }, { "docid": "aab7eb774aad1f4a106838008a1ef506", "score": "0.45570326", "text": "func (c *PgConnection) sendCancel() error {\n\tlog.Debugf(\"Sending cancel to PID %d\", c.pid)\n\tconn, err := net.Dial(\"tcp\", fmt.Sprintf(\"%s:%d\", c.host, c.port))\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\n\tcancel := NewStartupMessage()\n\tcancel.WriteInt32(cancelMagicNumber)\n\tcancel.WriteInt32(c.pid)\n\tcancel.WriteInt32(c.key)\n\n\t_, err = conn.Write(cancel.Encode())\n\treturn err\n}", "title": "" }, { "docid": "e5bb64b176daee240c49aa1570c7c731", "score": "0.45375544", "text": "func (c *Conn) send(_type st, connID uint16, payload []byte, seqNr uint16) (err error) {\n\tp := c.makePacket(_type, connID, seqNr, payload)\n\tn1, err := c.socket.writeTo(p, c.remoteSocketAddr)\n\tsendBufferPool.Put(p[:0:minMTU])\n\tif err != nil {\n\t\treturn\n\t}\n\tif n1 != len(p) {\n\t\tpanic(n1)\n\t}\n\tif c.unpendSendState() && _type != stState {\n\t\t// We needed to send a state packet, but this packet suppresses that\n\t\t// need.\n\t\tunsentStatePackets.Add(1)\n\t}\n\treturn\n}", "title": "" }, { "docid": "0e9b8de1b8bea436b9dcb4a20a05e43e", "score": "0.45342296", "text": "func (conn *gdbConn) sendCtrlC() error {\n\tconn.log.Debug(\"<- interrupt\")\n\t_, err := conn.conn.Write([]byte{ctrlC})\n\treturn err\n}", "title": "" }, { "docid": "7fbd7dee292f7ccbee4ed1783c0139a3", "score": "0.45327112", "text": "func sendTCP(communicator CommChannels){ \n\tfor { // communication is done over channels, so function should never return\n\t\tselect {\n\t\tcase message := <- internal.encodedMessageSendAll:\n\t\t\tinternal.giveMeCurrentMap <- true\n\t\t\tTCPmap := <- internal.getCurrentMap\n\t\t\tif len(TCPmap) == 0 {\n\t\t\t\tfmt.Println(\"Unable to send to all: there are no active connections\")\n\t\t\t} else {\n\t\t\t\tfor ip, _ := range TCPmap {\n\t\t\t\t\tsocket := TCPmap[ip]\n\t\t\t\t\tsocket.SetWriteDeadline(time.Now().Add(300*time.Millisecond))\n\t\t\t\t\t_, err := socket.Write(message.Content)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tfmt.Println(\"error sending on all TCP conns: \", err)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase message := <- internal.encodedMessageSendOne:\n\t\t\tfmt.Println(\"Sending message to one\")\n\t\t\tinternal.giveMeConn <- message.IP\n\t\t\tsocket := <- internal.getSingleConn\n\t\t\tif socket == nil {\n\t\t\t\tfmt.Println(\"Could not send message to one: IP didn't exist in map\")\n\t\t\t} else {\n\t\t\t\t_, err := socket.Write(message.Content)\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Println(\"Error writing to socket for this IP:\", message.IP)\n\t\t\t\t} else {\n\t\t\t\t\tfmt.Println(\"message successfully sent to: \", message.IP)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "bbace2db8c5e87f87b550b6075460015", "score": "0.45297566", "text": "func (___VtcpNode4 *_TtcpNodE) _FtcpNode__200301x_send__default() {\n\t//_FpfN(\"283821 01 send start\")\n\tfor {\n\t\tselect {\n\t\tcase __Vds := <-___VtcpNode4.tnCHsendToAllClientI: // _TtcpNodeDataSend\n\t\t\t//_FpfN(\"283821 02 get from send-chain :{%s}\", __Vds.String())\n\t\t\t___TtcpNodE__mux.Lock()\n\t\t\t___VtcpNode4.\n\t\t\t\t_FtcpNode__200301x2_sendAll__default(&__Vds)\n\n\t\tcase __Vb := <-___VtcpNode4.tnCHtcpSendBI: // chan []byte // byte of _TtcpNodeDataSend\n\t\t\t___TtcpNodE__mux.Lock()\n\t\t\t_CFpfN(\"283821 04 _TtcpNodE tnCHtcpSendBI :{%s}\", String9s(&__Vb))\n\n\t\tcase __VbCmd := <-___VtcpNode4.tnCHtcpSendCmdI: // chan [17]byte\n\t\t\t___TtcpNodE__mux.Lock() // command of tunnel : byte 0:15 -> channelID, byte [16] -> cmd : // TcpNodeCmd__NULL\n\t\t\t_CFpfN(\"283821 06 _TtcpNodE tnCHtcpSendCmdI :{%x %s}\", __VbCmd[:16], StrTcpNodeCmd(__VbCmd[16]))\n\n\t\t\t___VtcpNode4.\n\t\t\t\t_FtcpNode__tryAcction_Cmd(__VbCmd)\n\n\t\t} // end Select\n\t\t___TtcpNodE__mux.Unlock()\n\t} // end for\n}", "title": "" }, { "docid": "221b496114b363edd1becc3f6606c880", "score": "0.45276025", "text": "func (connection *Connection) Send(cmdtype string, args ...string) error {\n\tvar command Command\n\n\tcommand.Type = cmdtype\n\tcommand.Args = args\n\n\terr := connection.SendCommand(&command)\n\n\treturn err\n}", "title": "" }, { "docid": "6d205c04cdaaf439372bc594650ada0a", "score": "0.45218706", "text": "func TCPClient(cch <-chan Command, sch chan<- Stats) {\n\tlog.Println(\"TCPClient started\")\n\n\tops := map[string]TCPWorker{\n\t\t\"UP\": TCPSender(\"TCPPerf.TCPRcv\"),\n\t\t\"DOWN\": TCPReceiver(\"TCPPerf.TCPSnd\"),\n\t}\n\n\ttimer := time.Tick(1 * time.Second)\nL:\n\tfor {\n\t\tselect {\n\t\tcase c, ok := (<-cch):\n\t\t\tif !ok {\n\t\t\t\tclose(sch)\n\t\t\t\tbreak L\n\t\t\t}\n\t\t\tlog.Println(\"Command: \", c.Name)\n\t\t\tworker, found := ops[c.Name]\n\t\t\tif found {\n\t\t\t\terr := Dispatch(sch, c.Cfg, worker)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(err)\n\t\t\t\t}\n\t\t\t} else if c.Name != \"STOP\" {\n\t\t\t\tlog.Println(\"Unsupported command:\", c.Name)\n\t\t\t\tselect {\n\t\t\t\tcase sch <- Stats{Stat: \"Error\", Type: \"Illegal command:\" + c.Name}:\n\t\t\t\tdefault:\n\t\t\t\t}\n\t\t\t}\n\t\tcase <-timer:\n\t\t\tselect {\n\t\t\tcase sch <- Stats{Stat: \"Stopped\"}:\n\t\t\tdefault:\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "828c503c587569855ed3d77b8d39bc24", "score": "0.45070165", "text": "func (self *SocketHandler) sendTCP(bin []byte) error {\n\tif self.conn == nil {\n\t\terr := self.createSocket()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tsentSoFar, left := 0, len(bin)\n\tfor left > 0 {\n\t\tsent, err := self.conn.Write(bin[sentSoFar:])\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsentSoFar += sent\n\t\tleft -= sent\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9ec899fbee3ddf776afa24383a123be7", "score": "0.44795692", "text": "func (nitroHandlers) NewTCPCluster(context interface{}, cx *tcp.Connection) (netd.Provider, error) {\n\treturn tcp.NewTCPProvider(true,\n\t\tnetd.BlockParser,\n\t\t&Nitro{\n\t\t\tLogger: cx.Config.Logger,\n\t\t\tTrace: cx.Config.Trace,\n\t\t\trcs: make(map[string]bool),\n\t\t},\n\t\tcx), nil\n}", "title": "" }, { "docid": "289b2176d36054ed43ea52037d07a682", "score": "0.44745848", "text": "func SendMsgTCP(remote_addr *net.UDPAddr, msg []byte) {\n\tremote_tcp_addr := ConvertUDPToTCP(*remote_addr)\n\tconn, err := net.DialTCP(\"tcp\", nil, remote_tcp_addr)\n\tCheckError(err)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer conn.Close()\n\tconn.Write(msg)\n}", "title": "" }, { "docid": "4360f37c75a10860d410c30a2cd0468b", "score": "0.447269", "text": "func (c *Client) SendCommand(cType CommandType, val int, ch chan Message) string {\n\tid := uuid.NewV4().String()\n\tm := ClientMessage{id: id, requester: c.Id, cType: cType, val: val}\n\t// send the message asynchronously\n\tglog.V(2).Infof(\"Going to send from Client on %v\\n\", ch)\n\tasyncSend(ch, m, 5000)\n\n\tglog.V(2).Infof(\"Send from Client done id = %v\\n\", id)\n\treturn id\n}", "title": "" }, { "docid": "25e8b70f5db3a9d4d17802a5bb1b13df", "score": "0.44681925", "text": "func (xport *transport) send(msg controlMessage) error {\n\tcm := ctlMsg{\n\t\txport: xport,\n\t\tmsg: msg,\n\t\tcompleteChan: make(chan error),\n\t\tonComplete: sendComplete,\n\t}\n\txport.sendChan <- &cm\n\terr := <-cm.completeChan\n\treturn err\n}", "title": "" }, { "docid": "b84f6f74f6fc85568529d4671835c2f0", "score": "0.44672918", "text": "func TestDirectTCPIP(t *testing.T) {\n\tt.Parallel()\n\tf := newFixtureWithoutDiskBasedLogging(t)\n\n\t// Startup a test server that will reply with \"hello, world\\n\"\n\tts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tfmt.Fprintln(w, \"hello, world\")\n\t}))\n\tdefer ts.Close()\n\n\t// Extract the host:port the test HTTP server is running on.\n\tu, err := url.Parse(ts.URL)\n\trequire.NoError(t, err)\n\n\t// Build a http.Client that will dial through the server to establish the\n\t// connection. That's why a custom dialer is used and the dialer uses\n\t// s.clt.Dial (which performs the \"direct-tcpip\" request).\n\thttpClient := http.Client{\n\t\tTransport: &http.Transport{\n\t\t\tDial: func(network string, addr string) (net.Conn, error) {\n\t\t\t\treturn f.ssh.clt.DialContext(context.Background(), \"tcp\", u.Host)\n\t\t\t},\n\t\t},\n\t}\n\n\t// Perform a HTTP GET to the test HTTP server through a \"direct-tcpip\" request.\n\tresp, err := httpClient.Get(ts.URL)\n\trequire.NoError(t, err)\n\tdefer resp.Body.Close()\n\n\t// Make sure the response is what was expected.\n\tbody, err := io.ReadAll(resp.Body)\n\trequire.NoError(t, err)\n\trequire.Equal(t, []byte(\"hello, world\\n\"), body)\n\n\tt.Run(\"SessionJoinPrincipal cannot use direct-tcpip\", func(t *testing.T) {\n\t\t// Ensure that ssh client using SessionJoinPrincipal as Login, cannot\n\t\t// connect using \"direct-tcpip\".\n\t\tctx := context.Background()\n\t\tcliUsingSessionJoin := f.newSSHClient(ctx, t, &user.User{Username: teleport.SSHSessionJoinPrincipal})\n\t\thttpClientUsingSessionJoin := http.Client{\n\t\t\tTransport: &http.Transport{\n\t\t\t\tDial: func(network string, addr string) (net.Conn, error) {\n\t\t\t\t\treturn cliUsingSessionJoin.DialContext(ctx, \"tcp\", u.Host)\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t\t//nolint:bodyclose // We expect an error here, no need to close.\n\t\t_, err := httpClientUsingSessionJoin.Get(ts.URL)\n\t\trequire.ErrorContains(t, err, \"ssh: rejected: administratively prohibited (attempted direct-tcpip channel open in join-only mode\")\n\t})\n}", "title": "" }, { "docid": "8ccc473fc6e15a0d497974eb043ee2a8", "score": "0.44657233", "text": "func sendTestRequest(name string, id, tcnum int, tmodel bclass.Model) {\n\t//create test request (sanitized)\n\tmsg := message{tcnum, \"server\", \"server\", \"test_request\", 0, 0, tmodel, gempty}\n\t//send the request\n\tfmt.Printf(\"--> Sending test request from %v to %v.\", mynode.cnumhist[tcnum], name)\n\terr := tcpSend(mynode.claddr[id], msg)\n\tif err != nil {\n\t\tfmt.Printf(\" [NO]\\n*** Could not send test request to %v.\\n\", name)\n\t}\n}", "title": "" }, { "docid": "685b058ed7583806ce7be4e6ee22cca5", "score": "0.4463932", "text": "func NewTCPStatCollector(logger log.Logger) (Collector, error) {\n\treturn &tcpStatCollector{\n\t\tdesc: typedDesc{prometheus.NewDesc(\n\t\t\tprometheus.BuildFQName(namespace, \"tcp\", \"connection_states\"),\n\t\t\t\"Number of connection states.\",\n\t\t\t[]string{\"state\"}, nil,\n\t\t), prometheus.GaugeValue},\n\t\tlogger: logger,\n\t}, nil\n}", "title": "" }, { "docid": "d34188458bb5b4967d8ad471ea2b86fd", "score": "0.44602248", "text": "func (p *PrintTCP) Protocol() string { return \"tcp\" }", "title": "" }, { "docid": "c1cd3ff9a4b982de30f7a4574ebd21a1", "score": "0.44521055", "text": "func (o *DebugCollectParams) SetTcc(tcc *string) {\n\to.Tcc = tcc\n}", "title": "" }, { "docid": "4441f30f5b902646be14ced6efe73867", "score": "0.4438718", "text": "func (o *DebugCollectParams) WithTcc(tcc *string) *DebugCollectParams {\n\to.SetTcc(tcc)\n\treturn o\n}", "title": "" }, { "docid": "c6d68bb14fd5325229f1fcaab67f239e", "score": "0.4423586", "text": "func sendMsg(nc net.Conn, t msgType, s status, b []byte) (err error) {\n\tm := msg{\n\t\tt: t,\n\t\ts: s,\n\t\tbody: b,\n\t}\n\n\t// Set buf using slice pool\n\tbuf, n := m.Bytes(make([]byte, int64(HeaderLen+len(m.body))))\n\t// Write buf to net.Conn\n\t_, err = nc.Write(buf[:n])\n\treturn\n}", "title": "" }, { "docid": "d8a16535fe96ec7c2e677b3613cb5cfb", "score": "0.44120198", "text": "func TestMqttTCPPubSub(t *testing.T) {\n\tpubclient := NewMqttClient(HOSTNAME, USERNAME, PASSWORD, TCP_PORT, nil)\n\tsubclient := NewMqttClient(HOSTNAME, USERNAME, PASSWORD, TCP_PORT, nil)\n\n\tdoPubSubTests(pubclient, subclient, t)\n}", "title": "" }, { "docid": "64e5be0db6f4408526ef685c066b0e6c", "score": "0.44107127", "text": "func tcpSend(msg message) {\r\n var err error\r\n var conn *net.TCPConn\r\n // Cycling through list of Raft servers\r\n for _, v := range svaddr {\r\n conn, err = net.DialTCP(\"tcp\", nil, v)\r\n if err == nil {\r\n break\r\n }\r\n }\r\n\tenc := gob.NewEncoder(conn)\r\n\tdec := gob.NewDecoder(conn)\r\n\terr = enc.Encode(&msg)\r\n\tcheckError(err)\r\n\tvar r response\r\n\terr = dec.Decode(&r)\r\n\tcheckError(err)\r\n\tif r.Resp == \"OK\" {\r\n\t\tfmt.Printf(\" [OK]\\n\")\r\n\t\tif r.Error == \"Joined\" {\r\n\t\t\tisjoining = false\r\n\t\t}\r\n\t} else if r.Resp == \"NO\" {\r\n\t\tfmt.Printf(\" [%s]\\n *** Request was denied by server: %v.\\nEnter command: \", r.Resp, r.Error)\r\n\t} else {\r\n\t\tfmt.Printf(\" [%s]\\n *** Something strange Happened: %v.\\nEnter command: \", r.Resp, r.Error)\r\n\t}\r\n}", "title": "" }, { "docid": "7bb0c72a71a364590cb5c3144b65912e", "score": "0.44073248", "text": "func (c *gwsConn) send(mType int, data []byte) error {\n var err error\n\n c.sendMutex.Lock()\n if c.conn != nil {\n err = c.conn.WriteMessage(mType, data)\n } else {\n err = gochat.ConnEOF\n }\n c.sendMutex.Unlock()\n return err\n}", "title": "" }, { "docid": "0b20a604fc63a91cdb5c865ae5630fde", "score": "0.4392703", "text": "func (client *Client) SendPacket(packetID int32, _type int32, payload string) (err error) {\n\tlengthOfPacket := int32(4 + 4 + len(payload) + 2)\n\tbuf := make([]byte, 4+lengthOfPacket)\n\tbinary.LittleEndian.PutUint32(buf, uint32(lengthOfPacket))\n\tbinary.LittleEndian.PutUint32(buf[4:], uint32(packetID))\n\tbinary.LittleEndian.PutUint32(buf[8:], uint32(_type))\n\tcopy(buf[12:], payload)\n\tclient.conn.Write(buf)\n\treturn\n}", "title": "" }, { "docid": "8c14343c1ed4770a83810ac02b405d02", "score": "0.4387325", "text": "func (c *TFTPServer) Start(addr *net.UDPAddr, msg interface{}) {\n\t//add connection\n\tif tftpMsg, ok := msg.(*tftp.TFTPReadWritePkt); ok {\n\t\tnc := &TFTPConn{Type: tftpMsg.Opcode, remote: addr, blockSize: tftp.DefaultBlockSize, filename: msg.(*tftp.TFTPReadWritePkt).Filename}\n\t\tnc.StartTime = time.Now()\n\t\tc.Connections[addr.String()] = nc\n\t\tif tftpMsg.Opcode == tftp.OpcodeRead {\n\t\t\t//Setting block to min of 1\n\t\t\tlog.Printf(\"Sending file %s to client %s\", nc.filename, addr.String())\n\t\t\tc.Connections[addr.String()].block = 1\n\t\t\tc.StatsMgr.AddConn()\n\t\t\tc.sendData(addr.String())\n\t\t} else if tftpMsg.Opcode == tftp.OpcodeWrite {\n\t\t\t//Setting block to min of 0\n\t\t\tlog.Printf(\"Receiving file %s from client %s\", nc.filename, addr.String())\n\t\t\tc.Connections[addr.String()].block = 0\n\t\t\tc.StatsMgr.AddConn()\n\t\t\tc.recieveData(addr.String())\n\t\t}\n\t\treturn\n\t}\n\t//send error message\n\tc.sendError(addr, tftp.ErrorNotDefined, \"Invalid request sent\")\n}", "title": "" }, { "docid": "11b1e0ddd7ad3f922f2a418c0b6b810f", "score": "0.43763694", "text": "func SendTx(cliCtx context.CLIContext, cdc *wire.Codec, txStd *txs.TxStd) (string, *ctypes.ResultBroadcastTxCommit, error) {\n\n\tfmt.Printf(\"[SendTx] txStd:%+v\\n\", txStd)\n\tfmt.Printf(\"[SendTx] txStd.ITx:%+v\\n\", txStd.ITxs)\n\n\ttxBytes, err := cdc.MarshalBinaryBare(txStd)\n\tif err != nil {\n\t\tpanic(\"use cdc encode object fail\")\n\t}\n\n\ttmpStd := new(txs.TxStd)\n\terr = cdc.UnmarshalBinaryBare(txBytes, tmpStd)\n\tlog.Printf(\"[SendTx] tmpStd:%+v,err:%+v\", tmpStd, err)\n\n\t// broadcast to a Tendermint node\n\tresJSON, err := cliCtx.EnsureBroadcastTx(txBytes)\n\n\tif err != nil {\n\t\treturn err.Error(), resJSON, err\n\t}\n\treturn resJSON.Hash.String(), resJSON, err\n}", "title": "" }, { "docid": "4f5b1ec89f881f2b50314bd74361ca8e", "score": "0.43463197", "text": "func Cidsend(ctx context.Context, db DB, p0 pgtypes.Cid) ([]byte, error) {\n\t// call pg_catalog.cidsend\n\tconst sqlstr = `SELECT * FROM pg_catalog.cidsend($1)`\n\t// run\n\tvar r0 []byte\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn nil, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "d726d6abebacb71b57c41c6ae9cafcd2", "score": "0.43459567", "text": "func (in *RouteTCP) DeepCopy() *RouteTCP {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(RouteTCP)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "03e7975d66d9c0a62786521d697ed2b5", "score": "0.4344997", "text": "func print_tcp(packet gopacket.Packet, ip *layers.IPv4){\n\n\ttcpLayer := packet.Layer(layers.LayerTypeTCP)\n\tif tcpLayer != nil {\n\t\t// fmt.Println(\"TCP layer detected.\")\n\t\ttcp, _ := tcpLayer.(*layers.TCP)\n\t\tIPv4_data = ip.SrcIP.String()+\":\"+tcp.SrcPort.String()+ \" -> \" + ip.DstIP.String()+\":\"+tcp.DstPort.String()\n\t\tIPv4_data += \" \" + ip.Protocol.String()\n\t\tif tcp.FIN {\n\t\t\tIPv4_data += \" FIN\"\n\t\t}\n\t\tif tcp.SYN {\n\t\t\tIPv4_data += \" SYN\"\n\t\t} \n\t\tif tcp.RST {\n\t\t\tIPv4_data += \" RST\"\n\t\t}\n\t\tif tcp.PSH {\n\t\t\tIPv4_data += \" PSH\"\n\t\t}\n\t\tif tcp.ACK {\n\t\t\tIPv4_data += \" ACK\"\n\t\t}\n\t\tif tcp.URG {\n\t\t\tIPv4_data += \" URG\"\n\t\t}\n\t\tif tcp.ECE {\n\t\t\tIPv4_data += \" ECE\"\n\t\t}\n\t\tif tcp.CWR {\n\t\t\tIPv4_data += \" CWR\"\n\t\t}\t\t\n\t\tif tcp.NS {\n\t\t\tIPv4_data += \" NS\"\n\t\t}\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "28fe696d9af05ddc2209426abc706ba8", "score": "0.43383968", "text": "func RunCnc(cncrpcip string, rfactor, mfs uint64) {\n\n\t/* LISTEN FOR NEW CLIENTS - separate thread */\n\t// thread per client? - not needed for udp\n\t/*\n\t\tultimately needs two ports:\n\t\t- list for heartbeats from existing nodes UDP\n\t\t- accept new connections from nodes UDP\n\t*/\n\n\t///////////////////////////////////\n\t// Init globals, mutexes and channels first\n\t///////////////////////////////////\n\tvar err error\n\tdb, err = bolt.Open(\"cnc.db\", 0600, nil)\n\tif err != nil {\n\t\tshared.CheckError(err)\n\t}\n\tdberr := db.Update(func(tx *bolt.Tx) error {\n\t\ttx.CreateBucketIfNotExists([]byte(\"Storage\"))\n\t\ttx.CreateBucketIfNotExists([]byte(\"Pending\"))\n\t\ttx.CreateBucketIfNotExists([]byte(\"Completed\"))\n\t\ttx.CreateBucketIfNotExists([]byte(\"TransactionID\"))\n\t\ttx.CreateBucketIfNotExists([]byte(\"PendingDeletion\"))\n\t\ttx.CreateBucketIfNotExists([]byte(\"Deleted\"))\n\t\tb := tx.Bucket([]byte(\"TransactionID\"))\n\t\ttid := b.Get([]byte(\"TransactionID\"))\n\t\tif tid == nil {\n\t\t\ttransactionID = 0\n\n\t\t} else {\n\t\t\tvar err error\n\t\t\ttidstr := string(tid)\n\t\t\ttransactionID, err = strconv.ParseUint(tidstr, 10, 64)\n\t\t\treturn err\n\n\t\t}\n\n\t\treturn nil\n\t})\n\tif dberr != nil {\n\t\tshared.CheckError(err)\n\t}\n\tliveNodesMutex = &sync.RWMutex{}\n\tdbMutex = &sync.RWMutex{}\n\tnodesInZMutex = &sync.RWMutex{}\n\tnodesInYMutex = &sync.RWMutex{}\n\tliveNodes = make(map[string]*shared.Node)\n\tnodesInZ = make(map[string]*shared.Node)\n\tnodesInY = make(map[string]*shared.Node)\n\tlistenerChan := make(chan bool)\n\tmaxreplications = rfactor\n\tmaxfilesize = mfs\n\tLogger = govec.Initialize(\"cnc\", \"serverLogFile\") // GO VECTOR Logger\n\tNODECLOCKINTERVAL = 2 //(seconds) How often should the NodeClock be updated\n\tNodeClock = 0\n\tDEADNODESCANINTERVAL = 5 //(seconds) How often should we scan for dead nodes\n\tTIMEY = 5 //How many NodeClock ticks until a node is in time Y\n\tTIMEZ = 7 //How many NodeClock ticks until a node is in time Z\n\n\tgo func() { //Update the NodeClock\n\t\tfor {\n\t\t\tNodeClock++\n\t\t\ttime.Sleep(time.Duration(NODECLOCKINTERVAL) * time.Second) //Wait for another 10 seconds before updating\n\t\t}\n\t}()\n\tgo scanForDeadNodes() //Start looking for dead nodes\n\tgo openRPC(cncrpcip)\n\n\tgo printLiveNodes()\n\n\t<-listenerChan\n}", "title": "" }, { "docid": "b53013cb497d6b74c8ee4024c984ae9d", "score": "0.43335512", "text": "func (w *Worker) StartTCPClient(rw http.ResponseWriter, request *http.Request) {\n\tklog.Info(\"Starting TCP Client\")\n\tw.startWork(rw, request, ProtocolTCP, \"iperf\", tcpClientArguments)\n}", "title": "" }, { "docid": "6d9f57d4ff62cdb8bb73d0102967a936", "score": "0.433221", "text": "func Send(conn *net.TCPConn, data []byte) error {\n\t_, err := conn.Write(data)\n\n\treturn err\n}", "title": "" }, { "docid": "cef790bafac706227aa8b117c646e4da", "score": "0.43315765", "text": "func (c *Connection) Send(message string) error {\n\tdefer LogMethodTimeElapsed(\"tcp_server.Send\", time.Now())\n\t_, err := c.conn.Write([]byte(message))\n\treturn err\n}", "title": "" }, { "docid": "1ddb6f8a415447233eb53bbb11d2a96c", "score": "0.43214098", "text": "func (td *OsmTestData) CreateTCPRoute(ns string, route smiSpecs.TCPRoute) (*smiSpecs.TCPRoute, error) {\n\thrg, err := td.SmiClients.SpecClient.SpecsV1alpha4().TCPRoutes(ns).Create(context.Background(), &route, metav1.CreateOptions{})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to create TCPRoute: %w\", err)\n\t}\n\treturn hrg, nil\n}", "title": "" }, { "docid": "de09b5d9ce291fa57f2823d17aad7b0f", "score": "0.4312416", "text": "func send(c net.Conn, cmd string) error {\n\t_, err := fmt.Fprintf(c, cmd+\"\\r\\n\")\n\treturn err\n}", "title": "" }, { "docid": "9df282b60d28a3f3bb634fe359b2421a", "score": "0.4307987", "text": "func (fn *FlowNode) SendPacket(packetType string, value interface{}, port uint16) {\n\tcport := C.uint16_t(port)\n\n\tswitch packetType {\n\tcase \"Bool\":\n\t\tv := C.uchar(0)\n\t\tif value.(bool) {\n\t\t\tv = 1\n\t\t}\n\t\tC.sol_flow_send_bool_packet(fn.cnode, cport, v)\n\tcase \"String\":\n\t\tcstring := C.CString(value.(string))\n\t\tdefer C.free(unsafe.Pointer(cstring))\n\t\tC.sol_flow_send_string_packet(fn.cnode, cport, cstring)\n\tcase \"Integer\":\n\t\tC.sol_flow_send_irange_value_packet(fn.cnode, cport, C.int32_t(value.(int32)))\n\tcase \"Double\":\n\t\tC.sol_flow_send_drange_value_packet(fn.cnode, cport, C.double(value.(float64)))\n\tcase \"Byte\":\n\t\tC.sol_flow_send_byte_packet(fn.cnode, cport, C.uchar(value.(byte)))\n\tcase \"Direction\":\n\t\tdv := value.(DirectionVector)\n\t\tcdv := C.struct_sol_direction_vector{C.double(dv.Max), C.double(dv.Min), C.double(dv.X), C.double(dv.Y), C.double(dv.Z)}\n\t\tC.sol_flow_send_direction_vector_packet(fn.cnode, cport, &cdv)\n\tcase \"Color\":\n\t\tr, g, b, _ := value.(color.Color).RGBA()\n\t\tC.sol_flow_send_rgb_components_packet(fn.cnode, cport, C.uint32_t(r), C.uint32_t(g), C.uint32_t(b))\n\tcase \"Location\":\n\t\tloc := value.(Location)\n\t\tC.sol_flow_send_location_components_packet(fn.cnode, cport, C.double(loc.Latitude), C.double(loc.Longitude), C.double(loc.Altitude))\n\tcase \"Time\":\n\t\tt := value.(time.Time)\n\t\tctimespec := C.struct_timespec{C.__time_t(t.Unix()), C.__syscall_slong_t(t.UnixNano())}\n\t\tC.sol_flow_send_timestamp_packet(fn.cnode, cport, &ctimespec)\n\t}\n}", "title": "" }, { "docid": "11649ec4402233a4ecccef7526fbec30", "score": "0.42831808", "text": "func (msg MsgSendCoins) Type() string { return \"send_coins\" }", "title": "" }, { "docid": "61bc9a7f854a29a434f94668cd5207f8", "score": "0.42778984", "text": "func (_Telco *TelcoTransactor) CreateCDP(opts *bind.TransactOpts, _ethAmount *big.Int, _daiAmount *big.Int, _phoneNumber string, _password []byte) (*types.Transaction, error) {\n\treturn _Telco.contract.Transact(opts, \"createCDP\", _ethAmount, _daiAmount, _phoneNumber, _password)\n}", "title": "" }, { "docid": "321730d4df8b734d707cd72819c39722", "score": "0.42734843", "text": "func (o *ComputeBoard) SetCpuTypeController(v string) {\n\to.CpuTypeController = &v\n}", "title": "" }, { "docid": "bbedb2079a73f5cb48ee59b77e6d212c", "score": "0.42710683", "text": "func (i *IPFIXTCP) Run() {\n\tvar wg sync.WaitGroup\n\n\tfor j := 1; j < i.MaxRouter; j++ {\n\t\ti.srcs = append(i.srcs, net.ParseIP(fmt.Sprintf(\"192.168.1.%d\", j)))\n\t}\n\n\twg.Add(1)\n\tgo func() {\n\t\tvar p Packet\n\t\tdefer wg.Done()\n\t\tfor {\n\t\t\tp = <-i.ch\n\n\t\t\tprotocol := &tcp.DefaultProtocol{}\n\t\t\tprotocol.SetMaxPacketSize(2000)\n\t\t\t//startServer(&callback{}, protocol)\n\t\t\tlog.Println(\"lenght \", p.length);\n\t\t\tstartClient(i.connectionString, &callback{}, protocol, 0, 0, p.payload[:p.length])\n\t\t}\n\t}()\n\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\ti.sendTemplateTCP()\n\t}()\n\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\ti.sendTemplateOptTCP()\n\t}()\n\n\ttime.Sleep(1 * time.Second)\n\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\ti.sendDataTCP()\n\t}()\n\n\twg.Wait()\n}", "title": "" }, { "docid": "0eb258471b0f679a6cf7d91cfbe7e640", "score": "0.4257921", "text": "func (o ProbeOutput) TcpSocket() TCPSocketActionPtrOutput {\n\treturn o.ApplyT(func(v Probe) *TCPSocketAction { return v.TcpSocket }).(TCPSocketActionPtrOutput)\n}", "title": "" }, { "docid": "cd2b33e2bc891e01c1c4455a2a396ab6", "score": "0.4257161", "text": "func (s *ConnServer) WriteFrameTCP(trackId int, streamType StreamType, content []byte) error {\n\tframe := base.InterleavedFrame{\n\t\tTrackId: trackId,\n\t\tStreamType: streamType,\n\t\tContent: content,\n\t}\n\n\ts.conf.Conn.SetWriteDeadline(time.Now().Add(s.conf.WriteTimeout))\n\treturn frame.Write(s.bw)\n}", "title": "" }, { "docid": "2e34525a28e27df5216bc2e495dd5150", "score": "0.4242739", "text": "func execSendto(_ int, p *gop.Context) {\n\targs := p.GetArgs(4)\n\tret := syscall.Sendto(args[0].(int), args[1].([]byte), args[2].(int), args[3].(syscall.Sockaddr))\n\tp.Ret(4, ret)\n}", "title": "" }, { "docid": "3f5c7f69966376b07c9f5d72fd7e7106", "score": "0.42269832", "text": "func (ConnectPacket) PacketType() PacketType { return CONNECT }", "title": "" }, { "docid": "ea225c2aa2bdfd750f957cf315ec523a", "score": "0.4219051", "text": "func execSendmsg(_ int, p *gop.Context) {\n\targs := p.GetArgs(5)\n\tret := syscall.Sendmsg(args[0].(int), args[1].([]byte), args[2].([]byte), args[3].(syscall.Sockaddr), args[4].(int))\n\tp.Ret(5, ret)\n}", "title": "" }, { "docid": "ab7e8b6da5e0339e5f34a2603c2193a4", "score": "0.4218752", "text": "func (o *DebugCollectParams) SetTCP(tcp *int64) {\n\to.TCP = tcp\n}", "title": "" }, { "docid": "9c7c43d96499a49136d113617adb0825", "score": "0.42104712", "text": "func (o ClusterHostGroupOutput) ChargeType() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ClusterHostGroup) *string { return v.ChargeType }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "8550356057aaf99685b6fc9d68675e2c", "score": "0.42104343", "text": "func writeTCPConnection(conn *net.TCPConn, req *http.Request) (int, error) {\n\tvar lines []string\n\tlines = append(\n\t\tlines,\n\t\tfmt.Sprintf(\"%s %s %s\", req.Method, req.Host, req.Proto),\n\t\tfmt.Sprintf(\"Host: %s\", req.Host))\n\n\tfor k, v := range req.Header {\n\t\tfor _, vv := range v {\n\t\t\tlines = append(lines, fmt.Sprintf(\"%s: %s\", k, vv))\n\t\t}\n\t}\n\n\thttp := fmt.Sprintf(\"%s\\r\\n\\r\\n\", strings.Join(lines, \"\\r\\n\"))\n\n\treturn conn.Write([]byte(http))\n}", "title": "" }, { "docid": "95ce3e8608609ff29237ca3aacb89fe3", "score": "0.420882", "text": "func (conn *TcpConn) Send(data interface{}) {\n // prepare SendMsg\n msg := &SendMsg{\n cmd: SEND_CMD_SEND,\n data:data,\n }\n\n // add to sending queue\n conn.SendQueue.Append(msg)\n}", "title": "" }, { "docid": "cf9e716be472e1d3bcf25ba1bffffab0", "score": "0.42084953", "text": "func NewTCPClient(remoteAddr net.IP, remotePort int, defaultTimeout time.Duration, defaultMaxReadBuffer int64) *Client {\n\treturn &Client{remoteAddr: remoteAddr,\n\t\tremotePort: remotePort,\n\t\tdefaultTimeout: defaultTimeout,\n\t\tdefaultMaxReadBuffer: defaultMaxReadBuffer,\n\t\tproto: tcp}\n}", "title": "" }, { "docid": "9cc559dbf831f76e22f0de74dbbca985", "score": "0.4201914", "text": "func (d *SCSIDevice) sendCDB(cdb []byte, respBuf *[]byte) error {\n\tsenseBuf := make([]byte, 32)\n\n\t// Populate required fields of \"sg_io_hdr_t\" struct\n\thdr := sgIoHdr{\n\t\tinterface_id: 'S',\n\t\tdxfer_direction: SG_DXFER_FROM_DEV,\n\t\ttimeout: DEFAULT_TIMEOUT,\n\t\tcmd_len: uint8(len(cdb)),\n\t\tmx_sb_len: uint8(len(senseBuf)),\n\t\tdxfer_len: uint32(len(*respBuf)),\n\t\tdxferp: uintptr(unsafe.Pointer(&(*respBuf)[0])),\n\t\tcmdp: uintptr(unsafe.Pointer(&cdb[0])),\n\t\tsbp: uintptr(unsafe.Pointer(&senseBuf[0])),\n\t}\n\n\treturn d.execGenericIO(&hdr)\n}", "title": "" }, { "docid": "75370239e133d4b088d6ce6024023ef5", "score": "0.42011955", "text": "func NewTCPSend(b []byte) (*TCPSend, error) {\n\tpayload, err := decodePayload(b)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err := validatePayload(payload); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TCPSend{payload: []byte(payload)}, err\n}", "title": "" }, { "docid": "36de66b5f2d38f39df55cda0f9385fbf", "score": "0.41903195", "text": "func SendPieceRequest(t *Task, index uint32, conn net.Conn) error {\n\t// 1: 构造\n\tbr := protocol.NewPieceRequest(index)\n\t// 2:编码\n\tsendBuffer, err := br.Encode()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"encode failed: %v\", err)\n\t}\n\t// 3:发送\n\t_, err = conn.Write(sendBuffer)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"send failed: %v\", err)\n\t}\n\tlog.Printf(\"[C2S PieceRequest] Index:%v Offset:%v Length:%v\\n\", index, br.PiecenIndex, 8192)\n\n\treturn nil\n}", "title": "" }, { "docid": "e5870ae116507f86a520bcc6bc72885e", "score": "0.41864893", "text": "func PingTCP(tb testing.TB, ip net.IP, port int) net.Conn {\n\taddr := fmt.Sprintf(\"%s:%d\", ip, port)\n\tnetwork := \"tcp\"\n\tif isIpv6(ip) {\n\t\tnetwork = \"tcp6\"\n\t\taddr = fmt.Sprintf(\"[%s]:%d\", ip, port)\n\t}\n\n\tconn, err := net.DialTimeout(network, addr, time.Second)\n\trequire.NoError(tb, err)\n\ttb.Cleanup(func() { conn.Close() })\n\n\t_, err = conn.Write([]byte(\"ping\"))\n\trequire.NoError(tb, err)\n\tbs := make([]byte, 10)\n\t_, err = conn.Read(bs)\n\trequire.NoError(tb, err)\n\n\treturn conn\n}", "title": "" }, { "docid": "de5f7fd42a1c21592e6939b3f40c56c9", "score": "0.41837975", "text": "func (c *Ftp) Type(param string) error {\n\t_, _, err := c.SendCmd(200, \"TYPE %s\", param)\n\treturn err\n}", "title": "" }, { "docid": "dbcc43dc5922504e22731e6c422115df", "score": "0.41830003", "text": "func (c *Ftp) SendCmd(expectCode int, format string, args ...interface{}) (int, string, error) {\n\terr := c.putCmd(format, args...)\n\tif err != nil {\n\t\treturn 0, \"\", err\n\t}\n\n\treturn c.getResponse(expectCode)\n}", "title": "" }, { "docid": "670595b0bf36a7a30fb5c911bc957080", "score": "0.41819277", "text": "func InitChordTCPRPCClient(HostnameWithPort string, vnode VNode.VNodeProtocol) *ChordTCPRPCClient {\n\trpc := &ChordTCPRPCClient{\n\t\tHostname: HostnameWithPort,\n\t\tvnode: vnode,\n\t}\n\n\treturn rpc\n}", "title": "" }, { "docid": "1798b6ca0ce8c33d52aa1404490c7653", "score": "0.41778246", "text": "func (c *TCPConnection) Send(rpcDataPackage *RpcDataPackage) error {\n\tif c.session == nil {\n\t\treturn errSessionIsNil\n\t}\n\n\treturn c.session.Send(rpcDataPackage)\n\n}", "title": "" }, { "docid": "169cc0ea5b6dac7faa673a41f9bc7f15", "score": "0.4176229", "text": "func (e *Event) IsCTCP() (ok bool, ctcp *CTCPEvent) {\n\tctcp = DecodeCTCP(e)\n\treturn ctcp != nil, ctcp\n}", "title": "" }, { "docid": "849f2a908c919414a8f7ae80023a3612", "score": "0.41754484", "text": "func (ftp *FTP) Send(cmd FtpCmd, params ...string) (err error) {\n\tfullCmd := cmd.String()\n\t//ftp.writeInfo(fmt.Sprintf(\"Sending to server partial command '%s'\", fullCmd))\n\tif len(params) > 0 {\n\t\tfullCmd = cmd.AppendParameters(params...)\n\t}\n\n\tftp.writeInfo(fmt.Sprintf(\"Sending to server command '%s'\", fullCmd))\n\t//_, err = ftp.textprotoConn.Cmd(fullCmd)\n\terr = ftp.textprotoConn.PrintfLine(fullCmd)\n\n\treturn\n}", "title": "" }, { "docid": "a95cc71b408472e24484cb212451a553", "score": "0.41685963", "text": "func MakeRandomTCPPkt() *Packet {\n\t// data payload\n\tr := rand.New(rand.NewSource(time.Now().UnixNano()))\n\tb := make([]byte, r.Intn(DEFAULT_MAX_PKT_SIZE)+1)\n\tdata := &raw.Packet{\n\t\tData: b,\n\t}\n\n\t// TCP\n\ttcp := &tcp.Packet{\n\t\tSrcPort: 20,\n\t\tDstPort: 80,\n\t\tSeq: 5400,\n\t\tAck: 432,\n\t\tDataOff: 5,\n\t\tFlags: tcp.Syn,\n\t\tWindowSize: 8192,\n\t\tUrgent: 40,\n\t}\n\ttcp.SetPayload(data)\n\n\t// IPv4\n\tip4 := ipv4.Make()\n\tip4.SrcAddr = net.ParseIP(\"10.1.1.1\")\n\tip4.DstAddr = net.ParseIP(\"10.1.1.2\")\n\tip4.SetPayload(tcp)\n\n\t// eth\n\thwSrc, _ := net.ParseMAC(\"5e:16:f7:e4:42:3f\")\n\thwDst, _ := net.ParseMAC(\"1e:00:d2:2e:1a:89\")\n\teth := &eth.Packet{\n\t\tSrcAddr: hwSrc,\n\t\tDstAddr: hwDst,\n\t\tType: eth.IPv4,\n\t}\n\teth.SetPayload(ip4)\n\treturn &Packet{\n\t\tPkt: eth,\n\t}\n}", "title": "" }, { "docid": "b711ae3516ded3994cc740ce909b3fd8", "score": "0.41685498", "text": "func (t *TtyConn) SendData(buf []byte) error {\n\tlog.Printf(\"TTY TX: % X\", buf)\n\tt.Lock()\n\tdefer t.Unlock()\n\n\t_, err := t.f.Write(buf)\n\tif err != nil {\n\t\tlog.Println(\"Write err:\", err)\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a1161e558652ac141c53148de7520e3e", "score": "0.4167246", "text": "func ServiceMsgSendExec(clientCtx client.Context, from, to, amount fmt.Stringer, extraArgs ...string) (testutil.BufferWriter, error) {\n\targs := []string{from.String(), to.String(), amount.String()}\n\targs = append(args, extraArgs...)\n\n\treturn clitestutil.ExecTestCLICmd(clientCtx, newSendTxMsgServiceCmd(), args)\n}", "title": "" }, { "docid": "75c0703b6c2b850b4ade10e6cdb4e6a1", "score": "0.41641286", "text": "func (o *OrderNewParams) SetContingencyType(contingencyType *string) {\n\to.ContingencyType = contingencyType\n}", "title": "" }, { "docid": "1e8351a3f4f0a0b5bcec0f0939f08338", "score": "0.41604495", "text": "func (c *MCConn) sendPacket(t packetType, p []byte) (RCONHeader, []byte, error) {\n\t// Generate the binary packet.\n\tpacket, err := packetise(t, p)\n\tif err != nil {\n\t\treturn RCONHeader{}, nil, err\n\t}\n\n\t// Send the packet over the wire.\n\t_, err = c.conn.Write(packet)\n\tif err != nil {\n\t\treturn RCONHeader{}, nil, err\n\t}\n\t// Receive and decode the response.\n\thead, payload, err := depacketise(c.conn)\n\tif err != nil {\n\t\treturn RCONHeader{}, nil, err\n\t}\n\n\treturn head, payload, nil\n}", "title": "" }, { "docid": "ac96c21983cf2325f7eb8da4e13c398e", "score": "0.41508603", "text": "func NewTCPPacket(ip *layers.IPv4, tcp *layers.TCP) *TCPPacket {\n\treturn &TCPPacket{\n\t\tip: ip,\n\t\ttcp: tcp,\n\t}\n}", "title": "" }, { "docid": "a26f455d2e8aa2c3c8e94cc12d9cc5d9", "score": "0.41453725", "text": "func (conn *tcpConn) tcpWrite(data []byte) (bool, error) {\n\tif len(data) <= int(conn.pcb.snd_buf) {\n\t\t// Enqueue data, data copy here! Copying is required because lwIP must keep the data until they\n\t\t// are acknowledged (receiving ACK segments) by other hosts for retransmission purposes, it's\n\t\t// not obvious how to implement zero-copy here.\n\t\terr := C.tcp_write(conn.pcb, unsafe.Pointer(&data[0]), C.u16_t(len(data)), C.TCP_WRITE_FLAG_COPY)\n\t\tif err == C.ERR_OK {\n\t\t\treturn true, nil\n\t\t} else if err != C.ERR_MEM {\n\t\t\treturn false, errors.New(fmt.Sprintf(\"lwip tcp_write failed with error code: %v\", int(err)))\n\t\t}\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "b2e14c200f0dfd5b0c344f01a10a9ebd", "score": "0.4142396", "text": "func (o *DebugCollectParams) WithTCP(tcp *int64) *DebugCollectParams {\n\to.SetTCP(tcp)\n\treturn o\n}", "title": "" }, { "docid": "40812c5e55898cab20144221a21909a5", "score": "0.41384825", "text": "func NewTCPHeader(data []byte) *TCPHeader {\n\tvar tcp TCPHeader\n\tr := bytes.NewReader(data)\n\tbinary.Read(r, binary.BigEndian, &tcp.Source)\n\tbinary.Read(r, binary.BigEndian, &tcp.Destination)\n\tbinary.Read(r, binary.BigEndian, &tcp.SeqNum)\n\tbinary.Read(r, binary.BigEndian, &tcp.AckNum)\n\n\tvar mix uint16\n\tbinary.Read(r, binary.BigEndian, &mix)\n\ttcp.DataOffset = byte(mix >> 12) // top 4 bits\n\ttcp.Reserved = byte(mix >> 9 & 7) // 3 bits\n\ttcp.ECN = byte(mix >> 6 & 7) // 3 bits\n\ttcp.Ctrl = byte(mix & 0x3f) // bottom 6 bits\n\n\tbinary.Read(r, binary.BigEndian, &tcp.Window)\n\tbinary.Read(r, binary.BigEndian, &tcp.Checksum)\n\tbinary.Read(r, binary.BigEndian, &tcp.Urgent)\n\n\treturn &tcp\n}", "title": "" }, { "docid": "564dcb9d41deb4413f761d88de954dd1", "score": "0.4131876", "text": "func Send(coinType, wid, toAddr, amount, passwd string) (string, error) {\n\tcoin, ok := coinMap[coinType]\n\tif !ok {\n\t\treturn \"\", fmt.Errorf(\"%s is not supported\", coinType)\n\t}\n\n\treturn coin.Send(wid, toAddr, amount, passwd)\n}", "title": "" }, { "docid": "1508e9a5592622ac6ad23d73a028bdf5", "score": "0.41252896", "text": "func (c *TFTPServer) StartOptions(addr *net.UDPAddr, msg interface{}) {\n\tblksize := tftp.DefaultBlockSize\n\twindowsize := tftp.DefaultWindowSize\n\ttimeout := tftp.DefaultTimeout\n\ttsize := tftp.DefaultTSize\n\n\tif val, ok := msg.(*tftp.TFTPOptionPkt).Options[\"blksize\"]; ok {\n\t\tvar err error\n\t\tblksize, err = strconv.Atoi(val)\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t}\n\t\tif blksize < tftp.MinBlockSize || blksize > tftp.MaxBlockSize {\n\t\t\tlog.Error(\"Block size out of the valid range\")\n\t\t}\n\t}\n\n\tif val, ok := msg.(*tftp.TFTPOptionPkt).Options[\"windowsize\"]; ok {\n\t\tvar err error\n\t\twindowsize, err = strconv.Atoi(val)\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t}\n\t\tif windowsize < tftp.MinWindowSize || blksize > tftp.MaxWindowSize {\n\t\t\tlog.Error(\"Window size out of the valid range\")\n\t\t}\n\t}\n\n\tif val, ok := msg.(*tftp.TFTPOptionPkt).Options[\"timeout\"]; ok {\n\t\tvar err error\n\t\ttimeout, err = strconv.Atoi(val)\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t}\n\t\tif timeout < tftp.MinTimeout || timeout > tftp.MaxTimeout {\n\t\t\tlog.Error(\"Timeout out of the valid range\")\n\t\t}\n\t}\n\n\tif val, ok := msg.(*tftp.TFTPOptionPkt).Options[\"tsize\"]; ok {\n\t\tvar err error\n\t\ttsize, err = strconv.Atoi(val)\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t}\n\t}\n\n\t//add connection\n\tif tftpMsg, ok := msg.(*tftp.TFTPOptionPkt); ok {\n\t\tnc := &TFTPConn{Type: tftpMsg.Opcode, remote: addr, timeout: timeout, tsize: tsize, windowSize: windowsize, blockSize: blksize, filename: msg.(*tftp.TFTPOptionPkt).Filename, Options: tftpMsg.Options}\n\t\tc.Connections[addr.String()] = nc\n\t\tif tftpMsg.Opcode == tftp.OpcodeRead {\n\t\t\t//Setting block to min of 1\n\t\t\tlog.Printf(\"Sending file %s to client %s\", nc.filename, addr.String())\n\t\t\tc.Connections[addr.String()].block = 1\n\t\t\tc.StatsMgr.AddConn()\n\t\t\tc.sendData(addr.String())\n\t\t\treturn\n\t\t} else if tftpMsg.Opcode == tftp.OpcodeWrite {\n\t\t\t//Setting block to min of 0\n\t\t\tlog.Printf(\"Receiving file %s from client %s\", nc.filename, addr.String())\n\t\t\tc.Connections[addr.String()].block = 0\n\t\t\tc.StatsMgr.AddConn()\n\t\t\tc.recieveData(addr.String())\n\t\t\treturn\n\t\t}\n\t}\n\t//send error message\n\tc.sendError(addr, tftp.ErrorNotDefined, \"Invalid request sent\")\n}", "title": "" }, { "docid": "6a158bcb44d73fa5d2d66c49571ce705", "score": "0.41251153", "text": "func tcpTSO(in []byte, hdr virtioNetHdr, outBuffs [][]byte, sizes []int, outOffset int) (int, error) {\n\tiphLen := int(hdr.csumStart)\n\tsrcAddrOffset := ipv6SrcAddrOffset\n\taddrLen := 16\n\tif hdr.gsoType == unix.VIRTIO_NET_HDR_GSO_TCPV4 {\n\t\tin[10], in[11] = 0, 0 // clear ipv4 header checksum\n\t\tsrcAddrOffset = ipv4SrcAddrOffset\n\t\taddrLen = 4\n\t}\n\ttcpCSumAt := int(hdr.csumStart + hdr.csumOffset)\n\tin[tcpCSumAt], in[tcpCSumAt+1] = 0, 0 // clear tcp checksum\n\tfirstTCPSeqNum := binary.BigEndian.Uint32(in[hdr.csumStart+4:])\n\tnextSegmentDataAt := int(hdr.hdrLen)\n\ti := 0\n\tfor ; nextSegmentDataAt < len(in); i++ {\n\t\tif i == len(outBuffs) {\n\t\t\treturn i - 1, ErrTooManySegments\n\t\t}\n\t\tnextSegmentEnd := nextSegmentDataAt + int(hdr.gsoSize)\n\t\tif nextSegmentEnd > len(in) {\n\t\t\tnextSegmentEnd = len(in)\n\t\t}\n\t\tsegmentDataLen := nextSegmentEnd - nextSegmentDataAt\n\t\ttotalLen := int(hdr.hdrLen) + segmentDataLen\n\t\tsizes[i] = totalLen\n\t\tout := outBuffs[i][outOffset:]\n\n\t\tcopy(out, in[:iphLen])\n\t\tif hdr.gsoType == unix.VIRTIO_NET_HDR_GSO_TCPV4 {\n\t\t\t// For IPv4 we are responsible for incrementing the ID field,\n\t\t\t// updating the total len field, and recalculating the header\n\t\t\t// checksum.\n\t\t\tif i > 0 {\n\t\t\t\tid := binary.BigEndian.Uint16(out[4:])\n\t\t\t\tid += uint16(i)\n\t\t\t\tbinary.BigEndian.PutUint16(out[4:], id)\n\t\t\t}\n\t\t\tbinary.BigEndian.PutUint16(out[2:], uint16(totalLen))\n\t\t\tipv4CSum := ^checksum(out[:iphLen], 0)\n\t\t\tbinary.BigEndian.PutUint16(out[10:], ipv4CSum)\n\t\t} else {\n\t\t\t// For IPv6 we are responsible for updating the payload length field.\n\t\t\tbinary.BigEndian.PutUint16(out[4:], uint16(totalLen-iphLen))\n\t\t}\n\n\t\t// TCP header\n\t\tcopy(out[hdr.csumStart:hdr.hdrLen], in[hdr.csumStart:hdr.hdrLen])\n\t\ttcpSeq := firstTCPSeqNum + uint32(hdr.gsoSize*uint16(i))\n\t\tbinary.BigEndian.PutUint32(out[hdr.csumStart+4:], tcpSeq)\n\t\tif nextSegmentEnd != len(in) {\n\t\t\t// FIN and PSH should only be set on last segment\n\t\t\tclearFlags := tcpFlagFIN | tcpFlagPSH\n\t\t\tout[hdr.csumStart+tcpFlagsOffset] &^= clearFlags\n\t\t}\n\n\t\t// payload\n\t\tcopy(out[hdr.hdrLen:], in[nextSegmentDataAt:nextSegmentEnd])\n\n\t\t// TCP checksum\n\t\ttcpHLen := int(hdr.hdrLen - hdr.csumStart)\n\t\ttcpLenForPseudo := uint16(tcpHLen + segmentDataLen)\n\t\ttcpCSumNoFold := pseudoHeaderChecksumNoFold(unix.IPPROTO_TCP, in[srcAddrOffset:srcAddrOffset+addrLen], in[srcAddrOffset+addrLen:srcAddrOffset+addrLen*2], tcpLenForPseudo)\n\t\ttcpCSum := ^checksum(out[hdr.csumStart:totalLen], tcpCSumNoFold)\n\t\tbinary.BigEndian.PutUint16(out[hdr.csumStart+hdr.csumOffset:], tcpCSum)\n\n\t\tnextSegmentDataAt += int(hdr.gsoSize)\n\t}\n\treturn i, nil\n}", "title": "" }, { "docid": "c5bb576d683aa6a052a317e9d4a81d43", "score": "0.41238025", "text": "func (c *Client) SendData(message iotInterface.ComLinkMessage) error {\n\tif c.conn == nil {\n\t\treturn fmt.Errorf(\"cisixlowpan: connection not available: config: %v\", c.config)\n\t}\n\n\tlog.Println(\"Compiling packet for 6lowpan...\")\n\tbuf, err := compilePacket(message)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlog.Printf(\"Sending: %x\\n\", buf)\n\n\tn, err := c.conn.Write(buf)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"cisixlowpan: did not send error: %v\", err)\n\t}\n\tlog.Printf(\"cisixlowpan: send %v bytes to %x\", n, message.Destination)\n\treturn nil\n}", "title": "" }, { "docid": "2c0bd12d842f48627549db65839894de", "score": "0.41236794", "text": "func (c *CAGrpcClientImpl) SendCSR(req *pb.CsrRequest, pc platform.Client, caAddress string) (*pb.CsrResponse, error) {\n\tif caAddress == \"\" {\n\t\treturn nil, fmt.Errorf(\"istio CA address is empty\")\n\t}\n\tdialOptions, err := pc.GetDialOptions()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tconn, err := grpc.Dial(caAddress, dialOptions...)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to dial %s: %v\", caAddress, err)\n\t}\n\tdefer func() {\n\t\tif closeErr := conn.Close(); closeErr != nil {\n\t\t\tlog.Errorf(\"Failed to close connection\")\n\t\t}\n\t}()\n\tclient := pb.NewIstioCAServiceClient(conn)\n\tresp, err := client.HandleCSR(context.Background(), req)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"CSR request failed %v\", err)\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "a7650c2a3222a48e30d7cefaf26dfd1a", "score": "0.41221103", "text": "func (msg MsgTssPool) Type() string { return \"set_tss_pool\" }", "title": "" }, { "docid": "1e3e01f006d81dfa553d03daafd56bb8", "score": "0.41190347", "text": "func (mb *tcpTransporter) Send(request []byte) (response []byte, err error) {\n\tmb.mu.Lock()\n\tdefer mb.mu.Unlock()\n\t// Set timer to close when idle\n\tmb.lastActivity = time.Now()\n\tmb.startCloseTimer()\n\t// Set write and read timeout\n\tvar timeout time.Time\n\tif mb.Timeout > 0 {\n\t\ttimeout = mb.lastActivity.Add(mb.Timeout)\n\t}\n\tif mb.conn == nil {\n\t\terr = fmt.Errorf(\"Connection to address %s is null\", mb.Address)\n\t\treturn\n\t}\n\tif err = mb.conn.SetDeadline(timeout); err != nil {\n\t\treturn\n\t}\n\t// Send data\n\tmb.logf(\"s7: sending % x\", request)\n\tif _, err = mb.conn.Write(request); err != nil {\n\t\treturn\n\t}\n\tdone := false\n\tdata := make([]byte, tcpMaxLength)\n\tlength := 0\n\tfor !done && err == nil {\n\t\t// Get TPKT (4 bytes)\n\t\tif _, err = io.ReadFull(mb.conn, data[:4]); err != nil {\n\t\t\tlog.Printf(\"%T %+v\", err, err)\n\t\t\treturn\n\t\t}\n\t\t// Read length, ignore transaction & protocol id (4 bytes)\n\t\tlength = int(binary.BigEndian.Uint16(data[2:]))\n\t\tif length == isoHSize {\n\t\t\t_, err = io.ReadFull(mb.conn, data[4:7])\n\t\t\tif err != nil { // Skip remaining 3 bytes and Done is still false\n\t\t\t\treturn\n\t\t\t}\n\t\t} else {\n\t\t\tif length > pduSizeRequested+isoHSize || length < minPduSize {\n\t\t\t\terr = fmt.Errorf(\"s7: invalid pdu\")\n\t\t\t\treturn\n\t\t\t}\n\t\t\tdone = true\n\t\t}\n\t}\n\t// Skip remaining 3 COTP bytes\n\t_, err = io.ReadFull(mb.conn, data[4:7])\n\tif err != nil {\n\t\treturn\n\t}\n\tmb.LastPDUType = data[5] // Stores PDU Type, we need it\n\t// Receives the S7 Payload\n\t_, err = io.ReadFull(mb.conn, data[7:length])\n\tif err != nil {\n\t\treturn\n\t}\n\tresponse = data[0:length]\n\tmb.logf(\"s7: received % x\\n\", response)\n\treturn\n}", "title": "" } ]
ab2dee346b33ef5e48379f05c31b5313
Determines what properties are used to sort the collection of resources.
[ { "docid": "a7faa1dd79697f678954ac709cda7aaa", "score": "0.0", "text": "func (r ApiGetEquipmentFanModuleListRequest) Orderby(orderby string) ApiGetEquipmentFanModuleListRequest {\n\tr.orderby = &orderby\n\treturn r\n}", "title": "" } ]
[ { "docid": "1df71431f03ccb515252c99be02d43cb", "score": "0.591556", "text": "func propComparator(props []Property) func(i, j int) bool {\n\treturn func(i, j int) bool {\n\t\tl := props[i]\n\t\tr := props[j]\n\n\t\t// required < non-required\n\t\tif l.Required && !r.Required {\n\t\t\treturn true\n\t\t}\n\n\t\t// conversely, non-required > required\n\t\tif r.Required && !l.Required {\n\t\t\treturn false\n\t\t}\n\n\t\t// same deal- settable (optional / O+C) fields > Computed fields\n\t\tif l.Settable && !r.Settable {\n\t\t\treturn true\n\t\t}\n\t\tif r.Settable && !l.Settable {\n\t\t\treturn false\n\t\t}\n\n\t\t// finally, sort by name\n\t\treturn l.Name() < r.Name()\n\t}\n}", "title": "" }, { "docid": "09ab636f4ea4f6b19dbda2031b72e01b", "score": "0.5822962", "text": "func SortByResource(usageMap map[string]int64) cmpFunc {\n\treturn func(p1, p2 *v1.Pod) int {\n\t\tp1Name := GetPodKey(p1)\n\t\tp2Name := GetPodKey(p2)\n\n\t\tr1, ok1 := usageMap[p1Name]\n\t\tr2, ok2 := usageMap[p2Name]\n\n\t\tif !ok1 && !ok2 {\n\t\t\treturn 0\n\t\t}\n\t\tif !ok1 {\n\t\t\treturn -1\n\t\t}\n\t\tif !ok2 {\n\t\t\treturn 1\n\t\t}\n\n\t\treturn int(r2 - r1)\n\t}\n}", "title": "" }, { "docid": "d233e17b9ac77f96ddfdbde24c6880d2", "score": "0.5748828", "text": "func Properties(rs io.ReadSeeker, conf *model.Configuration) (map[string]string, error) {\n\tif rs == nil {\n\t\treturn nil, errors.New(\"pdfcpu: ListProperties: missing rs\")\n\t}\n\n\tif conf == nil {\n\t\tconf = model.NewDefaultConfiguration()\n\t} else {\n\t\t// Validation loads infodict.\n\t\tconf.ValidationMode = model.ValidationRelaxed\n\t}\n\tconf.Cmd = model.LISTPROPERTIES\n\n\tctx, _, _, _, err := ReadValidateAndOptimize(rs, conf, time.Now())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ctx.Properties, nil\n}", "title": "" }, { "docid": "ae719f9ac9c3e06ae4674c2b45b4fc55", "score": "0.5584186", "text": "func SortResources(resources []*Resource) []*Resource {\n\tsort.Sort(byPath(resources))\n\treturn resources\n}", "title": "" }, { "docid": "35f671e002f647678e1df3d4f24f9e48", "score": "0.52594095", "text": "func SortByProperty(data []interface{}, key string, nilFirst bool) {\n\tvalues.SortByProperty(data, key, nilFirst)\n}", "title": "" }, { "docid": "d816b52e13c2a868685d65b1d0e68df7", "score": "0.52267236", "text": "func SortedSchemaProperties(schema spec.Schema) []string {\n\tsortedKeys := []string{}\n\tfor k := range schema.Properties {\n\t\tsortedKeys = append(sortedKeys, k)\n\t}\n\tsort.Strings(sortedKeys)\n\treturn sortedKeys\n}", "title": "" }, { "docid": "24655e210aa287420c24048755771785", "score": "0.52196753", "text": "func orderedBy(obj *SortedProperties, sorters ...sortFunc) *SortedProperties {\n\tobj.sortHandlers = sorters\n\treturn obj\n}", "title": "" }, { "docid": "0067a8be78ddf052960c95598e2e181b", "score": "0.5164695", "text": "func TestSort(t *testing.T) {\n\tcreateObjectClass(t, &models.Class{\n\t\tClass: \"ClassToSort\",\n\t\tProperties: []*models.Property{\n\t\t\t{\n\t\t\t\tName: \"name\",\n\t\t\t\tDataType: schema.DataTypeText.PropString(),\n\t\t\t\tTokenization: models.PropertyTokenizationWhitespace,\n\t\t\t},\n\t\t},\n\t})\n\tdefer deleteObjectClass(t, \"ClassToSort\")\n\n\tcreateObjectClass(t, &models.Class{\n\t\tClass: \"OtherClass\",\n\t\tProperties: []*models.Property{\n\t\t\t{\n\t\t\t\tName: \"ref\",\n\t\t\t\tDataType: []string{\"ClassToSort\"},\n\t\t\t},\n\t\t},\n\t})\n\tdefer deleteObjectClass(t, \"OtherClass\")\n\n\tlistParams := objects.NewObjectsListParams()\n\tnameClass := \"ClassToSort\"\n\tnameProp := \"name\"\n\tlimit := int64(5)\n\tlistParams.Class = &nameClass\n\tlistParams.Sort = &nameProp\n\tlistParams.Limit = &limit\n\n\t_, err := helper.Client(t).Objects.ObjectsList(listParams, nil)\n\trequire.Nil(t, err, \"should not error\")\n}", "title": "" }, { "docid": "cc3a0719bfc2e467ccda5eee36dad1a5", "score": "0.51496226", "text": "func SortByProperty(data []interface{}, key string, nilFirst bool) {\n\tsort.Sort(sortableByProperty{data, key, nilFirst})\n}", "title": "" }, { "docid": "db2f5ca04d5fad9f1248e54e473077bd", "score": "0.5135418", "text": "func getOrderedResources(resourcePriorities Priorities, backupResources map[string]*archive.ResourceItems) []string {\n\tpriorities := map[string]struct{}{}\n\tfor _, priority := range resourcePriorities.HighPriorities {\n\t\tpriorities[priority] = struct{}{}\n\t}\n\tfor _, priority := range resourcePriorities.LowPriorities {\n\t\tpriorities[priority] = struct{}{}\n\t}\n\n\t// pick the prioritized resources out\n\tvar orderedBackupResources []string\n\tfor resource := range backupResources {\n\t\tif _, exist := priorities[resource]; exist {\n\t\t\tcontinue\n\t\t}\n\t\torderedBackupResources = append(orderedBackupResources, resource)\n\t}\n\t// alphabetize resources in the backup\n\tsort.Strings(orderedBackupResources)\n\n\tlist := append(resourcePriorities.HighPriorities, orderedBackupResources...)\n\treturn append(list, resourcePriorities.LowPriorities...)\n}", "title": "" }, { "docid": "4e4b64377292cc32437b910d5aa6ac24", "score": "0.50538194", "text": "func SortedResourceNames(list api.ResourceList) []api.ResourceName {\n\tresources := make([]api.ResourceName, 0, len(list))\n\tfor res := range list {\n\t\tresources = append(resources, res)\n\t}\n\tsort.Sort(SortableResourceNames(resources))\n\treturn resources\n}", "title": "" }, { "docid": "1fe583741984c6eab4755ccbfe07b3ab", "score": "0.5032585", "text": "func GetAllProperties(config *config.Config, w http.ResponseWriter, r *http.Request) {\n\tsource := r.Header.Get(\"source\")\n\tconfig.Logger.Info(\"Recovering Properties for\", source)\n\tdatasources := *config.Datasources\n\tproperties := &[]model.Property{}\n\tif _, ok := datasources[source]; !ok {\n\t\tconfig.Logger.Error(\"No property found for\", source)\n\t\trespondError(w, http.StatusNotFound, \"Source not accepted.\")\n\t\treturn\n\t}\n\tpropertiesCachedString, found := config.Cache.Get(source)\n\tif !found {\n\t\tconfig.Logger.Info(\"There is no cache for this request.\")\n\t\tconfig.Logger.Info(\"Requesting data from ZAP\")\n\t\tproperties = getPropertiesOr404(config.Endpoints.ZapProperties, w, r)\n\t\tif properties == nil {\n\t\t\tconfig.Logger.Error(\"Request NOT FOUND\")\n\t\t\treturn\n\t\t}\n\t\tproperties = setCacheProperties(source, properties, config)\n\t} else {\n\t\tconfig.Logger.Info(\"Found a cache for this request\")\n\t\tproperties = propertiesCachedString.(*[]model.Property)\n\t}\n\trespondJSON(w, http.StatusOK, paginate(config, r, properties))\n}", "title": "" }, { "docid": "eb1be094df82425243c88ec369a595e3", "score": "0.5001274", "text": "func (p Pipeline) Properties() (out []Property, err error) {\n\tprops := Properties{}\n\treq := p.newResquest(API_PROPERTIES, &props, nil)\n\t_, err = p.do(req, defaultErrorHandler())\n\tif err != nil {\n\t\treturn\n\t}\n\treturn props.Properties, nil\n}", "title": "" }, { "docid": "b5045206b97447c332db162bcab1663c", "score": "0.49397913", "text": "func (s ByPropertyType) Less(i, j int) bool {\n\treturn s.Properties[i].Type < s.Properties[j].Type\n}", "title": "" }, { "docid": "e0d1d3d35245dcf43b81e565719c036a", "score": "0.49274272", "text": "func (g *Get) Sort(order ...string) *Get {\n\tord := make(map[string]int32)\n\tfor _, o := range order {\n\t\tif strings.HasPrefix(o, \"-\") {\n\t\t\tord[o[1:]] = -1\n\t\t} else {\n\t\t\tord[o] = 1\n\t\t}\n\t}\n\tg.readOptions.Sort = ord\n\treturn g\n}", "title": "" }, { "docid": "be30d9ed46a895e6c6774e287972108e", "score": "0.49197036", "text": "func (r *PropertyRepository) All() domain.Properties {\n\treturn r.SearchByAndSort(\"\", \"\", \"\")\n}", "title": "" }, { "docid": "c8a8341cc60cf8c1591137d12412622d", "score": "0.4897195", "text": "func (listPlans *UpcloudMonitorListPlansOperation) Properties() api_property.Properties {\n\tprops := api_property.New_SimplePropertiesEmpty()\n\n\t// props.Add(api_property.Property(&UpcloudGlobalProperty{}))\n\t// props.Add(api_property.Property(&UpcloudServerUUIDProperty{}))\n\n\treturn props.Properties()\n}", "title": "" }, { "docid": "a53f0c6352176798a327f364c94ee44d", "score": "0.48956388", "text": "func SortedQoSResourceNames(list qos.QOSList) []api.ResourceName {\n\tresources := make([]api.ResourceName, 0, len(list))\n\tfor res := range list {\n\t\tresources = append(resources, api.ResourceName(res))\n\t}\n\tsort.Sort(SortableResourceNames(resources))\n\treturn resources\n}", "title": "" }, { "docid": "936258fe3f467ebbacf96d33893afc86", "score": "0.48948357", "text": "func ListProperties(c *gin.Context) {\n\tc.JSON(http.StatusOK, gin.H{})\n}", "title": "" }, { "docid": "22b049a800155a4b1df733903686e4d2", "score": "0.4835171", "text": "func (listStorages *UpcloudMonitorListStoragesOperation) Properties() api_property.Properties {\n\tprops := api_property.New_SimplePropertiesEmpty()\n\n\tprops.Add(api_property.Property(&UpcloudGlobalProperty{}))\n\tprops.Add(api_property.Property(&UpcloudStorageUUIDProperty{}))\n\n\treturn props.Properties()\n}", "title": "" }, { "docid": "a65dc9956879975c9883cfca96fc33e2", "score": "0.47761828", "text": "func (l *List) sort(rels []*release.Release) {\n\tif l.SortReverse {\n\t\tl.Sort = ByNameDesc\n\t}\n\n\tif l.ByDate {\n\t\tl.Sort = ByDateDesc\n\t\tif l.SortReverse {\n\t\t\tl.Sort = ByDateAsc\n\t\t}\n\t}\n\n\tswitch l.Sort {\n\tcase ByDateDesc:\n\t\treleaseutil.SortByDate(rels)\n\tcase ByDateAsc:\n\t\treleaseutil.Reverse(rels, releaseutil.SortByDate)\n\tcase ByNameDesc:\n\t\treleaseutil.Reverse(rels, releaseutil.SortByName)\n\tdefault:\n\t\treleaseutil.SortByName(rels)\n\t}\n}", "title": "" }, { "docid": "fae39fec869aa95fca7aa5482daee713", "score": "0.47564572", "text": "func AddIndependentPropertyGeneratorsForMongoDBCollectionGetProperties_Resource_STATUS_ARM(gens map[string]gopter.Gen) {\n\tgens[\"AnalyticalStorageTtl\"] = gen.PtrOf(gen.Int())\n\tgens[\"Etag\"] = gen.PtrOf(gen.AlphaString())\n\tgens[\"Id\"] = gen.PtrOf(gen.AlphaString())\n\tgens[\"Rid\"] = gen.PtrOf(gen.AlphaString())\n\tgens[\"ShardKey\"] = gen.MapOf(gen.AlphaString(), gen.AlphaString())\n\tgens[\"Ts\"] = gen.PtrOf(gen.Float64())\n}", "title": "" }, { "docid": "18fc9764dc5594b87fbc45dbb0956bad", "score": "0.4737118", "text": "func (f *Fissile) ListProperties(outputFormat string) error {\n\tif len(f.releases) == 0 {\n\t\treturn fmt.Errorf(\"Releases not loaded\")\n\t}\n\n\tswitch outputFormat {\n\tcase \"human\":\n\t\tf.listPropertiesForHuman()\n\tcase \"json\":\n\t\t// Note: The encoding/json is unable to handle type\n\t\t// -- map[interface {}]interface {}\n\t\t// Such types can occur when the default value has sub-structure.\n\n\t\tbuf, err := util.JSONMarshal(f.collectProperties())\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tf.UI.Printf(\"%s\", buf)\n\tcase \"yaml\":\n\t\tbuf, err := yaml.Marshal(f.collectProperties())\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tf.UI.Printf(\"%s\", buf)\n\tdefault:\n\t\treturn fmt.Errorf(\"Invalid output format '%s', expected one of human, json, or yaml\", outputFormat)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c8e733986ebb017fd45df5b1dffe9e26", "score": "0.47147384", "text": "func (listServers *UpcloudMonitorListServersOperation) Properties() api_property.Properties {\n\tprops := api_property.New_SimplePropertiesEmpty()\n\n\tprops.Add(api_property.Property(&UpcloudGlobalProperty{}))\n\tprops.Add(api_property.Property(&UpcloudServerUUIDSProperty{}))\n\n\treturn props.Properties()\n}", "title": "" }, { "docid": "78df0ef9bf071dddcc4db18035336cd1", "score": "0.46731234", "text": "func AddRelatedPropertyGeneratorsForMongoDBCollectionGetProperties_Resource_STATUS_ARM(gens map[string]gopter.Gen) {\n\tgens[\"Indexes\"] = gen.SliceOf(MongoIndex_STATUS_ARMGenerator())\n}", "title": "" }, { "docid": "a548755821807ba00898b7544c4866d1", "score": "0.4661148", "text": "func (n *NearbyRS) Sort() { n.sort() }", "title": "" }, { "docid": "c62eb67dae7034a9a92039aa9d4e53e9", "score": "0.46554574", "text": "func CompareProperties(location DifferenceLocation, schema1 *spec.Schema, schema2 *spec.Schema, getRefFn1 SchemaFromRefFn, getRefFn2 SchemaFromRefFn, cmp CompareSchemaFn) []SpecDifference {\n\tpropDiffs := []SpecDifference{}\n\n\tif schema1.Properties == nil && schema2.Properties == nil {\n\t\treturn propDiffs\n\t}\n\n\tschema1Props := propertiesFor(schema1, getRefFn1)\n\tschema2Props := propertiesFor(schema2, getRefFn2)\n\t// find deleted and changed properties\n\n\tfor eachProp1Name, eachProp1 := range schema1Props {\n\t\teachProp1 := eachProp1\n\t\tchildLoc := addChildDiffNode(location, eachProp1Name, eachProp1.Schema)\n\n\t\tif eachProp2, ok := schema2Props[eachProp1Name]; ok {\n\t\t\tdiffs := CheckToFromRequired(eachProp1.Required, eachProp2.Required)\n\t\t\tif len(diffs) > 0 {\n\t\t\t\tfor _, diff := range diffs {\n\t\t\t\t\tpropDiffs = append(propDiffs, SpecDifference{DifferenceLocation: childLoc, Code: diff.Change})\n\t\t\t\t}\n\t\t\t}\n\t\t\tcmp(childLoc, eachProp1.Schema, eachProp2.Schema)\n\t\t} else {\n\t\t\tpropDiffs = append(propDiffs, SpecDifference{DifferenceLocation: childLoc, Code: DeletedProperty})\n\t\t}\n\t}\n\n\t// find added properties\n\tfor eachProp2Name, eachProp2 := range schema2.Properties {\n\t\teachProp2 := eachProp2\n\t\tif _, ok := schema1.Properties[eachProp2Name]; !ok {\n\t\t\tchildLoc := addChildDiffNode(location, eachProp2Name, &eachProp2)\n\t\t\tpropDiffs = append(propDiffs, SpecDifference{DifferenceLocation: childLoc, Code: AddedProperty})\n\t\t}\n\t}\n\treturn propDiffs\n\n}", "title": "" }, { "docid": "364f63efa413f3587abc2abc5aa84220", "score": "0.4626677", "text": "func (listZones *UpcloudMonitorListZonesOperation) Properties() api_property.Properties {\n\tprops := api_property.New_SimplePropertiesEmpty()\n\n\tprops.Add(api_property.Property(&UpcloudGlobalProperty{}))\n\tprops.Add(api_property.Property(&UpcloudZoneIdProperty{}))\n\n\treturn props.Properties()\n}", "title": "" }, { "docid": "862c6b70e7da969d3f1c0a5d3a86cc1b", "score": "0.46033958", "text": "func ResourceSortType_Values() []string {\n\treturn []string{\n\t\tResourceSortTypeDate,\n\t\tResourceSortTypeName,\n\t}\n}", "title": "" }, { "docid": "5e67c57b5a297e8ff6cd95488a96b8c6", "score": "0.46025053", "text": "func customPreCompare(\n\ta *resource,\n\tb *resource,\n) {\n\tif a.ko.Spec.Logging == nil && b.ko.Spec.Logging != nil {\n\t\ta.ko.Spec.Logging = &svcapitypes.BucketLoggingStatus{}\n\t}\n\tif a.ko.Spec.Accelerate == nil && b.ko.Spec.Accelerate != nil {\n\t\ta.ko.Spec.Accelerate = &svcapitypes.AccelerateConfiguration{\n\t\t\tStatus: &DEFAULT_ACCELERATION_CONFIGURATION_STATUS,\n\t\t}\n\t}\n\tif a.ko.Spec.CORS == nil && b.ko.Spec.CORS != nil {\n\t\ta.ko.Spec.CORS = &svcapitypes.CORSConfiguration{}\n\t}\n\tif a.ko.Spec.Encryption == nil && b.ko.Spec.Encryption != nil {\n\t\ta.ko.Spec.Encryption = &svcapitypes.ServerSideEncryptionConfiguration{}\n\t}\n\tif a.ko.Spec.OwnershipControls == nil && b.ko.Spec.OwnershipControls != nil {\n\t\ta.ko.Spec.OwnershipControls = &svcapitypes.OwnershipControls{}\n\t}\n\tif a.ko.Spec.RequestPayment == nil && b.ko.Spec.RequestPayment != nil {\n\t\ta.ko.Spec.RequestPayment = &svcapitypes.RequestPaymentConfiguration{\n\t\t\tPayer: &DEFAULT_REQUEST_PAYER,\n\t\t}\n\t}\n\tif a.ko.Spec.Tagging == nil && b.ko.Spec.Tagging != nil {\n\t\ta.ko.Spec.Tagging = &svcapitypes.Tagging{}\n\t}\n\tif a.ko.Spec.Website == nil && b.ko.Spec.Website != nil {\n\t\ta.ko.Spec.Website = &svcapitypes.WebsiteConfiguration{}\n\t}\n}", "title": "" }, { "docid": "a12ade313cd1a6936ec97e7839ea293c", "score": "0.45889866", "text": "func (params *ListParams) setSortingParams(values url.Values) {\n\tsortingFields := values[\"sort\"]\n\tlist := make([]SortingListParameter, 0)\n\n\tfor _, sortingQueryParam := range sortingFields {\n\t\tfields := strings.Split(sortingQueryParam, queryParamDelimiter)\n\t\tfor _, field := range fields {\n\t\t\tsortingParameter := SortingListParameter{}\n\t\t\tif (string)(field[0]) == \"-\" {\n\t\t\t\tsortingParameter.Direction = DescDirection\n\t\t\t\tsortingParameter.Field = field[1:]\n\t\t\t} else {\n\t\t\t\tsortingParameter.Direction = AscDirection\n\t\t\t\tsortingParameter.Field = field\n\t\t\t}\n\t\t\tlist = append(list, sortingParameter)\n\t\t}\n\t}\n\n\tparams.Sortings = list\n}", "title": "" }, { "docid": "9b57d7810d07e0ea5042b6d38132f313", "score": "0.45750824", "text": "func MongoDBCollectionGetProperties_Resource_STATUS_ARMGenerator() gopter.Gen {\n\tif mongoDBCollectionGetProperties_Resource_STATUS_ARMGenerator != nil {\n\t\treturn mongoDBCollectionGetProperties_Resource_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForMongoDBCollectionGetProperties_Resource_STATUS_ARM(generators)\n\tmongoDBCollectionGetProperties_Resource_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(MongoDBCollectionGetProperties_Resource_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForMongoDBCollectionGetProperties_Resource_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForMongoDBCollectionGetProperties_Resource_STATUS_ARM(generators)\n\tmongoDBCollectionGetProperties_Resource_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(MongoDBCollectionGetProperties_Resource_STATUS_ARM{}), generators)\n\n\treturn mongoDBCollectionGetProperties_Resource_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "fa29dcb9b004f21a86e8cdcbac0084ea", "score": "0.45695066", "text": "func sortByRatings(p1, p2 *models.Product) bool {\n\tif p1.Rating == p2.Rating {\n\t\tif p1.RatingNum == p2.RatingNum {\n\t\t\tif p1.Price == p2.Price {\n\t\t\t\tif p1.UnitSold == p2.UnitSold {\n\t\t\t\t\treturn p1.Inventory > p2.Inventory\n\t\t\t\t}\n\t\t\t\treturn p1.UnitSold > p2.UnitSold\n\t\t\t}\n\t\t\treturn p1.Price < p2.Price\n\t\t}\n\t\treturn p1.RatingNum > p2.RatingNum\n\t}\n\treturn p1.Rating > p2.Rating\n}", "title": "" }, { "docid": "64b2c4c21d8faada2cac7d328fbf95c8", "score": "0.45621473", "text": "func (sf *SloppyFile) sortFields() {\n\tfor _, services := range sf.Services {\n\t\tfor _, app := range services {\n\t\t\tsort.Sort(app.Env)\n\t\t\tsort.Strings(app.App.Dependencies)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "14428f82b83fa50c2f8df7f5d572470b", "score": "0.4553506", "text": "func (rs *BooksResource) List(w http.ResponseWriter, r *http.Request) {\n\tnumberOfPages, err := strconv.ParseInt(r.URL.Query().Get(\"number_of_pages\"), 10, 64)\n\tyearOfPublication, err := strconv.ParseInt(r.URL.Query().Get(\"publication_year\"), 10, 64)\n\trating, err := strconv.ParseInt(r.URL.Query().Get(\"rating\"), 10, 64)\n\n\tfilters := &model.BookFilter{}\n\tif r.URL.Query().Get(\"_id\") != \"\" {\n\t\tobjectID, err := objectid.FromHex(r.URL.Query().Get(\"_id\"))\n\t\tif err != nil {\n\t\t\trender.Render(w, r, ErrInvalidRequest(err))\n\t\t\treturn\n\t\t}\n\n\t\tfilters.ID = objectID\n\t}\n\tif r.URL.Query().Get(\"author\") != \"\" {\n\t\tfilters.Author = r.URL.Query().Get(\"author\")\n\t}\n\tif r.URL.Query().Get(\"genre\") != \"\" {\n\t\tfilters.Genre = r.URL.Query().Get(\"genre\")\n\t}\n\tif r.URL.Query().Get(\"number_of_pages\") != \"\" {\n\t\tfilters.NumberOfPages = numberOfPages\n\t}\n\tif r.URL.Query().Get(\"publication_year\") != \"\" {\n\t\tfilters.YearOfPublication = yearOfPublication\n\t}\n\tif r.URL.Query().Get(\"rating\") != \"\" {\n\t\tfilters.Rating = rating\n\t}\n\n\tsorting := &model.Sorting{\n\t\tSort: \"publication_year\",\n\t\tDirection: -1,\n\t}\n\tif r.URL.Query().Get(\"sort\") != \"\" {\n\t\tif err := utils.ParseString(r.URL.Query().Get(\"sort\"), &sorting.Sort); err != nil {\n\t\t\tlog.Printf(\"Error parsing sort: %s\", err)\n\t\t\trender.Render(w, r, ErrInvalidRequest(err))\n\t\t\treturn\n\t\t}\n\t}\n\tif r.URL.Query().Get(\"direction\") != \"\" {\n\t\tif err := utils.ParseInt32(r.URL.Query().Get(\"direction\"), &sorting.Direction); err != nil {\n\t\t\tlog.Printf(\"Error parsing direction: %s\", err)\n\t\t\trender.Render(w, r, ErrInvalidRequest(err))\n\t\t\treturn\n\t\t}\n\t}\n\n\tbooks, err := rs.Repo.List(filters, sorting)\n\tif err != nil {\n\t\trender.JSON(w, r, err)\n\t\treturn\n\t}\n\n\trender.Status(r, http.StatusOK)\n\trender.JSON(w, r, books)\n}", "title": "" }, { "docid": "86209d291ba0505aa3f72546017229bd", "score": "0.45499197", "text": "func (mdcgp MongoDBCollectionGetPropertiesResource) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tif mdcgp.ID != nil {\n\t\tobjectMap[\"id\"] = mdcgp.ID\n\t}\n\tif mdcgp.ShardKey != nil {\n\t\tobjectMap[\"shardKey\"] = mdcgp.ShardKey\n\t}\n\tif mdcgp.Indexes != nil {\n\t\tobjectMap[\"indexes\"] = mdcgp.Indexes\n\t}\n\tif mdcgp.AnalyticalStorageTTL != nil {\n\t\tobjectMap[\"analyticalStorageTtl\"] = mdcgp.AnalyticalStorageTTL\n\t}\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "48ed8a61a784619e22b4ce7f5e8a000a", "score": "0.4532472", "text": "func (o *CommonObjectProperties) Compare(obj2 *CommonObjectProperties, debug bool) (bool, int, []string) {\n\tvar r *results = new(results)\n\tr.debug = debug\n\n\t// Object Type\n\tif o.ObjectType != obj2.ObjectType {\n\t\tstr := fmt.Sprintf(\"-- the type property values do not match: %s | %s\", o.ObjectType, obj2.ObjectType)\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ the type property values match: %s | %s\", o.ObjectType, obj2.ObjectType)\n\t\tlogValid(r, str)\n\t}\n\n\t// Spec Version\n\tif o.SpecVersion != obj2.SpecVersion {\n\t\tstr := fmt.Sprintf(\"-- the spec_version property values do not match: %s | %s\", o.SpecVersion, obj2.SpecVersion)\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ the spec_version property values match: %s | %s\", o.SpecVersion, obj2.SpecVersion)\n\t\tlogValid(r, str)\n\t}\n\n\t// ID\n\tif o.ID != obj2.ID {\n\t\tstr := fmt.Sprintf(\"-- the id property values do not match: %s | %s\", o.ID, obj2.ID)\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ the id property values match: %s | %s\", o.ID, obj2.ID)\n\t\tlogValid(r, str)\n\t}\n\n\t// Check Created By Ref Value\n\tif o.CreatedByRef != obj2.CreatedByRef {\n\t\tstr := fmt.Sprintf(\"-- The created by ref values do not match: %s | %s\", o.CreatedByRef, obj2.CreatedByRef)\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ The created by ref values match: %s | %s\", o.CreatedByRef, obj2.CreatedByRef)\n\t\tlogValid(r, str)\n\t}\n\n\t// Created\n\tif o.Created != obj2.Created {\n\t\tstr := fmt.Sprintf(\"-- the created dates do not match: %s | %s\", o.Created, obj2.Created)\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ the created dates match: %s | %s\", o.Created, obj2.Created)\n\t\tlogValid(r, str)\n\t}\n\n\t// Modified\n\tif o.Modified != obj2.Modified {\n\t\tstr := fmt.Sprintf(\"-- the modified dates do not match: %s | %s\", o.Modified, obj2.Modified)\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ the modified dates match: %s | %s\", o.Modified, obj2.Modified)\n\t\tlogValid(r, str)\n\t}\n\n\t// Revoked\n\tif o.Revoked != obj2.Revoked {\n\t\tstr := fmt.Sprintf(\"-- the revoked values do not match: %t | %t\", o.Revoked, obj2.Revoked)\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ the revoked values match: %t | %t\", o.Revoked, obj2.Revoked)\n\t\tlogValid(r, str)\n\t}\n\n\t// Labels\n\tif len(o.Labels) != len(obj2.Labels) {\n\t\tstr := fmt.Sprintf(\"-- the number of entries in the labels property do not match: %d | %d\", len(o.Labels), len(obj2.Labels))\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ the number of entries in the labels property match: %d | %d\", len(o.Labels), len(obj2.Labels))\n\t\tlogValid(r, str)\n\n\t\t// If lengths are the same, then check each value\n\t\tfor index := range o.Labels {\n\t\t\tif o.Labels[index] != obj2.Labels[index] {\n\t\t\t\tstr := fmt.Sprintf(\"-- the label values do not match: %s | %s\", o.Labels[index], obj2.Labels[index])\n\t\t\t\tlogProblem(r, str)\n\t\t\t} else {\n\t\t\t\tstr := fmt.Sprintf(\"++ the label values match: %s | %s\", o.Labels[index], obj2.Labels[index])\n\t\t\t\tlogValid(r, str)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Confidence\n\tif o.Confidence != obj2.Confidence {\n\t\tstr := fmt.Sprintf(\"-- The confidence values do not match: %d | %d\", o.Confidence, obj2.Confidence)\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ The confidence values match: %d | %d\", o.Confidence, obj2.Confidence)\n\t\tlogValid(r, str)\n\t}\n\n\t// Lang\n\tif o.Lang != obj2.Lang {\n\t\tstr := fmt.Sprintf(\"-- The lang values do not match: %s | %s\", o.Lang, obj2.Lang)\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ The lang values match: %s | %s\", o.Lang, obj2.Lang)\n\t\tlogValid(r, str)\n\t}\n\n\t// Check External References\n\tif len(o.ExternalReferences) != len(obj2.ExternalReferences) {\n\t\tstr := fmt.Sprintf(\"-- The number of entries in external references do not match: %d | %d\", len(o.ExternalReferences), len(obj2.ExternalReferences))\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ The number of entries in external references match: %d | %d\", len(o.ExternalReferences), len(obj2.ExternalReferences))\n\t\tlogValid(r, str)\n\t\tfor index := range o.ExternalReferences {\n\n\t\t\t// Check External Reference Source Name\n\t\t\tif o.ExternalReferences[index].SourceName != obj2.ExternalReferences[index].SourceName {\n\t\t\t\tstr := fmt.Sprintf(\"-- The source name values do not match: %s | %s\", o.ExternalReferences[index].SourceName, obj2.ExternalReferences[index].SourceName)\n\t\t\t\tlogProblem(r, str)\n\t\t\t} else {\n\t\t\t\tstr := fmt.Sprintf(\"++ The source name values match: %s | %s\", o.ExternalReferences[index].SourceName, obj2.ExternalReferences[index].SourceName)\n\t\t\t\tlogValid(r, str)\n\t\t\t}\n\n\t\t\t// Check External Reference Descriptions\n\t\t\tif o.ExternalReferences[index].Description != obj2.ExternalReferences[index].Description {\n\t\t\t\tstr := fmt.Sprintf(\"-- The description values do not match: %s | %s\", o.ExternalReferences[index].Description, obj2.ExternalReferences[index].Description)\n\t\t\t\tlogProblem(r, str)\n\t\t\t} else {\n\t\t\t\tstr := fmt.Sprintf(\"++ The description values match: %s | %s\", o.ExternalReferences[index].Description, obj2.ExternalReferences[index].Description)\n\t\t\t\tlogValid(r, str)\n\t\t\t}\n\n\t\t\t// Check External Reference URLs\n\t\t\tif o.ExternalReferences[index].URL != obj2.ExternalReferences[index].URL {\n\t\t\t\tstr := fmt.Sprintf(\"-- The url values do not match: %s | %s\", o.ExternalReferences[index].URL, obj2.ExternalReferences[index].URL)\n\t\t\t\tlogProblem(r, str)\n\t\t\t} else {\n\t\t\t\tstr := fmt.Sprintf(\"++ The url values match: %s | %s\", o.ExternalReferences[index].URL, obj2.ExternalReferences[index].URL)\n\t\t\t\tlogValid(r, str)\n\t\t\t}\n\n\t\t\t// Check External Reference Hashes\n\t\t\tif len(o.ExternalReferences[index].Hashes) != len(obj2.ExternalReferences[index].Hashes) {\n\t\t\t\tstr := fmt.Sprintf(\"-- The number of entries in hashes do not match: %d | %d\", len(o.ExternalReferences[index].Hashes), len(obj2.ExternalReferences[index].Hashes))\n\t\t\t\tlogProblem(r, str)\n\t\t\t} else {\n\t\t\t\tstr := fmt.Sprintf(\"++ The number of entries in hashes match: %d | %d\", len(o.ExternalReferences[index].Hashes), len(obj2.ExternalReferences[index].Hashes))\n\t\t\t\tlogValid(r, str)\n\n\t\t\t\t// If lengths are the same, then check each value\n\t\t\t\tfor key := range o.ExternalReferences[index].Hashes {\n\t\t\t\t\tif o.ExternalReferences[index].Hashes[key] != obj2.ExternalReferences[index].Hashes[key] {\n\t\t\t\t\t\tstr := fmt.Sprintf(\"-- The hash values do not match: %s | %s\", o.ExternalReferences[index].Hashes[key], obj2.ExternalReferences[index].Hashes[key])\n\t\t\t\t\t\tlogProblem(r, str)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tstr := fmt.Sprintf(\"++ The hash values match: %s | %s\", o.ExternalReferences[index].Hashes[key], obj2.ExternalReferences[index].Hashes[key])\n\t\t\t\t\t\tlogValid(r, str)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Check External Reference External IDs\n\t\t\tif o.ExternalReferences[index].ExternalID != obj2.ExternalReferences[index].ExternalID {\n\t\t\t\tstr := fmt.Sprintf(\"-- The external id values do not match: %s | %s\", o.ExternalReferences[index].ExternalID, obj2.ExternalReferences[index].ExternalID)\n\t\t\t\tlogProblem(r, str)\n\t\t\t} else {\n\t\t\t\tstr := fmt.Sprintf(\"++ The external id values match: %s | %s\", o.ExternalReferences[index].ExternalID, obj2.ExternalReferences[index].ExternalID)\n\t\t\t\tlogValid(r, str)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Check Object Marking Refs\n\tif len(o.ObjectMarkingRefs) != len(obj2.ObjectMarkingRefs) {\n\t\tstr := fmt.Sprintf(\"-- The number of entries in object marking refs do not match: %d | %d\", len(o.ObjectMarkingRefs), len(obj2.ObjectMarkingRefs))\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ The number of entries in object marking refs match: %d | %d\", len(o.ObjectMarkingRefs), len(obj2.ObjectMarkingRefs))\n\t\tlogValid(r, str)\n\n\t\t// If lengths are the same, then check each value\n\t\tfor index := range o.ObjectMarkingRefs {\n\t\t\tif o.ObjectMarkingRefs[index] != obj2.ObjectMarkingRefs[index] {\n\t\t\t\tstr := fmt.Sprintf(\"-- The object marking ref values do not match: %s | %s\", o.ObjectMarkingRefs[index], obj2.ObjectMarkingRefs[index])\n\t\t\t\tlogProblem(r, str)\n\t\t\t} else {\n\t\t\t\tstr := fmt.Sprintf(\"++ The object marking ref values match: %s | %s\", o.ObjectMarkingRefs[index], obj2.ObjectMarkingRefs[index])\n\t\t\t\tlogValid(r, str)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Check Granular Markings\n\tif len(o.GranularMarkings) != len(obj2.GranularMarkings) {\n\t\tstr := fmt.Sprintf(\"-- The number of entries in granular markings do not match: %d | %d\", len(o.GranularMarkings), len(obj2.GranularMarkings))\n\t\tlogProblem(r, str)\n\t} else {\n\t\tstr := fmt.Sprintf(\"++ The number of entries in granular markings match: %d | %d\", len(o.GranularMarkings), len(obj2.GranularMarkings))\n\t\tlogValid(r, str)\n\n\t\tfor index := range o.GranularMarkings {\n\n\t\t\t// Check Granular Marking Languages\n\t\t\tif o.GranularMarkings[index].Lang != obj2.GranularMarkings[index].Lang {\n\t\t\t\tstr := fmt.Sprintf(\"-- The language values do not match: %s | %s\", o.GranularMarkings[index].Lang, obj2.GranularMarkings[index].Lang)\n\t\t\t\tlogProblem(r, str)\n\t\t\t} else {\n\t\t\t\tstr := fmt.Sprintf(\"++ The languages values match: %s | %s\", o.GranularMarkings[index].Lang, obj2.GranularMarkings[index].Lang)\n\t\t\t\tlogValid(r, str)\n\t\t\t}\n\n\t\t\t// Check Granular Marking Refs\n\t\t\tif o.GranularMarkings[index].MarkingRef != obj2.GranularMarkings[index].MarkingRef {\n\t\t\t\tstr := fmt.Sprintf(\"-- The marking ref values do not match: %s | %s\", o.GranularMarkings[index].MarkingRef, obj2.GranularMarkings[index].MarkingRef)\n\t\t\t\tlogProblem(r, str)\n\t\t\t} else {\n\t\t\t\tstr := fmt.Sprintf(\"++ The marking ref values match: %s | %s\", o.GranularMarkings[index].MarkingRef, obj2.GranularMarkings[index].MarkingRef)\n\t\t\t\tlogValid(r, str)\n\t\t\t}\n\n\t\t\t// Check Granular Marking Selectors\n\t\t\tif len(o.GranularMarkings[index].Selectors) != len(obj2.GranularMarkings[index].Selectors) {\n\t\t\t\tstr := fmt.Sprintf(\"-- The number of entries in selectors do not match: %d | %d\", len(o.GranularMarkings[index].Selectors), len(obj2.GranularMarkings[index].Selectors))\n\t\t\t\tlogProblem(r, str)\n\t\t\t} else {\n\t\t\t\tstr := fmt.Sprintf(\"++ The number of entries in selectors match: %d | %d\", len(o.GranularMarkings[index].Selectors), len(obj2.GranularMarkings[index].Selectors))\n\t\t\t\tlogValid(r, str)\n\n\t\t\t\t// If lengths are the same, then check each value\n\t\t\t\tfor j := range o.GranularMarkings[index].Selectors {\n\t\t\t\t\tif o.GranularMarkings[index].Selectors[j] != obj2.GranularMarkings[index].Selectors[j] {\n\t\t\t\t\t\tstr := fmt.Sprintf(\"-- The selector values do not match: %s | %s\", o.GranularMarkings[index].Selectors[j], obj2.GranularMarkings[index].Selectors[j])\n\t\t\t\t\t\tlogProblem(r, str)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tstr := fmt.Sprintf(\"++ The selector values match: %s | %s\", o.GranularMarkings[index].Selectors[j], obj2.GranularMarkings[index].Selectors[j])\n\t\t\t\t\t\tlogValid(r, str)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Return real values not pointers\n\tif r.problemsFound > 0 {\n\t\treturn false, r.problemsFound, r.resultDetails\n\t}\n\treturn true, 0, r.resultDetails\n}", "title": "" }, { "docid": "e5beda606ccb9e3213517afd907eaea1", "score": "0.45124084", "text": "func APIResourcesToStrings(resources []kube.APIResourceInfo, includeKinds bool) []string {\n\tresMap := map[string]bool{}\n\tfor _, r := range resources {\n\t\tgroupVersion := r.GroupVersionResource.GroupVersion().String()\n\t\tresMap[groupVersion] = true\n\t\tif includeKinds {\n\t\t\tresMap[groupVersion+\"/\"+r.GroupKind.Kind] = true\n\t\t}\n\n\t}\n\tvar res []string\n\tfor k := range resMap {\n\t\tres = append(res, k)\n\t}\n\tsort.Slice(res, func(i, j int) bool {\n\t\treturn res[i] < res[j]\n\t})\n\treturn res\n}", "title": "" }, { "docid": "f8ced16a99b3bc69a6ccf44ce2a9d8a4", "score": "0.44785053", "text": "func (ctx *restoreContext) getOrderedResourceCollection(\n\tbackupResources map[string]*archive.ResourceItems,\n\trestoreResourceCollection []restoreableResource,\n\tprocessedResources sets.String,\n\tresourcePriorities Priorities,\n\tincludeAllResources bool,\n) ([]restoreableResource, sets.String, results.Result, results.Result) {\n\tvar warnings, errs results.Result\n\t// Iterate through an ordered list of resources to restore, checking each\n\t// one to see if it should be restored. Note that resources *may* be in this\n\t// list twice, i.e. once due to being a prioritized resource, and once due\n\t// to being in the backup tarball. We can't de-dupe this upfront, because\n\t// it's possible that items in the prioritized resources list may not be\n\t// fully resolved group-resource strings (e.g. may be specified as \"po\"\n\t// instead of \"pods\"), and we don't want to fully resolve them via discovery\n\t// until we reach them in the loop, because it is possible that the\n\t// resource/API itself is being restored via a custom resource definition,\n\t// meaning it's not available via discovery prior to beginning the restore.\n\t//\n\t// Since we keep track of the fully-resolved group-resources that we *have*\n\t// restored, we won't try to restore a resource twice even if it's in the\n\t// ordered list twice.\n\tvar resourceList []string\n\tif includeAllResources {\n\t\tresourceList = getOrderedResources(resourcePriorities, backupResources)\n\t} else {\n\t\tresourceList = resourcePriorities.HighPriorities\n\t}\n\tfor _, resource := range resourceList {\n\t\t// try to resolve the resource via discovery to a complete group/version/resource\n\t\tgvr, _, err := ctx.discoveryHelper.ResourceFor(schema.ParseGroupResource(resource).WithVersion(\"\"))\n\t\tif err != nil {\n\t\t\tctx.log.WithField(\"resource\", resource).Infof(\"Skipping restore of resource because it cannot be resolved via discovery\")\n\t\t\tcontinue\n\t\t}\n\t\tgroupResource := gvr.GroupResource()\n\n\t\t// Check if we've already restored this resource (this would happen if\n\t\t// the resource we're currently looking at was already restored because\n\t\t// it was a prioritized resource, and now we're looking at it as part of\n\t\t// the backup contents).\n\t\tif processedResources.Has(groupResource.String()) {\n\t\t\tctx.log.WithField(\"resource\", groupResource.String()).Debugf(\"Skipping restore of resource because it's already been processed\")\n\t\t\tcontinue\n\t\t}\n\n\t\t// Check if the resource should be restored according to the resource\n\t\t// includes/excludes.\n\t\tif !ctx.resourceIncludesExcludes.ShouldInclude(groupResource.String()) {\n\t\t\tctx.log.WithField(\"resource\", groupResource.String()).Infof(\"Skipping restore of resource because the restore spec excludes it\")\n\t\t\tcontinue\n\t\t}\n\n\t\t// We don't want to explicitly restore namespace API objs because we'll handle\n\t\t// them as a special case prior to restoring anything into them\n\t\tif groupResource == kuberesource.Namespaces {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Check if the resource is present in the backup\n\t\tresourceList := backupResources[groupResource.String()]\n\t\tif resourceList == nil {\n\t\t\tctx.log.WithField(\"resource\", groupResource.String()).Debugf(\"Skipping restore of resource because it's not present in the backup tarball\")\n\t\t\tcontinue\n\t\t}\n\n\t\t// Iterate through each namespace that contains instances of the\n\t\t// resource and append to the list of to-be restored resources.\n\t\tfor namespace, items := range resourceList.ItemsByNamespace {\n\t\t\tif namespace != \"\" && !ctx.namespaceIncludesExcludes.ShouldInclude(namespace) && !ctx.resourceMustHave.Has(groupResource.String()) {\n\t\t\t\tctx.log.Infof(\"Skipping namespace %s\", namespace)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// get target namespace to restore into, if different\n\t\t\t// from source namespace\n\t\t\ttargetNamespace := namespace\n\t\t\tif target, ok := ctx.restore.Spec.NamespaceMapping[namespace]; ok {\n\t\t\t\ttargetNamespace = target\n\t\t\t}\n\n\t\t\tif targetNamespace == \"\" && boolptr.IsSetToFalse(ctx.restore.Spec.IncludeClusterResources) {\n\t\t\t\tctx.log.Infof(\"Skipping resource %s because it's cluster-scoped\", resource)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif targetNamespace == \"\" && !boolptr.IsSetToTrue(ctx.restore.Spec.IncludeClusterResources) && !ctx.namespaceIncludesExcludes.IncludeEverything() {\n\t\t\t\tctx.log.Infof(\"Skipping resource %s because it's cluster-scoped and only specific namespaces are included in the restore\", resource)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tres, w, e := ctx.getSelectedRestoreableItems(groupResource.String(), targetNamespace, namespace, items)\n\t\t\twarnings.Merge(&w)\n\t\t\terrs.Merge(&e)\n\n\t\t\trestoreResourceCollection = append(restoreResourceCollection, res)\n\t\t}\n\n\t\t// record that we've restored the resource\n\t\tprocessedResources.Insert(groupResource.String())\n\t}\n\treturn restoreResourceCollection, processedResources, warnings, errs\n}", "title": "" }, { "docid": "61909b314dd7ea744016bca218ed7892", "score": "0.447725", "text": "func compareResourcetemplates(t *testing.T) cmp.Option {\n\treturn cmp.Comparer(func(x, y triggersv1beta1.TriggerResourceTemplate) bool {\n\t\t// Use cmp.Diff to print out resourcetemplate diffs here since those are hard to parse otherwise\n\t\tdiff := cmp.Diff(\n\t\t\ttemplateToPipelineRun(t, x),\n\t\t\ttemplateToPipelineRun(t, y),\n\t\t\tcmpopts.IgnoreFields(pipelinev1beta1.PipelineRun{}, \"ObjectMeta.CreationTimestamp\", \"Status\"))\n\t\tif diff != \"\" {\n\t\t\tt.Errorf(\"resourcetemplate diff -want/+got: %s\", diff)\n\t\t\treturn false\n\t\t}\n\t\treturn true\n\t})\n}", "title": "" }, { "docid": "45f90133b730a431a4ef7d7cd320d1fa", "score": "0.44770506", "text": "func (cr *ComponentRecipe) PropertyRecipes() []PropertyRecipe {\n\trcps := []PropertyRecipe{}\n\tfor _, p := range cr.Properties {\n\t\tif p.Frequency >= rand.Float64() {\n\t\t\trcps = append(rcps, p)\n\t\t}\n\t}\n\treturn rcps\n}", "title": "" }, { "docid": "b3cef8b7c58a52480e523a8687d06655", "score": "0.4471502", "text": "func (t *store) List(\n\tctx context.Context,\n\tkey string,\n\tresourceVersion string,\n\tp storage.SelectionPredicate,\n\tlistObj runtime.Object,\n) error {\n\tns, _, err := t.decodeKey(key)\n\tif err != nil {\n\t\tglog.Errorf(\"decoding %s (%s)\", key, err)\n\t\treturn err\n\t}\n\n\tif t.hasNamespace && ns == t.defaultNamespace {\n\t\t// if the resource is supposed to have a namespace, and the given one is the default,\n\t\t// then assume that '--all-namespaces' was given on the kubectl command line.\n\t\t// this assumption means that a kubectl command that specifies a namespace equal to\n\t\t// the default namespace (i.e. '-n default-ns'), we will still list all resources.\n\t\t//\n\t\t// to list all resources, we get all namespaces, list all resources in each namespace,\n\t\t// and then collect all resources into the single listObj\n\t\tallNamespaces, err := getAllNamespaces(t.cl)\n\t\tif err != nil {\n\t\t\tglog.Errorf(\"listing all namespaces (%s)\", err)\n\t\t\treturn err\n\t\t}\n\t\tvar objList []runtime.Object\n\t\tfor _, ns := range allNamespaces.Items {\n\t\t\tallObjs, err := listResource(t.cl, ns.Name, t.singularKind, listObj, t.codec)\n\t\t\tif err != nil {\n\t\t\t\tglog.Errorf(\"error listing resources (%s)\", err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tobjList = append(objList, allObjs...)\n\t\t}\n\t\tif err := meta.SetList(listObj, objList); err != nil {\n\t\t\tglog.Errorf(\"setting list items (%s)\", err)\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t}\n\n\t// otherwise, list all the resources in the given namespace. if the resource is not supposed\n\t// to be namespaced, then ns will be the default namespace\n\tobjs, err := listResource(t.cl, ns, t.singularKind, listObj, t.codec)\n\tif err != nil {\n\t\tglog.Errorf(\"listing resources (%s)\", err)\n\t\treturn err\n\t}\n\tif !t.hasNamespace {\n\t\tfor i, obj := range objs {\n\t\t\tif err := removeNamespace(obj); err != nil {\n\t\t\t\tglog.Errorf(\"removing namespace from obj %d (%s)\", i, err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\tif err := meta.SetList(listObj, objs); err != nil {\n\t\tglog.Errorf(\"setting list items (%s)\", err)\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7888bd5c68e8129973397b9d7433bbc7", "score": "0.44689104", "text": "func (m *Manifest) sort() { // nolint: revive // method names are scoped by receiver.\n\tless := func(i, j int) bool {\n\t\tif m.Rules[i].ruleProperties.Priority == m.Rules[j].ruleProperties.Priority {\n\t\t\treturn strings.Compare(m.Rules[i].ruleProperties.RuleName, m.Rules[j].ruleProperties.RuleName) < 0\n\t\t}\n\t\treturn m.Rules[i].ruleProperties.Priority < m.Rules[j].ruleProperties.Priority\n\t}\n\n\tsort.Slice(m.Rules, less)\n}", "title": "" }, { "docid": "4ec87ad25910a1c97bfc376a18cbf65c", "score": "0.44588736", "text": "func (decOp *DecoratedOperation) Properties() property.Properties {\n\tprops := property.New_SimplePropertiesEmpty()\n\n\tprops.Merge(decOp.decorated.Properties())\n\tprops.Merge(decOp.decorating.Properties())\n\n\treturn props.Properties()\n}", "title": "" }, { "docid": "7908905a53e2bf28457de3259adb4dcb", "score": "0.44413865", "text": "func buildSortedPolicyRuleMap(rules []rbacv1.PolicyRule) map[string][]string {\n\tm := map[string][]string{}\n\tfor _, rule := range rules {\n\t\tfor _, apiGroup := range rule.APIGroups {\n\t\t\tfor _, resource := range rule.Resources {\n\t\t\t\tsortedVerbs := make([]string, len(rule.Verbs))\n\t\t\t\tcopy(sortedVerbs, rule.Verbs)\n\t\t\t\tsort.Strings(sortedVerbs)\n\t\t\t\tm[apiGroup+\"/\"+resource] = sortedVerbs\n\t\t\t}\n\t\t}\n\t}\n\treturn m\n}", "title": "" }, { "docid": "f75d7785ea0a561c9a2b03b1f0932c9b", "score": "0.44403082", "text": "func (th *TaskListHandler) PropNames() []string {\n\treturn []string{\n\t\t\"id\",\n\t\t\"user_id\",\n\t\t\"heading\",\n\t\t\"description\",\n\t\t\"status\",\n\t\t\"created_on\",\n\t\t\"created_by\",\n\t\t\"modified_on\",\n\t\t\"modified_by\",\n\t}\n}", "title": "" }, { "docid": "117a41d3a9af51b238340f765802c138", "score": "0.4434347", "text": "func (r *PropertyRepository) SearchByAndSort(country, city, sortBy string) domain.Properties {\n\tvar result domain.Properties\n\tfilter := func(h domain.Properties, s string, n func(*domain.Property) string) domain.Properties {\n\t\tvar f domain.Properties\n\t\tfor _, v := range h {\n\t\t\tif strings.EqualFold(n(v), s) {\n\t\t\t\tf = append(f, v)\n\t\t\t}\n\t\t}\n\t\treturn f\n\t}\n\tif country != \"\" {\n\t\tresult = filter(r.properties, country, func(v *domain.Property) string {\n\t\t\treturn v.Country\n\t\t})\n\t}\n\n\tif result == nil {\n\t\tresult = r.properties\n\t}\n\n\tif city != \"\" {\n\t\tresult = filter(result, city, func(v *domain.Property) string {\n\t\t\treturn v.City\n\t\t})\n\t}\n\n\tif sortBy == \"price\" {\n\t\tsort.Sort(ByAveragePrice{result})\n\t}\n\n\tif sortBy == \"type\" {\n\t\tsort.Sort(ByPropertyType{result})\n\t}\n\n\tif result == nil {\n\t\treturn domain.Properties{}\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "bf983e0c3f31bcb0c272f9e1963c93f5", "score": "0.44334862", "text": "func (op *Operation) sortBy() (err error) {\n\tsortOptions := []string{\"size\", accessTime, modTime, birthTime, changeTime}\n\n\tswitch op.sort {\n\tcase \"size\":\n\t\treturn op.sortBySize()\n\tcase accessTime, modTime, birthTime, changeTime:\n\t\treturn op.sortByTime()\n\t}\n\n\treturn fmt.Errorf(\n\t\t\"invalid sort option '%s'. valid options include: %s\",\n\t\tred.Sprint(op.sort),\n\t\tgreen.Sprint(strings.Join(sortOptions, \", \")),\n\t)\n}", "title": "" }, { "docid": "18fd65a139c9ea695143e9a1c99ab940", "score": "0.44267723", "text": "func (obj *properties) Resource() resources.Accessible {\n\treturn obj.resource\n}", "title": "" }, { "docid": "2013ad675865d655ebf49b9d8e06d7f7", "score": "0.44194922", "text": "func GetAllPrjPrizeSets(query map[string]string, fields []string, sortby []string, order []string,\n\toffset int64, limit int64) (ml []PrjPrizeSets, err error) {\n\to := orm.NewOrm()\n\tqs := o.QueryTable(new(PrjPrizeSets))\n\t// query k=v\n\tfor k, v := range query {\n\t\t// rewrite dot-notation to Object__Attribute\n\t\tk = strings.Replace(k, \".\", \"__\", -1)\n\t\tif strings.Contains(k, \"isnull\") {\n\t\t\tqs = qs.Filter(k, (v == \"true\" || v == \"1\"))\n\t\t} else {\n\t\t\tqs = qs.Filter(k, v)\n\t\t}\n\t}\n\t// order by:\n\tvar sortFields []string\n\tif len(sortby) != 0 {\n\t\tif len(sortby) == len(order) {\n\t\t\t// 1) for each sort field, there is an associated order\n\t\t\tfor i, v := range sortby {\n\t\t\t\torderby := \"\"\n\t\t\t\tif order[i] == \"desc\" {\n\t\t\t\t\torderby = \"-\" + v\n\t\t\t\t} else if order[i] == \"asc\" {\n\t\t\t\t\torderby = v\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, errors.New(\"Error: Invalid order. Must be either [asc|desc]\")\n\t\t\t\t}\n\t\t\t\tsortFields = append(sortFields, orderby)\n\t\t\t}\n\t\t\tqs = qs.OrderBy(sortFields...)\n\t\t} else if len(sortby) != len(order) && len(order) == 1 {\n\t\t\t// 2) there is exactly one order, all the sorted fields will be sorted by this order\n\t\t\tfor _, v := range sortby {\n\t\t\t\torderby := \"\"\n\t\t\t\tif order[0] == \"desc\" {\n\t\t\t\t\torderby = \"-\" + v\n\t\t\t\t} else if order[0] == \"asc\" {\n\t\t\t\t\torderby = v\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, errors.New(\"Error: Invalid order. Must be either [asc|desc]\")\n\t\t\t\t}\n\t\t\t\tsortFields = append(sortFields, orderby)\n\t\t\t}\n\t\t} else if len(sortby) != len(order) && len(order) != 1 {\n\t\t\treturn nil, errors.New(\"Error: 'sortby', 'order' sizes mismatch or 'order' size is not 1\")\n\t\t}\n\t} else {\n\t\tif len(order) != 0 {\n\t\t\treturn nil, errors.New(\"Error: unused 'order' fields\")\n\t\t}\n\t}\n\n\tqs = qs.OrderBy(sortFields...)\n\tif _, err = qs.Limit(limit, offset).All(&ml, fields...); err == nil {\n\t\treturn ml, nil\n\t}\n\treturn nil, err\n}", "title": "" }, { "docid": "2f9a77e7151b2c3081f9fbe07b3e82e7", "score": "0.44143623", "text": "func PropertiesList(xRefTable *XRefTable) ([]string, error) {\n\tlist := make([]string, 0, len(xRefTable.Properties))\n\tkeys := make([]string, len(xRefTable.Properties))\n\ti := 0\n\tfor k := range xRefTable.Properties {\n\t\tkeys[i] = k\n\t\ti++\n\t}\n\tsort.Strings(keys)\n\tfor _, k := range keys {\n\t\tv := xRefTable.Properties[k]\n\t\tlist = append(list, fmt.Sprintf(\"%s = %s\", k, v))\n\t}\n\treturn list, nil\n}", "title": "" }, { "docid": "f8432b927cf80f2612fbb17c62b3fbc4", "score": "0.44042292", "text": "func getAllProps(opts RandomOptions, d2files d2file.D2Files) (BucketedPropsMap, []string) {\n\n\tpropMap := BucketedPropsMap{}\n\tprops := [][]Prop{}\n\tprops = append(props, getAllUniqueProps(d2files, []Prop{}))\n\tprops = append(props, getAllSetProps(d2files, []Prop{}))\n\tprops = append(props, getAllSetItemsProps(d2files, []Prop{}))\n\tprops = append(props, getAllRWProps(d2files, []Prop{}))\n\tprops = append(props, getAllGemsProps(d2files, []Prop{}))\n\n\tfor i := range props {\n\t\tfor j := range props[i] {\n\t\t\tpropMap = addOrCreateProp(propMap, props[i][j])\n\t\t}\n\t}\n\n\tfor k := range propMap {\n\t\tfor b := range propMap[k] {\n\t\t\tfor i, p := range propMap[k][b] {\n\t\t\t\t// Set all props Min to the Max value\n\t\t\t\tif opts.PerfectProps {\n\t\t\t\t\tpropMap[k][b][i].Min = p.Max\n\t\t\t\t}\n\t\t\t\t// sets skill = oskill\n\t\t\t\tif opts.UseOSkills {\n\t\t\t\t\tif p.Name == \"skill\" {\n\t\t\t\t\t\tpropMap[k][b][i].Name = \"oskill\"\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tvar keys []string\n\tfor k := range propMap {\n\t\ttotalProps := 0\n\t\tfor b := range propMap[k] {\n\t\t\ttotalProps += len(propMap[k][b])\n\t\t}\n\t\tfor i := 0; i < totalProps; i++ {\n\t\t\tkeys = append(keys, k)\n\t\t}\n\t}\n\tsort.Strings(keys)\n\treturn propMap, keys\n}", "title": "" }, { "docid": "d7608da683ce0a02e27c260367569f22", "score": "0.44009626", "text": "func (base *BaseSettingGetOperation) Properties() api_property.Properties {\n\tprops := api_property.New_SimplePropertiesEmpty()\n\n\tprops.Add(api_property.New_UsageDecoratedProperty(\n\t\tapi_property.Property(&SettingKeyProperty{}),\n\t\tapi_property.Usage_Required(),\n\t))\n\tprops.Add(api_property.New_UsageDecoratedProperty(\n\t\tapi_property.Property(&SettingScopeProperty{}),\n\t\tapi_property.Usage_Optional(),\n\t))\n\tprops.Add(api_property.New_UsageDecoratedProperty(\n\t\tapi_property.Property(&SettingValueProperty{}),\n\t\tapi_property.Usage_ReadOnly(),\n\t))\n\n\treturn props.Properties()\n}", "title": "" }, { "docid": "87bceb9dfba8b881eae18502f217b352", "score": "0.43952227", "text": "func SortPropertyValues(pvs []PropertyValue) {\n\tsort.Slice(pvs, func(i, j int) bool {\n\t\tpv1 := pvs[i]\n\t\tpv2 := pvs[j]\n\t\treturn pv1.Property < pv2.Property\n\t})\n}", "title": "" }, { "docid": "ce57d0df720fe478689cab585ff30319", "score": "0.4393905", "text": "func Properties() *properties {\n\tonce.Do(func() {\n\t\tp = &properties{\n\t\t\tBaseAPIURL: getEnvOrDefaultString(\"BASE_API_URL\", \"http://localhost:8080/v1\"),\n\t\t\tHttpClientTimeout: getEnvOrDefaultDuration(\"HTTP_CLIENT_REQ_TIME_OUT\", time.Minute),\n\t\t\tHttpRecordVersion: getEnvOrDefaultString(\"HTTP_RECORD_VERSION\", \"0\"),\n\t\t\tHttpDefaultPageSize: getEnvOrDefaultString(\"HTTP_DEFAULT_PAGE_SIZE\", \"2\"),\n\t\t}\n\t})\n\treturn p\n}", "title": "" }, { "docid": "fbc12f10edddf0a605d4fd6a724fb3c0", "score": "0.43925464", "text": "func Example_sortKeys() {\r\n // Closures that order the Planet structure.\r\n name := func(p1, p2 *Pepole) bool {\r\n return p1.name < p2.name\r\n }\r\n stature := func(p1, p2 *Pepole) bool {\r\n return p1.h < p2.h\r\n }\r\n weight := func(p1, p2 *Pepole) bool {\r\n return p1.w < p2.w\r\n }\r\n decreasingWeight := func(p1, p2 *Pepole) bool {\r\n return !weight(p1, p2)\r\n }\r\n \r\n // Sort the pepole by the various criteria.\r\n By(name).Sort(pepole)\r\n fmt.Println(\"By name:\", pepole)\r\n By(stature).Sort(pepole)\r\n fmt.Println(\"By stature:\", pepole)\r\n By(weight).Sort(pepole)\r\n fmt.Println(\"By weight:\", pepole)\r\n By(decreasingWeight).Sort(pepole)\r\n fmt.Println(\"By decreasing weight:\", pepole)\r\n \r\n // Output:\r\n\t// By name: [{Daisley 1.78 58.4} {Lumiya 1.65 57.9} {Rose 1.58 66.6} {Sola 1.68 55.77}]\r\n\t// By stature: [{Rose 1.58 66.6} {Lumiya 1.65 57.9} {Sola 1.68 55.77} {Daisley 1.78 58.4}]\r\n\t// By weight: [{Sola 1.68 55.77} {Lumiya 1.65 57.9} {Daisley 1.78 58.4} {Rose 1.58 66.6}]\r\n\t// By decreasing weight: [{Rose 1.58 66.6} {Daisley 1.78 58.4} {Lumiya 1.65 57.9} {Sola 1.68 55.77}]\r\n}", "title": "" }, { "docid": "3d3641c3b752f7a198f44b5582ad6727", "score": "0.43860397", "text": "func (rmcp RestorableMongodbCollectionPropertiesResource) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "2f8676a909c355a4628b5df4d6f63f79", "score": "0.4378278", "text": "func customSort() {\n\tfmt.Println(\"------custom sorting------\")\n\tp1 := person{\"josh\", \"withers\", 14}\n\tp2 := person{\"tanya\", \"gladstone\", 46}\n\tp3 := person{\"mike\", \"ditka\", 61}\n\tp4 := person{\"amy\", \"pinkman\", 22}\n\n\tpeople := []person{p1, p2, p3, p4}\n\n\tfmt.Println(people)\n\tsort.Sort(byAge(people)) // sorts by age, the integer (could probably substitute this)\n\tfmt.Println(people)\n\tsort.Sort(byName(people)) // sorts by name, the string\n\tfmt.Println(people)\n}", "title": "" }, { "docid": "fd5e9959985d79291f8953158cdd61d1", "score": "0.43777597", "text": "func Sort(events []event.Event) []event.Event {\n\tresult := make([]event.Event, len(events))\n\tcopy(result, events)\n\n\tsort.SliceStable(result, func(i, j int) bool {\n\t\tc := strings.Compare(result[i].String(), result[j].String())\n\t\tif c != 0 {\n\t\t\treturn c < 0\n\t\t}\n\n\t\tif result[i].Resource == nil && result[j].Resource == nil {\n\t\t\treturn false\n\t\t}\n\n\t\tif result[i].Resource == nil {\n\t\t\treturn false\n\t\t}\n\n\t\tif result[j].Resource == nil {\n\t\t\treturn true\n\t\t}\n\n\t\treturn strings.Compare(fmt.Sprintf(\"%+v\", result[i].Resource), fmt.Sprintf(\"%+v\", result[j].Resource)) < 0\n\t})\n\n\treturn result\n}", "title": "" }, { "docid": "f207ab60a739429b1e2c5390eb2704cc", "score": "0.43763107", "text": "func InitPropList() {\n\tlist := GetPropList()\n\t//test use\n\tif !RunMode() {\n\t\tif len(list) == 0 {\n\t\t\t//SetPropList()\n\t\t\tlist = LoadPropList()\n\t\t}\n\t}\n\tCache.Put(\"prop\", list, 0)\n\tfor k, v := range list {\n\t\tCache.Put(PropUniqueKey(v.Type), &list[k], 0)\n\t}\n}", "title": "" }, { "docid": "942fc32b9bf402184056730f81b04f55", "score": "0.4376121", "text": "func getAllPropertys(w http.ResponseWriter, r *http.Request) {\r\n\tif userValid := r.Context().Value(middlewares.UserKey); userValid != nil { // Validar userValid is *models.Property\r\n\t\tdb, _ := data.ConnectDB()\r\n\t\tdefer db.Close()\r\n\t\tjsonTasks, err := json.Marshal(models.GetProperties(db))\r\n\t\tif err == nil {\r\n\t\t\t// Tiene permisos el property?\r\n\t\t\terrAuth := lib.UserAllowed(userValid.(*models.User), nil, lib.GetString(\"user\"), w)\r\n\t\t\tif errAuth == nil {\r\n\t\t\t\tw.Header().Set(\"Content-Type\", \"application/json\")\r\n\t\t\t\tw.WriteHeader(http.StatusOK)\r\n\t\t\t\tw.Write(jsonTasks)\r\n\t\t\t} else {\r\n\t\t\t\tw.WriteHeader(http.StatusForbidden)\r\n\t\t\t}\r\n\t\t} else {\r\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\r\n\t\t}\r\n\t}\r\n}", "title": "" }, { "docid": "9a6d5c07ecdc63349d1f988428584801", "score": "0.4366736", "text": "func sortAPIObjects(allObjects []APIObjects, customResources map[string][]*unstructured.Unstructured, metadata map[string]interface{}, envVarMap map[string]string, agreementId string, crInstallTimeout int64) (map[string][]APIObjectInterface, string, error) {\n\tnamespace := \"\"\n\n\t// get the namespace from metadata\n\tif metadata != nil {\n\t\tif ns, ok := metadata[\"namespace\"]; ok {\n\t\t\tnamespace = ns.(string)\n\t\t}\n\t}\n\n\t// parse operator\n\tobjMap := map[string][]APIObjectInterface{}\n\tfor _, obj := range allObjects {\n\t\tswitch obj.Type.Kind {\n\t\tcase K8S_NAMESPACE_TYPE:\n\t\t\tif typedNS, ok := obj.Object.(*corev1.Namespace); ok {\n\t\t\t\tnewNs := NamespaceCoreV1{NamespaceObject: typedNS}\n\t\t\t\tif newNs.Name() != \"\" {\n\t\t\t\t\tglog.V(4).Infof(kwlog(fmt.Sprintf(\"Found kubernetes namespace object %s.\", newNs.Name())))\n\t\t\t\t\tobjMap[K8S_NAMESPACE_TYPE] = append(objMap[K8S_NAMESPACE_TYPE], newNs)\n\t\t\t\t} else {\n\t\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: namespace object must have a name in its metadata section.\")))\n\t\t\t\t}\n\t\t\t\tif namespace != \"\" && namespace != typedNS.ObjectMeta.Name {\n\t\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: multiple namespaces specified in operator : %s and %s\", namespace, typedNS.ObjectMeta.Name)))\n\t\t\t\t}\n\t\t\t\tnamespace = typedNS.ObjectMeta.Name\n\t\t\t} else {\n\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: namespace object has unrecognized type %T: %v\", obj.Object, obj.Object)))\n\t\t\t}\n\t\tcase K8S_ROLE_TYPE:\n\t\t\tif typedRole, ok := obj.Object.(*rbacv1.Role); ok {\n\t\t\t\tnewRole := RoleRbacV1{RoleObject: typedRole}\n\t\t\t\tif newRole.Name() != \"\" {\n\t\t\t\t\tglog.V(4).Infof(kwlog(fmt.Sprintf(\"Found kubernetes role object %s.\", newRole.Name())))\n\t\t\t\t\tobjMap[K8S_ROLE_TYPE] = append(objMap[K8S_ROLE_TYPE], newRole)\n\t\t\t\t} else {\n\t\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: role object must have a name in its metadata section.\")))\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: role object has unrecognized type %T: %v\", obj.Object, obj.Object)))\n\t\t\t}\n\t\tcase K8S_ROLEBINDING_TYPE:\n\t\t\tif typedRoleBinding, ok := obj.Object.(*rbacv1.RoleBinding); ok {\n\t\t\t\tnewRolebinding := RolebindingRbacV1{RolebindingObject: typedRoleBinding}\n\t\t\t\tif newRolebinding.Name() != \"\" {\n\t\t\t\t\tglog.V(4).Infof(kwlog(fmt.Sprintf(\"Found kubernetes rolebinding object %s.\", newRolebinding.Name())))\n\t\t\t\t\tobjMap[K8S_ROLEBINDING_TYPE] = append(objMap[K8S_ROLEBINDING_TYPE], newRolebinding)\n\t\t\t\t} else {\n\t\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: rolebinding object must have a name in its metadata section.\")))\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: rolebinding object has unrecognized type %T: %v\", obj.Object, obj.Object)))\n\t\t\t}\n\t\tcase K8S_DEPLOYMENT_TYPE:\n\t\t\tif typedDeployment, ok := obj.Object.(*appsv1.Deployment); ok {\n\t\t\t\tif typedDeployment.ObjectMeta.Namespace != \"\" {\n\t\t\t\t\tif namespace == \"\" {\n\t\t\t\t\t\tnamespace = typedDeployment.ObjectMeta.Namespace\n\t\t\t\t\t} else if namespace != \"\" && namespace != typedDeployment.ObjectMeta.Namespace {\n\t\t\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: multiple namespaces specified in operator: %s and %s\", namespace, typedDeployment.ObjectMeta.Namespace)))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tnewDeployment := DeploymentAppsV1{DeploymentObject: typedDeployment, EnvVarMap: envVarMap, AgreementId: agreementId}\n\t\t\t\tif newDeployment.Name() != \"\" {\n\t\t\t\t\tglog.V(4).Infof(kwlog(fmt.Sprintf(\"Found kubernetes deployment object %s.\", newDeployment.Name())))\n\t\t\t\t\tobjMap[K8S_DEPLOYMENT_TYPE] = append(objMap[K8S_DEPLOYMENT_TYPE], newDeployment)\n\t\t\t\t} else {\n\t\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: deployment object must have a name in its metadata section.\")))\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: deployment object has unrecognized type %T: %v\", obj.Object, obj.Object)))\n\t\t\t}\n\t\tcase K8S_SERVICEACCOUNT_TYPE:\n\t\t\tif typedServiceAccount, ok := obj.Object.(*corev1.ServiceAccount); ok {\n\t\t\t\tnewServiceAccount := ServiceAccountCoreV1{ServiceAccountObject: typedServiceAccount}\n\t\t\t\tif newServiceAccount.Name() != \"\" {\n\t\t\t\t\tglog.V(4).Infof(kwlog(fmt.Sprintf(\"Found kubernetes service account object %s.\", newServiceAccount.Name())))\n\t\t\t\t\tobjMap[K8S_SERVICEACCOUNT_TYPE] = append(objMap[K8S_SERVICEACCOUNT_TYPE], newServiceAccount)\n\t\t\t\t} else {\n\t\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: service account object must have a name in its metadata section.\")))\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: service account object has unrecognized type %T: %v\", obj.Object, obj.Object)))\n\t\t\t}\n\t\tcase K8S_CRD_TYPE:\n\t\t\tif typedCRD, ok := obj.Object.(*crdv1beta1.CustomResourceDefinition); ok {\n\t\t\t\tkind := typedCRD.Spec.Names.Kind\n\t\t\t\tif kind == \"\" {\n\t\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: custom resource definition object missing kind field: %v\", obj.Object)))\n\t\t\t\t}\n\t\t\t\tcustomResourceList, ok := customResources[kind]\n\t\t\t\tif !ok {\n\t\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: no custom resource object with kind %v found in %v.\", kind, customResources)))\n\t\t\t\t}\n\t\t\t\tnewCustomResource := CustomResourceV1Beta1{CustomResourceDefinitionObject: typedCRD, CustomResourceObjectList: customResourceList, InstallTimeout: crInstallTimeout}\n\t\t\t\tif newCustomResource.Name() != \"\" {\n\t\t\t\t\tglog.V(4).Infof(kwlog(fmt.Sprintf(\"Found kubernetes custom resource definition object %s.\", newCustomResource.Name())))\n\t\t\t\t\tobjMap[K8S_CRD_TYPE] = append(objMap[K8S_CRD_TYPE], newCustomResource)\n\t\t\t\t} else {\n\t\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: custom resource definition object must have a name in its metadata section.\")))\n\t\t\t\t}\n\t\t\t} else if typedCRD, ok := obj.Object.(*crdv1.CustomResourceDefinition); ok {\n\t\t\t\tkind := typedCRD.Spec.Names.Kind\n\t\t\t\tif kind == \"\" {\n\t\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: custom resource definition object missing kind field: %v\", obj.Object)))\n\t\t\t\t}\n\t\t\t\tcustomResourceList, ok := customResources[kind]\n\t\t\t\tif !ok {\n\t\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: no custom resource object with kind %v found in %v.\", kind, customResources)))\n\t\t\t\t}\n\t\t\t\tobjMap[K8S_CRD_TYPE] = append(objMap[K8S_CRD_TYPE], CustomResourceV1{CustomResourceDefinitionObject: typedCRD, CustomResourceObjectList: customResourceList, InstallTimeout: crInstallTimeout})\n\t\t\t} else {\n\t\t\t\treturn objMap, namespace, fmt.Errorf(kwlog(fmt.Sprintf(\"Error: custom resource definition object has unrecognized type %T: %v\", obj.Object, obj.Object)))\n\t\t\t}\n\t\tdefault:\n\t\t\t// for all other types, convert it to an unstructured object\n\t\t\tif typedOO, ok := obj.Object.(*unstructured.Unstructured); ok {\n\t\t\t\tnewOO := OtherObject{Object: typedOO, GVK: obj.Type}\n\t\t\t\tglog.V(4).Infof(kwlog(fmt.Sprintf(\"Found object %v of unstructured type %v\", newOO.Name(), obj.Type)))\n\t\t\t\tobjMap[K8S_UNSTRUCTURED_TYPE] = append(objMap[K8S_UNSTRUCTURED_TYPE], newOO)\n\t\t\t} else {\n\t\t\t\tglog.Errorf(kwlog(fmt.Sprintf(\"Object with gvk %v has type %T, not unstructured kube type.\", obj.Type, obj.Object)))\n\t\t\t}\n\t\t}\n\t}\n\n\treturn objMap, namespace, nil\n}", "title": "" }, { "docid": "208b759c3b1de11f26d44611ff5632d4", "score": "0.43600893", "text": "func (params *ListParams) AllowSortings(fields []string) {\n\tparams.allowedListParams.Sortings = fields\n}", "title": "" }, { "docid": "3a0eea816bbb83bafcd03790729ed3ab", "score": "0.43589377", "text": "func ListResourceTypes() []string {\n\tresourceTypes := []string{\n\t\tACMPCA{}.ResourceName(),\n\t\tASGroups{}.ResourceName(),\n\t\tLaunchConfigs{}.ResourceName(),\n\t\tLoadBalancers{}.ResourceName(),\n\t\tLoadBalancersV2{}.ResourceName(),\n\t\tSqsQueue{}.ResourceName(),\n\t\tTransitGatewaysVpcAttachment{}.ResourceName(),\n\t\tTransitGatewaysRouteTables{}.ResourceName(),\n\t\tTransitGateways{}.ResourceName(),\n\t\tEC2Instances{}.ResourceName(),\n\t\tEC2DedicatedHosts{}.ResourceName(),\n\t\tEBSVolumes{}.ResourceName(),\n\t\tEIPAddresses{}.ResourceName(),\n\t\tAMIs{}.ResourceName(),\n\t\tSnapshots{}.ResourceName(),\n\t\tECSClusters{}.ResourceName(),\n\t\tECSServices{}.ResourceName(),\n\t\tEKSClusters{}.ResourceName(),\n\t\tDBInstances{}.ResourceName(),\n\t\tLambdaFunctions{}.ResourceName(),\n\t\tS3Buckets{}.ResourceName(),\n\t\tIAMUsers{}.ResourceName(),\n\t\tIAMRoles{}.ResourceName(),\n\t\tIAMGroups{}.ResourceName(),\n\t\tIAMPolicies{}.ResourceName(),\n\t\tIAMServiceLinkedRoles{}.ResourceName(),\n\t\tSecretsManagerSecrets{}.ResourceName(),\n\t\tNatGateways{}.ResourceName(),\n\t\tOpenSearchDomains{}.ResourceName(),\n\t\tCloudWatchDashboards{}.ResourceName(),\n\t\tAccessAnalyzer{}.ResourceName(),\n\t\tDynamoDB{}.ResourceName(),\n\t\tEC2VPCs{}.ResourceName(),\n\t\tElasticaches{}.ResourceName(),\n\t\tOIDCProviders{}.ResourceName(),\n\t\tKmsCustomerKeys{}.ResourceName(),\n\t\tCloudWatchLogGroups{}.ResourceName(),\n\t\tGuardDuty{}.ResourceName(),\n\t\tMacieMember{}.ResourceName(),\n\t\tSageMakerNotebookInstances{}.ResourceName(),\n\t\tKinesisStreams{}.ResourceName(),\n\t\tApiGateway{}.ResourceName(),\n\t\tApiGatewayV2{}.ResourceName(),\n\t\tElasticFileSystem{}.ResourceName(),\n\t\tSNSTopic{}.ResourceName(),\n\t\tCloudtrailTrail{}.ResourceName(),\n\t\tEC2KeyPairs{}.ResourceName(),\n\t\tECR{}.ResourceName(),\n\t\tLaunchTemplates{}.ResourceName(),\n\t\tConfigServiceRule{}.ResourceName(),\n\t\tConfigServiceRecorders{}.ResourceName(),\n\t}\n\tsort.Strings(resourceTypes)\n\treturn resourceTypes\n}", "title": "" }, { "docid": "0dd2b6b0a87f955017d367667c20f6d5", "score": "0.43517843", "text": "func RetrieveAllProperties(version string, arch string, pol *policy.Policy) (*externalpolicy.PropertyList, error) {\n\tpl := new(externalpolicy.PropertyList)\n\n\tfor _, p := range pol.Properties {\n\t\t*pl = append(*pl, p)\n\t}\n\n\tif version != \"\" {\n\t\t*pl = append(*pl, externalpolicy.Property{Name: \"version\", Value: version})\n\t}\n\t*pl = append(*pl, externalpolicy.Property{Name: \"arch\", Value: arch})\n\n\tif len(pol.AgreementProtocols) != 0 {\n\t\t*pl = append(*pl, externalpolicy.Property{Name: \"agreementProtocols\", Value: pol.AgreementProtocols.As_String_Array()})\n\t}\n\n\treturn pl, nil\n}", "title": "" }, { "docid": "1dfec1a8e535b2318abbf1a853f0d703", "score": "0.43297276", "text": "func LoadPropList() []Prop {\n\tfilePath := \"static/prop.json\"\n\tlist := make([]Prop, 0)\n\terr := libs.Load(filePath, &list)\n\tif err != nil {\n\t\tbeego.Error(\"load prop err \", err)\n\t}\n\treturn list\n}", "title": "" }, { "docid": "85ea4f571ddf33470fb0ee68a472b057", "score": "0.4327686", "text": "func (c *GitCollection) Filter(confs []Config) (*GitCollection, error) {\n\top := \"crud.GitCollectionFilter\"\n\n\tnewColl := &GitCollection{\n\t\tBaseURL: c.BaseURL,\n\t\tBaseHash: c.BaseHash,\n\t\tBaseDir: c.BaseDir,\n\t}\n\n\tvar err error\n\treg := &regexp.Regexp{}\n\tfor _, coll := range c.Coll {\n\t\tfor _, conf := range confs {\n\t\t\t// 1: Filter by regex\n\t\t\treg, err = regexp.Compile(conf.Filter)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, errors.Wrapf(err, \"(%s): invalid %s regexp\", op, conf.Name)\n\t\t\t}\n\n\t\t\tif !reg.MatchString(coll.Name) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tcoll.Type = conf.Name // make the type same as a name of regex\n\n\t\t\t// 2: Filter by policy\n\t\t\tvar policy string\n\t\t\tvar err error\n\n\t\t\tif conf.PolicyURL != \"\" { // get a policy from url\n\t\t\t\tpolicy, err = getPolicyFromURL(conf.PolicyURL)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, errors.Wrapf(err, \"(%s): retrieving policy file from %s\", op, conf.PolicyURL)\n\t\t\t\t}\n\n\t\t\t\tcoll.AppliedPolicy = conf.PolicyURL\n\t\t\t} else if c.Policy != nil { // use a policy from git repo\n\t\t\t\tpolicy = c.Policy.Content\n\n\t\t\t\tcoll.AppliedPolicy = c.Policy.Name\n\t\t\t} else { // use default policy\n\t\t\t\ttemp, err := ioutil.ReadFile(defaultPolicy)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, errors.Wrapf(err, \"(%s): reading default policy file\", op)\n\t\t\t\t}\n\n\t\t\t\tpolicy = string(temp)\n\n\t\t\t\tcoll.AppliedPolicy = \"not found\"\n\t\t\t}\n\n\t\t\tinput, err := util.ToJSON(coll.Name, coll.Reader) // convert a config file to json, and then pass it to OPA.s\n\t\t\tif errors.Cause(err) == util.ErrUnsupportedFileType {\n\t\t\t\tcontinue\n\t\t\t} else if err != nil || len(input) == 0 || input == nil {\n\t\t\t\treturn nil, errors.Wrapf(err, \"(%s): converting %s file to json\", op, coll.Name)\n\t\t\t}\n\t\t\tnewColl.ConfigFileCount++ // count the number of filtered files\n\n\t\t\t// create a new rego object\n\t\t\tr := rego.New(\n\t\t\t\trego.Query(\"data\"),\n\t\t\t\trego.Module(conf.PolicyURL, policy),\n\t\t\t\trego.Input(input),\n\t\t\t)\n\n\t\t\tctx := context.Background()\n\n\t\t\t// evaluate a policy and query on config file\n\t\t\trs, err := r.Eval(ctx)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, errors.Wrapf(err, \"(%s): evaluating a query of a %s\", op, coll.Name)\n\t\t\t}\n\n\t\t\t// display all variables from rego file if result set isn't 0\n\t\t\tif len(rs) != 0 {\n\t\t\t\tfor _, busu := range rs {\n\t\t\t\t\tfor _, miki := range busu.Expressions {\n\t\t\t\t\t\tmapi := miki.Value.(map[string]interface{})\n\t\t\t\t\t\tfor _, pur := range mapi {\n\t\t\t\t\t\t\tmupi := pur.(map[string]interface{})\n\t\t\t\t\t\t\tfor ind, shind := range mupi {\n\t\t\t\t\t\t\t\tcoll.OutputPolicy = fmt.Sprintf(\"%s: %v\", ind, shind)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tnewColl.Coll = append(newColl.Coll, coll)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn newColl, nil\n}", "title": "" }, { "docid": "6c7314000882df43f4dba697c955713b", "score": "0.43230158", "text": "func (doctree *DocumentTree) PropertyOrder() []Property {\n\tpropOrder := []Property{}\n\tfor _, leaf := range doctree.leaves {\n\t\tpropOrder = append(propOrder, leaf.Property)\n\t}\n\treturn propOrder\n}", "title": "" }, { "docid": "129be181af971dc9ddd33e57556286a1", "score": "0.43214014", "text": "func (rp ResourceProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tif rp.Sku != nil {\n\t\tobjectMap[\"sku\"] = rp.Sku\n\t}\n\tif rp.RedisVersion != nil {\n\t\tobjectMap[\"redisVersion\"] = rp.RedisVersion\n\t}\n\tif rp.ProvisioningState != nil {\n\t\tobjectMap[\"provisioningState\"] = rp.ProvisioningState\n\t}\n\tif rp.HostName != nil {\n\t\tobjectMap[\"hostName\"] = rp.HostName\n\t}\n\tif rp.Port != nil {\n\t\tobjectMap[\"port\"] = rp.Port\n\t}\n\tif rp.SslPort != nil {\n\t\tobjectMap[\"sslPort\"] = rp.SslPort\n\t}\n\tif rp.AccessKeys != nil {\n\t\tobjectMap[\"accessKeys\"] = rp.AccessKeys\n\t}\n\tif rp.LinkedServers != nil {\n\t\tobjectMap[\"linkedServers\"] = rp.LinkedServers\n\t}\n\tif rp.RedisConfiguration != nil {\n\t\tobjectMap[\"redisConfiguration\"] = rp.RedisConfiguration\n\t}\n\tif rp.EnableNonSslPort != nil {\n\t\tobjectMap[\"enableNonSslPort\"] = rp.EnableNonSslPort\n\t}\n\tif rp.TenantSettings != nil {\n\t\tobjectMap[\"tenantSettings\"] = rp.TenantSettings\n\t}\n\tif rp.ShardCount != nil {\n\t\tobjectMap[\"shardCount\"] = rp.ShardCount\n\t}\n\tif rp.SubnetID != nil {\n\t\tobjectMap[\"subnetId\"] = rp.SubnetID\n\t}\n\tif rp.StaticIP != nil {\n\t\tobjectMap[\"staticIP\"] = rp.StaticIP\n\t}\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "770e4a2850576e5314780d3c1371555f", "score": "0.43178624", "text": "func (p KeyProperties) Less(a, b int) bool {\n\treturn p[a].Key < p[b].Key\n}", "title": "" }, { "docid": "e9cb3a51de87840043fb32d2278bf725", "score": "0.4311087", "text": "func (*SortFields) Descriptor() ([]byte, []int) {\n\treturn file_yelp_nrtsearch_search_proto_rawDescGZIP(), []int{29}\n}", "title": "" }, { "docid": "0c2456ee510d46f9afcc689b8b40dc5c", "score": "0.4286307", "text": "func AddRelatedPropertyGeneratorsForMongoDBCollectionGetProperties_STATUS_ARM(gens map[string]gopter.Gen) {\n\tgens[\"Options\"] = gen.PtrOf(OptionsResource_STATUS_ARMGenerator())\n\tgens[\"Resource\"] = gen.PtrOf(MongoDBCollectionGetProperties_Resource_STATUS_ARMGenerator())\n}", "title": "" }, { "docid": "b10028dfc60b899c19f0553857c0248f", "score": "0.42748213", "text": "func determineFinalPropsForImport(res *ImportResource) {\n\tlogger.Info(\"determineFinalPropsForImport\",\n\t\t\"msg\",\n\t\tfmt.Sprintf(\"Using spec for %v import: %v\", string(*res.ResourceType), res.SpecProps))\n\tfinalProps := TResourceProperties{}\n\tfor k, specVal := range res.SpecProps {\n\t\t// Ignore certain keys in spec\n\t\tif k == PropScope {\n\t\t\tcontinue\n\t\t}\n\t\tif k == PropHostnamePrefix {\n\t\t\tk = \"hostname\"\n\t\t}\n\t\tif res.ExcludePropIDs != nil && len(*res.ExcludePropIDs) > 0 {\n\t\t\texclude := false\n\t\t\tfor _, propID := range *res.ExcludePropIDs {\n\t\t\t\tif propID == k {\n\t\t\t\t\texclude = true\n\t\t\t\t\tlogger.Info(\"determineFinalPropsForImport\",\n\t\t\t\t\t\t\"msg\",\n\t\t\t\t\t\tfmt.Sprintf(\"Excluding spec property '%s' for resource type %v\", propID, string(*res.ResourceType)))\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif exclude {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tif v, has := res.ResourceProps[k]; has {\n\t\t\tfinalProps[k] = v\n\t\t} else {\n\t\t\tlogger.Warn(\"determineFinalPropsForImport\",\n\t\t\t\t\"msg\",\n\t\t\t\tfmt.Sprintf(\"Imported terraform resource missing '%s' property, using spec value: %v\", k, specVal))\n\t\t\tfinalProps[k] = specVal\n\t\t}\n\t}\n\t// Always keep the tags, even if the spec does not have them as a property\n\tif _, has := finalProps[\"tags\"]; !has {\n\t\tif tags, has := res.ResourceProps[\"tags\"]; has {\n\t\t\tfinalProps[\"tags\"] = tags\n\t\t}\n\t}\n\tres.FinalProps = finalProps\n}", "title": "" }, { "docid": "295e33664056e0eeaad863bf4eb1bd88", "score": "0.42733887", "text": "func GetRoutesProperties(r *mux.Router) {\r\n\tr.HandleFunc(\"/properties\", createProperty).Methods(http.MethodPost)\r\n\tr.HandleFunc(\"/properties\", getAllPropertys).Methods(http.MethodGet)\r\n\tr.HandleFunc(\"/properties/{id:[0-9]+}\", getProperty).Methods(http.MethodGet)\r\n\tr.HandleFunc(\"/properties/{id:[0-9]+}\", updateProperty).Methods(http.MethodPut)\r\n\tr.HandleFunc(\"/properties/{id:[0-9]+}\", deleteProperty).Methods(http.MethodDelete)\r\n\tr.HandleFunc(\"/properties/users/{id:[0-9]+}\", getUserProperty).Methods(http.MethodGet)\r\n\tr.HandleFunc(\"/properties/owners/{id:[0-9]+}\", getOwnerProperty).Methods(http.MethodGet)\r\n\tr.HandleFunc(\"/properties/okupas/{id:[0-9]+}\", getOkupaProperty).Methods(http.MethodGet)\r\n\tr.HandleFunc(\"/properties/types/{id:[0-9]+}\", getTypeProperty).Methods(http.MethodGet)\r\n}", "title": "" }, { "docid": "8456e5fe2ef866aeb088511eac3488ea", "score": "0.42719698", "text": "func Stockcollectionprops(exec boil.Executor, mods ...qm.QueryMod) stockcollectionpropQuery {\n\tmods = append(mods, qm.From(\"\\\"stockcollectionprop\\\"\"))\n\treturn stockcollectionpropQuery{NewQuery(exec, mods...)}\n}", "title": "" }, { "docid": "f1da31323bb98272484ef080bf8de2cb", "score": "0.42719144", "text": "func (o Overrides) ResourceOverridesWithDetails(typ OverrideType, location string) (overrides []interface{}) {\n\tfor _, v := range o {\n\t\tif v.Field == nil && v.Type == typ && compareLocation(v.Location, location) {\n\t\t\toverrides = append(overrides, v.Details)\n\t\t}\n\t}\n\n\treturn overrides\n}", "title": "" }, { "docid": "2f0296a9fdafe63b86c5a29ac96efa32", "score": "0.4270708", "text": "func (serverDetail *UpcloudMonitorServerDetailsOperation) Properties() api_property.Properties {\n\tprops := api_property.New_SimplePropertiesEmpty()\n\n\tprops.Add(api_property.Property(&UpcloudGlobalProperty{}))\n\tprops.Add(api_property.Property(&UpcloudServerUUIDSProperty{}))\n\n\treturn props.Properties()\n}", "title": "" }, { "docid": "f18d83c18959d173b162913cdb4738d2", "score": "0.42673394", "text": "func (c *jsiiProxy_CfnAuthorizerV2) RenderProperties(props *map[string]interface{}) *map[string]interface{} {\n\tvar returns *map[string]interface{}\n\n\t_jsii_.Invoke(\n\t\tc,\n\t\t\"renderProperties\",\n\t\t[]interface{}{props},\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "1a2a92e23372e8ffc66403a383537098", "score": "0.42670673", "text": "func (s SitePatchResourceProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"availabilityState\", s.AvailabilityState)\n\tpopulate(objectMap, \"clientAffinityEnabled\", s.ClientAffinityEnabled)\n\tpopulate(objectMap, \"clientCertEnabled\", s.ClientCertEnabled)\n\tpopulate(objectMap, \"clientCertExclusionPaths\", s.ClientCertExclusionPaths)\n\tpopulate(objectMap, \"clientCertMode\", s.ClientCertMode)\n\tpopulate(objectMap, \"cloningInfo\", s.CloningInfo)\n\tpopulate(objectMap, \"containerSize\", s.ContainerSize)\n\tpopulate(objectMap, \"customDomainVerificationId\", s.CustomDomainVerificationID)\n\tpopulate(objectMap, \"dailyMemoryTimeQuota\", s.DailyMemoryTimeQuota)\n\tpopulate(objectMap, \"defaultHostName\", s.DefaultHostName)\n\tpopulate(objectMap, \"enabled\", s.Enabled)\n\tpopulate(objectMap, \"enabledHostNames\", s.EnabledHostNames)\n\tpopulate(objectMap, \"httpsOnly\", s.HTTPSOnly)\n\tpopulate(objectMap, \"hostNameSslStates\", s.HostNameSSLStates)\n\tpopulate(objectMap, \"hostNames\", s.HostNames)\n\tpopulate(objectMap, \"hostNamesDisabled\", s.HostNamesDisabled)\n\tpopulate(objectMap, \"hostingEnvironmentProfile\", s.HostingEnvironmentProfile)\n\tpopulate(objectMap, \"hyperV\", s.HyperV)\n\tpopulate(objectMap, \"inProgressOperationId\", s.InProgressOperationID)\n\tpopulate(objectMap, \"isDefaultContainer\", s.IsDefaultContainer)\n\tpopulate(objectMap, \"isXenon\", s.IsXenon)\n\tpopulate(objectMap, \"keyVaultReferenceIdentity\", s.KeyVaultReferenceIdentity)\n\tpopulateTimeRFC3339(objectMap, \"lastModifiedTimeUtc\", s.LastModifiedTimeUTC)\n\tpopulate(objectMap, \"maxNumberOfWorkers\", s.MaxNumberOfWorkers)\n\tpopulate(objectMap, \"outboundIpAddresses\", s.OutboundIPAddresses)\n\tpopulate(objectMap, \"possibleOutboundIpAddresses\", s.PossibleOutboundIPAddresses)\n\tpopulate(objectMap, \"redundancyMode\", s.RedundancyMode)\n\tpopulate(objectMap, \"repositorySiteName\", s.RepositorySiteName)\n\tpopulate(objectMap, \"reserved\", s.Reserved)\n\tpopulate(objectMap, \"resourceGroup\", s.ResourceGroup)\n\tpopulate(objectMap, \"scmSiteAlsoStopped\", s.ScmSiteAlsoStopped)\n\tpopulate(objectMap, \"serverFarmId\", s.ServerFarmID)\n\tpopulate(objectMap, \"siteConfig\", s.SiteConfig)\n\tpopulate(objectMap, \"slotSwapStatus\", s.SlotSwapStatus)\n\tpopulate(objectMap, \"state\", s.State)\n\tpopulate(objectMap, \"storageAccountRequired\", s.StorageAccountRequired)\n\tpopulateTimeRFC3339(objectMap, \"suspendedTill\", s.SuspendedTill)\n\tpopulate(objectMap, \"targetSwapSlot\", s.TargetSwapSlot)\n\tpopulate(objectMap, \"trafficManagerHostNames\", s.TrafficManagerHostNames)\n\tpopulate(objectMap, \"usageState\", s.UsageState)\n\tpopulate(objectMap, \"virtualNetworkSubnetId\", s.VirtualNetworkSubnetID)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "a2b19cb0fc1aaf87ed66357ed04714b6", "score": "0.42611125", "text": "func (*SortCriteria) Descriptor() ([]byte, []int) {\n\treturn file_github_com_infobloxopen_atlas_app_toolkit_query_collection_operators_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "d0ca725b0b345cf77674c7af531517a5", "score": "0.4258481", "text": "func (*Sorting) Descriptor() ([]byte, []int) {\n\treturn file_github_com_infobloxopen_atlas_app_toolkit_query_collection_operators_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "cbb5f8f303b02b39a15192da25c084b7", "score": "0.42567235", "text": "func MongoDBCollectionGetProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif mongoDBCollectionGetProperties_STATUS_ARMGenerator != nil {\n\t\treturn mongoDBCollectionGetProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForMongoDBCollectionGetProperties_STATUS_ARM(generators)\n\tmongoDBCollectionGetProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(MongoDBCollectionGetProperties_STATUS_ARM{}), generators)\n\n\treturn mongoDBCollectionGetProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "2bb2241c4318e974822169979900ff0f", "score": "0.42496258", "text": "func Resources(ctx context.Context, c client.Client, namespace string, force bool, customizer ResourceCustomizer, names ...string) error {\n\treturn ResourcesOrCollect(ctx, c, namespace, nil, force, customizer, names...)\n}", "title": "" }, { "docid": "3f30e31f7bfd6907097299d3898f7145", "score": "0.42485", "text": "func (obj *properties) All() []Property {\n\treturn obj.list\n}", "title": "" }, { "docid": "c52082425944e5525116b0c1ea7e227f", "score": "0.4240351", "text": "func TestSortParams(t *testing.T) {\n\tparams := []*ParameterOrRef{\n\t\t{Parameter: &Parameter{Name: \"Paz\", In: \"path\"}},\n\t\t{Parameter: &Parameter{Name: \"Baz\", In: \"header\"}},\n\t\t{Parameter: &Parameter{Name: \"Bar\", In: \"query\"}},\n\t\t{Parameter: &Parameter{Name: \"Zap\", In: \"path\"}},\n\t\t{Parameter: &Parameter{Name: \"Foo\", In: \"query\"}},\n\t}\n\t// Sort by location, then by name in ascending order.\n\tparamsOrderedBy(byLocation, byName).Sort(params)\n\n\tassert.Len(t, params, 5)\n\n\tassert.Equal(t, params[0].Name, \"Paz\")\n\tassert.Equal(t, params[1].Name, \"Zap\")\n\tassert.Equal(t, params[2].Name, \"Bar\")\n\tassert.Equal(t, params[3].Name, \"Foo\")\n\tassert.Equal(t, params[4].Name, \"Baz\")\n}", "title": "" }, { "docid": "d831de7024e5594e21c731c953104ac7", "score": "0.42393586", "text": "func sortImages(c Config, gallery string) Config {\n\tsort.SliceStable(c.Galleries[gallery].Images, func(i, j int) bool {\n\t\treturn c.Galleries[gallery].Images[i].Time.Before(c.Galleries[gallery].Images[j].Time)\n\t})\n\treturn c\n}", "title": "" }, { "docid": "357febdd95fbe3d2d88499f7f380685a", "score": "0.4220184", "text": "func (u *__FileRef_Selector) OrderBy_Width_Desc() *__FileRef_Selector {\n\tu.orderBy = append(u.orderBy, \" width DESC\")\n\treturn u\n}", "title": "" }, { "docid": "0937c277f695b1a509ad2d40a53d6be3", "score": "0.42142957", "text": "func makeModifiedSwaggerSpecOrdered(modifiedSwaggerSpec []map[string]interface{}) ([]map[string]interface{}, error) {\n\tfor _, tagMethods := range modifiedSwaggerSpec {\n\n\t\t// sorting API as per the lexicographic ordering of operationId\n\t\tmethodsList := tagMethods[\"methods\"].([]map[string]interface{})\n\t\tmethodOperationIds := make([]string, 0)\n\t\tfor _, methodDetail := range methodsList {\n\t\t\tmethodOperationIds = append(methodOperationIds, methodDetail[\"operationId\"].(string))\n\t\t}\n\t\tsort.Strings(methodOperationIds)\n\t\tupdatedMethodList := make([]map[string]interface{}, 0, len(methodsList))\n\t\tfor _, methodOperationId := range methodOperationIds {\n\t\t\tfor _, methodDetail := range methodsList {\n\t\t\t\tif methodOperationId == methodDetail[\"operationId\"].(string) {\n\t\t\t\t\tupdatedMethodList = append(updatedMethodList, methodDetail)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\ttagMethods[\"methods\"] = updatedMethodList\n\n\t\t// sorting each API responses as per their HTTP status codes\n\t\tmethodsList = tagMethods[\"methods\"].([]map[string]interface{})\n\t\tfor _, methodDetail := range methodsList {\n\t\t\tresponses := methodDetail[\"responses\"].([]map[string]interface{})\n\t\t\tresponseCodes := make([]string, 0, len(responses))\n\t\t\tfor _, response := range responses {\n\t\t\t\tresponseCodes = append(responseCodes, response[\"status\"].(string))\n\t\t\t}\n\t\t\tsort.Strings(responseCodes)\n\t\t\tupdatedResponses := make([]map[string]interface{}, 0, len(responses))\n\t\t\tfor _, responseCode := range responseCodes {\n\t\t\t\tfor _, response := range responses {\n\t\t\t\t\tif responseCode == response[\"status\"].(string) {\n\t\t\t\t\t\tupdatedResponses = append(updatedResponses, response)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tmethodDetail[\"responses\"] = updatedResponses\n\t\t}\n\t}\n\treturn modifiedSwaggerSpec, nil\n}", "title": "" }, { "docid": "be54791280d8c8b502f6712651a11ab7", "score": "0.421169", "text": "func (th *TaskItemHandler) PropNames() []string {\n\treturn []string{\n\t\t\"id\",\n\t\t\"user_id\",\n\t\t\"heading\",\n\t\t\"description\",\n\t\t\"status\",\n\t\t\"created_on\",\n\t\t\"created_by\",\n\t\t\"modified_on\",\n\t\t\"modified_by\",\n\t}\n}", "title": "" }, { "docid": "66d5917b8afe11fdbb793c0f779f37e7", "score": "0.41926348", "text": "func (r *Resource) Titles() []string { return append([]string{r.Title()}, r.titles...) }", "title": "" }, { "docid": "aae583d4d0e3f1e9da0deb1a162badb9", "score": "0.41888022", "text": "func (this *Sorter) Init(list []interface{}, key, order string) *Sorter {\n\tthis.list, this.key, this.cmp = list, key, \"<\"\n\tif strings.ToLower(order) == \"desc\" {\n\t\tthis.cmp = \">\"\n\t}\n\treturn this\n}", "title": "" }, { "docid": "efca62e200368854183a2573d880b0e7", "score": "0.41887742", "text": "func (cr ClusterResourceProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tif cr.ProvisioningState != \"\" {\n\t\tobjectMap[\"provisioningState\"] = cr.ProvisioningState\n\t}\n\tif cr.RestoreFromBackupID != nil {\n\t\tobjectMap[\"restoreFromBackupId\"] = cr.RestoreFromBackupID\n\t}\n\tif cr.DelegatedManagementSubnetID != nil {\n\t\tobjectMap[\"delegatedManagementSubnetId\"] = cr.DelegatedManagementSubnetID\n\t}\n\tif cr.CassandraVersion != nil {\n\t\tobjectMap[\"cassandraVersion\"] = cr.CassandraVersion\n\t}\n\tif cr.ClusterNameOverride != nil {\n\t\tobjectMap[\"clusterNameOverride\"] = cr.ClusterNameOverride\n\t}\n\tif cr.AuthenticationMethod != \"\" {\n\t\tobjectMap[\"authenticationMethod\"] = cr.AuthenticationMethod\n\t}\n\tif cr.InitialCassandraAdminPassword != nil {\n\t\tobjectMap[\"initialCassandraAdminPassword\"] = cr.InitialCassandraAdminPassword\n\t}\n\tif cr.PrometheusEndpoint != nil {\n\t\tobjectMap[\"prometheusEndpoint\"] = cr.PrometheusEndpoint\n\t}\n\tif cr.RepairEnabled != nil {\n\t\tobjectMap[\"repairEnabled\"] = cr.RepairEnabled\n\t}\n\tif cr.ClientCertificates != nil {\n\t\tobjectMap[\"clientCertificates\"] = cr.ClientCertificates\n\t}\n\tif cr.ExternalGossipCertificates != nil {\n\t\tobjectMap[\"externalGossipCertificates\"] = cr.ExternalGossipCertificates\n\t}\n\tif cr.ExternalSeedNodes != nil {\n\t\tobjectMap[\"externalSeedNodes\"] = cr.ExternalSeedNodes\n\t}\n\tif cr.HoursBetweenBackups != nil {\n\t\tobjectMap[\"hoursBetweenBackups\"] = cr.HoursBetweenBackups\n\t}\n\tif cr.Deallocated != nil {\n\t\tobjectMap[\"deallocated\"] = cr.Deallocated\n\t}\n\tif cr.CassandraAuditLoggingEnabled != nil {\n\t\tobjectMap[\"cassandraAuditLoggingEnabled\"] = cr.CassandraAuditLoggingEnabled\n\t}\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "e1a5342e062e9dfb36c4080526aaa5c1", "score": "0.41862208", "text": "func (this *CustomerModel) GetAllCustomerBySort(key string, index, page int) (list []*Customer, page_info map[string]interface{}) {\n\tlist = make([]*Customer, 0)\n\tpage_info = make(map[string]interface{}, 0)\n\tasc := fmt.Sprintf(\"%d\", index)\n\tif v, ok := SortKeyMap[key]; ok {\n\t\tkey = v\n\t\tif _v, _ok := SortIndexMap[asc]; _ok {\n\t\t\tasc = _v\n\t\t} else {\n\t\t\tasc = SortIndexMap[\"default\"]\n\t\t}\n\t} else {\n\t\tkey = SortKeyMap[\"default\"]\n\t\tasc = SortIndexMap[\"default\"]\n\t}\n\n\t_q := fmt.Sprintf(\"order by t1.%s %s limit ?, ?;\", key, asc)\n\tquery := `select count(1) from t_corp t1 \n\tLEFT JOIN t_agent t2 on t1.agent_id = t2.agent_id\n\tLEFT JOIN t_account_corps t3 on t1.corp_id = t3.corp_id\n\tLEFT JOIN t_account t4 on t3.account_id = t4.account_id\n\tLEFT JOIN t_city t5 on t1.city_id = t5.city_id\n\tLEFT JOIN t_province t6 on t5.province_id = t6.province_id\n\tWHERE t1.enabled = 1;`\n\n\tvar record, page_total, to int\n\terr := Db.QueryRow(query).Scan(&record)\n\tif err != nil {\n\t\tbeego.Error(err)\n\t\treturn\n\t}\n\tto, page_total = PageInfoCount(page, record)\n\n\tquery = `select t1.corp_id,t1.name,t1.buin,t1.contacts,t1.phone,t1.mobile,t1.qq,t1.mail,t1.agent_id,t1.timex,t1.assign_status,t1.last_follow_time,t1.note,\n\tt2.name,t4.account_id,t5.city_id,t5.city,t6.province_id,t6.province, t4.name\n\tfrom t_corp t1 \n\tLEFT JOIN t_agent t2 on t1.agent_id = t2.agent_id\n\tLEFT JOIN t_account_corps t3 on t1.corp_id = t3.corp_id\n\tLEFT JOIN t_account t4 on t3.account_id = t4.account_id\n\tLEFT JOIN t_city t5 on t1.city_id = t5.city_id\n\tLEFT JOIN t_province t6 on t5.province_id = t6.province_id\n\tWHERE t1.enabled = 1 ` + _q\n\n\trows, err := Db.Query(query, to, PAGESIZE)\n\tif err != nil {\n\t\tbeego.Error(err)\n\t\treturn\n\t}\n\tlist = this.GetCustomListByRows(list, rows)\n\tpage_info = NewPageInfo(page, page_total, record)\n\treturn\n}", "title": "" }, { "docid": "1f8fcff52ebdf5c4b4e27393376f184c", "score": "0.4181249", "text": "func (v *Paths) Sort(by int, order bool) {\n\ts := func(less func(i, j int) bool) { sort.Slice((*v)[:], less) }\n\tswitch by {\n\tcase 1:\n\t\tif order {\n\t\t\ts(func(i, j int) bool { return (*v)[i].Pid > (*v)[j].Pid })\n\t\t} else {\n\t\t\ts(func(i, j int) bool { return (*v)[i].Pid < (*v)[j].Pid })\n\t\t}\n\tcase 2:\n\t\tif order {\n\t\t\ts(func(i, j int) bool { return (*v)[i].Size > (*v)[j].Size })\n\t\t} else {\n\t\t\ts(func(i, j int) bool { return (*v)[i].Size < (*v)[j].Size })\n\t\t}\n\tcase 3:\n\t\tif order {\n\t\t\ts(func(i, j int) bool { return (*v)[i].Created > (*v)[j].Created })\n\t\t} else {\n\t\t\ts(func(i, j int) bool { return (*v)[i].Created < (*v)[j].Created })\n\t\t}\n\tcase 4:\n\t\tif order {\n\t\t\ts(func(i, j int) bool { return (*v)[i].Modified > (*v)[j].Modified })\n\t\t} else {\n\t\t\ts(func(i, j int) bool { return (*v)[i].Modified < (*v)[j].Modified })\n\t\t}\n\tcase 5:\n\t\tif order {\n\t\t\ts(func(i, j int) bool { return (*v)[i].Accessed > (*v)[j].Accessed })\n\t\t} else {\n\t\t\ts(func(i, j int) bool { return (*v)[i].Accessed < (*v)[j].Accessed })\n\t\t}\n\tcase 6:\n\t\tif order {\n\t\t\ts(func(i, j int) bool { return (*v)[i].Views < (*v)[j].Views })\n\t\t} else {\n\t\t\ts(func(i, j int) bool { return (*v)[i].Views > (*v)[j].Views })\n\t\t}\n\t}\n}", "title": "" }, { "docid": "7bffa7fe144d6a6717019dc1942a8cd0", "score": "0.41787297", "text": "func sortNodesByUsage(nodes []NodeInfo, resourceToWeightMap sorter.ResourceToWeightMap, ascending bool) {\n\tscorer := sorter.ResourceUsageScorer(resourceToWeightMap)\n\tsort.Slice(nodes, func(i, j int) bool {\n\t\tvar iNodeUsage, jNodeUsage corev1.ResourceList\n\t\tif nodeMetric := nodes[i].nodeMetric.Status.NodeMetric; nodeMetric != nil {\n\t\t\tiNodeUsage = nodeMetric.NodeUsage.ResourceList\n\t\t}\n\t\tif nodeMetric := nodes[j].nodeMetric.Status.NodeMetric; nodeMetric != nil {\n\t\t\tjNodeUsage = nodeMetric.NodeUsage.ResourceList\n\t\t}\n\n\t\tiScore := scorer(iNodeUsage, nodes[i].node.Status.Allocatable)\n\t\tjScore := scorer(jNodeUsage, nodes[j].node.Status.Allocatable)\n\t\tif ascending {\n\t\t\treturn iScore < jScore\n\t\t}\n\t\treturn iScore > jScore\n\t})\n}", "title": "" }, { "docid": "24ec7f08a0bd258fc7da0927f5fd58dc", "score": "0.41713125", "text": "func (s *Storage) List() []Resource {\n\tresources := []Resource{}\n\tfor _, res := range s.PrivateKeys {\n\t\tresources = append(resources, res)\n\t}\n\tfor _, res := range s.PublicKeys {\n\t\tresources = append(resources, res)\n\t}\n\tfor _, res := range s.Locations {\n\t\tresources = append(resources, res)\n\t}\n\tfor _, res := range s.Certificates {\n\t\tresources = append(resources, res)\n\t}\n\tfor _, res := range s.CSRs {\n\t\tresources = append(resources, res)\n\t}\n\tfor _, res := range s.Serials {\n\t\tresources = append(resources, res)\n\t}\n\tfor _, res := range s.Subjects {\n\t\tresources = append(resources, res)\n\t}\n\treturn resources\n}", "title": "" }, { "docid": "a0a61e29969576c77f858fd96dcbd65d", "score": "0.41709834", "text": "func getAllSetItemsProps(d2files d2file.D2Files, props Props) Props {\n\tp := PropGetter{\n\t\td2files: d2files,\n\t\tprops: props,\n\t\tfileName: setItemsTxt.FileName,\n\t\tpropOffset: setItemsTxt.Prop1,\n\t\tlvl: setItemsTxt.Lvl,\n\t}\n\treturn getProps(p)\n}", "title": "" }, { "docid": "796d0e6b2a8828006d997f79917ecaf7", "score": "0.4168261", "text": "func (m *MockExplorerInterface) PropertiesListByEcosystem(ecosystem int) (map[string]interface{}, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"PropertiesListByEcosystem\", ecosystem)\n\tret0, _ := ret[0].(map[string]interface{})\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "c8c5ff8d9a4c2d1b272e990fc16f1606", "score": "0.41645616", "text": "func Sort(seq interface{}, args ...string) (interface{}, error) {\n seqv := reflect.ValueOf(seq)\n\n // Create a list of pairs that will be used to do the sort\n\tp := pairList{SortAsc: true, SliceType: reflect.SliceOf(seqv.Type().Elem())}\n\tp.Pairs = make([]pair, seqv.Len())\n\n var sortByField string\n for i, l := range args {\n dStr, err := cast.ToStringE(l)\n switch {\n case i == 0 && err !=nil:\n sortByField = \"\"\n case i == 0 && err == nil:\n sortByField = dStr\n case i == 1 && err == nil && dStr == \"desc\":\n\t\t\tp.SortAsc = false\n\t\tcase i == 1:\n\t\t\tp.SortAsc = true\n }\n }\n\n switch seqv.Kind() {\n case reflect.Array, reflect.Slice:\n for i := 0; i < seqv.Len(); i++ {\n p.Pairs[i].Value = seqv.Index(i)\n if sortByField == \"\" || sortByField == \"value\" {\n p.Pairs[i].Key = p.Pairs[i].Value\n } else {\n v := PathValue(p.Pairs[i].Value, sortByField)\n p.Pairs[i].Key = v\n }\n }\n\n case reflect.Map:\n keys := seqv.MapKeys()\n for i := 0; i < seqv.Len(); i++ {\n p.Pairs[i].Value = seqv.MapIndex(keys[i])\n if sortByField == \"\" {\n p.Pairs[i].Key = keys[i]\n } else if sortByField == \"value\" {\n p.Pairs[i].Key = p.Pairs[i].Value\n } else {\n v := PathValue(p.Pairs[i].Value, sortByField)\n p.Pairs[i].Key = v\n }\n }\n }\n\n return p.sort(), nil\n}", "title": "" }, { "docid": "e60cfbd5651e97c2da30188179b8477b", "score": "0.41607472", "text": "func (*SortType) Descriptor() ([]byte, []int) {\n\treturn file_yelp_nrtsearch_search_proto_rawDescGZIP(), []int{30}\n}", "title": "" }, { "docid": "4fe373e5627d22ebba86b10ebfd48f04", "score": "0.4160477", "text": "func (s *localSuite) TestRangeProperties(c *C) {\n\ttype testCase struct {\n\t\tkey []byte\n\t\tvLen int\n\t\tcount int\n\t}\n\tcases := []testCase{\n\t\t// handle \"a\": size(size = 1, offset = 1),keys(1,1)\n\t\t{[]byte(\"a\"), 0, 1},\n\t\t{[]byte(\"b\"), defaultPropSizeIndexDistance / 8, 1},\n\t\t{[]byte(\"c\"), defaultPropSizeIndexDistance / 4, 1},\n\t\t{[]byte(\"d\"), defaultPropSizeIndexDistance / 2, 1},\n\t\t{[]byte(\"e\"), defaultPropSizeIndexDistance / 8, 1},\n\t\t// handle \"e\": size(size = DISTANCE + 4, offset = DISTANCE + 5),keys(4,5)\n\t\t{[]byte(\"f\"), defaultPropSizeIndexDistance / 4, 1},\n\t\t{[]byte(\"g\"), defaultPropSizeIndexDistance / 2, 1},\n\t\t{[]byte(\"h\"), defaultPropSizeIndexDistance / 8, 1},\n\t\t{[]byte(\"i\"), defaultPropSizeIndexDistance / 4, 1},\n\t\t// handle \"i\": size(size = DISTANCE / 8 * 9 + 4, offset = DISTANCE / 8 * 17 + 9),keys(4,5)\n\t\t{[]byte(\"j\"), defaultPropSizeIndexDistance / 2, 1},\n\t\t{[]byte(\"k\"), defaultPropSizeIndexDistance / 2, 1},\n\t\t// handle \"k\": size(size = DISTANCE + 2, offset = DISTANCE / 8 * 25 + 11),keys(2,11)\n\t\t{[]byte(\"l\"), 0, defaultPropKeysIndexDistance / 2},\n\t\t{[]byte(\"m\"), 0, defaultPropKeysIndexDistance / 2},\n\t\t//handle \"m\": keys = DEFAULT_PROP_KEYS_INDEX_DISTANCE,offset = 11+DEFAULT_PROP_KEYS_INDEX_DISTANCE\n\t\t{[]byte(\"n\"), 1, defaultPropKeysIndexDistance},\n\t\t//handle \"n\": keys = DEFAULT_PROP_KEYS_INDEX_DISTANCE, offset = 11+2*DEFAULT_PROP_KEYS_INDEX_DISTANCE\n\t\t{[]byte(\"o\"), 1, 1},\n\t\t// handle \"o\": keys = 1, offset = 12 + 2*DEFAULT_PROP_KEYS_INDEX_DISTANCE\n\t}\n\n\tcollector := newRangePropertiesCollector()\n\tfor _, p := range cases {\n\t\tv := make([]byte, p.vLen)\n\t\tfor i := 0; i < p.count; i++ {\n\t\t\t_ = collector.Add(pebble.InternalKey{UserKey: p.key}, v)\n\t\t}\n\t}\n\n\tuserProperties := make(map[string]string, 1)\n\t_ = collector.Finish(userProperties)\n\n\tprops, err := decodeRangeProperties(hack.Slice(userProperties[propRangeIndex]))\n\tc.Assert(err, IsNil)\n\n\t// Smallest key in props.\n\tc.Assert(props[0].Key, DeepEquals, cases[0].key)\n\t// Largest key in props.\n\tc.Assert(props[len(props)-1].Key, DeepEquals, cases[len(cases)-1].key)\n\tc.Assert(len(props), Equals, 7)\n\n\ta := props.get([]byte(\"a\"))\n\tc.Assert(a.Size, Equals, uint64(1))\n\te := props.get([]byte(\"e\"))\n\tc.Assert(e.Size, Equals, uint64(defaultPropSizeIndexDistance+5))\n\ti := props.get([]byte(\"i\"))\n\tc.Assert(i.Size, Equals, uint64(defaultPropSizeIndexDistance/8*17+9))\n\tk := props.get([]byte(\"k\"))\n\tc.Assert(k.Size, Equals, uint64(defaultPropSizeIndexDistance/8*25+11))\n\tm := props.get([]byte(\"m\"))\n\tc.Assert(m.Keys, Equals, uint64(defaultPropKeysIndexDistance+11))\n\tn := props.get([]byte(\"n\"))\n\tc.Assert(n.Keys, Equals, uint64(defaultPropKeysIndexDistance*2+11))\n\to := props.get([]byte(\"o\"))\n\tc.Assert(o.Keys, Equals, uint64(defaultPropKeysIndexDistance*2+12))\n\n\tprops2 := rangeProperties([]rangeProperty{\n\t\t{[]byte(\"b\"), rangeOffsets{defaultPropSizeIndexDistance + 10, defaultPropKeysIndexDistance / 2}},\n\t\t{[]byte(\"h\"), rangeOffsets{defaultPropSizeIndexDistance * 3 / 2, defaultPropKeysIndexDistance * 3 / 2}},\n\t\t{[]byte(\"k\"), rangeOffsets{defaultPropSizeIndexDistance * 3, defaultPropKeysIndexDistance * 7 / 4}},\n\t\t{[]byte(\"mm\"), rangeOffsets{defaultPropSizeIndexDistance * 5, defaultPropKeysIndexDistance * 2}},\n\t\t{[]byte(\"q\"), rangeOffsets{defaultPropSizeIndexDistance * 7, defaultPropKeysIndexDistance*9/4 + 10}},\n\t\t{[]byte(\"y\"), rangeOffsets{defaultPropSizeIndexDistance*7 + 100, defaultPropKeysIndexDistance*9/4 + 1010}},\n\t})\n\n\tsizeProps := newSizeProperties()\n\tsizeProps.addAll(props)\n\tsizeProps.addAll(props2)\n\n\tres := []*rangeProperty{\n\t\t{[]byte(\"a\"), rangeOffsets{1, 1}},\n\t\t{[]byte(\"b\"), rangeOffsets{defaultPropSizeIndexDistance + 10, defaultPropKeysIndexDistance / 2}},\n\t\t{[]byte(\"e\"), rangeOffsets{defaultPropSizeIndexDistance + 4, 4}},\n\t\t{[]byte(\"h\"), rangeOffsets{defaultPropSizeIndexDistance/2 - 10, defaultPropKeysIndexDistance}},\n\t\t{[]byte(\"i\"), rangeOffsets{defaultPropSizeIndexDistance*9/8 + 4, 4}},\n\t\t{[]byte(\"k\"), rangeOffsets{defaultPropSizeIndexDistance*5/2 + 2, defaultPropKeysIndexDistance/4 + 2}},\n\t\t{[]byte(\"m\"), rangeOffsets{defaultPropKeysIndexDistance, defaultPropKeysIndexDistance}},\n\t\t{[]byte(\"mm\"), rangeOffsets{defaultPropSizeIndexDistance * 2, defaultPropKeysIndexDistance / 4}},\n\t\t{[]byte(\"n\"), rangeOffsets{defaultPropKeysIndexDistance * 2, defaultPropKeysIndexDistance}},\n\t\t{[]byte(\"o\"), rangeOffsets{2, 1}},\n\t\t{[]byte(\"q\"), rangeOffsets{defaultPropSizeIndexDistance * 2, defaultPropKeysIndexDistance/4 + 10}},\n\t\t{[]byte(\"y\"), rangeOffsets{100, 1000}},\n\t}\n\n\tc.Assert(sizeProps.indexHandles.Len(), Equals, 12)\n\tidx := 0\n\tsizeProps.iter(func(p *rangeProperty) bool {\n\t\tc.Assert(p, DeepEquals, res[idx])\n\t\tidx++\n\t\treturn true\n\t})\n\n\tfullRange := Range{start: []byte(\"a\"), end: []byte(\"z\")}\n\tranges := splitRangeBySizeProps(fullRange, sizeProps, 2*defaultPropSizeIndexDistance, defaultPropKeysIndexDistance*5/2)\n\n\tc.Assert(ranges, DeepEquals, []Range{\n\t\t{start: []byte(\"a\"), end: []byte(\"e\")},\n\t\t{start: []byte(\"e\"), end: []byte(\"k\")},\n\t\t{start: []byte(\"k\"), end: []byte(\"mm\")},\n\t\t{start: []byte(\"mm\"), end: []byte(\"q\")},\n\t\t{start: []byte(\"q\"), end: []byte(\"z\")},\n\t})\n\n\tranges = splitRangeBySizeProps(fullRange, sizeProps, 2*defaultPropSizeIndexDistance, defaultPropKeysIndexDistance)\n\tc.Assert(ranges, DeepEquals, []Range{\n\t\t{start: []byte(\"a\"), end: []byte(\"e\")},\n\t\t{start: []byte(\"e\"), end: []byte(\"h\")},\n\t\t{start: []byte(\"h\"), end: []byte(\"k\")},\n\t\t{start: []byte(\"k\"), end: []byte(\"m\")},\n\t\t{start: []byte(\"m\"), end: []byte(\"mm\")},\n\t\t{start: []byte(\"mm\"), end: []byte(\"n\")},\n\t\t{start: []byte(\"n\"), end: []byte(\"q\")},\n\t\t{start: []byte(\"q\"), end: []byte(\"z\")},\n\t})\n}", "title": "" } ]
e7d7befa07729e86583fae49a04ddffc
PositionCount return the number of coordinates.
[ { "docid": "46867fcb90ba9627f08b73ce74057b46", "score": "0.78137684", "text": "func (g SimplePoint) PositionCount() int {\n\treturn 1\n}", "title": "" } ]
[ { "docid": "47dfde47292c111ea1aa9df6abe29105", "score": "0.7289333", "text": "func (_Contracts *ContractsCaller) PositionsCount(opts *bind.CallOpts, _proposal *big.Int) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _Contracts.contract.Call(opts, out, \"positionsCount\", _proposal)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "9cba263c00615798838d1f5edb68795e", "score": "0.7245372", "text": "func (_Contracts *ContractsSession) PositionsCount(_proposal *big.Int) (*big.Int, error) {\n\treturn _Contracts.Contract.PositionsCount(&_Contracts.CallOpts, _proposal)\n}", "title": "" }, { "docid": "a83b22c4ae50f2302884c23b9f99174a", "score": "0.71854305", "text": "func (_Contracts *ContractsCallerSession) PositionsCount(_proposal *big.Int) (*big.Int, error) {\n\treturn _Contracts.Contract.PositionsCount(&_Contracts.CallOpts, _proposal)\n}", "title": "" }, { "docid": "57651b2266495a0afed1861ae0c63819", "score": "0.69978786", "text": "func (geom Geometry) PointCount() int {\n\tcount := C.OGR_G_GetPointCount(geom.cval)\n\treturn int(count)\n}", "title": "" }, { "docid": "1d49647f942d5e1c873dc7389d766c56", "score": "0.671734", "text": "func (oupq *OrgUnitPositionQuery) Count(ctx context.Context) (int, error) {\n\tif err := oupq.prepareQuery(ctx); err != nil {\n\t\treturn 0, err\n\t}\n\treturn oupq.sqlCount(ctx)\n}", "title": "" }, { "docid": "a121b2fa59176b77eb07258147ad92b4", "score": "0.6657114", "text": "func (q boardsSectionsPositionQuery) Count(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\n\terr := q.Query.QueryRowContext(ctx, exec).Scan(&count)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"rdb: failed to count boards_sections_positions rows\")\n\t}\n\n\treturn count, nil\n}", "title": "" }, { "docid": "e00667fcfc6e1df14d33585945ac7b29", "score": "0.6494954", "text": "func (rra *RoundRobinArchive) PointCount() int {\n\treturn len(rra.dps)\n}", "title": "" }, { "docid": "e96e98a629c16ff764f500949729689b", "score": "0.6376337", "text": "func (this *RectangleShape) GetPointCount() uint {\n\treturn uint(C.sfRectangleShape_getPointCount(this.cptr))\n}", "title": "" }, { "docid": "171b4d7858807c0e82a6b05cffbf4436", "score": "0.6321633", "text": "func (ecpq *EntityContactPointQuery) Count(ctx context.Context) (int, error) {\n\tif err := ecpq.prepareQuery(ctx); err != nil {\n\t\treturn 0, err\n\t}\n\treturn ecpq.sqlCount(ctx)\n}", "title": "" }, { "docid": "1b7e6a92731189eea3cc32b12897b19a", "score": "0.6315991", "text": "func (oupq *OrgUnitPositionQuery) CountX(ctx context.Context) int {\n\tcount, err := oupq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "48b135709152d97cdab9fda04f7a148d", "score": "0.6157319", "text": "func (geom Geometry) GeometryCount() int {\n\tcount := C.OGR_G_GetGeometryCount(geom.cval)\n\treturn int(count)\n}", "title": "" }, { "docid": "083cf9c1876c87247e16478f35376817", "score": "0.6042446", "text": "func (s *Server) Count() int {\n\ts.cond.L.Lock()\n\tdefer s.cond.L.Unlock()\n\treturn len(s.points)\n}", "title": "" }, { "docid": "80f22fcfecc6dd059f16ec23821c7892", "score": "0.60186934", "text": "func (lq *LocationQuery) Count(ctx context.Context) (int, error) {\n\treturn lq.sqlCount(ctx)\n}", "title": "" }, { "docid": "c1d9e3e1a7cb9c7ec4d4ec8e6348bb62", "score": "0.5968196", "text": "func (lq *LocationQuery) CountX(ctx context.Context) int {\n\tcount, err := lq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "e8a7455dd82010f729c7ad8a3f39d529", "score": "0.5962164", "text": "func (g *Grid) Count() int32 {\n\treturn int32(len(g.set))\n}", "title": "" }, { "docid": "3f55ec79f1c0929403e50da5c6b5652b", "score": "0.58274096", "text": "func (self *Grid) Count(x, y int) int {\t\t\t\t// The number of possibles at x,y - maybe optimise this away later\n\tret := 0\n\tfor n := 0; n < 9; n++ {\n\t\tif self.cells[x][y][n] {\n\t\t\tret++\n\t\t}\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "4c752ad8f8a890d40ba2d6e6a42923bf", "score": "0.5820185", "text": "func (r *SlidingWindow) Count() int {return r.count}", "title": "" }, { "docid": "08e0b852783d02c9406e157b95bf09fb", "score": "0.57562333", "text": "func (c Cluster) Count() int {\n\treturn len(c.indices)\n}", "title": "" }, { "docid": "5b80f68f32fc197bb71a274774004d65", "score": "0.5743074", "text": "func (p *Player) DominoCount() int {\n\treturn len(p.dominos)\n}", "title": "" }, { "docid": "110f708780044ca393737824b0317cce", "score": "0.5734645", "text": "func (_Contracts *ContractsSession) CandidatesCount(_proposal *big.Int, _position *big.Int) (*big.Int, error) {\n\treturn _Contracts.Contract.CandidatesCount(&_Contracts.CallOpts, _proposal, _position)\n}", "title": "" }, { "docid": "f8f6c100f781bec269bc2380adbcdd2f", "score": "0.5696516", "text": "func (jr *JourneyResults) Count() int {\n\treturn len(jr.Journeys)\n}", "title": "" }, { "docid": "c6f392db728e9c70d3a48549f9ef2f0d", "score": "0.5684426", "text": "func (ecpq *EntityContactPointQuery) CountX(ctx context.Context) int {\n\tcount, err := ecpq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "63c6d409f7a3c37195366b3b814970c3", "score": "0.5634874", "text": "func (c *Canvas) Count() int {\n\treturn len(c.paint)\n}", "title": "" }, { "docid": "e8b728c8b526163ebffc4f83ce9e1f7c", "score": "0.5626201", "text": "func (c *OpContext) MarkPositions() int {\n\treturn len(c.positions)\n}", "title": "" }, { "docid": "9acdb094baec37f50b148d346e6b08bd", "score": "0.562251", "text": "func (q addressQuery) Count() (int64, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\n\terr := q.Query.QueryRow().Scan(&count)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"sqlboiler: failed to count address rows\")\n\t}\n\n\treturn count, nil\n}", "title": "" }, { "docid": "a8a7287025849640a2b593cc740601a8", "score": "0.5601911", "text": "func GetNumberOfNodes() int64 {\r\n\treturn int64(len(nodesByPosition))\r\n}", "title": "" }, { "docid": "f7ff57780e21eea8ef91be93032d83e4", "score": "0.5547241", "text": "func (_Contracts *ContractsCallerSession) CandidatesCount(_proposal *big.Int, _position *big.Int) (*big.Int, error) {\n\treturn _Contracts.Contract.CandidatesCount(&_Contracts.CallOpts, _proposal, _position)\n}", "title": "" }, { "docid": "51ac6f6391c636d5b8e8295d8bc1859b", "score": "0.55458105", "text": "func (c *vertexCollection) Count(ctx context.Context) (int64, error) {\n\tresult, err := c.rawCollection().Count(ctx)\n\tif err != nil {\n\t\treturn 0, WithStack(err)\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "1df86728fffaf77ae91087b1da2d162c", "score": "0.55418986", "text": "func (pkmn *Pokemon) MoveCount() int {\n\tcnt := 0\n\n\tif pkmn.Move1 != 0 {\n\t\tcnt++\n\t}\n\tif pkmn.Move2 != 0 {\n\t\tcnt++\n\t}\n\tif pkmn.Move3 != 0 {\n\t\tcnt++\n\t}\n\tif pkmn.Move4 != 0 {\n\t\tcnt++\n\t}\n\n\treturn cnt\n}", "title": "" }, { "docid": "7694bc29c62e347a0c807c9df724fb2a", "score": "0.5535716", "text": "func (r Rooms) Count() int {\n\treturn len(r.rooms)\n}", "title": "" }, { "docid": "a69aa73935612d40cefdcb01169ffb5e", "score": "0.5525335", "text": "func (w WaysMapping) Count() int {\n\treturn len(w)\n}", "title": "" }, { "docid": "d4a58ed533a3f39cc159ce3be4546864", "score": "0.5519137", "text": "func (m *ItemProfilePositionsRequestBuilder) Count()(*ItemProfilePositionsCountRequestBuilder) {\n return NewItemProfilePositionsCountRequestBuilderInternal(m.BaseRequestBuilder.PathParameters, m.BaseRequestBuilder.RequestAdapter)\n}", "title": "" }, { "docid": "bbd9e340637db28b2004131d5fe96fee", "score": "0.550895", "text": "func GetCountOfActiveNodes() int64 {\r\n\treturn int64(len(nodesByPosition))\r\n}", "title": "" }, { "docid": "7ef37b6584710e65f216fd37a1bd6d39", "score": "0.5482664", "text": "func (q addressQuery) CountP() int64 {\n\tc, err := q.Count()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn c\n}", "title": "" }, { "docid": "0598f934e19c97f6478c3509cdb1964e", "score": "0.5467768", "text": "func (p Polygon) NumVertices() int {\n\tnum := 0\n\tfor _, c := range p {\n\t\tnum += len(c)\n\t}\n\treturn num\n}", "title": "" }, { "docid": "b204885c3bc857e1de26c44c80c31bac", "score": "0.5462127", "text": "func (sl *TimeSlice) NumPoints() uint32 {\n\tif sl.IsEmpty() {\n\t\treturn 0\n\t}\n\treturn sl.lastIdx - sl.firstIdx + 1\n}", "title": "" }, { "docid": "ff5d5d81afb254112070d4437aa9d92f", "score": "0.5451578", "text": "func (m *OMap) Count() int {\n\treturn len(m.keys)\n}", "title": "" }, { "docid": "29764c4456221ece14ac65353483e909", "score": "0.5439496", "text": "func (q jetQuery) Count() (int64, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\n\terr := q.Query.QueryRow().Scan(&count)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to count jets rows\")\n\t}\n\n\treturn count, nil\n}", "title": "" }, { "docid": "d50ab6acfe24d83949bd9081784fdf0a", "score": "0.5409689", "text": "func (vs *Variables) Count() int {\n\treturn len(vs.n)\n}", "title": "" }, { "docid": "1b741492d2833bf2747f9701ea21f08e", "score": "0.5361013", "text": "func (self *SafeMap) Count() int {\n\tself.lock.RLock()\n\tdefer self.lock.RUnlock()\n\n\treturn len(self.sm)\n}", "title": "" }, { "docid": "08cb237bb80d29f52c03b90d7cb348a6", "score": "0.5336537", "text": "func (o *PointsRetentionOptions) GetCount() int32 {\n\tif o == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\n\treturn o.Count\n}", "title": "" }, { "docid": "d9b684376872777e3ceaf7e456434caf", "score": "0.53293663", "text": "func (q storestateQuery) Count(exec boil.Executor) (int64, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\n\terr := q.Query.QueryRow(exec).Scan(&count)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"stellarcore: failed to count storestate rows\")\n\t}\n\n\treturn count, nil\n}", "title": "" }, { "docid": "15462294ec70d5cac582fada58914f19", "score": "0.53181255", "text": "func PRepCount() float64 {\n\tpReps.Mutex.Lock()\n\tcount := len(pReps.PReps)\n\tpReps.Mutex.Unlock()\n\treturn float64(count)\n}", "title": "" }, { "docid": "4a1a02a06f370eba70183d35914b4859", "score": "0.53148544", "text": "func (s *SessionStore) Count(q *SessionQuery) (int64, error) {\n\treturn s.Store.Count(q)\n}", "title": "" }, { "docid": "d2d6e3e2a743a8e2c9390b8fe0b61194", "score": "0.53124577", "text": "func (q jetQuery) CountP() int64 {\n\tc, err := q.Count()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn c\n}", "title": "" }, { "docid": "253a94418c9a6de3ac34bb8e27fa8e53", "score": "0.5298922", "text": "func (u *UpdateShortChatMessage) GetPtsCount() (value int) {\n\tif u == nil {\n\t\treturn\n\t}\n\treturn u.PtsCount\n}", "title": "" }, { "docid": "27c7c56c8e42a038cc41e438df86e19b", "score": "0.52778804", "text": "func (o *PlatformsByPlatformNameAllOfData) GetCount() int32 {\n\tif o == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\n\treturn o.Count\n}", "title": "" }, { "docid": "d7f5170a91a2aaba4b031ad97e1d73a0", "score": "0.52749383", "text": "func (spriteBatch *SpriteBatch) GetCount() int {\n\treturn spriteBatch.count\n}", "title": "" }, { "docid": "dd55ef358c1276665e6aef347e4ae07a", "score": "0.5274825", "text": "func (q destinationRankQuery) Count(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\n\terr := q.Query.QueryRowContext(ctx, exec).Scan(&count)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to count destination_rank rows\")\n\t}\n\n\treturn count, nil\n}", "title": "" }, { "docid": "1f42e665737dc8444bd7110e93b85228", "score": "0.52733445", "text": "func (r *linesIterator) Count() uint64 {\n\treturn uint64(r.linesCount)\n}", "title": "" }, { "docid": "c3a260eeed4c997f8ba3cd7f9c1eb025", "score": "0.52717024", "text": "func (sq *ShopQuery) CountX(ctx context.Context) int {\n\tcount, err := sq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "7fd931eca7c5aa5c8eab679beddc3549", "score": "0.526331", "text": "func (s PointBuffer) Len() int {\n\treturn s.len\n}", "title": "" }, { "docid": "c4c2e4e9d69f28e75a814897d8a9bf32", "score": "0.5256184", "text": "func (osq *OfflineSessionQuery) Count(ctx context.Context) (int, error) {\n\tctx = setContextOp(ctx, osq.ctx, \"Count\")\n\tif err := osq.prepareQuery(ctx); err != nil {\n\t\treturn 0, err\n\t}\n\treturn withInterceptors[int](ctx, osq, querierCount[*OfflineSessionQuery](), osq.inters)\n}", "title": "" }, { "docid": "92553d65a44d98d7252872fbc56dc9c7", "score": "0.52555895", "text": "func (s PgPromotionStore) Count() int {\n\tvar n int\n\ts.db.Get(&n, \"SELECT COUNT(*) FROM public.promotion\")\n\treturn n\n}", "title": "" }, { "docid": "63cfcca049e1b922c5a74f196f0a34c6", "score": "0.5250518", "text": "func (q phenotypepropQuery) Count() (int64, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\n\terr := q.Query.QueryRow().Scan(&count)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"chado: failed to count phenotypeprop rows\")\n\t}\n\n\treturn count, nil\n}", "title": "" }, { "docid": "9ad595d3cf8dd11efd09eb4f21d761e5", "score": "0.5247707", "text": "func (u *UpdateShortMessage) GetPtsCount() (value int) {\n\tif u == nil {\n\t\treturn\n\t}\n\treturn u.PtsCount\n}", "title": "" }, { "docid": "459ac8eefd6760cd20f5754faba54d39", "score": "0.52474064", "text": "func (q weatherQuery) Count(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\n\terr := q.Query.QueryRowContext(ctx, exec).Scan(&count)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"db: failed to count weather rows\")\n\t}\n\n\treturn count, nil\n}", "title": "" }, { "docid": "982b12ab34d4d8bee1a0cddb05fd87aa", "score": "0.524524", "text": "func (_Contracts *ContractsCaller) CandidatesCount(opts *bind.CallOpts, _proposal *big.Int, _position *big.Int) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _Contracts.contract.Call(opts, out, \"candidatesCount\", _proposal, _position)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "7bb0b85a2619248a2c36752eae04348d", "score": "0.52448267", "text": "func (this *Grid) gridCount() int {\n\tif this.gridcnt <= 0 {\n\t\tthis.gridcnt = this.NumX * this.NumY * this.NumZ\n\t}\n\treturn this.gridcnt\n}", "title": "" }, { "docid": "ab8dc48528a21ccecc74fe51ffd66047", "score": "0.5244755", "text": "func (line Line) Count() int {\n\treturn 1 + len(line.Before) + len(line.After)\n}", "title": "" }, { "docid": "07500614cefbde9f98260df67e77a3cf", "score": "0.52419573", "text": "func (rrq *ReserveRoomQuery) Count(ctx context.Context) (int, error) {\n\tif err := rrq.prepareQuery(ctx); err != nil {\n\t\treturn 0, err\n\t}\n\treturn rrq.sqlCount(ctx)\n}", "title": "" }, { "docid": "eab7156ebcd985b924aea0f9e8633ca2", "score": "0.5231171", "text": "func (u *UpdateShortSentMessage) GetPtsCount() (value int) {\n\tif u == nil {\n\t\treturn\n\t}\n\treturn u.PtsCount\n}", "title": "" }, { "docid": "82a566850ade53894ab9ae632922ca2d", "score": "0.5227009", "text": "func (rrq *ReserveRoomQuery) CountX(ctx context.Context) int {\n\tcount, err := rrq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "0edfc2953f5b637aff20e283f69f8ffc", "score": "0.52261466", "text": "func (osq *OfflineSessionQuery) CountX(ctx context.Context) int {\n\tcount, err := osq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "0edfc2953f5b637aff20e283f69f8ffc", "score": "0.52261466", "text": "func (osq *OfflineSessionQuery) CountX(ctx context.Context) int {\n\tcount, err := osq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "5a6edef7344a3cdc510b1c391424b8f9", "score": "0.52221", "text": "func (q friendshipQuery) Count(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\n\terr := q.Query.QueryRowContext(ctx, exec).Scan(&count)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to count friendship rows\")\n\t}\n\n\treturn count, nil\n}", "title": "" }, { "docid": "966a0154056f0528e0c98139eebd59d5", "score": "0.5220782", "text": "func (pq *PrizeQuery) Count(ctx context.Context) (int, error) {\n\tif err := pq.prepareQuery(ctx); err != nil {\n\t\treturn 0, err\n\t}\n\treturn pq.sqlCount(ctx)\n}", "title": "" }, { "docid": "ae7ebea28ae74da1805354f34d1784f2", "score": "0.52128035", "text": "func (pq *PrizeQuery) CountX(ctx context.Context) int {\n\tcount, err := pq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "5e4cd3309b5a178c5b8323791db66875", "score": "0.52123255", "text": "func (o *PlatformsAllOfData) GetCount() int32 {\n\tif o == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\n\treturn o.Count\n}", "title": "" }, { "docid": "129c611a8c606b374fc312c57e0ea354", "score": "0.52111226", "text": "func (s *PollVoteStore) Count(q *PollVoteQuery) (int64, error) {\n\treturn s.Store.Count(q)\n}", "title": "" }, { "docid": "440df8c1c1da0463d839d62108e75598", "score": "0.52107203", "text": "func (feature Feature) GeometryFieldCount() int {\n\tcount := C.OGR_F_GetGeomFieldCount(feature.cval)\n\treturn int(count)\n}", "title": "" }, { "docid": "aa62daa02e1d0b5d2c3aa6b3b8a7caaa", "score": "0.52100044", "text": "func (q vspQuery) Count(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\n\terr := q.Query.QueryRowContext(ctx, exec).Scan(&count)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to count vsp rows\")\n\t}\n\n\treturn count, nil\n}", "title": "" }, { "docid": "10f37cd38844b77f48cc6ffbad6caae3", "score": "0.5208508", "text": "func (osq *OfflineSessionQuery) Count(ctx context.Context) (int, error) {\n\tif err := osq.prepareQuery(ctx); err != nil {\n\t\treturn 0, err\n\t}\n\treturn osq.sqlCount(ctx)\n}", "title": "" }, { "docid": "06182f2ccd53a74e3008c1c226f59e72", "score": "0.52078", "text": "func (hq *HarborQuery) CountX(ctx context.Context) int {\n\tcount, err := hq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "06e565971c38d5dd412ca041acbf72ba", "score": "0.520675", "text": "func (s *Stack) Count() uint {\n\treturn s.count\n}", "title": "" }, { "docid": "ee14fec3b3874db20e1fcf9c6961e7cd", "score": "0.5205534", "text": "func (s Scope) Count() int {\n\treturn s.m.Count()\n}", "title": "" }, { "docid": "86f0f75d13193ca16e4bafe2b8392cb1", "score": "0.52016616", "text": "func (sq *ServerQuery) CountX(ctx context.Context) int {\n\tcount, err := sq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "c8fa85148850ff888f36de5a6b147125", "score": "0.52001095", "text": "func (q restaurantRankQuery) Count(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\n\terr := q.Query.QueryRowContext(ctx, exec).Scan(&count)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to count restaurant_rank rows\")\n\t}\n\n\treturn count, nil\n}", "title": "" }, { "docid": "fcb50e424be3937d926f8f3990d27516", "score": "0.5188302", "text": "func (q multiAddressesSetQuery) Count(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\n\terr := q.Query.QueryRowContext(ctx, exec).Scan(&count)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to count multi_addresses_sets rows\")\n\t}\n\n\treturn count, nil\n}", "title": "" }, { "docid": "7ffb72742758a54bf2e6a4e7cfe4e8ce", "score": "0.5182029", "text": "func (g *GPIOControllerPCF8574T) Count() int {\n\treturn pinCount\n}", "title": "" }, { "docid": "ce4752945d345a4082d2f623420aa965", "score": "0.51790506", "text": "func (bc *BasicLineGraph) GetRegionCount() uint32 {\n\tbc.RLock()\n\tdefer bc.RUnlock()\n\treturn bc.Regions.GetRegionCount()\n}", "title": "" }, { "docid": "10212b277e1e529a43e7b16da33a3e4c", "score": "0.51772004", "text": "func (eq *EntityQuery) CountX(ctx context.Context) int {\n\tcount, err := eq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "1da02d8a55582027d5a6d214e7185e2a", "score": "0.51724285", "text": "func (t *TrafficClones) GetCount() int {\n\tif t == nil || t.Count == nil {\n\t\treturn 0\n\t}\n\treturn *t.Count\n}", "title": "" }, { "docid": "1e4b51de57e53780685c5b84b9b5784e", "score": "0.517206", "text": "func (nimq *NetInterfaceModeQuery) CountX(ctx context.Context) int {\n\tcount, err := nimq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "9b5836ed2434600865c36c59e2532509", "score": "0.51718193", "text": "func (pq *ParticipantQuery) CountX(ctx context.Context) int {\n\tcount, err := pq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "f6f7d9e89945de9b18f4ac3197ca3948", "score": "0.51677513", "text": "func (p *PointerCallback) ArgCount() int {\n\treturn p.paramCount\n}", "title": "" }, { "docid": "f413b64f99169dc2a915d4de7fe663f0", "score": "0.5165093", "text": "func (p Player)CountPoint(boardCows []int)int{\n\t// Point if 100 for each color staying on board\n\ttotal := 0\n\tfor i,nb := range p.Cows {\n\t\ttotal+=boardCows[i]*100 * int(nb)\n\t}\n\tfor _,money := range p.Moneys {\n\t\ttotal+=money\n\t}\n\treturn total\n}", "title": "" }, { "docid": "36d84b244d4edd962c0d609a8dbbbf9b", "score": "0.5162334", "text": "func (s *PersonStore) Count(q *PersonQuery) (int64, error) {\n\treturn s.Store.Count(q)\n}", "title": "" }, { "docid": "76397f6771a2f6012fafc87f5cb71199", "score": "0.5159696", "text": "func (q braceletPhotoQuery) CountP() int64 {\n\tc, err := q.Count()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn c\n}", "title": "" }, { "docid": "1331628de0090d5ac2148f3e0368d728", "score": "0.515811", "text": "func (s *Stat) GetCount() int {\n\treturn s.n\n}", "title": "" }, { "docid": "268a2074399f400536af1583d355e0cf", "score": "0.51474565", "text": "func (geom Geometry) CoordinateDimension() int {\n\tdim := C.OGR_G_GetCoordinateDimension(geom.cval)\n\treturn int(dim)\n}", "title": "" }, { "docid": "3c6bfc6a0fc2e437f98acbeee0853de3", "score": "0.51453805", "text": "func (m *PlacesRequestBuilder) Count()(*i96dc26d0aeeaa176ce5a9a2e4c3a41f16bf45597d0b76d3726430be9a966acb8.CountRequestBuilder) {\n return i96dc26d0aeeaa176ce5a9a2e4c3a41f16bf45597d0b76d3726430be9a966acb8.NewCountRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "title": "" }, { "docid": "f110525feeb415bcb841281913ba7d0a", "score": "0.5142304", "text": "func (s MemoryStorage) Count(q Query) (int, error) {\n\tfmt.Println(\"LEN\", len(s.bookmarks))\n\treturn len(s.bookmarks), nil\n}", "title": "" }, { "docid": "e9b1d948bc439cdc83bfe09b89984e0f", "score": "0.5140054", "text": "func (s *ParticleSystem) NumParticles() int {\n\treturn len(s.particles)\n}", "title": "" }, { "docid": "3912eaffe9fe43232184ac9184458efc", "score": "0.5137347", "text": "func (q oauthClientQuery) Count(exec boil.Executor) (int64, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\n\terr := q.Query.QueryRow(exec).Scan(&count)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to count oauth_clients rows\")\n\t}\n\n\treturn count, nil\n}", "title": "" }, { "docid": "10070cc88de614b107476a764367572d", "score": "0.513587", "text": "func (s *PollStore) Count(q *PollQuery) (int64, error) {\n\treturn s.Store.Count(q)\n}", "title": "" }, { "docid": "64cbb5c226067a87830cd40e36569a99", "score": "0.5131635", "text": "func (liq *LineItemQuery) CountX(ctx context.Context) int {\n\tcount, err := liq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "ec393eb2f255d45dac199b13106e3a31", "score": "0.51227254", "text": "func (s *PetStore) Count(q *PetQuery) (int64, error) {\n\treturn s.Store.Count(q)\n}", "title": "" }, { "docid": "1d89a30306b005b36359bad6bea804b5", "score": "0.51199734", "text": "func (ouq *OrgUnitQuery) CountX(ctx context.Context) int {\n\tcount, err := ouq.Count(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn count\n}", "title": "" }, { "docid": "a97e04d4127b25101b84761f3e83fac2", "score": "0.51179767", "text": "func (c *GeometryCollection) Len() int { return len(c.geoms) }", "title": "" } ]
61250bca69522caabbf654a2cb6d9f32
Oversize handling tells AWS WAF what to do with a web request when the request component that the rule inspects is over the limits. Valid values include the following: `CONTINUE`, `MATCH`, `NO_MATCH`. See the AWS [documentation]( for more information.
[ { "docid": "ba1da82eb151c6de274c804ed8bd4346", "score": "0.0", "text": "func (o RuleGroupRuleStatementOrStatementStatementSizeConstraintStatementFieldToMatchHeaderOutput) OversizeHandling() pulumi.StringOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementSizeConstraintStatementFieldToMatchHeader) string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringOutput)\n}", "title": "" } ]
[ { "docid": "0b68b89f00ec04956c55b93391a15df5", "score": "0.6277758", "text": "func (o WebAclRuleStatementSizeConstraintStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementSizeConstraintStatementFieldToMatchBody) *string { return v.OversizeHandling }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "b946909e2725f37a8454f465c5411e02", "score": "0.6271965", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementXssMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementXssMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f0c27d0053a7081b5d8ca8a4aaeb0151", "score": "0.62648356", "text": "func (o WebAclRuleStatementSizeConstraintStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementSizeConstraintStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "7f7ac0001f9a3627b619ace8651598bd", "score": "0.62313473", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementXssMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementXssMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ae14e76c924bbc26f8df29a2ff00fa85", "score": "0.6198338", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9c71611cc36a2547e1d3d696e29c7bb7", "score": "0.6163909", "text": "func (o WebAclRuleStatementSizeConstraintStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebAclRuleStatementSizeConstraintStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "23a7d011130c5e4cbe8a19a933d720c9", "score": "0.6154249", "text": "func (o WebAclRuleStatementRegexMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRegexMatchStatementFieldToMatchJsonBody) *string { return v.OversizeHandling }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "543a8360701a9b485ad89fcb0ae7d6d8", "score": "0.6147493", "text": "func (o WebAclRuleStatementXssMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementXssMatchStatementFieldToMatchJsonBody) *string { return v.OversizeHandling }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "36b15dcafe695def975d0346a8f822fa", "score": "0.6146423", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "051d9426fe09dce9d5ff2658dfe790c0", "score": "0.6136312", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementXssMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementXssMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c4687366206a980502d3eb4cd97328ef", "score": "0.61313236", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementSqliMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementSqliMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f3681d5848f4eb06d01f978161001df0", "score": "0.6130994", "text": "func (o WebAclRuleStatementXssMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementXssMatchStatementFieldToMatchBody) *string { return v.OversizeHandling }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "2fd0134d365793b19d6d70a6113ed691", "score": "0.6127363", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementXssMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementXssMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "46287e389ff52bac0c62b33366307cce", "score": "0.6120981", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementXssMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementAndStatementStatementXssMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c918500d8b4671e1574bd48ade1cdf77", "score": "0.61156607", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementSqliMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementSqliMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "57690e0ab6c390a8e1191788da168838", "score": "0.6111468", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementSqliMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementAndStatementStatementSqliMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "faf5af8dbb014290763c8ad4869c319f", "score": "0.6106902", "text": "func (o WebAclRuleStatementRegexMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRegexMatchStatementFieldToMatchBody) *string { return v.OversizeHandling }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "eb1df4aaef7eb39d2ca5954b7fa20dbd", "score": "0.60961086", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementRegexMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementRegexMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "04e4983e842687a53e9238a2e40f7c6b", "score": "0.6089218", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementRegexMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementRegexMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0bbf745f8da5ff03bb24356e18d02b99", "score": "0.6085812", "text": "func (o RuleGroupRuleStatementOrStatementStatementXssMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementXssMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a1d3b60545ed242c91e5f7635da77293", "score": "0.60826397", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementRegexMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementAndStatementStatementRegexMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f6780f40747c28bd9494d54d202e9e48", "score": "0.60823876", "text": "func (o WebAclRuleStatementSizeConstraintStatementFieldToMatchBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebAclRuleStatementSizeConstraintStatementFieldToMatchBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f6a6d9d813b3a9e9ebf82b43ba348949", "score": "0.60716534", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementXssMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebAclRuleStatementRateBasedStatementScopeDownStatementXssMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "aedde2ebd27df6b3d3b76001c5100f3a", "score": "0.60703623", "text": "func (o WebAclRuleStatementSqliMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementSqliMatchStatementFieldToMatchJsonBody) *string { return v.OversizeHandling }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c90b5b2685a015dcf4edbd26e88bd458", "score": "0.6066411", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementByteMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementByteMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a6848632d9723d5cb46439384ad9cbe1", "score": "0.60642743", "text": "func (o RuleGroupRuleStatementOrStatementStatementSqliMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementSqliMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "bedce4022e74c63058fb37dac77b57c6", "score": "0.60603386", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementByteMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementByteMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4739444d11b4c2cae339c830e1899c5a", "score": "0.60550976", "text": "func (o WebAclRuleStatementSqliMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementSqliMatchStatementFieldToMatchBody) *string { return v.OversizeHandling }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9f47c58d480f7eed57b17ecf6adabd30", "score": "0.604963", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementByteMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementAndStatementStatementByteMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "77e848e6fae7f34fefcb6025662429fb", "score": "0.60452175", "text": "func (o RuleGroupRuleStatementOrStatementStatementRegexMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementRegexMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d22dcf01a58e9801021887c3978867c3", "score": "0.60441667", "text": "func SizeLimit(size int64) func(http.Handler) http.Handler {\n\n\treturn func(h http.Handler) http.Handler {\n\n\t\tfn := func(w http.ResponseWriter, r *http.Request) {\n\n\t\t\t// check ContentLength\n\t\t\tif r.ContentLength > size {\n\t\t\t\tw.WriteHeader(http.StatusRequestEntityTooLarge)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// check size of the actual body\n\t\t\tcontent, err := io.ReadAll(io.LimitReader(r.Body, size+1))\n\t\t\tif err != nil {\n\t\t\t\tw.WriteHeader(http.StatusServiceUnavailable)\n\t\t\t\treturn\n\t\t\t}\n\t\t\t_ = r.Body.Close() // the original body already consumed\n\n\t\t\tif int64(len(content)) > size {\n\t\t\t\tw.WriteHeader(http.StatusRequestEntityTooLarge)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tr.Body = io.NopCloser(bytes.NewReader(content))\n\t\t\th.ServeHTTP(w, r)\n\t\t}\n\n\t\treturn http.HandlerFunc(fn)\n\t}\n}", "title": "" }, { "docid": "4b25ea30578f127f8791d919a48de458", "score": "0.6041546", "text": "func (o RuleGroupRuleStatementOrStatementStatementSizeConstraintStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementSizeConstraintStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "400962522c7aecc6e6d28d0f4fa20380", "score": "0.60396165", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementSqliMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementSqliMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "1c4990b9ace789e0f38c59675b3efaef", "score": "0.60363054", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementSizeConstraintStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementSizeConstraintStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ea2fad38a7e7fabc329c668f5e6ea84d", "score": "0.6033591", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementXssMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementXssMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "cf49334f50eacc79f993928bf70ccdd0", "score": "0.603321", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementXssMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementXssMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "26154b5f818dbe30b0710200963d2a1f", "score": "0.6030267", "text": "func (o RuleGroupRuleStatementNotStatementStatementXssMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementNotStatementStatementXssMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "026db5f3c94b5c0b53aeac54576bcea8", "score": "0.60297614", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementSizeConstraintStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementAndStatementStatementSizeConstraintStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ecd9bf35846d080e2c80cfcdc8160b7d", "score": "0.602848", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementSizeConstraintStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementSizeConstraintStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9e0eae14905167b14b879d056e611557", "score": "0.6024707", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementXssMatchStatementFieldToMatchBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebAclRuleStatementRateBasedStatementScopeDownStatementXssMatchStatementFieldToMatchBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "2918da0c8de8f1bb3e3e4744103ef319", "score": "0.60217196", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementSqliMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementSqliMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9736bc63c2813739a458d3c33e8e0aba", "score": "0.6021077", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementXssMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementAndStatementStatementXssMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "52d301991e40e21ef02e87a5565acb26", "score": "0.6020282", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementSqliMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementAndStatementStatementSqliMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4736be489622f32953ce56b3cbe9c7c5", "score": "0.6012762", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementRegexPatternSetReferenceStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementRegexPatternSetReferenceStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "2dfdb0f9e8f7143d27b9220eb3740ca3", "score": "0.6007512", "text": "func (o RuleGroupRuleStatementOrStatementStatementByteMatchStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementByteMatchStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "be7f1b9d66c45ed3867c2fab549dd8cb", "score": "0.59953725", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebAclRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "7fe8c5d6db840c7661559a2a3e0a0178", "score": "0.5995036", "text": "func (o RuleGroupRuleStatementOrStatementStatementXssMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementXssMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4e2f6f1ce2cb9f3608cacf3eaf0bdf69", "score": "0.5993672", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementByteMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementByteMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f2a7909e96d8f8d60f4f4d80fb636030", "score": "0.59897614", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementRegexMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementRegexMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "88259060429f4b84d444efc47e1a3c0f", "score": "0.5987268", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementByteMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementByteMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "bb05bdf746132efbce67c438e45d7977", "score": "0.5985979", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementRegexPatternSetReferenceStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementAndStatementStatementRegexPatternSetReferenceStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "79eb850f2db61b91b50cc1a7fc3c60be", "score": "0.59783286", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementRegexPatternSetReferenceStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementRegexPatternSetReferenceStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "1de67e0ed32982c2bc78522f1cc05f3e", "score": "0.59757805", "text": "func (o RuleGroupRuleStatementOrStatementStatementSqliMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementSqliMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0c15507e9ef91bd15e897476c8c92204", "score": "0.5971715", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementByteMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementAndStatementStatementByteMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "e8cd9e8bec2086d99c6b9f5088afd9d9", "score": "0.5970271", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementRegexMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementRegexMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "06ef19fd49e1d53ee1f2828d0eb3b6f2", "score": "0.59631824", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementRegexMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementAndStatementStatementRegexMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6d1dca346bf0254106a4a6f15d9a4baf", "score": "0.5955088", "text": "func (o WebAclRuleStatementSizeConstraintStatementFieldToMatchHeaderOutput) OversizeHandling() pulumi.StringOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementSizeConstraintStatementFieldToMatchHeader) string { return v.OversizeHandling }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "d1436a6e9ea328afcaf5e355d9843539", "score": "0.59488475", "text": "func (o WebAclRuleStatementRegexPatternSetReferenceStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRegexPatternSetReferenceStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "996a1d50acca48429b54ce12f170f700", "score": "0.59438765", "text": "func (o WebAclRuleStatementRegexMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebAclRuleStatementRegexMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "e65999ae695e3e945f63daa43c741e60", "score": "0.5939864", "text": "func (o RuleGroupRuleStatementOrStatementStatementByteMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementByteMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d46e49dbc3342afcbf443ca7b7b64f2d", "score": "0.5936746", "text": "func (o RuleGroupRuleStatementOrStatementStatementSizeConstraintStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementSizeConstraintStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d6139b8fb6a0938949df2181d1050290", "score": "0.5934113", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementXssMatchStatementFieldToMatchHeaderOutput) OversizeHandling() pulumi.StringOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementXssMatchStatementFieldToMatchHeader) string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "bfe8c540d62fed51b925c9fa16443ffd", "score": "0.59337705", "text": "func (o RuleGroupRuleStatementOrStatementStatementRegexMatchStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementRegexMatchStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "b307d0f861bcaad7753a785c7c84bea9", "score": "0.59312433", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementFieldToMatchBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebAclRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementFieldToMatchBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "507d2908feda3a4f597c0156c455045f", "score": "0.5919017", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementSizeConstraintStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementSizeConstraintStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a6b4090bd470e7e68fcdec1b543cd856", "score": "0.5918927", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementSizeConstraintStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementAndStatementStatementSizeConstraintStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "348e4206e430ca176b38023f49050652", "score": "0.5918849", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementSizeConstraintStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementSizeConstraintStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ebd845e7ffaf352eebd3654b150ec343", "score": "0.5918829", "text": "func (o WebAclRuleStatementXssMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebAclRuleStatementXssMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a5f2558d5213ba5385bcb1e6e2fb072b", "score": "0.5915531", "text": "func (o RuleGroupRuleStatementOrStatementStatementRegexPatternSetReferenceStatementFieldToMatchJsonBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementRegexPatternSetReferenceStatementFieldToMatchJsonBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a01606a795ca46f52beda46fe924e58e", "score": "0.59044474", "text": "func (o RuleGroupRuleStatementOrStatementStatementSizeConstraintStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementSizeConstraintStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "93591e84d1995400c89c4053300cce80", "score": "0.58853185", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementSizeConstraintStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementNotStatementStatementSizeConstraintStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "31e58e41f36b05b2769142e8087ae886", "score": "0.58846194", "text": "func (o WebAclRuleStatementRegexPatternSetReferenceStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRegexPatternSetReferenceStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f4a687f1b05c907e7c556dee4bb5524e", "score": "0.5884273", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementSqliMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementNotStatementStatementSqliMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c6457f703a07774053161ca94bac3e96", "score": "0.58841485", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementSizeConstraintStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementAndStatementStatementSizeConstraintStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "eb17c685f556bb90895907945c120f25", "score": "0.5881203", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementXssMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementNotStatementStatementXssMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "e5291b2bb3a013d7475a281a36a41fdf", "score": "0.58795816", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementXssMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementAndStatementStatementXssMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0bc6fe2bec8fe36fe075bf834b9921dc", "score": "0.5876098", "text": "func (o WebAclRuleStatementRegexMatchStatementFieldToMatchBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebAclRuleStatementRegexMatchStatementFieldToMatchBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "7ee10f34bb66f02d0b11f8758bf2d8d8", "score": "0.58740723", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementSqliMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementAndStatementStatementSqliMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d9d4e14f53a673373bf19cfd7060ec8b", "score": "0.5873048", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementXssMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementOrStatementStatementXssMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "903821ddb384e7c93290fb4f24b2813c", "score": "0.58718556", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementRegexPatternSetReferenceStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementRegexPatternSetReferenceStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5effa0931a6951a9043c5468afed782e", "score": "0.5866856", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementSizeConstraintStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementOrStatementStatementSizeConstraintStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "318f220e4b112616ad4998c3f6e10645", "score": "0.5864647", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementFieldToMatchHeaderOutput) OversizeHandling() pulumi.StringOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementFieldToMatchHeader) string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "65721c70c0a46627338d1fad9ce36876", "score": "0.58599406", "text": "func (o WebAclRuleStatementRegexMatchStatementFieldToMatchHeaderOutput) OversizeHandling() pulumi.StringOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRegexMatchStatementFieldToMatchHeader) string { return v.OversizeHandling }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "7550919dae9f4e5cbbc88d87eb7ca6d2", "score": "0.5857257", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementSqliMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementOrStatementStatementSqliMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a41ca7b5cf268a2705ac4767010e10f9", "score": "0.5853852", "text": "func (o RuleGroupRuleStatementOrStatementStatementXssMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementXssMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5113772c39e365864491e1ef480ab6b9", "score": "0.58522564", "text": "func (o WebAclRuleStatementXssMatchStatementFieldToMatchBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebAclRuleStatementXssMatchStatementFieldToMatchBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "021f620a788be41284d91dbc0cd3cfa9", "score": "0.5851024", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementRegexMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementNotStatementStatementRegexMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a19cf7c5b8044dacaac17111cf3d8448", "score": "0.58482975", "text": "func (o WebAclRuleStatementSqliMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebAclRuleStatementSqliMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c2869a46e781e3fa95fe2eccc9e10d31", "score": "0.58429134", "text": "func (o WebAclRuleStatementXssMatchStatementFieldToMatchHeaderOutput) OversizeHandling() pulumi.StringOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementXssMatchStatementFieldToMatchHeader) string { return v.OversizeHandling }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "5e6fa335c19159b508a66e7116707c21", "score": "0.584152", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementRegexMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementAndStatementStatementRegexMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ce635539ec237c4a2f762aa10cafc18a", "score": "0.5840546", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementRegexPatternSetReferenceStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementAndStatementStatementRegexPatternSetReferenceStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "8daa86154318b423dda20cf76f259a3c", "score": "0.5840545", "text": "func (o RuleGroupRuleStatementOrStatementStatementSqliMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementSqliMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "2fefa7bbedbf5bd11c8bc0f97c26c230", "score": "0.58329093", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementByteMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementNotStatementStatementByteMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d9fe0dcc2ee72c9c76919b839274492a", "score": "0.58290523", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementRegexMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementOrStatementStatementRegexMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4eab8fede2e1674ac7a365dd2bb55f3b", "score": "0.58289194", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementRegexPatternSetReferenceStatementFieldToMatchBodyOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementRegexPatternSetReferenceStatementFieldToMatchBody) *string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a0640de9db67659bb450789a7636bf39", "score": "0.58215034", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementXssMatchStatementFieldToMatchHeaderOutput) OversizeHandling() pulumi.StringOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementXssMatchStatementFieldToMatchHeader) string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "037f33108ed41b44f28c1ad66b0762ba", "score": "0.5817923", "text": "func (o RuleGroupRuleStatementOrStatementStatementAndStatementStatementByteMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementAndStatementStatementByteMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f0da6e1ed57ab7b1000f51fc22d733cb", "score": "0.58121383", "text": "func (o RuleGroupRuleStatementOrStatementStatementRegexMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementRegexMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5ad4da9973ea91c4934e73c5c1c6b437", "score": "0.5809426", "text": "func (o RuleGroupRuleStatementOrStatementStatementNotStatementStatementByteMatchStatementFieldToMatchHeaderOutput) OversizeHandling() pulumi.StringOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementNotStatementStatementByteMatchStatementFieldToMatchHeader) string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "d961aac81d0827fdbf22f988b44c8850", "score": "0.58082145", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementByteMatchStatementFieldToMatchJsonBodyPtrOutput) OversizeHandling() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RuleGroupRuleStatementOrStatementStatementOrStatementStatementByteMatchStatementFieldToMatchJsonBody) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "397a07a529d56094f67626fb606a98bf", "score": "0.5807446", "text": "func (o RuleGroupRuleStatementOrStatementStatementOrStatementStatementXssMatchStatementFieldToMatchHeaderOutput) OversizeHandling() pulumi.StringOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementOrStatementStatementOrStatementStatementXssMatchStatementFieldToMatchHeader) string {\n\t\treturn v.OversizeHandling\n\t}).(pulumi.StringOutput)\n}", "title": "" } ]
04320b5775965012436c13d17167f779
Optional duration in seconds the pod needs to terminate gracefully upon probe failure. The grace period is the duration in seconds after the processes running in the pod are sent a termination signal and the time when the processes are forcibly halted with a kill signal. Set this value longer than the expected cleanup time for your process. If this value is nil, the pod's terminationGracePeriodSeconds will be used. Otherwise, this value overrides the value provided by the pod spec. Value must be nonnegative integer. The value zero indicates stop immediately via the kill signal (no opportunity to shut down). This is a beta field and requires enabling ProbeTerminationGracePeriod feature gate. Minimum value is 1. spec.terminationGracePeriodSeconds is used if unset.
[ { "docid": "dd3f5453f7ffb85170dd679467e3fbb4", "score": "0.6617278", "text": "func (o ProbePatchPtrOutput) TerminationGracePeriodSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *ProbePatch) *int {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.TerminationGracePeriodSeconds\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" } ]
[ { "docid": "8ee3d024f8a09377ee0185591956bc02", "score": "0.6816402", "text": "func (o ProbePatchOutput) TerminationGracePeriodSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v ProbePatch) *int { return v.TerminationGracePeriodSeconds }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "33f6dc5e825f0e38ff9f0020137a0a60", "score": "0.67546064", "text": "func (o ProbeOutput) TerminationGracePeriodSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v Probe) *int { return v.TerminationGracePeriodSeconds }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "a14341a04959e1524a6e9fbf49d12ffb", "score": "0.6723849", "text": "func (o PodSpecPatchOutput) TerminationGracePeriodSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v PodSpecPatch) *int { return v.TerminationGracePeriodSeconds }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "31bb9f6b30e17de7b4bf1385a114690d", "score": "0.6693637", "text": "func (o PodSpecOutput) TerminationGracePeriodSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v PodSpec) *int { return v.TerminationGracePeriodSeconds }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "c355d851ccd998db6307931181fbd672", "score": "0.65636843", "text": "func (o ProbePtrOutput) TerminationGracePeriodSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *Probe) *int {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.TerminationGracePeriodSeconds\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "c3029788a0f5f651e1a539b169845f76", "score": "0.6497609", "text": "func (o PodSpecPatchPtrOutput) TerminationGracePeriodSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *PodSpecPatch) *int {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.TerminationGracePeriodSeconds\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "b0d68e6934eca075c42551a332c228ff", "score": "0.64766514", "text": "func (o PodSpecPtrOutput) TerminationGracePeriodSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *PodSpec) *int {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.TerminationGracePeriodSeconds\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "7365bec37d41eca8624d232c984ccca2", "score": "0.6416401", "text": "func WithTerminationGracePeriodSeconds(seconds int) Modification {\n\ts := int64(seconds)\n\treturn func(podTemplateSpec *corev1.PodTemplateSpec) {\n\t\tpodTemplateSpec.Spec.TerminationGracePeriodSeconds = &s\n\t}\n}", "title": "" }, { "docid": "5466dfef46ecbbd163b6731e1d626aec", "score": "0.63522154", "text": "func WithTerminationGracePeriod(d time.Duration) Option {\n\treturn func(s *SVC) error {\n\t\ts.TerminationGracePeriod = d\n\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "359f2fa44385282c776b6f858010788d", "score": "0.58317184", "text": "func OptJobShutdownGracePeriod(d time.Duration) JobBuilderOption {\n\treturn func(jb *JobBuilder) { jb.ShutdownGracePeriodProvider = func() time.Duration { return d } }\n}", "title": "" }, { "docid": "fe42c07bf45def0466b7be3463a9e9b3", "score": "0.5774084", "text": "func (s ServerGroupSpec) GetTerminationGracePeriod(group ServerGroup) time.Duration {\n\tif v := s.TerminationGracePeriodSeconds; v == nil {\n\t\treturn group.DefaultTerminationGracePeriod()\n\t} else {\n\t\treturn time.Second * time.Duration(*v)\n\t}\n}", "title": "" }, { "docid": "c4ab7a32ed887084661aafdb1a1ec966", "score": "0.5668862", "text": "func TestKillGracefully(t *testing.T) {\n\t// Graceful SIGTERM Container\n\tmock := &MockKC{\n\t\tgetContainerStatusPod: &v1.Pod{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: \"foo\",\n\t\t\t},\n\t\t\tSpec: v1.PodSpec{\n\t\t\t\tRestartPolicy: \"Never\",\n\t\t\t},\n\t\t},\n\t\tgetContainerStatusContainerStatus: &v1.ContainerStatus{\n\t\t\tState: v1.ContainerState{\n\t\t\t\tTerminated: nil,\n\t\t\t},\n\t\t},\n\t}\n\tctx := context.Background()\n\terr := KillGracefully(ctx, mock, \"container-id\", 1)\n\tassert.EqualError(t, err, \"timeout after 1s\")\n}", "title": "" }, { "docid": "8c58c8c203edf83a90dacfded335bc78", "score": "0.54833335", "text": "func (jb *JobBuilder) ShutdownGracePeriod() time.Duration {\n\tif jb.ShutdownGracePeriodProvider != nil {\n\t\treturn jb.ShutdownGracePeriodProvider()\n\t}\n\treturn jb.Config.ShutdownGracePeriodOrDefault()\n}", "title": "" }, { "docid": "b6c8c1c1daefa2a13fe453f62f38d02d", "score": "0.5437771", "text": "func waitForPodTermination(ctx context.Context, client kubernetes.Interface, pod *v1.Pod) error {\n\tif pod.Spec.TerminationGracePeriodSeconds == nil {\n\t\t// if no grace period is defined, we don't wait.\n\t\treturn nil\n\t}\n\n\twaitForTermination := func() error {\n\t\tnewpod, err := client.CoreV1().Pods(pod.Namespace).Get(ctx, pod.Name, metav1.GetOptions{})\n\t\tif err != nil {\n\t\t\tif errors.IsNotFound(err) {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn err\n\t\t}\n\n\t\t// StatefulSet pods have the same name after restart, check the uid as well\n\t\tif newpod.GetObjectMeta().GetUID() == pod.GetObjectMeta().GetUID() {\n\t\t\treturn fmt.Errorf(\"the Pod has not terminated\")\n\t\t}\n\n\t\treturn nil\n\t}\n\n\tgracePeriod := time.Duration(*pod.Spec.TerminationGracePeriodSeconds)*time.Second + podEvictionHeadroom\n\n\tbackoffCfg := backoff.NewExponentialBackOff()\n\tbackoffCfg.MaxElapsedTime = gracePeriod\n\treturn backoff.Retry(waitForTermination, backoffCfg)\n}", "title": "" }, { "docid": "01b9b76c67b0c4ac0da5819604e20d91", "score": "0.53783077", "text": "func TestWaitForTermination(t *testing.T) {\n\t// Successfully SIGTERM Container\n\tmock := &MockKC{\n\t\tgetContainerStatusContainerStatus: &v1.ContainerStatus{\n\t\t\tState: v1.ContainerState{\n\t\t\t\tTerminated: &v1.ContainerStateTerminated{},\n\t\t\t},\n\t\t},\n\t}\n\tctx := context.Background()\n\terr := WaitForTermination(ctx, mock, \"container-id\", time.Duration(2)*time.Second)\n\tassert.NoError(t, err)\n\n\t// Fail SIGTERM Container\n\tmock = &MockKC{\n\t\tgetContainerStatusContainerStatus: &v1.ContainerStatus{\n\t\t\tState: v1.ContainerState{\n\t\t\t\tTerminated: nil,\n\t\t\t},\n\t\t},\n\t}\n\terr = WaitForTermination(ctx, mock, \"container-id\", time.Duration(1)*time.Second)\n\tassert.EqualError(t, err, \"timeout after 1s\")\n}", "title": "" }, { "docid": "6537205bc6d3315e4996dae046efa88b", "score": "0.5268245", "text": "func WithTerminationWaitPeriod(d time.Duration) Option {\n\treturn func(s *SVC) error {\n\t\ts.TerminationWaitPeriod = d\n\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "3af32a25f17377525b7002777e2858fa", "score": "0.5235001", "text": "func (c *OperatorConfig) GetTerminationGracePeriod() *int64 {\n\tterminationGracePeriod := int64(c.Pod.TerminationGracePeriod)\n\treturn &terminationGracePeriod\n}", "title": "" }, { "docid": "290adb9cd930e82c4904abe9421ff73c", "score": "0.52244705", "text": "func DeployOptionTimeoutGrace(t time.Duration) Option {\n\treturn func(d *Deploy) {\n\t\td.worker.timeout = t + deployGracePeriod\n\t}\n}", "title": "" }, { "docid": "a9d26da135e944bc6172dc4432c3a8d5", "score": "0.52033323", "text": "func (_Validators *ValidatorsCaller) DowntimeGracePeriod(opts *bind.CallOpts) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _Validators.contract.Call(opts, out, \"downtimeGracePeriod\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "91451418c90718283a864694e3de25cc", "score": "0.51786727", "text": "func (c *missingStaticPodController) getStaticPodTerminationGracePeriodSecondsForRevision(revision int) (time.Duration, error) {\n\tstaticPodKeyName := \"pod.yaml\"\n\tstaticPodConfigMapName := fmt.Sprintf(\"%s-pod-%d\", c.operandName, revision)\n\n\tstaticPodConfigMap, err := c.configMapListerForTargetNamespace.Get(staticPodConfigMapName)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\trawStaticPodManifest, hasPodKey := staticPodConfigMap.Data[staticPodKeyName]\n\tif !hasPodKey {\n\t\treturn 0, fmt.Errorf(\"didn't find required key %q in cm: %s/%s\", staticPodKeyName, staticPodConfigMapName, c.targetNamespace)\n\t}\n\n\tserializedStaticPod, err := resourceread.ReadPodV1([]byte(rawStaticPodManifest))\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tif serializedStaticPod.Spec.TerminationGracePeriodSeconds == nil {\n\t\tklog.V(6).Infof(\"optional field: %s.spec.terminationGracePeriodSeconds was not specified in cm: %s, returning default value of 30s\", staticPodKeyName, staticPodConfigMapName)\n\t\treturn 30 * time.Second, nil\n\t}\n\n\treturn time.Duration(*serializedStaticPod.Spec.TerminationGracePeriodSeconds) * time.Second, nil\n}", "title": "" }, { "docid": "6f31e463cf3b9d25539656fb6450b29d", "score": "0.51302975", "text": "func WithGracefulStop() Option {\n\treturn func(s *serverOptions) {\n\t\ts.gracefulStop = true\n\t}\n}", "title": "" }, { "docid": "a6221639c7dafa751148ccd8ca2270e8", "score": "0.5128627", "text": "func (podStrategy) CheckGracefulDelete(ctx context.Context, obj runtime.Object, options *metav1.DeleteOptions) bool {\n\tif options == nil {\n\t\treturn false\n\t}\n\tpod := obj.(*api.Pod)\n\tperiod := int64(0)\n\t// user has specified a value\n\tif options.GracePeriodSeconds != nil {\n\t\tperiod = *options.GracePeriodSeconds\n\t} else {\n\t\t// use the default value if set, or deletes the pod immediately (0)\n\t\tif pod.Spec.TerminationGracePeriodSeconds != nil {\n\t\t\tperiod = *pod.Spec.TerminationGracePeriodSeconds\n\t\t}\n\t}\n\t// if the pod is not scheduled, delete immediately\n\tif len(pod.Spec.NodeName) == 0 {\n\t\tperiod = 0\n\t}\n\t// if the pod is already terminated, delete immediately\n\tif pod.Status.Phase == api.PodFailed || pod.Status.Phase == api.PodSucceeded {\n\t\tperiod = 0\n\t}\n\n\tif period < 0 {\n\t\tperiod = 1\n\t}\n\n\t// ensure the options and the pod are in sync\n\toptions.GracePeriodSeconds = &period\n\treturn true\n}", "title": "" }, { "docid": "4ef20d58b66eac7aefa64f79c468b109", "score": "0.5121109", "text": "func (c *Container) SetGraceTime(graceTime time.Duration) (err error) { return }", "title": "" }, { "docid": "29e41f319ef7fd86e2624c0be02f98e3", "score": "0.50627685", "text": "func WithGracePeriod(p time.Duration) Option {\n\treturn func(cfg *config) error {\n\t\tif p < 0 {\n\t\t\treturn errors.New(\"grace period must be non-negative\")\n\t\t}\n\t\tcfg.gracePeriod = p\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "fab3eca6bde087e02832b3518a6b81d9", "score": "0.50333995", "text": "func cmpTerminationGracePeriodSeconds(a, b *int64) bool {\n\taVal := int64(corev1.DefaultTerminationGracePeriodSeconds)\n\tif a != nil {\n\t\taVal = *a\n\t}\n\tbVal := int64(corev1.DefaultTerminationGracePeriodSeconds)\n\tif b != nil {\n\t\tbVal = *b\n\t}\n\treturn aVal == bVal\n}", "title": "" }, { "docid": "bdf6b417c7e9b801834a7a6d071f2f7f", "score": "0.5007328", "text": "func TestTerminatePodWithContainerID(t *testing.T) {\n\t// Already terminated.\n\tmock := &MockKC{\n\t\tgetContainerStatusContainerStatus: &v1.ContainerStatus{\n\t\t\tState: v1.ContainerState{\n\t\t\t\tTerminated: &v1.ContainerStateTerminated{},\n\t\t\t},\n\t\t},\n\t}\n\tctx := context.Background()\n\terr := TerminatePodWithContainerID(ctx, mock, \"container-id\", syscall.SIGTERM)\n\tassert.NoError(t, err)\n\n\t// w/ ShareProcessNamespace.\n\tmock = &MockKC{\n\t\tgetContainerStatusPod: &v1.Pod{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: \"foo\",\n\t\t\t},\n\t\t\tSpec: v1.PodSpec{\n\t\t\t\tShareProcessNamespace: pointer.BoolPtr(true),\n\t\t\t},\n\t\t},\n\t\tgetContainerStatusContainerStatus: &v1.ContainerStatus{\n\t\t\tState: v1.ContainerState{\n\t\t\t\tTerminated: nil,\n\t\t\t},\n\t\t},\n\t}\n\terr = TerminatePodWithContainerID(ctx, mock, \"container-id\", syscall.SIGTERM)\n\tassert.EqualError(t, err, \"cannot terminate a process-namespace-shared Pod foo\")\n\n\t// w/ HostPID.\n\tmock = &MockKC{\n\t\tgetContainerStatusPod: &v1.Pod{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: \"foo\",\n\t\t\t},\n\t\t\tSpec: v1.PodSpec{\n\t\t\t\tHostPID: true,\n\t\t\t},\n\t\t},\n\t\tgetContainerStatusContainerStatus: &v1.ContainerStatus{\n\t\t\tState: v1.ContainerState{\n\t\t\t\tTerminated: nil,\n\t\t\t},\n\t\t},\n\t}\n\terr = TerminatePodWithContainerID(ctx, mock, \"container-id\", syscall.SIGTERM)\n\tassert.EqualError(t, err, \"cannot terminate a hostPID Pod foo\")\n\n\t// w/ RestartPolicy.\n\tmock = &MockKC{\n\t\tgetContainerStatusPod: &v1.Pod{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: \"foo\",\n\t\t\t},\n\t\t\tSpec: v1.PodSpec{\n\t\t\t\tRestartPolicy: \"Always\",\n\t\t\t},\n\t\t},\n\t\tgetContainerStatusContainerStatus: &v1.ContainerStatus{\n\t\t\tState: v1.ContainerState{\n\t\t\t\tTerminated: nil,\n\t\t\t},\n\t\t},\n\t}\n\terr = TerminatePodWithContainerID(ctx, mock, \"container-id\", syscall.SIGTERM)\n\tassert.EqualError(t, err, \"cannot terminate pod with a \\\"Always\\\" restart policy\")\n\n\t// Successfully call KillContainer of the client interface.\n\tmock = &MockKC{\n\t\tgetContainerStatusPod: &v1.Pod{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: \"foo\",\n\t\t\t},\n\t\t\tSpec: v1.PodSpec{\n\t\t\t\tRestartPolicy: \"Never\",\n\t\t\t},\n\t\t},\n\t\tgetContainerStatusContainerStatus: &v1.ContainerStatus{\n\t\t\tState: v1.ContainerState{\n\t\t\t\tTerminated: nil,\n\t\t\t},\n\t\t},\n\t}\n\terr = TerminatePodWithContainerID(ctx, mock, \"container-id\", syscall.SIGTERM)\n\tassert.NoError(t, err)\n}", "title": "" }, { "docid": "9bd020c2fad3155726a1d1e42fe65757", "score": "0.4986734", "text": "func (c *EtcdHandler) GracefulStop(w http.ResponseWriter, r *http.Request) {\n\treq, err := c.ReadAdmissionReview(r)\n\tif err != nil {\n\t\tc.WriteError(w, fmt.Sprintf(\"%s\", err), err)\n\t\treturn\n\t}\n\n\t// Verify if it is a AdmissionReviewRequest about Pods\n\tpodResource := metav1.GroupVersionResource{Group: \"\", Version: \"v1\", Resource: \"pods\"}\n\tif req.Request.Resource != podResource {\n\t\tc.WriteError(w, \"not a Pod admission request\", nil)\n\t\treturn\n\t}\n\n\tpod := c.Client.GetPod(req.Request.Namespace, req.Request.Name)\n\tif pod == nil {\n\t\tc.WriteError(w, \"get requested pod error\", nil)\n\t\treturn\n\t}\n\n\treviewResp := NewAdmissionReview(true, \"\")\n\tfor _, container := range pod.Spec.Containers {\n\t\tif \"etcd\" == container.Name {\n\t\t\tlog.Tracef(\"admission review request: pod=%s, namespace=%s, operation=%s, uid=%s\", req.Request.Name, req.Request.Namespace, req.Request.Operation, req.Request.UID)\n\t\t\t// ValidatingAdmissionWebhook will receive two requests,\n\t\t\t// one for object turns into Terminating (set the DeletionTimestamp),\n\t\t\t// another for the object purged,\n\t\t\t// the first request will trigger a graceful stop procedure.\n\t\t\tif pod.DeletionTimestamp == nil {\n\t\t\t\thostname := pod.Name\n\n\t\t\t\t// Check if this node finished unregister work.\n\t\t\t\t// If done will allow this AdmissionReview request,\n\t\t\t\t// otherwise will not.\n\t\t\t\texisted, memberhash := checkUnregisterStatus(pod.Namespace, pod.Name, container, c.Client)\n\t\t\t\tif existed {\n\t\t\t\t\treviewResp.Response.Allowed = false\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\tlog.Tracef(\"hostname=%s, memberhash=%s\", hostname, memberhash)\n\t\t\t\tstdout, stderr, _ := c.Client.ExecInPod(pod.Namespace, pod.Name, container.Name, []string{\"etcdctl\", \"member\", \"remove\", memberhash})\n\t\t\t\tlog.Tracef(\"namespace=%s, podName=%s, containerName=%s, stdout=%v, stderr=%v\", pod.Name, pod.Namespace, container.Name, stdout, stderr)\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\tif reviewResp.Response.Allowed {\n\t\tlog.Infof(\"Pod %s validate admission succeed\", pod.Name)\n\t} else {\n\t\tlog.Infof(\"Pod %s validate admission failed\", pod.Name)\n\t}\n\n\tresp := EncodeAdmissionReview(reviewResp)\n\tw.Write(resp)\n}", "title": "" }, { "docid": "d784cc046cb6beb9c42402122493fabc", "score": "0.49837217", "text": "func GracefulShutdownTimeout(to time.Duration) Options {\n\treturn func(endure *Endure) {\n\t\tendure.stopTimeout = to\n\t}\n}", "title": "" }, { "docid": "a7a5c2ef27e42dbf2d5f0cdeddbe8451", "score": "0.49705052", "text": "func (_Validators *ValidatorsSession) DowntimeGracePeriod() (*big.Int, error) {\n\treturn _Validators.Contract.DowntimeGracePeriod(&_Validators.CallOpts)\n}", "title": "" }, { "docid": "fdb52a4c4ca4bd4983e7e07d109e402e", "score": "0.49664173", "text": "func (o *ClusterAutoscaler) MaxPodGracePeriod() int {\n\tif o != nil && o.bitmap_&256 != 0 {\n\t\treturn o.maxPodGracePeriod\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "b0cda50ed59a4350c30e2adc8eafae5a", "score": "0.49041456", "text": "func WaitOnTerminated(name, namespace, containerName string, sleep, containerExecutionTimeout, timeout time.Duration) (bool, error) {\n\tctx, cancel := context.WithTimeout(context.Background(), timeout)\n\tdefer cancel()\n\tch := make(chan GetPodResult)\n\tvar mostRecentWaitOnTerminatedPodError error\n\tvar pod *Pod\n\tgo func() {\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-ctx.Done():\n\t\t\t\treturn\n\t\t\tdefault:\n\t\t\t\tch <- GetPodAsync(name, namespace, timeout)\n\t\t\t\ttime.Sleep(sleep)\n\t\t\t}\n\t\t}\n\t}()\n\tfor {\n\t\tselect {\n\t\tcase result := <-ch:\n\t\t\tpod = result.pod\n\t\t\tmostRecentWaitOnTerminatedPodError = result.err\n\t\t\tif mostRecentWaitOnTerminatedPodError == nil {\n\t\t\t\tstatus, err := pod.ContainerStatus(containerName)\n\t\t\t\tif err == nil {\n\t\t\t\t\tt1, err := time.Parse(time.RFC3339, status.StartTime())\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn false, err\n\t\t\t\t\t}\n\t\t\t\t\tt2, err := time.Parse(time.RFC3339, status.EndTime())\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn false, err\n\t\t\t\t\t}\n\t\t\t\t\tduration := t2.Sub(t1)\n\t\t\t\t\tif duration >= containerExecutionTimeout {\n\t\t\t\t\t\terr := pod.Logs()\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\tlog.Printf(\"Unable to print pod logs for pod %s: %s\", pod.Metadata.Name, err)\n\t\t\t\t\t\t}\n\t\t\t\t\t\terr = pod.Describe()\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\tlog.Printf(\"Unable to describe pod %s: %s\", pod.Metadata.Name, err)\n\t\t\t\t\t\t}\n\t\t\t\t\t\treturn false, errors.Errorf(\"execution time %s is greater than timeout %s\\n\", duration.String(), containerExecutionTimeout.String())\n\t\t\t\t\t}\n\t\t\t\t\treturn true, nil\n\t\t\t\t}\n\t\t\t}\n\t\tcase <-ctx.Done():\n\t\t\tif pod != nil {\n\t\t\t\terr := pod.Logs()\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Printf(\"Unable to print pod logs for pod %s: %s\", pod.Metadata.Name, err)\n\t\t\t\t}\n\t\t\t\terr = pod.Describe()\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Printf(\"Unable to describe pod %s: %s\", pod.Metadata.Name, err)\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn false, errors.Errorf(\"WaitOnTerminated timed out: %s\\n\", mostRecentWaitOnTerminatedPodError)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "17dac9b9cb24d7e0f663586f2294d96b", "score": "0.48874304", "text": "func (s *Group) SetHealthCheckGracePeriod(v int64) *Group {\n\ts.HealthCheckGracePeriod = &v\n\treturn s\n}", "title": "" }, { "docid": "ca4c0026a4372cf3f5f509221e33ac86", "score": "0.4866336", "text": "func resolveHealthCheckGracePeriod(containers []v1alpha1.Container) int32 {\n\tgracePeriod := int32(0)\n\n\tfor _, container := range containers {\n\t\tif container.LivenessProbe != nil && (container.LivenessProbe.HttpGet != nil || container.LivenessProbe.TcpSocket != nil) {\n\t\t\tif container.LivenessProbe.InitialDelaySeconds > gracePeriod {\n\t\t\t\tgracePeriod = container.LivenessProbe.InitialDelaySeconds\n\t\t\t}\n\t\t}\n\t}\n\n\treturn gracePeriod\n}", "title": "" }, { "docid": "2b4667ef8560fbc90ba2da675954004d", "score": "0.48604754", "text": "func WaitForClusterToTerminate(logger logr.Logger, k8client client.Client, z *api.ZookeeperCluster) error {\n\tlogger.Info(fmt.Sprintf(\"waiting for zookeeper cluster to terminate: %s\", z.Name))\n\tlistOptions := []client.ListOption{\n\t\tclient.InNamespace(z.GetNamespace()),\n\t\tclient.MatchingLabelsSelector{Selector: labels.SelectorFromSet(map[string]string{\"app\": z.GetName()})},\n\t}\n\n\t// Wait for Pods to terminate\n\terr := wait.Poll(RetryInterval, TerminateTimeout, func() (done bool, err error) {\n\t\tpodList := corev1.PodList{}\n\t\terr = k8client.List(goctx.TODO(), &podList, listOptions...)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\n\t\tvar names []string\n\t\tfor i := range podList.Items {\n\t\t\tpod := &podList.Items[i]\n\t\t\tnames = append(names, pod.Name)\n\t\t}\n\t\tlogger.Info(fmt.Sprintf(\"waiting for pods to terminate, running pods (%v)\", names))\n\t\tif len(names) != 0 {\n\t\t\treturn false, nil\n\t\t}\n\t\treturn true, nil\n\t})\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Wait for PVCs to terminate\n\terr = wait.Poll(RetryInterval, TerminateTimeout, func() (done bool, err error) {\n\t\tpvcList := corev1.PersistentVolumeClaimList{}\n\t\terr = k8client.List(goctx.TODO(), &pvcList, listOptions...)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\n\t\tvar names []string\n\t\tfor i := range pvcList.Items {\n\t\t\tpvc := &pvcList.Items[i]\n\t\t\tnames = append(names, pvc.Name)\n\t\t}\n\t\tlogger.Info(fmt.Sprintf(\"waiting for pvc to terminate (%v)\", names))\n\t\tif len(names) != 0 {\n\t\t\treturn false, nil\n\t\t}\n\t\treturn true, nil\n\n\t})\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlogger.Info(fmt.Sprintf(\"zookeeper cluster terminated: %s\", z.Name))\n\treturn nil\n}", "title": "" }, { "docid": "c68069eb73e168addcaa61318150f916", "score": "0.48433262", "text": "func (_Validators *ValidatorsTransactor) SetDowntimeGracePeriod(opts *bind.TransactOpts, value *big.Int) (*types.Transaction, error) {\n\treturn _Validators.contract.Transact(opts, \"setDowntimeGracePeriod\", value)\n}", "title": "" }, { "docid": "8daae38ae5935e2e705b783b02960eba", "score": "0.48375362", "text": "func (_Validators *ValidatorsCallerSession) DowntimeGracePeriod() (*big.Int, error) {\n\treturn _Validators.Contract.DowntimeGracePeriod(&_Validators.CallOpts)\n}", "title": "" }, { "docid": "95f9d3e87a3a4d05f596cb2c8cc84c23", "score": "0.4828676", "text": "func (_Validators *ValidatorsTransactorSession) SetDowntimeGracePeriod(value *big.Int) (*types.Transaction, error) {\n\treturn _Validators.Contract.SetDowntimeGracePeriod(&_Validators.TransactOpts, value)\n}", "title": "" }, { "docid": "024ec0799f572f9aca9754593ffac8f1", "score": "0.4825581", "text": "func (_Validators *ValidatorsSession) SetDowntimeGracePeriod(value *big.Int) (*types.Transaction, error) {\n\treturn _Validators.Contract.SetDowntimeGracePeriod(&_Validators.TransactOpts, value)\n}", "title": "" }, { "docid": "43a9aa21a0e26d34802040bb2d5350be", "score": "0.47991133", "text": "func (b *ObjectMetaApplyConfiguration) WithDeletionGracePeriodSeconds(value int64) *ObjectMetaApplyConfiguration {\n\tb.DeletionGracePeriodSeconds = &value\n\treturn b\n}", "title": "" }, { "docid": "c86bab2e95d84d775c536ed8ba7cc954", "score": "0.47673976", "text": "func (ts *EndToEndTestSuite) TestPodLifecycleGracefulDelete(t *testing.T) {\n\tctx := context.Background()\n\n\t// Create a pod with prefix \"nginx-\" having a single container.\n\tpodSpec := f.CreateDummyPodObjectWithPrefix(t.Name(), \"nginx\", \"foo\")\n\tpodSpec.Spec.NodeName = f.NodeName\n\n\tpod, err := f.CreatePod(ctx, podSpec)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\t// Delete the pod after the test finishes.\n\tdefer func() {\n\t\tif err := f.DeletePodImmediately(ctx, pod.Namespace, pod.Name); err != nil && !apierrors.IsNotFound(err) {\n\t\t\tt.Error(err)\n\t\t}\n\t}()\n\tt.Logf(\"Created pod: %s\", pod.Name)\n\n\t// Wait for the \"nginx-\" pod to be reported as running and ready.\n\tif _, err := f.WaitUntilPodReady(pod.Namespace, pod.Name); err != nil {\n\t\tt.Fatal(err)\n\t}\n\tt.Logf(\"Pod %s ready\", pod.Name)\n\n\t// Grab the pods from the provider.\n\tpods, err := f.GetRunningPodsFromProvider(ctx)\n\tassert.NilError(t, err)\n\n\t// Check if the pod exists in the slice of PodStats.\n\tassert.NilError(t, findPodInPods(pods, pod))\n\n\tpodCh := make(chan error)\n\tvar podLast *v1.Pod\n\tgo func() {\n\t\t// Close the podCh channel, signaling we've observed deletion of the pod.\n\t\tdefer close(podCh)\n\n\t\tvar err error\n\t\tpodLast, err = f.WaitUntilPodDeleted(pod.Namespace, pod.Name)\n\t\tif err != nil {\n\t\t\t// Propagate the error to the outside so we can fail the test.\n\t\t\tpodCh <- err\n\t\t}\n\t}()\n\n\t// Gracefully delete the \"nginx-\" pod.\n\tif err := f.DeletePod(ctx, pod.Namespace, pod.Name); err != nil {\n\t\tt.Fatal(err)\n\t}\n\tt.Logf(\"Deleted pod: %s\", pod.Name)\n\n\t// Wait for the delete event to be ACKed.\n\tif err := <-podCh; err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\ttime.Sleep(deleteGracePeriodForProvider)\n\t// Give the provider some time to react to the MODIFIED/DELETED events before proceeding.\n\t// Grab the pods from the provider.\n\tpods, err = f.GetRunningPodsFromProvider(ctx)\n\tassert.NilError(t, err)\n\n\t// Make sure the pod DOES NOT exist in the provider's set of running pods\n\tassert.Assert(t, findPodInPods(pods, pod) != nil)\n\n\t// Make sure we saw the delete event, and the delete event was graceful\n\tassert.Assert(t, podLast != nil)\n\tassert.Assert(t, podLast.ObjectMeta.GetDeletionGracePeriodSeconds() != nil)\n\tassert.Assert(t, *podLast.ObjectMeta.GetDeletionGracePeriodSeconds() > 0)\n}", "title": "" }, { "docid": "de17361da507492445d7423a0e40193d", "score": "0.47395614", "text": "func MaxGracePeriod(m time.Duration) APICordonDrainerOption {\n\treturn func(d *APICordonDrainer) {\n\t\td.maxGracePeriod = m\n\t}\n}", "title": "" }, { "docid": "fc5e6cad5ddb04f010f3f93512b27505", "score": "0.46968967", "text": "func (p *PodKiller) kill() error {\n\t// Get all probable targets.\n\tpods, err := p.getProbableTargets()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Select the number to delete and check is safe to terminate.\n\ttotal := len(pods.Items)\n\tif total == 0 {\n\t\tp.logger.Warningf(\"0 pods probable targets\")\n\t}\n\n\ttotalTargets := int(p.pt.Spec.TerminationPercent) * total / 100\n\n\t// Check if we met the minimum after killing and adjust the targets to met the minimum instance requirement.\n\tif (total - totalTargets) < int(p.pt.Spec.MinimumInstances) {\n\t\ttotalTargets = total - int(p.pt.Spec.MinimumInstances)\n\t\tif totalTargets < 0 {\n\t\t\ttotalTargets = 0\n\t\t}\n\t\tp.logger.Infof(\"%d minimum will not be met after killing, only killing %d targets\", p.pt.Spec.MinimumInstances, totalTargets)\n\t}\n\n\t// Get random pods.\n\ttargets := p.getRandomTargets(pods, totalTargets)\n\tp.logger.Infof(\"%s pod killer will kill %d targets\", p.pt.Name, len(targets))\n\t// Terminate.\n\tfor _, target := range targets {\n\t\tif p.pt.Spec.DryRun {\n\t\t\tp.logger.Infof(\"pod %s not killed (dry run)\", target.Name)\n\t\t} else {\n\t\t\t// if any error the abort deletion.\n\t\t\tif err := p.k8sCli.CoreV1().Pods(target.Namespace).Delete(context.Background(), target.Name, metav1.DeleteOptions{}); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tp.logger.Infof(\"pod %s killed\", target.Name)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f652385e7c7c86b4739d65f8be06276b", "score": "0.46791422", "text": "func (o BasicYarnAutoscalingConfigPtrOutput) GracefulDecommissionTimeout() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *BasicYarnAutoscalingConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.GracefulDecommissionTimeout\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "26b5a47834e386b56ee8196d2d5fcab6", "score": "0.46766", "text": "func (o InstanceGroupManagerInstanceLifecyclePolicyMetadataBasedReadinessSignalPtrOutput) TimeoutSec() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *InstanceGroupManagerInstanceLifecyclePolicyMetadataBasedReadinessSignal) *int {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.TimeoutSec\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "d889cbd5a99fa7733adf437c68a77fc6", "score": "0.4669931", "text": "func (o InstanceGroupManagerInstanceLifecyclePolicyMetadataBasedReadinessSignalOutput) TimeoutSec() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v InstanceGroupManagerInstanceLifecyclePolicyMetadataBasedReadinessSignal) *int {\n\t\treturn v.TimeoutSec\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "eba185699940376893644be82f757ff8", "score": "0.46432558", "text": "func (s *CreateAutoScalingGroupInput) SetHealthCheckGracePeriod(v int64) *CreateAutoScalingGroupInput {\n\ts.HealthCheckGracePeriod = &v\n\treturn s\n}", "title": "" }, { "docid": "35ba5302d5d5d6170cd58fe62a42d6c1", "score": "0.4642941", "text": "func (c *Chaos) terminate(clientset kube.Interface) error {\n\tkillType, err := c.Victim().KillType(clientset)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"Failed to check KillType label for %s %s\", c.Victim().Kind(), c.Victim().Name())\n\t}\n\n\tkillValue, err := c.getKillValue(clientset)\n\n\t// KillAll is the only kill type that does not require a kill-value\n\tif killType != config.KillAllLabelValue && err != nil {\n\t\treturn err\n\t}\n\n\t// Validate killtype\n\tswitch killType {\n\tcase config.KillFixedLabelValue:\n\t\treturn c.Victim().DeleteRandomPods(clientset, killValue)\n\tcase config.KillAllLabelValue:\n\t\tkillNum, err := c.Victim().KillNumberForKillingAll(clientset)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn c.Victim().DeleteRandomPods(clientset, killNum)\n\tcase config.KillRandomMaxLabelValue:\n\t\tkillNum, err := c.Victim().KillNumberForMaxPercentage(clientset, killValue)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn c.Victim().DeleteRandomPods(clientset, killNum)\n\tcase config.KillFixedPercentageLabelValue:\n\t\tkillNum, err := c.Victim().KillNumberForFixedPercentage(clientset, killValue)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn c.Victim().DeleteRandomPods(clientset, killNum)\n\tdefault:\n\t\treturn fmt.Errorf(\"failed to recognize KillType label for %s %s\", c.Victim().Kind(), c.Victim().Name())\n\t}\n}", "title": "" }, { "docid": "627806665c71b1ea916da94814944252", "score": "0.4637594", "text": "func (p *controlledProcess) gracefulShutdown() {\n\tif p.cmd.ProcessState != nil {\n\t\treturn // Process is already dead, nothing to do\n\t}\n\tlog.Println(\"Sending SIGINT...\")\n\tp.cmd.Process.Signal(os.Signal(cfg.killSignal))\n\ttimePassed := time.Duration(0)\n\tfor timePassed < cfg.killTimeout {\n\t\tif p.cmd.ProcessState != nil {\n\t\t\treturn\n\t\t}\n\t\t<-time.After(time.Duration(time.Millisecond * 100))\n\t\ttimePassed += time.Duration(time.Millisecond * 100)\n\t}\n\tif p.cmd.ProcessState == nil {\n\t\tlog.Println(\"Process still alive, send SIGKILL\")\n\t\tp.cmd.Process.Kill()\n\t}\n}", "title": "" }, { "docid": "240b90679110ceb8a9df04d7431453a6", "score": "0.463589", "text": "func (o BasicYarnAutoscalingConfigOutput) GracefulDecommissionTimeout() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BasicYarnAutoscalingConfig) string { return v.GracefulDecommissionTimeout }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "458824e505872b952fb3e3eba6b03d96", "score": "0.46305072", "text": "func (m *MockRuntimeMetaObject) SetDeletionGracePeriodSeconds(arg0 *int64) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SetDeletionGracePeriodSeconds\", arg0)\n}", "title": "" }, { "docid": "5edceb8c0ee9d4058d12bb6cc52a4149", "score": "0.46278983", "text": "func (c *Chaos) terminatePod(clientset kube.Interface) error {\n\treturn c.Victim().DeleteRandomPod(clientset)\n}", "title": "" }, { "docid": "a1a0f74b7d277956647092475fa1181e", "score": "0.4615735", "text": "func (s *UpdateAutoScalingGroupInput) SetHealthCheckGracePeriod(v int64) *UpdateAutoScalingGroupInput {\n\ts.HealthCheckGracePeriod = &v\n\treturn s\n}", "title": "" }, { "docid": "ec7242543b11d613757b85e8949df99c", "score": "0.46057832", "text": "func (o BasicYarnAutoscalingConfigResponseOutput) GracefulDecommissionTimeout() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BasicYarnAutoscalingConfigResponse) string { return v.GracefulDecommissionTimeout }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "6f76ce06590445595416b2451a38a02c", "score": "0.45209515", "text": "func TestIllegalTerminate(t *testing.T) {\n\tassert := asserts.NewTestingAsserts(t, true)\n\tsup := supervisor.NewSupervisor(\"terminate\", supervisor.OneForOne, 5, time.Second)\n\n\terr := sup.Terminate(\"non-existing\")\n\tassert.ErrorMatch(err, `child id \".*\" is not in use`, \"termination of 'non-existing'\")\n\n\terr = sup.Stop()\n\tassert.Nil(err, \"stopping of 'terminate'\")\n}", "title": "" }, { "docid": "465ae70f85b2c57f27af0b551b036f30", "score": "0.45174843", "text": "func Timeout(path string) time.Duration {\n\tif path == \"\" {\n\t\treturn viper.GetDuration(\"timeout\")\n\t}\n\n\tkey := fmt.Sprintf(\"%s.timeout\", path)\n\tif viper.GetDuration(key) != 0 {\n\t\treturn viper.GetDuration(key)\n\t}\n\t// Lop off the child and try again.\n\tlastPeriod := strings.LastIndex(path, \".\")\n\tif lastPeriod == -1 {\n\t\treturn Timeout(\"\")\n\t}\n\n\treturn Timeout(path[0:lastPeriod])\n}", "title": "" }, { "docid": "80a0733db5b19ffe6defb150b47b9b88", "score": "0.4516437", "text": "func Stop(ctx context.Context, nameOrID string, timeout *int) (*entities.PodStopReport, error) {\n\tvar report entities.PodStopReport\n\tconn, err := bindings.GetClient(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tparams := url.Values{}\n\tif timeout != nil {\n\t\tparams.Set(\"t\", strconv.Itoa(*timeout))\n\t}\n\tresponse, err := conn.DoRequest(nil, http.MethodPost, \"/pods/%s/stop\", params, nil, nameOrID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif response.StatusCode == http.StatusNotModified {\n\t\treport.Id = nameOrID\n\t\treturn &report, nil\n\t}\n\treturn &report, response.Process(&report)\n}", "title": "" }, { "docid": "2d7b395613d4b07bea71cb77a3f0e162", "score": "0.45129168", "text": "func (o *GCPodsOptions) Run() error {\n\tkubeClient, ns, err := o.KubeClientAndNamespace()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif o.Namespace != \"\" {\n\t\tns = o.Namespace\n\t}\n\n\topts := metav1.ListOptions{\n\t\tLabelSelector: o.Selector,\n\t}\n\tpodInterface := kubeClient.CoreV1().Pods(ns)\n\tpodList, err := podInterface.List(opts)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdeleteOptions := &metav1.DeleteOptions{}\n\terrors := []error{}\n\tfor _, p := range podList.Items {\n\t\tpod := p\n\t\tmatches, age := o.MatchesPod(&pod)\n\t\tif matches {\n\t\t\terr := podInterface.Delete(pod.Name, deleteOptions)\n\t\t\tif err != nil {\n\t\t\t\tlog.Logger().Warnf(\"Failed to delete pod %s in namespace %s: %s\", pod.Name, ns, err)\n\t\t\t\terrors = append(errors, err)\n\t\t\t} else {\n\t\t\t\tageText := strings.TrimSuffix(age.Round(time.Minute).String(), \"0s\")\n\t\t\t\tlog.Logger().Infof(\"Deleted pod %s in namespace %s with phase %s as its age is: %s\", pod.Name, ns, string(pod.Status.Phase), ageText)\n\t\t\t}\n\t\t}\n\t}\n\treturn errorutil.CombineErrors(errors...)\n}", "title": "" }, { "docid": "a05f6fd6c5effc97c8a8637f8a96b476", "score": "0.45117676", "text": "func (o ElastigroupOutput) HealthCheckGracePeriod() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *Elastigroup) pulumi.IntPtrOutput { return v.HealthCheckGracePeriod }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "db365b6fbd2aed6afd7fac56013d43b1", "score": "0.44964287", "text": "func PodNotTerminated() func(*metav1.ListOptions) {\n\treturn func(o *metav1.ListOptions) {\n\t\to.FieldSelector = mergeSelectors(o.FieldSelector, fmt.Sprintf(\"status.phase!=%s,status.phase!=%s\", string(corev1.PodSucceeded), string(corev1.PodFailed)))\n\t}\n}", "title": "" }, { "docid": "12a88aaea38f42f2fda680d51becf6c0", "score": "0.4491635", "text": "func (o ContainerGroupContainerReadinessProbeOutput) TimeoutSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v ContainerGroupContainerReadinessProbe) *int { return v.TimeoutSeconds }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "1ddbbc84ad68995bf3e45f20ecf703b1", "score": "0.44845662", "text": "func (s *SetInstanceHealthInput) SetShouldRespectGracePeriod(v bool) *SetInstanceHealthInput {\n\ts.ShouldRespectGracePeriod = &v\n\treturn s\n}", "title": "" }, { "docid": "bf164502391652abc1c02ee8eb1eb2db", "score": "0.44602492", "text": "func (o *ClusterAutoscaler) GetMaxPodGracePeriod() (value int, ok bool) {\n\tok = o != nil && o.bitmap_&256 != 0\n\tif ok {\n\t\tvalue = o.maxPodGracePeriod\n\t}\n\treturn\n}", "title": "" }, { "docid": "64b82f08f86d59726e167a2bd3246d57", "score": "0.4455403", "text": "func (c *Chaoskube) TerminateVictims(ctx context.Context) error {\n\tnow := c.Now().In(c.Timezone)\n\n\tfor _, wd := range c.ExcludedWeekdays {\n\t\tif wd == now.Weekday() {\n\t\t\tc.Logger.WithField(\"weekday\", now.Weekday()).Debug(msgWeekdayExcluded)\n\t\t\treturn nil\n\t\t}\n\t}\n\n\tfor _, tp := range c.ExcludedTimesOfDay {\n\t\tif tp.Includes(now) {\n\t\t\tc.Logger.WithField(\"timeOfDay\", now.Format(util.Kitchen24)).Debug(msgTimeOfDayExcluded)\n\t\t\treturn nil\n\t\t}\n\t}\n\n\tfor _, d := range c.ExcludedDaysOfYear {\n\t\tif d.Day() == now.Day() && d.Month() == now.Month() {\n\t\t\tc.Logger.WithField(\"dayOfYear\", now.Format(util.YearDay)).Debug(msgDayOfYearExcluded)\n\t\t\treturn nil\n\t\t}\n\t}\n\n\tvictims, err := c.Victims(ctx)\n\tif err == errPodNotFound {\n\t\tc.Logger.Debug(msgVictimNotFound)\n\t\treturn nil\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar result *multierror.Error\n\tfor _, victim := range victims {\n\t\terr = c.DeletePod(ctx, victim)\n\t\tresult = multierror.Append(result, err)\n\t}\n\n\treturn result.ErrorOrNil()\n}", "title": "" }, { "docid": "949eec053d436495031de1ba8db93848", "score": "0.44527113", "text": "func (c *Cluster) tryGracefulPodDeletion(pod *v1.Pod) error {\n\tif err := c.enterLameDuckModeAndWaitTermination(pod); err != nil {\n\t\tc.logger.Warn(err)\n\t}\n\treturn c.deletePod(pod)\n}", "title": "" }, { "docid": "6122a0bccf29b8b75642dad2265e1f27", "score": "0.44515887", "text": "func WithTimeout(timeout time.Duration) Grace {\n\treturn &grace{timeout: timeout}\n}", "title": "" }, { "docid": "11a39d032bd9ae58738884bea508043c", "score": "0.44455642", "text": "func (d *Driver) Stop() error {\n\t// on init this doesn't get filled when called from cmd\n\td.exec = command.NewKICRunner(d.MachineName, d.OCIBinary)\n\t// docker does not send right SIG for systemd to know to stop the systemd.\n\t// to avoid bind address be taken on an upgrade. more info https://github.com/kubernetes/minikube/issues/7171\n\tif err := sysinit.New(d.exec).Stop(\"kubelet\"); err != nil {\n\t\tklog.Warningf(\"couldn't stop kubelet. will continue with stop anyways: %v\", err)\n\t\tif err := sysinit.New(d.exec).ForceStop(\"kubelet\"); err != nil {\n\t\t\tklog.Warningf(\"couldn't force stop kubelet. will continue with stop anyways: %v\", err)\n\t\t}\n\t}\n\n\truntime, err := cruntime.New(cruntime.Config{Type: d.NodeConfig.ContainerRuntime, Runner: d.exec})\n\tif err != nil { // won't return error because:\n\t\t// even though we can't stop the cotainers inside, we still wanna stop the minikube container itself\n\t\tklog.Errorf(\"unable to get container runtime: %v\", err)\n\t} else {\n\t\tcontainers, err := runtime.ListContainers(cruntime.ListContainersOptions{Namespaces: constants.DefaultNamespaces})\n\t\tif err != nil {\n\t\t\tklog.Infof(\"unable list containers : %v\", err)\n\t\t}\n\t\tif len(containers) > 0 {\n\t\t\tif err := runtime.StopContainers(containers); err != nil {\n\t\t\t\tklog.Infof(\"unable to stop containers : %v\", err)\n\t\t\t}\n\t\t\tif err := runtime.KillContainers(containers); err != nil {\n\t\t\t\tklog.Errorf(\"unable to kill containers : %v\", err)\n\t\t\t}\n\t\t}\n\t\tklog.Infof(\"successfully stopped kubernetes!\")\n\n\t}\n\n\tif err := killAPIServerProc(d.exec); err != nil {\n\t\tklog.Warningf(\"couldn't stop kube-apiserver proc: %v\", err)\n\t}\n\n\tcmd := exec.Command(d.NodeConfig.OCIBinary, \"stop\", d.MachineName)\n\tif err := cmd.Run(); err != nil {\n\t\treturn errors.Wrapf(err, \"stopping %s\", d.MachineName)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f688e1daffea02c66c146b0f186dee30", "score": "0.4435727", "text": "func (s FinalizeGracePeriodSeconds) ApplyToClean(opts *CleanOptions) {\n\tsecs := int64(s)\n\topts.FinalizeGracePeriodSeconds = &secs\n}", "title": "" }, { "docid": "0b744db70ac52e12c3a770a3e3b0aa28", "score": "0.4435044", "text": "func (p processKiller) Kill(\n\tctx context.Context,\n\tproc containerd.Process,\n\tsignal syscall.Signal,\n\twaitPeriod time.Duration,\n) error {\n\twaitCtx, cancel := context.WithTimeout(ctx, waitPeriod)\n\tdefer cancel()\n\n\tprocWaitStatus, err := proc.Wait(waitCtx)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"proc wait: %w\", err)\n\t}\n\n\terr = proc.Kill(ctx, signal)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"proc kill w/ signal %d: %w\", signal, err)\n\t}\n\n\t// Note: because the wait context is the same for both channels if the timeout expires\n\t// the choice of which case to run is nondeterministic\n\tselect {\n\tcase <-waitCtx.Done():\n\t\terr = waitCtx.Err()\n\t\tif err == context.DeadlineExceeded {\n\t\t\treturn ErrGracePeriodTimeout\n\t\t}\n\n\t\treturn fmt.Errorf(\"waitctx done: %w\", err)\n\tcase exitStatus := <-procWaitStatus:\n\t\terr = exitStatus.Error()\n\t\tif err != nil {\n\t\t\tif strings.Contains(err.Error(), \"context deadline exceeded\") {\n\t\t\t\treturn ErrGracePeriodTimeout\n\t\t\t}\n\t\t\treturn fmt.Errorf(\"waiting for exit status from grpc: %w\", err)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ffb2f44ec918c815a679722deaf201a1", "score": "0.44296274", "text": "func (o ClusterOutput) GracefulDecommissionTimeout() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Cluster) pulumi.StringPtrOutput { return v.GracefulDecommissionTimeout }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "3a3350d0590aa2d94bcb9c6ba273569c", "score": "0.44225937", "text": "func (c *TestGeneralConfig) OCRObservationGracePeriod() time.Duration {\n\tif c.Overrides.OCRObservationGracePeriod != nil {\n\t\treturn *c.Overrides.OCRObservationGracePeriod\n\t}\n\tv, ok := c.GeneralConfig.GlobalOCRObservationGracePeriod()\n\tif !ok {\n\t\treturn 100 * time.Millisecond\n\t}\n\treturn v\n}", "title": "" }, { "docid": "a400a2e8ffd19fd29e19bbedd6491937", "score": "0.4420034", "text": "func (r *Group) HealthCheckGracePeriod() pulumi.IntOutput {\n\treturn (pulumi.IntOutput)(r.s.State[\"healthCheckGracePeriod\"])\n}", "title": "" }, { "docid": "42ffe209f73f4f0473545e5901e966e8", "score": "0.44116583", "text": "func (o InstanceGroupManagerInstanceLifecyclePolicyMetadataBasedReadinessSignalResponseOutput) TimeoutSec() pulumi.IntOutput {\n\treturn o.ApplyT(func(v InstanceGroupManagerInstanceLifecyclePolicyMetadataBasedReadinessSignalResponse) int {\n\t\treturn v.TimeoutSec\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "14e7a92987d0941510b022254706924e", "score": "0.44032753", "text": "func (m *MockRuntimeMetaObject) GetDeletionGracePeriodSeconds() *int64 {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetDeletionGracePeriodSeconds\")\n\tret0, _ := ret[0].(*int64)\n\treturn ret0\n}", "title": "" }, { "docid": "dd31dc8e1611b1623a617d78a38cf800", "score": "0.43999058", "text": "func ParentShutdownDuration(duration time.Duration) Option {\n\treturn &genericOption{\n\t\tvalue: strconv.Itoa(int(duration / time.Second)),\n\t\tv: parentShutdownDurationValidator,\n\t}\n}", "title": "" }, { "docid": "2b09057ee7f7e8310e5b34a3b4d50fa7", "score": "0.43949848", "text": "func (o ContainerGroupContainerLivenessProbeOutput) TimeoutSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v ContainerGroupContainerLivenessProbe) *int { return v.TimeoutSeconds }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "f66762c47573b5694d9adfb12bf4c39c", "score": "0.43908805", "text": "func (o ProbePatchOutput) TimeoutSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v ProbePatch) *int { return v.TimeoutSeconds }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "6cc4d431a01c4cc0a9f34b0abf6b0275", "score": "0.43897226", "text": "func TestStopContainerWithTimeout(t *testing.T) {\n\tskip.If(t, testEnv.DaemonInfo.OSType == \"windows\")\n\tt.Cleanup(setupTest(t))\n\tapiClient := testEnv.APIClient()\n\tctx := context.Background()\n\n\ttestCmd := container.WithCmd(\"sh\", \"-c\", \"sleep 2 && exit 42\")\n\ttestData := []struct {\n\t\tdoc string\n\t\ttimeout int\n\t\texpectedExitCode int\n\t}{\n\t\t// In case container is forcefully killed, 137 is returned,\n\t\t// otherwise the exit code from the above script\n\t\t{\n\t\t\t\"zero timeout: expect forceful container kill\",\n\t\t\t1, 0x40010004,\n\t\t},\n\t\t{\n\t\t\t\"too small timeout: expect forceful container kill\",\n\t\t\t2, 0x40010004,\n\t\t},\n\t\t{\n\t\t\t\"big enough timeout: expect graceful container stop\",\n\t\t\t120, 42,\n\t\t},\n\t\t{\n\t\t\t\"unlimited timeout: expect graceful container stop\",\n\t\t\t-1, 42,\n\t\t},\n\t}\n\n\tfor _, d := range testData {\n\t\td := d\n\t\tt.Run(strconv.Itoa(d.timeout), func(t *testing.T) {\n\t\t\tt.Parallel()\n\t\t\tid := container.Run(ctx, t, apiClient, testCmd)\n\n\t\t\terr := apiClient.ContainerStop(ctx, id, containertypes.StopOptions{Timeout: &d.timeout})\n\t\t\tassert.NilError(t, err)\n\n\t\t\tpoll.WaitOn(t, container.IsStopped(ctx, apiClient, id),\n\t\t\t\tpoll.WithDelay(100*time.Millisecond))\n\n\t\t\tinspect, err := apiClient.ContainerInspect(ctx, id)\n\t\t\tassert.NilError(t, err)\n\t\t\tassert.Equal(t, inspect.State.ExitCode, d.expectedExitCode)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "00be5c272e4d391db1adc80f3ba623d3", "score": "0.43868354", "text": "func getClusterMonitorGracePeriod(status clusterapi.ManagedClusterStatus) time.Duration {\n\tgracePeriod := DefaultClusterMonitorGracePeriod\n\tif status.HeartbeatFrequencySeconds != nil {\n\t\tgracePeriod = time.Second * time.Duration(*status.HeartbeatFrequencySeconds) * ClusterNotReadyThreshold\n\t}\n\treturn gracePeriod\n}", "title": "" }, { "docid": "9ac003e399cefffa58bf9fe8e9b7caf9", "score": "0.43801373", "text": "func (m *RuleMutation) SetGracePeriod(i int) {\n\tm.gracePeriod = &i\n\tm.addgracePeriod = nil\n}", "title": "" }, { "docid": "bf6289ec40597b60e0fc2e1dbf78db48", "score": "0.43764943", "text": "func IsPodTerminated(pod *v1.Pod, podStatus v1.PodStatus) bool {\n\treturn podStatus.Phase == v1.PodFailed || podStatus.Phase == v1.PodSucceeded || (pod.DeletionTimestamp != nil && notRunning(podStatus.ContainerStatuses))\n}", "title": "" }, { "docid": "33098e435e0ba92c410560d5df42369f", "score": "0.437119", "text": "func (p *Pod) WaitOnTerminated(container string, sleep, containerExecutionTimeout, timeout time.Duration) (bool, error) {\n\treturn WaitOnTerminated(p.Metadata.Name, p.Metadata.Namespace, container, sleep, containerExecutionTimeout, timeout)\n}", "title": "" }, { "docid": "5ce0634d75275e68a364542fe41d8551", "score": "0.43665162", "text": "func (o ProbePatchPtrOutput) TimeoutSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *ProbePatch) *int {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.TimeoutSeconds\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "88be3560489c7f9eb4060e61caf7e68f", "score": "0.43609786", "text": "func getKubernetesTimeout() time.Duration {\n\ttimeoutSeconds := env.Get(\"KUBERNETES_TIMEOUT\", \"180\")\n\n\ttimeout, err := strconv.Atoi(timeoutSeconds)\n\tif err != nil {\n\t\tlog.Warn(\"Unable to parse KUBERNETES_TIMEOUT environment variable. Defaulting to 60 seconds\")\n\t\treturn 180 * time.Second\n\t}\n\n\treturn time.Duration(timeout) * time.Second\n}", "title": "" }, { "docid": "c09c93d60c8ef2884fa1d60b9d156eab", "score": "0.43418738", "text": "func (e *Environment) WaitForStop(ctx context.Context, duration time.Duration, terminate bool) error {\n\ttctx, cancel := context.WithTimeout(context.Background(), duration)\n\tdefer cancel()\n\n\t// If the parent context is canceled, abort the timed context for termination.\n\tgo func() {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\tcancel()\n\t\tcase <-tctx.Done():\n\t\t\t// When the timed context is canceled, terminate this routine since we no longer\n\t\t\t// need to worry about the parent routine being canceled.\n\t\t\tbreak\n\t\t}\n\t}()\n\n\tdoTermination := func(s string) error {\n\t\te.log().WithField(\"step\", s).WithField(\"duration\", duration).Warn(\"container stop did not complete in time, terminating process...\")\n\t\treturn e.Terminate(ctx, os.Kill)\n\t}\n\n\t// We pass through the timed context for this stop action so that if one of the\n\t// internal docker calls fails to ever finish before we've exhausted the time limit\n\t// the resources get cleaned up, and the exection is stopped.\n\tif err := e.Stop(tctx); err != nil {\n\t\tif terminate && errors.Is(err, context.DeadlineExceeded) {\n\t\t\treturn doTermination(\"stop\")\n\t\t}\n\t\treturn err\n\t}\n\n\t// Block the return of this function until the container as been marked as no\n\t// longer running. If this wait does not end by the time seconds have passed,\n\t// attempt to terminate the container, or return an error.\n\tok, errChan := e.client.ContainerWait(tctx, e.Id, container.WaitConditionNotRunning)\n\tselect {\n\tcase <-ctx.Done():\n\t\tif err := ctx.Err(); err != nil {\n\t\t\tif terminate {\n\t\t\t\treturn doTermination(\"parent-context\")\n\t\t\t}\n\t\t\treturn err\n\t\t}\n\tcase err := <-errChan:\n\t\t// If the error stems from the container not existing there is no point in wasting\n\t\t// CPU time to then try and terminate it.\n\t\tif err == nil || client.IsErrNotFound(err) {\n\t\t\treturn nil\n\t\t}\n\t\tif terminate {\n\t\t\tif !errors.Is(err, context.DeadlineExceeded) {\n\t\t\t\te.log().WithField(\"error\", err).Warn(\"error while waiting for container stop; terminating process\")\n\t\t\t}\n\t\t\treturn doTermination(\"wait\")\n\t\t}\n\t\treturn errors.WrapIf(err, \"environment/docker: error waiting on container to enter \\\"not-running\\\" state\")\n\tcase <-ok:\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "237a56dafaecf66ac18c5776e7ebb4ce", "score": "0.4335774", "text": "func (pod *Pod) IsTerminated(clock clock.Clock) bool {\n\treturn pod.status == Ok && pod.executedDuration(clock) >= pod.totalExecutionDuration()\n}", "title": "" }, { "docid": "0bca4e3d2b4067bcfb32de7b6d3af3b4", "score": "0.4332422", "text": "func (svc *Service) Close(ctx context.Context) error {\n\ttimeout := svc.config.GracefulShutdownTimeout\n\tlog.Info(ctx, \"commencing graceful shutdown\", log.Data{\"graceful_shutdown_timeout\": timeout})\n\tshutdownContext, cancel := context.WithTimeout(ctx, timeout)\n\thasShutdownError := false\n\n\t// Gracefully shutdown the application closing any open resources.\n\tgo func() {\n\t\tdefer cancel()\n\n\t\t// stop healthcheck, as it depends on everything else\n\t\tif svc.serviceList.HealthCheck {\n\t\t\tsvc.healthCheck.Stop()\n\t\t}\n\n\t\t// stop any incoming requests\n\t\tif err := svc.server.Shutdown(shutdownContext); err != nil {\n\t\t\tlog.Error(shutdownContext, \"failed to shutdown http server\", err)\n\t\t\thasShutdownError = true\n\t\t}\n\n\t\t// Close MongoDB (if it exists)\n\t\tif svc.serviceList.MongoDB {\n\t\t\tif err := svc.mongoDB.Close(shutdownContext); err != nil {\n\t\t\t\tlog.Error(shutdownContext, \"failed to close mongo db session\", err)\n\t\t\t\thasShutdownError = true\n\t\t\t}\n\t\t}\n\t}()\n\n\t// wait for shutdown success (via cancel) or failure (timeout)\n\t<-shutdownContext.Done()\n\n\t// timeout expired\n\tif shutdownContext.Err() == context.DeadlineExceeded {\n\t\tlog.Error(shutdownContext, \"shutdown timed out\", shutdownContext.Err())\n\t\treturn shutdownContext.Err()\n\t}\n\n\t// other error\n\tif hasShutdownError {\n\t\terr := errors.New(\"failed to shutdown gracefully\")\n\t\tlog.Error(shutdownContext, \"failed to shutdown gracefully \", err)\n\t\treturn err\n\t}\n\n\tlog.Info(shutdownContext, \"graceful shutdown was successful\")\n\treturn nil\n}", "title": "" }, { "docid": "aa651f4fabf68763ea5632c5e8d46cc0", "score": "0.4322485", "text": "func (c *Cluster) waitNatsContainerTermination(pod *v1.Pod) error {\n\t// If no value for the duration of the \"lame duck\" mode has been specified, we use the default.\n\tvar ldDuration int64\n\tif c.cluster.Spec.LameDuckDurationSeconds == nil {\n\t\tldDuration = int64(defaultNatsLameDuckDuration.Seconds())\n\t} else {\n\t\tldDuration = *c.cluster.Spec.LameDuckDurationSeconds\n\t}\n\t// Wait for at most twice the specified (or default) duration for the \"lame duck\" mode, so that we don't fail too early but also don't wait for too long.\n\tctx, fn := context.WithTimeout(context.Background(), time.Duration(2*ldDuration)*time.Second)\n\tdefer fn()\n\treturn kubernetesutil.WaitUntilPodCondition(ctx, c.config.KubeClient.CoreV1(), pod, func(event watch.Event) (bool, error) {\n\t\tpod := event.Object.(*v1.Pod)\n\t\tswitch event.Type {\n\t\tcase watch.Deleted:\n\t\t\tfallthrough\n\t\tcase watch.Error:\n\t\t\treturn false, fmt.Errorf(\"got event of unexpected type %q for pod %q while waiting termination\", event.Type, kubernetesutil.ResourceKey(pod))\n\t\tdefault:\n\t\t\tfor _, containerStatus := range pod.Status.ContainerStatuses {\n\t\t\t\tif containerStatus.Name == constants.NatsContainerName {\n\t\t\t\t\tif containerStatus.State.Terminated != nil {\n\t\t\t\t\t\treturn true, nil\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn false, nil\n\t\t}\n\t})\n}", "title": "" }, { "docid": "975d6a4a8d953850d8aead69196fed6b", "score": "0.43194386", "text": "func (d *Driver) Stop() error {\n\tif err := d.verifyRootPermissions(); err != nil {\n\t\treturn err\n\t}\n\td.cleanupNfsExports()\n\terr := d.sendSignal(syscall.SIGTERM)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"hyperkit sigterm failed\")\n\t}\n\n\t// wait 5s for graceful shutdown\n\tfor i := 0; i < 5; i++ {\n\t\tlog.Debug(\"waiting for graceful shutdown\")\n\t\ttime.Sleep(time.Second * 1)\n\t\ts, err := d.GetState()\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"hyperkit waiting graceful shutdown failed\")\n\t\t}\n\t\tif s == state.Stopped {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\tlog.Debug(\"sending sigkill\")\n\treturn d.Kill()\n}", "title": "" }, { "docid": "06fe54e06c1664f3dd0669b65db44e49", "score": "0.43153942", "text": "func Kill(ctx context.Context, nameOrID string, signal *string) (*entities.PodKillReport, error) {\n\tvar (\n\t\treport entities.PodKillReport\n\t)\n\tconn, err := bindings.GetClient(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tparams := url.Values{}\n\tif signal != nil {\n\t\tparams.Set(\"signal\", *signal)\n\t}\n\tresponse, err := conn.DoRequest(nil, http.MethodPost, \"/pods/%s/kill\", params, nil, nameOrID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &report, response.Process(&report)\n}", "title": "" }, { "docid": "a0db6ac821064bbdd650a7f1f46db379", "score": "0.43098256", "text": "func (c *Registry) GetGracefulTimeout() time.Duration {\n\treturn c.v.GetDuration(varGracefulTimeout)\n}", "title": "" }, { "docid": "770f8d4ebd54615fb2394006146d9c42", "score": "0.43020374", "text": "func (b *SecurityContextConstraintsApplyConfiguration) WithDeletionGracePeriodSeconds(value int64) *SecurityContextConstraintsApplyConfiguration {\n\tb.ensureObjectMetaApplyConfigurationExists()\n\tb.DeletionGracePeriodSeconds = &value\n\treturn b\n}", "title": "" }, { "docid": "7cc6c3611f1fa6503353a18fbaf2e29b", "score": "0.43013367", "text": "func terminateSupervisor(\n\tsupSpec SupervisorSpec,\n\tsupChildrenSpecs []c.ChildSpec,\n\tsupRuntimeName string,\n\tsupRscCleanup CleanupResourcesFn,\n\tsupChildren map[string]c.Child,\n\tonTerminate func(error),\n\trestartErr *c.ErrorToleranceReached,\n) error {\n\tvar terminateErr *SupervisorError\n\tsupNodeErrMap := terminateChildNodes(supSpec, supChildrenSpecs, supChildren)\n\tsupRscCleanupErr := supRscCleanup()\n\n\t// If any of the children fails to stop, we should report that as an\n\t// error\n\tif len(supNodeErrMap) > 0 || supRscCleanupErr != nil {\n\n\t\t// On async strategy, we notify that the spawner terminated with an\n\t\t// error\n\t\tterminateErr = &SupervisorError{\n\t\t\tsupRuntimeName: supRuntimeName,\n\t\t\tnodeErrMap: supNodeErrMap,\n\t\t\trscCleanupErr: supRscCleanupErr,\n\t\t}\n\t}\n\n\t// If we have a terminateErr or a restartErr, we should report that back to the\n\t// parent\n\tif restartErr != nil && terminateErr != nil {\n\t\tsupErr := &SupervisorRestartError{\n\t\t\tsupRuntimeName: supRuntimeName,\n\t\t\tterminateErr: terminateErr,\n\t\t\tnodeErr: restartErr,\n\t\t}\n\t\tonTerminate(supErr)\n\t\treturn supErr\n\t}\n\n\t// If we have a restartErr only, report the restart error only\n\tif restartErr != nil {\n\t\tsupErr := &SupervisorRestartError{\n\t\t\tsupRuntimeName: supRuntimeName,\n\t\t\tnodeErr: restartErr,\n\t\t}\n\t\tonTerminate(supErr)\n\t\treturn supErr\n\t}\n\n\t// If we have a terminateErr only, report the termination error only\n\tif terminateErr != nil {\n\t\tonTerminate(terminateErr)\n\t\treturn terminateErr\n\t}\n\n\tonTerminate(nil)\n\treturn nil\n}", "title": "" }, { "docid": "417967c5e4931528617c4ee969b268dd", "score": "0.4285593", "text": "func runLivenessTest(ctx context.Context, f *framework.Framework, pod *v1.Pod, expectNumRestarts int, timeout time.Duration, containerName string) {\n\tpodClient := e2epod.NewPodClient(f)\n\tns := f.Namespace.Name\n\t// At the end of the test, clean up by removing the pod.\n\tginkgo.DeferCleanup(func(ctx context.Context) error {\n\t\tginkgo.By(\"deleting the pod\")\n\t\treturn podClient.Delete(ctx, pod.Name, *metav1.NewDeleteOptions(0))\n\t})\n\tginkgo.By(fmt.Sprintf(\"Creating pod %s in namespace %s\", pod.Name, ns))\n\tpodClient.Create(ctx, pod)\n\n\t// To check for the container is ever started, we need to wait for the\n\t// container to be in a non-waiting state.\n\tframework.ExpectNoError(e2epod.WaitForPodCondition(ctx, f.ClientSet, ns, pod.Name, \"container not waiting\", timeout, func(pod *v1.Pod) (bool, error) {\n\t\tfor _, c := range append(pod.Status.InitContainerStatuses, pod.Status.ContainerStatuses...) {\n\t\t\tif c.Name == containerName {\n\t\t\t\tif c.State.Running != nil || c.State.Terminated != nil {\n\t\t\t\t\treturn true, nil\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn false, nil\n\t}))\n\n\t// Check the pod's current state and verify that restartCount is present.\n\tginkgo.By(\"checking the pod's current state and verifying that restartCount is present\")\n\tpod, err := podClient.Get(ctx, pod.Name, metav1.GetOptions{})\n\tframework.ExpectNoError(err, fmt.Sprintf(\"getting pod %s in namespace %s\", pod.Name, ns))\n\tinitialRestartCount := podutil.GetExistingContainerStatus(append(pod.Status.InitContainerStatuses, pod.Status.ContainerStatuses...), containerName).RestartCount\n\tframework.Logf(\"Initial restart count of pod %s is %d\", pod.Name, initialRestartCount)\n\n\t// Wait for the restart state to be as desired.\n\t// If initialRestartCount is not zero, there is restarting back-off time.\n\tdeadline := time.Now().Add(timeout + time.Duration(initialRestartCount*10)*time.Second)\n\n\tlastRestartCount := initialRestartCount\n\tobservedRestarts := int32(0)\n\tfor start := time.Now(); time.Now().Before(deadline); time.Sleep(2 * time.Second) {\n\t\tpod, err = podClient.Get(ctx, pod.Name, metav1.GetOptions{})\n\t\tframework.Logf(\"Get pod %s in namespace %s\", pod.Name, ns)\n\t\tframework.ExpectNoError(err, fmt.Sprintf(\"getting pod %s\", pod.Name))\n\t\trestartCount := podutil.GetExistingContainerStatus(append(pod.Status.InitContainerStatuses, pod.Status.ContainerStatuses...), containerName).RestartCount\n\t\tif restartCount != lastRestartCount {\n\t\t\tframework.Logf(\"Restart count of pod %s/%s is now %d (%v elapsed)\",\n\t\t\t\tns, pod.Name, restartCount, time.Since(start))\n\t\t\tif restartCount < lastRestartCount {\n\t\t\t\tframework.Failf(\"Restart count should increment monotonically: restart cont of pod %s/%s changed from %d to %d\",\n\t\t\t\t\tns, pod.Name, lastRestartCount, restartCount)\n\t\t\t}\n\t\t}\n\t\tobservedRestarts = restartCount - initialRestartCount\n\t\tif expectNumRestarts > 0 && int(observedRestarts) >= expectNumRestarts {\n\t\t\t// Stop if we have observed more than expectNumRestarts restarts.\n\t\t\tbreak\n\t\t}\n\t\tlastRestartCount = restartCount\n\t}\n\n\t// If we expected 0 restarts, fail if observed any restart.\n\t// If we expected n restarts (n > 0), fail if we observed < n restarts.\n\tif (expectNumRestarts == 0 && observedRestarts > 0) || (expectNumRestarts > 0 &&\n\t\tint(observedRestarts) < expectNumRestarts) {\n\t\tframework.Failf(\"pod %s/%s - expected number of restarts: %d, found restarts: %d. Pod status: %s.\",\n\t\t\tns, pod.Name, expectNumRestarts, observedRestarts, &pod.Status)\n\t}\n}", "title": "" }, { "docid": "898e06773cfd640167efd7a0e8f04280", "score": "0.42775297", "text": "func ShutdownTimeout(to time.Duration) Option {\n\treturn Option(func(c *runcfg) {\n\t\tc.shutdowntimeout = to\n\t})\n}", "title": "" }, { "docid": "898e06773cfd640167efd7a0e8f04280", "score": "0.42775297", "text": "func ShutdownTimeout(to time.Duration) Option {\n\treturn Option(func(c *runcfg) {\n\t\tc.shutdowntimeout = to\n\t})\n}", "title": "" }, { "docid": "4cf95fa5b5ed5d7ee3bd8e81a1165ac0", "score": "0.42731914", "text": "func TestGraceStop(t *testing.T) {\n\tserver := &http.Server{\n\t\tAddr: \"localhost:54952\",\n\t\tHandler: &testServer{timeout: time.Second * 10},\n\t}\n\n\tg := graceful.New(server)\n\tgo func() {\n\t\trequire.NoError(t, g.Start())\n\t}()\n\ttime.Sleep(time.Second)\n\n\trequire.NoError(t, g.Stop())\n\n\t_, err := http.Get(\"http://localhost:54952/\")\n\trequire.Error(t, err)\n}", "title": "" }, { "docid": "8d9a32e25613a583c0c051f5d6fa7b2f", "score": "0.4266941", "text": "func (p *Provider) Terminate(\n\trun *v1alpha1.HookRun,\n\tmetric v1alpha1.Metric,\n\tmeasurement v1alpha1.Measurement) v1alpha1.Measurement {\n\tklog.Warningf(\"HookRun: %s/%s, metric: %s. Kubernetes provider should not execute the Resume method\",\n\t\trun.Namespace, run.Name, metric.Name)\n\treturn measurement\n}", "title": "" }, { "docid": "94428cf6ad6d3ac3d630d0bcad524e92", "score": "0.42657036", "text": "func (o ContainerHealthCheckConfigOutput) TimeoutSeconds() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v ContainerHealthCheckConfig) *int { return v.TimeoutSeconds }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "be646931e1596316dfa4afebc360eb9d", "score": "0.42626786", "text": "func (svc *Service) Close(ctx context.Context) error {\n\ttimeout := svc.Config.GracefulShutdownTimeout\n\tlog.Info(ctx, \"commencing graceful shutdown\", log.Data{\"graceful_shutdown_timeout\": timeout})\n\tctx, cancel := context.WithTimeout(ctx, timeout)\n\thasShutdownError := false\n\n\tgo func() {\n\t\tdefer cancel()\n\n\t\t// stop healthcheck, as it depends on everything else\n\t\tif svc.ServiceList.HealthCheck {\n\t\t\tsvc.HealthCheck.Stop()\n\t\t}\n\n\t\tif svc.HomePageClient != nil {\n\t\t\tsvc.HomePageClient.Close()\n\t\t}\n\n\t\t// stop any incoming requests\n\t\tif err := svc.Server.Shutdown(ctx); err != nil {\n\t\t\tlog.Error(ctx, \"failed to shutdown http server\", err)\n\t\t\thasShutdownError = true\n\t\t}\n\t}()\n\n\t// wait for shutdown success (via cancel) or failure (timeout)\n\t<-ctx.Done()\n\n\t// timeout expired\n\tif ctx.Err() == context.DeadlineExceeded {\n\t\tlog.Error(ctx, \"shutdown timed out\", ctx.Err())\n\t\treturn ctx.Err()\n\t}\n\n\t// other error\n\tif hasShutdownError {\n\t\terr := errors.New(\"failed to shutdown gracefully\")\n\t\tlog.Error(ctx, \"failed to shutdown gracefully \", err)\n\t\treturn err\n\t}\n\n\tlog.Info(ctx, \"graceful shutdown was successful\")\n\treturn nil\n}", "title": "" }, { "docid": "19f7281571e82de32c206e31c823a738", "score": "0.42560104", "text": "func (k Keeper) GetDomainGracePeriod(ctx sdk.Context) time.Duration {\n\treturn k.GetConfiguration(ctx).DomainGracePeriod\n}", "title": "" } ]
7647f00210516fe97a6ca1b6b4dd9300
RunbookNEQ applies the NEQ predicate on the "runbook" field.
[ { "docid": "d283ac406aebff542f64808dba7d4c5b", "score": "0.8469286", "text": "func RunbookNEQ(v string) predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldRunbook), v))\n\t})\n}", "title": "" } ]
[ { "docid": "3364f5a92e1e30d8cb877f2a8fe63a37", "score": "0.67744416", "text": "func RunbookEQ(v string) predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldRunbook), v))\n\t})\n}", "title": "" }, { "docid": "f11abed2f6e3f391d004454555b2d3e7", "score": "0.66004753", "text": "func RunbookNotIn(vs ...string) predicate.Recommendations {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.NotIn(s.C(FieldRunbook), v...))\n\t})\n}", "title": "" }, { "docid": "9e6bce894c857c84ceb49ce433df9e2f", "score": "0.6268106", "text": "func IsbnNEQ(v string) predicate.Item {\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldIsbn), v))\n\t})\n}", "title": "" }, { "docid": "42f380b56b4f640c2103a2f8e33ac0cc", "score": "0.616344", "text": "func RunbookNotNil() predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.NotNull(s.C(FieldRunbook)))\n\t})\n}", "title": "" }, { "docid": "9b7c87a9c2c6d2d748acc1cf1ac9df99", "score": "0.609753", "text": "func Runbook(v string) predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldRunbook), v))\n\t})\n}", "title": "" }, { "docid": "2a9fa7edc8f724788b6700ad72f481fa", "score": "0.60218924", "text": "func CheckinNEQ(v time.Time) predicate.Books {\n\treturn predicate.Books(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCheckin), v))\n\t})\n}", "title": "" }, { "docid": "da8d5543c0186fb11872af9f3b87a4ee", "score": "0.60041404", "text": "func IDNEQ(id int) predicate.Books {\n\treturn predicate.Books(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "418fdbf56025bc2f0d69001bf50fa1af", "score": "0.59780824", "text": "func IdennumNEQ(v string) predicate.RightToTreatment {\n\treturn predicate.RightToTreatment(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldIdennum), v))\n\t})\n}", "title": "" }, { "docid": "4cb46abb925b68834bfccee3f300428f", "score": "0.5932777", "text": "func AccountnumberNEQ(v string) predicate.Orderonline {\n\treturn predicate.Orderonline(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldAccountnumber), v))\n\t})\n}", "title": "" }, { "docid": "80afecd01413557fb51bf501b25b954d", "score": "0.59275484", "text": "func AddressNEQ(v string) predicate.Profile {\n\treturn predicate.Profile(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "4426dbcf56dd05ea3ce0c2ff35e37cf8", "score": "0.591576", "text": "func RunbookIsNil() predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.IsNull(s.C(FieldRunbook)))\n\t})\n}", "title": "" }, { "docid": "890b48fa7a65d9859d2028203003c9f8", "score": "0.5899499", "text": "func WalletIDNEQ(v string) predicate.Pointkycrv {\n\treturn predicate.Pointkycrv(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldWalletID), v))\n\t})\n}", "title": "" }, { "docid": "ffa1bd0b5ef9b8399890515de26817a4", "score": "0.5891912", "text": "func WebNEQ(v string) predicate.Model {\n\treturn predicate.Model(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldWeb), v))\n\t})\n}", "title": "" }, { "docid": "42da387d426b8b4ac4e40428679a1f00", "score": "0.58617187", "text": "func TermNEQ(v string) predicate.Campaign {\n\treturn predicate.Campaign(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldTerm), v))\n\t})\n}", "title": "" }, { "docid": "06c521429228668ba91209551d4dc598", "score": "0.58419913", "text": "func RunbookEqualFold(v string) predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldRunbook), v))\n\t})\n}", "title": "" }, { "docid": "135b441a15c3d7551e3f22a394979a4e", "score": "0.58416873", "text": "func AddressNEQ(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "135b441a15c3d7551e3f22a394979a4e", "score": "0.58416873", "text": "func AddressNEQ(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "3e4b4a424fcc762cba86aa32ea09e3fb", "score": "0.58303714", "text": "func StatusNEQ(v bool) predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" }, { "docid": "d98cfaeb37550b98bd4b57b0fcb8719f", "score": "0.5792154", "text": "func RunbookIn(vs ...string) predicate.Recommendations {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.In(s.C(FieldRunbook), v...))\n\t})\n}", "title": "" }, { "docid": "fe844b37f4f3e9fd557e73c2465afb6d", "score": "0.57685775", "text": "func RunbookContains(v string) predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.Contains(s.C(FieldRunbook), v))\n\t})\n}", "title": "" }, { "docid": "6b988b1bc13dfed9a1371f4389ca57fb", "score": "0.574731", "text": "func BanedNEQ(v bool) predicate.Tag {\n\treturn predicate.Tag(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldBaned), v))\n\t})\n}", "title": "" }, { "docid": "ab8539efc4fc22052dcdd2c707c575fb", "score": "0.57466334", "text": "func RoomnumberNEQ(v string) predicate.DataRoom {\n\treturn predicate.DataRoom(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldRoomnumber), v))\n\t})\n}", "title": "" }, { "docid": "2a72cfe5f6ca58c07755f39eda232eca", "score": "0.5735915", "text": "func SummaryNEQ(v string) predicate.Post {\n\treturn predicate.Post(sql.FieldNEQ(FieldSummary, v))\n}", "title": "" }, { "docid": "d54b365f0d258e804f824b110f56a572", "score": "0.573085", "text": "func RankNEQ(v string) predicate.Configarea {\n\treturn predicate.Configarea(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldRank), v))\n\t})\n}", "title": "" }, { "docid": "1833f1ad35042f730c11189d8359d16d", "score": "0.57293147", "text": "func StatusNEQ(v bool) predicate.Profile {\n\treturn predicate.Profile(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" }, { "docid": "36b4a8721928e08ec54d9a2cf3a8479f", "score": "0.5717684", "text": "func AuthorNEQ(v string) predicate.Item {\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldAuthor), v))\n\t})\n}", "title": "" }, { "docid": "2be3ba025729b508d82f1b952233d7fe", "score": "0.57110775", "text": "func CheckoutNEQ(v time.Time) predicate.Books {\n\treturn predicate.Books(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCheckout), v))\n\t})\n}", "title": "" }, { "docid": "67d0f58b9be270ee3846dee7993379ca", "score": "0.56954074", "text": "func BillingstatusnameNEQ(v string) predicate.Billingstatus {\n\treturn predicate.Billingstatus(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldBillingstatusname), v))\n\t})\n}", "title": "" }, { "docid": "26bfb7d8725376ff47f830801e5c7eb5", "score": "0.5691136", "text": "func ZipCodeNEQ(v string) predicate.Configarea {\n\treturn predicate.Configarea(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldZipCode), v))\n\t})\n}", "title": "" }, { "docid": "c163b6988613201dfe1f2a77ef7280fe", "score": "0.5690415", "text": "func BirthplaceNEQ(v string) predicate.Person {\n\treturn predicate.Person(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldBirthplace), v))\n\t})\n}", "title": "" }, { "docid": "5e97d48a561e27e328dbb2b78ec3f379", "score": "0.56763196", "text": "func IsRunningNEQ(v bool) predicate.Timer {\n\treturn predicate.Timer(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldIsRunning), v))\n\t})\n}", "title": "" }, { "docid": "9bd8f6ed7dd457e9177c6afd09efdeda", "score": "0.56678236", "text": "func NameNEQ(v string) predicate.Model {\n\treturn predicate.Model(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "14c90b400362cc10d55e896c56d4c6c4", "score": "0.5661653", "text": "func UIDNEQ(v int64) predicate.Deal {\n\treturn predicate.Deal(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldUID), v))\n\t})\n}", "title": "" }, { "docid": "358c0bf31141b90b71cf15b87d34e962", "score": "0.56606257", "text": "func CounterNEQ(v int64) predicate.Model {\n\treturn predicate.Model(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCounter), v))\n\t})\n}", "title": "" }, { "docid": "b9f223dc6da415d2c505e31222db3407", "score": "0.56588304", "text": "func NumberNEQ(v string) predicate.Card {\n\treturn predicate.Card(sql.FieldNEQ(FieldNumber, v))\n}", "title": "" }, { "docid": "13edff75238b4b2e80ef699abbfafee0", "score": "0.5653537", "text": "func NEQ(x, y Expr) P {\n\treturn &BinaryExpr{\n\t\tOp: OpNEQ,\n\t\tX: x,\n\t\tY: y,\n\t}\n}", "title": "" }, { "docid": "591d8ccdd089d4bbc7b3e6a31dc4cb35", "score": "0.5635555", "text": "func NameNEQ(v string) predicate.Campaign {\n\treturn predicate.Campaign(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "7d933058e3be2274ae187f30f4ad26b8", "score": "0.562372", "text": "func CardIDNEQ(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCardID), v))\n\t})\n}", "title": "" }, { "docid": "7d933058e3be2274ae187f30f4ad26b8", "score": "0.562372", "text": "func CardIDNEQ(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCardID), v))\n\t})\n}", "title": "" }, { "docid": "de038c171fda77db6609647b85cda50f", "score": "0.56214833", "text": "func RightNEQ(v bool) predicate.Model {\n\treturn predicate.Model(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldRight), v))\n\t})\n}", "title": "" }, { "docid": "5c81e1f3237ed9c04237cca51f809e2e", "score": "0.5619572", "text": "func (e Date32Element) Neq(r Element) (bool, error) {\n\tv, ok := e.Eq(r)\n\treturn !v, ok\n}", "title": "" }, { "docid": "c812f61f626e44c8d4082006a0d26637", "score": "0.56172425", "text": "func StatusNEQ(v int) predicate.Demo {\n\treturn predicate.Demo(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" }, { "docid": "82c161bb4429488cd2301fd12b78d0a4", "score": "0.56129986", "text": "func NameNEQ(v string) predicate.Ticket {\n\treturn predicate.Ticket(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "ad320f0ad26f07b8414c3ae2bf586919", "score": "0.5604127", "text": "func NameNEQ(v string) predicate.Variant {\n\treturn predicate.Variant(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "2714084c617cb3370553d8dcb8b93046", "score": "0.5595438", "text": "func NameNEQ(v string) predicate.File {\n\treturn predicate.File(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "e5aa368f7490f14705bfff3111056de4", "score": "0.5583978", "text": "func CodeNEQ(v string) predicate.Demo {\n\treturn predicate.Demo(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCode), v))\n\t})\n}", "title": "" }, { "docid": "c8e6107845faac0e4ff58196f311ecde", "score": "0.55759364", "text": "func UpdatedWithNEQ(v string) predicate.Person {\n\treturn predicate.Person(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldUpdatedWith), v))\n\t})\n}", "title": "" }, { "docid": "c952729d56158f1c4484c013949b6804", "score": "0.5563043", "text": "func IDNEQ(id int) predicate.Post {\n\treturn predicate.Post(sql.FieldNEQ(FieldID, id))\n}", "title": "" }, { "docid": "e5e1dcb1a34119208511e38dd26752c6", "score": "0.5561861", "text": "func NameNEQ(v string) predicate.Demo {\n\treturn predicate.Demo(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "93f6f6c201306cb7b6372ba06d3caa15", "score": "0.55595267", "text": "func FieldNEQ(name string, v any) P {\n\treturn &BinaryExpr{\n\t\tOp: OpNEQ,\n\t\tX: &Field{Name: name},\n\t\tY: &Value{V: v},\n\t}\n}", "title": "" }, { "docid": "edf5da7e4acb5ed11ce175aed97aeaca", "score": "0.5554543", "text": "func NEq(lattr string, rattr string) Criterion {\n\treturn Eq(lattr, rattr).Not()\n}", "title": "" }, { "docid": "da6bc842742d3ccbdd739a3feeaf96a7", "score": "0.5554129", "text": "func NameNEQ(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "6a5610f0f8335599e5ab8624efa04786", "score": "0.555307", "text": "func StatusNEQ(v Status) predicate.Ticket {\n\treturn predicate.Ticket(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" }, { "docid": "d45589a9194ec94def86ff0c1f0f0c15", "score": "0.55497706", "text": "func RoomdetailNEQ(v string) predicate.DataRoom {\n\treturn predicate.DataRoom(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldRoomdetail), v))\n\t})\n}", "title": "" }, { "docid": "cd0cfce371b46ebeaf2c2d06a2606294", "score": "0.55495435", "text": "func LabelNEQ(v string) predicate.GithubAsset {\n\treturn predicate.GithubAsset(sql.FieldNEQ(FieldLabel, v))\n}", "title": "" }, { "docid": "804faa24b39a4279516b81a992941f25", "score": "0.55489385", "text": "func NameNEQ(v string) predicate.DUser {\n\treturn predicate.DUser(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "40a0c98412f86ed7006cf7067261dcfb", "score": "0.5543902", "text": "func IDNEQ(id int) predicate.BarRecord {\n\treturn predicate.BarRecord(sql.FieldNEQ(FieldID, id))\n}", "title": "" }, { "docid": "7a6aa32a604672e5425ebcda7477b279", "score": "0.5540713", "text": "func TagNEQ(v string) predicate.SysLogging {\n\treturn predicate.SysLogging(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldTag), v))\n\t})\n}", "title": "" }, { "docid": "1665a79947b6bf9df861b2d0ef50fcf4", "score": "0.55335116", "text": "func NameNEQ(v string) predicate.ResourcePool {\n\treturn predicate.ResourcePool(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "abd33a96ec573098ec120c6b74a00518", "score": "0.5533459", "text": "func StatusNEQ(v models.Status) predicate.Screenshot {\n\tvc := string(v)\n\treturn predicate.Screenshot(sql.FieldNEQ(FieldStatus, vc))\n}", "title": "" }, { "docid": "d42523a46af21ca9d1299d09dccc78c9", "score": "0.5528744", "text": "func StatusNEQ(v Status) predicate.ExportTask {\n\treturn predicate.ExportTask(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" }, { "docid": "4bb5964f07bf695eb3d950f29753c41f", "score": "0.5528235", "text": "func NameNEQ(v string) predicate.Item {\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "efcdab4f40c69ed890091f898b0905ab", "score": "0.5518348", "text": "func CodeNEQ(v string) predicate.Variant {\n\treturn predicate.Variant(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCode), v))\n\t})\n}", "title": "" }, { "docid": "09cbb930dc28b3c0b2a670306e5f980a", "score": "0.55166084", "text": "func IdcardNEQ(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldIdcard), v))\n\t})\n}", "title": "" }, { "docid": "c6b5d78c76432b9a2b97964a4b027a20", "score": "0.55104464", "text": "func RunbookLTE(v string) predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.LTE(s.C(FieldRunbook), v))\n\t})\n}", "title": "" }, { "docid": "fa981abc4aa4a3e83a565819fa92d862", "score": "0.5505601", "text": "func CertificateNameNEQ(v string) predicate.Certificate {\n\treturn predicate.Certificate(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCertificateName), v))\n\t})\n}", "title": "" }, { "docid": "9546f43dd2b96e1ab2cb736ddce8eaab", "score": "0.5504152", "text": "func StatusNEQ(v Status) predicate.BlockInstance {\n\treturn predicate.BlockInstance(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" }, { "docid": "41d6b0af80dd61047fe2470e79399f54", "score": "0.55033726", "text": "func ExternalIdNEQ(v string) predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldExternalId), v))\n\t})\n}", "title": "" }, { "docid": "d8789b05a913a1e760c7cf8cb7b43923", "score": "0.5498914", "text": "func StatusGenNEQ(v string) predicate.Pointkycrv {\n\treturn predicate.Pointkycrv(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStatusGen), v))\n\t})\n}", "title": "" }, { "docid": "e3392b53618ea559a9f816fa028e80f3", "score": "0.54986876", "text": "func CommandNEQ(v string) predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCommand), v))\n\t})\n}", "title": "" }, { "docid": "88b5c832b6ebb1d35a71e4bbcd2c5812", "score": "0.54954696", "text": "func ResourceNEQ(v string) predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldResource), v))\n\t})\n}", "title": "" }, { "docid": "e35c8f842971fb13ed64ffcf05f93188", "score": "0.5483947", "text": "func NameNEQ(v string) predicate.Playlist {\n\treturn predicate.Playlist(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "11a8b6fee743f3756f5fea6d2b8c1462", "score": "0.5481268", "text": "func TitleNEQ(v string) predicate.Model {\n\treturn predicate.Model(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldTitle), v))\n\t})\n}", "title": "" }, { "docid": "4d1142beb50653b8598b11efa4783104", "score": "0.54764193", "text": "func FiltersNEQ(v string) predicate.ExportTask {\n\treturn predicate.ExportTask(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldFilters), v))\n\t})\n}", "title": "" }, { "docid": "138d7ed458252bbb9c9eecf535601821", "score": "0.5475793", "text": "func (e StringElement) Neq(r Element) (bool, error) {\n\tv, ok := e.Eq(r)\n\treturn !v, ok\n}", "title": "" }, { "docid": "610fc75efdcfe529e5324317a008d9d4", "score": "0.54751456", "text": "func TitleNEQ(v string) predicate.Task {\n\treturn predicate.Task(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldTitle), v))\n\t})\n}", "title": "" }, { "docid": "a56bf5cf3567b37577d4b20e4a8fd9a6", "score": "0.547428", "text": "func SuffixNEQ(v string) predicate.Person {\n\treturn predicate.Person(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldSuffix), v))\n\t})\n}", "title": "" }, { "docid": "c154612bb26f052c52def2fcf5962869", "score": "0.54709053", "text": "func TagNameNEQ(v string) predicate.Tag {\n\treturn predicate.Tag(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldTagName), v))\n\t})\n}", "title": "" }, { "docid": "47ee39b8cc1171b6611b13aec5514eab", "score": "0.54634506", "text": "func IDNEQ(id int) predicate.Card {\n\treturn predicate.Card(sql.FieldNEQ(FieldID, id))\n}", "title": "" }, { "docid": "55736b226aae760f2d00508fba902af2", "score": "0.54628026", "text": "func GiveawayNameNEQ(v string) predicate.Giveaway {\n\treturn predicate.Giveaway(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldGiveawayName), v))\n\t})\n}", "title": "" }, { "docid": "bd685e766debc6ecb8b866eaf7036b5a", "score": "0.54574364", "text": "func FailureReasonNEQ(v string) predicate.BlockInstance {\n\treturn predicate.BlockInstance(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldFailureReason), v))\n\t})\n}", "title": "" }, { "docid": "8f7f5bc5042c1d85d38073aaaa74ea99", "score": "0.5454499", "text": "func StatusNEQ(v int8) predicate.Todo {\n\treturn predicate.Todo(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" }, { "docid": "ce874ed1a8850ad631b463e706e9ce1c", "score": "0.54515666", "text": "func NameNEQ(v string) predicate.Connector {\n\treturn predicate.Connector(sql.FieldNEQ(FieldName, v))\n}", "title": "" }, { "docid": "651f134bf2d771d64f83638b5e16e538", "score": "0.5449871", "text": "func TitleNEQ(v string) predicate.Source {\n\treturn predicate.Source(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldTitle), v))\n\t})\n}", "title": "" }, { "docid": "bc9f76a501a77b30de6610c2f9e337c9", "score": "0.54438156", "text": "func StockNumNEQ(v int) predicate.GoodsSku {\n\treturn predicate.GoodsSku(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStockNum), v))\n\t})\n}", "title": "" }, { "docid": "cf5839ebc18bc7d6533f6d18af3cb50a", "score": "0.5439944", "text": "func IDNEQ(id int) predicate.Billingstatus {\n\treturn predicate.Billingstatus(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "8667ba61f2cc55985044a388c3a7b82f", "score": "0.5434723", "text": "func RunbookContainsFold(v string) predicate.Recommendations {\n\treturn predicate.Recommendations(func(s *sql.Selector) {\n\t\ts.Where(sql.ContainsFold(s.C(FieldRunbook), v))\n\t})\n}", "title": "" }, { "docid": "35c78eadca76cd6e221e2fd7532ea94f", "score": "0.5433705", "text": "func DailyIntakeNEQ(v int32) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldDailyIntake), v))\n\t})\n}", "title": "" }, { "docid": "1d0f2c63b63ae998071994b9f91d8c56", "score": "0.54271686", "text": "func BirthDateNEQ(v string) predicate.Profile {\n\treturn predicate.Profile(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldBirthDate), v))\n\t})\n}", "title": "" }, { "docid": "ae96211c8d5f9dd192a99d8f73c75594", "score": "0.54263294", "text": "func PROBLEMDETAILNEQ(v string) predicate.Problem {\n\treturn predicate.Problem(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldPROBLEMDETAIL), v))\n\t})\n}", "title": "" }, { "docid": "bb8adb5efb7dc4b78c5bb51acba98d80", "score": "0.54251206", "text": "func IDNEQ(id uuid.UUID) predicate.Screenshot {\n\treturn predicate.Screenshot(sql.FieldNEQ(FieldID, id))\n}", "title": "" }, { "docid": "edd360c951e851ed03180c254f33f70b", "score": "0.54101866", "text": "func (e BooleanElement) Neq(r Element) (bool, error) {\n\tv, ok := e.Eq(r)\n\treturn !v, ok\n}", "title": "" }, { "docid": "77ed6f28d67295282efd0841a6c78601", "score": "0.5405114", "text": "func IDNEQ(id int) predicate.Car {\n\treturn predicate.Car(sql.FieldNEQ(FieldID, id))\n}", "title": "" }, { "docid": "12a3071e25b735d83443b9bc3332e708", "score": "0.54024184", "text": "func LogNEQ(v string) predicate.Logger {\n\treturn predicate.Logger(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldLog), v))\n\t})\n}", "title": "" }, { "docid": "4b717d8c2c4f65cc8aa85b63a46b0812", "score": "0.53966004", "text": "func SkuIdNEQ(v int64) predicate.Deal {\n\treturn predicate.Deal(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldSkuId), v))\n\t})\n}", "title": "" }, { "docid": "90dcab0f11c2945492aec654150d785d", "score": "0.5396369", "text": "func CvvNEQ(v string) predicate.Orderonline {\n\treturn predicate.Orderonline(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCvv), v))\n\t})\n}", "title": "" }, { "docid": "4f9dba132a23c99b9505643fa5d41305", "score": "0.5382911", "text": "func IdentifiantNEQ(v string) predicate.Admin {\n\treturn predicate.Admin(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldIdentifiant), v))\n\t})\n}", "title": "" }, { "docid": "58e20cbb698fe71413d5982901ce0d6e", "score": "0.5381646", "text": "func RegionNEQ(v string) predicate.History {\n\treturn predicate.History(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldRegion), v))\n\t})\n}", "title": "" }, { "docid": "ac3cdbce889fa15b6a42de7563ecd9fe", "score": "0.5379647", "text": "func AllergicNEQ(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldAllergic), v))\n\t})\n}", "title": "" }, { "docid": "ac3cdbce889fa15b6a42de7563ecd9fe", "score": "0.5379647", "text": "func AllergicNEQ(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldAllergic), v))\n\t})\n}", "title": "" } ]
8493767fb256f941acefdb65034541c1
Add the given keyvalue pair to the license_server field of the given host.
[ { "docid": "7f057d2dc9434bfdab68463fb3bc9c86", "score": "0.7799608", "text": "func (_class HostClass) AddToLicenseServer(sessionID SessionRef, self HostRef, key string, value string) (_err error) {\n\t_method := \"host.add_to_license_server\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_keyArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"key\"), key)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_valueArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"value\"), value)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _selfArg, _keyArg, _valueArg)\n\treturn\n}", "title": "" } ]
[ { "docid": "a18df49bc9b71bcb79cd19ae0fe66014", "score": "0.7652408", "text": "func (_class HostClass) AddToLicenseServer(sessionID SessionRef, self HostRef, key string, value string) (_err error) {\n\tif IsMock {\n\t\treturn _class.AddToLicenseServerMock(sessionID, self, key, value)\n\t}\t\n\t_method := \"host.add_to_license_server\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_keyArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"key\"), key)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_valueArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"value\"), value)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _selfArg, _keyArg, _valueArg)\n\treturn\n}", "title": "" }, { "docid": "6036a078011dd0e06a1b36e0f75620a3", "score": "0.6753203", "text": "func (_class HostClass) SetLicenseServer(sessionID SessionRef, self HostRef, value map[string]string) (_err error) {\n\t_method := \"host.set_license_server\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_valueArg, _err := convertStringToStringMapToXen(fmt.Sprintf(\"%s(%s)\", _method, \"value\"), value)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _selfArg, _valueArg)\n\treturn\n}", "title": "" }, { "docid": "ecbc7e17c6a079a879f133d45a00aa26", "score": "0.6658917", "text": "func (_class HostClass) SetLicenseServer(sessionID SessionRef, self HostRef, value map[string]string) (_err error) {\n\tif IsMock {\n\t\treturn _class.SetLicenseServerMock(sessionID, self, value)\n\t}\t\n\t_method := \"host.set_license_server\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_valueArg, _err := convertStringToStringMapToXen(fmt.Sprintf(\"%s(%s)\", _method, \"value\"), value)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _selfArg, _valueArg)\n\treturn\n}", "title": "" }, { "docid": "7c8e6e90f0fb74215f470cf48748e15b", "score": "0.57273775", "text": "func (m *MicroClientConn) AddHost(key string, vrs svc.ValueRegService) (err error) {\n\tfor _, v := range m.Micros {\n\t\tif v.Name == vrs.Name {\n\t\t\turl, e := svc.GetTCPURL(vrs)\n\t\t\tif e != nil {\n\t\t\t\terr = fmt.Errorf(\"svc.GetTCPURL(), %s(%v)\", err, vrs)\n\t\t\t\treturn\n\t\t\t}\n\t\t\terr = v.AddHost(url)\n\t\t\tif err != nil {\n\t\t\t\terr = fmt.Errorf(\"microClientInit, AddHost(%s), error: %s\", url, err)\n\t\t\t} else {\n\t\t\t\tm.regCache.AddORUpdate(key, vrs)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "f146be0c3a726be45512168451155c8b", "score": "0.56352574", "text": "func (h *RevelHeader) Add(key, value string) {\n\tif h.Server != nil {\n\t\th.Server.Add(key, value)\n\t}\n}", "title": "" }, { "docid": "035396c17265f73f7bd81f92b7ee0604", "score": "0.55701905", "text": "func (s *ServerConfig) AddHostKey(key Signer) {\n\tfor i, k := range s.hostKeys {\n\t\tif k.PublicKey().Type() == key.PublicKey().Type() {\n\t\t\ts.hostKeys[i] = key\n\t\t\treturn\n\t\t}\n\t}\n\n\ts.hostKeys = append(s.hostKeys, key)\n}", "title": "" }, { "docid": "5dc005bb885df09b105f2d50d39d8b7f", "score": "0.548361", "text": "func (_class HostClass) RemoveFromLicenseServer(sessionID SessionRef, self HostRef, key string) (_err error) {\n\t_method := \"host.remove_from_license_server\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_keyArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"key\"), key)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _selfArg, _keyArg)\n\treturn\n}", "title": "" }, { "docid": "c6e5df49792e20e20ab54d4b1f723aa8", "score": "0.5450593", "text": "func (_class HostClass) RemoveFromLicenseServer(sessionID SessionRef, self HostRef, key string) (_err error) {\n\tif IsMock {\n\t\treturn _class.RemoveFromLicenseServerMock(sessionID, self, key)\n\t}\t\n\t_method := \"host.remove_from_license_server\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_keyArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"key\"), key)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _selfArg, _keyArg)\n\treturn\n}", "title": "" }, { "docid": "d2f2227b4412027c38a620c96034cf0a", "score": "0.5434568", "text": "func (self *Task) PutOptserverHost(host string) (err error) {\n _tmp1117 := C.CString(host)\n if _tmp1118 := C.MSK_putoptserverhost(self.ptr(),_tmp1117); _tmp1118 != 0 {\n lastcode,lastmsg := self.getlasterror(_tmp1118)\n err = &MosekError{code:Rescode(lastcode),msg:lastmsg}\n return\n }\n return\n}", "title": "" }, { "docid": "dd31c4654a021c9e6445e2dd523c596e", "score": "0.5359744", "text": "func PuttoServer(hostname string, key string, val string) {\n\treqURL := hostname + \"/keys/\" + key + \"/\" + val\n\tfmt.Printf(\"\\n PUT URL: %s\", reqURL)\n\t//fmt.Printf(\"\\n Key: %s and value: %s is inserted in server %s\", key, val, hostname)\n\treq, _ := http.NewRequest(\"PUT\", reqURL, nil)\n\tclient := &http.Client{}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer resp.Body.Close()\n}", "title": "" }, { "docid": "ceecd908341ef339c959ce1b0dcc8374", "score": "0.5349334", "text": "func Addserver(servers map[string]*Server, ip string, service string) {\n\tservers[ip] = &Server{false, service}\n}", "title": "" }, { "docid": "01e842eeafe05d017fff528b7cd3db05", "score": "0.53046227", "text": "func (t *System_Dns) AppendServer(v *System_Dns_Server) error {\n\tkey := *v.Address\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Dns_Server)\n\t}\n\n\tif _, ok := t.Server[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Server %v\", key)\n\t}\n\n\tt.Server[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "01e842eeafe05d017fff528b7cd3db05", "score": "0.53046227", "text": "func (t *System_Dns) AppendServer(v *System_Dns_Server) error {\n\tkey := *v.Address\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Dns_Server)\n\t}\n\n\tif _, ok := t.Server[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Server %v\", key)\n\t}\n\n\tt.Server[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "01e842eeafe05d017fff528b7cd3db05", "score": "0.53046227", "text": "func (t *System_Dns) AppendServer(v *System_Dns_Server) error {\n\tkey := *v.Address\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Dns_Server)\n\t}\n\n\tif _, ok := t.Server[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Server %v\", key)\n\t}\n\n\tt.Server[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "01e842eeafe05d017fff528b7cd3db05", "score": "0.53046227", "text": "func (t *System_Dns) AppendServer(v *System_Dns_Server) error {\n\tkey := *v.Address\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Dns_Server)\n\t}\n\n\tif _, ok := t.Server[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Server %v\", key)\n\t}\n\n\tt.Server[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "c52023c7903781f06a0647dc851c981e", "score": "0.52828807", "text": "func (t *System_Ntp) AppendServer(v *System_Ntp_Server) error {\n\tkey := *v.Address\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Ntp_Server)\n\t}\n\n\tif _, ok := t.Server[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Server %v\", key)\n\t}\n\n\tt.Server[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "c52023c7903781f06a0647dc851c981e", "score": "0.52822095", "text": "func (t *System_Ntp) AppendServer(v *System_Ntp_Server) error {\n\tkey := *v.Address\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Ntp_Server)\n\t}\n\n\tif _, ok := t.Server[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Server %v\", key)\n\t}\n\n\tt.Server[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "c52023c7903781f06a0647dc851c981e", "score": "0.52822095", "text": "func (t *System_Ntp) AppendServer(v *System_Ntp_Server) error {\n\tkey := *v.Address\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Ntp_Server)\n\t}\n\n\tif _, ok := t.Server[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Server %v\", key)\n\t}\n\n\tt.Server[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "c52023c7903781f06a0647dc851c981e", "score": "0.52822095", "text": "func (t *System_Ntp) AppendServer(v *System_Ntp_Server) error {\n\tkey := *v.Address\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Ntp_Server)\n\t}\n\n\tif _, ok := t.Server[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Server %v\", key)\n\t}\n\n\tt.Server[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "dea6c60ab572152ed49dee1c1a245bed", "score": "0.5262487", "text": "func (self *Env) PutLicensePath(licensepath string) (err error) {\n _tmp1363 := C.CString(licensepath)\n if _tmp1364 := C.MSK_putlicensepath(self.ptr(),_tmp1363); _tmp1364 != 0 {\n lastcode,lastmsg := self.getlasterror(_tmp1364)\n err = &MosekError{code:Rescode(lastcode),msg:lastmsg}\n return\n }\n return\n}", "title": "" }, { "docid": "7f12dd163ddc172c2936711274a11e62", "score": "0.51917475", "text": "func (_class HostClass) AddToGuestVCPUsParams(sessionID SessionRef, self HostRef, key string, value string) (_err error) {\n\t_method := \"host.add_to_guest_VCPUs_params\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_keyArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"key\"), key)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_valueArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"value\"), value)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _selfArg, _keyArg, _valueArg)\n\treturn\n}", "title": "" }, { "docid": "3445aa1e85b116d89599a38bab348cdb", "score": "0.5178864", "text": "func (t *System_Aaa_ServerGroup) AppendServer(v *System_Aaa_ServerGroup_Server) error {\n\tkey := *v.Address\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Aaa_ServerGroup_Server)\n\t}\n\n\tif _, ok := t.Server[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Server %v\", key)\n\t}\n\n\tt.Server[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "3445aa1e85b116d89599a38bab348cdb", "score": "0.5178864", "text": "func (t *System_Aaa_ServerGroup) AppendServer(v *System_Aaa_ServerGroup_Server) error {\n\tkey := *v.Address\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Aaa_ServerGroup_Server)\n\t}\n\n\tif _, ok := t.Server[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Server %v\", key)\n\t}\n\n\tt.Server[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "3445aa1e85b116d89599a38bab348cdb", "score": "0.5178864", "text": "func (t *System_Aaa_ServerGroup) AppendServer(v *System_Aaa_ServerGroup_Server) error {\n\tkey := *v.Address\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Aaa_ServerGroup_Server)\n\t}\n\n\tif _, ok := t.Server[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Server %v\", key)\n\t}\n\n\tt.Server[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "3445aa1e85b116d89599a38bab348cdb", "score": "0.5178643", "text": "func (t *System_Aaa_ServerGroup) AppendServer(v *System_Aaa_ServerGroup_Server) error {\n\tkey := *v.Address\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Aaa_ServerGroup_Server)\n\t}\n\n\tif _, ok := t.Server[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list Server %v\", key)\n\t}\n\n\tt.Server[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "158efb621ac9484d8125571a68636d33", "score": "0.51517206", "text": "func (_class HostClass) AddToGuestVCPUsParams(sessionID SessionRef, self HostRef, key string, value string) (_err error) {\n\tif IsMock {\n\t\treturn _class.AddToGuestVCPUsParamsMock(sessionID, self, key, value)\n\t}\t\n\t_method := \"host.add_to_guest_VCPUs_params\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_keyArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"key\"), key)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_valueArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"value\"), value)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _selfArg, _keyArg, _valueArg)\n\treturn\n}", "title": "" }, { "docid": "e71b4c7b1c1e336ec0b5b2430ce3e2a1", "score": "0.50430983", "text": "func addKey(conf *ssh.ServerConfig, block *pem.Block) (err error) {\n\tvar key interface{}\n\n\tswitch block.Type {\n\tcase \"RSA PRIVATE KEY\":\n\t\tkey, err = x509.ParsePKCS1PrivateKey(block.Bytes)\n\tcase \"EC PRIVATE KEY\":\n\t\tkey, err = x509.ParseECPrivateKey(block.Bytes)\n\tcase \"DSA PRIVATE KEY\":\n\t\tkey, err = ssh.ParseDSAPrivateKey(block.Bytes)\n\tdefault:\n\t\treturn fmt.Errorf(\"unsupported key type %q\", block.Type)\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tsigner, err := ssh.NewSignerFromKey(key)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tconf.AddHostKey(signer)\n\n\treturn nil\n}", "title": "" }, { "docid": "e202702afe16563c362a37f46ce4e229", "score": "0.50172037", "text": "func PutKeyToServer(key string, value string, server string) {\n\tclient := &http.Client{}\n\treqURL := \"http://\" + server + \"/keys/\" + key + \"/\" + value\n\tfmt.Println(\"URL formed:\" + reqURL)\n\treq, err := http.NewRequest(\"PUT\", reqURL, strings.NewReader(\"\"))\n\t_, err = client.Do(req)\n\n\tif err != nil {\n\t\tfmt.Println(\"error in sending put req to Server \", err)\n\t}\n}", "title": "" }, { "docid": "01c52fc2c76e767fe5dde06e06e1b073", "score": "0.49712524", "text": "func (self *KvServer) addConnection(key uint64, conn Connection) {\n self.connMapMutex.Lock()\n defer self.connMapMutex.Unlock()\n\n self.connMap[key] = conn\n}", "title": "" }, { "docid": "5864c5219001b625c5d02a213fc10d1f", "score": "0.4907235", "text": "func (bl *Blocklist) AddHost(host string) {\n\tstatement, _ := bl._db.Prepare(`INSERT OR IGNORE INTO\n\t\t\t\t\t\t\t\t\tblocklist (hostname, ip)\n VALUES (?, '0.0.0.0')`)\n\tstatement.Exec(host)\n}", "title": "" }, { "docid": "668006cee94b39d321b98e01a4843f46", "score": "0.49059033", "text": "func SetHost(host string) error { return ca.SetHost(host) }", "title": "" }, { "docid": "534d0e4d10081337b977ae41ce01564d", "score": "0.49043193", "text": "func AddPackageHost(host string) {\n\tpackageHosts = append(packageHosts, host)\n}", "title": "" }, { "docid": "2e051d31e7a63c3f86fc018f42a34221", "score": "0.48995194", "text": "func (ck *Clerk) PutAppend(key string, value string, op string) {\n args := PutAppendArgs{\n Key: key,\n Value: value,\n Op: op,\n Client: ck.client,\n Seq: atomic.AddUint64(&ck.seq, 1),\n }\n ck.tryAllServers(func(server int) bool {\n reply := PutAppendReply{}\n ok := ck.servers[server].Call(\"KVServer.PutAppend\", &args, &reply)\n if ok {\n // fmt.Printf(\"PutAppend got reply %+v\\n\", reply)\n if reply.WrongLeader {\n ck.leader = reply.Leader\n return false\n } else if reply.Err == \"\" {\n return true\n }\n }\n return false\n })\n}", "title": "" }, { "docid": "17891f1a4e902775097edbcafcbe62b6", "score": "0.4843157", "text": "func RegisterLicensesServer(s *grpc.Server, srv LicensesServer) { src.RegisterLicensesServer(s, srv) }", "title": "" }, { "docid": "2b72ff211e48d85cc91e7ac15b6ed917", "score": "0.48398054", "text": "func (s *PiperConfig) AddHostKey(key Signer) {\n\tfor i, k := range s.hostKeys {\n\t\tif k.PublicKey().Type() == key.PublicKey().Type() {\n\t\t\ts.hostKeys[i] = key\n\t\t\treturn\n\t\t}\n\t}\n\n\ts.hostKeys = append(s.hostKeys, key)\n}", "title": "" }, { "docid": "7b51ed5ca16ea6c87bd54f8ab85cadad", "score": "0.48370847", "text": "func (_class HostClass) AddToOtherConfig(sessionID SessionRef, self HostRef, key string, value string) (_err error) {\n\t_method := \"host.add_to_other_config\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_keyArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"key\"), key)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_valueArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"value\"), value)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _selfArg, _keyArg, _valueArg)\n\treturn\n}", "title": "" }, { "docid": "f7f5802e933fee8564a0ae7227cf9120", "score": "0.48208508", "text": "func (_class HostClass) GetLicenseServer(sessionID SessionRef, self HostRef) (_retval map[string]string, _err error) {\n\t_method := \"host.get_license_server\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_result, _err := _class.client.APICall(_method, _sessionIDArg, _selfArg)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_retval, _err = convertStringToStringMapToGo(_method + \" -> \", _result.Value)\n\treturn\n}", "title": "" }, { "docid": "7d8f9a4875283e45dec6c98e82875908", "score": "0.4817644", "text": "func WithKeyserver(keyserver string) Option {\n\treturn func(cl *Client) {\n\t\tcl.keyserver = keyserver\n\t}\n}", "title": "" }, { "docid": "965c5642fdf9d8b85ccaa54f226942b5", "score": "0.4795223", "text": "func (c *Conf) addServer(server Server) {\n\tif c.findServer(server.FrontendPort, server.VirtualHost) >= 0 {\n\t\tlog(\"Error: The server given is not unique and cannot replace the existing one\")\n\t\tlog(\"\tPlease use findServer to retrieve a Server reference and modify through thatreference\")\n\t} else {\n\t\tc.Servers = append(c.Servers, server)\n\t}\n}", "title": "" }, { "docid": "9305003b886b19a1a91b00ab7ba8745d", "score": "0.47895372", "text": "func (_class HostClass) AddToOtherConfig(sessionID SessionRef, self HostRef, key string, value string) (_err error) {\n\tif IsMock {\n\t\treturn _class.AddToOtherConfigMock(sessionID, self, key, value)\n\t}\t\n\t_method := \"host.add_to_other_config\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_keyArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"key\"), key)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_valueArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"value\"), value)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _selfArg, _keyArg, _valueArg)\n\treturn\n}", "title": "" }, { "docid": "0b6f54dd85d49dedaba74ae47ee565ab", "score": "0.4775406", "text": "func (ck *Client) PutAppend(key string, value string, op string) {\n\t// TODO Your code here\n\targs := &PutAppendArgs{Key: key, Value: value, Op: op, ID: nrand()}\n\tvar reply PutAppendReply\n\tfor i := 0; ; {\n\t\tif ok := util.Call(\"unix\", ck.servers[i], \"KVPaxos.PutAppend\", args, &reply); ok && reply.Err == OK {\n\t\t\treturn\n\t\t}\n\t\ti++\n\t\ti %= len(ck.servers)\n\t}\n}", "title": "" }, { "docid": "66661c196c9b187f8578da5451c4d580", "score": "0.47621268", "text": "func (server *Server) Add(dn string, values map[string][]string) error {\n\terr := server.initialBind(\n\t\tserver.config.BindDN,\n\t\tserver.config.BindPassword,\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tattributes := make([]ldap.Attribute, 0)\n\tfor key, value := range values {\n\t\tattributes = append(attributes, ldap.Attribute{\n\t\t\tType: key,\n\t\t\tVals: value,\n\t\t})\n\t}\n\n\trequest := &ldap.AddRequest{\n\t\tDN: dn,\n\t\tAttributes: attributes,\n\t}\n\n\terr = server.connection.Add(request)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "77e73722207fd81b722eed701a835ade", "score": "0.47615185", "text": "func registerServerAndKeepAlive(serverAddr string) error {\n\t// lease TTL is ttl-second\n\tleaseResp, err := etcdClient.Grant(context.Background(), serverConfig.ETCDAliveTTL)\n\tif err != nil {\n\t\treturn errors.New(\"[E] etcdClient.Grant error : \" + err.Error())\n\t}\n\n\t// etcd key\n\tetcdKey := getServerETCDKey(serverConfig, serverAddr)\n\tlogrus.Printf(\"[info] etcd key : %v\\n\", etcdKey)\n\n\t// save to etcd\n\t_, err = etcdClient.Put(context.Background(), etcdKey, serverAddr, clientv3.WithLease(leaseResp.ID))\n\tif err != nil {\n\t\treturn errors.New(\"[E] etcdClient.Put error : \" + err.Error())\n\t}\n\n\t// keep alive\n\tif _, err = etcdClient.KeepAlive(context.Background(), leaseResp.ID); err != nil {\n\t\treturn errors.New(\"[E] etcdClient.KeepAlive error : \" + err.Error())\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cfbb3519182711e9941a37d15d80c9d8", "score": "0.473964", "text": "func (_class HostClass) GetLicenseServer(sessionID SessionRef, self HostRef) (_retval map[string]string, _err error) {\n\tif IsMock {\n\t\treturn _class.GetLicenseServerMock(sessionID, self)\n\t}\t\n\t_method := \"host.get_license_server\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_result, _err := _class.client.APICall(_method, _sessionIDArg, _selfArg)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_retval, _err = convertStringToStringMapToGo(_method + \" -> \", _result.Value)\n\treturn\n}", "title": "" }, { "docid": "d897c92cdcd447fd46eef7a038c6f215", "score": "0.47383842", "text": "func (k *KeeperClient) AddServerMeta(path, addr string, replica bool) error {\n smeta, e := k.Get(\"/alivemeta/\" + addr)\n if e != nil { return e}\n\n var sm ServerMeta\n e = json.Unmarshal(smeta, &sm)\n if e != nil { return e }\n if replica {\n sm.ReplicaFor[path] = path\n } else {\n sm.PrimaryFor[path] = path\n }\n smdata, e := json.Marshal(sm)\n if e != nil { fmt.Println(\"marshal error\", e); return e }\n _, e = k.client.Set(\"/alivemeta/\"+addr, smdata, -1)\n if e != nil { fmt.Println(\"set error\", e) ;return e }\n return nil\n}", "title": "" }, { "docid": "519fe8db5d7ed6ec151753017757b00b", "score": "0.47272137", "text": "func (r *Registry) Add(key string, t *websocket.Conn) {\n\tr.mu.Lock()\n\tdefer r.mu.Unlock()\n\n\tr.data[key] = t\n}", "title": "" }, { "docid": "bd97b4139b5dfc76c1941486894d3e79", "score": "0.47236854", "text": "func (p *Proxy) add(hostname, backend string) {\n\tproxy := &httputil.ReverseProxy{\n\t\tDirector: func(r *http.Request) {\n\t\t\tr.Host = backend\n\t\t\tr.URL.Scheme = \"http\"\n\t\t\tr.URL.Host = backend\n\t\t\tlog.Printf(\"proxy: %v\\n\", r)\n\t\t\tlog.Printf(\"proxy: %v\\n\", r.URL)\n\t\t},\n\t}\n\t(*p)[hostname] = proxy\n}", "title": "" }, { "docid": "b63ff6632bea891a429cc1c22ad03817", "score": "0.47223502", "text": "func (p *SSHKeyPair) AddEC2Region(region string) error {\n\tenv := GetEnvironment()\n\tctx, cancel := env.Context()\n\tdefer cancel()\n\tcoll := env.DB().Collection(ConfigCollection)\n\n\tquery := bson.M{\n\t\tidKey: ConfigDocID,\n\t\tsshKeyPairsKey: bson.M{\n\t\t\t\"$elemMatch\": bson.M{\n\t\t\t\tsshKeyPairNameKey: p.Name,\n\t\t\t},\n\t\t},\n\t}\n\tvar update bson.M\n\tif len(p.EC2Regions) == 0 {\n\t\t// In case this is the first element, we have to push to create the\n\t\t// array first.\n\t\tupdate = bson.M{\n\t\t\t\"$push\": bson.M{bsonutil.GetDottedKeyName(sshKeyPairsKey, \"$\", sshKeyPairEC2RegionsKey): region},\n\t\t}\n\t} else {\n\t\tupdate = bson.M{\n\t\t\t\"$addToSet\": bson.M{bsonutil.GetDottedKeyName(sshKeyPairsKey, \"$\", sshKeyPairEC2RegionsKey): region},\n\t\t}\n\t}\n\tif _, err := coll.UpdateOne(ctx, query, update); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\tif !utility.StringSliceContains(p.EC2Regions, region) {\n\t\tp.EC2Regions = append(p.EC2Regions, region)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4cf0dfc8bcc2d52b1798d1ee2df0cb76", "score": "0.47107774", "text": "func (c *Clerk) PutAppend(key string, value string, op string) {\n\tvar (\n\t\tpeer = c.lastLeader\n\t\tclientInfo = ClientInfo{ID: c.id, Seq: c.seq}\n\t\targs = PutAppendArgs{Key: key, Value: value, Op: op, Client: clientInfo}\n\t)\n\tc.seq++\n\n\tfor {\n\t\treply := PutAppendReply{}\n\t\tif ok := c.SendRPCHandler(peer, \"KVServer.PutAppend\", &args, &reply); ok == rpc.OK {\n\t\t\tif !reply.WrongLeader {\n\t\t\t\tc.lastLeader = peer\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tpeer = (peer + 1) % len(c.servers)\n\t}\n}", "title": "" }, { "docid": "d219d4f8fc6befc24c7ca5c625276174", "score": "0.47039163", "text": "func (m *Message) AddSoftware(software string) {\n\tm.Add(AttrSoftware, []byte(software))\n}", "title": "" }, { "docid": "c17eee4716bef38225090c528d2978b6", "score": "0.46906254", "text": "func (ck *Clerk) PutAppend(key string, value string, op string) {\n\t// You will have to modify this function.\n\tck.lastOpId++\n\targs := PutAppendArgs{\n\t\tKey: key,\n\t\tValue: value,\n\t\tOp: op,\n\t\tOpId: ck.lastOpId,\n\t\tClientId: ck.clientId,\n\t}\n\tfor {\n\t\t// try each known server.\n\t\tfor _, srv := range ck.servers {\n\t\t\tvar reply PutAppendReply\n\t\t\tok := srv.Call(\"KVServer.PutAppend\", &args, &reply)\n\t\t\tif ok && reply.Result == OK {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\ttime.Sleep(100 * time.Millisecond)\n\t}\n}", "title": "" }, { "docid": "5a9344aa19b1197ba65781b3934a0672", "score": "0.46755427", "text": "func (g *Gossip) AddInfo(key string, val []byte, ttl time.Duration) error {\n\tg.mu.Lock()\n\tdefer g.mu.Unlock()\n\terr := g.is.addInfo(key, g.is.newInfo(val, ttl))\n\tif err == nil {\n\t\tg.checkHasConnected()\n\t}\n\treturn err\n}", "title": "" }, { "docid": "37ea6616a02418da0f2a405428c8758c", "score": "0.46731052", "text": "func (qr *FirmwareQueryResp) addHostResponse(hr *HostResponse, req *FirmwareQueryReq) error {\n\tpbResp, ok := hr.Message.(*ctlpb.FirmwareQueryResp)\n\tif !ok {\n\t\treturn errors.Errorf(\"unable to unpack message: %+v\", hr.Message)\n\t}\n\n\tif req.SCM {\n\t\tif qr.HostSCMFirmware == nil {\n\t\t\tqr.HostSCMFirmware = make(HostSCMQueryMap)\n\t\t}\n\t\tscmResp, err := qr.getSCMResponse(pbResp)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tqr.HostSCMFirmware[hr.Addr] = scmResp\n\t}\n\n\tif req.NVMe {\n\t\tif qr.HostNVMeFirmware == nil {\n\t\t\tqr.HostNVMeFirmware = make(HostNVMeQueryMap)\n\t\t}\n\t\tnvmeResp, err := qr.getNVMeResponse(pbResp)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tqr.HostNVMeFirmware[hr.Addr] = nvmeResp\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "15ce642dce6ced8fe1d55049457b0a02", "score": "0.46696097", "text": "func (d *datastoreProvider) AddCredentials(ctx context.Context,\n\thost string, creds *Credentials) error {\n\tlog.Debugf(\"Adding credentials for %v to namespace %v\", host, d.namespace)\n\n\t// Create entity with key=hostname\n\tkey := datastore.NameKey(kind, host, nil)\n\tkey.Namespace = d.namespace\n\t_, err := d.client.Put(ctx, key, creds)\n\tif err != nil {\n\t\tlog.WithError(err).Errorf(\"Cannot add Credentials entity\")\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9b493c8410ad6bed64c6bfa5248f1eb2", "score": "0.4654279", "text": "func (l *httpLogger) Add(key string, value interface{}) {\n\tl.extras[key] = value\n}", "title": "" }, { "docid": "a5f2257f2f10364b8fc5f4115078dda9", "score": "0.46435073", "text": "func KeyForServer(gid, key string) string { return fmt.Sprintf(\"hiqty:server:%s:%s\", gid, key) }", "title": "" }, { "docid": "ffbfa4f9bfd9b99fb3b40c2c864b1022", "score": "0.4641391", "text": "func (ck *Clerk) PutAppend(key string, value string, op string) {\n\t// You will have to modify this function.\n\n\targs := PutAppendArgs{\n\t\tKey : key,\n\t\tValue: value,\n\t\tOp: op,\n\t\tClientID : ck.clientID,\n\t\tSerialID : atomic.AddInt64(&ck.serialID,1),\n\t}\n\t\n\n\tDPrintf(\"CLIENT[%v] -> PutAppend[%v] -> KVSERVER\", ck.clientID, args.SerialID)\n\tfor i := 0; ;i++{\n\t\treply := PutAppendReply{}\n\t\tok := ck.servers[ck.currentLeader].Call(\"KVServer.PutAppend\", &args, &reply)\n\n\t\tif ok{\n\n\t\t\tif reply.Err == OK{\n\t\t\t//\tlog.Printf(\"KV server response: OK\")\n\t\t\t\treturn \n\t\t\t}else if reply.Err == ErrWrongLeader{\n\t\t\t\t//log.Printf(\"KV server response: Wrong Leader Error\")\n\n\t\t\t}else if reply.Err == ErrTimeOut{\n\t\t\t\t//log.Printf(\"KV server[%v] response: Timeout Error\",ck.currentLeader)\n\t\t\t\t\n\t\t\t}else{\n\t\t\t\t//log.Printf(\"KV server response: Key Error\")\n\t\t\t\tbreak\n\t\t\t} \n\n\t\t}\n\t\tck.currentLeader++\n\t\tck.currentLeader %= len(ck.servers)\n\n\t}\n\n}", "title": "" }, { "docid": "04f3f88497ff93d8baf9c1fdb63bff9b", "score": "0.46397445", "text": "func (s *Sandbox) AddHostnamePath(hostname string) {\n\ts.hostnamePath = hostname\n}", "title": "" }, { "docid": "fc0e34d211aacbd2102f54b415c654fa", "score": "0.4634634", "text": "func (t *System_Aaa) AppendServerGroup(v *System_Aaa_ServerGroup) error {\n\tkey := *v.Name\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.ServerGroup == nil {\n\t\tt.ServerGroup = make(map[string]*System_Aaa_ServerGroup)\n\t}\n\n\tif _, ok := t.ServerGroup[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list ServerGroup %v\", key)\n\t}\n\n\tt.ServerGroup[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "fc0e34d211aacbd2102f54b415c654fa", "score": "0.46336782", "text": "func (t *System_Aaa) AppendServerGroup(v *System_Aaa_ServerGroup) error {\n\tkey := *v.Name\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.ServerGroup == nil {\n\t\tt.ServerGroup = make(map[string]*System_Aaa_ServerGroup)\n\t}\n\n\tif _, ok := t.ServerGroup[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list ServerGroup %v\", key)\n\t}\n\n\tt.ServerGroup[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "fc0e34d211aacbd2102f54b415c654fa", "score": "0.46336782", "text": "func (t *System_Aaa) AppendServerGroup(v *System_Aaa_ServerGroup) error {\n\tkey := *v.Name\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.ServerGroup == nil {\n\t\tt.ServerGroup = make(map[string]*System_Aaa_ServerGroup)\n\t}\n\n\tif _, ok := t.ServerGroup[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list ServerGroup %v\", key)\n\t}\n\n\tt.ServerGroup[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "fc0e34d211aacbd2102f54b415c654fa", "score": "0.46336782", "text": "func (t *System_Aaa) AppendServerGroup(v *System_Aaa_ServerGroup) error {\n\tkey := *v.Name\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.ServerGroup == nil {\n\t\tt.ServerGroup = make(map[string]*System_Aaa_ServerGroup)\n\t}\n\n\tif _, ok := t.ServerGroup[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list ServerGroup %v\", key)\n\t}\n\n\tt.ServerGroup[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "989cc53096e1109c6ccf5fbb6eda39cc", "score": "0.4631093", "text": "func (client Client) AddHost(hostname string, folder string) (bool, error) {\n\treqBody := addHostRequest{\n\t\tHostname: hostname,\n\t\tFolder: folder,\n\t\tAttributes: addHostRequestAttributes{\n\t\t\tTagAgent: \"cmk-agent\",\n\t\t\tIPAddress: hostname,\n\t\t},\n\t}\n\treqBytes, err := json.Marshal(reqBody)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\turl := fmt.Sprintf(\"%s/webapi.py?action=add_host&request=%s&%s\", client.URL, string(reqBytes), client.requestCredentials)\n\treq, err := http.NewRequest(http.MethodGet, url, nil)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\tresp, err := client.HTTPClient.Do(req)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\tvar respBody *addHostResponse\n\tbytes, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\terr = json.Unmarshal(bytes, &respBody)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\tif respBody.Code == 1 {\n\t\treturn false, nil\n\t}\n\n\tdefer resp.Body.Close()\n\treturn true, nil\n}", "title": "" }, { "docid": "9d33824e2edee7b83ce771a8a77ea829", "score": "0.46286637", "text": "func (a *Client) AddLicenseKeys(params *AddLicenseKeysParams, authInfo runtime.ClientAuthInfoWriter) (*AddLicenseKeysOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewAddLicenseKeysParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"addLicenseKeys\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/app/rest/server/licensingData/licenseKeys\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &AddLicenseKeysReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*AddLicenseKeysOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for addLicenseKeys: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "title": "" }, { "docid": "4d008cfb0bf536e2ac4b4d89690b853d", "score": "0.4614891", "text": "func WithHost(host string) CacheConfigOption {\n\treturn func(cache *OidcJwksVerificationKeyCache) error {\n\t\tif host == \"\" {\n\t\t\treturn fmt.Errorf(\"host value must not be empty\")\n\t\t}\n\t\tcache.host = host\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "7ce1f97d46c7b89c425c2b59a9a5428c", "score": "0.4609889", "text": "func (h HeaderMap) Add(key, value string) {\n\th[key] = value\n}", "title": "" }, { "docid": "041724774b7c2d54540b74d704178f07", "score": "0.46097907", "text": "func UpdateHost(h string) {\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tserviceInfo.Host = h\n}", "title": "" }, { "docid": "f72b43d74618f22e0883cc6e22dd808a", "score": "0.4602582", "text": "func AddServer(sess *ssh.Session) (*string, *config.Server, error) {\n\tlogger.Logger.Info(\"Add a server.\")\n\tstdio := utils.SessIO(sess)\n\tnamePui := serverNamePrompt(\"\", stdio)\n\n\tname, err := namePui.Run()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\thostPui := serverHostPrompt(\"\", stdio)\n\n\thost, err := hostPui.Run()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tportPui := serverPortPrompt(\"22\", stdio)\n\n\tportString, err := portPui.Run()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tport, _ := strconv.Atoi(portString)\n\tkey, server := config.Conf.AddServer(name, host, port)\n\n\treturn &key, server, nil\n}", "title": "" }, { "docid": "ffdcb06ce82d779dcf82f2a3b06bceb3", "score": "0.4598504", "text": "func RegisterKeyServer(transport upspin.Transport, key upspin.KeyServer) error {\n\treturn keyServers.register(transport, key)\n}", "title": "" }, { "docid": "714f72e6edd81ac1ff3fc4362f66084e", "score": "0.45977098", "text": "func (c *LNDConfig) Add(currency string, certPath string, host string, port int) error {\n\tif !ValidateCurrency(currency) {\n\t\treturn fmt.Errorf(\"currency '%s' not allowed\", currency)\n\t}\n\tif !fileExists(certPath) {\n\t\treturn fmt.Errorf(\"certPath '%s' file does not exist\", certPath)\n\t}\n\tif host == \"\" {\n\t\treturn fmt.Errorf(\"host is empty\")\n\t}\n\tif port == 0 {\n\t\treturn fmt.Errorf(\"port is empty\")\n\t}\n\n\tc.TLSPaths[currency] = certPath\n\tc.Connections[currency] = Connection{Host: host, Port: port}\n\treturn nil\n}", "title": "" }, { "docid": "1a6b6aa1b24f85fc40e163c7935ae84a", "score": "0.45899618", "text": "func (ck *Client) Append(key string, value string) {\n\tck.PutAppend(key, value, \"Append\")\n}", "title": "" }, { "docid": "2c6fac8b2e3fc82eeff03e4c45a912ca", "score": "0.45842546", "text": "func (c *client) PutHost(host *sync.Host) error {\n\tapiHost := engine.Host{\n\t\tName: host.Domain,\n\t\tSettings: engine.HostSettings{\n\t\t\tKeyPair: &engine.KeyPair{\n\t\t\t\tCert: []byte(host.CertificatePEM),\n\t\t\t\tKey: []byte(host.PrivateKeyPEM),\n\t\t\t},\n\t\t},\n\t}\n\tif err := c.client.UpsertHost(apiHost); err != nil {\n\t\treturn logger.Errorex(\"failed to upsert host\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "046eac3589d76d45677daa161f9be1bb", "score": "0.45800167", "text": "func (v *Vault) Add(key string, value []byte) {\n\tv.Lock()\n\tdefer v.Unlock()\n\tv.data[key] = value\n}", "title": "" }, { "docid": "f47c6da37dc515bfc238272019c8a859", "score": "0.4577433", "text": "func (c *Config) AddServer(name string, server *Server) {\n\tif c.Servers == nil {\n\t\tc.Servers = make(map[string]*Server)\n\t}\n\tc.Servers[name] = server\n}", "title": "" }, { "docid": "b741f50e6f886e970cdf236cd22a7f4d", "score": "0.4570118", "text": "func (ck *Clerk) PutAppend(key string, value string, op string) {\n\targs, reply := ck.PutAppendArgs(key, value, op)\n\tfor !(ck.servers[ck.leader].Call(\"KVServer.PutAppend\", &args, &reply) && reply.Err == OK) {\n\t\tck.leader += 1; ck.leader %= len(ck.servers);\n\t}\n}", "title": "" }, { "docid": "da0143c1354a776fed323df2ce523bae", "score": "0.45673218", "text": "func Host(url string) ClientOption {\n\treturn func(i *Client) {\n\t\ti.settings.Middleware.Config = url\n\t}\n}", "title": "" }, { "docid": "6482165899c67d010897c2f55515d52b", "score": "0.4563478", "text": "func (ck *Clerk) PutAppend(key string, value string, op string) {\n\t// You will have to modify this function.\n\tck.mu.Lock()\n\tck.reqId++\n\tputAppendArgs := PutAppendArgs{Key: key, Value: value, Op: op, Id: ck.id, ReqId: ck.reqId}\n\tck.mu.Unlock()\n\tDPrintf(\"Client PutAppend %v\", putAppendArgs)\n\tfor{\n\t\tif(ck.runServers(putAppendArgs) != Failed) { \n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "5e6af7b44d888224fb59a96903c975ac", "score": "0.45620784", "text": "func (e *ApiClientService) AddKey(name string, keyadd AccessKey) (key KeyItem, err error) {\n\turl := fmt.Sprintf(\"clients/%s/keys\", name)\n\tbody, err := JSONReader(keyadd)\n\terr = e.client.magicRequestDecoder(\"POST\", url, body, &key)\n\treturn\n}", "title": "" }, { "docid": "cefe24472c1711d55fa27e03592453cb", "score": "0.45574728", "text": "func (m hostDeviceResultMap) AddHost(resultStr string, host string) error {\n\tif _, ok := m[resultStr]; !ok {\n\t\tnewSet, err := newHostDeviceSet()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tm[resultStr] = newSet\n\t}\n\n\tm[resultStr].AddHost(host)\n\treturn nil\n}", "title": "" }, { "docid": "b641b0f93fa06300bf8b291832ce8eac", "score": "0.45568785", "text": "func (t *System_Dns) AppendHostEntry(v *System_Dns_HostEntry) error {\n\tkey := *v.Hostname\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.HostEntry == nil {\n\t\tt.HostEntry = make(map[string]*System_Dns_HostEntry)\n\t}\n\n\tif _, ok := t.HostEntry[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list HostEntry %v\", key)\n\t}\n\n\tt.HostEntry[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "b641b0f93fa06300bf8b291832ce8eac", "score": "0.45568785", "text": "func (t *System_Dns) AppendHostEntry(v *System_Dns_HostEntry) error {\n\tkey := *v.Hostname\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.HostEntry == nil {\n\t\tt.HostEntry = make(map[string]*System_Dns_HostEntry)\n\t}\n\n\tif _, ok := t.HostEntry[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list HostEntry %v\", key)\n\t}\n\n\tt.HostEntry[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "b641b0f93fa06300bf8b291832ce8eac", "score": "0.45568785", "text": "func (t *System_Dns) AppendHostEntry(v *System_Dns_HostEntry) error {\n\tkey := *v.Hostname\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.HostEntry == nil {\n\t\tt.HostEntry = make(map[string]*System_Dns_HostEntry)\n\t}\n\n\tif _, ok := t.HostEntry[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list HostEntry %v\", key)\n\t}\n\n\tt.HostEntry[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "b641b0f93fa06300bf8b291832ce8eac", "score": "0.45568785", "text": "func (t *System_Dns) AppendHostEntry(v *System_Dns_HostEntry) error {\n\tkey := *v.Hostname\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.HostEntry == nil {\n\t\tt.HostEntry = make(map[string]*System_Dns_HostEntry)\n\t}\n\n\tif _, ok := t.HostEntry[key]; ok {\n\t\treturn fmt.Errorf(\"duplicate key for list HostEntry %v\", key)\n\t}\n\n\tt.HostEntry[key] = v\n\treturn nil\n}", "title": "" }, { "docid": "039f6961f3c6934daa6dd1b0587d4e47", "score": "0.4555422", "text": "func (reply *Reply) Add(key string, value ...string) {\n\t(*reply)[key] = append((*reply)[key], value...)\n}", "title": "" }, { "docid": "0b2f5b52e04227038de9290afc5ae013", "score": "0.4555043", "text": "func Add(key, value string) p.Plugin {\n\treturn p.NewRequestPlugin(func(ctx *c.Context, h c.Handler) {\n\t\tquery := ctx.Request.URL.Query()\n\t\tquery.Add(key, value)\n\t\tctx.Request.URL.RawQuery = query.Encode()\n\t\th.Next(ctx)\n\t})\n}", "title": "" }, { "docid": "914d797e65ecc56e82c43ea866af3154", "score": "0.4554305", "text": "func (t *System_Aaa_ServerGroup) NewServer(Address string) (*System_Aaa_ServerGroup_Server, error) {\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Aaa_ServerGroup_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &System_Aaa_ServerGroup_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "914d797e65ecc56e82c43ea866af3154", "score": "0.4554305", "text": "func (t *System_Aaa_ServerGroup) NewServer(Address string) (*System_Aaa_ServerGroup_Server, error) {\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Aaa_ServerGroup_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &System_Aaa_ServerGroup_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "914d797e65ecc56e82c43ea866af3154", "score": "0.4554305", "text": "func (t *System_Aaa_ServerGroup) NewServer(Address string) (*System_Aaa_ServerGroup_Server, error) {\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Aaa_ServerGroup_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &System_Aaa_ServerGroup_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "914d797e65ecc56e82c43ea866af3154", "score": "0.4554305", "text": "func (t *System_Aaa_ServerGroup) NewServer(Address string) (*System_Aaa_ServerGroup_Server, error) {\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Aaa_ServerGroup_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &System_Aaa_ServerGroup_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "914d797e65ecc56e82c43ea866af3154", "score": "0.45542884", "text": "func (t *System_Aaa_ServerGroup) NewServer(Address string) (*System_Aaa_ServerGroup_Server, error) {\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Aaa_ServerGroup_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &System_Aaa_ServerGroup_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "4c138438a89366eb314ffff11139918d", "score": "0.45532498", "text": "func (g *Guestfs) Luks_add_key (device string, key string, newkey string, keyslot int) *GuestfsError {\n if g.g == nil {\n return closed_handle_error (\"luks_add_key\")\n }\n\n c_device := C.CString (device)\n defer C.free (unsafe.Pointer (c_device))\n\n c_key := C.CString (key)\n defer C.free (unsafe.Pointer (c_key))\n\n c_newkey := C.CString (newkey)\n defer C.free (unsafe.Pointer (c_newkey))\n\n r := C.guestfs_luks_add_key (g.g, c_device, c_key, c_newkey, C.int (keyslot))\n\n if r == -1 {\n return get_error_from_handle (g, \"luks_add_key\")\n }\n return nil\n}", "title": "" }, { "docid": "37d67c888abe6cf26b373017c1cebf0e", "score": "0.45493093", "text": "func AddHMCServerServer(ctx *Context, dev config.HMCCfg) {\n\tlog.Printf(\"ADDING HMCServer Backend %+v\", dev)\n\taffected, err := agent.MainConfig.Database.AddHMCCfg(dev)\n\tif err != nil {\n\t\tlog.Warningf(\"Error on insert new Backend %s , affected : %+v , error: %s\", dev.ID, affected, err)\n\t\tctx.JSON(404, err.Error())\n\t} else {\n\t\t//TODO: review if needed return data or affected\n\t\tctx.JSON(200, &dev)\n\t}\n}", "title": "" }, { "docid": "4afb4b0abe70cb4d499bde6b1368e545", "score": "0.4547847", "text": "func (hk *HyperKube) AddServer(s *Server) {\n\thk.servers = append(hk.servers, *s)\n\thk.servers[len(hk.servers)-1].hk = hk\n}", "title": "" }, { "docid": "3b0e3c3786bde0b00a424355216a6c86", "score": "0.4541586", "text": "func (ds DummyServer) addToLoadBalancer() error {\n\treq := AddHostRequest{Endpoint: ds.DummyHost.Endpoint(), RegexPattern: \"123\"}\n\tb, err := json.Marshal(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\treader := strings.NewReader(string(b))\n\tresp, err := http.Post(ds.LoadBalancerEndpoint+\"/add\", \"application/json\", reader)\n\tif err != nil {\n\t\treturn err\n\t}\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\tmodifyResponse := ModifyHostReponse{}\n\tif err := json.Unmarshal(body, &modifyResponse); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8bea7ddcace9fab3d36f176df2e02e6f", "score": "0.45415157", "text": "func (h *hostDeviceSet) AddHost(host string) {\n\th.Hosts.Insert(host)\n}", "title": "" }, { "docid": "133e5230a4402c65679aa9158cfb92a4", "score": "0.45406008", "text": "func (c *TextConn) Add(key string, value []byte, flags uint32, exptime int, noreply bool) error {\n\treturn c.sendStorageCommand(\"add\", key, value, flags, exptime, 0, noreply)\n}", "title": "" }, { "docid": "7a2e526d96be5a83c7ebf940b28e90a2", "score": "0.45351207", "text": "func AddHostToRemoteKnownHosts(client *goph.Client, hostname string, remoteKnownHostsPath string) {\n\tsshConfig := &ssh.ClientConfig{\n\t\tHostKeyCallback: addRemoteKnownHostCallback(client, remoteKnownHostsPath),\n\t}\n\tssh.Dial(\"tcp\", fmt.Sprintf(\"%s:%d\", hostname, defaultSSHPort), sshConfig)\n}", "title": "" }, { "docid": "b3b81a85425cfb37cd2536e120e7ad56", "score": "0.45285627", "text": "func (self *Env) PutLicenseDebug(licdebug int32) (err error) {\n if _tmp1362 := C.MSK_putlicensedebug(self.ptr(),C.int32_t(licdebug)); _tmp1362 != 0 {\n lastcode,lastmsg := self.getlasterror(_tmp1362)\n err = &MosekError{code:Rescode(lastcode),msg:lastmsg}\n return\n }\n return\n}", "title": "" }, { "docid": "781ad2cdda98dfbd6aa827f5df132da4", "score": "0.4528124", "text": "func (a *Adaptor) SetClientKey(val string) { a.clientKey = val }", "title": "" }, { "docid": "0a1970376cfb1ade3525329c07af5f1c", "score": "0.45249352", "text": "func (h Header) Add(key, value string) {\n\tkey = CanonicalHeaderKey(key)\n\th[key] = append(h[key], value)\n}", "title": "" } ]
e65ee7f6350aba1f921ddb60e1cca608
BalanceOf is a free data retrieval call binding the contract method 0x70a08231. Solidity: function balanceOf(_owner address) constant returns(uint256)
[ { "docid": "050f1bc661ff3871621770fe5e44ccf9", "score": "0.825279", "text": "func (_MintableToken *MintableTokenCaller) BalanceOf(opts *bind.CallOptsWithNumber, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _MintableToken.contract.CallWithNumber(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" } ]
[ { "docid": "da3428fa3d562c14403091dbe3cfa4e3", "score": "0.8411668", "text": "func (_ZapToken *ZapTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapToken.contract.Call(opts, out, \"balanceOf\", _owner)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "1a2c6537ef1cf16597c005c083e21f9b", "score": "0.83807415", "text": "func (_BasToken *BasTokenCaller) BalanceOf(opts *bind.CallOpts, owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _BasToken.contract.Call(opts, out, \"balanceOf\", owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "ca1a5382593424efe0627003092289cb", "score": "0.8373828", "text": "func (_BurnableToken *BurnableTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _BurnableToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "fdf4c414f1b4111f7db0659d0aa91287", "score": "0.83560896", "text": "func (_EthToken *EthTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _EthToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "a0fc2ef241e22b4139e611267a5a9f26", "score": "0.8355808", "text": "func (_MintableToken *MintableTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _MintableToken.contract.Call(opts, out, \"balanceOf\", _owner)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "672f13d64335ea13b435f0970e2aea59", "score": "0.8353666", "text": "func (_Token *TokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _Token.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "672f13d64335ea13b435f0970e2aea59", "score": "0.8353666", "text": "func (_Token *TokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _Token.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "572293d190828c849b0f48fa5f2979c9", "score": "0.83479196", "text": "func (_DummyERC721Token *DummyERC721TokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _DummyERC721Token.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "72fd35fc5bb1c7df65f13fc4879937a3", "score": "0.8333005", "text": "func (_StarNFT *StarNFTCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _StarNFT.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "d0ca0bb1af41894efb05316a72868fc5", "score": "0.83329016", "text": "func (_ERC721Metadata *ERC721MetadataCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC721Metadata.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "d0ca0bb1af41894efb05316a72868fc5", "score": "0.83329016", "text": "func (_ERC721Metadata *ERC721MetadataCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC721Metadata.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "dc3b1cd44835e5cd839fcd609bb04692", "score": "0.8318521", "text": "func (_MintableToken *MintableTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _MintableToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "dc3b1cd44835e5cd839fcd609bb04692", "score": "0.8318521", "text": "func (_MintableToken *MintableTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _MintableToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "4ea2e2a11c5d472bea41b92b5a6f96b5", "score": "0.8302918", "text": "func (_LivepeerToken *LivepeerTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _LivepeerToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "d8b5d86a2e2378fb299eaa79caada992", "score": "0.83022183", "text": "func (_StandardToken *StandardTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _StandardToken.contract.Call(opts, out, \"balanceOf\", _owner)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "c78249a9b6b9aaf4f9a7a2fcbca2836b", "score": "0.82882166", "text": "func (_SonmDummyToken *SonmDummyTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _SonmDummyToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "9ee9672273b0650b314c67ae0e975a90", "score": "0.8269323", "text": "func (_ERC721Token *ERC721TokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC721Token.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "9ee9672273b0650b314c67ae0e975a90", "score": "0.8269323", "text": "func (_ERC721Token *ERC721TokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC721Token.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "f2edb5a8cbf2cbb2bd2c2d38645ff5eb", "score": "0.82680887", "text": "func (_BasicToken *BasicTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _BasicToken.contract.Call(opts, out, \"balanceOf\", _owner)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "08b64960828ebe3eec1004c653f10e37", "score": "0.8264705", "text": "func (_StandardToken *StandardTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _StandardToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "08b64960828ebe3eec1004c653f10e37", "score": "0.8264705", "text": "func (_StandardToken *StandardTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _StandardToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "08b64960828ebe3eec1004c653f10e37", "score": "0.8264705", "text": "func (_StandardToken *StandardTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _StandardToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "7d2bdd1dce0b078c34521b7021542a61", "score": "0.8256911", "text": "func (_Pxc *PxcCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _Pxc.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "516898f17076aac632b4b7d7bde38f37", "score": "0.824189", "text": "func (_NPT *NPTCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _NPT.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "1c4471e53bef2297363eb929fd42a0f6", "score": "0.8240629", "text": "func (_SampleToken *SampleTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _SampleToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "4c587dcea1f6687118a5acd08aacc8f9", "score": "0.82297295", "text": "func (_BasicToken *BasicTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _BasicToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "4c587dcea1f6687118a5acd08aacc8f9", "score": "0.82297295", "text": "func (_BasicToken *BasicTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _BasicToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "b5439cfa12db11aaf21c959c099953fa", "score": "0.8218237", "text": "func (_ERC721BasicToken *ERC721BasicTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC721BasicToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "b5439cfa12db11aaf21c959c099953fa", "score": "0.8218237", "text": "func (_ERC721BasicToken *ERC721BasicTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC721BasicToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "288394b9271637e2925e479cc1ad2ac7", "score": "0.8207584", "text": "func (_ZapGetters *ZapGettersCaller) BalanceOf(opts *bind.CallOpts, _user common.Address) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapGetters.contract.Call(opts, out, \"balanceOf\", _user)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "f2e96644068889a801af94baf74f1a57", "score": "0.82070565", "text": "func (_ERC721Basic *ERC721BasicCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC721Basic.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "f2e96644068889a801af94baf74f1a57", "score": "0.82070565", "text": "func (_ERC721Basic *ERC721BasicCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC721Basic.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "462e54f4b263311146f0c2001947623b", "score": "0.8205552", "text": "func (_Token *TokenCaller) BalanceOf(opts *bind.CallOpts, tokenOwner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _Token.contract.Call(opts, out, \"balanceOf\", tokenOwner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "f0d6fb8c3599e460960347fdab1e2db6", "score": "0.8201531", "text": "func (_StandardToken *StandardTokenCaller) BalanceOf(opts *bind.CallOptsWithNumber, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _StandardToken.contract.CallWithNumber(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "bead1ea6a674d164bd1a359448417613", "score": "0.8193477", "text": "func (_ERC23TokenMock *ERC23TokenMockCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC23TokenMock.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "6da789e95d147c8a211da5d44b6459c6", "score": "0.8190497", "text": "func (_ERC721 *ERC721Caller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC721.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "6da789e95d147c8a211da5d44b6459c6", "score": "0.8190497", "text": "func (_ERC721 *ERC721Caller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC721.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "fc90c08459cd901e80dae78297354cd3", "score": "0.8188493", "text": "func (_Pxa721 *Pxa721Caller) BalanceOf(opts *bind.CallOpts, owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _Pxa721.contract.Call(opts, out, \"balanceOf\", owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "17168549658cd24d83e0cc0bbbd849d0", "score": "0.81823", "text": "func (_BasicToken *BasicTokenCaller) BalanceOf(opts *bind.CallOptsWithNumber, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _BasicToken.contract.CallWithNumber(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "39020dfcca195eb410e7ad660ba91142", "score": "0.81812155", "text": "func (_ZapMaster *ZapMasterCaller) BalanceOf(opts *bind.CallOpts, _user common.Address) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapMaster.contract.Call(opts, out, \"balanceOf\", _user)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "0ea0fe1456f3e83a96371d2c85608692", "score": "0.8170704", "text": "func (_Portalv3 *Portalv3Caller) BalanceOf(opts *bind.CallOpts, token common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _Portalv3.contract.Call(opts, out, \"balanceOf\", token)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "4de29f06f19f4f680e1e1f91cbbcc29c", "score": "0.8168018", "text": "func (_ReporterToken *ReporterTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ReporterToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "3c3c37b50800edbe45dce5e5eddffd1a", "score": "0.81671387", "text": "func (_ERC721Enumerable *ERC721EnumerableCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC721Enumerable.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "3c3c37b50800edbe45dce5e5eddffd1a", "score": "0.81671387", "text": "func (_ERC721Enumerable *ERC721EnumerableCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ERC721Enumerable.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "006781647f21320e0675824095b3b061", "score": "0.8164515", "text": "func (_RTCoin *RTCoinCaller) BalanceOf(opts *bind.CallOpts, _holder common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _RTCoin.contract.Call(opts, out, \"balanceOf\", _holder)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "980d66b2c5f5ea2853b0807cb3173a4f", "score": "0.81467694", "text": "func (_ExampleToken *ExampleTokenCaller) BalanceOf(opts *bind.CallOptsWithNumber, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ExampleToken.contract.CallWithNumber(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "69e99b7fa55abfc887397fa8570cec06", "score": "0.8139497", "text": "func (_EtherollToken *EtherollTokenCaller) BalanceOf(opts *bind.CallOpts, arg0 common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _EtherollToken.contract.Call(opts, out, \"balanceOf\", arg0)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "2b51cbf996dbb0ce08bb658391418052", "score": "0.8136407", "text": "func (_ERC721Metadata *ERC721MetadataSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _ERC721Metadata.Contract.BalanceOf(&_ERC721Metadata.CallOpts, _owner)\n}", "title": "" }, { "docid": "2b51cbf996dbb0ce08bb658391418052", "score": "0.8136407", "text": "func (_ERC721Metadata *ERC721MetadataSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _ERC721Metadata.Contract.BalanceOf(&_ERC721Metadata.CallOpts, _owner)\n}", "title": "" }, { "docid": "96e22416de1cb21b4f4094e07a6b3cee", "score": "0.8133116", "text": "func (_Tellor *TellorCaller) BalanceOf(opts *bind.CallOpts, _user common.Address) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _Tellor.contract.Call(opts, &out, \"balanceOf\", _user)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "19beaf3d81303f781171faf4a3122fe6", "score": "0.81303144", "text": "func (_BikeCoin *BikeCoinCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _BikeCoin.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "60ae149fc0507690f37a877482083088", "score": "0.8127759", "text": "func (_TokenERC20 *TokenERC20Caller) BalanceOf(opts *bind.CallOpts, arg0 common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _TokenERC20.contract.Call(opts, out, \"balanceOf\", arg0)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "da9851daa271ba3e5818a1a6b8f06224", "score": "0.81267834", "text": "func (cc *Controller) BalanceOf(stub shim.ChaincodeStubInterface, params []string) sc.Response {\n\tif len(params) != 1 {\n\t\treturn shim.Error(\"the number of params must be one\")\n\t}\n\n\taddress := params[0]\n\n\tbalanceByte, err := stub.GetState(address)\n\tCheckErr(err, `stub.GetState(\"owner\")`)\n\tif balanceByte == nil {\n\t\treturn shim.Error(\"balanceByte is nil\")\n\t}\n\n\tfmt.Println(address + \"'s, balance is \" + string(balanceByte))\n\treturn shim.Success(balanceByte)\n}", "title": "" }, { "docid": "c816ccf70b3691af8b1135bb33fd3d59", "score": "0.8115006", "text": "func (_IERC20 *IERC20Caller) BalanceOf(opts *bind.CallOpts, owner common.Address) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _IERC20.contract.Call(opts, &out, \"balanceOf\", owner)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "7758b8877df63ac9a4365664a7aed2b5", "score": "0.81013775", "text": "func (_BEP20 *BEP20Caller) BalanceOf(opts *bind.CallOpts, account common.Address) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _BEP20.contract.Call(opts, &out, \"balanceOf\", account)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "c8d0f17c363b9ebc9e33b4ec3c29f79e", "score": "0.8094872", "text": "func (_IUniswapV2ERC20 *IUniswapV2ERC20Caller) BalanceOf(opts *bind.CallOpts, owner common.Address) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _IUniswapV2ERC20.contract.Call(opts, &out, \"balanceOf\", owner)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "d4d0eebfe699fa15fef9a064b07efecc", "score": "0.8086876", "text": "func (_RBACMintableToken *RBACMintableTokenCaller) BalanceOf(opts *bind.CallOpts, _owner common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _RBACMintableToken.contract.Call(opts, out, \"balanceOf\", _owner)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "d0a0767cbced6c8441df86619ff2ca87", "score": "0.8081816", "text": "func (_StandardToken *StandardTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\r\n\treturn _StandardToken.Contract.BalanceOf(&_StandardToken.CallOpts, _owner)\r\n}", "title": "" }, { "docid": "b8cbbcd263fcd4271562545d85505130", "score": "0.807916", "text": "func (_Safemoon *SafemoonCaller) BalanceOf(opts *bind.CallOpts, account common.Address) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _Safemoon.contract.Call(opts, &out, \"balanceOf\", account)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "323fdfae25e6a79ad4e9f7b5b84c78b2", "score": "0.8070701", "text": "func (_MintableToken *MintableTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\r\n\treturn _MintableToken.Contract.BalanceOf(&_MintableToken.CallOpts, _owner)\r\n}", "title": "" }, { "docid": "37fb1ee3086cb8cfe3dc05099004d647", "score": "0.8067515", "text": "func (_CryptoContract *CryptoContractCaller) BalanceOf(opts *bind.CallOpts, arg0 common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _CryptoContract.contract.Call(opts, out, \"balanceOf\", arg0)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "402130bcf3434a03255d0d41d4ed9738", "score": "0.80582416", "text": "func (_StandardToken *StandardTokenSession) BalanceOf(_owner common.Address) (*big.Int, error) {\r\n\treturn _StandardToken.Contract.BalanceOf(&_StandardToken.CallOpts, _owner)\r\n}", "title": "" }, { "docid": "f78a9f5b461ca469160427ebc27bf867", "score": "0.80536497", "text": "func (_ZapToken *ZapTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\r\n\treturn _ZapToken.Contract.BalanceOf(&_ZapToken.CallOpts, _owner)\r\n}", "title": "" }, { "docid": "7dc997d066e9ead1c64074f6e2b0d125", "score": "0.80449826", "text": "func (_BasToken *BasTokenCallerSession) BalanceOf(owner common.Address) (*big.Int, error) {\n\treturn _BasToken.Contract.BalanceOf(&_BasToken.CallOpts, owner)\n}", "title": "" }, { "docid": "7d4cd8c4d1fa1f25fd38d8748b0ffa54", "score": "0.80380857", "text": "func (_MintableToken *MintableTokenSession) BalanceOf(_owner common.Address) (*big.Int, error) {\r\n\treturn _MintableToken.Contract.BalanceOf(&_MintableToken.CallOpts, _owner)\r\n}", "title": "" }, { "docid": "d0de78c17a2d88f0dfbfe6eb252c6455", "score": "0.80378747", "text": "func (_DummyERC721Token *DummyERC721TokenSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _DummyERC721Token.Contract.BalanceOf(&_DummyERC721Token.CallOpts, _owner)\n}", "title": "" }, { "docid": "e2b1414c0c153be71a946818759b2120", "score": "0.8036828", "text": "func (_ZapToken *ZapTokenSession) BalanceOf(_owner common.Address) (*big.Int, error) {\r\n\treturn _ZapToken.Contract.BalanceOf(&_ZapToken.CallOpts, _owner)\r\n}", "title": "" }, { "docid": "1393afd4174e051092ce9c9244850013", "score": "0.80350316", "text": "func (_WETH9 *WETH9) BalanceOf(opts *bind.CallOpts, arg0 common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _WETH9.Call(opts, out, \"balanceOf\", arg0)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "e2c7a629288174a9875f9b8fe2858292", "score": "0.8032431", "text": "func (_ERC721Metadata *ERC721MetadataCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _ERC721Metadata.Contract.BalanceOf(&_ERC721Metadata.CallOpts, _owner)\n}", "title": "" }, { "docid": "e2c7a629288174a9875f9b8fe2858292", "score": "0.8032431", "text": "func (_ERC721Metadata *ERC721MetadataCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _ERC721Metadata.Contract.BalanceOf(&_ERC721Metadata.CallOpts, _owner)\n}", "title": "" }, { "docid": "3349552a29e81662a52485a6d033541e", "score": "0.8029103", "text": "func (_BurnableToken *BurnableTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _BurnableToken.Contract.BalanceOf(&_BurnableToken.CallOpts, _owner)\n}", "title": "" }, { "docid": "db9e4661a30ba42901d0666b3ed17f36", "score": "0.8025685", "text": "func (_ERC20 *ERC20Caller) BalanceOf(opts *bind.CallOpts, who common.Address) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ERC20.contract.Call(opts, out, \"balanceOf\", who)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "02e162bc6688df5935e887de12a44ef6", "score": "0.8025013", "text": "func (_ERC23TokenMock *ERC23TokenMockSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _ERC23TokenMock.Contract.BalanceOf(&_ERC23TokenMock.CallOpts, _owner)\n}", "title": "" }, { "docid": "02cccd560aa5955b64f805f81ea01476", "score": "0.8024451", "text": "func (_WETH *WETHSession) BalanceOf(arg0 common.Address) (*big.Int, error) {\n\treturn _WETH.Contract.BalanceOf(&_WETH.CallOpts, arg0)\n}", "title": "" }, { "docid": "ca1b871d16789ffe883cf52f2f70161e", "score": "0.80216765", "text": "func (_WETH *WETHCallerSession) BalanceOf(arg0 common.Address) (*big.Int, error) {\n\treturn _WETH.Contract.BalanceOf(&_WETH.CallOpts, arg0)\n}", "title": "" }, { "docid": "84464d3123d1d640436d99f7268fa3d7", "score": "0.8016563", "text": "func (_StandardToken *StandardTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _StandardToken.Contract.BalanceOf(&_StandardToken.CallOpts, _owner)\n}", "title": "" }, { "docid": "84464d3123d1d640436d99f7268fa3d7", "score": "0.8016563", "text": "func (_StandardToken *StandardTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _StandardToken.Contract.BalanceOf(&_StandardToken.CallOpts, _owner)\n}", "title": "" }, { "docid": "84464d3123d1d640436d99f7268fa3d7", "score": "0.8016563", "text": "func (_StandardToken *StandardTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _StandardToken.Contract.BalanceOf(&_StandardToken.CallOpts, _owner)\n}", "title": "" }, { "docid": "84464d3123d1d640436d99f7268fa3d7", "score": "0.8016563", "text": "func (_StandardToken *StandardTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _StandardToken.Contract.BalanceOf(&_StandardToken.CallOpts, _owner)\n}", "title": "" }, { "docid": "75f9bf00743c9e12cc5e81f178eca048", "score": "0.80154264", "text": "func (_IERC20 *IERC20CallerSession) BalanceOf(owner common.Address) (*big.Int, error) {\n\treturn _IERC20.Contract.BalanceOf(&_IERC20.CallOpts, owner)\n}", "title": "" }, { "docid": "277e2efcfbd9e924fdccc1e2d00c004d", "score": "0.8012859", "text": "func (_IUniswapV2ERC20 *IUniswapV2ERC20CallerSession) BalanceOf(owner common.Address) (*big.Int, error) {\n\treturn _IUniswapV2ERC20.Contract.BalanceOf(&_IUniswapV2ERC20.CallOpts, owner)\n}", "title": "" }, { "docid": "ac4c3e4c7f91af8a7e85d06c82b8ac15", "score": "0.80106467", "text": "func (_WETH *WETHCaller) BalanceOf(opts *bind.CallOpts, arg0 common.Address) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _WETH.contract.Call(opts, &out, \"balanceOf\", arg0)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "2711e831b3fc0bf53d141eb7ab1922e6", "score": "0.80105555", "text": "func (_LegacyERC20ETH *LegacyERC20ETHCaller) BalanceOf(opts *bind.CallOpts, _who common.Address) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _LegacyERC20ETH.contract.Call(opts, &out, \"balanceOf\", _who)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "c2d25bd079a707ffc05df9f67b7272eb", "score": "0.80089", "text": "func (_BasicToken *BasicTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\r\n\treturn _BasicToken.Contract.BalanceOf(&_BasicToken.CallOpts, _owner)\r\n}", "title": "" }, { "docid": "74548a1f52643fe92302e78c4ab73457", "score": "0.8006522", "text": "func (_Token *TokenCaller) BalanceOf(opts *bind.CallOptsWithNumber, who common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _Token.contract.CallWithNumber(opts, out, \"balanceOf\", who)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "20e7317454096a212822f9879003db10", "score": "0.800387", "text": "func (_IUniswapV2Pair *IUniswapV2PairCallerSession) BalanceOf(owner common.Address) (*big.Int, error) {\n\treturn _IUniswapV2Pair.Contract.BalanceOf(&_IUniswapV2Pair.CallOpts, owner)\n}", "title": "" }, { "docid": "08cfbd9792f6e91abd60bf52d0dab3c8", "score": "0.79979736", "text": "func (_MintableToken *MintableTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _MintableToken.Contract.BalanceOf(&_MintableToken.CallOpts, _owner)\n}", "title": "" }, { "docid": "08cfbd9792f6e91abd60bf52d0dab3c8", "score": "0.79979736", "text": "func (_MintableToken *MintableTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _MintableToken.Contract.BalanceOf(&_MintableToken.CallOpts, _owner)\n}", "title": "" }, { "docid": "08cfbd9792f6e91abd60bf52d0dab3c8", "score": "0.79979736", "text": "func (_MintableToken *MintableTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _MintableToken.Contract.BalanceOf(&_MintableToken.CallOpts, _owner)\n}", "title": "" }, { "docid": "f1ed7079a19aab3a25b2fe4e82da0ede", "score": "0.79941714", "text": "func (_StarNFT *StarNFTSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _StarNFT.Contract.BalanceOf(&_StarNFT.CallOpts, _owner)\n}", "title": "" }, { "docid": "7f5589275b99cb38450e7f4186886f28", "score": "0.7992647", "text": "func (_IUniswapV2ERC20 *IUniswapV2ERC20Session) BalanceOf(owner common.Address) (*big.Int, error) {\n\treturn _IUniswapV2ERC20.Contract.BalanceOf(&_IUniswapV2ERC20.CallOpts, owner)\n}", "title": "" }, { "docid": "75b6ed8d3020825fef1273d6994221ff", "score": "0.79922", "text": "func (_ERC20Basic *ERC20BasicCaller) BalanceOf(opts *bind.CallOpts, who common.Address) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ERC20Basic.contract.Call(opts, out, \"balanceOf\", who)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "95d4656dface3abe29ef18ef9910015c", "score": "0.79919475", "text": "func (_Token *TokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _Token.Contract.BalanceOf(&_Token.CallOpts, _owner)\n}", "title": "" }, { "docid": "95d4656dface3abe29ef18ef9910015c", "score": "0.79919475", "text": "func (_Token *TokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _Token.Contract.BalanceOf(&_Token.CallOpts, _owner)\n}", "title": "" }, { "docid": "24509a88ea775cc871a1334cbe1b5e6b", "score": "0.79895705", "text": "func (_BasMiner *BasMinerCaller) BalanceOf(opts *bind.CallOpts, arg0 common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _BasMiner.contract.Call(opts, out, \"balanceOf\", arg0)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "f8cf6b73b4cd5a935121f01545280293", "score": "0.79877156", "text": "func (_IERC20 *IERC20Session) BalanceOf(owner common.Address) (*big.Int, error) {\n\treturn _IERC20.Contract.BalanceOf(&_IERC20.CallOpts, owner)\n}", "title": "" }, { "docid": "200e19b4faf48ab19fe57d065e0cbeaf", "score": "0.79875803", "text": "func (_LivepeerToken *LivepeerTokenCallerSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _LivepeerToken.Contract.BalanceOf(&_LivepeerToken.CallOpts, _owner)\n}", "title": "" }, { "docid": "f9f43ec9c8b4cbeab0d8c1e5872ef8ea", "score": "0.79854894", "text": "func (_StandardToken *StandardTokenSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _StandardToken.Contract.BalanceOf(&_StandardToken.CallOpts, _owner)\n}", "title": "" }, { "docid": "f9f43ec9c8b4cbeab0d8c1e5872ef8ea", "score": "0.79854894", "text": "func (_StandardToken *StandardTokenSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _StandardToken.Contract.BalanceOf(&_StandardToken.CallOpts, _owner)\n}", "title": "" }, { "docid": "f9f43ec9c8b4cbeab0d8c1e5872ef8ea", "score": "0.79854894", "text": "func (_StandardToken *StandardTokenSession) BalanceOf(_owner common.Address) (*big.Int, error) {\n\treturn _StandardToken.Contract.BalanceOf(&_StandardToken.CallOpts, _owner)\n}", "title": "" } ]
22e5a18be814d0d532ab821b32b47637
RemoveDrgRouteDistributionStatements Removes one or more route distribution statements from the specified Route Distribution's Map
[ { "docid": "95b4360d911ce9e6299aacdc7d1482b8", "score": "0.75734794", "text": "func (client VirtualNetworkClient) RemoveDrgRouteDistributionStatements(ctx context.Context, request RemoveDrgRouteDistributionStatementsRequest) (response RemoveDrgRouteDistributionStatementsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.removeDrgRouteDistributionStatements, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = RemoveDrgRouteDistributionStatementsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = RemoveDrgRouteDistributionStatementsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(RemoveDrgRouteDistributionStatementsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into RemoveDrgRouteDistributionStatementsResponse\")\n\t}\n\treturn\n}", "title": "" } ]
[ { "docid": "a4d1fa5e6ec4c712527987796b9919c3", "score": "0.7859515", "text": "func (client VirtualNetworkClient) removeDrgRouteDistributionStatements(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodPost, \"/drgRouteDistributions/{drgRouteDistributionId}/actions/removeDrgRouteDistributionStatements\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response RemoveDrgRouteDistributionStatementsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "ad48dd78da5183c2fb32282c4fc1fd5b", "score": "0.61259997", "text": "func (client VirtualNetworkClient) updateDrgRouteDistributionStatements(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodPost, \"/drgRouteDistributions/{drgRouteDistributionId}/actions/updateDrgRouteDistributionStatements\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response UpdateDrgRouteDistributionStatementsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "3769426047a60f99a4d2bcc9d39a25a4", "score": "0.59300506", "text": "func (client VirtualNetworkClient) deleteDrgRouteDistribution(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodDelete, \"/drgRouteDistributions/{drgRouteDistributionId}\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response DeleteDrgRouteDistributionResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "27221eea959697124df8597958b5fbc0", "score": "0.5906822", "text": "func (client VirtualNetworkClient) UpdateDrgRouteDistributionStatements(ctx context.Context, request UpdateDrgRouteDistributionStatementsRequest) (response UpdateDrgRouteDistributionStatementsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.updateDrgRouteDistributionStatements, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = UpdateDrgRouteDistributionStatementsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = UpdateDrgRouteDistributionStatementsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(UpdateDrgRouteDistributionStatementsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into UpdateDrgRouteDistributionStatementsResponse\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "5f976474c007742fd7216e5f542cd1b9", "score": "0.58897793", "text": "func (d *distribution) RemoveDistributions(sealedSegments []SegmentEntry, growingSegments []SegmentEntry) chan struct{} {\n\td.mut.Lock()\n\tdefer d.mut.Unlock()\n\n\tchanged := false\n\tfor _, sealed := range sealedSegments {\n\t\tif d.offlines.Contain(sealed.SegmentID) {\n\t\t\td.offlines.Remove(sealed.SegmentID)\n\t\t\tchanged = true\n\t\t}\n\t\tentry, ok := d.sealedSegments[sealed.SegmentID]\n\t\tif !ok {\n\t\t\tcontinue\n\t\t}\n\t\tif entry.NodeID == sealed.NodeID || sealed.NodeID == wildcardNodeID {\n\t\t\tdelete(d.sealedSegments, sealed.SegmentID)\n\t\t\tchanged = true\n\t\t}\n\t}\n\n\tfor _, growing := range growingSegments {\n\t\t_, ok := d.growingSegments[growing.SegmentID]\n\t\tif !ok {\n\t\t\tcontinue\n\t\t}\n\n\t\tdelete(d.growingSegments, growing.SegmentID)\n\t\tchanged = true\n\t}\n\n\tif !changed {\n\t\t// no change made, return closed signal channel\n\t\treturn getClosedCh()\n\t}\n\n\treturn d.genSnapshot()\n}", "title": "" }, { "docid": "7a61ad3a9801a779eaf4ac2981e0b5e0", "score": "0.5828783", "text": "func (client VirtualNetworkClient) DeleteDrgRouteDistribution(ctx context.Context, request DeleteDrgRouteDistributionRequest) (response DeleteDrgRouteDistributionResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.deleteDrgRouteDistribution, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = DeleteDrgRouteDistributionResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = DeleteDrgRouteDistributionResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(DeleteDrgRouteDistributionResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into DeleteDrgRouteDistributionResponse\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "a3b67fde4f95e068dbc1532681f2bca5", "score": "0.5785948", "text": "func (client VirtualNetworkClient) ListDrgRouteDistributionStatements(ctx context.Context, request ListDrgRouteDistributionStatementsRequest) (response ListDrgRouteDistributionStatementsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.listDrgRouteDistributionStatements, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = ListDrgRouteDistributionStatementsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = ListDrgRouteDistributionStatementsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(ListDrgRouteDistributionStatementsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into ListDrgRouteDistributionStatementsResponse\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "aeee92b9ae3abc8edeb95ac58c49a724", "score": "0.57536894", "text": "func (client VirtualNetworkClient) listDrgRouteDistributionStatements(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/drgRouteDistributions/{drgRouteDistributionId}/drgRouteDistributionStatements\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response ListDrgRouteDistributionStatementsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "e89e8b19c06ecdf13c133f9af18a819f", "score": "0.5466756", "text": "func (client VirtualNetworkClient) addDrgRouteDistributionStatements(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodPost, \"/drgRouteDistributions/{drgRouteDistributionId}/actions/addDrgRouteDistributionStatements\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response AddDrgRouteDistributionStatementsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "fd2b8b459207f52f68b82bdce6cea357", "score": "0.53098035", "text": "func (client VirtualNetworkClient) AddDrgRouteDistributionStatements(ctx context.Context, request AddDrgRouteDistributionStatementsRequest) (response AddDrgRouteDistributionStatementsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.addDrgRouteDistributionStatements, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = AddDrgRouteDistributionStatementsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = AddDrgRouteDistributionStatementsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(AddDrgRouteDistributionStatementsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into AddDrgRouteDistributionStatementsResponse\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "a39555d8172600076b725472e08f01df", "score": "0.5133909", "text": "func deleteRoutesByDestination(destinationSubnet *net.IPNet) error {\n\troutes, err := netlink.RouteListFiltered(nl.FAMILY_ALL, &netlink.Route{\n\t\tDst: destinationSubnet, Protocol: zebraRouteOriginator,\n\t}, netlink.RT_FILTER_DST|netlink.RT_FILTER_PROTOCOL)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to get routes from netlink: %v\", err)\n\t}\n\tfor i, r := range routes {\n\t\tklog.V(2).Infof(\"Found route to remove: %s\", r.String())\n\t\tif err = netlink.RouteDel(&routes[i]); err != nil {\n\t\t\treturn fmt.Errorf(\"failed to remove route due to %v\", err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "62505d50076be0773e96c6b3785769fa", "score": "0.5054517", "text": "func (client VirtualNetworkClient) updateDrgRouteDistribution(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodPut, \"/drgRouteDistributions/{drgRouteDistributionId}\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response UpdateDrgRouteDistributionResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "2a2b91bb04b5fcb10cfad969ee2f0e35", "score": "0.49561745", "text": "func (client VirtualNetworkClient) removeDrgRouteRules(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodPost, \"/drgRouteTables/{drgRouteTableId}/actions/removeDrgRouteRules\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response RemoveDrgRouteRulesResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "5108978f8ebf65bffedcfc23ceddb61d", "score": "0.49299303", "text": "func (client VirtualNetworkClient) UpdateDrgRouteDistribution(ctx context.Context, request UpdateDrgRouteDistributionRequest) (response UpdateDrgRouteDistributionResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.updateDrgRouteDistribution, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = UpdateDrgRouteDistributionResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = UpdateDrgRouteDistributionResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(UpdateDrgRouteDistributionResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into UpdateDrgRouteDistributionResponse\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "600687415487b8b151c391e09b6c610c", "score": "0.48606387", "text": "func (rs *routeSyncer) delInjectedRoute(dst *net.IPNet) {\n\trs.mutex.Lock()\n\tdefer rs.mutex.Unlock()\n\tif _, ok := rs.routeTableStateMap[dst.String()]; ok {\n\t\tklog.V(3).Infof(\"Removing route for destination: %s\", dst)\n\t\tdelete(rs.routeTableStateMap, dst.String())\n\t}\n}", "title": "" }, { "docid": "fde10c32cbcce068426bf5053c86e2eb", "score": "0.4755652", "text": "func (client VirtualNetworkClient) ListDrgRouteDistributions(ctx context.Context, request ListDrgRouteDistributionsRequest) (response ListDrgRouteDistributionsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.listDrgRouteDistributions, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = ListDrgRouteDistributionsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = ListDrgRouteDistributionsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(ListDrgRouteDistributionsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into ListDrgRouteDistributionsResponse\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "1496e0f7f936ee20f026ac712f408a33", "score": "0.4644685", "text": "func (client VirtualNetworkClient) listDrgRouteDistributions(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/drgRouteDistributions\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response ListDrgRouteDistributionsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "e38e0921ce233c24eee5724847642410", "score": "0.46224457", "text": "func removeSchedules(request Request) {\n\tlog.Debugf(\"removing schedules for '%s'\", request.ClusterName)\n\n\t// a ConfigMap used for the schedule uses the following label selector:\n\t// crunchy-scheduler=true,<config.LABEL_PG_CLUSTER>=<request.ClusterName>\n\tselector := fmt.Sprintf(\"crunchy-scheduler=true,%s=%s\",\n\t\tconfig.LABEL_PG_CLUSTER, request.ClusterName)\n\n\t// run the query the deletes all of the scheduled configmaps\n\t// if there is an error, log it, but continue on without making a big stink\n\tif err := kubeapi.DeleteConfigMaps(request.Clientset, selector, request.Namespace); err != nil {\n\t\tlog.Error(err)\n\t}\n}", "title": "" }, { "docid": "ebb4f8c4e7b82a07301e0d9bec70a1d6", "score": "0.45889634", "text": "func (c *jsiiProxy_CfnRouteResponseV2) ApplyRemovalPolicy(policy awscdk.RemovalPolicy, options *awscdk.RemovalPolicyOptions) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"applyRemovalPolicy\",\n\t\t[]interface{}{policy, options},\n\t)\n}", "title": "" }, { "docid": "d72dafbb851b41b4c7418a7ae3fd7442", "score": "0.45829707", "text": "func (c *RouteClient) DeleteUnmappedRoutesForSpace(ctx context.Context, spaceGUID string) (string, error) {\n\treturn c.client.delete(ctx, path.Format(\"/v3/spaces/%s/routes?unmapped=true\", spaceGUID))\n}", "title": "" }, { "docid": "96503f8214ccd0468be0956bb37c62e1", "score": "0.45790577", "text": "func (c *jsiiProxy_CfnRouteV2) ApplyRemovalPolicy(policy awscdk.RemovalPolicy, options *awscdk.RemovalPolicyOptions) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"applyRemovalPolicy\",\n\t\t[]interface{}{policy, options},\n\t)\n}", "title": "" }, { "docid": "dc50970adaff4dc2368bfb13c677942d", "score": "0.45690483", "text": "func (client VirtualNetworkClient) GetDrgRouteDistribution(ctx context.Context, request GetDrgRouteDistributionRequest) (response GetDrgRouteDistributionResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.getDrgRouteDistribution, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = GetDrgRouteDistributionResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = GetDrgRouteDistributionResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(GetDrgRouteDistributionResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into GetDrgRouteDistributionResponse\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "b0631c78a7ed115b1b1a9327efc72015", "score": "0.45551068", "text": "func (client VirtualNetworkClient) createDrgRouteDistribution(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodPost, \"/drgRouteDistributions\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response CreateDrgRouteDistributionResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "646d884d3bd62c8fad2123893018466b", "score": "0.4519012", "text": "func (client VirtualNetworkClient) getDrgRouteDistribution(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/drgRouteDistributions/{drgRouteDistributionId}\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response GetDrgRouteDistributionResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "5c230a849c54caa7aafd4946cee1a5ea", "score": "0.4497437", "text": "func (client VirtualNetworkClient) RemoveDrgRouteRules(ctx context.Context, request RemoveDrgRouteRulesRequest) (response RemoveDrgRouteRulesResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.removeDrgRouteRules, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = RemoveDrgRouteRulesResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = RemoveDrgRouteRulesResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(RemoveDrgRouteRulesResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into RemoveDrgRouteRulesResponse\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "f3474b5074413866bf056388a77473f2", "score": "0.4428083", "text": "func (oc *Controller) removeLRPolicies(nodeName string, priorities []string) {\n\tif len(priorities) == 0 {\n\t\tpriorities = []string{types.InterNodePolicyPriority, types.NodeSubnetPolicyPriority, types.MGMTPortPolicyPriority}\n\t}\n\tfor _, priority := range priorities {\n\t\tintPriority, _ := strconv.Atoi(priority)\n\n\t\tlogicalRouter := nbdb.LogicalRouter{}\n\t\tresult := []nbdb.LogicalRouterPolicy{}\n\t\topModels := []libovsdbops.OperationModel{\n\t\t\t{\n\t\t\t\tModelPredicate: func(lrp *nbdb.LogicalRouterPolicy) bool {\n\t\t\t\t\treturn strings.Contains(lrp.Match, fmt.Sprintf(\"%s \", nodeName)) && lrp.Priority == intPriority\n\t\t\t\t},\n\t\t\t\tExistingResult: &result,\n\t\t\t\tDoAfter: func() {\n\t\t\t\t\tlogicalRouter.Policies = libovsdbops.ExtractUUIDsFromModels(&result)\n\t\t\t\t},\n\t\t\t\tBulkOp: true,\n\t\t\t},\n\t\t\t{\n\t\t\t\tModel: &logicalRouter,\n\t\t\t\tModelPredicate: func(lr *nbdb.LogicalRouter) bool { return lr.Name == types.OVNClusterRouter },\n\t\t\t\tOnModelMutations: []interface{}{\n\t\t\t\t\t&logicalRouter.Policies,\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t\tif err := oc.modelClient.Delete(opModels...); err != nil {\n\t\t\tklog.Errorf(\"Failed to remove the policy routes %s associated with the node %s, error: %v\", priority, nodeName, err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3175b4ee70e0c3f0d8fdddc3dd2c5a5d", "score": "0.43879822", "text": "func (r *GenericRouter) RemoveRoute(m msgRt) {\n\t// Tag on operation constant\n\tm.op = REMOVEROUTE\n\t// Send msgRt to external msgChan\n\tr.externalRtChan <- m\n}", "title": "" }, { "docid": "f883dd25b289a167315fa6f6a6bc398c", "score": "0.43771175", "text": "func (_Stakingbindings *StakingbindingsCaller) RewardsDistribution(opts *bind.CallOpts) (common.Address, error) {\n\tvar out []interface{}\n\terr := _Stakingbindings.contract.Call(opts, &out, \"rewardsDistribution\")\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "483cda53c08ba0fb3144c6baacd71667", "score": "0.43748987", "text": "func (r *VirtualNodeReconciler) removeNamespaceMapFinalizers(nm mapsv1alpha1.NamespaceMap) error {\n\tctrlutils.RemoveFinalizer(&nm, virtualNodeControllerFinalizer)\n\tctrlutils.RemoveFinalizer(&nm, constctrl.NamespaceMapControllerFinalizer)\n\n\tklog.Infof(\"The NamespaceMap '%s' is requested to be deleted\", nm.GetName())\n\n\tif err := r.Update(context.TODO(), &nm); err != nil {\n\t\t// WARNING: Is possible that this Update is called on a resource that is no more here\n\t\t// it doesn't return \"NotFound\" but \"Conflict\"\n\t\tklog.Errorf(\" %s --> Problems while removing finalizer from '%s'\", err, nm.GetName())\n\t\treturn err\n\t}\n\tklog.Infof(\"Finalizer is correctly removed from the NamespaceMap '%s'\", nm.GetName())\n\n\treturn nil\n}", "title": "" }, { "docid": "e7a3741a14e62bb013c3cc9c972142f8", "score": "0.4364655", "text": "func (l *Line) RemoveConstraints() {\n\tl.constraints = nil\n}", "title": "" }, { "docid": "6f7c073d62e06eea54f60a539cde712b", "score": "0.4356431", "text": "func (r *GenericRouter) removeRoute(m msgRt) {\n\n\t// Confirm source is in registered components array\n\tif _, ok := r.rc[m.src]; !ok {\n\t\treturn\n\t}\n\tif _, ok := r.rc[m.dest]; !ok {\n\t\treturn\n\t}\n\n\t// Lookup component array for source\n\tsrcArray := r.rt[m.src]\n\n\t// Cycle through source array, remove destination component if found. Rrder\n\t// not important so just swap to last and return len - 1\n\tfor i, c := range srcArray {\n\t\tif r.rc[m.dest] == c {\n\t\t\tsrcArray[len(srcArray)-1], srcArray[i] = srcArray[i], srcArray[len(srcArray)-1]\n\t\t\tsrcArray = srcArray[:len(srcArray)-1]\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "ff5acf5d830efaab979e23bec747cdc0", "score": "0.43010348", "text": "func (f *Cloud) DeleteRoute(ctx context.Context, clusterName string, route *cloudprovider.Route) error {\n\tf.Lock.Lock()\n\tdefer f.Lock.Unlock()\n\tf.addCall(\"delete-route\")\n\tname := \"\"\n\tfor key, saved := range f.RouteMap {\n\t\tif route.DestinationCIDR == saved.Route.DestinationCIDR &&\n\t\t\troute.TargetNode == saved.Route.TargetNode &&\n\t\t\tclusterName == saved.ClusterName {\n\t\t\tname = key\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif len(name) == 0 {\n\t\tf.Err = fmt.Errorf(\"no route found for node:%v with DestinationCIDR== %v\", route.TargetNode, route.DestinationCIDR)\n\t\treturn f.Err\n\t}\n\n\tdelete(f.RouteMap, name)\n\treturn nil\n}", "title": "" }, { "docid": "697dc604b635bfad309849bc08728b7e", "score": "0.42921782", "text": "func (t *table) Delete(r router.Route) error {\n\tservice := r.Service\n\tsum := r.Hash()\n\n\tt.Lock()\n\tdefer t.Unlock()\n\n\tif _, ok := t.routes[service]; !ok {\n\t\treturn router.ErrRouteNotFound\n\t}\n\n\tif _, ok := t.routes[service][sum]; !ok {\n\t\treturn router.ErrRouteNotFound\n\t}\n\n\t// delete the route from the service\n\tdelete(t.routes[service], sum)\n\n\t// delete the whole map if there are no routes left\n\tif len(t.routes[service]) == 0 {\n\t\tdelete(t.routes, service)\n\t}\n\n\tif logger.V(logger.DebugLevel, logger.DefaultLogger) {\n\t\tlogger.Debugf(\"Router emitting %s for route: %s\", router.Delete, r.Address)\n\t}\n\tgo t.sendEvent(&router.Event{Type: router.Delete, Timestamp: time.Now(), Route: r})\n\n\treturn nil\n}", "title": "" }, { "docid": "19e35009629e39d85a754f31b7802499", "score": "0.4288059", "text": "func (m *DoctorMutation) RemoveTreatmentIDs(ids ...int) {\n\tif m.removedtreatment == nil {\n\t\tm.removedtreatment = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removedtreatment[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "da7f91443ccdd157eafa462d45fe7324", "score": "0.4280284", "text": "func (client *Client) DeleteCustomRoutingEndpointGroupDestinations(request *DeleteCustomRoutingEndpointGroupDestinationsRequest) (_result *DeleteCustomRoutingEndpointGroupDestinationsResponse, _err error) {\n\truntime := &util.RuntimeOptions{}\n\t_result = &DeleteCustomRoutingEndpointGroupDestinationsResponse{}\n\t_body, _err := client.DeleteCustomRoutingEndpointGroupDestinationsWithOptions(request, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_result = _body\n\treturn _result, _err\n}", "title": "" }, { "docid": "5b367820d0f6671468576ac8027b6223", "score": "0.4242843", "text": "func (sd *shardDelegator) ReleaseSegments(ctx context.Context, req *querypb.ReleaseSegmentsRequest, force bool) error {\n\tlog := sd.getLogger(ctx)\n\n\ttargetNodeID := req.GetNodeID()\n\t// add common log fields\n\tlog = log.With(\n\t\tzap.Int64s(\"segmentIDs\", req.GetSegmentIDs()),\n\t\tzap.Int64(\"nodeID\", req.GetNodeID()),\n\t\tzap.String(\"scope\", req.GetScope().String()),\n\t\tzap.Bool(\"force\", force))\n\n\tlog.Info(\"delegator start to release segments\")\n\t// alter distribution first\n\tvar sealed, growing []SegmentEntry\n\tconvertSealed := func(segmentID int64, _ int) SegmentEntry {\n\t\treturn SegmentEntry{\n\t\t\tSegmentID: segmentID,\n\t\t\tNodeID: targetNodeID,\n\t\t}\n\t}\n\tconvertGrowing := func(segmentID int64, _ int) SegmentEntry {\n\t\treturn SegmentEntry{\n\t\t\tSegmentID: segmentID,\n\t\t}\n\t}\n\tswitch req.GetScope() {\n\tcase querypb.DataScope_All:\n\t\tsealed = lo.Map(req.GetSegmentIDs(), convertSealed)\n\t\tgrowing = lo.Map(req.GetSegmentIDs(), convertGrowing)\n\tcase querypb.DataScope_Streaming:\n\t\tgrowing = lo.Map(req.GetSegmentIDs(), convertGrowing)\n\tcase querypb.DataScope_Historical:\n\t\tsealed = lo.Map(req.GetSegmentIDs(), convertSealed)\n\t}\n\n\tsignal := sd.distribution.RemoveDistributions(sealed, growing)\n\t// wait cleared signal\n\t<-signal\n\tif len(sealed) > 0 {\n\t\tsd.pkOracle.Remove(\n\t\t\tpkoracle.WithSegmentIDs(lo.Map(sealed, func(entry SegmentEntry, _ int) int64 { return entry.SegmentID })...),\n\t\t\tpkoracle.WithSegmentType(commonpb.SegmentState_Sealed),\n\t\t\tpkoracle.WithWorkerID(targetNodeID),\n\t\t)\n\t}\n\tif len(growing) > 0 {\n\t\tsd.pkOracle.Remove(\n\t\t\tpkoracle.WithSegmentIDs(lo.Map(growing, func(entry SegmentEntry, _ int) int64 { return entry.SegmentID })...),\n\t\t\tpkoracle.WithSegmentType(commonpb.SegmentState_Growing),\n\t\t)\n\t}\n\n\tif !force {\n\t\tworker, err := sd.workerManager.GetWorker(targetNodeID)\n\t\tif err != nil {\n\t\t\tlog.Warn(\"delegator failed to find worker\",\n\t\t\t\tzap.Error(err),\n\t\t\t)\n\t\t\treturn err\n\t\t}\n\t\treq.Base.TargetID = targetNodeID\n\t\terr = worker.ReleaseSegments(ctx, req)\n\t\tif err != nil {\n\t\t\tlog.Warn(\"worker failed to release segments\",\n\t\t\t\tzap.Error(err),\n\t\t\t)\n\t\t}\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ac688c3a8f4e844f516cac7639f1ce7e", "score": "0.4231191", "text": "func DeleteMapping(db *sql.DB, pasteID int) error {\n\t_, err := db.Query(\"DELETE FROM mapping WHERE paste_id = ?\", pasteID)\n\tif err != nil {\n\t\t// log the error\n\t\tlog.Println(\"Error deleting entry for paste_id =\", pasteID)\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "40d0b4e35762d643a120f1f50a46af01", "score": "0.4226425", "text": "func (m *UsersGroupMutation) RemovePolicyIDs(ids ...int) {\n\tif m.removedpolicies == nil {\n\t\tm.removedpolicies = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removedpolicies[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "af89b4f3549e445f5dfa6cac4195b95e", "score": "0.42237386", "text": "func (table *Table) DelRoute(key string) error {\n\ttable.Lock()\n\tdefer table.Unlock()\n\tconf := table.config.Load().(TableConfig)\n\ttoDelete := -1\n\tvar i int\n\tvar route route.Route\n\tfor i, route = range conf.routes {\n\t\tif route.Key() == key {\n\t\t\ttoDelete = i\n\t\t\tbreak\n\t\t}\n\t}\n\tif toDelete == -1 {\n\t\treturn nil\n\t}\n\n\tconf.routes = append(conf.routes[:toDelete], conf.routes[toDelete+1:]...)\n\ttable.config.Store(conf)\n\n\terr := route.Shutdown()\n\tif err != nil {\n\t\t// dest removed from routing table but still trying to connect\n\t\t// it won't get new stuff on its input though\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2c5736e9d87bc0ee9719e3acf1d38d89", "score": "0.42225912", "text": "func (m *UserMutation) RemoveProgramIDs(ids ...int) {\n\tif m.removedprograms == nil {\n\t\tm.removedprograms = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removedprograms[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "25e37dc760402c4f79ec928bbb5c3522", "score": "0.42200238", "text": "func (ns *Netstack) DelRoute(r tcpip.Route) []routes.ExtendedRoute {\n\t_ = syslog.Infof(\"deleting route %s\", r)\n\n\tnicInfoMap := ns.stack.NICInfo()\n\n\tdelRoute := func(nicInfo stack.NICInfo, r tcpip.Route) []routes.ExtendedRoute {\n\t\tifs := nicInfo.Context.(*ifState)\n\t\tifs.mu.Lock()\n\t\tdefer ifs.mu.Unlock()\n\n\t\treturn ns.delRouteLocked(r)\n\t}\n\n\tif r.NIC == 0 {\n\t\tvar routesDeleted []routes.ExtendedRoute\n\t\tfor nicid, nicInfo := range nicInfoMap {\n\t\t\tr.NIC = nicid\n\t\t\troutesDeleted = append(routesDeleted, delRoute(nicInfo, r)...)\n\t\t}\n\t\treturn routesDeleted\n\t} else {\n\t\tnicInfo, ok := nicInfoMap[r.NIC]\n\t\tif !ok {\n\t\t\treturn nil\n\t\t}\n\t\treturn delRoute(nicInfo, r)\n\t}\n}", "title": "" }, { "docid": "37cbe45d48812814a265428775606241", "score": "0.42116898", "text": "func (m *ServiceMutation) RemoveDownstreamIDs(ids ...int) {\n\tif m.removeddownstream == nil {\n\t\tm.removeddownstream = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removeddownstream[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "10bdeb59a4a5146c6fee0c6ad4f52b56", "score": "0.42067248", "text": "func (t *table) pruneRoutes(olderThan time.Duration) {\n\tvar routes []router.Route\n\n\tt.Lock()\n\n\t// search for all the routes\n\tfor _, routeList := range t.routes {\n\t\tfor _, r := range routeList {\n\t\t\t// if any route is older than\n\t\t\tif time.Since(r.updated).Seconds() > olderThan.Seconds() {\n\t\t\t\troutes = append(routes, r.route)\n\t\t\t}\n\t\t}\n\t}\n\n\tt.Unlock()\n\n\t// delete the routes we've found\n\tfor _, route := range routes {\n\t\tt.Delete(route)\n\t}\n}", "title": "" }, { "docid": "3c608a3bbd606e8d632a62c594425fa8", "score": "0.42049423", "text": "func (c *Client) RemoveMatches(keyPattern string) error {\n\treturn c.sendMessage(encodeRemoveMatches(keyPattern))\n}", "title": "" }, { "docid": "c64e66062fef4f1890199c0130c48bb3", "score": "0.41922134", "text": "func RemoveAssignment(ctx context.Context, userID int, roleID int) error {\n\terr := db.Delete(ctx, \"dm_user_role\", db.Cond(\"user_id\", userID).Cond(\"role_id\", roleID))\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "51b9fc42e5ed20011529e78120af0926", "score": "0.4192099", "text": "func (s *Ship) DelRoutes(routes ...Route) {\n\tfor _, r := range routes {\n\t\tif err := s.DelRoute(r); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "234c04524257961b56013dee87e90beb", "score": "0.41916156", "text": "func RemoveDisabledMaps() {\n\tmaps := []string{}\n\n\tif !option.Config.EnableIPv6 {\n\t\tmaps = append(maps, []string{\n\t\t\t\"cilium_ct6_global\",\n\t\t\t\"cilium_ct_any6_global\",\n\t\t\t\"cilium_lb6_reverse_nat\",\n\t\t\t\"cilium_lb6_rr_seq\",\n\t\t\t\"cilium_lb6_services\",\n\t\t\t\"cilium_proxy6\"}...)\n\t}\n\n\tif !option.Config.EnableIPv4 {\n\t\tmaps = append(maps, []string{\n\t\t\t\"cilium_ct4_global\",\n\t\t\t\"cilium_ct_any4_global\",\n\t\t\t\"cilium_lb4_reverse_nat\",\n\t\t\t\"cilium_lb4_rr_seq\",\n\t\t\t\"cilium_lb4_services\",\n\t\t\t\"cilium_proxy4\"}...)\n\t}\n\n\tfor _, m := range maps {\n\t\tp := path.Join(bpf.MapPrefixPath(), m)\n\t\tif _, err := os.Stat(p); !os.IsNotExist(err) {\n\t\t\tremoveStaleMap(p)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "ce1b3c376b1b7ebee7b418e3a6643bda", "score": "0.41882", "text": "func RemoveLedgerEntries(ctx context.Context, xbiz *XBusiness, d1, d2 *time.Time) error {\n\t// Remove the LedgerEntries and the ledgerallocation entries\n\trows, err := RRdb.Prepstmt.GetAllLedgerEntriesInRange.Query(xbiz.P.BID, d1, d2)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tvar l LedgerEntry\n\t\tReadLedgerEntries(rows, &l)\n\t\tDeleteLedgerEntry(ctx, l.LEID)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "389cfd2cf70817709c8f38db684c703e", "score": "0.41844818", "text": "func (d *RESTSteps) UnregisterRoute(agentID, varNames string) error {\n\tdestination, ok := d.bddContext.GetControllerURL(agentID)\n\tif !ok {\n\t\treturn fmt.Errorf(\" unable to find controller URL registered for agent [%s]\", agentID)\n\t}\n\n\tfor _, varName := range strings.Split(varNames, \",\") {\n\t\tbody, err := json.Marshal(registerRouteReq{ConnectionID: d.bddContext.Args[varName]})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\terr = util.SendHTTP(http.MethodDelete, destination+\"/mediator/unregister\", body, nil)\n\t\tif err != nil {\n\t\t\t// ignore error if router is not registered (code=5003)\n\t\t\tif strings.Contains(err.Error(), \"\\\"code\\\":5003\") {\n\t\t\t\tlogger.Infof(\"ignore unregister - router not registered\")\n\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\treturn fmt.Errorf(\"router unregistration : %w\", err)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0a97d950a1e9d501e941c00e492e4676", "score": "0.41797474", "text": "func (l *Limiter) RemoveHeaderEntries(header string, entriesForRemoval []string) *Limiter {\n\tl.RLock()\n\tentries, found := l.headers[header]\n\tl.RUnlock()\n\n\tif !found {\n\t\treturn l\n\t}\n\n\tfor _, toBeRemoved := range entriesForRemoval {\n\t\tentries.Invalidate(toBeRemoved)\n\t}\n\n\treturn l\n}", "title": "" }, { "docid": "af7f097c129526dc7b20a67a2487286d", "score": "0.41785923", "text": "func (m *DrugMutation) RemoveRequisitionIDs(ids ...int) {\n\tif m.removedrequisitions == nil {\n\t\tm.removedrequisitions = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removedrequisitions[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "374848cd4d8058aeeaf082b7a7c13b52", "score": "0.4176229", "text": "func (m *DoctorMutation) RemoveDoctorToDiagnosiIDs(ids ...int) {\n\tif m.removed_DoctorToDiagnosis == nil {\n\t\tm.removed_DoctorToDiagnosis = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removed_DoctorToDiagnosis[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "1f5c54930d1424858ed408a4a36d710b", "score": "0.4176055", "text": "func (c *RouteClient) ReplaceDestinations(ctx context.Context, guid string, dest []*resource.RouteDestinationInsertOrReplace) (*resource.RouteDestinations, error) {\n\tdestinations := &resource.RouteDestinationsInsertOrReplace{\n\t\tDestinations: dest,\n\t}\n\tvar r resource.RouteDestinations\n\t_, err := c.client.patch(ctx, path.Format(\"/v3/routes/%s/destinations\", guid), destinations, &r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &r, nil\n}", "title": "" }, { "docid": "2094cdc201e89f65376ba0a9adab4e70", "score": "0.41709185", "text": "func (s *CanaryPromote) UpdateRoutes(app1 plugin_models.GetAppModel, app2 plugin_models.GetAppModel) (err error) {\n\tvar (\n\t\toutput []string\n\t\tcliArgs []string\n\t)\n\tfor _, route := range app1.Routes {\n\n\t\tfmt.Printf(\"Host: %s, Domain: %s\\n \", route.Host, route.Domain.Name)\n\n\t\tcliArgs = []string{\"map-route\", app2.Name, route.Domain.Name, \"-n\", route.Host}\n\n\t\toutput, err = s.args.Conn.CliCommand(cliArgs...)\n\t\tfmt.Printf(\"Add Routes output: %+v\\n\", output)\n\t}\n\n\tfor _, route := range app2.Routes {\n\t\tfmt.Printf(\"Host: %s, Domain: %s\\n \", route.Host, route.Domain.Name)\n\t\tcliArgs = []string{\"delete-route\", route.Domain.Name, \"-n\", route.Host, \"-f\"}\n\n\t\toutput, err = s.args.Conn.CliCommand(cliArgs...)\n\t\tfmt.Printf(\"Delete Routes output: %+v\\n\", output)\n\t}\n\treturn\n}", "title": "" }, { "docid": "ae2cdec66336400eb5c4a7e5f1569460", "score": "0.4169522", "text": "func (m *AbilitypatientrightsMutation) RemoveAbilitypatientrightsPatientrightstypeIDs(ids ...int) {\n\tif m.removed_AbilitypatientrightsPatientrightstype == nil {\n\t\tm.removed_AbilitypatientrightsPatientrightstype = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removed_AbilitypatientrightsPatientrightstype[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "0c4f4abb750015249548afd3c53067b9", "score": "0.4148991", "text": "func (client *Client) DeleteCustomRoutingEndpointTrafficPolicies(request *DeleteCustomRoutingEndpointTrafficPoliciesRequest) (_result *DeleteCustomRoutingEndpointTrafficPoliciesResponse, _err error) {\n\truntime := &util.RuntimeOptions{}\n\t_result = &DeleteCustomRoutingEndpointTrafficPoliciesResponse{}\n\t_body, _err := client.DeleteCustomRoutingEndpointTrafficPoliciesWithOptions(request, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_result = _body\n\treturn _result, _err\n}", "title": "" }, { "docid": "78d3558c3595b540886db59d1f382a69", "score": "0.41480955", "text": "func (r *RouteTable) RemoveInstalledRoute(key stack.UnicastSourceAndMulticastDestination) bool {\n\tr.installedMu.Lock()\n\tdefer r.installedMu.Unlock()\n\n\tif _, ok := r.installedRoutes[key]; ok {\n\t\tdelete(r.installedRoutes, key)\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f2560d599b979a21c756dc8198cc4349", "score": "0.41478318", "text": "func (client VirtualNetworkClient) CreateDrgRouteDistribution(ctx context.Context, request CreateDrgRouteDistributionRequest) (response CreateDrgRouteDistributionResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\n\tif !(request.OpcRetryToken != nil && *request.OpcRetryToken != \"\") {\n\t\trequest.OpcRetryToken = common.String(common.RetryToken())\n\t}\n\n\tociResponse, err = common.Retry(ctx, request, client.createDrgRouteDistribution, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = CreateDrgRouteDistributionResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = CreateDrgRouteDistributionResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(CreateDrgRouteDistributionResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into CreateDrgRouteDistributionResponse\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "b937917e5d2bf025919f9e31fdb90b89", "score": "0.41442925", "text": "func (table *RoutingTable) pruneEntries(defaultTTL time.Duration) {\n\ttable.Lock()\n\tdefer table.Unlock()\n\tfor routeKey, entry := range table.entries {\n\t\tremoved := entry.pruneBackends(defaultTTL)\n\t\tif len(removed) > 0 && table.listener != nil {\n\t\t\tfor _, backend := range removed {\n\t\t\t\ttable.updateRouter(routeUpdate.Remove, routeKey.Port, backend.Address, backend.Port)\n\t\t\t}\n\t\t}\n\t\tif len(entry.backends) == 0 {\n\t\t\tdelete(table.entries, routeKey)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e0372623749a44b515a47a74d95fbf59", "score": "0.41387078", "text": "func routeMayBeRemoved(route *vppcalls.RouteDetails) bool {\n\tif route.Route.Type == l3.StaticRoutes_Route_DROP {\n\t\treturn false\n\t}\n\tif route.Meta.IsIPv6 && net.ParseIP(route.Route.DstIpAddr).IsLinkLocalUnicast() {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "218659ff26669cba220b6b6074c8a89a", "score": "0.41244337", "text": "func removeSanctions(slice []roles.Sanction, s int) []roles.Sanction {\n\tvar output []roles.Sanction\n\tfor i, v := range slice {\n\t\tif i != s {\n\t\t\toutput = append(output, v)\n\t\t}\n\t}\n\treturn output\n}", "title": "" }, { "docid": "57443b04243ff850ccb24635f09e2f7e", "score": "0.4121437", "text": "func (a *Adapter) RemovePolicies(sec string, ptype string, rules [][]string) (err error) {\n\treturn\n}", "title": "" }, { "docid": "cc542d4ad4e962d37db4758d9c8b5add", "score": "0.41199583", "text": "func (pipu *PositionInPharmacistUpdate) RemovePharmacistIDs(ids ...int) *PositionInPharmacistUpdate {\n\tpipu.mutation.RemovePharmacistIDs(ids...)\n\treturn pipu\n}", "title": "" }, { "docid": "575c39d58ef64818be59321b857d6ece", "score": "0.41139725", "text": "func (o *Feature) RemoveSrcfeatureFeaturelocs(exec boil.Executor, related ...*Featureloc) error {\n\tvar err error\n\tfor _, rel := range related {\n\t\trel.SrcfeatureID.Valid = false\n\t\tif rel.R != nil {\n\t\t\trel.R.Srcfeature = nil\n\t\t}\n\t\tif err = rel.Update(exec, \"srcfeature_id\"); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif o.R == nil {\n\t\treturn nil\n\t}\n\n\tfor _, rel := range related {\n\t\tfor i, ri := range o.R.SrcfeatureFeaturelocs {\n\t\t\tif rel != ri {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tln := len(o.R.SrcfeatureFeaturelocs)\n\t\t\tif ln > 1 && i < ln-1 {\n\t\t\t\to.R.SrcfeatureFeaturelocs[i] = o.R.SrcfeatureFeaturelocs[ln-1]\n\t\t\t}\n\t\t\to.R.SrcfeatureFeaturelocs = o.R.SrcfeatureFeaturelocs[:ln-1]\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "452667c78b659a689c6f59a669eff064", "score": "0.411106", "text": "func DeleteRouterViaRoute(iRoute []byte) (err error) {\n\tvar has bool\n\tvar _Router = &Router{Route: iRoute}\n\tif has, err = Engine.Get(_Router); (has == true) && (err == nil) {\n\t\tif row, err := Engine.Where(\"route = ?\", iRoute).Delete(new(Router)); (err != nil) || (row <= 0) {\n\t\t\treturn err\n\t\t} else {\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "bf51b84117d89705876c7898ba3b53bb", "score": "0.40973178", "text": "func (m *PatientrecordMutation) RemoveTreatmentIDs(ids ...int) {\n\tif m.removedtreatment == nil {\n\t\tm.removedtreatment = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removedtreatment[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "3c2a910f1d0abc8e48f6276b6283e81f", "score": "0.4091394", "text": "func MalwareRemovalGenerate(ctx context.Context, queryContext table.QueryContext) ([]map[string]string, error) {\n\tvar filePath string\n\tvar dirPath string\n\tvar fileHash string\n\tvar processID string\n\tvar statusBool bool\n\tvar status error\n\n\tif len(queryContext.Constraints[\"pid\"].Constraints) == 1 {\n\t\tprocessID = queryContext.Constraints[\"pid\"].Constraints[0].Expression\n\t\tstatusBool, status = terminateProcess(processID)\n\t} else if len(queryContext.Constraints[\"file_path\"].Constraints) == 1 {\n\t\tfilePath = queryContext.Constraints[\"file_path\"].Constraints[0].Expression\n\t\tstatusBool, status = deleteFile(filePath)\n\t} else if len(queryContext.Constraints[\"dir_path\"].Constraints) == 1 && len(queryContext.Constraints[\"file_hash\"].Constraints) == 0 {\n\t\tdirPath = queryContext.Constraints[\"dir_path\"].Constraints[0].Expression\n\t\tstatusBool, status = deleteDirectory(dirPath)\n\t} else if len(queryContext.Constraints[\"dir_path\"].Constraints) == 1 && len(queryContext.Constraints[\"file_hash\"].Constraints) == 1 {\n\t\tdirPath = queryContext.Constraints[\"dir_path\"].Constraints[0].Expression\n\t\tfileHash = queryContext.Constraints[\"file_hash\"].Constraints[0].Expression\n\t\tstatusBool, status = deleteFileHash(fileHash, dirPath)\n\t} else {\n\t\tstatus = errors.New(\"Please specify file_path, dir_path, file_hash, or pid\")\n\t}\n\n\tif status == nil && statusBool == true {\n\t\tstatus = errors.New(\"sucess\")\n\t}\n\n\treturn []map[string]string{\n\t\t{\n\t\t\t\"status\": status.Error(),\n\t\t\t\"status_bool\": strconv.FormatBool(statusBool),\n\t\t\t\"pid\": processID,\n\t\t\t\"file_path\": filePath,\n\t\t\t\"dir_path\": dirPath,\n\t\t\t\"file_hash\": fileHash,\n\t\t},\n\t}, nil\n\n}", "title": "" }, { "docid": "8e4b616b74eba256d131575e9681b5b7", "score": "0.40845728", "text": "func (dsl *DeleteDSL) LinuxRoute(routeName string) linuxclient.DeleteDSL {\n\tdsl.parent.txn.Delete(linuxL3.StaticRouteKey(routeName))\n\treturn dsl\n}", "title": "" }, { "docid": "8be7ef94a31961721dabf40ad0396049", "score": "0.4081133", "text": "func (r *Residence) Delete() {\n\tfor _, h := range r.Targets {\n\t\tr.M.Delete(h)\n\t}\n\tfor _, s := range r.out {\n\t\tr.M.Delete(s)\n\t}\n\tr.M.Delete(r)\n}", "title": "" }, { "docid": "71a27e8fdaf7d66040497c7b25a66d23", "score": "0.40784153", "text": "func (o *State) RemoveStatefpCongressionalDistricts(ctx context.Context, exec boil.ContextExecutor, related ...*CongressionalDistrict) error {\n\tvar err error\n\tfor _, rel := range related {\n\t\tqueries.SetScanner(&rel.Statefp, nil)\n\t\tif rel.R != nil {\n\t\t\trel.R.Statefp = nil\n\t\t}\n\t\tif _, err = rel.Update(ctx, exec, boil.Whitelist(\"statefp\")); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif o.R == nil {\n\t\treturn nil\n\t}\n\n\tfor _, rel := range related {\n\t\tfor i, ri := range o.R.StatefpCongressionalDistricts {\n\t\t\tif rel != ri {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tln := len(o.R.StatefpCongressionalDistricts)\n\t\t\tif ln > 1 && i < ln-1 {\n\t\t\t\to.R.StatefpCongressionalDistricts[i] = o.R.StatefpCongressionalDistricts[ln-1]\n\t\t\t}\n\t\t\to.R.StatefpCongressionalDistricts = o.R.StatefpCongressionalDistricts[:ln-1]\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a6641c0e5919e2656117e63246690f67", "score": "0.40762222", "text": "func (m *AccountMutation) RemoveOutboundIDs(ids ...uuid.UUID) {\n\tif m.removedoutbounds == nil {\n\t\tm.removedoutbounds = make(map[uuid.UUID]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removedoutbounds[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "bdda97227f569f6e27d3d03cdf451868", "score": "0.4069906", "text": "func (pipu *PositionInPharmacistUpdate) RemovePharmacist(p ...*Pharmacist) *PositionInPharmacistUpdate {\n\tids := make([]int, len(p))\n\tfor i := range p {\n\t\tids[i] = p[i].ID\n\t}\n\treturn pipu.RemovePharmacistIDs(ids...)\n}", "title": "" }, { "docid": "5eeea68cb33edf53b63d2ff8b07b77af", "score": "0.40639365", "text": "func (o HttpRouteHeaderModifierOutput) Remove() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v HttpRouteHeaderModifier) []string { return v.Remove }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "57ae3700f1b97e9b2ce1f8a0c197b566", "score": "0.40634024", "text": "func (m *LinkMutation) RemovePortIDs(ids ...int) {\n\tif m.removedports == nil {\n\t\tm.removedports = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removedports[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "be14d39f7678d1e0f30d2af55cd0c4dc", "score": "0.40622926", "text": "func (dru *DataRoomUpdate) RemoveReserfIDs(ids ...int) *DataRoomUpdate {\n\tdru.mutation.RemoveReserfIDs(ids...)\n\treturn dru\n}", "title": "" }, { "docid": "35eef85e0800e279b4069e4643307a20", "score": "0.40567127", "text": "func (r *RouteTable) RemoveAllInstalledRoutes() {\n\tr.installedMu.Lock()\n\tdefer r.installedMu.Unlock()\n\n\tfor key := range r.installedRoutes {\n\t\tdelete(r.installedRoutes, key)\n\t}\n}", "title": "" }, { "docid": "79fa3ad64f9667e13cb4c37f1fed6b09", "score": "0.40477523", "text": "func (o RuleGroupRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementFieldToMatchHeaderMatchPatternOutput) ExcludedHeaders() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementFieldToMatchHeaderMatchPattern) []string {\n\t\treturn v.ExcludedHeaders\n\t}).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "444fe0910f943411430e4718b47bd7ca", "score": "0.40456975", "text": "func (o *DestinationDetail) RemoveDestination(ctx context.Context, exec boil.ContextExecutor, related *Destination) error {\n\tvar err error\n\n\tqueries.SetScanner(&o.DestinationID, nil)\n\tif _, err = o.Update(ctx, exec, boil.Whitelist(\"destination_id\")); err != nil {\n\t\treturn errors.Wrap(err, \"failed to update local table\")\n\t}\n\n\tif o.R != nil {\n\t\to.R.Destination = nil\n\t}\n\tif related == nil || related.R == nil {\n\t\treturn nil\n\t}\n\n\tfor i, ri := range related.R.DestinationDetails {\n\t\tif queries.Equal(o.DestinationID, ri.DestinationID) {\n\t\t\tcontinue\n\t\t}\n\n\t\tln := len(related.R.DestinationDetails)\n\t\tif ln > 1 && i < ln-1 {\n\t\t\trelated.R.DestinationDetails[i] = related.R.DestinationDetails[ln-1]\n\t\t}\n\t\trelated.R.DestinationDetails = related.R.DestinationDetails[:ln-1]\n\t\tbreak\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d79d0da073ddfe6e9870e15d370f88c8", "score": "0.40452495", "text": "func (connector *DbConnector) RemovePatternTriggerIDs(pattern string) error {\n\tc := *connector.client\n\t_, err := c.Del(connector.context, patternTriggersKey(pattern)).Result()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed delete pattern-triggers: %s, error: %s\", pattern, err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "780048eef7b7ab5dcf1c4f5c6cc4655f", "score": "0.40395084", "text": "func (d *DomainRealm) deleteMapping(domain, realm string) {\n\tdelete(*d, domain)\n}", "title": "" }, { "docid": "780048eef7b7ab5dcf1c4f5c6cc4655f", "score": "0.40395084", "text": "func (d *DomainRealm) deleteMapping(domain, realm string) {\n\tdelete(*d, domain)\n}", "title": "" }, { "docid": "e0e83baa4ebcfa4de1cc3501f3f223a6", "score": "0.40330288", "text": "func (strDB *StrDB) DeleteRemoveDistrict(c *gin.Context) {\n\tvar (\n\t\tdistrict models.Districts\n\t\tresult gin.H\n\t)\n\n\tid := c.Query(\"id\")\n\tstrDB.DB.Delete(&district, id)\n\tresult = gin.H{\n\t\t\"Message\": \"Success delete district\",\n\t}\n\tc.JSON(http.StatusOK, result)\n}", "title": "" }, { "docid": "5c3d089a3bedc527d3292e7dff025408", "score": "0.402907", "text": "func GenerateDeleteRouteInput(cr *svcapitypes.Route) *svcsdk.DeleteRouteInput {\n\tres := preGenerateDeleteRouteInput(cr, &svcsdk.DeleteRouteInput{})\n\n\tif cr.Status.AtProvider.RouteID != nil {\n\t\tres.SetRouteId(*cr.Status.AtProvider.RouteID)\n\t}\n\n\treturn postGenerateDeleteRouteInput(cr, res)\n}", "title": "" }, { "docid": "ac2b9609375928a5f02ff10bbda82659", "score": "0.40278557", "text": "func (m *RisksMutation) RemoveAntenatalinformationIDs(ids ...int) {\n\tif m.removed_Antenatalinformation == nil {\n\t\tm.removed_Antenatalinformation = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removed_Antenatalinformation[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "1b64a9a1115d09c63fc7b5f51517d50f", "score": "0.40160432", "text": "func (o RuleGroupRuleStatementRateBasedStatementScopeDownStatementAndStatementStatementSqliMatchStatementFieldToMatchHeaderMatchPatternOutput) ExcludedHeaders() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementRateBasedStatementScopeDownStatementAndStatementStatementSqliMatchStatementFieldToMatchHeaderMatchPattern) []string {\n\t\treturn v.ExcludedHeaders\n\t}).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "edc7d87eb104c6a8ee2f44262c9558dc", "score": "0.40152743", "text": "func (c *jsiiProxy_CfnApiMappingV2) ApplyRemovalPolicy(policy awscdk.RemovalPolicy, options *awscdk.RemovalPolicyOptions) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"applyRemovalPolicy\",\n\t\t[]interface{}{policy, options},\n\t)\n}", "title": "" }, { "docid": "132123fbca2ebb644a78727cfef5caf1", "score": "0.40148455", "text": "func (m *TypetreatmentMutation) RemoveTreatmentIDs(ids ...int) {\n\tif m.removedtreatment == nil {\n\t\tm.removedtreatment = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removedtreatment[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "bb4b5754468985c6138bca159d7c6a8b", "score": "0.40089616", "text": "func (tp *TransactionPool) removeSiafundOutputs(t types.Transaction) {\n\tfor i, _ := range t.SiafundOutputs {\n\t\t// Sanity check - the output should exist in the unconfirmed set as\n\t\t// there is no dependent transaction which could have spent the output.\n\t\tsfoid := t.SiafundOutputID(i)\n\t\tif build.DEBUG {\n\t\t\t_, exists := tp.siafundOutputs[sfoid]\n\t\t\tif !exists {\n\t\t\t\tpanic(\"trying to remove nonexisting siafund output from unconfirmed set\")\n\t\t\t}\n\t\t}\n\n\t\tdelete(tp.siafundOutputs, sfoid)\n\t}\n}", "title": "" }, { "docid": "cc824ef28217ee39087339503a43838e", "score": "0.4005754", "text": "func (client VirtualNetworkClient) removeAdditionalRouteRules(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodPost, \"/routeTables/{rtId}/actions/removeAdditionalRouteRules\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response RemoveAdditionalRouteRulesResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "baba090046fe4c32dbff0f13afb00eea", "score": "0.399874", "text": "func (oc *Controller) cleanupDGP(nodes *kapi.NodeList) error {\n\t// remove dnat_snat entries as well as LRPs\n\tfor _, node := range nodes.Items {\n\t\toc.delPbrAndNatRules(node.Name, []string{types.InterNodePolicyPriority, types.MGMTPortPolicyPriority})\n\t}\n\t// remove SBDB MAC bindings for DGP\n\tfor _, ip := range []string{types.V4NodeLocalNATSubnetNextHop, types.V6NodeLocalNATSubnetNextHop} {\n\t\topModels := []libovsdbops.OperationModel{\n\t\t\t{\n\t\t\t\tModel: &sbdb.MACBinding{\n\t\t\t\t\tIP: ip,\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t\tif err := oc.modelClient.WithClient(oc.sbClient).Delete(opModels...); err != nil {\n\t\t\treturn fmt.Errorf(\"unable to remove mac_binding for DGP, err: %v\", err)\n\t\t}\n\t}\n\t// remove node local switch\n\topModels := []libovsdbops.OperationModel{\n\t\t{\n\t\t\tModelPredicate: func(ls *nbdb.LogicalSwitch) bool { return ls.Name == types.NodeLocalSwitch },\n\t\t\tExistingResult: &[]nbdb.LogicalSwitch{},\n\t\t},\n\t}\n\tif err := oc.modelClient.Delete(opModels...); err != nil {\n\t\treturn fmt.Errorf(\"unable to remove node local switch, err: %v\", err)\n\t}\n\n\t// remove lrp on ovn_cluster_router. Will also remove gateway chassis.\n\tdgpName := types.RouterToSwitchPrefix + types.NodeLocalSwitch\n\tlogicalRouter := nbdb.LogicalRouter{}\n\tlogicalRouterPort := nbdb.LogicalRouterPort{\n\t\tName: dgpName,\n\t}\n\topModels = []libovsdbops.OperationModel{\n\t\t{\n\t\t\tModel: &logicalRouterPort,\n\t\t\tDoAfter: func() {\n\t\t\t\tif logicalRouterPort.UUID != \"\" {\n\t\t\t\t\tlogicalRouter.Ports = []string{logicalRouterPort.UUID}\n\t\t\t\t}\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tModel: &logicalRouter,\n\t\t\tModelPredicate: func(lr *nbdb.LogicalRouter) bool {\n\t\t\t\treturn lr.Name == types.OVNClusterRouter\n\t\t\t},\n\t\t\tOnModelMutations: []interface{}{\n\t\t\t\t&logicalRouter.Ports,\n\t\t\t},\n\t\t},\n\t}\n\tif err := oc.modelClient.Delete(opModels...); err != nil {\n\t\treturn fmt.Errorf(\"unable to delete DGP LRP, error: %v\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "394eed67a8a95d595807929df8f90dcf", "score": "0.3990429", "text": "func DeleteRecipientsFromMailinglist(w http.ResponseWriter, r *http.Request) {\n\tdb := database.DbConn\n\trepository := Repository{Conn: db}\n\tmuxVar := mux.Vars(r)\n\tstrID := muxVar[\"id\"]\n\tintID, err := helpers.ParseInt64(strID)\n\tif err != nil {\n\t\tlog.Printf(\"could not parse id: %v\", err)\n\t\thelpers.WriteErrorJSON(w, http.StatusInternalServerError, \"could not parse id\")\n\t\treturn\n\t}\n\n\trecipientIDS := make([]int64, 0)\n\terr = json.NewDecoder(r.Body).Decode(&recipientIDS)\n\tif err != nil {\n\t\tlog.Print(err)\n\t\thelpers.WriteErrorJSON(w, http.StatusInternalServerError, \"could not decode request body\")\n\t\treturn\n\t}\n\n\tdeletedRows, err := repository.DeleteRecipientsFromMailingList(intID, recipientIDS)\n\tif err != nil {\n\t\tlog.Printf(\"could not delete recipient from mailing list: %v\", err)\n\t\thelpers.WriteErrorJSON(w, http.StatusInternalServerError, \"could not delete recipient from mailing list:\")\n\t\treturn\n\t}\n\n\trecipientStr := \"recipients\"\n\n\tif deletedRows <= 1 {\n\t\trecipientStr = \"recipient\"\n\t}\n\n\tlog.Printf(\"deleted %d %s\", deletedRows, recipientStr)\n\thelpers.WriteJSON(w, http.StatusOK, nil)\n}", "title": "" }, { "docid": "56fb9e5555787c5abb08f1ace1dfbed1", "score": "0.3986954", "text": "func Remove(c *gophercloud.ServiceClient, id string, opts OptsBuilder) (r RemoveResult) {\n\tb, err := opts.ToExtraRoutesUpdateMap()\n\tif err != nil {\n\t\tr.Err = err\n\t\treturn\n\t}\n\tresp, err := c.Put(removeExtraRoutesURL(c, id), b, &r.Body, &gophercloud.RequestOpts{\n\t\tOkCodes: []int{200},\n\t})\n\t_, r.Header, r.Err = gophercloud.ParseResponse(resp, err)\n\treturn\n}", "title": "" }, { "docid": "c09e643eb3fc77c2ecc4f7c9756c1576", "score": "0.39866704", "text": "func (g *TrafficRouterPluginRPC) RemoveManagedRoutes(rollout *v1alpha1.Rollout) types.RpcError {\n\tvar resp types.RpcError\n\tvar args interface{} = RemoveManagedRoutesArgs{\n\t\tRollout: *rollout,\n\t}\n\terr := g.client.Call(\"Plugin.RemoveManagedRoutes\", &args, &resp)\n\tif err != nil {\n\t\treturn types.RpcError{ErrorString: fmt.Sprintf(\"RemoveManagedRoutes rpc call error: %s\", err)}\n\t}\n\treturn resp\n}", "title": "" }, { "docid": "1d15990d26af375a5bceac57f0a82b73", "score": "0.39860016", "text": "func (ds *DoitServer) RemoveGroupDomains(d *Domain, id int, domains ...Domain) error {\n\tdomain, err := ds.GetDomain(d.ID)\n\tif err != nil {\n\t\treturn err\n\t}\n\tg, err := ds.GetGroup(domain, id)\n\tif err != nil {\n\t\treturn err\n\t}\n\tgormErr := ds.Store.Conn.Model(&g).Association(\"Domains\").Delete(&domains)\n\tif gormErr != nil {\n\t\treturn gormErr.Error\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5e272ad9f870b20132652c9ea900e0ce", "score": "0.39851338", "text": "func (c *RouteClient) RemoveDestination(ctx context.Context, guid, destinationGUID string) error {\n\t_, err := c.client.delete(ctx, path.Format(\"/v3/routes/%s/destinations/%s\", guid, destinationGUID))\n\treturn err\n}", "title": "" }, { "docid": "0307a1b790dbc637310262671e033203", "score": "0.3983075", "text": "func (_Stakingbindings *StakingbindingsSession) RewardsDistribution() (common.Address, error) {\n\treturn _Stakingbindings.Contract.RewardsDistribution(&_Stakingbindings.CallOpts)\n}", "title": "" }, { "docid": "f6f933097b08f92bffb45765390934e6", "score": "0.3982715", "text": "func (su *ServiceUpdate) RemoveDownstreamIDs(ids ...string) *ServiceUpdate {\n\tif su.removedDownstream == nil {\n\t\tsu.removedDownstream = make(map[string]struct{})\n\t}\n\tfor i := range ids {\n\t\tsu.removedDownstream[ids[i]] = struct{}{}\n\t}\n\treturn su\n}", "title": "" }, { "docid": "7b5887bfa611a624d3870c526109c33b", "score": "0.39781842", "text": "func (g *Graph) RemoveRedundantEdges() {\n\t// Walk the nodes and outgoing edges in reverse order to prefer\n\t// removing edges with the lowest weight.\n\tfor i := len(g.Nodes); i > 0; i-- {\n\t\tn := g.Nodes[i-1]\n\t\tin := n.In.Sort()\n\t\tfor j := len(in); j > 0; j-- {\n\t\t\te := in[j-1]\n\t\t\tif !e.Residual {\n\t\t\t\t// Do not remove edges heavier than a non-residual edge, to\n\t\t\t\t// avoid potential confusion.\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tif isRedundantEdge(e) {\n\t\t\t\tdelete(e.Src.Out, e.Dest)\n\t\t\t\tdelete(e.Dest.In, e.Src)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c06a83b0c4b98a6b17186d6a39d63c12", "score": "0.39768696", "text": "func (m *PersonnelMutation) RemoveBonediseaseIDs(ids ...int) {\n\tif m.removed_Bonedisease == nil {\n\t\tm.removed_Bonedisease = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removed_Bonedisease[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "00c9d773d723089edce38a20592adda2", "score": "0.3976802", "text": "func (o RuleGroupRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementSqliMatchStatementFieldToMatchHeaderMatchPatternOutput) ExcludedHeaders() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v RuleGroupRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementSqliMatchStatementFieldToMatchHeaderMatchPattern) []string {\n\t\treturn v.ExcludedHeaders\n\t}).(pulumi.StringArrayOutput)\n}", "title": "" } ]
d24a660ea5c61d1eee85c377bc67141a
WithEventsEnabled whether to emit download events (defaults to false).
[ { "docid": "4d64a0da00a19176a5b5f3dd94f6ddf4", "score": "0.60472584", "text": "func (p SetDownloadBehaviorParams) WithEventsEnabled(eventsEnabled bool) *SetDownloadBehaviorParams {\n\tp.EventsEnabled = eventsEnabled\n\treturn &p\n}", "title": "" } ]
[ { "docid": "9532ba5fdda0c3550cde1c761d2527ee", "score": "0.571727", "text": "func EnableBlockEvents(enable bool) {\n\tenableBlockEvents = enable\n}", "title": "" }, { "docid": "8ff4d94d5eb7b01b5619f7e75140f8c6", "score": "0.49075702", "text": "func (ad *ArchiveDownloader) DownloadEvents() error {\n\tstart := time.Now()\n\n\tad.logger.Info(\"downloading events...\")\n\n\tvar archFiles []*common.ArchiveFile\n\tif !ad.overrideAllFiles {\n\t\tad.logger.Debug(\"reading stored archive files from the database...\")\n\t\terr := ad.engine.Find(&archFiles)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tad.logger.Debug(\"stored archive files read from the database\", \"archiveFiles\", len(archFiles))\n\t}\n\n\turls := ad.buildUrlsDownload(archFiles, ad.startDate, ad.stopDate)\n\tvar downloadUrls = make(chan *common.ArchiveFile)\n\tvar done = make(chan bool)\n\twg := sync.WaitGroup{}\n\n\t// start workers\n\tfor i := 0; i < runtime.NumCPU(); i++ {\n\t\tad.spawnWorker(i, &wg, downloadUrls, done)\n\t}\n\n\tgo func() {\n\t\ti := 0\n\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-ad.doneChan:\n\t\t\t\tad.logger.Debug(\"closing down gracefully, cancelled by parent\")\n\t\t\t\tclose(done)\n\t\t\t\treturn\n\t\t\tdefault:\n\t\t\t\tif i == len(urls) {\n\t\t\t\t\tclose(done)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tdownloadUrls <- urls[i]\n\t\t\t\ti++\n\t\t\t}\n\t\t}\n\t}()\n\n\tdefer close(downloadUrls)\n\n\t// wait for all workers to complete\n\twg.Wait()\n\n\tad.logger.Info(\"events downloaded and filtered\", \"eventCount\", eventCount, \"fileErrors\", len(filesWithErrors), \"took\", time.Since(start))\n\tif len(filesWithErrors) > 0 {\n\t\tad.logger.Debug(\"failed downloads of dates\", \"dates\", strings.Join(filesWithErrors, \",\"))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "07b98ae8c1e3c4ed69cb2fa3e77d3fce", "score": "0.47850326", "text": "func WithBlockEvents() options.Opt {\n\treturn func(p options.Params) {\n\t\tif setter, ok := p.(connectionProviderAndInterestsSetter); ok {\n\t\t\tsetter.SetConnectionProviderAndInterests(ehConnProvider, blockInterests, true)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d75c83272dbeb941285ce0d410a6f344", "score": "0.4627679", "text": "func WithMessageEvents(events ...event) Option {\n\treturn func(h *Handler) {\n\t\tfor _, e := range events {\n\t\t\tswitch e {\n\t\t\tcase ReadEvents:\n\t\t\t\th.readEvent = true\n\t\t\tcase WriteEvents:\n\t\t\t\th.writeEvent = true\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3f2ba5b5df0c81d998bcf28f50726993", "score": "0.46260545", "text": "func (protocol *PageProtocol) SetLifecycleEventsEnabled(\n\tparams *page.SetLifecycleEventsEnabledParams,\n) <-chan *page.SetLifecycleEventsEnabledResult {\n\tresultChan := make(chan *page.SetLifecycleEventsEnabledResult)\n\tcommand := NewCommand(protocol.Socket, \"Page.setLifecycleEventsEnabled\", params)\n\tresult := &page.SetLifecycleEventsEnabledResult{}\n\n\tgo func() {\n\t\tresponse := <-protocol.Socket.SendCommand(command)\n\t\tif nil != response.Error && 0 != response.Error.Code {\n\t\t\tresult.Err = response.Error\n\t\t}\n\t\tresultChan <- result\n\t\tclose(resultChan)\n\t}()\n\n\treturn resultChan\n}", "title": "" }, { "docid": "2370e1491fd6eed9aed256218be869a0", "score": "0.4614263", "text": "func WriteEvents(f mb.EventsFetcher, t testing.TB) error {\n\treturn WriteEventsCond(f, t, nil)\n\n}", "title": "" }, { "docid": "b3feefe5c4831911c99296dd36687697", "score": "0.4601431", "text": "func (q Quiet) OnDownloadEvent(m *spec.Measurement) error {\n\treturn nil\n}", "title": "" }, { "docid": "48ff77dcb29a9c9e2761b463a6ffca05", "score": "0.45271567", "text": "func (o KeycloakRealmSpecRealmOutput) EventsEnabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v KeycloakRealmSpecRealm) *bool { return v.EventsEnabled }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "05990c38a361fb8a55eb9345930bae01", "score": "0.44878146", "text": "func (r *AwsLambdaFunctionTracingRule) Enabled() bool {\n\treturn true\n}", "title": "" }, { "docid": "bf3f2f14136fa3a6c43c262d4f55f839", "score": "0.44447744", "text": "func (o *StorageNetAppBaseDiskAllOf) HasEvents() bool {\n\tif o != nil && o.Events != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "bf3154fc422a8ac546f99dd438bf3ade", "score": "0.44413027", "text": "func (m *SharingLink) SetPreventsDownload(value *bool)() {\n m.preventsDownload = value\n}", "title": "" }, { "docid": "db6e9c0bbe4f52e10c371206029efbff", "score": "0.44208804", "text": "func EnableTracing(enabled bool) {\n\ttracingEnabled = enabled\n}", "title": "" }, { "docid": "7a034b29cffcc544a9f85bd1a78b5a49", "score": "0.43914092", "text": "func (this *RangerAppFunctionDesc) Set_has_events( value bool) {\n this.has_events = value \n}", "title": "" }, { "docid": "41865b22ea9f80b4a44bedff92eff6f3", "score": "0.43778646", "text": "func LinkingEnabled(o *Options) {\n\to.LinkingEnabled = true\n}", "title": "" }, { "docid": "b07b5683d54ce72eda7f7eb6f16323a3", "score": "0.436521", "text": "func (pt *ProvenTransaction) GetWithEvents() bool {\r\n\tif !pt.proven {\r\n\t\tpanic(\"not valid proven transaction\")\r\n\t}\r\n\treturn pt.withEvents\r\n}", "title": "" }, { "docid": "1d46f01383bbf0f6448ca8b143e0a87f", "score": "0.4363739", "text": "func (c *Client) EnableDumpAllWithoutResponseBody() *Client {\n\to := c.getDumpOptions()\n\to.ResponseBody = false\n\tc.EnableDumpAll()\n\treturn c\n}", "title": "" }, { "docid": "ceb0adc1b653a3090482d47b50085d51", "score": "0.43565667", "text": "func setOutputEnabled(enabled bool) {\n\toutputEnabled = enabled\n}", "title": "" }, { "docid": "2b0bffc5cb7ef92e9d40032a9f971125", "score": "0.43531975", "text": "func (c *Client) EnableDumpAllWithoutResponse() *Client {\n\to := c.getDumpOptions()\n\to.ResponseBody = false\n\to.ResponseHeader = false\n\tc.EnableDumpAll()\n\treturn c\n}", "title": "" }, { "docid": "4612d66d2a808755a4b81a0853469502", "score": "0.43361947", "text": "func (this *RangerAppClassDesc) Set_has_events( value bool) {\n this.has_events = value \n}", "title": "" }, { "docid": "e0a8190f37529c41c2ab533e9f22eee8", "score": "0.43246228", "text": "func (o *DataSource) SetEnabled(v bool) {\n\to.Enabled = v\n}", "title": "" }, { "docid": "7720ede7930ae195e076d8bbea365ae1", "score": "0.43163928", "text": "func WithTelemetryDisabled() ClientOption {\n\treturn withTelemetryDisabled{}\n}", "title": "" }, { "docid": "ee2fa7bd4d858757b419995e2eea43e6", "score": "0.4308774", "text": "func WithEnabled(enabled bool) Option {\n\treturn func(c *cdiHandler) {\n\t\tc.enabled = enabled\n\t}\n}", "title": "" }, { "docid": "2ce44ecc4d6a5f2d903f5a34071fd83c", "score": "0.43072385", "text": "func (o KeycloakRealmSpecRealmPtrOutput) EventsEnabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *KeycloakRealmSpecRealm) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.EventsEnabled\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "1c13411488dabf520ed0a8e28c25fb82", "score": "0.43051654", "text": "func (o GetListenersListenerOutput) GzipEnabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v GetListenersListener) bool { return v.GzipEnabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "56206c110e245a02f3b6bb8664b34af5", "score": "0.42784262", "text": "func EnableTracing(enabled bool) {\n\ttrace = enabled\n}", "title": "" }, { "docid": "fc799288c16db1705f591cd224d08b73", "score": "0.42780456", "text": "func Downloading(listener func(*vecty.Event)) *vecty.EventListener {\n\treturn &vecty.EventListener{Name: \"downloading\", Listener: listener}\n}", "title": "" }, { "docid": "9dc699e5390265e8aa9a9767214d61d7", "score": "0.42591646", "text": "func deprecateEventsEnabledField(account *config.Account) {\n\tif account != nil {\n\t\tif account.Events.Enabled == nil {\n\t\t\taccount.Events.Enabled = account.EventsEnabled\n\t\t}\n\t\t// assign the old value to the new value so old and new are always the same even though the new value is what is used in the application code.\n\t\taccount.EventsEnabled = account.Events.Enabled\n\t}\n}", "title": "" }, { "docid": "b561a6f9c59b4120b99333b9ba7c52c6", "score": "0.4254199", "text": "func (this *RangerAppParamDesc) Set_has_events( value bool) {\n this.has_events = value \n}", "title": "" }, { "docid": "e89b5aacc26b5abe3766c237fa1aae27", "score": "0.424002", "text": "func (e *Enforcer) Enable(enable bool) {\n\te.enabled = enable\n}", "title": "" }, { "docid": "debc16b2919fce6943c5fff02e6570e8", "score": "0.4229858", "text": "func (o *DiskEventAnomalyDetectionConfig) SetEnabled(v bool) {\n\to.Enabled = v\n}", "title": "" }, { "docid": "6474d4674d6dee58c8aa19d6b280f7d4", "score": "0.4227946", "text": "func (w *heartbeatWriter) enableWrites(enable bool) {\n\tif w.ticks == nil {\n\t\treturn\n\t}\n\tswitch enable {\n\tcase true:\n\t\t// We must combat a potential race condition: the writer is Open, and a request comes\n\t\t// to enableWrites(true), but simultaneously the writes gets Close()d.\n\t\t// We must not send any more ticks while the writer is closed.\n\t\tgo func() {\n\t\t\tw.mu.Lock()\n\t\t\tdefer w.mu.Unlock()\n\t\t\tif !w.isOpen {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tw.ticks.Start(w.writeHeartbeat)\n\t\t}()\n\tcase false:\n\t\tw.ticks.Stop()\n\t\tif w.onDemandDuration > 0 {\n\t\t\t// Let the next RequestHeartbeats() go through\n\t\t\tw.allowNextHeartbeatRequest()\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b15bdd6398a542ce36daf21ea340ba1d", "score": "0.42253184", "text": "func NewAllowDownloadEnabledDetails() *AllowDownloadEnabledDetails {\n\ts := new(AllowDownloadEnabledDetails)\n\treturn s\n}", "title": "" }, { "docid": "ef0065b77ba2c77d43d9a9647f205a82", "score": "0.42199588", "text": "func AddNodeWithMsgEvents(enable bool) AddNodeOption {\n\treturn func(o *adapters.NodeConfig) {\n\t\to.EnableMsgEvents = enable\n\t}\n}", "title": "" }, { "docid": "234109aa1e1f77c0201d93edbe334f6f", "score": "0.41971305", "text": "func (obj *Tooltips) Enable() {\n\tobj.Candy().Guify(\"gtk_tooltips_enable\", obj)\n}", "title": "" }, { "docid": "25e1160f7b503c258fdc24db3da4e1ea", "score": "0.41866004", "text": "func EmitEvents(ctx context.Context, w http.ResponseWriter, events <-chan Event) {\n\tw.Header().Set(\"Cache-Control\", \"no-transform\")\n\tw.Header().Set(\"Connection\", \"keep-alive\")\n\tw.Header().Set(\"Content-Type\", \"text/event-stream; charset=utf-8\")\n\tw.WriteHeader(http.StatusOK)\n\n\tfor {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\treturn\n\n\t\tcase msg, ok := <-events:\n\t\t\tif !ok {\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tif err := EmitEvent(w, msg); err != nil {\n\t\t\t\treturn\n\t\t\t}\n\n\t\tcase <-time.After(30 * time.Second):\n\t\t\tif err := EmitEvent(w, PingEvent); err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "88d79120ffaa4cfedc826a0589d54ab3", "score": "0.4169781", "text": "func (l *Logger) WithEnabled(flags ...Flag) *Logger {\n\tl.Enable(flags...)\n\treturn l\n}", "title": "" }, { "docid": "3af999af7023ddfdeda82bbdb9c36db0", "score": "0.41683942", "text": "func (l *delegatingLogSink) Enabled(level int) bool {\n\teventuallyFulfillRoot()\n\tl.lock.RLock()\n\tdefer l.lock.RUnlock()\n\treturn l.logger.Enabled(level)\n}", "title": "" }, { "docid": "c3538c63cbf74b2da4c4a7f34bc0d156", "score": "0.4163115", "text": "func PushoverEnabled() bool {\n\treturn notifications[\"pushover\"]\n}", "title": "" }, { "docid": "9ee3c29e2c4416fef545da3413900126", "score": "0.41535023", "text": "func ENABLE_EVENTS_AND_REPORTS(messageId int) []byte {\n\treturn bundle(\n\t\tM_ENABLE_EVENTS_AND_REPORTS,\n\t\tmessageId,\n\t\tnil,\n\t)\n}", "title": "" }, { "docid": "e90dca6d30573e0af92a78bc8e60fe6f", "score": "0.41403842", "text": "func Enabled() bool {\n\treturn enabled\n}", "title": "" }, { "docid": "e90dca6d30573e0af92a78bc8e60fe6f", "score": "0.41403842", "text": "func Enabled() bool {\n\treturn enabled\n}", "title": "" }, { "docid": "9380a60ea204896faf3fbec2f9fa5c4f", "score": "0.41363806", "text": "func (c *Client) EnableDumpAllWithoutRequest() *Client {\n\to := c.getDumpOptions()\n\to.RequestHeader = false\n\to.RequestBody = false\n\tc.EnableDumpAll()\n\treturn c\n}", "title": "" }, { "docid": "9459f980590e4f7f4675d7993d2ee0a4", "score": "0.41179308", "text": "func (r *Retrier) Disable() {\n\tr.disabled = true\n}", "title": "" }, { "docid": "44e5ef03eff8ca54e0152811e2d1655d", "score": "0.41171896", "text": "func ReloadEvents() <-chan bool {\n\treturn reload\n}", "title": "" }, { "docid": "9a2c66e90fcb40d664aa053bd6bfb1cb", "score": "0.41157347", "text": "func GetEnabled() bool {\n\treturn false\n}", "title": "" }, { "docid": "544a7f5027610585cd1ef777e42bf685", "score": "0.4115209", "text": "func (o *MicrosoftGraphLicenseUnitsDetail) HasEnabled() bool {\n\tif o != nil && o.Enabled != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e0056cbd951c4ab3067d572b769f52e3", "score": "0.41074774", "text": "func (_Flags *FlagsFilterer) WatchCheckAccessEnabled(opts *bind.WatchOpts, sink chan<- *FlagsCheckAccessEnabled) (event.Subscription, error) {\n\n\tlogs, sub, err := _Flags.contract.WatchLogs(opts, \"CheckAccessEnabled\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn event.NewSubscription(func(quit <-chan struct{}) error {\n\t\tdefer sub.Unsubscribe()\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase log := <-logs:\n\t\t\t\t// New log arrived, parse the event and forward to the user\n\t\t\t\tevent := new(FlagsCheckAccessEnabled)\n\t\t\t\tif err := _Flags.contract.UnpackLog(event, \"CheckAccessEnabled\", log); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tevent.Raw = log\n\n\t\t\t\tselect {\n\t\t\t\tcase sink <- event:\n\t\t\t\tcase err := <-sub.Err():\n\t\t\t\t\treturn err\n\t\t\t\tcase <-quit:\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\tcase err := <-sub.Err():\n\t\t\t\treturn err\n\t\t\tcase <-quit:\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t}), nil\n}", "title": "" }, { "docid": "a807d5b51e13a6152ad2e24610173d65", "score": "0.4088845", "text": "func LinkingDisabled(o *Options) {\n\to.LinkingEnabled = false\n}", "title": "" }, { "docid": "64b75e08cb1e7f0ec2af94869bb8083c", "score": "0.4085489", "text": "func WithIncludePublishedOperations(enabled bool) Option {\n\treturn func(opts *Transformer) {\n\t\topts.includePublishedOperations = enabled\n\t}\n}", "title": "" }, { "docid": "234e4ae887fa55cc74cd897099d9fb38", "score": "0.40832928", "text": "func (o *CORS) SetEnabled(v bool) {\n\to.Enabled = v\n}", "title": "" }, { "docid": "b4316700a685bfbb5d324e27bfec5f94", "score": "0.40685946", "text": "func (_BtEth *BtEthFilterer) WatchSalesEnabled(opts *bind.WatchOpts, sink chan<- *BtEthSalesEnabled) (event.Subscription, error) {\n\n\tlogs, sub, err := _BtEth.contract.WatchLogs(opts, \"SalesEnabled\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn event.NewSubscription(func(quit <-chan struct{}) error {\n\t\tdefer sub.Unsubscribe()\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase log := <-logs:\n\t\t\t\t// New log arrived, parse the event and forward to the user\n\t\t\t\tevent := new(BtEthSalesEnabled)\n\t\t\t\tif err := _BtEth.contract.UnpackLog(event, \"SalesEnabled\", log); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tevent.Raw = log\n\n\t\t\t\tselect {\n\t\t\t\tcase sink <- event:\n\t\t\t\tcase err := <-sub.Err():\n\t\t\t\t\treturn err\n\t\t\t\tcase <-quit:\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\tcase err := <-sub.Err():\n\t\t\t\treturn err\n\t\t\tcase <-quit:\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t}), nil\n}", "title": "" }, { "docid": "b9b502f322bbece08257b3459f60e514", "score": "0.40682235", "text": "func (n *Node) lockNotDownloaded(events hash.Events) hash.Events {\n\tn.downloads.Lock()\n\tdefer n.downloads.Unlock()\n\n\tres := hash.Events{}\n\n\tfor e := range events {\n\t\tif n.store.GetEvent(e) != nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tif n.downloads.hashes.Contains(e) {\n\t\t\tcontinue\n\t\t}\n\n\t\tn.downloads.hashes.Add(e)\n\t\tres.Add(e)\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "5f9b86c06382a691e222cf29f0f2a340", "score": "0.40624407", "text": "func WithIncludeUnpublishedOperations(enabled bool) Option {\n\treturn func(opts *Transformer) {\n\t\topts.includeUnpublishedOperations = enabled\n\t}\n}", "title": "" }, { "docid": "0fa8164f7611a1e96070bda4c9c49407", "score": "0.40455425", "text": "func (d *Client) OnDownload(f func(*Download)) {\n\td.emitter.On(eDownload, f)\n}", "title": "" }, { "docid": "aa17c692868e05238e484e471081c74f", "score": "0.4044923", "text": "func (o *OverloadedStorageDetectionConfig) SetEnabled(v bool) {\n\to.Enabled = v\n}", "title": "" }, { "docid": "44bdf13a6d82fd16bfa9e09ef2340634", "score": "0.40375215", "text": "func (b *UserRequestBuilder) Events() *UserEventsCollectionRequestBuilder {\n\tbb := &UserEventsCollectionRequestBuilder{BaseRequestBuilder: b.BaseRequestBuilder}\n\tbb.baseURL += \"/events\"\n\treturn bb\n}", "title": "" }, { "docid": "0f3a90487d59ec89daf60e302c2df6eb", "score": "0.40336692", "text": "func (c *Client) Events() *EventsClient {\n\treturn NewEventsClient(\n\t\tc.transport,\n\t\tpath.Join(c.path, \"events\"),\n\t)\n}", "title": "" }, { "docid": "42889c7bd238caf85f51d88f0fbbf091", "score": "0.40323374", "text": "func WithGdsEnabled(enabled bool) Option {\n\treturn func(c *cdiHandler) {\n\t\tc.gdsEnabled = enabled\n\t}\n}", "title": "" }, { "docid": "fd8482807f3a48bafe33f36101d6b52d", "score": "0.40312892", "text": "func (o *CustconfAwsSignedOriginPullV4) HasEnabled() bool {\n\tif o != nil && o.Enabled != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "8b3cc058502e301f5d2e1e692a1c9e1f", "score": "0.40305144", "text": "func (c *Client) EnableDumpEachRequestWithoutResponseBody() *Client {\n\treturn c.OnBeforeRequest(func(client *Client, req *Request) error {\n\t\tif req.RetryAttempt == 0 { // Ignore on retry, no need to repeat enable dump.\n\t\t\treq.EnableDumpWithoutResponseBody()\n\t\t}\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "0e9688a3fad59be0820ddcb441ab877b", "score": "0.4027253", "text": "func WithClick(url string) PublishOption {\n\treturn WithHeader(\"X-Click\", url)\n}", "title": "" }, { "docid": "9ca250eedda96d1145dabfd55d075348", "score": "0.40248162", "text": "func (ob *OutputBuilder) Enable(status bool) *OutputBuilder {\n\tob.output.Enabled = status\n\treturn ob\n}", "title": "" }, { "docid": "e2eca03e6fe4adbfe373ca1b88420b13", "score": "0.40240946", "text": "func WithMetricsEnabled(v string) Option {\n\treturn func(o *options) { o.metricsEnabled = strings.ToLower(v) == \"true\" }\n}", "title": "" }, { "docid": "e800e0921805074596a5b95a0072516a", "score": "0.4023939", "text": "func (o *MicrosoftGraphLicenseUnitsDetail) SetEnabled(v int32) {\n\to.Enabled = &v\n}", "title": "" }, { "docid": "eb0b65c9f65c8788ae4cbf350718d875", "score": "0.40203974", "text": "func (o *GetChecksParams) SetEnabled(enabled *bool) {\n\to.Enabled = enabled\n}", "title": "" }, { "docid": "a68c27be454820bda181025e6ea8cecc", "score": "0.40173456", "text": "func Disable() {\n\tif initialized {\n\t\tpanic(\"Initialize/Disable called more than once\")\n\t}\n\tinitialized = true\n\n\tm := pb.MetricRegistration{}\n\tif err := eventchannel.Emit(&m); err != nil {\n\t\tpanic(\"unable to emit metric disable event: \" + err.Error())\n\t}\n}", "title": "" }, { "docid": "8e4cc72b2777c853ad9a450c0fc0bb05", "score": "0.40157342", "text": "func (client *Client) DescribeClientEventsWithChan(request *DescribeClientEventsRequest) (<-chan *DescribeClientEventsResponse, <-chan error) {\n\tresponseChan := make(chan *DescribeClientEventsResponse, 1)\n\terrChan := make(chan error, 1)\n\terr := client.AddAsyncTask(func() {\n\t\tdefer close(responseChan)\n\t\tdefer close(errChan)\n\t\tresponse, err := client.DescribeClientEvents(request)\n\t\tif err != nil {\n\t\t\terrChan <- err\n\t\t} else {\n\t\t\tresponseChan <- response\n\t\t}\n\t})\n\tif err != nil {\n\t\terrChan <- err\n\t\tclose(responseChan)\n\t\tclose(errChan)\n\t}\n\treturn responseChan, errChan\n}", "title": "" }, { "docid": "0d1dc3280c3496fe183e3b291205f05c", "score": "0.40091306", "text": "func SetEnabled(v bool) error {\n\tif config.GetGlobalConfig().Instance.StmtSummaryEnablePersistent {\n\t\treturn GlobalStmtSummary.SetEnabled(v)\n\t}\n\treturn stmtsummary.StmtSummaryByDigestMap.SetEnabled(v)\n}", "title": "" }, { "docid": "c9b21412a3ae5c9c12a7077ec3f9850a", "score": "0.40045023", "text": "func (s *PipeTargetRedshiftDataParameters) SetWithEvent(v bool) *PipeTargetRedshiftDataParameters {\n\ts.WithEvent = &v\n\treturn s\n}", "title": "" }, { "docid": "5a148bb590bfe7b94cd3fb639e81fdce", "score": "0.3993823", "text": "func (o GetListenersListenerAccessLogTracingConfigOutput) TracingEnabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v GetListenersListenerAccessLogTracingConfig) bool { return v.TracingEnabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "11f9888157cd6ac39ff7d8b8f1230599", "score": "0.3989705", "text": "func EnableExperimentalActions() Option {\n\treturn func(bc *blockchain, conf config.Config) error {\n\t\tbc.enableExperimentalActions = true\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "4bb05cea5524eb68be351ba6f7d460b1", "score": "0.39819163", "text": "func (this *RangerAppFunctionDesc) Get_has_events() bool {\n return this.has_events\n}", "title": "" }, { "docid": "a63ee899a5e26a4d41f16bd538186c6e", "score": "0.3979604", "text": "func (o *CustconfFlvPseudoStreaming) HasEnabled() bool {\n\tif o != nil && o.Enabled != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f959b3d5e69f92853fb0d853701fa975", "score": "0.3977919", "text": "func (c *Client) EnableDumpEachRequestWithoutResponse() *Client {\n\treturn c.OnBeforeRequest(func(client *Client, req *Request) error {\n\t\tif req.RetryAttempt == 0 { // Ignore on retry, no need to repeat enable dump.\n\t\t\treq.EnableDumpWithoutResponse()\n\t\t}\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "1c27a8b88668bd79c87449af66029304", "score": "0.39728513", "text": "func (c *Client) EnableDumpAllWithoutBody() *Client {\n\to := c.getDumpOptions()\n\to.RequestBody = false\n\to.ResponseBody = false\n\tc.EnableDumpAll()\n\treturn c\n}", "title": "" }, { "docid": "1c60b5e1ce5a485ca92ed5e3439263c9", "score": "0.39720523", "text": "func SendsEventsForAllResourcesWithEmptyNamespaceSelector() *feature.Feature {\n\tsource := feature.MakeRandomK8sName(\"apiserversource\")\n\tsink := feature.MakeRandomK8sName(\"sink\")\n\tf := feature.NewFeatureNamed(\"Send events for select resources within all namespaces\")\n\n\tf.Setup(\"install sink\", eventshub.Install(sink, eventshub.StartReceiver))\n\n\tsacmName := feature.MakeRandomK8sName(\"apiserversource\")\n\tf.Setup(\"Create Service Account for ApiServerSource with RBAC for sources.knative.dev/v1 PingSources\",\n\t\tsetupAccountAndRoleForPingSources(sacmName))\n\n\ttestNS1 := feature.MakeRandomK8sName(\"source-namespace-1\")\n\ttestNS2 := feature.MakeRandomK8sName(\"source-namespace-2\")\n\n\t// create two new namespaces\n\tf.Setup(\"create a namespace\", namespace.Install(testNS1))\n\tf.Setup(\"create a namespace\", namespace.Install(testNS2))\n\n\tcfg := []manifest.CfgFn{\n\t\tapiserversource.WithServiceAccountName(sacmName),\n\t\tapiserversource.WithEventMode(\"Reference\"),\n\t\tapiserversource.WithSink(service.AsDestinationRef(sink)),\n\t\tapiserversource.WithResources(v1.APIVersionKindSelector{\n\t\t\tAPIVersion: \"sources.knative.dev/v1\",\n\t\t\tKind: \"PingSource\",\n\t\t}),\n\t\tapiserversource.WithNamespaceSelector(&metav1.LabelSelector{\n\t\t\tMatchLabels: map[string]string{},\n\t\t\tMatchExpressions: []metav1.LabelSelectorRequirement{},\n\t\t}),\n\t}\n\n\tf.Setup(\"install ApiServerSource\", apiserversource.Install(source, cfg...))\n\tf.Setup(\"ApiServerSource goes ready\", apiserversource.IsReady(source))\n\n\tpingSource1 := feature.MakeRandomK8sName(\"ping-source-1\")\n\tpingSource2 := feature.MakeRandomK8sName(\"ping-source-2\")\n\n\tf.Requirement(\"install PingSource 1\",\n\t\tpingsource.Install(pingSource1, pingsource.WithSink(&duckv1.Destination{URI: apis.HTTP(\"example.com\")})),\n\t)\n\tf.Requirement(\"install PingSource 2\",\n\t\tpingsource.Install(pingSource2, pingsource.WithSink(&duckv1.Destination{URI: apis.HTTP(\"example.com\")})),\n\t)\n\n\tf.Stable(\"ApiServerSource as event source\").\n\t\tMust(\"delivers events from new namespace\",\n\t\t\teventasssert.OnStore(sink).MatchEvent(\n\t\t\t\ttest.HasType(\"dev.knative.apiserver.ref.add\"),\n\t\t\t\ttest.DataContains(`\"kind\":\"PingSource\"`),\n\t\t\t\ttest.DataContains(fmt.Sprintf(`\"name\":\"%s\"`, pingSource1)),\n\t\t\t).Exact(1))\n\tf.Stable(\"ApiServerSource as event source\").\n\t\tMust(\"delivers events from new namespace\",\n\t\t\teventasssert.OnStore(sink).MatchEvent(\n\t\t\t\ttest.HasType(\"dev.knative.apiserver.ref.add\"),\n\t\t\t\ttest.DataContains(`\"kind\":\"PingSource\"`),\n\t\t\t\ttest.DataContains(fmt.Sprintf(`\"name\":\"%s\"`, pingSource2)),\n\t\t\t).Exact(1))\n\n\t// Delete resources including temporary namespaces\n\tf.Teardown(\"Deleting resources\", f.DeleteResources)\n\treturn f\n}", "title": "" }, { "docid": "9154c613a299f035e19fa9eec013abe1", "score": "0.39674664", "text": "func (d *Devfile200) GetEvents() common.DevfileEvents {\n\treturn d.Events\n}", "title": "" }, { "docid": "9154c613a299f035e19fa9eec013abe1", "score": "0.39674664", "text": "func (d *Devfile200) GetEvents() common.DevfileEvents {\n\treturn d.Events\n}", "title": "" }, { "docid": "650e099c1c784b0999aeb5685d9ea4cf", "score": "0.39640558", "text": "func SendsEventsWithEventTypes() *feature.Feature {\n\tsource := feature.MakeRandomK8sName(\"source\")\n\tsink := feature.MakeRandomK8sName(\"sink\")\n\tvia := feature.MakeRandomK8sName(\"via\")\n\n\tf := new(feature.Feature)\n\n\t//Install the broker\n\tbrokerName := feature.MakeRandomK8sName(\"broker\")\n\tf.Setup(\"install broker\", broker.Install(brokerName, broker.WithEnvConfig()...))\n\tf.Setup(\"broker is ready\", broker.IsReady(brokerName))\n\tf.Setup(\"broker is addressable\", broker.IsAddressable(brokerName))\n\tf.Setup(\"install sink\", eventshub.Install(sink, eventshub.StartReceiver))\n\tf.Setup(\"install trigger\", trigger.Install(via, brokerName, trigger.WithSubscriber(service.AsKReference(sink), \"\")))\n\tf.Setup(\"trigger goes ready\", trigger.IsReady(via))\n\n\tsacmName := feature.MakeRandomK8sName(\"apiserversource\")\n\tf.Setup(\"Create Service Account for ApiServerSource with RBAC for v1.Event resources\",\n\t\tsetupAccountAndRoleForPods(sacmName))\n\n\tf.Requirement(\"install apiserversource\", func(ctx context.Context, t feature.T) {\n\t\tbrokeruri, err := broker.Address(ctx, brokerName)\n\t\tif err != nil {\n\t\t\tt.Error(\"failed to get address of broker\", err)\n\t\t}\n\t\tcfg := []manifest.CfgFn{\n\t\t\tapiserversource.WithServiceAccountName(sacmName),\n\t\t\tapiserversource.WithEventMode(v1.ResourceMode),\n\t\t\tapiserversource.WithSink(&duckv1.Destination{URI: brokeruri.URL, CACerts: brokeruri.CACerts}),\n\t\t\tapiserversource.WithResources(v1.APIVersionKindSelector{\n\t\t\t\tAPIVersion: \"v1\",\n\t\t\t\tKind: \"Event\",\n\t\t\t}),\n\t\t}\n\t\tapiserversource.Install(source, cfg...)(ctx, t)\n\t})\n\tf.Requirement(\"ApiServerSource goes ready\", apiserversource.IsReady(source))\n\n\texpectedCeTypes := sets.NewString(sources.ApiServerSourceEventReferenceModeTypes...)\n\n\tf.Stable(\"ApiServerSource as event source\").\n\t\tMust(\"delivers events on broker with URI\",\n\t\t\teventasssert.OnStore(sink).MatchEvent(test.HasType(\"dev.knative.apiserver.resource.update\")).AtLeast(1)).\n\t\tMust(\"ApiServerSource test eventtypes match\",\n\t\t\teventtype.WaitForEventType(eventtype.AssertPresent(expectedCeTypes)))\n\n\treturn f\n}", "title": "" }, { "docid": "b345f1195b69a1ec5d96c0a5a380d1a8", "score": "0.39592662", "text": "func (o ListenerAccessLogTracingConfigOutput) TracingEnabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ListenerAccessLogTracingConfig) *bool { return v.TracingEnabled }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "34cb56440f58ce691236bd466777a84a", "score": "0.39565057", "text": "func (o *CustconfOriginPullLogs) HasEnabled() bool {\n\tif o != nil && o.Enabled != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "688240c9772732891cd0f7ef7b037771", "score": "0.39462164", "text": "func (l *Linux) SetEnabled(enabled bool) {\n\tl.enabled = enabled\n}", "title": "" }, { "docid": "be09985d33aa37404978cb6755dc11db", "score": "0.39444384", "text": "func SetEnabled(newEnabled bool) {\n\tenabledMutex.Lock()\n\tdefer enabledMutex.Unlock()\n\n\tenabled = newEnabled\n}", "title": "" }, { "docid": "a041ea1116ce0f852dc31d858432192b", "score": "0.3943821", "text": "func (d *DummyAi) OnEvents(msg client.EventsMessage) {\n\tfmt.Println(\"[dummy][OnEvents]\")\n\tspew.Dump(msg)\n}", "title": "" }, { "docid": "7f8e6a9f1f4a68cecd5f342ba70f2c1f", "score": "0.3943404", "text": "func (this *RangerAppClassDesc) Get_has_events() bool {\n return this.has_events\n}", "title": "" }, { "docid": "66d8caa18c31a8201e8615e2d6e7deba", "score": "0.39318419", "text": "func (c *Client) EnableDumpAllWithoutHeader() *Client {\n\to := c.getDumpOptions()\n\to.RequestHeader = false\n\to.ResponseHeader = false\n\tc.EnableDumpAll()\n\treturn c\n}", "title": "" }, { "docid": "f6a082ee4917069bd2d0371cf6b85398", "score": "0.39316168", "text": "func (o *CustconfOriginPullLogs) SetEnabled(v bool) {\n\to.Enabled = &v\n}", "title": "" }, { "docid": "9da948221b66ee74131f5dc6c47bd3b7", "score": "0.39266437", "text": "func EventsOff(ctx context.Context, eventName string) {\n\tevents := getEvents(ctx)\n\tevents.Off(eventName)\n}", "title": "" }, { "docid": "65cde094c5fc161756e6e67b2f6dbe86", "score": "0.39258617", "text": "func WithEnabledLabelsAPI() Option {\n\treturn optionFunc(func(o *options) {\n\t\to.enableLabelAPIs = true\n\t})\n}", "title": "" }, { "docid": "c15c55e62ca7294ccaba74c86034c29a", "score": "0.3924554", "text": "func SetDisabled() {\n\treturn\n}", "title": "" }, { "docid": "21d77ea332c2ae1d022ce4f6953847dc", "score": "0.3922643", "text": "func (o LookupEventDataStoreResultOutput) IngestionEnabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v LookupEventDataStoreResult) *bool { return v.IngestionEnabled }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "86e694856107872629cc4af45a513ad4", "score": "0.39226255", "text": "func (cb ListenerCallback) UseTargetOnly() bool {\n\treturn cb.Options&EventTargetOnly != 0\n}", "title": "" }, { "docid": "3ad93c53960805af21e45269ebecf595", "score": "0.39210993", "text": "func (this *RangerAppParamDesc) Get_has_events() bool {\n return this.has_events\n}", "title": "" }, { "docid": "a3c5e4c8b101dfcad4034d1c1421ba82", "score": "0.39182442", "text": "func WithDisableAPIServerWatcher() Option {\n\treturn func(idr *Indexer) {\n\t\tidr.watchAPIServer = false\n\t}\n}", "title": "" }, { "docid": "ed02dda25484371d1e170114478c5cee", "score": "0.3912591", "text": "func (s *Sink) Events() <-chan frizzle.Event {\n\treturn (<-chan frizzle.Event)(s.evtChan)\n}", "title": "" }, { "docid": "e5a53ff2c0d952df7991973176b85721", "score": "0.3910486", "text": "func (o *CustconfAwsSignedOriginPullV4) SetEnabled(v bool) {\n\to.Enabled = &v\n}", "title": "" }, { "docid": "c761b22d9f2175000546bf350a9e3fbf", "score": "0.39100587", "text": "func Enabled() bool {\n\treturn boring.Enabled\n}", "title": "" }, { "docid": "1b463fa7e7282ed0b320486a14ba9998", "score": "0.39038625", "text": "func (o *SecurityMonitoringRuleUpdatePayload) HasEnabled() bool {\n\tif o != nil && o.Enabled != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "49af19557b782a1e2aa24e36d7b10aec", "score": "0.39026797", "text": "func (o *InlineResponse200124Deliveries) HasEvent() bool {\n\tif o != nil && o.Event != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "10f82d2517bc8411f9bd67b15f95e3b2", "score": "0.3889354", "text": "func WithDisabledYellow() Option {\n\treturn func(s *Server) {\n\t\ts.disableYellow = true\n\t}\n}", "title": "" } ]
9d11d68340a8bb6f67ba5d36a04ef58b
Children implements the Expression interface.
[ { "docid": "8968b4ec1ac55da01366e2391790d834", "score": "0.8078161", "text": "func (p *UnaryExpression) Children() []sql.Expression {\n\treturn []sql.Expression{p.Child}\n}", "title": "" } ]
[ { "docid": "0a4ef8b1fbcbfdac4df24081fa9d5fb9", "score": "0.8334711", "text": "func (n *NaryExpression) Children() []sql.Expression {\n\treturn n.ChildExpressions\n}", "title": "" }, { "docid": "49706ca15a41ff7001474159b737c98d", "score": "0.82385784", "text": "func (e *Generate) Children() []sql.Expression { return []sql.Expression{e.Child} }", "title": "" }, { "docid": "3eaa2ad78d0e11aec45ffbf704c06f63", "score": "0.79381937", "text": "func (db *Database) Children() []sql.Expression { return nil }", "title": "" }, { "docid": "51ad0f7ed9a2b44b4e9796f5960f142e", "score": "0.7880614", "text": "func (e *Explode) Children() []sql.Expression { return []sql.Expression{e.Child} }", "title": "" }, { "docid": "86e24c79214ceb30e6e0f3d75910a5fe", "score": "0.7872684", "text": "func (p *BinaryExpression) Children() []sql.Expression {\n\treturn []sql.Expression{p.Left, p.Right}\n}", "title": "" }, { "docid": "4379bf759e2e72b004aa631c4f2b52c7", "score": "0.78617465", "text": "func (f *Language) Children() []sql.Expression {\n\tif f.Right == nil {\n\t\treturn []sql.Expression{f.Left}\n\t}\n\n\treturn []sql.Expression{f.Left, f.Right}\n}", "title": "" }, { "docid": "ef478c431163dcd966b4a3ad2f8573db", "score": "0.78149056", "text": "func (f *Version) Children() []sql.Expression { return nil }", "title": "" }, { "docid": "8c712ba18196644cab5a5a9b954a2e67", "score": "0.76879853", "text": "func (u *UnaryOperator) Children() []Node {\n\treturn []Node{NewAnnotatedNode(u.Exp, \"Exp\")}\n}", "title": "" }, { "docid": "63b5326ea6c45375ac1e28bf54bf9b81", "score": "0.76445687", "text": "func (node ScalarFunctionCall) Children() Nodes { return node.args }", "title": "" }, { "docid": "3cecea07d2615c0edb54c1b7bb4f058d", "score": "0.76362646", "text": "func (in *InTuple) Children() []sql.Expression {\n\treturn []sql.Expression{in.Left(), in.Right()}\n}", "title": "" }, { "docid": "2dcfdda0c4f1251a51c0558fd6ec3ae9", "score": "0.7589929", "text": "func (node ScalarArithExpr) Children() Nodes { return Nodes{node.lhs, node.rhs} }", "title": "" }, { "docid": "f5a42f67ae2145e7c2054a33ab5576ce", "score": "0.7490835", "text": "func (vc *ConstraintsVerifyFunc) Children() []sql.Expression {\n\texprs := make([]sql.Expression, len(vc.ChildExpressions))\n\tfor i := range exprs {\n\t\texprs[i] = vc.ChildExpressions[i]\n\t}\n\treturn exprs\n}", "title": "" }, { "docid": "ab451528163ba10c335eb1c9a4f0f568", "score": "0.74728864", "text": "func (i *AutoIncrement) Children() []sql.Expression {\n\treturn []sql.Expression{i.Child}\n}", "title": "" }, { "docid": "9fd71c3bc6936ea58c340aa6cc958ae8", "score": "0.7355901", "text": "func (b *BinaryOperator) Children() []Node {\n\treturn []Node{\n\t\tNewAnnotatedNode(b.L, \"L\"),\n\t\tNewAnnotatedNode(b.R, \"R\"),\n\t}\n}", "title": "" }, { "docid": "f4ed33e80dfa8252198906efdce7a7a6", "score": "0.725561", "text": "func (*deferredColumn) Children() []sql.Expression { return nil }", "title": "" }, { "docid": "c03ca8005aacc71ae7f48a2e51b4aa7a", "score": "0.7201895", "text": "func (in *NotInTuple) Children() []sql.Expression {\n\treturn []sql.Expression{in.Left(), in.Right()}\n}", "title": "" }, { "docid": "f2fc837799b45352305521c29705041a", "score": "0.71706414", "text": "func (node VectorArithExpr) Children() Nodes { return Nodes{node.lhs, node.rhs} }", "title": "" }, { "docid": "10e4831a25c88a3a9418903e9aaf39c4", "score": "0.7096585", "text": "func (c *ConvertTz) Children() []sql.Expression {\n\treturn []sql.Expression{c.dt, c.fromTz, c.toTz}\n}", "title": "" }, { "docid": "d8f3fa41c7a401c87fc900c61803f438", "score": "0.7094803", "text": "func (node VectorFunctionCall) Children() Nodes { return node.args }", "title": "" }, { "docid": "59d94b15fd35f40fc794f6cdb6f60374", "score": "0.7060359", "text": "func (node ScalarLiteral) Children() Nodes { return Nodes{} }", "title": "" }, { "docid": "098a06513ff37cd5538dbfbd50ab09d2", "score": "0.7044434", "text": "func (r *Rule) Children() []Node {\n\treturn []Node{r.Condition}\n}", "title": "" }, { "docid": "c84a07b284b0f33df14da5ea3f41f8b9", "score": "0.6954541", "text": "func (node StringFunctionCall) Children() Nodes { return node.args }", "title": "" }, { "docid": "b3f8897d4ca083fb0f9d66a81f363644", "score": "0.67323685", "text": "func Children(ps ...Parser) Parser {\n\tif len(ps) > 1 {\n\t\treturn Children(Seq(ps...))\n\t}\n\tp := ps[0]\n\treturn func(s string, n *Node) (string, *Node) {\n\t\tdbg(\"Children(%s %p)\\n\", n.Kind, n)\n\t\ts2, n2 := p(s, n)\n\t\tif n2 == nil {\n\t\t\treturn s, nil\n\t\t}\n\t\tfor _, c := range n2.Children {\n\t\t\tdbg(\"Children(%s %p) AddChild() from %p\\n\", n.Kind, n, n2)\n\t\t\tif c != n {\n\t\t\t\tn.AddChild(c)\n\t\t\t}\n\t\t}\n\t\treturn s2, n\n\t}\n}", "title": "" }, { "docid": "43ff3b489bc0a1412827ae92e83707cd", "score": "0.66960055", "text": "func (d *DeclareVariables) Children() []sql.Node {\n\treturn nil\n}", "title": "" }, { "docid": "26ae36d8baf80b15502e48c3c5d37937", "score": "0.668537", "text": "func (i *Ident) Children() []Node {\n\treturn nil\n}", "title": "" }, { "docid": "3df76f7ceefd4a33a1418925adbf731d", "score": "0.66734445", "text": "func (n *ConstDecl) Children() []Node {\n\ttmp := make([]Node, 0, len(n.Assignments))\n\tfor _, param := range n.Assignments {\n\t\ttmp = append(tmp, param)\n\t}\n\n\treturn tmp\n}", "title": "" }, { "docid": "a9220cafcc9e46f7738b49422a5a632f", "score": "0.65644825", "text": "func (n *RangeStmt) Children() []Node {\n\ttmp := make([]Node, 0, 4)\n\tif n.Key != nil {\n\t\ttmp = append(tmp, n.Key)\n\t}\n\n\tif n.Val != nil {\n\t\ttmp = append(tmp, n.Val)\n\t}\n\n\tif n.X != nil {\n\t\ttmp = append(tmp, n.X)\n\t}\n\n\tif n.Body != nil {\n\t\ttmp = append(tmp, n.Body)\n\t}\n\n\treturn tmp\n}", "title": "" }, { "docid": "69f1fed858b631685c6424395facb002", "score": "0.6551508", "text": "func (Table) Children() []sql.Node { return nil }", "title": "" }, { "docid": "e6b136a2c93cc994b36c5e4adceb7f28", "score": "0.6538485", "text": "func (an *AnnotatedNode) Children() []Node {\n\treturn an.Node.Children()\n}", "title": "" }, { "docid": "f59411528cf2eba39a1ab3172590d1fd", "score": "0.6512684", "text": "func (brn *BigRegionNumerics) Children() []region.RegionNumerics {\n\tif brn.subregion.populated {\n\t\tnextContexts := make([]region.RegionNumerics, 4)\n\t\tfor i, child := range brn.subregion.children {\n\t\t\t// Use a proxy to avoid heap allocation\n\t\t\tnextContexts[i] = brn.proxyNumerics(&child)\n\t\t}\n\t\treturn nextContexts\n\t}\n\tlog.Panic(\"Region asked to provide non-existent children\")\n\treturn nil\n}", "title": "" }, { "docid": "d6fbdf9ddca43312590283840cea8c1e", "score": "0.6508133", "text": "func (m *Term) GetChildren()([]Termable) {\n return m.children\n}", "title": "" }, { "docid": "3ca1f0ee751012ea0b4e58a32fec124b", "score": "0.64947", "text": "func (self *Node) Children() []*Node {\n\tvar ret []*Node\n\tfor _, child := range self.children {\n\t\tret = append(ret, child)\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "fbd6185798990d47dd0561849ccfc28c", "score": "0.64871055", "text": "func (e ElseCaseError) Children() []sql.Node {\n\treturn nil\n}", "title": "" }, { "docid": "bfd819090396b0498991d9772af585db", "score": "0.6485538", "text": "func (node MatrixSelector) Children() Nodes { return Nodes{} }", "title": "" }, { "docid": "62bc17edda6754cbb10cda450fad14a9", "score": "0.64643884", "text": "func (tn *TokenNode) Children() []Node {\n\treturn []Node{}\n}", "title": "" }, { "docid": "7703bcd7c1e71b9602f31d208ee24307", "score": "0.64603597", "text": "func (c *Command) Children() []tree.Node {\n\tnodes := make([]tree.Node, 0, len(c.Commands))\n\tfor _, v := range c.Commands {\n\t\tnodes = append(nodes, v)\n\t}\n\treturn nodes\n}", "title": "" }, { "docid": "1141482eb7df8df88b4279936dea63e2", "score": "0.64600706", "text": "func (s *Signal) Children() []sql.Node {\n\treturn nil\n}", "title": "" }, { "docid": "2db4adc7445b019247118471101283ef", "score": "0.6444927", "text": "func (node StringLiteral) Children() Nodes { return Nodes{} }", "title": "" }, { "docid": "657eb77a6bd713a506c5cef3d907aa19", "score": "0.6423252", "text": "func (n *node) Children() []Node {\n\treturn n.children\n}", "title": "" }, { "docid": "5296b48db14a3503a56ae3bbf3e30dc2", "score": "0.64202607", "text": "func (node VectorAggregation) Children() Nodes { return Nodes{node.vector} }", "title": "" }, { "docid": "552b58df2fdfcf064fa39b3256965035", "score": "0.6402142", "text": "func (c *CaseStatement) Children() []sql.Node {\n\treturn c.IfElse.Children()\n}", "title": "" }, { "docid": "f6eef6595b7df0e4ca0a677e0a775e79", "score": "0.6356073", "text": "func (t *Terminal) Children() []Node {\n\treturn make([]Node, 0)\n}", "title": "" }, { "docid": "b4f6cf36cbd28a6c0b41f7fa5b529050", "score": "0.63501394", "text": "func (ltf *LogTableFunction) Children() []sql.Node {\n\treturn nil\n}", "title": "" }, { "docid": "c746f8013d7d2fd9cde6f4aa20f7a52d", "score": "0.63245004", "text": "func (n *FormatAttr) Children() []Node {\n\treturn n.ChildNodes\n}", "title": "" }, { "docid": "2be2b424fc8c75200486264f3efbd4c1", "score": "0.6262744", "text": "func (node VectorSelector) Children() Nodes { return Nodes{} }", "title": "" }, { "docid": "645334931c4c8e8848e559aa7ef4eafe", "score": "0.6256823", "text": "func (w *Workflow) Children() []Node {\n\treturn w.bn.Children()\n}", "title": "" }, { "docid": "594db492c663e29e49f9a9ea396756a8", "score": "0.62465394", "text": "func (q *Spec) Children(id NodeID) []*Node {\n\tif q.children == nil {\n\t\terr := q.prepare()\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn q.children[id]\n}", "title": "" }, { "docid": "4a17a843ddc464709013fb0effe1ea37", "score": "0.6243926", "text": "func (f LOVDefinition) Children() []dslengine.Definition {\n\tvar stores []dslengine.Definition\n\tfor _, s := range f.Values {\n\t\tstores = append(stores, s)\n\t}\n\treturn stores\n}", "title": "" }, { "docid": "dbd0042e0267b1e083ad1fb665a2a800", "score": "0.62411666", "text": "func (s *SignalName) Children() []sql.Node {\n\treturn nil // SignalName is an alternate form of Signal rather than an encapsulating node, thus no children\n}", "title": "" }, { "docid": "5ef1fa36bb617418da34943117364b72", "score": "0.623421", "text": "func (f RelationalFieldDefinition) Children() []dslengine.Definition {\n\t// no children yet\n\treturn []dslengine.Definition{}\n}", "title": "" }, { "docid": "ded701f1ca821a4b8677919d5e82b398", "score": "0.6188817", "text": "func (iq *InstanceQuery) QueryChildren() *InstanceRuntimeQuery {\n\tquery := &InstanceRuntimeQuery{config: iq.config}\n\tquery.path = func(ctx context.Context) (fromU *sql.Selector, err error) {\n\t\tif err := iq.prepareQuery(ctx); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tselector := iq.sqlQuery(ctx)\n\t\tif err := selector.Err(); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(instance.Table, instance.FieldID, selector),\n\t\t\tsqlgraph.To(instanceruntime.Table, instanceruntime.FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.O2M, false, instance.ChildrenTable, instance.ChildrenColumn),\n\t\t)\n\t\tfromU = sqlgraph.SetNeighbors(iq.driver.Dialect(), step)\n\t\treturn fromU, nil\n\t}\n\treturn query\n}", "title": "" }, { "docid": "adaaddf5bce64d0dfcdcf854d94537ac", "score": "0.61730605", "text": "func (k Querier) Children(c context.Context, req *types.QueryChildrenRequest) (*types.QueryChildrenResponse, error) {\n\tif req == nil {\n\t\treturn nil, status.Error(codes.InvalidArgument, \"empty request\")\n\t}\n\tctx := sdk.UnwrapSDKContext(c)\n\n\tchildren := k.GetChildren(ctx, req.Path)\n\n\treturn &types.QueryChildrenResponse{\n\t\tChildren: children.Children,\n\t}, nil\n}", "title": "" }, { "docid": "2fdb01cbe305fb1a7affd0272a827a78", "score": "0.61708146", "text": "func (c *ChannelRowSource) Children() []sql.Node {\n\treturn nil\n}", "title": "" }, { "docid": "22d167260be31858f594c4421d8516dd", "score": "0.6148186", "text": "func (n *ObjCInterface) Children() []Node {\n\treturn n.ChildNodes\n}", "title": "" }, { "docid": "9a16e7cc333ccb7f2826db25e8fe8232", "score": "0.614809", "text": "func children(n *jNode) []interface{} {\n\tres := make([]interface{}, 0)\n\tfor i := 1; i < len(*n); i++ {\n\t\tif _, isAttr := ((*n)[i]).(map[string]interface{}); isAttr {\n\t\t\tcontinue\n\t\t}\n\t\tchild := cast((*n)[i])\n\t\tif child != nil {\n\t\t\tres = append(res, child)\n\t\t} else {\n\t\t\tstr := stringOf((*n)[i])\n\t\t\tres = append(res, str)\n\t\t}\n\t}\n\treturn res\n}", "title": "" }, { "docid": "61d8068bf31d16d98189b511b6f43e11", "score": "0.6111798", "text": "func (n *projectNode) Children() *projectNode {\n\tcn := &projectNode{\n\t\tquery.NewManyManyNode(\n\t\t\t\"goradd\",\n\t\t\t\"related_project_assn\",\n\t\t\t\"parent_id\",\n\t\t\t\"Children\",\n\t\t\t\"project\",\n\t\t\t\"child_id\",\n\t\t\t\"id\",\n\t\t\tfalse,\n\t\t),\n\t}\n\tquery.SetParentNode(cn, n)\n\treturn cn\n\n}", "title": "" }, { "docid": "754be7cc2aaa718f63fd24d6fccc80af", "score": "0.61037326", "text": "func Children(index, depth uint64) Range {\n\tif (index & 1) == 0 {\n\t\treturn Range{}\n\t}\n\n\tif depth == 0 {\n\t\tdepth = Depth(index)\n\t}\n\toffset := Offset(index, depth)\n\n\treturn Range{Index(depth-1, offset), Index(depth-1, offset+1)}\n}", "title": "" }, { "docid": "824241eae047cb01abff62bb1e4278df", "score": "0.6094914", "text": "func (n ParentNode) Children() []Node {\n\treturn n.children\n}", "title": "" }, { "docid": "660632f4dcbe4c76a78a91a8830bd61c", "score": "0.6070954", "text": "func (e *Explode) WithChildren(children ...sql.Expression) (sql.Expression, error) {\n\tif len(children) != 1 {\n\t\treturn nil, sql.ErrInvalidChildrenNumber.New(e, len(children), 1)\n\t}\n\treturn NewExplode(children[0]), nil\n}", "title": "" }, { "docid": "8ab00ebc40d6f63c0cac7150d8b1635f", "score": "0.6053651", "text": "func (scr *ScriptElement) Children() *Elements { return &Elements{slice: []*Element{}} }", "title": "" }, { "docid": "8ab00ebc40d6f63c0cac7150d8b1635f", "score": "0.6053651", "text": "func (scr *ScriptElement) Children() *Elements { return &Elements{slice: []*Element{}} }", "title": "" }, { "docid": "bf0444c60fb78da6bdb70b26dd1df800", "score": "0.60535735", "text": "func (this *Execute) Expressions() expression.Expressions {\n\treturn nil\n}", "title": "" }, { "docid": "3ea30227c3ee21d53521d2c1788b1c48", "score": "0.6039123", "text": "func ChildrenOf(ret *Node, p Parser) Parser {\n\treturn func(s string, n *Node) (string, *Node) {\n\t\tdbg(\"ChildrenOf(%s %p) %s %p\\n\", ret.Kind, ret, n.Kind, n)\n\t\treturn Children(p)(s, ret)\n\t}\n}", "title": "" }, { "docid": "d94c8d09dc569439c36b1bdec7e831ec", "score": "0.60221577", "text": "func (node *Node) Children() *NodesContainer {\n\treturn node.children\n}", "title": "" }, { "docid": "69d0849015a6318323cea027a4f46578", "score": "0.5999339", "text": "func (f *Field) Children() []Node {\n\ttmp := make([]Node, 0, len(f.FieldAnnotations)+1+1)\n\ttmp = append(tmp, f.FieldType)\n\tfor _, annotation := range f.FieldAnnotations {\n\t\ttmp = append(tmp, annotation)\n\t}\n\n\tif f.FieldDefault != nil {\n\t\ttmp = append(tmp, f.FieldDefault)\n\t}\n\n\treturn tmp\n}", "title": "" }, { "docid": "ededf6636efd013c552903e7be3393f1", "score": "0.598914", "text": "func (r *Root) Children() []Node {\n\tnodes := make([]Node, 0, len(r.children))\n\tfor _, n := range r.children {\n\t\tnodes = append(nodes, n)\n\t}\n\n\treturn nodes\n}", "title": "" }, { "docid": "6e9225432c49914c1ca27d2c5e8be161", "score": "0.59830284", "text": "func (ex *Examiner) Children(idx int) []*dwarf.Entry {\n\tsl := ex.kids[idx]\n\tret := make([]*dwarf.Entry, len(sl))\n\tfor i, k := range sl {\n\t\tret[i] = ex.entryFromIdx(k)\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "e4abd2c297afef21ea8fd2e31a0df790", "score": "0.5968537", "text": "func (p *Parser) parseChildren() ([]*Call, error) {\n\tvar offset int\n\tvar children []*Call\n\tfor {\n\t\t// Ensure next two tokens are IDENT+LPAREN.\n\t\tif tok, _, _ := p.scanIgnoreWhitespace(); tok != IDENT {\n\t\t\tp.unscanIgnoreWhitespace(1 + offset)\n\t\t\treturn children, nil\n\t\t}\n\t\tif tok, _, _ := p.scan(); tok != LPAREN {\n\t\t\tp.unscanIgnoreWhitespace(2 + offset)\n\t\t\treturn children, nil\n\t\t}\n\n\t\t// Push tokens back on scanner and parse as a call.\n\t\tp.unscan(2)\n\t\tchild, err := p.parseCall()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tchildren = append(children, child)\n\n\t\t// Exit if closing paren.\n\t\tif tok, pos, lit := p.scanIgnoreWhitespace(); tok == RPAREN {\n\t\t\tp.unscan(1)\n\t\t\treturn children, nil\n\t\t} else if tok != COMMA {\n\t\t\treturn nil, parseErrorf(pos, \"expected comma or right paren, found %q\", lit)\n\t\t}\n\n\t\t// Make sure comma is unscanned.\n\t\toffset = 1\n\t}\n}", "title": "" }, { "docid": "486d042ad9b7773491f3aa910dc56b27", "score": "0.59669006", "text": "func (this *AnsiNest) Expressions() expression.Expressions {\n\texprs := this.left.Expressions()\n\texprs = append(exprs, this.right.Expressions()...)\n\texprs = append(exprs, this.onclause)\n\treturn exprs\n}", "title": "" }, { "docid": "59cb390e94cc667bd2b245b93a7d8d63", "score": "0.5959306", "text": "func (t *TitleElement) Children() *Elements { return &Elements{slice: []*Element{}} }", "title": "" }, { "docid": "59cb390e94cc667bd2b245b93a7d8d63", "score": "0.5959306", "text": "func (t *TitleElement) Children() *Elements { return &Elements{slice: []*Element{}} }", "title": "" }, { "docid": "012b5cb8e9fb3bd3d1d7125bd2abfa5e", "score": "0.5946364", "text": "func (self *Image) Children() []DisplayObject{\n\tarray00 := self.Object.Get(\"children\")\n\tlength00 := array00.Length()\n\tout00 := make([]DisplayObject, length00, length00)\n\tfor i00 := 0; i00 < length00; i00++ {\n\t\tout00[i00] = DisplayObject{array00.Index(i00)}\n\t}\n\treturn out00\n}", "title": "" }, { "docid": "03a283a32a59fea7db4e1f6ad68c9955", "score": "0.5932603", "text": "func (n Node) Children() map[string]*Node {\n\treturn n.children\n}", "title": "" }, { "docid": "01fb5fc36f3b2fd8cc9b6aa2cf69a759", "score": "0.59085387", "text": "func (n *ObjCMethodDecl) Children() []Node {\n\treturn n.ChildNodes\n}", "title": "" }, { "docid": "1783aa16e3f5d8da74243d811e9666d2", "score": "0.5908155", "text": "func (node *FamilyNode) Children() ChildNodes {\n\tif node == nil {\n\t\treturn nil\n\t}\n\n\tchildren := ChildNodes{}\n\n\tfor _, n := range NodesWithTag(node, TagChild) {\n\t\tchildren = append(children, n.(*ChildNode))\n\t}\n\n\treturn children\n}", "title": "" }, { "docid": "38dd54bdbd275bb604fb8cd06b097c1c", "score": "0.59077585", "text": "func (o *TeflonObject) Children() (ch []*TeflonObject) {\n\tch = []*TeflonObject{}\n\tchn := o.ChildrenNames()\n\tfor _, n := range chn {\n\t\tno, err := NewTeflonObject(filepath.Join(o.Path, n))\n\t\tif err != nil {\n\t\t\tlog.Fatalln(\"ABORT: Couldn't create child object:\", err)\n\t\t}\n\t\tch = append(ch, no)\n\t}\n\treturn ch\n}", "title": "" }, { "docid": "b281878162f47bea7b2412bd2fba9775", "score": "0.5904799", "text": "func (b *Base) Children() *Elements { return b.Elements }", "title": "" }, { "docid": "83a8363cb233213ecd4c194ff90bc12d", "score": "0.58993757", "text": "func (_this *Document) Children() *dom.HTMLCollection {\n\tvar ret *dom.HTMLCollection\n\tvalue := _this.Value_JS.Get(\"children\")\n\tret = dom.HTMLCollectionFromJS(value)\n\treturn ret\n}", "title": "" }, { "docid": "0650d1f04c947a5887c28684014aa30f", "score": "0.58887905", "text": "func (m *Model) Children(element Element) []Element {\n\tvar children []Element\n\t// Get the elements\n\tfor child, parent := range m.Composition {\n\t\tif parent == element {\n\t\t\tchildren = append(children, child)\n\t\t}\n\t}\n\t// Sort elements by name\n\tsort.Slice(children, func(i, j int) bool {\n\t\treturn children[i].Name() < children[j].Name()\n\t})\n\treturn children\n}", "title": "" }, { "docid": "edab7a0ed4cf522cac5c93e2ff7275d7", "score": "0.58836323", "text": "func (this Bindings) Expressions() Expressions {\n\texprs := make(Expressions, len(this))\n\n\tfor i, b := range this {\n\t\texprs[i] = b.expr\n\t}\n\n\treturn exprs\n}", "title": "" }, { "docid": "b553bbfcca3f693c120a0558c0f30e77", "score": "0.5859558", "text": "func (m *Term) SetChildren(value []Termable)() {\n m.children = value\n}", "title": "" }, { "docid": "ff6b2508bac31418439639ae50f05c48", "score": "0.58544827", "text": "func (l *Link) Children() []Meta {\n\treturn nil\n}", "title": "" }, { "docid": "e95b06454c8aea6183b97c6e20b86fd1", "score": "0.5842938", "text": "func (e *Generate) WithChildren(children ...sql.Expression) (sql.Expression, error) {\n\tif len(children) != 1 {\n\t\treturn nil, sql.ErrInvalidChildrenNumber.New(e, len(children), 1)\n\t}\n\treturn NewGenerate(children[0]), nil\n}", "title": "" }, { "docid": "4d93c02b9d8097a40ecd6bf4c63052b8", "score": "0.583569", "text": "func (p *parser) parseChildren() (*Children, error) {\n\tvar c Children\n\tvar err error\n\n\tcur := p.cursor\n\t{\n\t\tvar choice *Choice\n\t\tchoice, err = p.parseChoice()\n\t\tif err == nil {\n\t\t\tc.ChoiceSeq = choice\n\t\t\tif p.Test('?') || p.Test('*') || p.Test('+') {\n\t\t\t\tr := p.Get()\n\t\t\t\tc.Suffix = &r\n\t\t\t\tp.Step()\n\t\t\t}\n\t\t\treturn &c, nil\n\t\t}\n\t}\n\tp.cursor = cur\n\n\tvar s *Seq\n\ts, err = p.parseSeq()\n\tif err == nil {\n\t\tc.ChoiceSeq = s\n\t\tif p.Test('?') || p.Test('*') || p.Test('+') {\n\t\t\tr := p.Get()\n\t\t\tc.Suffix = &r\n\t\t\tp.Step()\n\t\t}\n\t\treturn &c, nil\n\t}\n\n\treturn nil, p.error(errors.New(\"unknown error\"))\n}", "title": "" }, { "docid": "7da360fe0dbb9f4c87d1371a0b31e680", "score": "0.5810935", "text": "func (c *PooledClient) Children(\n\tctx context.Context,\n\tpath string,\n) ([]string, *szk.Stat, error) {\n\trespChan := make(chan pooledResp)\n\tlog.Debugf(\"Getting children at %s\", path)\n\n\tc.requestChan <- pooledRequest{\n\t\tpath: path,\n\t\tmethod: \"children\",\n\t\trespChan: respChan,\n\t}\n\n\tselect {\n\tcase resp := <-respChan:\n\t\treturn resp.children, resp.stats, resp.err\n\tcase <-ctx.Done():\n\t\treturn nil, nil, ctx.Err()\n\t}\n}", "title": "" }, { "docid": "32eb13c53593b4e4b1f81679b30a3fa1", "score": "0.5808429", "text": "func (n *Node) ExpandChildren() []SyntaxTreeNode {\n\tfs := make([]SyntaxTreeNode, len(n.Children))\n\tfor i, n := range n.Children {\n\t\tfs[i] = n\n\t}\n\treturn fs\n}", "title": "" }, { "docid": "4c15db036fb82d04855cf35c950b2adc", "score": "0.58025044", "text": "func (h *Header) Children() *Elements {\n\treturn &Elements{slice: []*Element{}}\n}", "title": "" }, { "docid": "00db3476a95fb32e79a09d4f25d4523f", "score": "0.5800129", "text": "func (c *VariationClient) QueryChildren(v *Variation) *VariationQuery {\n\tquery := &VariationQuery{config: c.config}\n\tquery.path = func(ctx context.Context) (fromV *sql.Selector, _ error) {\n\t\tid := v.ID\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(variation.Table, variation.FieldID, id),\n\t\t\tsqlgraph.To(variation.Table, variation.FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.O2M, false, variation.ChildrenTable, variation.ChildrenColumn),\n\t\t)\n\t\tfromV = sqlgraph.Neighbors(v.driver.Dialect(), step)\n\t\treturn fromV, nil\n\t}\n\treturn query\n}", "title": "" }, { "docid": "a2bc5be8770788de038361895377bc31", "score": "0.57915664", "text": "func (c *CategoryClient) QueryChildren(ca *Category) *CategoryQuery {\n\tquery := &CategoryQuery{config: c.config}\n\tquery.path = func(ctx context.Context) (fromV *sql.Selector, _ error) {\n\t\tid := ca.ID\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(category.Table, category.FieldID, id),\n\t\t\tsqlgraph.To(category.Table, category.FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.O2M, false, category.ChildrenTable, category.ChildrenColumn),\n\t\t)\n\t\tfromV = sqlgraph.Neighbors(ca.driver.Dialect(), step)\n\t\treturn fromV, nil\n\t}\n\treturn query\n}", "title": "" }, { "docid": "4fa28a0c9649f0bc14900058ca0ae97e", "score": "0.57893", "text": "func (g *digraph) Children(v int) []int {\n\tif vtx, err := g.getAdj(v); err == nil {\n\t\treturn vtx.Children()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d0e9a1ca2b2a92f724f67a64a796a340", "score": "0.57788175", "text": "func (w *Workspace) Children() []Container {\n\treturn w.containers\n}", "title": "" }, { "docid": "38737440ad57dda5edad93798f6fa721", "score": "0.5753524", "text": "func (b *BodyElement) Children() *Elements { return b.Elements }", "title": "" }, { "docid": "38737440ad57dda5edad93798f6fa721", "score": "0.5753524", "text": "func (b *BodyElement) Children() *Elements { return b.Elements }", "title": "" }, { "docid": "2e0c676b8c912f283c19be3460daa505", "score": "0.5750019", "text": "func (l *Last) WithChildren(children ...sql.Expression) (sql.Expression, error) {\n\tif len(children) != 1 {\n\t\treturn nil, sql.ErrInvalidChildrenNumber.New(l, len(children), 1)\n\t}\n\treturn NewLast(children[0]), nil\n}", "title": "" }, { "docid": "43b17e2f822aa483344012c3ebf3b908", "score": "0.5731302", "text": "func (ber BerTLV) Children(tag BerTag) []BerTLV {\n\tvar berTLVS []BerTLV\n\n\tif len(tag) == 0 {\n\t\treturn ber.children\n\t}\n\n\tif !ber.Tag.IsConstructed() {\n\t\treturn nil\n\t}\n\n\tfor _, tlv := range ber.children {\n\t\tif bytes.Equal(tlv.Tag, tag) {\n\t\t\tberTLVS = append(berTLVS, tlv)\n\t\t}\n\t}\n\n\treturn berTLVS\n}", "title": "" }, { "docid": "ba65d426fff0cf8f7f7fdab5ed026d25", "score": "0.57307786", "text": "func (m *Metadata) QueryChildren() *MetadataQuery {\n\treturn NewMetadataClient(m.config).QueryChildren(m)\n}", "title": "" }, { "docid": "bdebbb2ccec70f890c7902d3ec697897", "score": "0.5694427", "text": "func (node *ProgramNode) VisitChildren(visitor Visitor) {\n\tfor _, child := range node.Chilren {\n\t\tAccept(child, visitor)\n\t}\n}", "title": "" }, { "docid": "eb9e8e481a61a0245e2f73a0d9eb802f", "score": "0.5691113", "text": "func (g *Container) Children() ([]*Container, error) {\n\tif array, ok := g.Data().([]interface{}); ok {\n\t\tchildren := make([]*Container, len(array))\n\t\tfor i := 0; i < len(array); i++ {\n\t\t\tchildren[i] = &Container{array[i]}\n\t\t}\n\t\treturn children, nil\n\t}\n\tif mmap, ok := g.Data().(map[string]interface{}); ok {\n\t\tchildren := []*Container{}\n\t\tfor _, obj := range mmap {\n\t\t\tchildren = append(children, &Container{obj})\n\t\t}\n\t\treturn children, nil\n\t}\n\treturn nil, ErrNotObjOrArray\n}", "title": "" }, { "docid": "00a1535b706c46ed1b8931f00f969f21", "score": "0.56812495", "text": "func (fig *Figure) Children() *Elements { return fig.Elements }", "title": "" }, { "docid": "a50d9f316d50fd1a35636058ef3d6342", "score": "0.5669314", "text": "func (l *Leaf) GetChildren() []Node {\n\treturn nil\n}", "title": "" } ]
1c7733caaac987ad73dbfc2e62e2c871
GetRepository indicates an expected call of GetRepository
[ { "docid": "62c5319e3a9dbaebd3a481b24cfbb179", "score": "0.62923324", "text": "func (mr *MockGithubApiServiceMockRecorder) GetRepository(ctx, repository, owner interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetRepository\", reflect.TypeOf((*MockGithubApiService)(nil).GetRepository), ctx, repository, owner)\n}", "title": "" } ]
[ { "docid": "a6dc4ec799edeb278aa2c99f70dce6e5", "score": "0.6630334", "text": "func (_e *UpdateHandler_Expecter) GetRepository() *UpdateHandler_GetRepository_Call {\n\treturn &UpdateHandler_GetRepository_Call{Call: _e.mock.On(\"GetRepository\")}\n}", "title": "" }, { "docid": "7438dc1a3312c3454014e62e8b653bd8", "score": "0.6461056", "text": "func TestRepos_Get_nonexistent(t *testing.T) {\n\tgithubcli.Config.GitHubHost = \"github.com\"\n\tresetCache(t)\n\n\tctx := testContext(&minimalClient{\n\t\trepos: mockGitHubRepos{\n\t\t\tGet_: func(owner, repo string) (*github.Repository, *github.Response, error) {\n\t\t\t\tresp := &http.Response{\n\t\t\t\t\tStatusCode: http.StatusNotFound,\n\t\t\t\t\tBody: ioutil.NopCloser(bytes.NewReader(nil)),\n\t\t\t\t\tRequest: &http.Request{},\n\t\t\t\t}\n\t\t\t\treturn nil, &github.Response{Response: resp}, github.CheckResponse(resp)\n\t\t\t},\n\t\t},\n\t})\n\n\ts := &Repos{}\n\tnonexistentRepo := \"github.com/owner/repo\"\n\trepo, err := s.Get(ctx, nonexistentRepo)\n\tif grpc.Code(err) != codes.NotFound {\n\t\tt.Fatal(err)\n\t}\n\tif repo != nil {\n\t\tt.Error(\"repo != nil\")\n\t}\n}", "title": "" }, { "docid": "0e4b0db2d181f16342ddd29d0f0820f7", "score": "0.62735224", "text": "func testRepo() *library.Repo {\n\ti64 := int64(0)\n\ti := 0\n\tstr := \"\"\n\tb := false\n\n\treturn &library.Repo{\n\t\tID: &i64,\n\t\tUserID: &i64,\n\t\tHash: &str,\n\t\tOrg: &str,\n\t\tName: &str,\n\t\tFullName: &str,\n\t\tLink: &str,\n\t\tClone: &str,\n\t\tBranch: &str,\n\t\tBuildLimit: &i64,\n\t\tTimeout: &i64,\n\t\tCounter: &i,\n\t\tVisibility: &str,\n\t\tPrivate: &b,\n\t\tTrusted: &b,\n\t\tActive: &b,\n\t\tAllowPull: &b,\n\t\tAllowPush: &b,\n\t\tAllowDeploy: &b,\n\t\tAllowTag: &b,\n\t\tAllowComment: &b,\n\t\tPreviousName: &str,\n\t}\n}", "title": "" }, { "docid": "1c167ef36fe23c2cff4ff7a72cb38e07", "score": "0.6264538", "text": "func testRepos_Get(t *testing.T, private bool) {\n\tgithubcli.Config.GitHubHost = \"github.com\"\n\tresetCache(t)\n\n\tvar calledGet bool\n\tctx := testContext(&minimalClient{\n\t\trepos: mockGitHubRepos{\n\t\t\tGet_: func(owner, repo string) (*github.Repository, *github.Response, error) {\n\t\t\t\tcalledGet = true\n\t\t\t\treturn &github.Repository{\n\t\t\t\t\tID: github.Int(123),\n\t\t\t\t\tName: github.String(\"repo\"),\n\t\t\t\t\tFullName: github.String(\"owner/repo\"),\n\t\t\t\t\tOwner: &github.User{ID: github.Int(1)},\n\t\t\t\t\tCloneURL: github.String(\"https://github.com/owner/repo.git\"),\n\t\t\t\t\tPrivate: github.Bool(private),\n\t\t\t\t}, nil, nil\n\t\t\t},\n\t\t},\n\t})\n\n\trepo, err := (&Repos{}).Get(ctx, \"github.com/owner/repo\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tif repo == nil {\n\t\tt.Error(\"repo == nil\")\n\t}\n\tif !calledGet {\n\t\tt.Error(\"!calledGet\")\n\t}\n\tif want := int32(123); repo.GitHubID != want {\n\t\tt.Errorf(\"got %d, want %d\", repo.GitHubID, want)\n\t}\n\n\t// Test that repo is not cached and fetched from client on second request.\n\tcalledGet = false\n\trepo, err = (&Repos{}).Get(ctx, \"github.com/owner/repo\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tif repo == nil {\n\t\tt.Error(\"repo == nil\")\n\t}\n\tif private && !calledGet {\n\t\tt.Error(\"!calledGet, expected to miss cache\")\n\t}\n\tif !private && calledGet {\n\t\tt.Error(\"calledGet, expected to hit cache\")\n\t}\n\tif want := int32(123); repo.GitHubID != want {\n\t\tt.Errorf(\"got %d, want %d\", repo.GitHubID, want)\n\t}\n}", "title": "" }, { "docid": "8354d0eac40df77051c79ec2194daa2b", "score": "0.6256406", "text": "func TestRepos_Get_existing_private(t *testing.T) {\n\ttestRepos_Get(t, true)\n}", "title": "" }, { "docid": "cbddd9db35ffebcb02e1eeb475b892f6", "score": "0.6178514", "text": "func TestRepos_Get_existing_public(t *testing.T) {\n\ttestRepos_Get(t, false)\n}", "title": "" }, { "docid": "17762a8214aa5e490a40574fa2d475ff", "score": "0.6130836", "text": "func TestRepoEnvironmentRepository(t *testing.T) {\n\tre := RepoEnvironment{currentRepository: \"foobar\"}\n\t_, str := re.repository()\n\tif str != \"foobar\" {\n\t\tt.Errorf(\"Something went wrong: %s\", str)\n\t}\n}", "title": "" }, { "docid": "c7565a3a58c84e26ac6e0bedae6bfeab", "score": "0.59316117", "text": "func (c *restClient) GetRepository(ctx context.Context, req *dataformpb.GetRepositoryRequest, opts ...gax.CallOption) (*dataformpb.Repository, error) {\n\tbaseUrl, err := url.Parse(c.endpoint)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbaseUrl.Path += fmt.Sprintf(\"/v1alpha2/%v\", req.GetName())\n\n\tparams := url.Values{}\n\tparams.Add(\"$alt\", \"json;enum-encoding=int\")\n\n\tbaseUrl.RawQuery = params.Encode()\n\n\t// Build HTTP headers from client and context metadata.\n\thds := []string{\"x-goog-request-params\", fmt.Sprintf(\"%s=%v\", \"name\", url.QueryEscape(req.GetName()))}\n\n\thds = append(c.xGoogHeaders, hds...)\n\thds = append(hds, \"Content-Type\", \"application/json\")\n\theaders := gax.BuildHeaders(ctx, hds...)\n\topts = append((*c.CallOptions).GetRepository[0:len((*c.CallOptions).GetRepository):len((*c.CallOptions).GetRepository)], opts...)\n\tunm := protojson.UnmarshalOptions{AllowPartial: true, DiscardUnknown: true}\n\tresp := &dataformpb.Repository{}\n\te := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error {\n\t\tif settings.Path != \"\" {\n\t\t\tbaseUrl.Path = settings.Path\n\t\t}\n\t\thttpReq, err := http.NewRequest(\"GET\", baseUrl.String(), nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\thttpReq = httpReq.WithContext(ctx)\n\t\thttpReq.Header = headers\n\n\t\thttpRsp, err := c.httpClient.Do(httpReq)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer httpRsp.Body.Close()\n\n\t\tif err = googleapi.CheckResponse(httpRsp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tbuf, err := io.ReadAll(httpRsp.Body)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := unm.Unmarshal(buf, resp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t}, opts...)\n\tif e != nil {\n\t\treturn nil, e\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "f9a444d2f58e1c64c4688133e68aa199", "score": "0.590653", "text": "func (o *SubjectTypes) GetRepositoryOk() (*SubjectTypesRepository, bool) {\n\tif o == nil || o.Repository == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Repository, true\n}", "title": "" }, { "docid": "0944f325516f8bb736225e6b034a2bbc", "score": "0.5834578", "text": "func (mr *MockRepositoriesMockRecorder) Get(ctx, owner, repo interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Get\", reflect.TypeOf((*MockRepositories)(nil).Get), ctx, owner, repo)\n}", "title": "" }, { "docid": "a84fa1e3a3306d72dd03472425c0759d", "score": "0.5833815", "text": "func TestServiceWithRepository_GetProjection(t *testing.T) {\n\tctrl := gomock.NewController(t)\n\tdefer ctrl.Finish()\n\n\ttype args struct {\n\t\tl loan.Loan\n\t}\n\ttests := []struct {\n\t\tname string\n\t\ts *ServiceWithRepository\n\t\targs args\n\t\twant Projection\n\t\twantErr bool\n\t}{\n\t\t// 1. Got error while try to get the projection from repository\n\t\t// 2. There is projection stored in the data storage\n\t\t// 3. Got error while calculate number of days\n\t\t// 4. Got error while try to store the projection to the data storage\n\t\t// 5. Succesfully store the projection\n\t}\n\tfor _, tt := range tests {\n\t\tt.Run(tt.name, func(t *testing.T) {\n\t\t\tgot, err := tt.s.GetProjection(tt.args.l)\n\t\t\tif (err != nil) != tt.wantErr {\n\t\t\t\tt.Errorf(\"ServiceWithRepository.GetProjection() error = %v, wantErr %v\", err, tt.wantErr)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif !reflect.DeepEqual(got, tt.want) {\n\t\t\t\tt.Errorf(\"ServiceWithRepository.GetProjection() = %v, want %v\", got, tt.want)\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "6681c8a5479e5419f9193f7266da501a", "score": "0.58321255", "text": "func (aaa *ImageConfigService) GetRepository(input *image_config.GetRepositoryParams) (*dsmcclientmodels.ModelsRepositoryRecord, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tok, unauthorized, notFound, internalServerError, err := aaa.Client.ImageConfig.GetRepository(input, client.BearerToken(*token.AccessToken))\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif notFound != nil {\n\t\treturn nil, notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn nil, internalServerError\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ok.GetPayload(), nil\n}", "title": "" }, { "docid": "4d921ce352f1b95ad229acf1ca07bab8", "score": "0.58274394", "text": "func (helper *Helper) GetRepository() Repository {\n\treturn helper.dao\n}", "title": "" }, { "docid": "0453155e21e27e11de6047f1bc86eccc", "score": "0.58265454", "text": "func TestRepos_GetByID_nonexistent(t *testing.T) {\n\tgithubcli.Config.GitHubHost = \"github.com\"\n\tctx := testContext(&minimalClient{\n\t\trepos: mockGitHubRepos{\n\t\t\tGetByID_: func(id int) (*github.Repository, *github.Response, error) {\n\t\t\t\tresp := &http.Response{\n\t\t\t\t\tStatusCode: http.StatusNotFound,\n\t\t\t\t\tBody: ioutil.NopCloser(bytes.NewReader(nil)),\n\t\t\t\t\tRequest: &http.Request{},\n\t\t\t\t}\n\t\t\t\treturn nil, &github.Response{Response: resp}, github.CheckResponse(resp)\n\t\t\t},\n\t\t},\n\t})\n\n\ts := &Repos{}\n\trepo, err := s.GetByID(ctx, 456)\n\tif grpc.Code(err) != codes.NotFound {\n\t\tt.Fatal(err)\n\t}\n\tif repo != nil {\n\t\tt.Error(\"repo != nil\")\n\t}\n}", "title": "" }, { "docid": "367b79c908ff7c1c36d8b69ab6b6c76b", "score": "0.5804979", "text": "func (_m *UpdateHandler) GetRepository() crud.Repository {\n\tret := _m.Called()\n\n\tvar r0 crud.Repository\n\tif rf, ok := ret.Get(0).(func() crud.Repository); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(crud.Repository)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "8e7f9f4e3d68091315000b2a7fde42d9", "score": "0.5780701", "text": "func (t *TeamsService) CheckRepository(uri *Hyperlink, uriParams M) (manages bool, repo *Repository, result *Result) {\n\turl, err := ExpandWithDefault(uri, &TeamRepositoryURL, uriParams)\n\tif err != nil {\n\t\tresult = &Result{Err: err}\n\t\treturn\n\t}\n\tresult = t.client.get(url, &repo)\n\tmanages = (result.Response.StatusCode == 204 || result.Response.StatusCode == 200)\n\treturn\n}", "title": "" }, { "docid": "ab9576ac4e9a664bd3aec3fef2c9ef7f", "score": "0.57718086", "text": "func TestGetRepositories3(t *testing.T) {\n\t_, code := GetRepositoriesByUserId(\"xxxxx1231\", \"\")\n\tif code != http.StatusNotFound {\n\t\tt.Errorf(\"Want status code %v but got %v\", http.StatusNotFound, code)\n\t}\n}", "title": "" }, { "docid": "a41479eea2a0addd0291f15ec3025ed1", "score": "0.56846994", "text": "func (m *MockDBStore) HasRepository(v0 context.Context, v1 int) (bool, error) {\n\tr0, r1 := m.HasRepositoryFunc.nextHook()(v0, v1)\n\tm.HasRepositoryFunc.appendCall(DBStoreHasRepositoryFuncCall{v0, v1, r0, r1})\n\treturn r0, r1\n}", "title": "" }, { "docid": "39bc09f32cd3b007b704ff34b0f846ab", "score": "0.56575257", "text": "func (mr *MockRepositoryMockRecorder) Get(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Get\", reflect.TypeOf((*MockRepository)(nil).Get), arg0)\n}", "title": "" }, { "docid": "5b0153a924e1e7c37ab5a227005a7a9a", "score": "0.56443197", "text": "func (m *MockRepositories) Get(ctx context.Context, owner, repo string) (*github.Repository, *github.Response, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Get\", ctx, owner, repo)\n\tret0, _ := ret[0].(*github.Repository)\n\tret1, _ := ret[1].(*github.Response)\n\tret2, _ := ret[2].(error)\n\treturn ret0, ret1, ret2\n}", "title": "" }, { "docid": "d63dbe457bfd8bdb7915304e273cfe63", "score": "0.56238997", "text": "func TestRepository(t *testing.T) {\n\ttype args struct {\n\t\tscanner types.Scanner\n\t\tignoreIDs []string\n\t\tpolicyPaths []string\n\t\tnamespaces []string\n\t\tlistAllPkgs bool\n\t\tinput string\n\t\tsecretConfig string\n\t\tfilePatterns []string\n\t\thelmSet []string\n\t\thelmValuesFile []string\n\t\tskipFiles []string\n\t\tskipDirs []string\n\t\tcommand string\n\t\tformat types.Format\n\t\tincludeDevDeps bool\n\t}\n\ttests := []struct {\n\t\tname string\n\t\targs args\n\t\tgolden string\n\t\toverride func(*types.Report)\n\t}{\n\t\t{\n\t\t\tname: \"gomod\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/gomod\",\n\t\t\t},\n\t\t\tgolden: \"testdata/gomod.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"gomod with skip files\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/gomod\",\n\t\t\t\tskipFiles: []string{\"testdata/fixtures/repo/gomod/submod2/go.mod\"},\n\t\t\t},\n\t\t\tgolden: \"testdata/gomod-skip.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"gomod with skip dirs\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/gomod\",\n\t\t\t\tskipDirs: []string{\"testdata/fixtures/repo/gomod/submod2\"},\n\t\t\t},\n\t\t\tgolden: \"testdata/gomod-skip.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"npm\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/npm\",\n\t\t\t\tlistAllPkgs: true,\n\t\t\t},\n\t\t\tgolden: \"testdata/npm.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"npm with dev deps\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/npm\",\n\t\t\t\tlistAllPkgs: true,\n\t\t\t\tincludeDevDeps: true,\n\t\t\t},\n\t\t\tgolden: \"testdata/npm-with-dev.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"yarn\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/yarn\",\n\t\t\t\tlistAllPkgs: true,\n\t\t\t},\n\t\t\tgolden: \"testdata/yarn.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"pnpm\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/pnpm\",\n\t\t\t},\n\t\t\tgolden: \"testdata/pnpm.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"pip\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tlistAllPkgs: true,\n\t\t\t\tinput: \"testdata/fixtures/repo/pip\",\n\t\t\t},\n\t\t\tgolden: \"testdata/pip.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"pipenv\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tlistAllPkgs: true,\n\t\t\t\tinput: \"testdata/fixtures/repo/pipenv\",\n\t\t\t},\n\t\t\tgolden: \"testdata/pipenv.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"poetry\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tlistAllPkgs: true,\n\t\t\t\tinput: \"testdata/fixtures/repo/poetry\",\n\t\t\t},\n\t\t\tgolden: \"testdata/poetry.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"pom\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/pom\",\n\t\t\t},\n\t\t\tgolden: \"testdata/pom.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"gradle\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/gradle\",\n\t\t\t},\n\t\t\tgolden: \"testdata/gradle.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"conan\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tlistAllPkgs: true,\n\t\t\t\tinput: \"testdata/fixtures/repo/conan\",\n\t\t\t},\n\t\t\tgolden: \"testdata/conan.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"nuget\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tlistAllPkgs: true,\n\t\t\t\tinput: \"testdata/fixtures/repo/nuget\",\n\t\t\t},\n\t\t\tgolden: \"testdata/nuget.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"dotnet\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tlistAllPkgs: true,\n\t\t\t\tinput: \"testdata/fixtures/repo/dotnet\",\n\t\t\t},\n\t\t\tgolden: \"testdata/dotnet.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"swift\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tlistAllPkgs: true,\n\t\t\t\tinput: \"testdata/fixtures/repo/swift\",\n\t\t\t},\n\t\t\tgolden: \"testdata/swift.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"cocoapods\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tlistAllPkgs: true,\n\t\t\t\tinput: \"testdata/fixtures/repo/cocoapods\",\n\t\t\t},\n\t\t\tgolden: \"testdata/cocoapods.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"pubspec.lock\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tlistAllPkgs: true,\n\t\t\t\tinput: \"testdata/fixtures/repo/pubspec\",\n\t\t\t},\n\t\t\tgolden: \"testdata/pubspec.lock.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"mix.lock\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tlistAllPkgs: true,\n\t\t\t\tinput: \"testdata/fixtures/repo/mixlock\",\n\t\t\t},\n\t\t\tgolden: \"testdata/mix.lock.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"composer.lock\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tlistAllPkgs: true,\n\t\t\t\tinput: \"testdata/fixtures/repo/composer\",\n\t\t\t},\n\t\t\tgolden: \"testdata/composer.lock.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"dockerfile\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.MisconfigScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/dockerfile\",\n\t\t\t\tnamespaces: []string{\"testing\"},\n\t\t\t},\n\t\t\tgolden: \"testdata/dockerfile.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"dockerfile with custom file pattern\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.MisconfigScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/dockerfile_file_pattern\",\n\t\t\t\tnamespaces: []string{\"testing\"},\n\t\t\t\tfilePatterns: []string{\"dockerfile:Customfile\"},\n\t\t\t},\n\t\t\tgolden: \"testdata/dockerfile_file_pattern.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"dockerfile with rule exception\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.MisconfigScanner,\n\t\t\t\tpolicyPaths: []string{\"testdata/fixtures/repo/rule-exception/policy\"},\n\t\t\t\tinput: \"testdata/fixtures/repo/rule-exception\",\n\t\t\t},\n\t\t\tgolden: \"testdata/dockerfile-rule-exception.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"dockerfile with namespace exception\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.MisconfigScanner,\n\t\t\t\tpolicyPaths: []string{\"testdata/fixtures/repo/namespace-exception/policy\"},\n\t\t\t\tinput: \"testdata/fixtures/repo/namespace-exception\",\n\t\t\t},\n\t\t\tgolden: \"testdata/dockerfile-namespace-exception.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"dockerfile with custom policies\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.MisconfigScanner,\n\t\t\t\tpolicyPaths: []string{\"testdata/fixtures/repo/custom-policy/policy\"},\n\t\t\t\tnamespaces: []string{\"user\"},\n\t\t\t\tinput: \"testdata/fixtures/repo/custom-policy\",\n\t\t\t},\n\t\t\tgolden: \"testdata/dockerfile-custom-policies.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"tarball helm chart scanning with builtin policies\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.MisconfigScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/helm\",\n\t\t\t},\n\t\t\tgolden: \"testdata/helm.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"helm chart directory scanning with builtin policies\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.MisconfigScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/helm_testchart\",\n\t\t\t},\n\t\t\tgolden: \"testdata/helm_testchart.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"helm chart directory scanning with value overrides using set\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.MisconfigScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/helm_testchart\",\n\t\t\t\thelmSet: []string{\"securityContext.runAsUser=0\"},\n\t\t\t},\n\t\t\tgolden: \"testdata/helm_testchart.overridden.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"helm chart directory scanning with value overrides using value file\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.MisconfigScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/helm_testchart\",\n\t\t\t\thelmValuesFile: []string{\"testdata/fixtures/repo/helm_values/values.yaml\"},\n\t\t\t},\n\t\t\tgolden: \"testdata/helm_testchart.overridden.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"helm chart directory scanning with builtin policies and non string Chart name\",\n\t\t\targs: args{\n\t\t\t\tscanner: types.MisconfigScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/helm_badname\",\n\t\t\t},\n\t\t\tgolden: \"testdata/helm_badname.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"secrets\",\n\t\t\targs: args{\n\t\t\t\tscanner: \"vuln,secret\",\n\t\t\t\tinput: \"testdata/fixtures/repo/secrets\",\n\t\t\t\tsecretConfig: \"testdata/fixtures/repo/secrets/trivy-secret.yaml\",\n\t\t\t},\n\t\t\tgolden: \"testdata/secrets.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"conda generating CycloneDX SBOM\",\n\t\t\targs: args{\n\t\t\t\tcommand: \"rootfs\",\n\t\t\t\tformat: \"cyclonedx\",\n\t\t\t\tinput: \"testdata/fixtures/repo/conda\",\n\t\t\t},\n\t\t\tgolden: \"testdata/conda-cyclonedx.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"conda generating SPDX SBOM\",\n\t\t\targs: args{\n\t\t\t\tcommand: \"rootfs\",\n\t\t\t\tformat: \"spdx-json\",\n\t\t\t\tinput: \"testdata/fixtures/repo/conda\",\n\t\t\t},\n\t\t\tgolden: \"testdata/conda-spdx.json.golden\",\n\t\t},\n\t\t{\n\t\t\tname: \"gomod with fs subcommand\",\n\t\t\targs: args{\n\t\t\t\tcommand: \"fs\",\n\t\t\t\tscanner: types.VulnerabilityScanner,\n\t\t\t\tinput: \"testdata/fixtures/repo/gomod\",\n\t\t\t\tskipFiles: []string{\"testdata/fixtures/repo/gomod/submod2/go.mod\"},\n\t\t\t},\n\t\t\tgolden: \"testdata/gomod-skip.json.golden\",\n\t\t\toverride: func(report *types.Report) {\n\t\t\t\treport.ArtifactType = ftypes.ArtifactFilesystem\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tname: \"dockerfile with fs subcommand\",\n\t\t\targs: args{\n\t\t\t\tcommand: \"fs\",\n\t\t\t\tscanner: types.MisconfigScanner,\n\t\t\t\tpolicyPaths: []string{\"testdata/fixtures/repo/custom-policy/policy\"},\n\t\t\t\tnamespaces: []string{\"user\"},\n\t\t\t\tinput: \"testdata/fixtures/repo/custom-policy\",\n\t\t\t},\n\t\t\tgolden: \"testdata/dockerfile-custom-policies.json.golden\",\n\t\t\toverride: func(report *types.Report) {\n\t\t\t\treport.ArtifactType = ftypes.ArtifactFilesystem\n\t\t\t},\n\t\t},\n\t}\n\n\t// Set up testing DB\n\tcacheDir := initDB(t)\n\n\t// Set a temp dir so that modules will not be loaded\n\tt.Setenv(\"XDG_DATA_HOME\", cacheDir)\n\n\tfor _, tt := range tests {\n\t\tt.Run(tt.name, func(t *testing.T) {\n\n\t\t\tcommand := \"repo\"\n\t\t\tif tt.args.command != \"\" {\n\t\t\t\tcommand = tt.args.command\n\t\t\t}\n\n\t\t\tformat := types.FormatJSON\n\t\t\tif tt.args.format != \"\" {\n\t\t\t\tformat = tt.args.format\n\t\t\t}\n\n\t\t\tosArgs := []string{\n\t\t\t\t\"-q\",\n\t\t\t\t\"--cache-dir\",\n\t\t\t\tcacheDir,\n\t\t\t\tcommand,\n\t\t\t\t\"--skip-db-update\",\n\t\t\t\t\"--skip-policy-update\",\n\t\t\t\t\"--format\",\n\t\t\t\tstring(format),\n\t\t\t\t\"--offline-scan\",\n\t\t\t}\n\n\t\t\tif tt.args.scanner != \"\" {\n\t\t\t\tosArgs = append(osArgs, \"--scanners\", string(tt.args.scanner))\n\t\t\t}\n\n\t\t\tif len(tt.args.policyPaths) != 0 {\n\t\t\t\tfor _, policyPath := range tt.args.policyPaths {\n\t\t\t\t\tosArgs = append(osArgs, \"--config-policy\", policyPath)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif len(tt.args.namespaces) != 0 {\n\t\t\t\tfor _, namespace := range tt.args.namespaces {\n\t\t\t\t\tosArgs = append(osArgs, \"--policy-namespaces\", namespace)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif len(tt.args.ignoreIDs) != 0 {\n\t\t\t\ttrivyIgnore := \".trivyignore\"\n\t\t\t\terr := os.WriteFile(trivyIgnore, []byte(strings.Join(tt.args.ignoreIDs, \"\\n\")), 0444)\n\t\t\t\tassert.NoError(t, err, \"failed to write .trivyignore\")\n\t\t\t\tdefer os.Remove(trivyIgnore)\n\t\t\t}\n\n\t\t\tif len(tt.args.filePatterns) != 0 {\n\t\t\t\tfor _, filePattern := range tt.args.filePatterns {\n\t\t\t\t\tosArgs = append(osArgs, \"--file-patterns\", filePattern)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif len(tt.args.helmSet) != 0 {\n\t\t\t\tfor _, helmSet := range tt.args.helmSet {\n\t\t\t\t\tosArgs = append(osArgs, \"--helm-set\", helmSet)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif len(tt.args.helmValuesFile) != 0 {\n\t\t\t\tfor _, helmValuesFile := range tt.args.helmValuesFile {\n\t\t\t\t\tosArgs = append(osArgs, \"--helm-values\", helmValuesFile)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif len(tt.args.skipFiles) != 0 {\n\t\t\t\tfor _, skipFile := range tt.args.skipFiles {\n\t\t\t\t\tosArgs = append(osArgs, \"--skip-files\", skipFile)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif len(tt.args.skipDirs) != 0 {\n\t\t\t\tfor _, skipDir := range tt.args.skipDirs {\n\t\t\t\t\tosArgs = append(osArgs, \"--skip-dirs\", skipDir)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Setup the output file\n\t\t\toutputFile := filepath.Join(t.TempDir(), \"output.json\")\n\t\t\tif *update && tt.override == nil {\n\t\t\t\toutputFile = tt.golden\n\t\t\t}\n\n\t\t\tif tt.args.listAllPkgs {\n\t\t\t\tosArgs = append(osArgs, \"--list-all-pkgs\")\n\t\t\t}\n\n\t\t\tif tt.args.includeDevDeps {\n\t\t\t\tosArgs = append(osArgs, \"--include-dev-deps\")\n\t\t\t}\n\n\t\t\tif tt.args.secretConfig != \"\" {\n\t\t\t\tosArgs = append(osArgs, \"--secret-config\", tt.args.secretConfig)\n\t\t\t}\n\n\t\t\tosArgs = append(osArgs, \"--output\", outputFile)\n\t\t\tosArgs = append(osArgs, tt.args.input)\n\n\t\t\tclock.SetFakeTime(t, time.Date(2020, 9, 10, 14, 20, 30, 5, time.UTC))\n\t\t\tuuid.SetFakeUUID(t, \"3ff14136-e09f-4df9-80ea-%012d\")\n\n\t\t\t// Run \"trivy repo\"\n\t\t\terr := execute(osArgs)\n\t\t\trequire.NoError(t, err)\n\n\t\t\t// Compare want and got\n\t\t\tswitch format {\n\t\t\tcase types.FormatCycloneDX:\n\t\t\t\tcompareCycloneDX(t, tt.golden, outputFile)\n\t\t\tcase types.FormatSPDXJSON:\n\t\t\t\tcompareSpdxJson(t, tt.golden, outputFile)\n\t\t\tcase types.FormatJSON:\n\t\t\t\tcompareReports(t, tt.golden, outputFile, tt.override)\n\t\t\tdefault:\n\t\t\t\trequire.Fail(t, \"invalid format\", \"format: %s\", format)\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "52395b6ae23954c10938034c87414599", "score": "0.56081253", "text": "func (m *MockGithubApiService) GetRepository(ctx context.Context, repository, owner string) (interface{}, *error.APPError) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetRepository\", ctx, repository, owner)\n\tret0, _ := ret[0].(interface{})\n\tret1, _ := ret[1].(*error.APPError)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "9571814c65c3f68d7cb4d094c46e8dcc", "score": "0.55890256", "text": "func (r *repository) errRepositoryNotExist() error {\n\thost := r.baseURL\n\tparsed, err := url.Parse(r.baseURL)\n\tif err == nil {\n\t\thost = parsed.Host // try to exclude the scheme and any paths\n\t}\n\treturn ErrRepositoryNotExist{remote: host, gun: r.gun}\n}", "title": "" }, { "docid": "e810a47019146802b4e15d2f416e04d6", "score": "0.5588374", "text": "func (mr *MockRepositoryMockRecorder) Get(ctx interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Get\", reflect.TypeOf((*MockRepository)(nil).Get), ctx)\n}", "title": "" }, { "docid": "5ba4f8631ea034c9817f2cc5040000e5", "score": "0.5570144", "text": "func TestRepoEnvironmentDefaultRepository(t *testing.T) {\n\tre := RepoEnvironment{}\n\t_, str := re.repository()\n\tif str != \"cloud-platform-cli\" {\n\t\tt.Errorf(\"Expected cloud-platform-cli, got: x%sx\", str)\n\t}\n}", "title": "" }, { "docid": "0dc8415184af4213898df4b878de8f0d", "score": "0.55441135", "text": "func TestGetReview(t *testing.T) {\n\tnow := time.Now()\n\tmockReview := model.Review{\n\t\tID: \"63ce552e-b750-4665-acf3-568a2e844a83\",\n\t\tScore: 5,\n\t\tDescription: \"Good!\",\n\t\tBookID: \"52b3637a-6984-401e-84d2-2aa6b9d55665\",\n\t\tCreatedTime: &now,\n\t\tModifiedTime: &now,\n\t\tVersion: 1,\n\t}\n\tmockRepo := new(MockReviewRepository)\n\tmockRepo.On(\"GetReview\", \"63ce552e-b750-4665-acf3-568a2e844a83\").Return(&mockReview, nil)\n\n\tsev := NewReviewService(mockRepo)\n\n\trev, err := sev.GetReview(\"63ce552e-b750-4665-acf3-568a2e844a83\")\n\n\tassert.Nil(t, err, \"should not get any error\")\n\tassert.Equal(t, \"63ce552e-b750-4665-acf3-568a2e844a83\", rev.ID, \"review ID should be the one that return from repo\")\n\tassert.Equal(t, 5, rev.Score, \"score should be the one that return from repo\")\n\tassert.Equal(t, mockReview.CreatedTime, rev.CreatedTime, \"CreatedTime should be the one that return from repo\")\n\tassert.Equal(t, mockReview.ModifiedTime, rev.ModifiedTime, \"ModifiedTime should be the one that return from repo\")\n\tassert.Equal(t, 1, rev.Version, \"Version should be the one that return from repo\")\n\n\tmockRepo.AssertExpectations(t)\n}", "title": "" }, { "docid": "2f3405d60f87825659cd274b2528a231", "score": "0.5502869", "text": "func (g *GitlabClient) GetUserRepos() {\n\n}", "title": "" }, { "docid": "66f11e78e65ed2b41066e91886cbf8bb", "score": "0.54852426", "text": "func (_m *MockStore) Get(ctx context.Context, organizationID uint, repository Repository) (_result_0 Repository, _result_1 error) {\n\tret := _m.Called(ctx, organizationID, repository)\n\n\tvar r0 Repository\n\tif rf, ok := ret.Get(0).(func(context.Context, uint, Repository) Repository); ok {\n\t\tr0 = rf(ctx, organizationID, repository)\n\t} else {\n\t\tr0 = ret.Get(0).(Repository)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, uint, Repository) error); ok {\n\t\tr1 = rf(ctx, organizationID, repository)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "817e13f2ba7172c5281f1ebe2dfa7072", "score": "0.5482116", "text": "func (g *RepoGetter) Get(path string) (*api.Repo, error) {\n\tg.ArgPath = path\n\treturn g.ReturnsRepo, g.Err\n}", "title": "" }, { "docid": "a76f362d57edc11fd174ed6aa95a0bcc", "score": "0.5474785", "text": "func (mr *MockRepositoryMockRecorder) Get(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Get\", reflect.TypeOf((*MockRepository)(nil).Get), arg0)\n}", "title": "" }, { "docid": "270cc01605d66ef5c63996de8ef246ce", "score": "0.5459708", "text": "func (ws *workflowService) testRepo(ctx context.Context, repoURL, username, accessToken string) error {\n\trdl := ws.env.GetRepoDownloader()\n\tif rdl != nil {\n\t\treturn rdl.TestRepoAccess(ctx, repoURL, username, accessToken)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3512b0fa91508b81555d72647629f673", "score": "0.5424849", "text": "func (s *UserTestSuite) TestUserRepo_Get_Empty() {\n\trows := sqlmock.NewRows(nil)\n\tconst sql = `SELECT (.+) FROM \"users\"`\n\ts.mock.ExpectQuery(sql).WithArgs(0).WillReturnRows(rows)\n\n\tuser, err := s.repository.Get(0)\n\trequire.True(s.T(), user == nil)\n\trequire.True(s.T(), err != nil)\n}", "title": "" }, { "docid": "d546d295aa6efd142f8893ef40e69b49", "score": "0.5413969", "text": "func (mr *MockUserRepositoryMockRecorder) Get(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Get\", reflect.TypeOf((*MockUserRepository)(nil).Get), arg0)\n}", "title": "" }, { "docid": "02bc870989c905b95e5c00df04b0123e", "score": "0.54114264", "text": "func testRepo() *library.Repo {\n\tr := new(library.Repo)\n\n\tr.SetID(1)\n\tr.SetOrg(\"github\")\n\tr.SetName(\"octocat\")\n\tr.SetFullName(\"github/octocat\")\n\tr.SetLink(\"https://github.com/github/octocat\")\n\tr.SetClone(\"https://github.com/github/octocat.git\")\n\tr.SetBranch(\"master\")\n\tr.SetTimeout(30)\n\tr.SetVisibility(\"public\")\n\tr.SetPrivate(false)\n\tr.SetTrusted(false)\n\tr.SetActive(true)\n\tr.SetAllowPull(true)\n\tr.SetAllowPush(true)\n\tr.SetAllowDeploy(false)\n\tr.SetAllowTag(false)\n\tr.SetAllowComment(false)\n\n\treturn r\n}", "title": "" }, { "docid": "66902e0dccde9918e78da55f4f86768e", "score": "0.5407925", "text": "func (s *AutograderService) getRepositoryURL(currentUser *pb.User, courseID uint64, repoType pb.Repository_Type) (string, error) {\n\tcourse, err := s.db.GetCourse(courseID, false)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tuserRepoQuery := &pb.Repository{\n\t\tOrganizationID: course.GetOrganizationID(),\n\t\tRepoType: repoType,\n\t}\n\n\tswitch repoType {\n\tcase pb.Repository_USER:\n\t\tuserRepoQuery.UserID = currentUser.GetID()\n\tcase pb.Repository_GROUP:\n\t\tenrol, err := s.db.GetEnrollmentByCourseAndUser(courseID, currentUser.GetID())\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tif enrol.GetGroupID() > 0 {\n\t\t\tuserRepoQuery.GroupID = enrol.GroupID\n\t\t}\n\t}\n\n\trepos, err := s.db.GetRepositories(userRepoQuery)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tif len(repos) != 1 {\n\t\treturn \"\", fmt.Errorf(\"found %d repositories for query %+v\", len(repos), userRepoQuery)\n\t}\n\treturn repos[0].HTMLURL, nil\n}", "title": "" }, { "docid": "579122ddc76ad403da38bd0820481f47", "score": "0.5398467", "text": "func TestRepo_InDemand(t *testing.T) {\n\tfor _, rt := range repoTests {\n\t\tr := &Repo{git: rt.git}\n\t\tif r.InDemand(rt.strategy) {\n\t\t\tif !rt.inDemand {\n\t\t\t\tt.Errorf(\"Expected no update with repository %#v and strategy %#v\", rt.git, rt.strategy)\n\t\t\t}\n\t\t} else if rt.inDemand {\n\t\t\tt.Errorf(\"Expected an update with repository %#v and strategy %#v\", rt.git, rt.strategy)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "451da5b37196bea71854e94a714b4eaf", "score": "0.5373709", "text": "func TestMockGetNonExisting(t *testing.T) {\n\tmp := mockProvider{}\n\n\t_, err := mp.Get(service, user+\"fake\")\n\tif err != ErrNotFound {\n\t\tt.Errorf(\"Expected error ErrNotFound, got %s\", err)\n\t}\n}", "title": "" }, { "docid": "4ab0b2cfc347395f76fc3d7161710089", "score": "0.5345333", "text": "func (s *AutograderService) isEmptyRepo(ctx context.Context, sc scm.SCM, request *pb.RepositoryRequest) error {\n\tcourse, err := s.db.GetCourse(request.GetCourseID(), false)\n\tif err != nil {\n\t\treturn err\n\t}\n\trepos, err := s.db.GetRepositories(&pb.Repository{OrganizationID: course.GetOrganizationID(), UserID: request.GetUserID(), GroupID: request.GetGroupID()})\n\tif err != nil {\n\t\treturn err\n\t}\n\tif len(repos) < 1 {\n\t\treturn fmt.Errorf(\"no repositories found\")\n\t}\n\treturn isEmpty(ctx, sc, repos)\n}", "title": "" }, { "docid": "b451b9edbca28d7a89ae783699f950d3", "score": "0.5339606", "text": "func (repository *Repository) Test() ([]byte, error) {\n\treturn repository.request.Identify()\n}", "title": "" }, { "docid": "16bc5d78173b01d1ab2827fc891c73d8", "score": "0.5330368", "text": "func (mr *MockGithubInterfaceMockRecorder) GetRepositories(gitSource, user, gitOrgRef interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetRepositories\", reflect.TypeOf((*MockGithubInterface)(nil).GetRepositories), gitSource, user, gitOrgRef)\n}", "title": "" }, { "docid": "73b1214e4a0e170944380d8264218a83", "score": "0.531574", "text": "func (s *RepositoryService) Get(ctx context.Context, svc string, repo string) (*Repository, error) {\n\turl := fmt.Sprintf(\"%s/repos/%s/%s\", s.client.baseURL, svc, repo)\n\n\tresp, err := s.client.client.R().\n\t\tSetContext(ctx).\n\t\tSetResult(&Repository{}).\n\t\tGet(url)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp.Result().(*Repository), nil\n}", "title": "" }, { "docid": "518987897a3085fe3c6a1292113dc79f", "score": "0.5297656", "text": "func TestRepos_GetByID_existing(t *testing.T) {\n\tgithubcli.Config.GitHubHost = \"github.com\"\n\tctx := testContext(&minimalClient{\n\t\trepos: mockGitHubRepos{\n\t\t\tGetByID_: func(id int) (*github.Repository, *github.Response, error) {\n\t\t\t\treturn &github.Repository{\n\t\t\t\t\tID: github.Int(123),\n\t\t\t\t\tName: github.String(\"repo\"),\n\t\t\t\t\tFullName: github.String(\"owner/repo\"),\n\t\t\t\t\tOwner: &github.User{ID: github.Int(1)},\n\t\t\t\t\tCloneURL: github.String(\"https://github.com/owner/repo.git\"),\n\t\t\t\t}, nil, nil\n\t\t\t},\n\t\t},\n\t})\n\n\trepo, err := (&Repos{}).GetByID(ctx, 123)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tif repo == nil {\n\t\tt.Error(\"repo == nil\")\n\t}\n\tif want := int32(123); repo.GitHubID != want {\n\t\tt.Errorf(\"got %d, want %d\", repo.GitHubID, want)\n\t}\n}", "title": "" }, { "docid": "df48d3ae76f0056c8dd84db390adc4e3", "score": "0.52922446", "text": "func (mr *MockRepoMockRecorder) GetGitRepo() *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetGitRepo\", reflect.TypeOf((*MockRepo)(nil).GetGitRepo))\n}", "title": "" }, { "docid": "6ece64f438a55e325e633fa7972ea967", "score": "0.52525043", "text": "func (m *MockRepositoriesService) Get(arg0 context.Context, arg1, arg2 string) (*github.Repository, *github.Response, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Get\", arg0, arg1, arg2)\n\tret0, _ := ret[0].(*github.Repository)\n\tret1, _ := ret[1].(*github.Response)\n\tret2, _ := ret[2].(error)\n\treturn ret0, ret1, ret2\n}", "title": "" }, { "docid": "7739946cfc5ac089d4a60fc7ac2f8685", "score": "0.5233171", "text": "func (h *Instance) GetRepository(repo string) ([]flux.ImageDescription, error) {\n\treturn h.registry.GetRepository(repo)\n}", "title": "" }, { "docid": "0c340016d095ae1ec1be23febef2f4ac", "score": "0.5224824", "text": "func (d *repoData) GetRepo(name, owner string) (*domain.Repo, error) {\n\tlog.Info.Printf(\"Retrieving repo %s owned by %s\\n\", name, owner)\n\tqueryTemplate := `\n MATCH (r:Repo {name: $name})\n MATCH (o:User {username: $username})\n MATCH (o)-[:OWNS]->(r) RETURN %s, %s\n `\n\tquery := fmt.Sprintf(queryTemplate, repoFields, ownerFields)\n\n\tsession := d.db.NewSession(neo4j.SessionConfig{})\n\tdefer session.Close()\n\n\tdata, err := session.Run(query, map[string]interface{}{\n\t\t\"name\": name,\n\t\t\"username\": owner,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trecord, err := data.Single()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &domain.Repo{\n\t\tExternalID: int(record.Values[0].(float64)),\n\t\tName: record.Values[1].(string),\n\t\tFullName: record.Values[2].(string),\n\t\tHTMLUrl: record.Values[3].(string),\n\t\tURL: record.Values[4].(string),\n\t\tContributorsURL: record.Values[5].(string),\n\t\tIssuesURL: record.Values[6].(string),\n\t\tLanguagesURL: record.Values[7].(string),\n\t\tOwner: &domain.User{\n\t\t\tUsername: record.Values[8].(string),\n\t\t\tExternalID: int(record.Values[9].(float64)),\n\t\t\tUserURL: record.Values[10].(string),\n\t\t\tFollowersURL: record.Values[11].(string),\n\t\t\tFollowingURL: record.Values[12].(string),\n\t\t\tReposURL: record.Values[13].(string),\n\t\t\tType: record.Values[14].(string),\n\t\t\tSiteAdmin: record.Values[15].(bool),\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "f84327854e0ad5d59c053ed0b6492b3d", "score": "0.5224437", "text": "func checkR11nHasRepo(repo string) func(*QueuedR11n) error {\n\treturn func(qr *QueuedR11n) error {\n\t\tgot := qr.Rectification.Pair.Post.Deployment.SourceID.Location.Repo\n\t\tif got != repo {\n\t\t\treturn fmt.Errorf(\"got %q; want %q\", got, repo)\n\t\t}\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "e33a02532a231b7d94b1235797f86ba8", "score": "0.5212124", "text": "func TestRepositoriesExtensible(t *testing.T) {\n\troot := \"testdata/example.com/testRepositoriesExtensible\"\n\tdefer Using(t, root)()\n\n\tclient := fn.New(\n\t\tfn.WithRepositories(\"testdata/repositories\"),\n\t\tfn.WithRegistry(TestRegistry))\n\n\t// Create a Function specifying a template which only exists in the extensible set\n\tif err := client.New(context.Background(), fn.Function{Root: root, Runtime: \"test\", Template: \"customTemplateRepo/tplc\"}); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Ensure that a file from that only exists in that template set was actually written 'json.js'\n\tif _, err := os.Stat(filepath.Join(root, \"customtpl.txt\")); os.IsNotExist(err) {\n\t\tt.Fatalf(\"Initializing a custom did not result in customtpl.txt being written to '%v'\", root)\n\t} else if err != nil {\n\t\tt.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "c380deddb5f5be6442ec0e7e7c554602", "score": "0.5204623", "text": "func (r *Repository) GitRepo() *gogit.Repository { return r.git }", "title": "" }, { "docid": "f9af7a2a9f4100dd51aec2406adbe0e5", "score": "0.51984817", "text": "func (restic *Restic) Check(profile *ProfileConfiguration) (string, error) {\n\n\treturn restic.simpleRepoOperation(profile,\n\t\t\"check\",\n\t\t\"Checking repository\",\n\t)\n}", "title": "" }, { "docid": "c1218f7690ff836519e6b5efa92acdaa", "score": "0.5182474", "text": "func (mr *MockShortLinkRepositoryMockRecorder) Get(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Get\", reflect.TypeOf((*MockShortLinkRepository)(nil).Get), arg0)\n}", "title": "" }, { "docid": "a7bf676b1a02a69e79f3368569d99604", "score": "0.5178357", "text": "func (db *BoltLeaseDB) GetRepositoryEnabled(ctx context.Context, repository string) bool {\n\tenabled := true\n\tdb.store.View(func(txn *bolt.Tx) error {\n\t\tt0 := time.Now()\n\n\t\tdisabledRepos := txn.Bucket([]byte(\"disabled_repos\"))\n\n\t\tif disabledRepos.Get([]byte(repository)) != nil {\n\t\t\tenabled = false\n\t\t}\n\n\t\tgw.LogC(ctx, \"leasedb_bolt\", gw.LogDebug).\n\t\t\tStr(\"operation\", \"get_repo_enabled\").\n\t\t\tDur(\"task_dt\", time.Since(t0)).\n\t\t\tStr(\"repository\", repository).\n\t\t\tBool(\"enabled\", enabled).\n\t\t\tMsgf(\"repository status queried\")\n\n\t\treturn nil\n\t})\n\n\treturn enabled\n}", "title": "" }, { "docid": "7bace9e6f23874beca1c2d93298e0361", "score": "0.51771736", "text": "func (s *RepositoriesOp) Get(ctx context.Context, repoID int) (*Repository, *http.Response, error) {\n\tpath := fmt.Sprintf(\"%s/%d\", repositoriesPath, repoID)\n\n\treq, err := s.client.NewRequest(ctx, http.MethodGet, path, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\trepo := new(Repository)\n\tresp, err := s.client.Do(ctx, req, repo)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn repo, resp, err\n}", "title": "" }, { "docid": "0cc44d779e9f5b667a049a935d945164", "score": "0.51654744", "text": "func (c *client) getRepo(org, repo, path string) (*api.Secret, error) {\n\treturn c.get(fmt.Sprintf(\"%s/%s/%s/%s/%s\", c.config.Prefix, constants.SecretRepo, org, repo, path))\n}", "title": "" }, { "docid": "2052c871efc21f1183589f00984e8c87", "score": "0.51615375", "text": "func (db *SqliteLeaseDB) GetRepositoryEnabled(ctx context.Context, repository string) bool {\n\tt0 := time.Now()\n\n\tenabled := true\n\n\trow := db.st.getDisabledRepo.QueryRow(repository)\n\tvar n string\n\tif row.Scan(&n) != sql.ErrNoRows {\n\t\tenabled = false\n\t}\n\n\tgw.LogC(ctx, \"leasedb_sqlite\", gw.LogDebug).\n\t\tStr(\"operation\", \"get_repo_enabled\").\n\t\tDur(\"task_dt\", time.Since(t0)).\n\t\tStr(\"repository\", repository).\n\t\tBool(\"enabled\", enabled).\n\t\tMsgf(\"repository status queried\")\n\n\treturn enabled\n}", "title": "" }, { "docid": "955cc169c5b32918e289c310a2a7efbb", "score": "0.51467264", "text": "func (driver GitlabCodeHostingDriver) GetRepositoryURL(repository string) string {\n\treturn \"https://gitlab.com/\" + repository\n}", "title": "" }, { "docid": "4a8f3d6d85174750313ec278df20edf7", "score": "0.51363933", "text": "func (r *Registry) GetRepository(repositorySpec string) (*models.GetRepo, error) {\n\tparams := repository.NewGetRepoParamsWithTimeout(DefaultTimeout)\n\tparams.Repository = repositorySpec\n\n\tresponse, err := r.client.Repository.GetRepo(params, r.getAuth())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn response.Payload, nil\n}", "title": "" }, { "docid": "3cafdc41455ad6e3858cda31d4ab08ba", "score": "0.5136142", "text": "func (c Commerce) GetRepository() string {\n\treturn internal.LpnConfig.GetPortalImageName(\"commerce\")\n}", "title": "" }, { "docid": "326e03a60b66480ab5d28f73770cf0fa", "score": "0.51284224", "text": "func (mr *MockGitRepoMockRecorder) GetRepoType() *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetRepoType\", reflect.TypeOf((*MockGitRepo)(nil).GetRepoType))\n}", "title": "" }, { "docid": "733bd0eb8fae209ec6cc11b832b4137e", "score": "0.51220185", "text": "func TestNewRepository(t *testing.T) {\n\tr, err := NewRepository(testBaseDir)\n\n\t// something wrong with constructor\n\tif err != nil {\n\t\tt.Errorf(\"could not create the directories\")\n\t}\n\n\t// check basedir is set\n\tif r.Basedir() != testBaseDir {\n\t\tt.Errorf(\"basedir not set\")\n\t}\n\n\t// check basedir created\n\tif _, err := os.Stat(testBaseDir); os.IsNotExist(err) {\n\t\tt.Errorf(\"basedir wasn't created\")\n\t}\n\n\t// check that there are two subdirs\n\tif len(ValidSubdirs) != 2 {\n\t\tt.Errorf(\"should be local and cache subdirs\")\n\t}\n\n\t// check that we can retrieve them\n\tsearchPath := r.SearchPath()\n\tif len(searchPath) != 2 {\n\t\tt.Errorf(\"should be able to get subdirs\")\n\t}\n\n\t// check that they were created\n\tfor _, subdir := range searchPath {\n\t\tif _, err := os.Stat(subdir); os.IsNotExist(err) {\n\t\t\tt.Errorf(\"did not create subdir\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "ed0b6a48b366695d53cb8b6ce4f3385b", "score": "0.512139", "text": "func readRepo(source string, options stringSet, preferred *VCS, extractor Extractor, quiet bool) (*Repository, error) {\n\tif logEnable(logSHUFFLE) {\n\t\tlegend := \"nil\"\n\t\tif extractor != nil {\n\t\t\tlegend = \"non-nil\"\n\t\t}\n\t\tif preferred != nil {\n\t\t\trespond(\"looking for a %s repo at %s (extractor %s...\", preferred.name, source, legend)\n\t\t} else {\n\t\t\trespond(\"reposurgeon: looking for any repo at %s (extractor %s)...\", source, legend)\n\t\t}\n\t}\n\t// Trickier-than-it-looks department:\n\t// There are three cases here.\n\t// 1. extractor and preferred both non-nil. Use the extractor if there's a matching repo here.\n\t// 2. preferred is non-nil. Use that type if there's a matching repo here.\n\t// 3. extractor and preferred both nil. Look for anything we can read.\n\tvar vcs *VCS\n\tif extractor != nil || preferred != nil {\n\t\tif preferred.manages(source) {\n\t\t\tvcs = preferred // if extractor is non-null it gets picked up below\n\t\t} else {\n\t\t\treturn nil, fmt.Errorf(\"couldn't find a repo of desiret type %s under %s\", preferred.name, abspath(source))\n\t\t}\n\t} else {\n\t\thitcount := 0\n\t\tfor i, possible := range vcstypes {\n\t\t\tif possible.manages(source) {\n\t\t\t\tvcs = &vcstypes[i]\n\t\t\t\thitcount++\n\t\t\t}\n\t\t}\n\t\tif hitcount == 0 {\n\t\t\treturn nil, fmt.Errorf(\"couldn't find a repo under %s\", abspath(source))\n\t\t} else if hitcount > 1 {\n\t\t\treturn nil, fmt.Errorf(\"too many repos (%d) under %s\", hitcount, abspath(source))\n\t\t}\n\t\t// There's only one base match, and vcs is set. Forward to a matching extractor if need be\n\t\tif vcs.exporter == \"\" {\n\t\t\tfor _, possible := range importers {\n\t\t\t\tif possible.basevcs.manages(source) {\n\t\t\t\t\textractor = possible.engine\n\t\t\t\t}\n\t\t\t}\n\t\t\tif extractor == nil {\n\t\t\t\treturn nil, fmt.Errorf(\"couldn't find an exporter matching %s under %s\", vcs.name, abspath(source))\n\t\t\t}\n\t\t}\n\t}\n\tif logEnable(logSHUFFLE) {\n\t\tlegend := \"base\"\n\t\tif extractor != nil {\n\t\t\tlegend = \"extractor\"\n\t\t}\n\t\tif logEnable(logSHUFFLE) {\n\t\t\tlogit(\"found %s repository (%s)\", vcs.name, legend)\n\t\t}\n\t}\n\trepo := newRepository(\"\")\n\trepo.sourcedir = source\n\there, err := os.Getwd()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"readRepo is disoriented: %v\", err)\n\t}\n\tif logEnable(logSHUFFLE) {\n\t\tlogit(\"current directory is %q\", here)\n\t}\n\tchdir := func(directory string, legend string) {\n\t\tos.Chdir(directory)\n\t\tif logEnable(logSHUFFLE) {\n\t\t\tlogit(\"changing directory to %s: %s\", legend, directory)\n\t\t}\n\t}\n\tdefer chdir(here, \"original\")\n\tchdir(repo.sourcedir, \"repository directory\")\n\t// We found a matching custom extractor\n\tif extractor != nil {\n\t\trepo.stronghint = true\n\t\tstreamer := newRepoStreamer(extractor, control.flagOptions[\"progress\"])\n\t\trepo, err := streamer.extract(repo, vcs)\n\t\treturn repo, err\n\t}\n\t// We found a matching VCS type\n\tif vcs != nil {\n\t\trepo.hint(\"\", vcs.name, true)\n\t\trepo.preserveSet = vcs.preserve\n\t\tsuppressBaton := control.flagOptions[\"progress\"] && repo.exportStyle().Contains(\"export-progress\")\n\t\tcommandControl := map[string]string{\"basename\": filepath.Base(repo.sourcedir)}\n\t\tmapper := func(sub string) string {\n\t\t\tfor k, v := range commandControl {\n\t\t\t\tfrom := \"${\" + k + \"}\"\n\t\t\t\tsub = strings.Replace(sub, from, v, -1)\n\t\t\t}\n\t\t\treturn sub\n\t\t}\n\t\tcmd := os.Expand(repo.vcs.exporter, mapper)\n\t\ttp, _, err := readFromProcess(cmd)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\trepo.fastImport(context.TODO(), tp, options, source)\n\t\ttp.Close()\n\t\tif suppressBaton {\n\t\t\tcontrol.flagOptions[\"progress\"] = true\n\t\t}\n\t\tif repo.vcs.authormap != \"\" && exists(repo.vcs.authormap) {\n\t\t\tif logEnable(logSHOUT) {\n\t\t\t\tlogit(\"reading author map.\")\n\t\t\t}\n\t\t\tfp, err := os.Open(repo.vcs.authormap)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\trepo.readAuthorMap(repo.all(), fp)\n\t\t\tfp.Close()\n\t\t}\n\t\tlegacyMap := vcs.subdirectory + \"/legacy_map\"\n\t\tlegacyMap = filepath.FromSlash(legacyMap)\n\t\tif exists(legacyMap) {\n\t\t\trfp, err := os.Open(legacyMap)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\trepo.readLegacyMap(rfp)\n\t\t\trfp.Close()\n\t\t}\n\t\tif vcs.pathlister != \"\" {\n\t\t\tregistered := newOrderedStringSet()\n\t\t\tstdout, cmd, err := readFromProcess(vcs.pathlister)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\t// Get the names of all files under version control\n\t\t\tr := bufio.NewReader(stdout)\n\t\t\tfor {\n\t\t\t\tline, err2 := r.ReadString(byte('\\n'))\n\t\t\t\tif err2 == io.EOF {\n\t\t\t\t\tif cmd != nil {\n\t\t\t\t\t\tcmd.Wait()\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t} else if err2 != nil {\n\t\t\t\t\treturn nil, fmt.Errorf(\"while collecting file manifestL %v\", err2)\n\t\t\t\t}\n\t\t\t\tregistered = append(registered, strings.TrimSpace(line))\n\t\t\t}\n\t\t\tstdout.Close()\n\t\t\t// Get the names of all files except those in the\n\t\t\t// repository metadata directory and reposurgeon\n\t\t\t// scratch directories\n\t\t\tvar allfiles = newOrderedStringSet()\n\t\t\terr = filepath.Walk(\".\", func(path string, info os.FileInfo, err error) error {\n\t\t\t\tif err != nil {\n\t\t\t\t\tcroak(\"path access failure %q: %v\", path, err)\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tif info.IsDir() && (info.Name() == vcs.subdirectory || strings.HasPrefix(info.Name(), \".rs\")) {\n\t\t\t\t\treturn filepath.SkipDir\n\t\t\t\t}\n\t\t\t\tallfiles = append(allfiles, path)\n\t\t\t\treturn nil\n\t\t\t})\n\t\t\t// Compute the things to preserve\n\t\t\trepo.preserveSet = repo.preserveSet.Union(allfiles.Subtract(registered))\n\t\t}\n\t\t// kluge: git-specific hook\n\t\tif repo.vcs.name == \"git\" {\n\t\t\tif exists(\".git/cvs-revisions\") {\n\t\t\t\tif logEnable(logSHOUT) {\n\t\t\t\t\tlogit(\"reading cvs-revisions map.\")\n\t\t\t\t}\n\t\t\t\ttype pathRev struct {\n\t\t\t\t\tpath string\n\t\t\t\t\trev string\n\t\t\t\t}\n\t\t\t\tpathRevToHash := make(map[pathRev]string)\n\t\t\t\t// Pass 1: Get git's path/revision to\n\t\t\t\t// hash mapping\n\t\t\t\tfp, err := os.Open(\".git/cvs-revisions\")\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\tdefer fp.Close()\n\t\t\t\tr := bufio.NewReader(fp)\n\t\t\t\tfor {\n\t\t\t\t\tline, err1 := r.ReadString(byte('\\n'))\n\t\t\t\t\tif err1 == io.EOF {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t} else if err1 != nil {\n\t\t\t\t\t\treturn nil, fmt.Errorf(\"reading cvs-revisions map: %v\", err1)\n\t\t\t\t\t}\n\n\t\t\t\t\tfields := strings.Fields(line)\n\t\t\t\t\tpathrev := pathRev{fields[0], fields[1]}\n\t\t\t\t\thashv := fields[2]\n\t\t\t\t\tpathRevToHash[pathrev] = hashv\n\t\t\t\t}\n\t\t\t\t// Pass 2: get git's hash to\n\t\t\t\t// (time,person) mapping\n\t\t\t\thashToAction := make(map[string]string)\n\t\t\t\tstampSet := make(map[string]bool)\n\t\t\t\tfp2, _, err2 := readFromProcess(\"git log --all --format='%H %ct %ce'\")\n\t\t\t\tif err2 != nil {\n\t\t\t\t\treturn nil, err2\n\t\t\t\t}\n\t\t\t\tr2 := bufio.NewReader(fp2)\n\t\t\t\tfor {\n\t\t\t\t\tline, err2 := r2.ReadString(byte('\\n'))\n\t\t\t\t\tif err2 == io.EOF {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t} else if err2 != nil {\n\t\t\t\t\t\treturn nil, fmt.Errorf(\"reading cvs-revisions map: %v\", err2)\n\t\t\t\t\t}\n\n\t\t\t\t\tfields := strings.Fields(line)\n\t\t\t\t\thashv := fields[0]\n\t\t\t\t\tctime := fields[1]\n\t\t\t\t\tcperson := fields[2]\n\t\t\t\t\tinttime, err3 := strconv.Atoi(ctime)\n\t\t\t\t\tif err3 != nil {\n\t\t\t\t\t\treturn nil, fmt.Errorf(\"while reang git hash mapping: %v\", err3)\n\t\t\t\t\t}\n\t\t\t\t\tstamp := rfc3339(time.Unix(int64(inttime), 0))\n\t\t\t\t\tstamp += \"!\" + cperson\n\t\t\t\t\tif stampSet[stamp] {\n\t\t\t\t\t\tcroak(\"more than one commit matches %s (%s)\",\n\t\t\t\t\t\t\tstamp, hashv)\n\n\t\t\t\t\t\tdelete(hashToAction, hashv)\n\t\t\t\t\t} else {\n\t\t\t\t\t\thashToAction[hashv] = stamp\n\t\t\t\t\t\tstampSet[stamp] = true\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\t// Pass 3: build a time+person\n\t\t\t\t// to commit mapping.\n\t\t\t\tactionToCommit := make(map[string]*Commit)\n\t\t\t\tfor _, commit := range repo.commits(nil) {\n\t\t\t\t\tactionToCommit[commit.committer.actionStamp()] = commit\n\t\t\t\t}\n\t\t\t\t// Pass 4: use it to set commit properties\n\t\t\t\tfor pathrev, value := range pathRevToHash {\n\t\t\t\t\tif stamp, ok := hashToAction[value]; ok {\n\t\t\t\t\t\tactionToCommit[stamp].legacyID = fmt.Sprintf(\"CVS:%s:%s\", pathrev.path, pathrev.rev)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn repo, nil\n}", "title": "" }, { "docid": "40278e7ecfe13525a8b3e43ad8a082e4", "score": "0.5104633", "text": "func CallerRepository() string {\n\treturn callerRepository(2)\n}", "title": "" }, { "docid": "42940882658b548041e62c513af7c87d", "score": "0.5101202", "text": "func (mr *MockUserRepositoryMockRecorder) Get(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Get\", reflect.TypeOf((*MockUserRepository)(nil).Get), id)\n}", "title": "" }, { "docid": "5149d04481b4f73959074b2ed584e64c", "score": "0.5091845", "text": "func GetRepositoryDetails(owner, repo string) (*Repository, error) {\n\tclient := github.NewClient(nil)\n\trepository, _, err := client.Repositories.Get(context.Background(), owner, repo)\n\tif repository == nil {\n\t\treturn nil, err\n\t}\n\n\tr := &Repository{\n\t\tStargazersCount: repository.StargazersCount,\n\t}\n\treturn r, err\n}", "title": "" }, { "docid": "eca9c28d89df2d754596a82499558299", "score": "0.50911593", "text": "func GetGitLabRepository(ctx context.Context, args protocol.RepoLookupArgs) (repo *protocol.RepoInfo, authoritative bool, err error) {\n\tif GetGitLabRepositoryMock != nil {\n\t\treturn GetGitLabRepositoryMock(args)\n\t}\n\n\tghrepoToRepoInfo := func(proj *gitlab.Project, conn *gitlabConnection) *protocol.RepoInfo {\n\t\treturn &protocol.RepoInfo{\n\t\t\tName: gitlabProjectToRepoPath(conn, proj),\n\t\t\tExternalRepo: gitlab.ExternalRepoSpec(proj, *conn.baseURL),\n\t\t\tDescription: proj.Description,\n\t\t\tFork: proj.ForkedFromProject != nil,\n\t\t\tArchived: proj.Archived,\n\t\t\tVCS: protocol.VCSInfo{\n\t\t\t\tURL: conn.authenticatedRemoteURL(proj),\n\t\t\t},\n\t\t\tLinks: &protocol.RepoLinks{\n\t\t\t\tRoot: proj.WebURL,\n\t\t\t\tTree: proj.WebURL + \"/tree/{rev}/{path}\",\n\t\t\t\tBlob: proj.WebURL + \"/blob/{rev}/{path}\",\n\t\t\t\tCommit: proj.WebURL + \"/commit/{commit}\",\n\t\t\t},\n\t\t}\n\t}\n\n\tconn, err := getGitLabConnection(args)\n\tif err != nil {\n\t\treturn nil, true, err // refers to a GitLab repo but the host is not configured\n\t}\n\tif conn == nil {\n\t\treturn nil, false, nil // refers to a non-GitLab repo\n\t}\n\n\tif args.ExternalRepo != nil && args.ExternalRepo.ServiceType == gitlab.ServiceType {\n\t\t// Look up by external repository spec.\n\t\tid, err := strconv.Atoi(args.ExternalRepo.ID)\n\t\tif err != nil {\n\t\t\treturn nil, true, err\n\t\t}\n\t\tproj, err := conn.client.GetProject(ctx, id, \"\")\n\t\tif proj != nil {\n\t\t\trepo = ghrepoToRepoInfo(proj, conn)\n\t\t}\n\t\treturn repo, true, err\n\t}\n\n\tif args.Repo != \"\" {\n\t\t// Look up by repository name.\n\t\tpathWithNamespace := strings.TrimPrefix(strings.ToLower(string(args.Repo)), conn.baseURL.Hostname()+\"/\")\n\t\tproj, err := conn.client.GetProject(ctx, 0, pathWithNamespace)\n\t\tif proj != nil {\n\t\t\trepo = ghrepoToRepoInfo(proj, conn)\n\t\t}\n\t\treturn repo, true, err\n\t}\n\n\treturn nil, true, fmt.Errorf(\"unable to look up GitLab repository (%+v)\", args)\n}", "title": "" }, { "docid": "7e4e3c739a5e6114137d44c919917047", "score": "0.5088471", "text": "func getRepository() documents.Repository {\n\treturn &repository{\n\t\tdocuments.LevelDBRepository{\n\t\t\tKeyPrefix: \"invoice\",\n\t\t\tLevelDB: storage.GetLevelDBStorage(),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "01f16be4192625f54cfefa8013295890", "score": "0.508846", "text": "func (handler *gitHandler) isGitTypeRepositoryURL() bool {\n\treturn !handler.isHTTPTypeRepositoryURL()\n}", "title": "" }, { "docid": "8afbf4dcaf30f4fdaf5e1a66077c5b4d", "score": "0.50828165", "text": "func (mr *MockRepositoriesServiceMockRecorder) Get(arg0, arg1, arg2 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Get\", reflect.TypeOf((*MockRepositoriesService)(nil).Get), arg0, arg1, arg2)\n}", "title": "" }, { "docid": "c8b8105ebf25f6e1a13a3459131f7af0", "score": "0.5069785", "text": "func (s *RepoService) Get(path string) (*api.Repo, error) {\n\treturn s.Getter.Get(path)\n}", "title": "" }, { "docid": "0c3c406afcbd235146c29f82f85b76be", "score": "0.50572985", "text": "func (gh *GitHub) RepoDetails(ctx context.Context, name string) (Repository, error) {\n\tvar repo Repository\n\tlog := log.WithField(\"repo\", name)\n\n\tvar etag string\n\tetagKey := name + \"_etag\"\n\n\tif err := gh.cache.Get(etagKey, &etag); err != nil {\n\t\tlog.WithError(err).Warnf(\"failed to get %s from cache\", etagKey)\n\t}\n\n\tresp, err := gh.makeRepoRequest(ctx, name, etag)\n\tif err != nil {\n\t\treturn repo, err\n\t}\n\n\tbts, err := io.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn repo, err\n\t}\n\tdefer resp.Body.Close()\n\n\tswitch resp.StatusCode {\n\tcase http.StatusNotModified:\n\t\tlog.Info(\"not modified\")\n\t\teffectiveEtags.Inc()\n\t\terr := gh.cache.Get(name, &repo)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Warnf(\"failed to get %s from cache\", name)\n\t\t\tif err := gh.cache.Delete(etagKey); err != nil {\n\t\t\t\tlog.WithError(err).Warnf(\"failed to delete %s from cache\", etagKey)\n\t\t\t}\n\t\t\treturn gh.RepoDetails(ctx, name)\n\t\t}\n\t\treturn repo, err\n\tcase http.StatusForbidden:\n\t\trateLimits.Inc()\n\t\tlog.Warn(\"rate limit hit\")\n\t\treturn repo, ErrRateLimit\n\tcase http.StatusOK:\n\t\tif err := json.Unmarshal(bts, &repo); err != nil {\n\t\t\treturn repo, err\n\t\t}\n\t\tif err := gh.cache.Put(name, repo); err != nil {\n\t\t\tlog.WithError(err).Warnf(\"failed to cache %s\", name)\n\t\t}\n\n\t\tetag = resp.Header.Get(\"etag\")\n\t\tif etag != \"\" {\n\t\t\tif err := gh.cache.Put(etagKey, etag); err != nil {\n\t\t\t\tlog.WithError(err).Warnf(\"failed to cache %s\", etagKey)\n\t\t\t}\n\t\t}\n\n\t\treturn repo, nil\n\tdefault:\n\t\treturn repo, fmt.Errorf(\"%w: %v\", ErrGitHubAPI, string(bts))\n\t}\n}", "title": "" }, { "docid": "cb88b933dfdc686f2d65812d8160baa7", "score": "0.5052953", "text": "func (wrap *Wrapper) GetRepo(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tID, err := strconv.Atoi(vars[\"repoID\"])\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\trepo := Repo{ID: ID}\n\terr = wrap.db.Select(&repo)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tvar eRepo exports.Repo\n\trepoBytes := []byte(repo.Data)\n\terr = json.Unmarshal(repoBytes, &eRepo)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\taddResponseHeaders(w)\n\n\tif err := jsonapi.MarshalPayload(w, &eRepo); err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "17c527b38386a8b73dc0aec6b61d95d8", "score": "0.50454974", "text": "func (p *PackageServer) GetRepository(repository string) (storage.Repository, error) {\n\treturn p.backend.GetRepository(repository)\n}", "title": "" }, { "docid": "77090d8224b1f5331656df5a4c7c71c4", "score": "0.5040914", "text": "func TestGetUser(t *testing.T) {\n\tctx, done, err := aetest.NewContext()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer done()\n\tkey := datastore.NewKey(ctx, \"User\", \"testertim\", 0, nil)\n\tif _, err := datastore.Put(ctx, key, &models.User{FirstName: \"Tim\"}); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tuser := &models.User{Username: \"nonexistent\"}\n\tif err = repositories.GetUser(ctx, user); err == nil || err.Error() != \"datastore: no such entity\" {\n\t\tt.Errorf(\"Error: %v; want datastore: no such entity\", err)\n\t}\n\n\tuser.Username = \"testertim\"\n\terr = repositories.GetUser(ctx, user)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tif firstName, want := user.FirstName, \"Tim\"; firstName != want {\n\t\tt.Errorf(\"User First Name %d, want %d\", firstName, want)\n\t}\n\n\tif username, want := user.Username, \"testertim\"; username != want {\n\t\tt.Errorf(\"Username %d, want %d\", username, want)\n\t}\n}", "title": "" }, { "docid": "e092398b7b5aab0206f8d45c49d25efc", "score": "0.5037332", "text": "func (mock ExecutionResultViewRepoMock) Get(ctx context.Context, partnerID string, endpointID gocql.UUID, count int, isNOCUser bool) (executionResultsView []*models.ExecutionResultView, err error) {\n\tif isNeedError := ctx.Value(IsNeedError).(bool); isNeedError {\n\t\treturn nil, fmt.Errorf(\"TaskExecutionResultsRepository interrior error\")\n\t}\n\texecutionResultsView, ok := mock.data[endpointID]\n\tif !ok {\n\t\texecutionResultsView = []*models.ExecutionResultView{}\n\t}\n\treturn\n}", "title": "" }, { "docid": "acda596413688a0177504fc7f3941b3e", "score": "0.5022777", "text": "func GetRepoDetails() models.Repo {\n\n\tRepoCM := os.Getenv(\"CHART_MUSEUM_URL\")\n\n\tif RepoCM != \"\" {\n\t\tlog.Printf(\"Fetching repo from CHART_MUSEUM_URL - %s\", RepoCM)\n\t\trepoURL = RepoCM\n\t}\n\n\trepo := models.Repo{ Name: \"demo\", URL: repoURL }\n\tlog.Printf(\"Repository - %s\", repo.URL)\n\n\treturn repo\n}", "title": "" }, { "docid": "24c9b366823471e16036077cafd9cbeb", "score": "0.5020408", "text": "func GetRepository(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *RepositoryState, opts ...pulumi.ResourceOption) (*Repository, error) {\n\tvar resource Repository\n\terr := ctx.ReadResource(\"google-native:dataform/v1beta1:Repository\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "776479d39ca9ccd01bd4a00f3b3740cd", "score": "0.50201446", "text": "func (s *Store) HasRepository(ctx context.Context, repositoryID int) (_ bool, err error) {\n\tctx, endObservation := s.operations.hasRepository.With(ctx, &err, observation.Args{LogFields: []log.Field{\n\t\tlog.Int(\"repositoryID\", repositoryID),\n\t}})\n\tdefer endObservation(1, observation.Args{})\n\n\tcount, _, err := basestore.ScanFirstInt(s.Store.Query(ctx, sqlf.Sprintf(hasRepositoryQuery, repositoryID)))\n\treturn count > 0, err\n}", "title": "" }, { "docid": "d4a783dccc418fe32c7609123645ca9d", "score": "0.50186485", "text": "func TestFeedbackRepositoryBehaviour(s *testcase.Spec) {\n\tgetCtx := GetTxContextForTest\n\n\ts.Describe(`FeedbackRepository#Create`, func(s *testcase.Spec) {\n\t\tsubject := func(t *testcase.T) models.Feedback {\n\t\t\tfeedback := testing_utils.ExampleFeedback()\n\t\t\trequire.Nil(t, GetStorage(t).CreateFeedback(getCtx(t), feedback))\n\t\t\treturn *feedback\n\t\t}\n\t\ts.When(`Life is good`, func(s *testcase.Spec) {\n\t\t\ts.Then(`It should be retrievable`, func(t *testcase.T) {\n\t\t\t\tinserteds := []models.Feedback{subject(t), subject(t), subject(t)}\n\t\t\t\tretrieved, err := GetStorage(t).(FeedbackRepoitoryTester).GetAll(getCtx(t))\n\t\t\t\trequire.Nil(t, err)\n\t\t\t\trequire.ElementsMatch(t, inserteds, retrieved)\n\t\t\t})\n\t\t})\n\t\t// I can't think any edge cases, because Repositories will receive valid models\n\t})\n\n\ts.Describe(`FeedbackRepository#Find`, func(s *testcase.Spec) {\n\t\tsubject := func(t *testcase.T) (models.Feedback, error) {\n\t\t\treturn GetStorage(t).FindFeedback(getCtx(t), GetFeedbackID(t))\n\t\t}\n\t\ts.When(`There are multiple feedbacks beforehand`, func(s *testcase.Spec) {\n\t\t\tFeedbackID.Let(s, nil) //\n\t\t\ts.Before(func(t *testcase.T) {\n\t\t\t\trequire.Nil(t, GetStorage(t).CreateFeedback(getCtx(t), testing_utils.ExampleFeedback()))\n\t\t\t\trequire.Nil(t, GetStorage(t).CreateFeedback(getCtx(t), testing_utils.ExampleFeedback()))\n\t\t\t})\n\t\t\ts.Then(`It should the correct one`, func(t *testcase.T) {\n\t\t\t\tfoundFeedback, err := subject(t)\n\t\t\t\trequire.Nil(t, err)\n\t\t\t\trequire.Equal(t, foundFeedback, *GetFeedback(t))\n\t\t\t})\n\t\t})\n\t\t// TODO: add case for feedback with attachment\n\t})\n\n\ts.Describe(`FeedbackRepository#GetFeedbacksPaginated`, func(s *testcase.Spec) {\n\t\tskip := s.LetValue(`skip`, uint(0))\n\t\tlimit := s.LetValue(`limit`, uint(10))\n\n\t\tsubject := func(t *testcase.T) ([]models.Feedback, error) {\n\t\t\treturn GetStorage(t).GetFeedbacksPaginated(getCtx(t), skip.Get(t).(uint), limit.Get(t).(uint))\n\t\t}\n\t\ts.When(`There are no feedbacks beforehand`, func(s *testcase.Spec) {\n\t\t\ts.Then(`It should return nil slice, no error`, func(t *testcase.T) {\n\t\t\t\tfeedbacks, err := subject(t)\n\t\t\t\trequire.Nil(t, err)\n\t\t\t\trequire.Len(t, feedbacks, 0)\n\t\t\t})\n\t\t})\n\t\ts.When(`There are 10 feedbacks beforehand`, func(s *testcase.Spec) {\n\t\t\tcreateAssertGetFeedback := func(t *testcase.T) models.Feedback {\n\t\t\t\tf := testing_utils.ExampleFeedback()\n\t\t\t\trequire.Nil(t, GetStorage(t).CreateFeedback(getCtx(t), f))\n\t\t\t\treturn *f\n\t\t\t}\n\t\t\tinserteds := []models.Feedback{}\n\t\t\ts.Before(func(t *testcase.T) {\n\t\t\t\tfor i := 0; i < 10; i++ {\n\t\t\t\t\tinserteds = append(inserteds, createAssertGetFeedback(t))\n\t\t\t\t}\n\t\t\t})\n\t\t\t// If 10 inserted, then feched by 3-3, it should get them by 3-3-3-1\n\t\t\ts.Then(`It should return them in correct order.`, func(t *testcase.T) {\n\t\t\t\tvar skipInt int = 0\n\t\t\t\tvar limitInt int = 3\n\t\t\t\tlimit.Set(t, uint(limitInt))\n\t\t\t\tfor skipInt < 10 {\n\t\t\t\t\tskip.Set(t, uint(skipInt))\n\t\t\t\t\tselectedFeedbacks, err := subject(t)\n\t\t\t\t\trequire.Nil(t, err)\n\t\t\t\t\tlengthShouldBe := int(math.Min(float64(len(inserteds)-skipInt), float64(limitInt)))\n\t\t\t\t\trequire.Len(t, selectedFeedbacks, lengthShouldBe, \"GetFeedbacksPaginated did not return correct size slice\")\n\n\t\t\t\t\trequire.ElementsMatch(t, selectedFeedbacks, inserteds[skipInt:skipInt+lengthShouldBe])\n\t\t\t\t\tskipInt += 4 // increment randomly\n\t\t\t\t}\n\t\t\t})\n\t\t})\n\t})\n\n}", "title": "" }, { "docid": "accf91cc668248b1fc3cd29be4741de2", "score": "0.5013027", "text": "func TestCheckRepo(t testing.TB, repo restic.Repository) {\n\tchkr := New(repo)\n\n\thints, errs := chkr.LoadIndex()\n\tif len(errs) != 0 {\n\t\tt.Fatalf(\"errors loading index: %v\", errs)\n\t}\n\n\tif len(hints) != 0 {\n\t\tt.Fatalf(\"errors loading index: %v\", hints)\n\t}\n\n\tdone := make(chan struct{})\n\tdefer close(done)\n\n\t// packs\n\terrChan := make(chan error)\n\tgo chkr.Packs(errChan, done)\n\n\tfor err := range errChan {\n\t\tt.Error(err)\n\t}\n\n\t// structure\n\terrChan = make(chan error)\n\tgo chkr.Structure(errChan, done)\n\n\tfor err := range errChan {\n\t\tt.Error(err)\n\t}\n\n\t// unused blobs\n\tblobs := chkr.UnusedBlobs()\n\tif len(blobs) > 0 {\n\t\tt.Errorf(\"unused blobs found: %v\", blobs)\n\t}\n\n\t// read data\n\terrChan = make(chan error)\n\tgo chkr.ReadData(nil, errChan, done)\n\n\tfor err := range errChan {\n\t\tt.Error(err)\n\t}\n}", "title": "" }, { "docid": "815153fd61494d7700f05df352d2a487", "score": "0.50023943", "text": "func EnsureIsRepository() {\n\tutil.Ensure(IsRepository(), \"This is not a Git repository.\")\n}", "title": "" }, { "docid": "b5f8548499bf6d12d519077f8ee5cbc9", "score": "0.5001827", "text": "func TestGetStarredRepos(t *testing.T) {\n\ttt := map[string]struct {\n\t\tuser string\n\t\ttag string\n\t\tresponseStatus int\n\t\tresponseBody string\n\t}{\n\t\t\"correct_user\": {\"joaopmgd\", \"\", http.StatusOK, \"\"},\n\t\t\"no_user_found\": {\"joaopmgdjoaopmgdjoaopmgdjoaopmgd\", \"\", http.StatusNotFound, \"{\\\"error\\\":\\\"User not found\\\"}\"},\n\t\t\"no_user\": {\"\", \"\", http.StatusNotFound, \"{\\\"error\\\":\\\"User not found\\\"}\"},\n\t\t\"no_tag_found\": {\"joaopmgd\", \"do_not_exist\", http.StatusOK, \"\"},\n\t\t\"tag_found\": {\"joaopmgd\", \"exist\", http.StatusOK, \"\"},\n\t}\n\tfor testName, tc := range tt {\n\n\t\treq, err := http.NewRequest(\"GET\", \"/repos/{user}/starred\", nil)\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\treq = mux.SetURLVars(req, map[string]string{\n\t\t\t\"user\": tc.user,\n\t\t})\n\n\t\tq := req.URL.Query()\n\t\tq.Add(\"tag\", tc.tag)\n\t\tq.Add(\"limit\", \"1\")\n\n\t\treq.URL.RawQuery = q.Encode()\n\t\tresponse := executeRequestTest(req, a.GetAllStarredRepos)\n\n\t\tif response.Code != tc.responseStatus ||\n\t\t\t(response.Code != http.StatusOK && response.Body.String() != tc.responseBody) {\n\t\t\tt.Errorf(\"\\nHandler %s\\nFor user %s\\nGot Status %v and Body %s\\nWant Status %v and Body %s\",\n\t\t\t\ttestName, tc.user, response.Code, response.Body.String(), tc.responseStatus, tc.responseBody)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0f9137f6bb2289daa2aae3d8d245e9ec", "score": "0.49957892", "text": "func (mr *MockusersRepositoryMockRecorder) Get(userID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Get\", reflect.TypeOf((*MockusersRepository)(nil).Get), userID)\n}", "title": "" }, { "docid": "707709eab704efd38b7ced4473e7fe4a", "score": "0.49940395", "text": "func GetRepositoryCrud(w http.ResponseWriter, r *http.Request) (*crud.RepositoryUsersCRUD, error) {\n\t_, db, err := database.Connect() //se conecta a la base de datos ignorando el context mediante el underscore\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusInternalServerError, err)\n\t\treturn nil, err\n\t}\n\tdbnamed := db.Database(config.DBNAME) //obtiene el puntero a la estructura *mongo.Database\n\trepo := crud.NewRepositoryUsersCRUD(dbnamed) //se crea un nuevo repositorio que implementa los metodos de la interfaz userRepository\n\treturn repo, nil\n}", "title": "" }, { "docid": "fb7d092ef4d5a8641bbe8009c4096a4e", "score": "0.49905595", "text": "func getK8sRepo(db *gorm.DB) *models.Repository {\n\tvar repo models.Repository\n\tdb.First(&repo, \"repo = ?\", \"kubernetes\")\n\treturn &repo\n}", "title": "" }, { "docid": "cc3921638202478491cbb156fb13b176", "score": "0.4984991", "text": "func (m *MockRepository) Get(arg0 string) (*ShortURL, error) {\n\tret := m.ctrl.Call(m, \"Get\", arg0)\n\tret0, _ := ret[0].(*ShortURL)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "e2c822a92dca26e7227fb1498a7a3b56", "score": "0.4983292", "text": "func (cloud Cloud) Repositories(metadata bool) ([]common.Repository, error) {\n\tkindSplit := strings.SplitN(cloud.kind, \"/\", 2)\n\tkindType := kindSplit[0]\n\tkindKey := kindSplit[1]\n\n\taccountID := os.Getenv(cloud.accountID)\n\n\tswitch kindType {\n\tcase \"project\":\n\t\tro := bitbucket.RepositoriesOptions{Owner: accountID, Role: \"member\"}\n\t\tresult, err := cloud.api.Repositories.ListForAccount(&ro)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Get project repositories: %v\", err.Error())\n\t\t\treturn nil, err\n\t\t}\n\n\t\trepositories := []common.Repository{}\n\t\tfor _, repo := range result.Items {\n\t\t\tif repo.Project.Key == kindKey {\n\n\t\t\t\trepoBytes, _ := json.MarshalIndent(repo, \"\", \" \")\n\t\t\t\trepoJSON := string(repoBytes)\n\t\t\t\t// fmt.Println(repoJSON)\n\t\t\t\t// Get all metadata for the repository\n\t\t\t\thttpCloneLink := gjson.Get(repoJSON, `Links.clone.#(name%\"http*\").href`).String()\n\t\t\t\tslug := gjson.Get(repoJSON, `Slug`).String()\n\t\t\t\tdescription := gjson.Get(repoJSON, `Description`).String()\n\n\t\t\t\tnewRepo := common.Repository{\n\t\t\t\t\tSlug: slug,\n\t\t\t\t\tSource: httpCloneLink,\n\t\t\t\t\tDescription: description,\n\t\t\t\t}\n\t\t\t\trepositories = append(repositories, newRepo)\n\t\t\t}\n\t\t}\n\t\treturn repositories, nil\n\n\tcase \"user\":\n\t\tro := bitbucket.RepositoriesOptions{Owner: kindKey, Role: \"member\"}\n\t\tresult, err := cloud.api.Repositories.ListForAccount(&ro)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Get repositories: %v\", err.Error())\n\t\t\treturn nil, err\n\t\t}\n\n\t\trepositories := []common.Repository{}\n\t\tfor _, repo := range result.Items {\n\t\t\tnewRepo := common.Repository{\n\t\t\t\tSlug: repo.Slug,\n\t\t\t}\n\t\t\trepositories = append(repositories, newRepo)\n\t\t}\n\t\treturn repositories, nil\n\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"Unsupported kind: %v\", kindType)\n\t}\n}", "title": "" }, { "docid": "cc2b72e5a5ff7cbb491065b15966bfa2", "score": "0.49791452", "text": "func TestGetNonExistent(t *testing.T) {\n\ttaskInterface := fixture(t)\n\n\tif task, err := taskInterface.Get(\"testId\"); err != nil {\n\t\tt.Fatal(\"unexpected error: \", err)\n\t} else if task != nil {\n\t\tt.Fatalf(\"expected nil task but got %v\", task)\n\t}\n}", "title": "" }, { "docid": "ec811b1625be70872d4fd3dce1ab7b1b", "score": "0.49732026", "text": "func TestGetSetBasic(t *testing.T) {\n\tif testing.Short() {\n\t\tt.Skip(\"Skipping integration tests in short mode\")\n\t}\n\tt.Parallel()\n\talice := getPachClient(t, \"alice\")\n\tbob := getPachClient(t, \"bob\")\n\n\t// create repo, and check that alice is the owner of the new repo\n\tdataRepo := uniqueString(\"TestGetSetBasic\")\n\trequire.NoError(t, alice.CreateRepo(dataRepo))\n\trequire.Equal(t, acl(\"alice\", \"owner\"), GetACL(t, alice, dataRepo))\n\n\t// Add data to repo (alice can write). Make sure alice can read also.\n\tcommit, err := alice.StartCommit(dataRepo, \"master\")\n\trequire.NoError(t, err)\n\t_, err = alice.PutFile(dataRepo, commit.ID, \"/file\", strings.NewReader(\"lorem ipsum\"))\n\trequire.NoError(t, err)\n\trequire.NoError(t, alice.FinishCommit(dataRepo, commit.ID)) // # commits = 1\n\tbuf := &bytes.Buffer{}\n\trequire.NoError(t, alice.GetFile(dataRepo, \"master\", \"/file\", 0, 0, buf))\n\trequire.Equal(t, \"lorem ipsum\", buf.String())\n\n\t//////////\n\t/// Initially, bob has no privileges\n\t// bob can't read\n\terr = bob.GetFile(dataRepo, \"master\", \"/file\", 0, 0, buf)\n\trequire.YesError(t, err)\n\trequire.Matches(t, \"not authorized\", err.Error())\n\t// bob can't write\n\t_, err = bob.StartCommit(dataRepo, \"master\")\n\trequire.YesError(t, err)\n\trequire.Matches(t, \"not authorized\", err.Error())\n\trequire.Equal(t, 1, CommitCnt(t, alice, dataRepo)) // check that no commits were created\n\t// bob can't update the ACL\n\t_, err = bob.SetScope(bob.Ctx(), &auth.SetScopeRequest{\n\t\tRepo: dataRepo,\n\t\tUsername: \"carol\",\n\t\tScope: auth.Scope_READER,\n\t})\n\trequire.YesError(t, err)\n\trequire.Matches(t, \"not authorized\", err.Error())\n\trequire.Equal(t, acl(\"alice\", \"owner\"), GetACL(t, alice, dataRepo)) // check that ACL wasn't updated\n\n\t//////////\n\t/// alice adds bob to the ACL as a reader (alice can modify ACL)\n\t_, err = alice.SetScope(alice.Ctx(), &auth.SetScopeRequest{\n\t\tRepo: dataRepo,\n\t\tUsername: \"bob\",\n\t\tScope: auth.Scope_READER,\n\t})\n\trequire.NoError(t, err)\n\t// bob can read\n\tbuf.Reset()\n\trequire.NoError(t, bob.GetFile(dataRepo, \"master\", \"/file\", 0, 0, buf))\n\trequire.Equal(t, \"lorem ipsum\", buf.String())\n\t// bob can't write\n\t_, err = bob.StartCommit(dataRepo, \"master\")\n\trequire.YesError(t, err)\n\trequire.Matches(t, \"not authorized\", err.Error())\n\trequire.Equal(t, 1, CommitCnt(t, alice, dataRepo)) // check that no commits were created\n\t// bob can't update the ACL\n\t_, err = bob.SetScope(bob.Ctx(), &auth.SetScopeRequest{\n\t\tRepo: dataRepo,\n\t\tUsername: \"carol\",\n\t\tScope: auth.Scope_READER,\n\t})\n\trequire.YesError(t, err)\n\trequire.Matches(t, \"not authorized\", err.Error())\n\trequire.Equal(t, acl(\"alice\", \"owner\", \"bob\", \"reader\"),\n\t\tGetACL(t, alice, dataRepo)) // check that ACL wasn't updated\n\n\t//////////\n\t/// alice adds bob to the ACL as a writer\n\t_, err = alice.SetScope(alice.Ctx(), &auth.SetScopeRequest{\n\t\tRepo: dataRepo,\n\t\tUsername: \"bob\",\n\t\tScope: auth.Scope_WRITER,\n\t})\n\trequire.NoError(t, err)\n\t// bob can read\n\tbuf.Reset()\n\trequire.NoError(t, bob.GetFile(dataRepo, \"master\", \"/file\", 0, 0, buf))\n\trequire.Equal(t, \"lorem ipsum\", buf.String())\n\t// bob can write\n\tcommit, err = bob.StartCommit(dataRepo, \"master\")\n\trequire.NoError(t, err)\n\trequire.NoError(t, bob.FinishCommit(dataRepo, commit.ID))\n\trequire.Equal(t, 2, CommitCnt(t, alice, dataRepo)) // check that a new commit was created\n\t// bob can't update the ACL\n\t_, err = bob.SetScope(bob.Ctx(), &auth.SetScopeRequest{\n\t\tRepo: dataRepo,\n\t\tUsername: \"carol\",\n\t\tScope: auth.Scope_READER,\n\t})\n\trequire.YesError(t, err)\n\trequire.Matches(t, \"not authorized\", err.Error())\n\trequire.Equal(t, acl(\"alice\", \"owner\", \"bob\", \"writer\"),\n\t\tGetACL(t, alice, dataRepo)) // check that ACL wasn't updated\n\n\t//////////\n\t/// alice adds bob to the ACL as an owner\n\t_, err = alice.SetScope(alice.Ctx(), &auth.SetScopeRequest{\n\t\tRepo: dataRepo,\n\t\tUsername: \"bob\",\n\t\tScope: auth.Scope_OWNER,\n\t})\n\trequire.NoError(t, err)\n\t// bob can read\n\tbuf.Reset()\n\trequire.NoError(t, bob.GetFile(dataRepo, \"master\", \"/file\", 0, 0, buf))\n\trequire.Equal(t, \"lorem ipsum\", buf.String())\n\t// bob can write\n\tcommit, err = bob.StartCommit(dataRepo, \"master\")\n\trequire.NoError(t, err)\n\trequire.NoError(t, bob.FinishCommit(dataRepo, commit.ID))\n\trequire.Equal(t, 3, CommitCnt(t, alice, dataRepo)) // check that a new commit was created\n\t// bob can update the ACL\n\t_, err = bob.SetScope(bob.Ctx(), &auth.SetScopeRequest{\n\t\tRepo: dataRepo,\n\t\tUsername: \"carol\",\n\t\tScope: auth.Scope_READER,\n\t})\n\trequire.NoError(t, err)\n\trequire.Equal(t, acl(\"alice\", \"owner\", \"bob\", \"owner\", \"carol\", \"reader\"),\n\t\tGetACL(t, alice, dataRepo)) // check that ACL was updated\n}", "title": "" }, { "docid": "d896134d09d8d66333c80661b27d069d", "score": "0.497042", "text": "func (c *Client) GetRepository(ctx context.Context, req *dataformpb.GetRepositoryRequest, opts ...gax.CallOption) (*dataformpb.Repository, error) {\n\treturn c.internalClient.GetRepository(ctx, req, opts...)\n}", "title": "" }, { "docid": "7dfdd6fa5eef118ec93c67627fe46c48", "score": "0.4955147", "text": "func IsRepository() bool {\n\tlog.Println(\"[DEBUG] IsRepository\")\n\terr := exec.Command(\"git\", \"rev-parse\", \"--git-dir\").Run()\n\tif err != nil {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "d9c113766c8cb2408bf9ae39f0f7532f", "score": "0.4952983", "text": "func (mr *MockUserRepositoryMockRecorder) Get(ctx, id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Get\", reflect.TypeOf((*MockUserRepository)(nil).Get), ctx, id)\n}", "title": "" }, { "docid": "a5924801074f2e8fc1a9f3f0b6487525", "score": "0.49519315", "text": "func Get(uuid string) (*Repository, error) {\n\tpath := GetPath(uuid)\n\tif _, err := os.Stat(path); os.IsNotExist(err) {\n\t\treturn nil, errors.New(\"The git repository at the given path does not exist\")\n\t}\n\n\treturn &Repository{path}, nil\n}", "title": "" }, { "docid": "466ec4baf53785c530a4810013fd3185", "score": "0.49502513", "text": "func (m *MockoperationsRepository) Get(userID, page, size int64) (*models.OperationPaginator, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Get\", userID, page, size)\n\tret0, _ := ret[0].(*models.OperationPaginator)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "5ca520722c7f7b198187bf4dcb37b56b", "score": "0.4948928", "text": "func TestNewRepo(t *testing.T) {\n\tNewRepo(&mongo.Collection{})\n}", "title": "" }, { "docid": "0a46ace73a645048570c2cd5a3d4d63a", "score": "0.4947161", "text": "func TestSetRepoInfo(t *testing.T) {\n\tsuccess := 0\n\terr := gitUpdateChecker.SetRepoInfo(\"https://github.com/DarkFighterLuke/test.git\", \"\")\n\tif err != nil {\n\t\tsuccess++\n\t}\n\n\terr = gitUpdateChecker.SetRepoInfo(\"\", \"master\")\n\tif err != nil {\n\t\tsuccess++\n\t}\n\n\terr = gitUpdateChecker.SetRepoInfo(\"https://github.com/DarkFighterLuke/test.git\", \"master\")\n\tif err != nil {\n\t\tt.Errorf(\"An error occurred: %s\", err)\n\t} else {\n\t\tsuccess++\n\t}\n\n\tif success != 3 {\n\t\tlog.Printf(\"%d/3\\n\", success)\n\t\tt.Fail()\n\t}\n}", "title": "" }, { "docid": "cdf1d52684ca7f9c67ff436ecbb39043", "score": "0.4945106", "text": "func (a *Client) GetRepositoryState(params *GetRepositoryStateParams, authInfo runtime.ClientAuthInfoWriter) (*GetRepositoryStateOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetRepositoryStateParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"getRepositoryState\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/app/rest/vcs-root-instances/{vcsRootInstanceLocator}/repositoryState\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &GetRepositoryStateReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*GetRepositoryStateOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for getRepositoryState: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "title": "" }, { "docid": "e5fa1bc09b39514f120cf166a17ea4ab", "score": "0.49366224", "text": "func getRepoInstance(postRequest *http.Request) *models.RepositoryInstance {\n\tcopyRepoURL := strings.TrimSuffix(ConstructURL(postRequest, \"\"), \"/\")\n\treturn &models.RepositoryInstance{CopyRepoURL: copyRepoURL}\n}", "title": "" }, { "docid": "562892200115b08467f9ca21b1f79aa3", "score": "0.49251974", "text": "func (mr *MockoperationsRepositoryMockRecorder) Get(userID, page, size interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Get\", reflect.TypeOf((*MockoperationsRepository)(nil).Get), userID, page, size)\n}", "title": "" }, { "docid": "781432b59737007d499edd4c9e83775b", "score": "0.4919382", "text": "func (f *FactoryRepoConfiguration) GetFactoryRepoConfiguration() *FactoryRepoConfiguration { return f }", "title": "" }, { "docid": "54e5932259136f3151b2534adc0e200e", "score": "0.4918589", "text": "func (*NullNotifier) NotifyCreateRepository(doer *models.User, u *models.User, repo *models.Repository) {\n}", "title": "" } ]
6d10cdb88635afb1ae8368083fd50130
Nothing in a base iterator.
[ { "docid": "4721f741303b526817d7d8fbc838abf4", "score": "0.5366239", "text": "func (it *Base) Next() (graph.Value, bool) {\n\treturn nil, false\n}", "title": "" } ]
[ { "docid": "7f47cadaf4441b4a7bd16dbe99bc1a0a", "score": "0.6312419", "text": "func (i IthIterator) Empty() bool {\n\treturn false\n}", "title": "" }, { "docid": "9975edd43e60975fd1b45aedee3ae3a0", "score": "0.62451464", "text": "func (o *Undefined) Iterate() Iterator {\n\treturn o\n}", "title": "" }, { "docid": "3a9bc3dcf655037d211d8ee2bb75204c", "score": "0.6012803", "text": "func (it *Base) SubIterators() []graph.Iterator {\n\treturn nil\n}", "title": "" }, { "docid": "e2465761bf7939ae0d75df562ad09348", "score": "0.6012738", "text": "func (iter *treeMapValueIterator) Reset() { iter.treeIter.Reset() }", "title": "" }, { "docid": "e6ecadda138475e18dfc6bcbad956449", "score": "0.5985113", "text": "func (it *ArrayBasedIntIterator) Err() error { return nil }", "title": "" }, { "docid": "10317a9e41020768cfa949ca60c3758f", "score": "0.5876819", "text": "func (ByteSliceIterator) Err() error { return nil }", "title": "" }, { "docid": "9b312b3760be0eab5b955e1adbef251a", "score": "0.5860633", "text": "func (iter *treeMapKeyIterator) Reset() { iter.treeIter.Reset() }", "title": "" }, { "docid": "102c2e0d1be81c2d0f959a3b37e932de", "score": "0.5817665", "text": "func (itr *SimpleFieldIterator) Reset() { itr.idx = -1 }", "title": "" }, { "docid": "877a852dea1f66623225c54bb259f24d", "score": "0.5789731", "text": "func (o *ObjectImpl) Iterate() Iterator {\n\treturn nil\n}", "title": "" }, { "docid": "9150ceb424a9459180f330c74e67cc8d", "score": "0.56989264", "text": "func SuperByteIterator(itemList ...ByteIterator) ByteIterator {\n\tvar super = EmptyByteIterator\n\tfor i := len(itemList) - 1; i >= 0; i-- {\n\t\tif itemList[i] == nil {\n\t\t\tcontinue\n\t\t}\n\t\tsuper = &doubleByteIterator{lhs: itemList[i], rhs: super}\n\t}\n\treturn super\n}", "title": "" }, { "docid": "25a3af8950a22cd0bbc0fb7097412633", "score": "0.5677873", "text": "func drainIteratorIgnoreErrors(ctx *sql.Context, iter sql.RowIter) {\n\tif iter == nil {\n\t\treturn\n\t}\n\n\tfor {\n\t\t_, err := iter.Next(ctx)\n\t\tif err == io.EOF {\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e596730278d6bf74a2ebdba40a71ae0a", "score": "0.56659955", "text": "func (it *ArrayBasedDoubleIterator) Err() error { return nil }", "title": "" }, { "docid": "20345f0d4d85ecc7ccf2a6b91992ff43", "score": "0.56328815", "text": "func TestEmptyObjectIterator(t *testing.T) {\n\tt.Parallel()\n\thClient, close := newTestServer(func(w http.ResponseWriter, r *http.Request) {\n\t\tio.Copy(ioutil.Discard, r.Body)\n\t\tfmt.Fprintf(w, \"{}\")\n\t})\n\tdefer close()\n\tctx := context.Background()\n\tclient, err := NewClient(ctx, option.WithHTTPClient(hClient))\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tit := client.Bucket(\"b\").Objects(ctx, nil)\n\t_, err = it.Next()\n\tif err != iterator.Done {\n\t\tt.Errorf(\"got %v, want Done\", err)\n\t}\n}", "title": "" }, { "docid": "12bf20f473d1636d550bea066a1d9eab", "score": "0.5621147", "text": "func TestFlatIterator_Reset(t *testing.T) {\n\tassert := assert.New(t)\n\tap := NewAP(Shape{2, 3, 4}, []int{12, 4, 1})\n\tit := NewFlatIterator(ap)\n\n\tit.Next()\n\tit.Next()\n\tit.Reset()\n\tassert.Equal(0, it.lastIndex)\n\tassert.Equal(false, it.done)\n\tassert.Equal([]int{0, 0, 0}, it.track)\n\n\tfor _, err := it.Next(); err == nil; _, err = it.Next() {\n\t}\n\n\tit.Reset()\n\tassert.Equal(0, it.lastIndex)\n\tassert.Equal(false, it.done)\n\tassert.Equal([]int{0, 0, 0}, it.track)\n\n}", "title": "" }, { "docid": "01f555a1e03cdbd1dd70cf1c84c3768a", "score": "0.5599178", "text": "func (iterator *TreeIterator) Begin() {\n\titerator.node = nil\n\titerator.position = 0\n}", "title": "" }, { "docid": "34a8ad9ca191b7ad3e89f3a0aa1a39d8", "score": "0.5598992", "text": "func (it *Iter) Reset() *Iter {\n\tit.pos = 0\n\treturn it // self\n}", "title": "" }, { "docid": "f01847574b1c1ee38c9395cc36d95976", "score": "0.5559098", "text": "func (InvertingByteSliceIterator) Err() error { return nil }", "title": "" }, { "docid": "d1e76de624182160fe95b5263f27855d", "score": "0.5534778", "text": "func (c *XORChunk) Iterator() Iterator {\n\treturn c.iterator()\n}", "title": "" }, { "docid": "fff61e2912ebc2c5129a8af1c5b77b9a", "score": "0.54688936", "text": "func (this *Iter_MySpanner_SelectAll) Zero() error {\n\trow, ok := this.Next()\n\tif row != nil && row.err != nil {\n\t\treturn row.err\n\t}\n\tif ok {\n\t\treturn fmt.Errorf(\"expected exactly 0 results from query 'SelectAll'\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e5f39cb046a6f3a55539a0a27d94174e", "score": "0.5468012", "text": "func (u UTXOSet) Iterator(lastHash []byte) *UTXOIterator {\n\tui := &UTXOIterator{lastHash}\n\n\treturn ui\n}", "title": "" }, { "docid": "b0b2e00fb9a95a760eed4657f1ccfff5", "score": "0.5451714", "text": "func (it *Iterator) SubIterators() []graph.Iterator {\n\treturn nil\n}", "title": "" }, { "docid": "68b0b1c1ae3002e093a02bf73c606461", "score": "0.5451514", "text": "func (it *SStableIterator) Next() {\n\tit.dataIter.Next()\n\tit.skipEmptyDataBlocksForward()\n}", "title": "" }, { "docid": "715c2646c43984b09003efe631608155", "score": "0.5431232", "text": "func (iterator *TreeIterator) End() {\n\titerator.node = nil\n\titerator.position = 2\n}", "title": "" }, { "docid": "d2d74170ca147e238b8183a9b70c05ea", "score": "0.5388096", "text": "func (it *MapIter) Next() bool {\n\t// possbile: panic(\"MapIter.Next called on exhausted iterator\")\n}", "title": "" }, { "docid": "a5ae7c0bbda929c16e27406df0f83622", "score": "0.5376571", "text": "func (it InvertingByteSliceIterator) HasNext() bool {\n\treturn it.cur >= 0\n}", "title": "" }, { "docid": "a1b0d0324f1c4bc1805b4465a44d2c3f", "score": "0.5341639", "text": "func (it *Null) Stats() graph.IteratorStats {\n\treturn graph.IteratorStats{}\n}", "title": "" }, { "docid": "3c69af7a4dc1af415d57ac35ac68c13b", "score": "0.5338611", "text": "func Key(it Iterator) interface{} {\n\treturn nil\n}", "title": "" }, { "docid": "da4422978e04932c7a97009573d5eecb", "score": "0.5331028", "text": "func (iter OpenIDConnectProviderCollectionIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "06877be95c32f6379ea6eadb498463cb", "score": "0.5329609", "text": "func Value(it Iterator) interface{} {\n\treturn nil\n}", "title": "" }, { "docid": "deb3d9ba6e7b4a80e9e03e9da743e5e2", "score": "0.5317196", "text": "func (iter ExtendedDatabaseBlobAuditingPolicyListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "51b1b2b57eecdc057d40dcf728b4b25e", "score": "0.530783", "text": "func (iter BackendCollectionIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "841f5ed49ff8d183b888cf7c6e592478", "score": "0.5289839", "text": "func (it *FlatIterator) Reset() {\n\tit.done = false\n\tit.lastIndex = 0\n\n\tif it.done {\n\t\treturn\n\t}\n\n\tfor i := range it.track {\n\t\tit.track[i] = 0\n\t}\n}", "title": "" }, { "docid": "4c294f4005329eabf0c5e4a7689d00dd", "score": "0.5287969", "text": "func Next(it Iterator) bool {\n\tif n, ok := it.(Nexter); ok {\n\t\treturn n.Next()\n\t}\n\tglog.Errorln(\"Nexting an un-nextable iterator\")\n\treturn false\n}", "title": "" }, { "docid": "ec6586a116ba31ad0c7a6ae619a77bc0", "score": "0.5283512", "text": "func (iter SubnetListResultIterator) NotDone() bool {\n return iter.page.NotDone() && iter.i < len(iter. page.Values())\n }", "title": "" }, { "docid": "85957868174ddcbe51ab7492d59ed89d", "score": "0.5255255", "text": "func (iter ExtendedServerBlobAuditingPolicyListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "e1135ed1a766b33634f7ad2cef22ca8d", "score": "0.52261794", "text": "func (tt *TreeTest) TestIterator(t *testing.T) {\n\t// empty iterators\n\ttr := tt.New(t)\n\n\tNil(t, tr.Iter())\n\tNil(t, tr.IterBack())\n\n\t// one element\n\ttr.Insert(V[0])\n\n\titer := tr.Iter()\n\tNotNil(t, iter)\n\tEqual(t, V[0], iter.Get())\n\tNil(t, iter.Next())\n\n\titer = tr.IterBack()\n\tNotNil(t, iter)\n\tEqual(t, V[0], iter.Get())\n\tNil(t, iter.Previous())\n\n\t// full iterators\n\ttr = tt.NewFilledTree(t)\n\n\ti := 0\n\n\tfor iter = tr.Iter(); iter != nil; iter = iter.Next() {\n\t\tEqual(t, iter.Get(), V[i])\n\n\t\ti++\n\t}\n\n\tEqual(t, i, VLen)\n\n\ttr = tt.NewFilledTree(t)\n\n\ti = VLen - 1\n\n\tfor iter = tr.IterBack(); iter != nil; iter = iter.Previous() {\n\t\tEqual(t, iter.Get(), V[i])\n\n\t\ti--\n\t}\n\n\tEqual(t, i, -1)\n\n\t// iterate in wrong direction\n\titer = tr.Iter()\n\tNil(t, iter.Previous())\n\n\titer = tr.IterBack()\n\tNil(t, iter.Next())\n\n\t// iterate only within the left lane\n\ttr = tt.New(t)\n\n\tfor i := 6; i > -1; i-- {\n\t\ttr.Insert(i)\n\t}\n\n\titer = tr.Iter()\n\n\tfor i := 0; i <= 6; i++ {\n\t\tEqual(t, iter.Get(), i)\n\n\t\titer = iter.Next()\n\t}\n\tNil(t, iter)\n\n\t// iterate only within the right lane\n\ttr = tt.New(t)\n\n\tfor i := 0; i < 6; i++ {\n\t\ttr.Insert(i)\n\t}\n\n\titer = tr.Iter()\n\n\tfor i := 0; i < 6; i++ {\n\t\tEqual(t, iter.Get(), i)\n\n\t\titer = iter.Next()\n\t}\n\tNil(t, iter)\n\n\t// full tree\n\ttestFullTree := func(cV []int) {\n\t\tmax := len(cV) - 1\n\n\t\ttr = tt.New(t)\n\n\t\tfor _, v := range cV {\n\t\t\ttr.Insert(v)\n\t\t}\n\n\t\tsort.Ints(cV)\n\n\t\titer = tr.Iter()\n\n\t\tfor _, v := range cV {\n\t\t\tEqual(t, iter.Get(), v)\n\n\t\t\titer = iter.Next()\n\t\t}\n\t\tNil(t, iter)\n\n\t\t// traverse back and forth\n\t\titer = tr.Iter()\n\t\ti = 0\n\n\t\tfor iter.Get() != max {\n\t\t\tEqual(t, iter.Get(), cV[i])\n\n\t\t\titer = iter.Next()\n\t\t\ti++\n\t\t}\n\n\t\tfor iter.Get() != 0 {\n\t\t\tEqual(t, iter.Get(), cV[i])\n\n\t\t\titer = iter.Previous()\n\t\t\ti--\n\t\t}\n\n\t\tfor iter.Get() != max {\n\t\t\tEqual(t, iter.Get(), cV[i])\n\n\t\t\titer = iter.Next()\n\t\t\ti++\n\t\t}\n\t\tNil(t, iter.Next())\n\n\t\titer = tr.IterBack()\n\t\ti = len(cV) - 1\n\n\t\tfor iter.Get() != 0 {\n\t\t\tEqual(t, iter.Get(), cV[i])\n\n\t\t\titer = iter.Previous()\n\t\t\ti--\n\t\t}\n\n\t\tfor iter.Get() != max {\n\t\t\tEqual(t, iter.Get(), cV[i])\n\n\t\t\titer = iter.Next()\n\t\t\ti++\n\t\t}\n\n\t\tfor iter.Get() != 0 {\n\t\t\tEqual(t, iter.Get(), cV[i])\n\n\t\t\titer = iter.Previous()\n\t\t\ti--\n\t\t}\n\t\tNil(t, iter.Previous())\n\t}\n\n\ttestFullTree([]int{7, 3, 2, 0, 1, 5, 4, 6, 11, 9, 8, 10, 13, 12, 14})\n\ttestFullTree([]int{8, 3, 1, 0, 2, 6, 5, 4, 7, 13, 10, 9, 11, 12, 15, 14, 16})\n\ttestFullTree([]int{5, 1, 0, 4, 3, 2})\n\n\t// change direction in the middle of the tree\n\ttr = tt.NewFilledTree(t)\n\n\titer = tr.Iter()\n\n\tfor i := 1; i <= 3; i++ {\n\t\tEqual(t, iter.Get(), V[i-1])\n\t\titer = iter.Next()\n\t}\n\tEqual(t, iter.Get(), V[3])\n\n\tfor i := 4; i > 0; i-- {\n\t\tEqual(t, iter.Get(), V[i-1])\n\t\titer = iter.Previous()\n\t}\n\tNil(t, iter)\n\n\titer = tr.IterBack()\n\n\tfor i := 6; i > 3; i-- {\n\t\tEqual(t, iter.Get(), V[i-1])\n\t\titer = iter.Previous()\n\t}\n\tEqual(t, iter.Get(), V[2])\n\n\tfor i := 3; i <= 6; i++ {\n\t\tEqual(t, iter.Get(), V[i-1])\n\t\titer = iter.Next()\n\t}\n\tNil(t, iter)\n}", "title": "" }, { "docid": "c18a989c2e16c841ced1ad4912db233e", "score": "0.5221525", "text": "func TestEmptyLoops(t *testing.T) {\n il := NewIntList()\n i := 0\n last := il.Last()\n for it := il.First(); it != last; it = it.Next() {\n i++\n }\n if i != 0 {\n t.Fatalf(\"The '.First() .Next()'-loop over an empty IntList seems to be performed more than zero times\")\n }\n i = 0\n il.Do(func (val int) {\n i++\n })\n if i != 0 {\n t.Fatalf(\"The 'Do'-loop over an empty IntList seems to be performed more than zero times\")\n }\n}", "title": "" }, { "docid": "13a42159bb89bb9bf3b841df3d6f51f2", "score": "0.5220812", "text": "func (iter IntegrationAccountMapListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "daccebc5db2572efd2b66ce63c55f548", "score": "0.52142704", "text": "func MapIterNext(it *reflect.MapIter,) bool", "title": "" }, { "docid": "d9db1e35c4bb42f10835f05ae9f4aac9", "score": "0.5206526", "text": "func (iter DatabaseBlobAuditingPolicyListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "e666236791ec9b9ab8f87081fedb4e51", "score": "0.5198558", "text": "func (i *fakeIterator) Err() error {\n\treturn nil\n}", "title": "" }, { "docid": "c10be934f6f121fe7ea699aa47f1b752", "score": "0.5193949", "text": "func (i *iterator) Next() bool {\n\treturn i.iter.Next()\n}", "title": "" }, { "docid": "6fa0fee98c6004462a1d84fc9d5a015e", "score": "0.5189461", "text": "func (iter CustomImageListIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "483c40cdb29dbf287aa1fa5f9984f264", "score": "0.51869977", "text": "func (iter SubscriptionCollectionIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "54e97db6407d68a1630c8fdb6b3d6064", "score": "0.5185327", "text": "func (iter HybridConnectionListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "25da53534b7b085c5967c74a1b8c9397", "score": "0.5184491", "text": "func (i ItemIterator[T]) Next() {\n\ti.iter.Next()\n\t*i.idx++\n}", "title": "" }, { "docid": "48b924a4ed9c785cf9f84e3835c7819e", "score": "0.51821625", "text": "func (b BTreeCacheWrap) Iterator(start, end []byte) (Iterator, error) {\n\t// take the backing iterator for start\n\tparentIter, err := b.back.Iterator(start, end)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\titer := newItemIter(parentIter)\n\n\tif start == nil && end == nil {\n\t\tb.bt.Ascend(iter.insert)\n\t} else if start == nil { // end != nil\n\t\tb.bt.AscendLessThan(bkey{end}, iter.insert)\n\t} else if end == nil { // start != nil\n\t\tb.bt.AscendGreaterOrEqual(bkey{start}, iter.insert)\n\t} else { // both != nil\n\t\tb.bt.AscendRange(bkey{start}, bkey{end}, iter.insert)\n\t}\n\titer.skipAllDeleted()\n\n\treturn iter, nil\n}", "title": "" }, { "docid": "b25e598b10f8010a2197a718afe82d66", "score": "0.51817167", "text": "func (iter ApplicationGatewayListResultIterator) NotDone() bool {\n return iter.page.NotDone() && iter.i < len(iter. page.Values())\n }", "title": "" }, { "docid": "889013b6fd63ff7a6846e3d15e86605e", "score": "0.5180985", "text": "func (p noOpProcessor) Next() Interface {\n\treturn nil\n}", "title": "" }, { "docid": "ceeaa61abd7320bd1549e5c087fa3b3a", "score": "0.518067", "text": "func (it *Null) Optimize() (graph.Iterator, bool) { return it, false }", "title": "" }, { "docid": "cdf7b95f6a0be6d26c316157027f2074", "score": "0.5176168", "text": "func (iter ProductCollectionIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "4e24780cee8ff77da61014712c8a18bf", "score": "0.5174165", "text": "func (iter ApplicationGatewayPrivateLinkResourceListResultIterator) NotDone() bool {\n return iter.page.NotDone() && iter.i < len(iter. page.Values())\n }", "title": "" }, { "docid": "4e687aecbb4f786bbc10cbdf64c61d55", "score": "0.51686937", "text": "func (iter VirtualNetworkListResultIterator) NotDone() bool {\n return iter.page.NotDone() && iter.i < len(iter. page.Values())\n }", "title": "" }, { "docid": "48258e38f1d8bf177c890a4ee5b21c0d", "score": "0.515891", "text": "func (iter AvailabilitySetListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "717a01ebc45c947ab538661857c648d3", "score": "0.514725", "text": "func (iter ProviderOperationResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "c203feac3cd6a6d644f95ac053c8f546", "score": "0.51472473", "text": "func TestEmptyBucketIterator(t *testing.T) {\n\tt.Parallel()\n\thClient, close := newTestServer(func(w http.ResponseWriter, r *http.Request) {\n\t\tio.Copy(ioutil.Discard, r.Body)\n\t\tfmt.Fprintf(w, \"{}\")\n\t})\n\tdefer close()\n\tctx := context.Background()\n\tclient, err := NewClient(ctx, option.WithHTTPClient(hClient))\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tit := client.Buckets(ctx, \"project\")\n\t_, err = it.Next()\n\tif err != iterator.Done {\n\t\tt.Errorf(\"got %v, want Done\", err)\n\t}\n\n}", "title": "" }, { "docid": "4ba98e79d99eb6584a421d7685fbe5fb", "score": "0.51444674", "text": "func (iter HubListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "98444ee1d3821f299eeef11b2363a62f", "score": "0.5142787", "text": "func (this *Iter_MySpanner_SelectIndex) Zero() error {\n\trow, ok := this.Next()\n\tif row != nil && row.err != nil {\n\t\treturn row.err\n\t}\n\tif ok {\n\t\treturn fmt.Errorf(\"expected exactly 0 results from query 'SelectIndex'\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3bb1817119cd1fd82f994f622794ee21", "score": "0.51283085", "text": "func (users *NoneUsers) Iterate(iteration uint64) *User {\n\treturn &User{}\n}", "title": "" }, { "docid": "658e0d66ca9dc326cc6b4dbfb434c8ed", "score": "0.51273483", "text": "func (iter *ExhaustedIter[T]) Next() option.Option[T] {\n\treturn option.None[T]()\n}", "title": "" }, { "docid": "0a4995ccf5b80718525a48e227d47c95", "score": "0.5123569", "text": "func (iter StorageInsightListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "e3e9165b587f4b3a2a703af6f9774393", "score": "0.5120188", "text": "func (iter AvailableProviderOperationsIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "9045aa11d3630ea4bf578e2b4e210b37", "score": "0.51170754", "text": "func (iter PublicIPAddressListResultIterator) NotDone() bool {\n return iter.page.NotDone() && iter.i < len(iter. page.Values())\n }", "title": "" }, { "docid": "6ebb674ece9d3440eaccc90ce583f8d9", "score": "0.51155376", "text": "func (n *NoopConn) IncIteration() {\n\tn.iteration++\n}", "title": "" }, { "docid": "f9a4de12043c3b4c91ca8b82b65f95de", "score": "0.5113338", "text": "func (omi *outMessagesImpl) MustIterate(callback func(msg Message)) {\n\tif omi == nil {\n\t\treturn\n\t}\n\tfor elem := omi.head; elem != nil; elem = elem.next {\n\t\tif elem.msg != nil {\n\t\t\tcallback(elem.msg)\n\t\t\tcontinue\n\t\t}\n\t\tif elem.msgs != nil {\n\t\t\tfor i := range elem.msgs {\n\t\t\t\tcallback(elem.msgs[i])\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t\telem.out.MustIterate(callback)\n\t}\n}", "title": "" }, { "docid": "ecdd260411660cfd83cb8bb7afc454d8", "score": "0.5112979", "text": "func (f FiniteIterator) Empty() bool {\n\treturn f.Itr.Empty() || f.Size == 0\n}", "title": "" }, { "docid": "aea16fa841bf047a8d377e22117d4fb9", "score": "0.5108896", "text": "func (a *applier) applyAll(iter Iterator) (int, error) {\n\tvar count int\n\tfor {\n\t\tselect {\n\t\tcase <-a.ctx.Done():\n\t\t\treturn 0, a.ctx.Err()\n\t\tdefault:\n\t\t}\n\t\titerValue, iterRange := iter.Value()\n\t\tif iterValue == nil {\n\t\t\tif iterRange.Tombstone {\n\t\t\t\t// internal error but no data lost: deletion requested of a\n\t\t\t\t// file that was not there.\n\t\t\t\ta.logger.WithFields(logging.Fields{\n\t\t\t\t\t\"from\": string(iterRange.MinKey),\n\t\t\t\t\t\"to\": string(iterRange.MaxKey),\n\t\t\t\t\t\"ID\": string(iterRange.ID),\n\t\t\t\t}).Warn(\"[I] unmatched delete\")\n\t\t\t} else {\n\t\t\t\tif a.logger.IsTracing() {\n\t\t\t\t\ta.logger.WithFields(logging.Fields{\n\t\t\t\t\t\t\"from\": string(iterRange.MinKey),\n\t\t\t\t\t\t\"to\": string(iterRange.MaxKey),\n\t\t\t\t\t\t\"ID\": iterRange.ID,\n\t\t\t\t\t}).Trace(\"copy entire range at end\")\n\t\t\t\t}\n\t\t\t\tif err := a.writer.WriteRange(*iterRange); err != nil {\n\t\t\t\t\treturn 0, fmt.Errorf(\"copy iter range %s: %w\", iterRange.ID, err)\n\t\t\t\t}\n\t\t\t\tcount += int(iterRange.Count)\n\t\t\t}\n\t\t\tif !iter.NextRange() {\n\t\t\t\tbreak\n\t\t\t}\n\t\t} else {\n\t\t\tif a.logger.IsTracing() {\n\t\t\t\tif iterValue.IsTombstone() {\n\t\t\t\t\t// internal error but no data lost: deletion requested of a\n\t\t\t\t\t// file that was not there.\n\t\t\t\t\ta.logger.WithField(\"id\", string(iterValue.Identity)).Warn(\"[I] unmatched delete\")\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\ta.logger.WithFields(logging.Fields{\n\t\t\t\t\t\"key\": string(iterValue.Key),\n\t\t\t\t\t\"ID\": string(iterValue.Identity),\n\t\t\t\t}).Trace(\"write key from iter at end\")\n\t\t\t}\n\t\t\tif err := a.writer.WriteRecord(*iterValue); err != nil {\n\t\t\t\treturn 0, fmt.Errorf(\"write iter record: %w\", err)\n\t\t\t}\n\t\t\tcount++\n\t\t\tif !iter.Next() {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\treturn count, iter.Err()\n}", "title": "" }, { "docid": "7f59135a61bbb2d1fcb5db2f6b68bb5c", "score": "0.5108386", "text": "func (iter ConnectorMappingListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "59539c1a5aba8f0b8d5b7041d7a5d483", "score": "0.51069635", "text": "func (it *TupleIterator) Next() interface{} {\n\tit.pos++\n\treturn it\n}", "title": "" }, { "docid": "51da3a69f04d3d1e2e94b598c26dad8d", "score": "0.5105186", "text": "func (iter EventDataCollectionIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "fb236fd3a14b6e7d1362069f330956a9", "score": "0.5103434", "text": "func (iter ServerBlobAuditingPolicyListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "25f33e4ec6eb2ef3c2b1cef7d7dee85e", "score": "0.51031196", "text": "func (iter ArtifactSourceListIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "0bde72a3f62cf193e879ea0c60a73b81", "score": "0.5094867", "text": "func (iter ApplicationGatewayPrivateEndpointConnectionListResultIterator) NotDone() bool {\n return iter.page.NotDone() && iter.i < len(iter. page.Values())\n }", "title": "" }, { "docid": "c5ffe2238589584a7eda988943bd621c", "score": "0.5091505", "text": "func (it *TupleIterator) ResetFirst() interface{} {\n\tit.pos = 0\n\treturn it\n}", "title": "" }, { "docid": "f2126ad09a9027f58f72d2ea18830f05", "score": "0.5090127", "text": "func (b *BitSet) Iterator() Iterator {\n\treturn Iterator{\n\t\tfirst: true,\n\t\tbitSet: b,\n\t}\n}", "title": "" }, { "docid": "6d8f27ea9f5ed831501438d1f59c40e7", "score": "0.5088316", "text": "func (iter VirtualNetworkPeeringListResultIterator) NotDone() bool {\n return iter.page.NotDone() && iter.i < len(iter. page.Values())\n }", "title": "" }, { "docid": "eda717e61a4c3e71ca780385ac593eda", "score": "0.5088304", "text": "func (iter VirtualClusterListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "33283cfbdf48563eefa0b47d154014bb", "score": "0.5085517", "text": "func (it *Iterator) SeekToFirst() {\n\tit.listIter.SeekToFirst()\n}", "title": "" }, { "docid": "c269a7d9167dd64557ccce07710e48e2", "score": "0.5080352", "text": "func do_GET_ITER(vm *Vm, arg int32) error {\n\treturn vm.setTopAndCheckErr(py.Iter(vm.TOP()))\n}", "title": "" }, { "docid": "bc2d62db62e69e1b7921b800eccc3ae1", "score": "0.5075886", "text": "func (iter ResourceSkusResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "bc2d62db62e69e1b7921b800eccc3ae1", "score": "0.5075886", "text": "func (iter ResourceSkusResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "80e84869537203225f5189f3fcd716a3", "score": "0.50749695", "text": "func (iter RegistryListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "0bfffd7dffc52be9a85c618553cdc348", "score": "0.50700665", "text": "func (iter UserCollectionIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "f4c0805cf2893351161babcc6f86cdcd", "score": "0.5066935", "text": "func (it *bitPatternDoubleIterator) Err() error { return it.err }", "title": "" }, { "docid": "3836fb6bbf456d17ff5180142f98b50d", "score": "0.50666213", "text": "func TestLinkedListQueueIterator(t *testing.T) {\n ns := NewLinkedListQueue()\n s := ns.(*LinkedListQueue)\n s.Enqueue(1);\n s.Enqueue(2);\n s.Enqueue(3);\n iter := s.NewIterator()\n\n if iter.HasNext() {\n if iter.Next() != 1 {\n t.Fatalf(\"the first item is not 1\")\n } \n }\n\n if iter.HasNext() {\n if iter.Next() != 2 {\n t.Fatalf(\"the first item is not 2\")\n } \n }\n\n if iter.HasNext() {\n if iter.Next() != 3 {\n t.Fatalf(\"the first item is not 3\")\n } \n }\n\n if iter.HasNext() {\n t.Fatalf(\"HasNext should be false\")\n }\n\n}", "title": "" }, { "docid": "cec593855677a6b200f205f5dac581cc", "score": "0.50659645", "text": "func (it *EnumConvertingByteIterator) HasNext() bool {\n\tif it.hasNext {\n\t\treturn true\n\t}\n\tif it.preparedByteItem.HasNext() {\n\t\tnext := it.base.Next()\n\t\tnext, err := it.converter.Convert(it.count, next)\n\t\tif err != nil {\n\t\t\tif !isEndOfByteIterator(err) {\n\t\t\t\terr = errors.Wrap(err, \"converting iterator: check\")\n\t\t\t}\n\t\t\tit.err = err\n\t\t\treturn false\n\t\t}\n\t\tit.count++\n\n\t\tit.hasNext = true\n\t\tit.next = next\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "82a7ab55d3ab60178614520757a54620", "score": "0.5060134", "text": "func (iter DataLakeStoreAccountListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "82a7ab55d3ab60178614520757a54620", "score": "0.5060134", "text": "func (iter DataLakeStoreAccountListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "1bb95d138bb50383ed06e130faccfbe3", "score": "0.5060024", "text": "func (iter SSHPublicKeysGroupListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "1e05f94f062ada9245c65e9b28db79f7", "score": "0.5055715", "text": "func (it *Iterator) Next() interface{} {\n\tit.curr = it.curr.next\n\tif it.curr == nil {\n\t\treturn nil\n\t}\n\treturn it\n}", "title": "" }, { "docid": "3c9f56b59e148ae3271168defc96ae49", "score": "0.50554246", "text": "func (iter ReportCollectionIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "1c0bcb8063c726b36cc420342ca074a0", "score": "0.5054511", "text": "func (iter DataLakeStoreTrustedIDProviderListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "9bbebf37e110e9f259e3f32f54c19ba8", "score": "0.50531757", "text": "func (set AnotherDifferentTypeSet) Iter() <-chan AnotherDifferentType {\n\tch := make(chan AnotherDifferentType)\n\tgo func() {\n\t\tfor elem := range set {\n\t\t\tch <- elem\n\t\t}\n\t\tclose(ch)\n\t}()\n\n\treturn ch\n}", "title": "" }, { "docid": "cbe0c56cd1677abac501eb9a7ff72a44", "score": "0.50474745", "text": "func (iter IntegrationAccountPartnerListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "cd007cc4e112d9be12435e01aa215a3d", "score": "0.5046405", "text": "func (o *DnsCache) IterReset() bool {\n\to.activeIter = o.head.Next()\n\tif o.head.IsEmpty() {\n\t\to.iterReady = false\n\t\treturn true\n\t}\n\to.iterReady = true\n\treturn false\n}", "title": "" }, { "docid": "40c6b68800e2cb8bc309fe2522c02ebe", "score": "0.5043193", "text": "func (iter InteractionListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "b493b8385146d615a83ebf4c64778bcf", "score": "0.503726", "text": "func (iter ManagedBackupShortTermRetentionPolicyListResultIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "025e786a1e4cacfc2df095f85bcab709", "score": "0.50348985", "text": "func (iter OperationCollectionIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" }, { "docid": "ba3ace79dceda38e7b5054de582cd6fb", "score": "0.50347745", "text": "func (iter *treeMapValueIterator) Done() bool { return iter.treeIter.Done() }", "title": "" }, { "docid": "9b56d547285557fd819c594578e96fd5", "score": "0.5032898", "text": "func (iter GroupCollectionIterator) NotDone() bool {\n\treturn iter.page.NotDone() && iter.i < len(iter.page.Values())\n}", "title": "" } ]
7af4613aebaad305e11d2c77c3695190
keep running, stat won't be changed.
[ { "docid": "828303b0e36172220ae18317335370a5", "score": "0.0", "text": "func (s *Service) onRunning() (err error) {\n\t// fast check stat\n\tif stat := s.stat.atomicGet(); stat != StateRunning {\n\t\treturn whoops.UnexpectedServiceState(s.stat, StateRunning)\n\t}\n\n\t// slow path running\n\tdefer s.lock.RUnlock()\n\t/*_*/ s.lock.RLock()\n\n\tif s.stat == StateRunning && s.runn != nil {\n\t\terr = s.runn.Running(s.exit)\n\t}\n\n\treturn\n}", "title": "" } ]
[ { "docid": "96cc952558f02c1cf190358516278e75", "score": "0.5702749", "text": "func (s *Stats) exec() {\n\tif s != nil {\n\t\tnow := time.Now()\n\t\ts.QueueTime = now.Sub(s.start).Seconds()\n\t\ts.start = now\n\t}\n}", "title": "" }, { "docid": "5b8295a97cc3c744b14e0add2aea0345", "score": "0.55957294", "text": "func (server *GeoServer) keepDbCurrent() {\n\tfor {\n\t\ttime.Sleep(1 * time.Minute)\n\t\theadResp, err := http.Head(DB_URL)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Unable to request modified of %s: %s\", DB_URL, err)\n\t\t}\n\t\tlm, err := lastModified(headResp)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Unable to parse modified date for %s: %s\", DB_URL, err)\n\t\t}\n\t\tif lm.After(server.dbDate) {\n\t\t\tlog.Debug(\"Updating database from web\")\n\t\t\tdb, dbDate, err := readDbFromWeb()\n\t\t\tif err != nil {\n\t\t\t\tlog.Errorf(\"Unable to update database from web: %s\", err)\n\t\t\t} else {\n\t\t\t\tserver.dbUpdate <- dbu{db, dbDate}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "ad82fdaca7dc2d03d0bf826b1b14b679", "score": "0.55797035", "text": "func check() {\n\tt := time.NewTicker(statCycle)\n\tfor range t.C {\n\t\tinfo := \"\\n----------------process-----------------\\n\"\n\t\tpipelineLock.Lock()\n\t\tif len(pipelines) == 0 {\n\t\t\tpipelineLock.Unlock()\n\t\t\tcontinue\n\t\t}\n\n\t\tfor id, pipeline := range pipelines {\n\t\t\tif !pipeline.Alive() {\n\t\t\t\tpipeline.Close()\n\t\t\t\tdelete(pipelines, id)\n\t\t\t\tlog.Infof(\"Stat delete %v\", id)\n\t\t\t}\n\t\t\tinfo += \"pipeline: \" + id + \"\\n\"\n\t\t}\n\t\tpipelineLock.Unlock()\n\t\tlog.Infof(info)\n\t}\n}", "title": "" }, { "docid": "a8dba4739aceb93e864b3890420d9107", "score": "0.5521054", "text": "func (s *server) run() {\n\tticker := time.NewTicker(time.Millisecond * 100)\n\tdefer ticker.Stop()\n\n\tlastUpdatedAt := time.Now()\n\tfor {\n\t\tselect {\n\t\tcase <-ticker.C:\n\t\t\tnow := time.Now()\n\t\t\ts.onUpdate(now, now.Sub(lastUpdatedAt))\n\t\t\tlastUpdatedAt = now\n\t\tcase <-s.quit:\n\t\t\tclose(s.wait)\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "ea88a7afca30479c06668187a4e703f8", "score": "0.5494271", "text": "func (i *InmemSignal) run() {\r\n\tfor {\r\n\t\tselect {\r\n\t\tcase <-i.sigCh:\r\n\t\t\ti.dumpStats()\r\n\t\tcase <-i.stopCh:\r\n\t\t\treturn\r\n\t\t}\r\n\t}\r\n}", "title": "" }, { "docid": "178bb4eeddbc23a0137fe4c1fdf5414f", "score": "0.5441345", "text": "func upd() {\n\tsavePageMemory()\n\tfor range time.Tick(time.Minute) {\n\t\tsavePageMemory()\n\t}\n}", "title": "" }, { "docid": "365a0f3c32fd1d1dbe175323329994ad", "score": "0.5419762", "text": "func keepRunning(stream *twitter.Stream) {\n\tch := make(chan os.Signal)\n\tsignal.Notify(ch, syscall.SIGINT, syscall.SIGTERM)\n\tlog.Println(<-ch)\n\tstream.Stop()\n\tshowCollectedData()\n}", "title": "" }, { "docid": "86de0ef4fe7ef11637afb31bcfb3edba", "score": "0.5402785", "text": "func (s *syncer) run(ctx context.Context) {\n\tfor {\n\t\tselect {\n\t\tcase <-s.ch:\n\t\t\t// Since the capacity of the channel is 1 (one) it is\n\t\t\t// drained by this read\n\t\t\ts.sync(ctx)\n\t\tcase <-ctx.Done():\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fb372906082ba55edddd9545925237be", "score": "0.5367567", "text": "func watch(files []string, update chan string) {\n\tticker := time.NewTicker(time.Second)\n\n\tlastMod := make([]time.Time, len(files))\n\tfor i, f := range files {\n\t\tlastMod[i] = getMod(f)\n\t}\n\n\tgo func() {\n\t\t// every second\n\t\tfor range ticker.C {\n\t\t\tupdated := false\n\t\t\tfor i, f := range files {\n\t\t\t\tmod := getMod(f)\n\t\t\t\tif mod != lastMod[i] {\n\t\t\t\t\tlastMod[i] = mod\n\t\t\t\t\tlog.Println(f, \"modified.\")\n\n\t\t\t\t\t// we only want to run the script once each round.\n\t\t\t\t\t// to stop a \"save-all\" from running too many times\n\t\t\t\t\tif !updated {\n\t\t\t\t\t\tlog.Println(\"running script\\n\", f)\n\t\t\t\t\t\tif *batch {\n\t\t\t\t\t\t\tupdated = true\n\t\t\t\t\t\t}\n\t\t\t\t\t\tupdate <- f\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "e040a0bd0477056ea169b4cba1c23912", "score": "0.53614014", "text": "func main() {\n\tfor {\n\t\tvar status = []string{\n\t\t\t\"\",\n\t\t\tupdateNetUse(),\n\t\t\tupdateCPUUse() + \"%\",\n\t\t\tupdateMemUse() + \"%\",\n\t\t\tupdatePower() + \"%\",\n\t\t\ttime.Now().Local().Format(\"Monday January 02 3:04:05 PM\"),\n\t\t}\n\t\texec.Command(\"xsetroot\", \"-name\", strings.Join(status, fieldSeparator)).Run()\n\n\t\t// sleep until beginning of next second\n\t\tvar now = time.Now()\n\t\ttime.Sleep(now.Truncate(time.Second).Add(time.Second).Sub(now))\n\t}\n}", "title": "" }, { "docid": "cc58214d9dfd11c3607b1548b8828498", "score": "0.53529984", "text": "func (f *file) daemon() {\n\tdefer f.wg.Done()\n\tfswatcher, err := fsnotify.NewWatcher()\n\tif err != nil {\n\t\tlog.Printf(\"create file watcher fail! reload function will lose efficacy error: %s\", err)\n\t\treturn\n\t}\n\tif err = fswatcher.Add(f.base); err != nil {\n\t\tlog.Printf(\"create fsnotify for base path %s fail %s, reload function will lose efficacy\", f.base, err)\n\t\treturn\n\t}\n\tlog.Printf(\"start watch filepath: %s\", f.base)\n\tfor event := range fswatcher.Events {\n\t\tswitch event.Op {\n\t\t// use vim edit config will trigger rename\n\t\tcase fsnotify.Write, fsnotify.Create:\n\t\t\tf.reloadFile(event.Name)\n\t\tcase fsnotify.Chmod:\n\t\tdefault:\n\t\t\tlog.Printf(\"unsupport event %s ingored\", event)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "75c8ed10ef1eba32eb3dd23e726cf475", "score": "0.5310515", "text": "func (w *worker) Stat(ctx context.Context, tp taskPartition, info *sliceInfo) (err error) {\n\t*info, err = w.store.Stat(ctx, tp.Name, tp.Partition)\n\treturn\n}", "title": "" }, { "docid": "e093d38fa869da8f35b77948740bd7b0", "score": "0.5299305", "text": "func (h *Hook) manager() {\n\tfor {\n\t\th.mu.Lock()\n\t\tfor {\n\t\t\tif h.closed {\n\t\t\t\th.mu.Unlock()\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif h.proc() {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\th.mu.Unlock()\n\t\t\ttime.Sleep(time.Second / 4)\n\t\t\th.mu.Lock()\n\t\t}\n\t\th.cond.Wait()\n\t\th.mu.Unlock()\n\t}\n}", "title": "" }, { "docid": "9231fc9d72ce4a263e93923f9c06b86c", "score": "0.5294932", "text": "func waitForStatsUpdate() {\n\ttime.Sleep(10100 * time.Millisecond)\n}", "title": "" }, { "docid": "158264d9176435321df58fa811c35302", "score": "0.5278965", "text": "func doSync(fullRecent bool) {\n\tif manager.ListLen() == 0 {\n\t\treturn\n\t}\n\tlog.Println(\"recentList.getall start\")\n\trecentlist.Getall(fullRecent)\n\trecentlist.RemoveOlds()\n\tlog.Println(\"recentList.getall finished\")\n\n\tif cfg.HeavyMoon && !running {\n\t\tlog.Println(\"running heavymoon...\")\n\t\tthread.CreateAllCachedirs()\n\t\trunning = true\n\t\tgo func() {\n\t\t\tlog.Println(\"cacheList.getall start\")\n\t\t\tdownload.Getall()\n\t\t\tlog.Println(\"cacheList.getall finished\")\n\t\t\trunning = false\n\t\t\tlog.Println(\"heavymoon end\")\n\t\t}()\n\t}\n}", "title": "" }, { "docid": "efecdb4f8787f10d605289cd6d90eb10", "score": "0.52540475", "text": "func (m *Master) update(){\n\tswitch m.phase{\n\tcase _Init:\n\t\tlog(\"start mapping\")\n\t\tm.waits=newQueue(len(m.files))\n\t\tfor i:=0;i<len(m.files);i++{ m.waits.put(i) }\n\t\tm.dones=newSet(len(m.files))\n\t\tm.phase++\n\t\tfallthrough\n\tcase _Mapping:\n\t\tif m.dones.size()<len(m.files){ return }\n\t\tm.phase++\n\t\tfallthrough\n\tcase _Mapped:\n\t\tlog(\"start reducing\")\n\t\tm.waits=newQueue(m.nReduce)\n\t\tfor i:=0;i<m.nReduce;i++{ m.waits.put(i) }\n\t\tm.dones=newSet(m.nReduce)\n\t\tm.phase++\n\t\tfallthrough\n\tcase _Reducing:\n\t\tif m.dones.size()<m.nReduce{ return }\n\t\tm.phase++\n\t\tfallthrough\n\tcase _Reduced:\n\t\tlog(\"all done\")\n\t\tm.phase++\n\t\tfallthrough\t\t\n\tcase _Done:\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "f826c01674f6118746331c6b4ba212ff", "score": "0.5232023", "text": "func flushingActivity() {\n for _ = range time.Tick(diskWriteInterval*time.Millisecond) {\n flush()\n written = true\n }\n}", "title": "" }, { "docid": "2734a382f1d4ed1193e1c3ea3a039476", "score": "0.5224943", "text": "func updateStat(s *Stat, inRetCode int){\n\tatomic.AddUint64(&(s.in), 1)\n\tif inRetCode < MAXRETCODE {\n\t\tatomic.AddUint64(&(s.retcodes[inRetCode]), 1)\n\t} else {\n\t\tatomic.AddUint64(&(s.other), 1)\n\t}\n}", "title": "" }, { "docid": "131becdc5e6078d29ba63831917f6df2", "score": "0.52145624", "text": "func StillRunning(agentName string) {\n\n\tlog.Debugf(\"StillRunning(%s)\\n\", agentName)\n\tfilename := fmt.Sprintf(\"/var/run/%s.touch\", agentName)\n\t_, err := os.Stat(filename)\n\tif err != nil {\n\t\tfile, err := os.Create(filename)\n\t\tif err != nil {\n\t\t\tlog.Infof(\"StillRunning: %s\\n\", err)\n\t\t\treturn\n\t\t}\n\t\tfile.Close()\n\t}\n\t_, err = os.Stat(filename)\n\tif err != nil {\n\t\tlog.Errorf(\"StilRunning: %s\\n\", err)\n\t\treturn\n\t}\n\tnow := time.Now()\n\terr = os.Chtimes(filename, now, now)\n\tif err != nil {\n\t\tlog.Errorf(\"StillRunning: %s\\n\", err)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "cd1523fd7f82b37efe044f02d4340b3e", "score": "0.5209635", "text": "func (s *StatsDaemon) RunBare() {\n\tlog.Infof(\"statsdaemon instance '%s' starting\", s.instance)\n\tgo s.metricStatsMonitor()\n\ts.metricsMonitor()\n}", "title": "" }, { "docid": "120ff202239b0a84a34e2e053ba8866e", "score": "0.5205666", "text": "func keepAlive() {\n\n\tfor {\n\t\tfmt.Println(\"KeepAlive Loop started\")\n\t\t_, ok := <-doneChan\n\t\tif !ok {\n\t\t\tfmt.Println(\"Restarting...\")\n\n\t\t\tstopChan = make(chan bool)\n\t\t\tdoneChan = make(chan bool)\n\n\t\t\terr := mc.StreamListener(\"user\", \"\", events, stopChan, doneChan)\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t}\n\n\t\ttime.Sleep(time.Second)\n\n\t}\n}", "title": "" }, { "docid": "41a2bda865ab7f0eed42515dcfa35a66", "score": "0.5204309", "text": "func (m *modelTwoDotOne) run(rb *NodeRunnerBase, rxcallback processEventCb) {\n\tlastRefill := Now\n\tleakyBucket := float64(MaxBucket)\n\n\tfor rb.state == RstateRunning {\n\t\tm21.recv(rb, rxcallback)\n\t\tif leakyBucket <= float64(MaxBucket)-1.0 {\n\t\t\telapsed := Now.Sub(lastRefill)\n\t\t\tif elapsed > RateRefill {\n\t\t\t\tleakyBucket += float64(elapsed) / float64(RateRefill)\n\t\t\t\tlastRefill = Now\n\t\t\t}\n\t\t}\n\n\t\tif leakyBucket < 1.0 {\n\t\t\ttime.Sleep(time.Microsecond)\n\t\t\tcontinue\n\t\t}\n\t\tif m21.send(rb) {\n\t\t\tleakyBucket--\n\t\t}\n\t}\n\n\trb.closeTxChannels()\n}", "title": "" }, { "docid": "fe899aab31a2e04907607b16dd261237", "score": "0.52037317", "text": "func (d *VaultAgentTokenQuery) watch(lastStat os.FileInfo) <-chan *watchResult {\n\tch := make(chan *watchResult, 1)\n\n\tgo func(lastStat os.FileInfo) {\n\t\tfor {\n\t\t\tstat, err := os.Stat(d.path)\n\t\t\tif err != nil {\n\t\t\t\tselect {\n\t\t\t\tcase <-d.stopCh:\n\t\t\t\t\treturn\n\t\t\t\tcase ch <- &watchResult{err: err}:\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tchanged := lastStat == nil ||\n\t\t\t\tlastStat.Size() != stat.Size() ||\n\t\t\t\tlastStat.ModTime() != stat.ModTime()\n\n\t\t\tif changed {\n\t\t\t\tselect {\n\t\t\t\tcase <-d.stopCh:\n\t\t\t\t\treturn\n\t\t\t\tcase ch <- &watchResult{stat: stat}:\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\n\t\t\ttime.Sleep(VaultAgentTokenSleepTime)\n\t\t}\n\t}(lastStat)\n\n\treturn ch\n}", "title": "" }, { "docid": "9aee17ca97766a39b62ff0a12e634a1e", "score": "0.5200742", "text": "func (lctx *lructx) onelru(wg *sync.WaitGroup) {\n\tdefer wg.Done()\n\n\tlctx.heap = &fileInfoMinHeap{}\n\theap.Init(lctx.heap)\n\tif err := lctx.evictSize(); err != nil {\n\t\treturn\n\t}\n\tif lctx.totsize < minevict {\n\t\tglog.Infof(\"%s: below threshold, nothing to do\", lctx.bucketdir)\n\t\treturn\n\t}\n\tglog.Infof(\"%s: evicting %s\", lctx.bucketdir, cmn.B2S(lctx.totsize, 2))\n\n\tif err := filepath.Walk(lctx.bucketdir, lctx.walk); err != nil {\n\t\ts := err.Error()\n\t\tif strings.Contains(s, \"xaction\") {\n\t\t\tglog.Infof(\"%s: stopping traversal: %s\", lctx.bucketdir, s)\n\t\t} else {\n\t\t\tglog.Errorf(\"%s: failed to traverse, err: %v\", lctx.bucketdir, err)\n\t\t}\n\t\treturn\n\t}\n\tif err := lctx.evict(); err != nil {\n\t\tglog.Errorf(\"%s: failed to evict, err: %v\", lctx.bucketdir, err)\n\t}\n}", "title": "" }, { "docid": "a28ccd0fa65bf19421ee90c4aaf82673", "score": "0.5197325", "text": "func gui() {\n\ttime.Sleep(time.Second * 5)\n\tfor {\n\t\tfileStats, _ := file.Stat()\n\t\tcmd := exec.Command(\"cmd\", \"/c\", \"cls\")\n\t\tcmd.Stdout = os.Stdout\n\t\tcmd.Run()\n\t\t// fmt.Println(\"~Jack Newman Dataserver\\nSize of Convert Queue: \", len(incomingData), \"\\nSize of Writing Queue: \", len(convertedData), \"\\nSize of Log File: \", fileStats.Size()/1000000, \"MB\", \"\\nNumber of threads: \", runtime.NumGoroutine())\n\t\tfmt.Println(\"~~Jack Newman Datacollector~~\\n\", \"\\nSize of Writing Queue: \", len(convertedData), \"\\nSize of Log File: \", float64(fileStats.Size()/1000000), \"MB\", \"\\nNumber of threads: \", runtime.NumGoroutine())\n\t\tfmt.Println(\"\\nSuccessful Transmissions: \", correctTransmission, \"\\nFailed Transmissions: \", failedTransmission, \"\\nFailed Data Conversions: \", incorrectDataFormat, \"\\nNoise Workers: \", numNoiseWorkers)\n\t\tprintCurrentNoiseMakers()\n\t\tprintcurrentdevices()\n\t\ttime.Sleep(time.Second / 3)\n\t}\n}", "title": "" }, { "docid": "7bbc847639cc91739ccc0ef1d395d639", "score": "0.5197248", "text": "func (l *LogFile) setSlurpRunning(state bool) {\n\tl.lock.Lock()\n\tdefer l.lock.Unlock()\n\n\tl.slurpRunning = state\n}", "title": "" }, { "docid": "485bcd874a3d79d287806477bb14c2c3", "score": "0.5196918", "text": "func Watch(wd string) {\n Build(wd)\n Helpers.Print(\"White\", \"Monitoring...\")\n for {\n // Watch for file changes, build if one has changed\n if FileWatch(wd) {\n ProgramState.Special = make(map[string][]DataTypes.Page) // Clear to avoid duplicates\n Build(wd)\n }\n time.Sleep(1000 * time.Millisecond)\n }\n}", "title": "" }, { "docid": "d725c60933a081d2a7cc47dd98d8848d", "score": "0.5192233", "text": "func (e *ecuStats) run() {\n\te.runOnce()\n\tfor range time.Tick(e.ecu.cfg.UpdateInterval) {\n\t\te.runOnce()\n\t}\n}", "title": "" }, { "docid": "2b539d7675d466a66f415c491a17cff5", "score": "0.5191945", "text": "func (s *service) maintain(cmd *exec.Cmd) {\n\tstart := time.Now()\n\tstatus := make(chan error)\n\tgo func() {\n\t\tstatus <- cmd.Wait()\n\t}()\n\n\tselect {\n\tcase err := <-status:\n\t\tif err != nil {\n\t\t\tlogrus.WithError(err).Error(\"NGINX exited with error\")\n\t\t} else {\n\t\t\tlogrus.Error(\"NGINX exited\")\n\t\t}\n\n\t\t// Ensure that we always wait at least the minimum amount of time between restarts.\n\t\tdelta := time.Now().Sub(start)\n\t\tif delta < MinimumRestartWait {\n\t\t\ttime.Sleep(MinimumRestartWait - delta)\n\t\t}\n\n\t\t// Restart NGINX.\n\t\tgo s.restart()\n\tcase <-s.stop:\n\t\tif cmd.Process != nil {\n\t\t\tif err := cmd.Process.Kill(); err != nil {\n\t\t\t\tlogrus.WithError(err).Error(\"NGINX did not terminate cleanly\")\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a876e5bb807c0b27fd9d46b234d12c08", "score": "0.51898444", "text": "func stop() {\n\trunning = false\n}", "title": "" }, { "docid": "a81f2f6d2d2a152e4c9c7c2e0819a26b", "score": "0.5181116", "text": "func (e *Engine) start() {\n\te.running = true\n\tfirstRunCh := make(chan bool, 1)\n\tfirstRunCh <- true\n\n\tfor {\n\t\tvar filename string\n\n\t\tselect {\n\t\tcase <-e.exitCh:\n\t\t\te.mainDebug(\"exit in start\")\n\t\t\treturn\n\t\tcase filename = <-e.eventCh:\n\t\t\tif !e.isIncludeExt(filename) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif e.config.Build.ExcludeUnchanged {\n\t\t\t\tif !e.isModified(filename) {\n\t\t\t\t\te.mainLog(\"skipping %s because contents unchanged\", e.config.rel(filename))\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\n\t\t\ttime.Sleep(e.config.buildDelay())\n\t\t\te.flushEvents()\n\n\t\t\t// clean on rebuild https://stackoverflow.com/questions/22891644/how-can-i-clear-the-terminal-screen-in-go\n\t\t\tif e.config.Screen.ClearOnRebuild {\n\t\t\t\tfmt.Println(\"\\033[2J\")\n\t\t\t}\n\n\t\t\te.mainLog(\"%s has changed\", e.config.rel(filename))\n\t\tcase <-firstRunCh:\n\t\t\t// go down\n\t\t\tbreak\n\t\t}\n\n\t\t// already build and run now\n\t\tselect {\n\t\tcase <-e.buildRunCh:\n\t\t\te.buildRunStopCh <- true\n\t\tdefault:\n\t\t}\n\n\t\t// if current app is running, stop it\n\t\te.withLock(func() {\n\t\t\tclose(e.binStopCh)\n\t\t\te.binStopCh = make(chan bool)\n\t\t})\n\t\tgo e.buildRun()\n\t}\n}", "title": "" }, { "docid": "4f89470b84b7013af1926f6d9a1f2a86", "score": "0.5158912", "text": "func (this *Counter) EnableStats() {\n this.mutex.Lock()\n defer this.mutex.Unlock()\n\n this.stats = NewStat()\n}", "title": "" }, { "docid": "9f194a01df3d639735eeef8b026ea21d", "score": "0.5156192", "text": "func (mw *MemoryWatcher) trigger() {\n\tmw.boom()\n\tmw.count = 0\n\tmw.Stop()\n\tmw.stopped <- struct{}{}\n\n\t<-time.After(mw.cfg.ExitTime)\n\tos.Exit(mw.cfg.ExitCode)\n}", "title": "" }, { "docid": "b02e502fdd9717a166b3455d74d07ca9", "score": "0.5142872", "text": "func (s *RingStore) run() {\n\tstatsTicker := time.NewTicker(s.statsInterval)\n\tdefer statsTicker.Stop()\n\n\tfor {\n\t\tselect {\n\t\tcase req := <-s.pushReq:\n\t\t\ts.push(req.event)\n\t\t\tif req.done != nil {\n\t\t\t\treq.done <- true\n\t\t\t}\n\t\tcase req := <-s.pullReq:\n\t\t\treq.results <- s.pull()\n\t\tcase <-statsTicker.C:\n\t\t\ts.sendStats()\n\t\tcase <-s.exit:\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0a02b476ef60d56fd29d05b171b4a8f0", "score": "0.5133327", "text": "func trackStatsGoroutine(masterAddress string, stageID string) {\r\n\tfor {\r\n\t\ttime.Sleep(1 * time.Second)\r\n\t\tnodeAvailableMemory := readAvailableMemory()\r\n\t\tworkerMemoryUsage := readMemoryUsage()\r\n\t\tWorkerStatistics.UpdateMemoryUsage(workerMemoryUsage, nodeAvailableMemory)\r\n\t\tfmt.Println(\"====Worker Statistics for Stage \" + StageID + \" ====\")\r\n\t\tfmt.Println(WorkerStatistics)\r\n\t\tsendStatsToMaster(masterAddress, stageID)\r\n\t}\r\n}", "title": "" }, { "docid": "696fde10b5952f840384d3a7d60beab5", "score": "0.51247334", "text": "func (r *AllocRunner) syncStatus() error {\n\t// Get a copy of our alloc, update status server side and sync to disk\n\talloc := r.Alloc()\n\tr.updater(alloc)\n\tr.sendBroadcast(alloc)\n\treturn r.saveAllocRunnerState()\n}", "title": "" }, { "docid": "f380523f0685ddd07f29f2f07bacda5b", "score": "0.51242197", "text": "func (a *Auditor) run(c <-chan time.Time) {\n\tfor a.passStart = range c {\n\t\tmiddleware.DumpReconCache(a.reconCachePath, \"object\",\n\t\t\tmap[string]interface{}{\"object_auditor_stats_\" + a.auditorType: nil})\n\t\ta.passes = 0\n\t\ta.bytesProcessed = 0\n\t\ta.quarantines = 0\n\t\ta.errors = 0\n\t\ta.totalPasses = 0\n\t\ta.totalBytes = 0\n\t\ta.totalQuarantines = 0\n\t\ta.totalErrors = 0\n\t\ta.logger.Info(\"Begin object audit\",\n\t\t\tzap.String(\"mode\", a.mode),\n\t\t\tzap.String(\"auditorType\", a.auditorType),\n\t\t\tzap.String(\"driveRoot\", a.driveRoot))\n\t\tdevices, err := fs.ReadDirNames(a.driveRoot)\n\t\tif err != nil {\n\t\t\ta.logger.Error(\"Unable to list devices\", zap.String(\"driveRoot\", a.driveRoot))\n\t\t\tcontinue\n\t\t}\n\t\tfor _, dev := range devices {\n\t\t\ta.auditDevice(filepath.Join(a.driveRoot, dev))\n\t\t}\n\t\ta.finalLog()\n\t}\n}", "title": "" }, { "docid": "424eb7fbf39bf4e99c17ecb0c255c7c3", "score": "0.51231194", "text": "func StartStatLoop(pt *pet.Pet) {\n\tUpdateStats(pt)\n\tgo func(pt *pet.Pet) {\n\t\tfor <-pt.StatUpdateNotifier {\n\t\t\tUpdateStats(pt)\n\t\t}\n\n\t\tShowCharacterInCenter(textart.Gravestone)\n\n\t\tCharacterSay(\"oops, I died\", 3, 3)\n\n\t\ttime.Sleep(time.Second * 2)\n\n\t\tBeforeShutdown()\n\t\tos.Exit(0)\n\n\t}(pt)\n}", "title": "" }, { "docid": "c1ebc364db70a2827e08113929415a48", "score": "0.5105023", "text": "func (fr *RunningRegressionDetectionRequests) step() {\n\tfr.mutex.Lock()\n\tdefer fr.mutex.Unlock()\n\tnow := time.Now()\n\tfor k, v := range fr.inProcess {\n\t\tv.mutex.Lock()\n\t\tif now.Sub(v.lastUpdate) > MAX_FINISHED_PROCESS_AGE {\n\t\t\tdelete(fr.inProcess, k)\n\t\t}\n\t\tv.mutex.Unlock()\n\t}\n}", "title": "" }, { "docid": "f07c906c2cbd2dd65454a0283a91ead2", "score": "0.50902694", "text": "func (t Torrent) sync() {\n\tif t.meta.IsPaused {\n\t\tt.torrent.CancelPieces(0, t.torrent.NumPieces())\n\t\tt.torrent.DisallowDataUpload()\n\t\tt.torrent.DisallowDataDownload()\n\t} else {\n\t\tt.torrent.DownloadAll()\n\t\tt.torrent.AllowDataUpload()\n\t\tt.torrent.AllowDataDownload()\n\t}\n}", "title": "" }, { "docid": "2f617391f80290f2fd5b109efaa37254", "score": "0.50842494", "text": "func (blueControl *BluesoundController) updateData() {\n\tvar Running = true\n\tvar StatusType int\n\tvar StatusURL string\n\tfor Running {\n\t\tlog.Println(\"Updating data\")\n\t\tswitch StatusType {\n\t\tcase 0:\n\t\t\tStatusURL = httpURIStatus\n\t\tcase 1:\n\t\t\tStatusURL = httpURISyncStatus\n\t\t}\n\t\tXMLDataBin, err := blueControl.getContent(StatusURL)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Could not get %s: %s\", StatusURL, err)\n\t\t} else {\n\t\t\tstatusUpdate.Lock()\n\t\t\tswitch StatusType {\n\t\t\tcase 0:\n\t\t\t\terr = xml.Unmarshal(XMLDataBin, &blueControl.status)\n\t\t\tcase 1:\n\t\t\t\terr = xml.Unmarshal(XMLDataBin, &blueControl.syncStatus)\n\t\t\t}\n\t\t\tstatusUpdate.Unlock()\n\t\t\tif err != nil {\n\t\t\t\tlog.Printf(\"XML data not valid for %s: %s\", StatusURL, err)\n\t\t\t}\n\t\t}\n\t\tStatusType++\n\t\tif StatusType > 1 {\n\t\t\tStatusType = 0\n\t\t\tblueControl.pause = 500\n\t\t}\n\t\tselect {\n\t\tcase <-time.After(blueControl.pause * time.Millisecond):\n\t\t\tif 1 == 0 {\n\t\t\t\tlog.Println(\"Dummy\")\n\t\t\t}\n\t\tcase <-blueControl.stopSignal:\n\t\t\tlog.Println(\"Stop signal received, exiting!\")\n\t\t\tRunning = false\n\t\t}\n\t}\n\tlog.Println(\"Stopped\")\n}", "title": "" }, { "docid": "53aa14890a5576fe11291bcef8ff7a0c", "score": "0.50669235", "text": "func (s *Stat) Update() error {\n\tif s.Pid == 0 {\n\t\treturn errors.New(\"can't check for pid 0\")\n\t}\n\n\tpath := filepath.Join(\"/proc\", strconv.FormatInt(int64(s.Pid), 10), \"stat\")\n\tfile, err := os.Open(path)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer file.Close()\n\n\t_, err = fmt.Fscanf(file, \"%d %s %c %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d %d\",\n\t\t&s.Pid, &s.Comm, &s.State,\n\t\t&s.PPid,\n\t\t&s.PGrp,\n\t\t&s.Session,\n\t\t&s.TtyNr,\n\t\t&s.Tpgid,\n\t\t&s.Flags,\n\t\t&s.Minflt,\n\t\t&s.Cminflt,\n\t\t&s.Majflt,\n\t\t&s.Cmajflt,\n\t\t&s.Utime,\n\t\t&s.Stime,\n\t\t&s.Cutime,\n\t\t&s.Cstime,\n\t\t&s.Priority,\n\t\t&s.Nice,\n\t\t&s.NumThreads,\n\t\t&s.Itrealvalue,\n\t\t&s.Starttime,\n\t\t&s.Vsize,\n\t\t&s.Rss,\n\t\t&s.Rsslim,\n\t\t&s.Startcode,\n\t\t&s.Endcode,\n\t\t&s.Startstack,\n\t\t&s.Kstkesp,\n\t\t&s.Kstkeip,\n\t\t&s.Signal,\n\t\t&s.Blocked,\n\t\t&s.Sigignore,\n\t\t&s.Sigcatch,\n\t\t&s.Wchan,\n\t\t&s.Nswap,\n\t\t&s.Cnswap,\n\t\t&s.ExitSignal,\n\t\t&s.Processor,\n\t\t&s.RtPriority,\n\t\t&s.Policy,\n\t\t&s.DelayacctBlkioTicks,\n\t\t&s.GuestTime,\n\t\t&s.CguestTime)\n\n\treturn err\n}", "title": "" }, { "docid": "ded833735565f2ed3c164a6a5f57a988", "score": "0.5062585", "text": "func stat(t *kernel.Task, d *fs.Dirent, dirPath bool, statAddr usermem.Addr) error {\n\tif dirPath && !fs.IsDir(d.Inode.StableAttr) {\n\t\treturn syserror.ENOTDIR\n\t}\n\tuattr, err := d.Inode.UnstableAttr(t)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn copyOutStat(t, statAddr, d.Inode.StableAttr, uattr)\n}", "title": "" }, { "docid": "4d701fb2d14cad94586fc283318056fa", "score": "0.5060649", "text": "func (c *linuxPidHandler) Stat(ctr *CgroupControl, m *cgroups.Stats) error {\n\tif ctr.config.Path == \"\" {\n\t\t// nothing we can do to retrieve the pids.current path\n\t\treturn nil\n\t}\n\n\tvar PIDRoot string\n\tif ctr.cgroup2 {\n\t\tPIDRoot = filepath.Join(cgroupRoot, ctr.config.Path)\n\t} else {\n\t\tPIDRoot = ctr.getCgroupv1Path(Pids)\n\t}\n\n\tcurrent, err := readFileAsUint64(filepath.Join(PIDRoot, \"pids.current\"))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tm.PidsStats.Current = current\n\treturn nil\n}", "title": "" }, { "docid": "ae7c9a535c434e27ecd497cafaec4c65", "score": "0.5057305", "text": "func watchFile(filePath string, chanModified chan int) error {\n\tinitialStat, err := os.Stat(filePath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor {\n\t\tstat, err := os.Stat(filePath)\n\t\tif err == nil {\n\t\t\tif stat.Size() != initialStat.Size() || stat.ModTime() != initialStat.ModTime() {\n\t\t\t\tchanModified <- 1\n\t\t\t\tinitialStat = stat\n\t\t\t}\n\t\t}\n\t\ttime.Sleep(1 * time.Second)\n\t}\n}", "title": "" }, { "docid": "af0be332b3f62d82bf02263eda26441b", "score": "0.5052297", "text": "func (wm *WorkManager) start() { wm.hasStarted = true }", "title": "" }, { "docid": "d7a0b217e0c4f8885447ff351bbfa178", "score": "0.5044284", "text": "func (mem *Mempool) loop() {\n\treport := time.NewTicker(statsReportInterval)\n\tdefer report.Stop()\n\n\tevict := time.NewTicker(evictionInterval)\n\tdefer evict.Stop()\n\n\trebroadcast := time.NewTicker(GoodTxRebroadcastTime)\n\tdefer rebroadcast.Stop()\n\t// Keep waiting for and reacting to the various events\n\tfor {\n\t\tselect {\n\t\tcase <-mem.quit:\n\t\t\tmem.logger.Info(\"mempool quit\")\n\t\t\treturn\n\n\t\t// Handle stats reporting ticks\n\t\tcase <-report.C:\n\t\t\tmem.proxyMtx.Lock()\n\t\t\tspecSpending, pending, queued := mem.stats()\n\t\t\tmem.futureTxsCount = queued\n\t\t\tmem.proxyMtx.Unlock()\n\t\t\tmem.logger.Debug(\"status report\", \"specGoodTxs\", specSpending, \"goodTxs\", pending, \"futureTxs\", queued)\n\n\t\t// Handle inactive account transaction eviction\n\t\tcase <-evict.C:\n\t\t\tif !mem.config.RemoveFutureTx {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tmem.proxyMtx.Lock()\n\t\t\tfor addr := range mem.futureTxs {\n\t\t\t\taddr := addr\n\t\t\t\t// Any non-locals old enough should be removed\n\t\t\t\tif time.Since(mem.beats[addr]) >= mem.config.Lifetime {\n\t\t\t\t\tfor _, tx := range mem.futureTxs[addr].Flatten() {\n\t\t\t\t\t\tmem.removeFutureTx(addr, tx)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tmem.proxyMtx.Unlock()\n\t\tcase <-rebroadcast.C:\n\t\t\tfilterList := []*clist.CList{mem.goodTxs, mem.utxoTxs, mem.specGoodTxs}\n\t\t\tvar count int\n\t\t\tfor _, txsList := range filterList {\n\t\t\t\tfor e := txsList.Front(); e != nil; e = e.Next() {\n\t\t\t\t\tmemTx := e.Value.(*mempoolTx)\n\t\t\t\t\tt, ok := mem.goodTxBeats.Load(memTx.tx.Hash())\n\t\t\t\t\tif ok != true {\n\t\t\t\t\t\tmem.goodTxBeats.Store(memTx.tx.Hash(), time.Now())\n\t\t\t\t\t\tmem.logger.Error(\"Load GoodTxBeats Error\", \"hash\", memTx.tx.Hash())\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tinterval := time.Since(t.(time.Time))\n\t\t\t\t\tif interval < GoodTxRebroadcastTime || !mem.config.Broadcast {\n\t\t\t\t\t\t// no need to rebroadcast goodTx\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tselect {\n\t\t\t\t\tcase mem.broadcastTxChan <- &RecieveMessage{PeerID: \"\", Tx: memTx.tx}:\n\t\t\t\t\tdefault:\n\t\t\t\t\t\tmem.logger.Info(\"broadcastTxChan is full\", \"size\", mem.config.BroadcastChanSize, \"hash\", memTx.tx.Hash())\n\t\t\t\t\t}\n\t\t\t\t\tcount++\n\t\t\t\t}\n\t\t\t}\n\t\t\tif count > 0 {\n\t\t\t\tmem.logger.Info(\"rebroadcast goodTx\", \"count\", count)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a6ff84dcf18548cf3029d365d0396817", "score": "0.50294566", "text": "func (w *worker) watch() {\n\tgo func() {\n\t\t<-w.ctx.Done()\n\n\t\t// Kill the process.\n\t\tif err := w.cmd.Process.Kill(); err != nil {\n\t\t\tif err != nil {\n\t\t\t\tlog.Printf(\"worker %v: killing process: %v\", w.pid, err)\n\t\t\t}\n\t\t}\n\n\t\t// Also kill subprocesses (OS X, Linux) -- not supported on Windows.\n\t\tpgid, err := syscall.Getpgid(w.pid)\n\t\tif err == nil {\n\t\t\tsyscall.Kill(-pgid, 15)\n\t\t}\n\n\t\tw.cmd.ProcessState, _ = w.cmd.Process.Wait()\n\t\tclose(w.done)\n\t\tw.output.Close()\n\t}()\n\n\toutput := bufio.NewReader(w.output)\n\tfor {\n\t\tline, err := output.ReadString('\\n')\n\t\tlog.Printf(\"worker %v: %s\", w.pid, line)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"worker %v: %s\", w.pid, w.cmd.ProcessState)\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "7d2bfa367e6f0693964e7838133a867c", "score": "0.5018091", "text": "func (bolt *cacheBolt) run() {\n\tbackoff := 0.0\n\tbackoffLimit := 100000.0\n\tfor {\n\t\tcounts := bolt.cache.Counts()\n\t\tif len(counts) == 0 {\n\t\t\tbackoff += 1\n\t\t\ttime.Sleep(time.Duration(math.Min(backoffLimit, math.Pow(backoff, 5))) * time.Millisecond)\n\t\t} else {\n\t\t\tfmt.Println(counts, len(counts), backoff)\n\t\t\t// sort the counts\n\t\t\tfor key := range counts {\n\t\t\t\tpoints := bolt.cache.Pop(key)\n\t\t\t\tbolt.sink.Send(key, points)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "bdaa3c855f9559746c296e7cba12d27f", "score": "0.50156313", "text": "func (c *content) updateForever(){\n\tgo func() {\n\t\tfor {\n\t\t\tc.update(true)\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "14bf01848a40e5e0f076b0b1e596ef43", "score": "0.5013115", "text": "func (a *RegistryAuditor) run() {\n\tcleanUpTicker := time.NewTicker(defaultCleanupPeriod)\n\tflushTicker := time.NewTicker(defaultFlushPeriod)\n\tdefer func() {\n\t\t// clean the context\n\t\tcleanUpTicker.Stop()\n\t\tflushTicker.Stop()\n\t\ta.done <- struct{}{}\n\t}()\n\n\tvar fileError sync.Once\n\tfor {\n\t\tselect {\n\t\tcase <-a.health.C:\n\t\tcase payload, isOpen := <-a.inputChan:\n\t\t\tif !isOpen {\n\t\t\t\t// inputChan has been closed, no need to update the registry anymore\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// update the registry with new entry\n\t\t\tfor _, msg := range payload.Messages {\n\t\t\t\ta.updateRegistry(msg.Origin.Identifier, msg.Origin.Offset, msg.Origin.LogSource.Config.TailingMode, msg.IngestionTimestamp)\n\t\t\t}\n\t\tcase <-cleanUpTicker.C:\n\t\t\t// remove expired offsets from registry\n\t\t\ta.cleanupRegistry()\n\t\tcase <-flushTicker.C:\n\t\t\t// saves current registry into disk\n\t\t\terr := a.flushRegistry()\n\t\t\tif err != nil {\n\t\t\t\tif os.IsPermission(err) || os.IsNotExist(err) {\n\t\t\t\t\tfileError.Do(func() {\n\t\t\t\t\t\tlog.Warn(err)\n\t\t\t\t\t})\n\t\t\t\t} else {\n\t\t\t\t\tlog.Warn(err)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "aa1cf3981e45850fe62cccdae01c1125", "score": "0.5009596", "text": "func (h *Harvester) statCheck(info os.FileInfo, isPipelineBlocked bool) (err error) {\n\tif !isPipelineBlocked {\n\t\t// We are reading new data and nothing appeared yet - is it because truncated?\n\t\tif info.Size() < h.offset {\n\t\t\treturn errFileTruncated\n\t\t}\n\n\t\t// If lastReadTime was more than dead time, this file is probably dead.\n\t\t// Stop only if the mtime did not change since last check - this stops a\n\t\t// race where we hit EOF but as we Stat() the mtime is updated - this mtime\n\t\t// is the one we monitor in order to resume checking, so we need to check it\n\t\t// didn't already update\n\t\tif h.fileinfo.ModTime() == info.ModTime() {\n\t\t\tif age := time.Since(h.lastReadTime); age > h.streamConfig.DeadTime {\n\t\t\t\tlog.Infof(\"Stopping harvest of %s; last successful read was %v ago (\\\"dead time\\\")\", h.path, age-(age%time.Second))\n\t\t\t\t// TODO: dead_action implementation here\n\t\t\t\treturn errStopRequested\n\t\t\t}\n\t\t}\n\t}\n\n\t// If we're holding a deleted file open (orphaned) and dead_time passes, abort and lose the file\n\t// This scenario is only reached if a file is held open by a blocked/slow pipeline\n\tif h.streamConfig.HoldTime > 0 && h.isOrphaned() {\n\t\tif age := time.Since(h.orphanTime); age > h.streamConfig.HoldTime {\n\t\t\th.mutex.RLock()\n\t\t\tcompletion := h.completion\n\t\t\th.mutex.RUnlock()\n\t\t\tif completion >= 100 {\n\t\t\t\treadAge := time.Since(h.lastReadTime)\n\t\t\t\tlog.Infof(\"Stopping harvest of %s; file was deleted %v ago (\\\"hold time\\\"); all data was processed; last change was %v ago\", h.path, age-(age%time.Second), readAge-(readAge%time.Second))\n\t\t\t} else {\n\t\t\t\tlog.Warningf(\"DATA LOST: Stopping harvest of %s; file was deleted %v ago (\\\"hold time\\\"); data had not completed processing due to a slow pipeline; only %.2f%% of the file was processed\", h.path, age-(age%time.Second), completion)\n\t\t\t}\n\t\t\terr = errStopRequested\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "5f462e51bcf98a5c39d8b656b452ff4d", "score": "0.5000379", "text": "func (me *DirCache) maybeRefresh() {\n\tme.lock.Lock()\n\tdefer me.lock.Unlock()\n\tif me.updateRunning {\n\t\treturn\n\t}\n\tme.updateRunning = true\n\tgo func() {\n\t\tnewmap := newDirnameMap(me.fs, me.dir)\n\t\tme.setMap(newmap)\n\t}()\n}", "title": "" }, { "docid": "febb49c743fe295f3efcda66c7bee012", "score": "0.49943382", "text": "func runSync(watcher *fsnotify.Watcher, toUpdate *map[string]bool, sandboxPath string, client *Client) {\n\tfmt.Println(\"Running sync...\")\n\tpaths := make([]string, len(*toUpdate))\n\ti := 0\n\tfor key := range *toUpdate {\n\t\tpaths[i] = key\n\t\ti++\n\t}\n\n\tstatus, err := scmStatusSelectively(sandboxPath, &paths, STAGE)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tdoSyncOp(client, sandboxPath, status, false)\n\tfmt.Println(\"Sync complete\")\n\n\t*toUpdate = make(map[string]bool)\n}", "title": "" }, { "docid": "0494de69889160947ebbaafc1e9db156", "score": "0.49792498", "text": "func (s *Stat) Update() error {\n\tc := C.stat_process_get(C.int(s.pid), s.Current.native(), s.last.native())\n\tif !bool(c) {\n\t\treturn getErrorString()\n\t}\n\ts.Current = wrapStoreStat(s.Current.store_stat)\n\treturn nil\n}", "title": "" }, { "docid": "304f260e83ddee86df4087f09c1dfa8a", "score": "0.49738926", "text": "func handleExecOnDemandStatus(c *gin.Context) {\n\tkey := c.Param(\"key\")\n\tfmt.Printf(\"\\n\\n######### start %s\", key)\n\ttime.Sleep(90 * time.Second)\n\tfmt.Printf(\"\\n\\n######### end %s\", key)\n\tc.JSON(http.StatusOK, \"OK\")\n}", "title": "" }, { "docid": "806ed2c1f078a7d012095faca93e0b74", "score": "0.49728048", "text": "func (s *Service) refreshUpproc() {\n\tvar c = context.Background()\n\tfor {\n\t\ttime.Sleep(time.Duration(s.c.UgcSync.Frequency.UpperRefresh))\n\t\ts.refreshUp(c, true)\n\t\tlog.Info(\"RefreshUpper Succ\")\n\t}\n}", "title": "" }, { "docid": "dfe5cd40a09bd6aff40768eb49757617", "score": "0.49676296", "text": "func (t *UpdateTask) run() {\n\tc := t.c\n\tif !c.EnableEvict() {\n\t\treturn\n\t}\n\tnode := t.node\n\tif node.inWindow() {\n\t\tc.windowWeightedSize = c.windowWeightedSize + t.weightDiff\n\t} else if node.inMainProtected() {\n\t\tc.mainProtectedWeightedSize = c.mainProtectedWeightedSize + t.weightDiff\n\t} else if node.inMainProbation() {\n\t\t// will move to protected deque\n\t\t// do nothing\n\t}\n\tc.onAccess(node)\n}", "title": "" }, { "docid": "eac3962a0bc9678333e73668bc211bc9", "score": "0.49665526", "text": "func (sectionData *SectionData) StartNewStats() {\n newStat := new(SectionStat)\n newStat.startTime = time.Now()\n newStat.methodsCounts = make(map[string]int, 0)\n newStat.contentLengths = make([]int, 0)\n newStat.statusCounts = make(map[string]int, 0)\n newStat.hostCounts = make(map[string]int, 0)\n newStat.hitCount = 0\n\n sectionData.currentStat = newStat\n sectionData.statHistory = append(sectionData.statHistory, sectionData.currentStat)\n}", "title": "" }, { "docid": "357135a132a5f59cfd111c39839d0242", "score": "0.4965949", "text": "func watchSelf() (chan struct{}, error) {\n\n // Retrieve file info for the currently running program\n file, err := osext.Executable()\n if err != nil {\n return nil, err\n }\n\n // Initialize and prepare a new file watcher\n fmt.Printf(\"watching %q\\n\", file)\n w, err := fsnotify.NewWatcher()\n if err != nil {\n return nil, err\n }\n\n done := make(chan struct{})\n go func() {\n for {\n select {\n case e := <-w.Events:\n // Events mean changes\n fmt.Printf(\"watcher received: %+v\", e)\n\n // Replace the running system call with a new call\n // to our newly combined binary\n err := syscall.Exec(file, os.Args, os.Environ())\n if err != nil {\n fmt.Errorf(\"%#v\", err)\n }\n\n case err := <-w.Errors:\n // Print out errors as they occur\n fmt.Printf(\"watcher error: %+v\", err)\n\n case <-done:\n // If we ever close the watcher, log it \n fmt.Printf(\"watcher shutting down\")\n return\n }\n }\n }()\n\n // Add our running file to be watched\n err = w.Add(file)\n if err != nil {\n return nil, err\n }\n return done, nil\n}", "title": "" }, { "docid": "0c9b6b4b0083ddeff76f7b008d907a4e", "score": "0.49547508", "text": "func cronPrintCurrentStatus() {\n\t// Grab server status\n\tstat := getServerStatus()\n\tif stat == (serverStatus{}) {\n\t\tlog.Println(\"Could not print current status\")\n\t\treturn\n\t}\n\n\t// Regular status banner\n\tlog.Printf(\"status - [goroutines: %d] [memory: %02.3f MB]\", stat.NumGoroutine, stat.MemoryMB)\n\n\t// HTTP stats\n\tif static.Config.HTTP {\n\t\tlog.Printf(\" http - [current: %d] [total: %d]\", stat.HTTP.Current, stat.HTTP.Total)\n\n\t\t// Reset current HTTP counter\n\t\tatomic.StoreInt64(&static.HTTP.Current, 0)\n\t}\n\n\t// UDP stats\n\tif static.Config.UDP {\n\t\tlog.Printf(\" udp - [current: %d] [total: %d]\", stat.UDP.Current, stat.UDP.Total)\n\n\t\t// Reset current UDP counter\n\t\tatomic.StoreInt64(&static.UDP.Current, 0)\n\t}\n}", "title": "" }, { "docid": "76638419719674614a50ee9e94bdb3d0", "score": "0.4948515", "text": "func NoStat(g *types.Cmd) {\n\tg.AddOptions(\"--no-stat\")\n}", "title": "" }, { "docid": "da55fbc7f68e774b382addb847323b9e", "score": "0.49476174", "text": "func (writer *ShellWriter) now() {\n\twriter.timestamp = time.Now()\n}", "title": "" }, { "docid": "c35c0e0c294118bd1b4d67e30def1b19", "score": "0.49469692", "text": "func (s *Stats) done(err *Err) {\n\tif s != nil {\n\t\ts.ExecTime = time.Since(s.start).Seconds()\n\t\tif err != nil && !err.Ignore {\n\t\t\ts.Errors++\n\t\t}\n\t}\n}", "title": "" }, { "docid": "56789f73db2a6fea85634338081ca043", "score": "0.49432245", "text": "func (s Sync) Run() {\n\tfor p := range s.Progress {\n\t\ts.UpdateCloser.Update(p)\n\t}\n\ts.UpdateCloser.Close()\n}", "title": "" }, { "docid": "06b265c263d22a406237f459d2df578b", "score": "0.4941692", "text": "func (s *MemoryStore) statsLoop() {\n\n\ttick := time.NewTicker(5 * time.Second)\n\n\t// @todo listen for shutdown, stop ticker and exit cleanly\n\tfor {\n\t\t<-tick.C // block until tick\n\n\t\ts.printStats()\n\t}\n}", "title": "" }, { "docid": "cfeb51aeeb3751d18d57bb8358d66667", "score": "0.4939706", "text": "func Runfirst(){\n\t\n\tfp := openfile()\n filedata := fp.read()\n\titemsdata := getitems(filedata)\n\tpersondata := itemsdata.updateshare()\n\twritedata := persondata.calculateshare() \n\tfp.write(writedata)\n\tfp.closefile()\n \n}", "title": "" }, { "docid": "989ddf24110fa941e988aefe458579f1", "score": "0.49300206", "text": "func (cw *ConfigWatcher) runOnce() bool {\n\tcw.lock.Lock()\n\tdefer cw.lock.Unlock()\n\n\tnewConfig, err := SchedulerConfigLoader(cw.policyGroup)\n\tif err != nil {\n\t\tlog.Logger().Warn(\"failed to calculate the checksum of configuration file for policyGroup,\" +\n\t\t\t\"ignore reloading configuration\", zap.String(\"policyGroup\", cw.policyGroup))\n\t\treturn false\n\t}\n\n\t// acquire the lock to avoid Checksum changed externally\n\tsame := bytes.Equal(newConfig.Checksum, ConfigContext.Get(cw.policyGroup).Checksum)\n\tif same {\n\t\t// check sum equals, file not changed\n\t\tlog.Logger().Debug(\"configuration file unchanged\")\n\t\ttime.Sleep(1 * time.Second)\n\t\treturn true\n\t} else {\n\t\t// when detect state changes, trigger the reload function\n\t\tlog.Logger().Debug(\"configuration file changed\")\n\t\tif err := cw.reloader.DoReloadConfiguration(); err == nil {\n\t\t\tlog.Logger().Debug(\"configuration is successfully reloaded\")\n\t\t}\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "6cdabf2764cbf009400973ef9a29ea4b", "score": "0.49256673", "text": "func (app *App) StartStat() Stat {\n\tapp.mu.Lock()\n\tdefer app.mu.Unlock()\n\treturn app.startStat\n}", "title": "" }, { "docid": "1b410f2076ab6f19bac0b14e6ec345d7", "score": "0.4925057", "text": "func (l *link) runPinger() {\n\tfor l.isActive {\n\t\tping := fmt.Sprintf(\"ping %v\\n\", myBoxID)\n\t\tl.send(ping)\n\t\ttime.Sleep(pingInterval)\n\t}\n}", "title": "" }, { "docid": "6e50dc6279c4b6e523350d9fc5176c0b", "score": "0.49162638", "text": "func main() {\n\ttimer := time.NewTimer(1 * time.Second)\n\n\tfor {\n\t\t<-timer.C\n\t\tlog.Printf(color.HiGreenString(\"Starting run\"))\n\t\t//get the config\n\t\tconfig, err := getConfig()\n\t\tif err != nil {\n\t\t\tlog.Printf(color.HiRedString(\"Couldn't get Configuration: %v\", err.Error()))\n\t\t\ttimer.Reset(30 * time.Second)\n\t\t\tcontinue\n\t\t}\n\n\t\tlog.Printf(color.HiGreenString(\"Configuration retrieved: %v\", config))\n\t\t//we run\n\t\tmonitors.RunMStatus(config.Designations)\n\t\tlog.Printf(color.HiGreenString(\"Done.\"))\n\n\t\ttimer.Reset(time.Duration(config.Interval) * time.Second)\n\t}\n}", "title": "" }, { "docid": "f957284e95473d9f4f8cb8a40019a718", "score": "0.49040708", "text": "func (ml *memoryLimiter) startMonitoring() {\n\tml.refCounterLock.Lock()\n\tdefer ml.refCounterLock.Unlock()\n\n\tml.refCounter++\n\tif ml.refCounter == 1 {\n\t\tgo func() {\n\t\t\tfor range ml.ticker.C {\n\t\t\t\tml.checkMemLimits()\n\t\t\t}\n\t\t}()\n\t}\n}", "title": "" }, { "docid": "d3b922822718335ea2cf21eaaf23fb54", "score": "0.4897384", "text": "func (p *Poller) start() {\n\tfor t := time.Now(); ; {\n\n\t\t// read the lastest config, this is always available\n\t\tcfg := <-p.cfgs\n\n\t\tnt, err := p.scan(t, cfg)\n\t\tif err != nil {\n\t\t\tp.errs <- err\n\t\t} else if !nt.IsZero() {\n\t\t\tp.mods <- nt\n\t\t\tt = nt\n\t\t}\n\n\t\tselect {\n\t\tcase <-time.After(p.freq):\n\n\t\t\t// try to push the current config back to read on the next iteration. If\n\t\t\t// thats blocks it means new config was pushed and has precedence\n\t\t\tselect {\n\t\t\tcase p.cfgs <- cfg:\n\t\t\tdefault:\n\t\t\t}\n\n\t\t\tcontinue\n\t\tcase <-p.ctx.Done():\n\t\t\tclose(p.mods)\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "48a6cdfff2a861e78a7fc97828007b42", "score": "0.48962325", "text": "func (pc *PrimeCache) OneRun() {\n\t// connect to the database using dba for a control connection\n\tparams, err := dbconfigs.MysqlParams(&pc.dbcfgs.Dba)\n\tif err != nil {\n\t\tlog.Errorf(\"Cannot get parameters to connect to MySQL: %v\", err)\n\t\treturn\n\t}\n\n\tpc.dbConn, err = sqldb.Connect(params)\n\tif err != nil {\n\t\tlog.Errorf(\"failed to connect db server: %v\", err)\n\t\treturn\n\t}\n\n\t// get the slave status\n\tslavestat, err := pc.getSlaveStatus()\n\tif err != nil {\n\t\tlog.Warningf(\"getSlaveStatus failed: %v\", err)\n\t\treturn\n\t}\n\n\t// if we're not replicating, we're done\n\tif !slavestat.slaveSQLRunning {\n\t\tlog.Warningf(\"Slave is not replicating (SQL)\")\n\t\treturn\n\t}\n\tif !slavestat.slaveIORunning {\n\t\tlog.Warningf(\"Slave is not replicating (IO)\")\n\t\treturn\n\t}\n\tif slavestat.secondsBehindMaster < 2 {\n\t\treturn\n\t}\n\tlog.Infof(\"Replication lag is high (%v seconds), activating\", slavestat.secondsBehindMaster)\n\n\t// setup the connections to the db to apply the statements\n\tif err := pc.setupPrimerConnections(); err != nil {\n\t\tlog.Errorf(\"setupPrimerConnections failed: %v\", err)\n\t\treturn\n\t}\n\n\t// open the binlogs from where we are on\n\treader, err := pc.openBinlog(slavestat)\n\tif err != nil {\n\t\tlog.Errorf(\"openBinlog failed: %v\", err)\n\t\treturn\n\t}\n\n\tmaxLineCount := 10000\n\tvar maxLeadBytes int64 = 5000000\n\n\t// and start the loop\n\tlineCount := 0\n\tdeleteCount := 0\n\tappliedDeleteCount := 0\n\tupdateCount := 0\n\tappliedUpdateCount := 0\n\tsleepCount := 0\n\tvar logPos uint64\n\tscanner := bufio.NewScanner(reader)\n\tfor scanner.Scan() {\n\t\tline := scanner.Text()\n\t\tlowerLine := strings.ToLower(line)\n\t\tlineCount++\n\n\t\tif p, isComment := parseLogPos(line); isComment {\n\t\t\t// handle the comments with a log pos\n\t\t\tif p > logPos {\n\t\t\t\tlogPos = p\n\t\t\t}\n\n\t\t} else if s, isDelete := parseDeleteStatement(line, lowerLine); isDelete {\n\t\t\t// handle delete statements\n\t\t\tdeleteCount++\n\t\t\tif s != \"\" {\n\t\t\t\tappliedDeleteCount++\n\t\t\t\tpc.workerChannel <- s\n\t\t\t}\n\n\t\t} else if s, isUpdate := parseUpdateStatement(line, lowerLine); isUpdate {\n\t\t\t// handle update statements\n\t\t\tupdateCount++\n\t\t\tif s != \"\" {\n\t\t\t\tappliedUpdateCount++\n\t\t\t\tpc.workerChannel <- s\n\t\t\t}\n\t\t}\n\n\t\tif lineCount%maxLineCount == 0 {\n\t\t\tvar leadBytes int64\n\t\t\tfor {\n\t\t\t\tslavestat, err = pc.getSlaveStatus()\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Errorf(\"getSlaveStatus failed: %v\", err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\t// see how far ahead we are (it's signed because\n\t\t\t\t// we can be behind too)\n\t\t\t\tleadBytes = int64(logPos) - int64(slavestat.execMasterLogPos)\n\t\t\t\tif leadBytes > maxLeadBytes {\n\t\t\t\t\tsleepCount++\n\t\t\t\t\tlog.Infof(\"Sleeping for 1 second waiting for SQL thread to advance: %v > %v\", leadBytes, maxLeadBytes)\n\t\t\t\t\ttime.Sleep(1 * time.Second)\n\t\t\t\t\tcontinue\n\t\t\t\t} else {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tlog.Infof(\"STATS: readahead: %10d lag: %7d sleeps: %4d deletes: %10d missed updates: %10d updates: %10d\\n\",\n\t\t\t\tleadBytes, slavestat.secondsBehindMaster, sleepCount, deleteCount, updateCount-appliedUpdateCount, appliedUpdateCount)\n\t\t}\n\t}\n\treader.Close()\n\tif err := scanner.Err(); err != nil {\n\t\tlog.Errorf(\"Scanner failed: %v\", err)\n\t}\n}", "title": "" }, { "docid": "174109c12b7fb3ed136c0e44c1bbdeae", "score": "0.48961523", "text": "func update () {}", "title": "" }, { "docid": "ed91f6b31e814e39060c8a2ed9b77a0d", "score": "0.48960528", "text": "func (s *StatisticManager) startClearTask() {\n\tgo func() {\n\t\tt := time.NewTicker(time.Hour)\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-s.closeChan:\n\t\t\t\treturn\n\t\t\tcase <-t.C:\n\t\t\t\ts.clearLargeCounters()\n\t\t\t}\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "9eca7572232ab6e49ea1d14557db1f39", "score": "0.4893737", "text": "func (self *Hive) keepAlive() {\n\talarm := time.NewTicker(time.Duration(self.callInterval)).C\n\tfor {\n\t\tpeersNumGauge.Update(int64(self.kad.Count()))\n\t\tselect {\n\t\tcase <-alarm:\n\t\t\tif self.kad.DBCount() > 0 {\n\t\t\t\tselect {\n\t\t\t\tcase self.more <- true:\n\t\t\t\t\tlog.Debug(fmt.Sprintf(\"buzz wakeup\"))\n\t\t\t\tdefault:\n\t\t\t\t}\n\t\t\t}\n\t\tcase need := <-self.toggle:\n\t\t\tif alarm == nil && need {\n\t\t\t\talarm = time.NewTicker(time.Duration(self.callInterval)).C\n\t\t\t}\n\t\t\tif alarm != nil && !need {\n\t\t\t\talarm = nil\n\n\t\t\t}\n\t\tcase <-self.quit:\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "09025263a63f3ca841023b2702232c70", "score": "0.48919955", "text": "func (sw *Writer) maintainLastMinuteActivity() {\n\tt := time.NewTicker(10 * time.Second)\n\tdefer t.Stop()\n\n\tvar dpSamples [6]int64\n\tvar dpFailedSamples [6]int64\n\tvar eventSamples [6]int64\n\tvar spanSamples [6]int64\n\tidx := 0\n\tfor {\n\t\tselect {\n\t\tcase <-sw.ctx.Done():\n\t\t\treturn\n\t\tcase <-t.C:\n\t\t\tsw.datapointsLastMinute = atomic.LoadInt64(&sw.datapointWriter.TotalSent) - dpSamples[idx]\n\t\t\tdpSamples[idx] += sw.datapointsLastMinute\n\n\t\t\tsw.datapointsFailedLastMinute = atomic.LoadInt64(&sw.dpsFailedToSend) - dpFailedSamples[idx]\n\t\t\tdpFailedSamples[idx] += sw.datapointsFailedLastMinute\n\n\t\t\tsw.eventsLastMinute = atomic.LoadInt64(&sw.eventsSent) - eventSamples[idx]\n\t\t\teventSamples[idx] += sw.eventsLastMinute\n\n\t\t\tsw.spansLastMinute = atomic.LoadInt64(&sw.spanWriter.TotalSent) - spanSamples[idx]\n\t\t\tspanSamples[idx] += sw.spansLastMinute\n\n\t\t\tidx = (idx + 1) % 6\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2874611b75493b7d1ee34249872b2d06", "score": "0.4890791", "text": "func freeEntry(d *Deployed) {\n\t// it's already idle, nothing to do\n\tif d.idle {\n\t\treturn\n\t}\n\t// it's not idle and not terminated, so keep it!\n\tif d.status != pb.DeploymentStatus_TERMINATED {\n\t\treturn\n\t}\n\n\t// it's too soon after process terminated, we keep it around for a bit\n\tif time.Since(d.finished) < (time.Duration(*idleReaper) * time.Second) {\n\t\treturn\n\t}\n\tif d.logger != nil {\n\t\td.logger.Flush()\n\t\td.logger = nil\n\t}\n\n\tos.RemoveAll(d.workingDir)\n\td.idle = true\n\tfmt.Printf(\"Reclaimed %s\\n\", d.toString())\n\n}", "title": "" }, { "docid": "35bd55aed98cd94c69f6c5a41e4a6081", "score": "0.48893782", "text": "func (b *Benchmark) startWorker(ctx context.Context, name string) {\n\tlog.Printf(\"Starting %s\", name)\n\tif b.itemExists(ctx, name) {\n\t\tlog.Printf(\"Stopping %s, it looks like another one is active\", name)\n\t\treturn\n\t}\n\n\tvar i int\n\tfor {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\tlog.Printf(\"Stopping %s\", name)\n\t\t\tb.cleanup(name)\n\t\t\treturn\n\t\tcase <-time.Tick(1 * time.Second):\n\t\t\tif i%10 == 0 {\n\t\t\t\tb.writeAccess(ctx, name)\n\t\t\t}\n\t\t\tb.readAccess(ctx, name)\n\t\t\ti++\n\t\t}\n\t}\n}", "title": "" }, { "docid": "56e3868852926ca879447369be894848", "score": "0.48880374", "text": "func (g *governor) run() {\n\tlogInfo(g.id, \"Starting.\")\n\tif g.cfg.MaxRate > 0 && g.minSust > 0 {\n\t\tg.countAcc = newMovingAcc(int(g.minSust))\n\t\tg.maxCount = g.cfg.rateAsCount()\n\t}\n\tif g.cfg.MaxBandwidth > 0 && g.minSust > 0 {\n\t\tg.sizeAcc = newMovingAcc(int(g.minSust))\n\t\tg.maxSize = g.cfg.bandwidthAsSize()\n\t}\n\tg.wExits = make(chan *streamer)\n\tg.lExits = make(chan *launcher)\n\tg.streamers = make(map[*streamer]chan struct{})\n\tg.launchers = make(map[*launcher]chan struct{})\n\tg.backOffTracker.initial = 4 * time.Second\n\tif g.c.CommsCfg.MinDialBackOff > 0 {\n\t\tg.backOffTracker.initial = g.c.CommsCfg.MinDialBackOff\n\t}\n\tg.backOffTracker.max = g.c.CommsCfg.MaxDialBackOff\n\tg.backOffTracker.jitter = g.c.CommsCfg.DialBackOffJitter\n\tgo g.runRetryForwarder()\n\t// Launch first MinConns streamers\n\tg.tryScaleUp()\n\tvar tkrChan <-chan time.Time\n\tif g.cfg.PollInterval > 0 {\n\t\ttkr := time.NewTicker(g.cfg.PollInterval)\n\t\tdefer tkr.Stop()\n\t\ttkrChan = tkr.C\n\t}\n\tlogInfo(g.id, \"Running.\")\n\tfor done := false; !done; {\n\t\tselect {\n\t\tcase l := <-g.lExits:\n\t\t\t// launcher finished\n\t\t\tdelete(g.launchers, l)\n\t\t\tg.backOffTracker.update(l.err)\n\t\t\tif w := l.worker; w != nil {\n\t\t\t\tg.streamers[w] = w.ctl\n\t\t\t} else if l.err != nil {\n\t\t\t\tlogWarn(g.id, \"Error starting streamer: %v\", l.err)\n\t\t\t}\n\t\t\tif len(g.launchers) == 0 {\n\t\t\t\tg.lastScale = time.Now()\n\t\t\t}\n\t\t\t// TODO Handle failed launches\n\t\tcase w := <-g.wExits:\n\t\t\t// worker finished\n\t\t\tif w.inClosed && !g.isClosing {\n\t\t\t\t// Soft stop: Client closed main channel. We are closing, too.\n\t\t\t\tlogInfo(g.id, \"Stopping.\")\n\t\t\t\tg.isClosing = true\n\t\t\t}\n\t\t\tdelete(g.streamers, w)\n\t\t\tif w.didQuit {\n\t\t\t\t// This needs to be on exponential back-off\n\t\t\t\tg.launchStreamer()\n\t\t\t}\n\t\tcase <-tkrChan:\n\t\t\tif g.isClosing {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\ts := g.updateCountersAndEvalScaling()\n\t\t\tif s > 0 {\n\t\t\t\tg.tryScaleUp()\n\t\t\t} else if s < 0 {\n\t\t\t\tg.tryWindDown()\n\t\t\t}\n\t\tcase <-g.ctl:\n\t\t\t// Hard stop command\n\t\t\tlogInfo(g.id, \"Terminating.\")\n\t\t\tdone = true\n\t\t}\n\t\tif !done && g.isClosing {\n\t\t\tdone = len(g.streamers) == 0 && len(g.launchers) == 0\n\t\t}\n\t}\n\t// signal launchers and streamers\n\tlogInfo(g.id, \"Terminating launchers and streamers.\")\n\tfor i, _ := range g.launchers {\n\t\tclose(i.ctl)\n\t}\n\tfor i, _ := range g.streamers {\n\t\tclose(i.ctl)\n\t}\n\t// TODO Signal forwarder to stop\n\tlogInfo(g.id, \"Stopped.\")\n\t// Signal parent\n\tclose(g.done)\n}", "title": "" }, { "docid": "87941a1dd2bfb031892b3a68ac4cfe1f", "score": "0.48787558", "text": "func keepAlive(tx *bolt.Tx, clk clock.Clock, family, name string) error {\n\tif isNameFree(tx, family, name) {\n\t\treturn nil\n\t}\n\t// We only keep alive if the name has some data associated to it.\n\tdata, err := getData(tx, family, name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif data == nil {\n\t\treturn nil\n\t}\n\tdata.UpdatedAt = clk.Now().UTC()\n\tif err = setData(tx, family, name, data); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4e891dcad765d69cd34bc7a5d9e830dd", "score": "0.48785922", "text": "func (r *AllocRunner) dirtySyncState() {\n\tfor {\n\t\tselect {\n\t\tcase <-r.dirtyCh:\n\t\t\tif err := r.syncStatus(); err != nil {\n\t\t\t\t// Only WARN instead of ERR because we continue on\n\t\t\t\tr.logger.Printf(\"[WARN] client: error persisting alloc %q state: %v\",\n\t\t\t\t\tr.allocID, err)\n\t\t\t}\n\t\tcase <-r.ctx.Done():\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4e48fa4597ce43848179aae8145eb640", "score": "0.4876747", "text": "func (d *dentry) updateAfterSetStatLocked(opts *vfs.SetStatOptions) {\n\tif opts.Stat.Mask&linux.STATX_MODE != 0 {\n\t\td.mode.Store((d.mode.RacyLoad() & linux.S_IFMT) | uint32(opts.Stat.Mode&^linux.S_IFMT))\n\t}\n\tif opts.Stat.Mask&linux.STATX_UID != 0 {\n\t\td.uid.Store(opts.Stat.UID)\n\t}\n\tif opts.Stat.Mask&linux.STATX_GID != 0 {\n\t\td.gid.Store(opts.Stat.GID)\n\t}\n}", "title": "" }, { "docid": "6f3d14d69cd4f82c9475d1dbf25ec8a0", "score": "0.48742872", "text": "func main3() {\n\tmutex := sync.Mutex{}\n\tm := map[string]int{}\n\n\tgo func() {\n\t\tmutex.Lock()\n\t\tm[\"abc\"] = 1\n\t\tmutex.Unlock()\n\t}()\n\n\tgo func() {\n\t\tfor {\n\t\t\tmutex.Lock()\n\t\t\tm[\"abc\"]++\n\t\t\tfmt.Println(m[\"abc\"])\n\t\t\tmutex.Unlock()\n\t\t\ttime.Sleep(time.Second * 1) // try removing this line, notice the change?\n\t\t}\n\t}()\n\n\ttime.Sleep(time.Second * 5) // try removing this line, notice the change?\n}", "title": "" }, { "docid": "30f246a52762f6f4426f1fc35b467d49", "score": "0.48741123", "text": "func (s *CacheServer) status(ch chan bool) {\n\tfor {\n\t\t// Only excecute once a message over the channel is received\n\t\t<-ch\n\t\tlog.Println(\"received true over the channel\")\n\n\t\ts.mutex.RLock()\n\t\t// Count how many ROAs we have.\n\t\tvar v4, v6 int\n\t\tfor _, r := range s.roas {\n\t\t\tif r.Prefix.IP().Is4() {\n\t\t\t\tv4++\n\t\t\t} else {\n\t\t\t\tv6++\n\t\t\t}\n\t\t}\n\n\t\tlog.Println(\"*** Status ***\")\n\t\tlog.Printf(\"I currently have %d clients connected\\n\", len(s.clients))\n\t\tfor i, v := range s.clients {\n\t\t\tlog.Printf(\"%d: %s\\n\", i+1, v.addr)\n\t\t}\n\t\tlog.Printf(\"Current serial number is %d\\n\", s.serial)\n\t\tlog.Printf(\"Last diff is %t\\n\", s.diff.diff)\n\t\tlog.Printf(\"Current size of diff is %d\\n\", len(s.diff.addRoa)+len(s.diff.delRoa))\n\t\tif len(s.diff.addRoa) > 0 {\n\t\t\tlog.Printf(\"ROAs to be added:\")\n\t\t\tfor _, v := range s.diff.addRoa {\n\t\t\t\tlog.Printf(\"%s Mask %d ASN %d\", v.Prefix.IPNet().String(), v.Prefix.Bits(), v.ASN)\n\t\t\t}\n\t\t}\n\t\tif len(s.diff.delRoa) > 0 {\n\t\t\tlog.Printf(\"ROAs to be deleted:\")\n\t\t\tfor _, v := range s.diff.delRoa {\n\t\t\t\tlog.Printf(\"%s Mask %d ASN %d\", v.Prefix.IPNet().String(), v.Prefix.Bits(), v.ASN)\n\t\t\t}\n\t\t}\n\t\tlog.Printf(\"There are %d ROAs\\n\", len(s.roas))\n\t\tlog.Printf(\"There are %d IPv4 ROAs and %d IPv6 ROAs\\n\", v4, v6)\n\t\tif !s.updates.lastCheck.IsZero() {\n\t\t\tlog.Printf(\"Last check was %v\\n\", s.updates.lastCheck.Format(\"2006-01-02 15:04:05\"))\n\t\t}\n\t\tif !s.updates.lastError.IsZero() {\n\t\t\tlog.Printf(\"Last error checking update was %v\\n\", s.updates.lastError.Format(\"2006-01-02 15:04:05\"))\n\t\t}\n\t\tif !s.updates.lastUpdate.IsZero() {\n\t\t\tlog.Printf(\"Last ROA change was %v\\n\", s.updates.lastUpdate.Format(\"2006-01-02 15:04:05\"))\n\t\t}\n\n\t\tvar m runtime.MemStats\n\t\truntime.ReadMemStats(&m)\n\t\tlog.Printf(\"Alloc = %v MiB\", bToMb(m.Alloc))\n\t\tlog.Printf(\"\\tTotalAlloc = %v MiB\", bToMb(m.TotalAlloc))\n\t\tlog.Printf(\"\\tSys = %v MiB\", bToMb(m.Sys))\n\t\tlog.Printf(\"\\tNumGC = %v\\n\", m.NumGC)\n\t\tlog.Println(\"*** eom ***\")\n\t\ts.mutex.RUnlock()\n\t}\n}", "title": "" }, { "docid": "91e84193cc7c2e04bba7bad82baed2da", "score": "0.48711684", "text": "func (t *targetrunner) oneLRU(bucketdir string, fschkwg *sync.WaitGroup, xlru *xactLRU) {\n\tdefer fschkwg.Done()\n\th := &fileInfoMinHeap{}\n\theap.Init(h)\n\n\ttoevict, err := getToEvict(bucketdir, ctx.config.LRU.HighWM, ctx.config.LRU.LowWM)\n\tif err != nil {\n\t\treturn\n\t}\n\tglog.Infof(\"LRU %s: to evict %.2f MB\", bucketdir, float64(toevict)/MiB)\n\n\t// init LRU context\n\tvar oldwork []*fileInfo\n\tlctx := &lructx{totsize: toevict, xlru: xlru, heap: h, oldwork: oldwork, t: t}\n\n\tif err = filepath.Walk(bucketdir, lctx.lruwalkfn); err != nil {\n\t\ts := err.Error()\n\t\tif strings.Contains(s, \"xaction\") {\n\t\t\tglog.Infof(\"Stopping %q traversal: %s\", bucketdir, s)\n\t\t} else {\n\t\t\tglog.Errorf(\"Failed to traverse %q, err: %v\", bucketdir, err)\n\t\t}\n\t\treturn\n\t}\n\tif err := t.doLRU(toevict, bucketdir, lctx); err != nil {\n\t\tglog.Errorf(\"doLRU %q, err: %v\", bucketdir, err)\n\t}\n}", "title": "" }, { "docid": "51facc76115a70eaec97a1ddec4f325f", "score": "0.48611048", "text": "func (p *PPU) updateSTAT() {\n\tstatSig := uint8(0)\n\n\t// Calculate new signal.\n\tif p.lycCheck && p.ly == p.lyc {\n\t\tstatSig = 0x1\n\t}\n\tif p.hblCheck && p.mode == ModeHBlank {\n\t\tstatSig = 0x1\n\t}\n\tif (p.vblCheck || p.oamCheck) && p.mode == ModeVBlank { // Possible bug in Game Boy hardware.\n\t\tstatSig = 0x1\n\t}\n\tif p.oamCheck && p.mode == ModeOAM {\n\t\tstatSig = 0x1\n\t}\n\n\t// If there is a rising edge, trigger the STAT interrupt.\n\tif p.statSig == 0x0 && statSig == 0x1 {\n\t\tp.interruptSTAT()\n\t}\n\n\tp.statSig = statSig\n}", "title": "" }, { "docid": "0a27b6464e714cf3bb950b211b8908c5", "score": "0.4858754", "text": "func (m *Monit) getStat() {\n\tvar stats runtime.MemStats\n\truntime.ReadMemStats(&stats)\n\n\t// Gather base\n\tm.config.Base[\"app_used_memory\"] = float64(stats.HeapAlloc) / 1000000\n\tm.config.Base[\"uptime\"] = time.Now().Unix() - m.start\n\n\t// Get requests / response times\n\tm.config.Base[\"requests\"] = m.requests\n\tif m.requests > 0 {\n\t\tm.config.Base[\"response_times\"] = m.durations / m.requests\n\t} else {\n\t\tm.config.Base[\"response_times\"] = 0\n\t}\n}", "title": "" }, { "docid": "1e47117ec3089526bd23a172542dd1b9", "score": "0.48583356", "text": "func Stat(g *types.Cmd) {\n\tg.AddOptions(\"--stat\")\n}", "title": "" }, { "docid": "7a56360d65eb2cfbc75cbcc7d7cf97d6", "score": "0.48571277", "text": "func (sw *statusWorker) Run() {\n\tfor {\n\t\tsw.runOnce()\n\t\ttime.Sleep(sw.pollInterval)\n\t}\n}", "title": "" }, { "docid": "3846b079693e90848c5561de9d759ed7", "score": "0.485645", "text": "func (m *Manager) run() {\n\tl := log.WithFields(logrus.Fields{\n\t\t\"component\": \"Manager.run\",\n\t})\n\tfor {\n\t\tev, quit := m.queue.Get()\n\t\tif quit {\n\t\t\treturn\n\t\t}\n\t\tst := m.process(ev)\n\t\tswitch st {\n\t\tcase types.SyncStateSuccess: // Nothing to do.\n\t\tcase types.SyncStateError: // Re-add upon error to retry.\n\t\t\tm.queue.Add(ev)\n\t\tcase types.SyncStateReprocessAll:\n\t\t\t// This is returned when a service is deleted. When a service is\n\t\t\t// deleted, then that frees up an LB IP. If there are pending\n\t\t\t// services waiting to be allocated an IP, then we need to\n\t\t\t// reprocess of the services in order to allocate an IP for the\n\t\t\t// ones without one.\n\t\t\t//\n\t\t\t// Adapted from\n\t\t\t// go.universe.tf/metallb/pkg/controller/service.go:108.\n\n\t\t\t// The other case when SyncStateReprocessAll is returned in MetalLB\n\t\t\t// is when the configuration changes. However, we are not watching\n\t\t\t// for configuration changes because our configuration is static\n\t\t\t// and loaded once at Cilium start time.\n\n\t\t\tl.Debug(\"encountered SyncStateReprocessAll, resyncing all services\")\n\t\t\tm.forceResync()\n\t\t}\n\t\t// if queue.Add(key) is called previous to this invocation the event\n\t\t// is requeued, else it is discarded from the queue.\n\t\tm.queue.Done(ev)\n\t}\n}", "title": "" }, { "docid": "0edae3325ccfb3e853bbb69a40bca974", "score": "0.48540002", "text": "func (pb *PBServer) tick() {\n pb.mu.Lock()\n defer pb.mu.Unlock()\n \n var original_backup = pb.backup\n view, error := pb.vs.Ping(pb.viewnum)\n\n if error != nil {\n //fmt.Println(error)\n } else {\n pb.role, pb.viewnum, pb.primary, pb.backup = read_view(pb.me, view)\n //fmt.Printf(\"tick: %s, %d, P%s, B%s\\n\", pb.role, pb.viewnum, pb.primary, pb.backup)\n if pb.role == \"primary\" && original_backup != pb.backup && pb.backup != \"\" {\n // Initiate safe (locking) transfer of key/value pairs from primary to new backup.\n pb.transfer_kvstore()\n }\n } \n\n}", "title": "" }, { "docid": "31f133d6a2cbc89b4a906c94f5a90025", "score": "0.48534808", "text": "func (q *arenaQueue) stat() (t, f, e uint32) {\n\tl := q.len()\n\tif l == 0 {\n\t\treturn\n\t}\n\t_ = q.buf[l-1]\n\tfor i := 0; i < l; i++ {\n\t\tt++\n\t\tswitch {\n\t\tcase q.buf[i].full():\n\t\t\tf++\n\t\tcase q.buf[i].empty():\n\t\t\te++\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "1cdec1841ab1911ec82fac9c32cea45b", "score": "0.48531756", "text": "func (this *FileLog) getFileStats() {\n this.perfs.Set(\n PERF_FLOG_CRASH_BYTES, \n fs.GetFileSize(filepath.Join(DEFAULT_LOG_DIR, CRASH_LOG_NAME)),\n )\n\n this.perfs.Set(\n PERF_FLOG_DEBUG_BYTES, \n fs.GetFileSize(filepath.Join(DEFAULT_LOG_DIR, DEBUG_LOG_NAME)),\n )\n\n this.perfs.Set(\n PERF_FLOG_ERROR_BYTES,\n fs.GetFileSize(filepath.Join(DEFAULT_LOG_DIR, ERROR_LOG_NAME)),\n )\n\n this.perfs.Set(\n PERF_FLOG_INFO_BYTES,\n fs.GetFileSize(filepath.Join(DEFAULT_LOG_DIR, INFO_LOG_NAME)),\n )\n\n stdtime.AfterFunc(1 * stdtime.Minute, this.getFileStats)\n}", "title": "" }, { "docid": "7c53ddf829a8bf110503872f2bdef297", "score": "0.48530793", "text": "func (p *persistedStore) sync() {\n\t// Interrupt current sync process (if ongoing)\n\tatomic.StoreInt32(&p.syncing, 0)\n\n\tif len(p.syncCh) == 0 {\n\t\tp.syncCh <- true\n\t}\n}", "title": "" }, { "docid": "ceea49e65e88d1c0f8cc331fbde61024", "score": "0.48477072", "text": "func (s *Stopable) monitor() {\n\t<-s.kill //sync with new()\n\tfor {\n\t\tselect {\n\t\tcase <-s.kill:\n\t\t\ts.kill <- nil //lock\n\t\t\tclose(s.alive)\n\t\t\tclose(s.kill)\n\t\t\treturn\n\t\tcase s.alive <- true:\n\t\t}\n\t}\n}", "title": "" }, { "docid": "312ca7ce19823dccf44a75ea183626f4", "score": "0.48416966", "text": "func Monit() {\n\tlogger.Info(\"monitoring\", \"Started Monitoring\")\n\tvar err error\n\ttc := time.NewTicker(1 * time.Minute)\n\tfor {\n\t\tlogger.Debug(\"monitoring\", \"Started Monit on Resources\")\n\t\tnow := time.Now()\n\t\tfound := 0\n\t\terr = database.DB.Update(func(tx *bolt.Tx) error {\n\t\t\tb := tx.Bucket([]byte(\"resources\"))\n\t\t\treturn b.ForEach(func(k, v []byte) error {\n\t\t\t\tvar err error\n\t\t\t\tr := &models.Resource{}\n\t\t\t\tif err = r.Decode(v); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tif r.DeleteAt.Before(now) {\n\t\t\t\t\tfound++\n\t\t\t\t\tif err = b.Delete([]byte(r.Key)); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t\tif err = os.Remove(path.Join(conf.C.UploadDir, r.Key)); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t})\n\t\t})\n\t\tif err != nil {\n\t\t\tlogger.Err(\"monitoring\", \"While monitoring\", err)\n\t\t} else {\n\t\t\tif found > 0 {\n\t\t\t\tlogger.Info(\"monitoring\", fmt.Sprintf(\"Deleted %d entries and files in %s\", found, time.Since(now)))\n\t\t\t}\n\t\t}\n\t\tlogger.Debug(\"monitoring\", fmt.Sprintf(\"Done Monit on Resources (%s)\", time.Since(now)))\n\t\t<-tc.C\n\t}\n}", "title": "" }, { "docid": "bf66baa4f94a9cc3f97238bddd120fea", "score": "0.48375335", "text": "func (c *LocalChecker) processAlive(cxt *checkContext) {\n\tif (!cxt.status.Alive && cxt.delay == 1) || cxt.status.Since == 0 {\n\t\tc.sendUpdate(cxt, true)\n\t}\n\n\tcxt.lastalive = time.Now()\n\tif cxt.delay > 1 {\n\t\tcxt.delay--\n\t}\n\tif cxt.penalty > 1 {\n\t\tcxt.penalty--\n\t}\n}", "title": "" }, { "docid": "ffc643c32c899e6da009fe4fc90bc7ec", "score": "0.4833789", "text": "func (p *progressReporter) start() {\n\tgo func() {\n\t\tticker := time.NewTicker(defaultImagePullingProgressReportInterval)\n\t\tdefer ticker.Stop()\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-ticker.C:\n\t\t\t\t_, timestamp := p.progress.get()\n\t\t\t\t// If there is no progress for p.imagePullProgressDeadline, cancel the operation.\n\t\t\t\tif time.Since(timestamp) > p.imagePullProgressDeadline {\n\t\t\t\t\t//log.Printf(\"Cancel pulling image %q because of no progress for %v, latest progress: %q\", p.image, p.imagePullProgressDeadline, progress)\n\t\t\t\t\t//log.Println()\n\t\t\t\t\tp.cancel()\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\t//log.Printf(\"Pulling image %q: %q\", p.image, progress)\n\t\t\t\t//log.Println()\n\t\t\tcase <-p.stopCh:\n\t\t\t\t//progress, _ := p.progress.get()\n\t\t\t\t//log.Printf(\"Stop pulling image %q: %q\", p.image, progress)\n\t\t\t\t//log.Println()\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "1306a838aee299ccdc2724104b9ebb08", "score": "0.48332754", "text": "func (s *RequestStat) reset() {\n\tif s.timestamp != 0 {\n\t\tDebug(\"Host:\", s.host.Url, \"Requests:\", s.Count, \"Errors:\", s.Errors, \"Status codes:\", s.Codes)\n\t}\n\n\ts.timestamp = time.Now().Unix()\n\n\ts.Codes = make(map[int]int)\n\ts.Count = 0\n\ts.Errors = 0\n}", "title": "" } ]
248f74a4d5d8d14583e6ae6aa85f5390
GetDirectionOk returns a tuple with the Direction field value if set, nil otherwise and a boolean to check if the value has been set.
[ { "docid": "6320767c06600b5d6b6dadd2539d2b93", "score": "0.7756326", "text": "func (o *SessionInfoDistinguishedNameFirewallRules) GetDirectionOk() (*string, bool) {\n\tif o == nil || o.Direction == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Direction, true\n}", "title": "" } ]
[ { "docid": "152fc7b8206446821ba910c451cd7ae1", "score": "0.78785545", "text": "func (o *ClientProvidedEnrichedTransaction) GetDirectionOk() (*EnrichTransactionDirection, bool) {\n\tif o == nil || o.Direction == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Direction, true\n}", "title": "" }, { "docid": "aac70e5b72449644de832eede63879fe", "score": "0.7046883", "text": "func (g *GraphDefinitionRequest) GetOrderDirectionOk() (string, bool) {\n\tif g == nil || g.OrderDirection == nil {\n\t\treturn \"\", false\n\t}\n\treturn *g.OrderDirection, true\n}", "title": "" }, { "docid": "979a90b70a69137d31b2574e6d21e5bc", "score": "0.66177356", "text": "func (o *UsageAttributionPagination) GetSortDirectionOk() (*string, bool) {\n\tif o == nil || o.SortDirection == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SortDirection, true\n}", "title": "" }, { "docid": "0b7947c9c91ec856397f2723d979547a", "score": "0.6127208", "text": "func (o *ConnectionDTO) GetDestinationOk() (*ConnectableDTO, bool) {\n\tif o == nil || o.Destination == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Destination, true\n}", "title": "" }, { "docid": "02a7efa9a4417bc3fef9d14f2b8d2b3c", "score": "0.6115408", "text": "func (o *Route4Type) GetDestinationOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Destination, true\n}", "title": "" }, { "docid": "13cf47108101f1884c102ac69ea38a39", "score": "0.60936636", "text": "func (l lift) Direction() Direction {\n\tswitch {\n\tcase len(l.destinations) == 0 || l.destinations[0] == l.floor:\n\t\treturn Still\n\tcase l.destinations[0] < l.floor:\n\t\treturn Down\n\tdefault:\n\t\treturn Up\n\t}\n}", "title": "" }, { "docid": "a9aeabe72edc0a93c640fbcdc7252b63", "score": "0.60660017", "text": "func (o *LinkTypeUpdate) GetInwardOk() (*string, bool) {\n\tif o == nil || o.Inward == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Inward, true\n}", "title": "" }, { "docid": "435ffda09363d09b853974c53ab670fa", "score": "0.60627675", "text": "func (t *TileDefRequest) GetOrderDirOk() (string, bool) {\n\tif t == nil || t.OrderDir == nil {\n\t\treturn \"\", false\n\t}\n\treturn *t.OrderDir, true\n}", "title": "" }, { "docid": "7f7cefb6434ade443cdf28396869284b", "score": "0.60612583", "text": "func (call *CallInfo) GetDirection() Direction {\n\treturn Direction(call.State & 0x80)\n}", "title": "" }, { "docid": "0d6fe71aa2a99db9f84a81c1b4bab618", "score": "0.60263747", "text": "func (o *ClientProvidedEnrichedTransaction) HasDirection() bool {\n\tif o != nil && o.Direction != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "a0226d53ab69ffe12d84df54f47a21fe", "score": "0.59443444", "text": "func (o *LinkTypeUpdate) GetOutwardOk() (*string, bool) {\n\tif o == nil || o.Outward == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Outward, true\n}", "title": "" }, { "docid": "e73b28b3d2d78bf7e9df387bfe5f401b", "score": "0.5927891", "text": "func (c *ChangeRequest) GetOrderDirOk() (string, bool) {\n\tif c == nil || c.OrderDir == nil {\n\t\treturn \"\", false\n\t}\n\treturn *c.OrderDir, true\n}", "title": "" }, { "docid": "8fea0f22723c17f38c8361c6917c7f5a", "score": "0.5909771", "text": "func (o *NumaDistance) GetDestinationOk() (*int32, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Destination, true\n}", "title": "" }, { "docid": "d7cd4b98852b038dee7bc35ae94988e6", "score": "0.590092", "text": "func TestDirection(t *testing.T) {\n\teUp := &elevator{id: 1, floor: 0, goalFloor: 10}\n\n\tif eUp.Direction() != 1 {\n\t\tt.Errorf(\"Expected Direction = up got %v\\n\", eUp.Direction())\n\t}\n\n\teDown := &elevator{id: 1, floor: 10, goalFloor: 0}\n\n\tif eDown.Direction() != -1 {\n\t\tt.Errorf(\"Expected Direction = down got %v\\n\", eDown.Direction())\n\t}\n}", "title": "" }, { "docid": "0e4429def18a6235fc75d6a688bb90c4", "score": "0.58641946", "text": "func (l Location) GetDirection(next *Location) Direction {\n\tif l.row == next.row {\n\t\tif l.col == next.col+1 {\n\t\t\treturn Left\n\t\t} else {\n\t\t\treturn Right\n\t\t}\n\t} else {\n\t\tif l.row == next.row+1 {\n\t\t\treturn Up\n\t\t} else {\n\t\t\treturn Down\n\t\t}\n\t}\n}", "title": "" }, { "docid": "6ca256545be9611aac523fe1461f25a4", "score": "0.5858363", "text": "func (ar3 *AR3exec) GetDirections() (bool, bool, bool, bool, bool, bool, bool) {\n\treturn ar3.j1dir, ar3.j2dir, ar3.j3dir, ar3.j4dir, ar3.j5dir, ar3.j6dir, ar3.trdir\n}", "title": "" }, { "docid": "6f6e82519836e9dd7323c0193820c5a8", "score": "0.5825184", "text": "func (o *Share) GetDirectoryOk() (*string, bool) {\n\tif o == nil || o.Directory == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Directory, true\n}", "title": "" }, { "docid": "7dcc548eadf9df640d903a53a504725d", "score": "0.5769555", "text": "func (o PacketMirroringFilterPtrOutput) Direction() PacketMirroringFilterDirectionPtrOutput {\n\treturn o.ApplyT(func(v *PacketMirroringFilter) *PacketMirroringFilterDirection {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Direction\n\t}).(PacketMirroringFilterDirectionPtrOutput)\n}", "title": "" }, { "docid": "c41c3f59bed6931b52a23fbe1fccf978", "score": "0.5767517", "text": "func (o *NumaDistance) GetDistanceOk() (*int32, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Distance, true\n}", "title": "" }, { "docid": "ef77e688dfb5c0c032823142ec081d49", "score": "0.5705564", "text": "func (o *SessionInfoDistinguishedNameFirewallRules) HasDirection() bool {\n\tif o != nil && o.Direction != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "3280a6cd6d659331ac943f49767bc6fe", "score": "0.5679206", "text": "func (o *ClientProvidedEnrichedTransaction) GetDirection() EnrichTransactionDirection {\n\tif o == nil || o.Direction == nil {\n\t\tvar ret EnrichTransactionDirection\n\t\treturn ret\n\t}\n\treturn *o.Direction\n}", "title": "" }, { "docid": "d962800cde56464f492909c45cd9c42d", "score": "0.5658965", "text": "func (o *SessionInfoDistinguishedNameFirewallRules) GetDirection() string {\n\tif o == nil || o.Direction == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Direction\n}", "title": "" }, { "docid": "fbc1a1100110f5719863478acaafb97b", "score": "0.5643589", "text": "func (o PacketMirroringFilterOutput) Direction() PacketMirroringFilterDirectionPtrOutput {\n\treturn o.ApplyT(func(v PacketMirroringFilter) *PacketMirroringFilterDirection { return v.Direction }).(PacketMirroringFilterDirectionPtrOutput)\n}", "title": "" }, { "docid": "441e2893a43164dff5661ed3acd12875", "score": "0.56340414", "text": "func (o *RoutingRule) GetDestinationOk() (*string, bool) {\n\tif o == nil || isNil(o.Destination) {\n return nil, false\n\t}\n\treturn o.Destination, true\n}", "title": "" }, { "docid": "443add8e23a95e308af61c0084881df3", "score": "0.5629887", "text": "func (o *SnmpTrapAllOf) GetDestinationOk() (*string, bool) {\n\tif o == nil || o.Destination == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Destination, true\n}", "title": "" }, { "docid": "7526a1eb03a7f9398960f20d5ade4082", "score": "0.5597563", "text": "func (t *RTPTransceiver) Direction() RTPTransceiverDirection {\n\tif direction, ok := t.direction.Load().(RTPTransceiverDirection); ok {\n\t\treturn direction\n\t}\n\treturn RTPTransceiverDirection(0)\n}", "title": "" }, { "docid": "6df503b840d2de93035b74545351100b", "score": "0.55926514", "text": "func (o *DirectLink) GetLocationOk() (*string, bool) {\n\tif o == nil || o.Location == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Location, true\n}", "title": "" }, { "docid": "d9750b377d9c4dfe8bc96e39b571cebb", "score": "0.5588572", "text": "func (o PacketMirroringFilterResponseOutput) Direction() pulumi.StringOutput {\n\treturn o.ApplyT(func(v PacketMirroringFilterResponse) string { return v.Direction }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "c5f19cb478099509411305c83941c618", "score": "0.55768734", "text": "func (c Coord) Direction() CoordDirection {\n\treturn c >= 0\n}", "title": "" }, { "docid": "19c0982005a9075b454679380c312cc2", "score": "0.5576241", "text": "func NewDirectionsForDirectionOK() *DirectionsForDirectionOK {\n\treturn &DirectionsForDirectionOK{}\n}", "title": "" }, { "docid": "99d88781dc89e10f62d859e37a960e7b", "score": "0.5567331", "text": "func NextDirection(d Direction) Direction {\n\tswitch d {\n\tcase Up:\n\t\treturn Down\n\tcase Down:\n\t\treturn Left\n\tcase Left:\n\t\treturn Right\n\tdefault:\n\t\treturn None\n\t}\n}", "title": "" }, { "docid": "08cc5eb94451f8cd07184b76ac3cdb75", "score": "0.5565333", "text": "func TestDirectionZeroValue(t *testing.T) {\n\tt.Parallel()\n\tvar d game.Direction\n\tif game.NoDirection != d {\n\t\tt.Errorf(\"game.NoDirection = %v, want %v\", game.NoDirection, d)\n\t}\n}", "title": "" }, { "docid": "fb9f062e69c06baceb6aa6391553f4af", "score": "0.5560554", "text": "func (gb *GameBoard) GetDirection() string {\n\treturn gb.tileMoveDirection\n}", "title": "" }, { "docid": "856fd365c16d254eb30d59e2292f9dbc", "score": "0.5554078", "text": "func (recv *ThemingEngine) GetDirection() TextDirection {\n\tretC := C.gtk_theming_engine_get_direction((*C.GtkThemingEngine)(recv.native))\n\tretGo := (TextDirection)(retC)\n\n\treturn retGo\n}", "title": "" }, { "docid": "a62b160dc487fa1958fc14070371be64", "score": "0.55533", "text": "func (recv *Widget) GetDirection() TextDirection {\n\tretC := C.gtk_widget_get_direction((*C.GtkWidget)(recv.native))\n\tretGo := (TextDirection)(retC)\n\n\treturn retGo\n}", "title": "" }, { "docid": "c9149e8fd7952e2d68c2399a9964b8ef", "score": "0.5538972", "text": "func (o FirewallPolicyRuleResponseOutput) Direction() pulumi.StringOutput {\n\treturn o.ApplyT(func(v FirewallPolicyRuleResponse) string { return v.Direction }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "feae2164ef15afda55a7ea7ad59c379c", "score": "0.5538257", "text": "func (g *Ghost) GetDirection() constants.Direction {\n\treturn g.direction\n}", "title": "" }, { "docid": "c1a5ef3e89dad8169a400393e14e6f15", "score": "0.55315614", "text": "func (o FirewallPolicyRuleOutput) Direction() FirewallPolicyRuleDirectionPtrOutput {\n\treturn o.ApplyT(func(v FirewallPolicyRule) *FirewallPolicyRuleDirection { return v.Direction }).(FirewallPolicyRuleDirectionPtrOutput)\n}", "title": "" }, { "docid": "d0b329163ad7dc55cde051ea8f2fce12", "score": "0.55161005", "text": "func (o *Pullrequest) GetDestinationOk() (*PullrequestEndpoint, bool) {\n\tif o == nil || o.Destination == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Destination, true\n}", "title": "" }, { "docid": "28c57acbdb0217670f80c4ea15fd00ff", "score": "0.5509336", "text": "func (c *ChannelType) Direction() ChanDir {\n\treturn c.direction\n}", "title": "" }, { "docid": "8ab98b55ffc7342f3d56693a104c03b8", "score": "0.5452202", "text": "func (a *Asserter) Direction(direction types.Direction) error {\n\tif direction != types.Forward &&\n\t\tdirection != types.Backward {\n\t\treturn ErrInvalidDirection\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "8ee8c091ca060e0c51c61720dc91a156", "score": "0.54358536", "text": "func (s *Sphere) GetDirection() mgl32.Vec3 {\n\treturn s.direction\n}", "title": "" }, { "docid": "015a9a1adb5cdd50f32905be8b533b51", "score": "0.5435232", "text": "func (o *TravelTimeGetCompareOverlayParams) SetDirection(direction string) {\n\to.Direction = direction\n}", "title": "" }, { "docid": "51914a130e45d2199ea7c385455cc7b6", "score": "0.5400094", "text": "func (r *RayImpl) Direction() *vec3.Vec3Impl {\n\treturn r.direction\n}", "title": "" }, { "docid": "a9988b73bbfb6d8d3abba76cfb7569ee", "score": "0.539427", "text": "func (recv *MenuButton) GetDirection() ArrowType {\n\tretC := C.gtk_menu_button_get_direction((*C.GtkMenuButton)(recv.native))\n\tretGo := (ArrowType)(retC)\n\n\treturn retGo\n}", "title": "" }, { "docid": "85244fdc021d6736861facd15f7dc90e", "score": "0.5382316", "text": "func (s *Signal) GetDirection() order.Side {\n\treturn s.Direction\n}", "title": "" }, { "docid": "87ffd7c63a9c48c728b288529678bcb3", "score": "0.53598356", "text": "func (o *SessionInfoDistinguishedNameFirewallRules) SetDirection(v string) {\n\to.Direction = &v\n}", "title": "" }, { "docid": "5229b7e1cd164cfb8f8ed4db24eaf104", "score": "0.53525615", "text": "func (o *ConnectionDTO) GetGetzIndexOk() (*int64, bool) {\n\tif o == nil || o.GetzIndex == nil {\n\t\treturn nil, false\n\t}\n\treturn o.GetzIndex, true\n}", "title": "" }, { "docid": "44e4f6c9a02a5bf083d9ca8481505198", "score": "0.53350484", "text": "func (o *Share) GetDirPermissionsOk() (*int32, bool) {\n\tif o == nil || o.DirPermissions == nil {\n\t\treturn nil, false\n\t}\n\treturn o.DirPermissions, true\n}", "title": "" }, { "docid": "72e5dba14ed5ca3e9edacbe8c1d2d4d6", "score": "0.5324114", "text": "func (recv *IconSource) GetDirection() TextDirection {\n\tretC := C.gtk_icon_source_get_direction((*C.GtkIconSource)(recv.native))\n\tretGo := (TextDirection)(retC)\n\n\treturn retGo\n}", "title": "" }, { "docid": "eefa2546a8c1fa4320702c8e04ef26d2", "score": "0.5320385", "text": "func (o *V1GeneDescriptor) GetOrientationOk() (*V1Orientation, bool) {\n\tif o == nil || o.Orientation == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Orientation, true\n}", "title": "" }, { "docid": "6830a5772496edf519d8279ad0dc6d03", "score": "0.5303348", "text": "func (recv *StyleContext) GetDirection() TextDirection {\n\tretC := C.gtk_style_context_get_direction((*C.GtkStyleContext)(recv.native))\n\tretGo := (TextDirection)(retC)\n\n\treturn retGo\n}", "title": "" }, { "docid": "b329d9f285e488cf1e1f9e1e62906a65", "score": "0.52980006", "text": "func (t *ListenerTable) Direction(\n\tproto uint8,\n\tlocalIP net.IP, localPort int,\n\tremoteIP net.IP, remotePort int,\n) Direction {\n\tif remotePort == 0 {\n\t\treturn Listening\n\t}\n\n\t// Are there any listeners on the given protocol?\n\tports, exists := t.data[proto]\n\tif !exists {\n\t\treturn Outbound\n\t}\n\n\t// Is there any listener on the port?\n\tinterfaces, exists := ports[localPort]\n\tif !exists {\n\t\treturn Outbound\n\t}\n\n\t// Is there a listener that specific interface? OR\n\t// Is there a listener on the \"any\" address (0.0.0.0 or ::)?\n\tisIPv4 := localIP.To4() != nil\n\tfor _, ip := range interfaces.ips {\n\t\tswitch {\n\t\tcase ip.Equal(localIP):\n\t\t\treturn Inbound\n\t\tcase ip.Equal(net.IPv4zero) && isIPv4:\n\t\t\treturn Inbound\n\t\tcase ip.Equal(net.IPv6zero) && !isIPv4:\n\t\t\treturn Inbound\n\t\t}\n\t}\n\n\treturn Outbound\n}", "title": "" }, { "docid": "37d7afcd7b9c9d5e13fb8bcb8acd9269", "score": "0.52861416", "text": "func (o *MicrosoftGraphFolderView) GetSortOrderOk() (string, bool) {\n\tif o == nil || o.SortOrder == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.SortOrder, true\n}", "title": "" }, { "docid": "8c52b5e68b246701b51f154a562f0296", "score": "0.52850354", "text": "func (p *Peer) Direction() network.Direction {\n\tp.lock.RLock()\n\tdefer p.lock.RUnlock()\n\n\treturn p.direction\n}", "title": "" }, { "docid": "ff196273292a66288ad06dd55e463a66", "score": "0.528485", "text": "func (a *MovingActor) Direction() types.Direction { return a.direction }", "title": "" }, { "docid": "7845e89fe089c5ed716418fcf96ff014", "score": "0.52816755", "text": "func GetMappingVtapCaptureFilterRuleDetailsTrafficDirectionEnum(val string) (VtapCaptureFilterRuleDetailsTrafficDirectionEnum, bool) {\n\tenum, ok := mappingVtapCaptureFilterRuleDetailsTrafficDirectionEnumLowerCase[strings.ToLower(val)]\n\treturn enum, ok\n}", "title": "" }, { "docid": "7ed80158dd656881a49ddbcde9f7a973", "score": "0.5269475", "text": "func (o *ViewBoardColumn) GetSortOrderOk() (*string, bool) {\n\tif o == nil || o.SortOrder == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SortOrder, true\n}", "title": "" }, { "docid": "f80a8f82bc1468ccee07697ae63e2ef3", "score": "0.5267748", "text": "func (m *MockPeer) Direction() peer.Direction {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Direction\")\n\tret0, _ := ret[0].(peer.Direction)\n\treturn ret0\n}", "title": "" }, { "docid": "aad374d3300b1d6dd76550bbc65dd3b7", "score": "0.5267521", "text": "func (p *PointBitField) ScanDirectionFlag() bool {\r\n\treturn (p.Value & byte(64)) == byte(64)\r\n}", "title": "" }, { "docid": "e01b801b5cbd2df98cadfa67674dc4e4", "score": "0.5263538", "text": "func ParseDirection(d string) (Direction, error) {\n\tl := strings.ToLower(d)\n\tif l == \"north\" || l == \"n\" {\n\t\treturn North, nil\n\t} else if l == \"south\" || l == \"s\" {\n\t\treturn South, nil\n\t} else {\n\t\treturn 0, fmt.Errorf(\"%s is not a valid direction. Must be either North or South\", d)\n\t}\n}", "title": "" }, { "docid": "37641ba7f1241759a10d0bdd3e2463a5", "score": "0.52390087", "text": "func (o FirewallPolicyRuleOutput) Direction() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *FirewallPolicyRule) pulumi.StringOutput { return v.Direction }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "1c17aad170941e12db2be64de5f00f0a", "score": "0.5238296", "text": "func (o *ContractProperties) GetStatusOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\n\treturn o.Status, true\n}", "title": "" }, { "docid": "34bba294b764116afb6c5eee24fa5ef2", "score": "0.5210787", "text": "func (o *PortStatusDTO) GetTransmittingOk() (*bool, bool) {\n\tif o == nil || o.Transmitting == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Transmitting, true\n}", "title": "" }, { "docid": "ea75119dd45c3817a4f44847a66776f5", "score": "0.5194988", "text": "func (o *Access) GetPermissionOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Permission, true\n}", "title": "" }, { "docid": "25a0610dbcee9904db70b99f54488c57", "score": "0.5194242", "text": "func direction(f, t pair) int {\n\tswitch {\n\t\tcase f.x < t.x: return East\n\t\tcase f.x > t.x: return West\n\t\tcase f.y < t.y: return South\n//\t\tcase f.y > t.y:\n\t\tdefault: return North\n\t}\n}", "title": "" }, { "docid": "d8825d82258a058f4e54051ec02e9d54", "score": "0.5174104", "text": "func (o *ProvenanceEventDTO) GetRelationshipOk() (*string, bool) {\n\tif o == nil || o.Relationship == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Relationship, true\n}", "title": "" }, { "docid": "963911b26906773424c0ab3b40796fee", "score": "0.5168064", "text": "func (o *HyperflexHxHostMountStatusDt) GetAccessibilityOk() (*string, bool) {\n\tif o == nil || o.Accessibility == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Accessibility, true\n}", "title": "" }, { "docid": "3ad6079a8c6dfda001eaa61789d60ce3", "score": "0.5164283", "text": "func (k *Key) Direction() string {\n\tswitch k.Dir {\n\tcase dirIngress:\n\t\treturn direction[k.Dir]\n\tcase dirEgress:\n\t\treturn direction[k.Dir]\n\t}\n\treturn direction[dirUnknown]\n}", "title": "" }, { "docid": "054029515c25d453740e96b860d5599f", "score": "0.5162451", "text": "func (wp *ReachDistance) ThrustDirection(o Orbit, dt time.Time) (ThrustControl, bool) {\n\tif wp.further {\n\t\tif o.RNorm() >= wp.distance {\n\t\t\twp.cleared = true\n\t\t\treturn Coast{}, true\n\t\t}\n\t\treturn Tangential{}, false\n\t}\n\tif o.RNorm() <= wp.distance {\n\t\twp.cleared = true\n\t\treturn Coast{}, true\n\t}\n\treturn AntiTangential{}, false\n}", "title": "" }, { "docid": "736afbf7146e5fb788b4d457457f609d", "score": "0.5143735", "text": "func (o *Route4Type) GetNextHopOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.NextHop, true\n}", "title": "" }, { "docid": "57a3209c0d4813fce403ba7827f0d79c", "score": "0.5136313", "text": "func (o *FcNeighbor) GetPeerWwnOk() (*string, bool) {\n\tif o == nil || o.PeerWwn == nil {\n\t\treturn nil, false\n\t}\n\treturn o.PeerWwn, true\n}", "title": "" }, { "docid": "a3c15e58c788449d7c696115f519fdcf", "score": "0.5136306", "text": "func (u *User) direction() Direction {\n\tif u.atFloor > u.toFloor {\n\t\treturn Direction(-1)\n\t}\n\treturn Direction(1)\n}", "title": "" }, { "docid": "7e321d117563d2cd33cbac2452906a24", "score": "0.51321644", "text": "func (o *DirectLink) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "title": "" }, { "docid": "10a2b738b3ef90c674a363b4065a110f", "score": "0.5105067", "text": "func (o SecurityPolicyRuleOutput) Direction() SecurityPolicyRuleDirectionPtrOutput {\n\treturn o.ApplyT(func(v SecurityPolicyRule) *SecurityPolicyRuleDirection { return v.Direction }).(SecurityPolicyRuleDirectionPtrOutput)\n}", "title": "" }, { "docid": "17cafdaf7f1b176880ee673dc7e7ae09", "score": "0.5099917", "text": "func (wp *OrbitTarget) ThrustDirection(o Orbit, dt time.Time) (ThrustControl, bool) {\n\tif ok, err := wp.target.EqualsWithin(o, wp.ctrl.Distanceε, wp.ctrl.Eccentricityε, wp.ctrl.Angleε); ok {\n\t\twp.cleared = true\n\t} else if wp.ctrl.cleared {\n\t\tfmt.Printf(\"[WARNING] OrbitTarget reached @%s *but* %s: %s\\n\", dt, err, o.String())\n\t\twp.cleared = true\n\t}\n\tif wp.xprt != nil {\n\t\tα, β := anglesFromUnitΔv(Unit(wp.ctrl.Control(o)))\n\t\twp.xprt.Store(dt, Rad2deg(α), Rad2deg(β))\n\t}\n\treturn wp.ctrl, wp.cleared\n}", "title": "" }, { "docid": "eaa70d15fe787c2fb6dda7b0ffacd7ee", "score": "0.50954866", "text": "func (o *WafEventRequest) GetMethodOk() (*string, bool) {\n\tif o == nil || o.Method == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Method, true\n}", "title": "" }, { "docid": "f19142e1f19d33e49a3e4989e41e64af", "score": "0.509172", "text": "func (o *DestinationDetails) GetCaseSensitiveOk() (*bool, bool) {\n\tif o == nil || o.CaseSensitive == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CaseSensitive, true\n}", "title": "" }, { "docid": "539a3981e5206ad5955caaec9e9ecef2", "score": "0.5090161", "text": "func (o *ComparisonBasic) GetNegateOk() (*bool, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Negate, true\n}", "title": "" }, { "docid": "200516aff2b295db47aa2200206e0bad", "score": "0.50872576", "text": "func (o *LineageDTO) GetUriOk() (*string, bool) {\n\tif o == nil || o.Uri == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Uri, true\n}", "title": "" }, { "docid": "7fac31a55cc2c48b6984916e43c7e3af", "score": "0.5076737", "text": "func (o *NodeConfigDto) GetAgentOk() (*bool, bool) {\n\tif o == nil || o.Agent == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Agent, true\n}", "title": "" }, { "docid": "69c9978b10735989b986af98c2d0a662", "score": "0.5072956", "text": "func (_this *RtpTransceiver) Direction() RtpTransceiverDirection {\n\tvar ret RtpTransceiverDirection\n\tvalue := _this.Value_JS.Get(\"direction\")\n\tret = RtpTransceiverDirectionFromJS(value)\n\treturn ret\n}", "title": "" }, { "docid": "2950e2c5a39649bf36cdeba9a8652de8", "score": "0.5072453", "text": "func ConvertToDir(inputDirection string) bool {\n\tswitch inputDirection {\n\tcase \"I\":\n\t\treturn true\n\tcase \"O\":\n\t\treturn false\n\t}\n\treturn false\n}", "title": "" }, { "docid": "2687b0f2c9b66d109a979c70d87f2c63", "score": "0.50703156", "text": "func (o *RecurrenceTransaction) GetDestinationTypeOk() (*AccountTypeProperty, bool) {\n\tif o == nil || o.DestinationType == nil {\n\t\treturn nil, false\n\t}\n\treturn o.DestinationType, true\n}", "title": "" }, { "docid": "1779ce84eb0e737a1c7fb90632440fee", "score": "0.50634146", "text": "func (o *CreateDatasetParams) GetSnapdirOk() (*string, bool) {\n\tif o == nil || o.Snapdir == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Snapdir, true\n}", "title": "" }, { "docid": "b0add92bfe4a02612377bcc6f3fc006c", "score": "0.50599736", "text": "func (o *LinkTokenCreateRequest) GetTransferOk() (*LinkTokenCreateRequestTransfer, bool) {\n\tif o == nil || o.Transfer == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Transfer, true\n}", "title": "" }, { "docid": "b29ed3dc81c0f1f74f2a2a9b1cd6afd2", "score": "0.50598764", "text": "func (o ScaleActionResponseOutput) Direction() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ScaleActionResponse) string { return v.Direction }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "f782741dc2251a58566e242ab9b702f3", "score": "0.505925", "text": "func (o *ConnectionDTO) GetPositionOk() (*PositionDTO, bool) {\n\tif o == nil || o.Position == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Position, true\n}", "title": "" }, { "docid": "aff62c4f412841e0c969c429adb92b1c", "score": "0.5054092", "text": "func (o *Event) GetLocationOk() (AnyOfmicrosoftGraphLocation, bool) {\n\tif o == nil || o.Location == nil {\n\t\tvar ret AnyOfmicrosoftGraphLocation\n\t\treturn ret, false\n\t}\n\treturn *o.Location, true\n}", "title": "" }, { "docid": "4fe6bb8f9a38431b2e28010be1bac6b7", "score": "0.50538063", "text": "func (o *VersionControlInformationDTO) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "title": "" }, { "docid": "1d017a5e907258e36788f18712a9883d", "score": "0.5053452", "text": "func (sp *Spot) Direction(direction *math32.Vector3) math32.Vector3 {\n\n\treturn sp.direction\n}", "title": "" }, { "docid": "a5fbace31f306fc992bd3c3bdc1171f7", "score": "0.50380933", "text": "func (end *EndpointDescriptor) Direction() EndpointDirection {\n\t// FIXME(mdr): Is this funciton needed? What purpose does it serve? If I'm\n\t// keeping it, I should not return an unexported type.\n\treturn end.EndpointAddress.direction()\n}", "title": "" }, { "docid": "dec2ca635e5935a2ed7e507a98ccfc22", "score": "0.50343746", "text": "func (o *Fechadura) GetCanalOk() (*int32, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Canal.Get(), o.Canal.IsSet()\n}", "title": "" }, { "docid": "c08f0408baea27cfa9d576bd97033656", "score": "0.5034296", "text": "func (o *GetMessageParams) SetDirection(direction *string) {\n\to.Direction = direction\n}", "title": "" }, { "docid": "ab917ae4b71ff93795d1736302d71ec3", "score": "0.50333816", "text": "func (o *LinkTokenCreateRequest) GetDepositSwitchOk() (*LinkTokenCreateRequestDepositSwitch, bool) {\n\tif o == nil || o.DepositSwitch == nil {\n\t\treturn nil, false\n\t}\n\treturn o.DepositSwitch, true\n}", "title": "" }, { "docid": "c7a3e9f1b83e98e3caf3576d674c5a10", "score": "0.50241035", "text": "func (p *PID) GetDirection() int16 {\n\treturn p.direction\n}", "title": "" }, { "docid": "e1c8ab5f25a10afbb553ff36a48d2397", "score": "0.50199294", "text": "func (o GetSecurityGroupRulesRuleOutput) Direction() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetSecurityGroupRulesRule) string { return v.Direction }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "7cb69627996714ae280b5a75efcc78d2", "score": "0.50193435", "text": "func (o *ConnectionStatus) GetConnectedOk() (*bool, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Connected, true\n}", "title": "" }, { "docid": "49ec687d368366569059cfeb7156748a", "score": "0.50133073", "text": "func Direction(v DirectionEnum) func(*options) error {\n\treturn func(o *options) error { return o.setDirection(v) }\n}", "title": "" }, { "docid": "c9f540a3f763bf7831b78a324219e270", "score": "0.50118256", "text": "func (o *LineageDTO) GetFinishedOk() (*bool, bool) {\n\tif o == nil || o.Finished == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Finished, true\n}", "title": "" } ]
ab2865d992c1a09b2c3da2899dbf1ec9
The Delete() function removes the specified element from the Collection by key.
[ { "docid": "fcf5dd59cf296cd311900868e294b1f3", "score": "0.76312864", "text": "func (collection *Collection) Delete(key string) *Collection {\n\tindex := collection.IndexOf(key)\n\tif index != -1 {\n\t\tcollection.pairs = append(collection.pairs[:index], collection.pairs[index+1:]...)\n\t}\n\treturn collection\n}", "title": "" } ]
[ { "docid": "f8e8a13116d190a4ef95062ac09bafcf", "score": "0.8223596", "text": "func (c Collection) Delete(key interface{}) {\n\tc.mutex.Lock()\n\tdefer c.mutex.Unlock()\n\tc.delete(key)\n}", "title": "" }, { "docid": "88f889c7ed9b46cf5c3bf75f68c4d64f", "score": "0.74866897", "text": "func (c Collection) delete(key interface{}) {\n\tdelete(c.items, key)\n\titemIndices, ok := c.keys[key]\n\tif !ok {\n\t\treturn\n\t}\n\tfor _, index := range itemIndices {\n\t\tdelete(c.cells[index.cellLevel][index.cellPosition], key)\n\t}\n\tdelete(c.keys, key)\n}", "title": "" }, { "docid": "bc10267191f202c69f30bc24e519b7f8", "score": "0.73377895", "text": "func Remove(collection string, key string) error { return GetInstance().Remove(collection, key) }", "title": "" }, { "docid": "7913bd45e82f72dbaa250ad2ac6f208b", "score": "0.70812654", "text": "func (c *Collection) Remove(key string) {\n\tdelete(c.data, key)\n}", "title": "" }, { "docid": "eef92d51dd6f6a93f46e2da729bdcbdd", "score": "0.7013151", "text": "func (d *Document) Delete(key ...string) *Element {\n\tif d == nil {\n\t\tpanic(ErrNilDocument)\n\t}\n\n\tif len(key) == 0 {\n\t\treturn nil\n\t}\n\t// Do a binary search through the index, delete the element from\n\t// the index and delete the element from the elems array.\n\tvar elem *Element\n\tfirst := []byte(key[0] + \"\\x00\")\n\ti := sort.Search(len(d.index), func(i int) bool { return bytes.Compare(d.keyFromIndex(i), first) >= 0 })\n\tif i < len(d.index) && bytes.Compare(d.keyFromIndex(i), first) == 0 {\n\t\tkeyIndex := d.index[i]\n\t\telem = d.elems[keyIndex]\n\t\tif len(key) == 1 {\n\t\t\td.index = append(d.index[:i], d.index[i+1:]...)\n\t\t\td.elems = append(d.elems[:keyIndex], d.elems[keyIndex+1:]...)\n\t\t\tfor j := range d.index {\n\t\t\t\tif d.index[j] > keyIndex {\n\t\t\t\t\td.index[j]--\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn elem\n\t\t}\n\t\tswitch elem.value.Type() {\n\t\tcase '\\x03':\n\t\t\telem = elem.value.MutableDocument().Delete(key[1:]...)\n\t\tcase '\\x04':\n\t\t\telem = elem.value.MutableArray().doc.Delete(key[1:]...)\n\t\tdefault:\n\t\t\telem = nil\n\t\t}\n\t}\n\treturn elem\n}", "title": "" }, { "docid": "c1b323932f5ea616560139711651cbcf", "score": "0.6961138", "text": "func (self *driver) Delete(t reflect.Type, key int64) error {\n var rs = self.Records(t)\n var err = rs.Unset(key)\n return err\n}", "title": "" }, { "docid": "d5d1a88aeafce43e03e0657e66afab91", "score": "0.6865369", "text": "func Del(key string) error {\n\treturn adapter.Del(key)\n}", "title": "" }, { "docid": "ec73938278b4de50eb5f560977ffd4b1", "score": "0.68309796", "text": "func Delete(key string) bool { return dc.Delete(key) }", "title": "" }, { "docid": "8d53c2092675c7018a4e101927b4e8d7", "score": "0.67808145", "text": "func Delete(key interface{}) {\n\tinstance.Delete(key)\n}", "title": "" }, { "docid": "8b6abc36e8dc52905942d70b23f79b54", "score": "0.67114604", "text": "func (r *Cache) Delete(key interface{}) {\n\tr.Lock()\n\tdefer r.Unlock()\n\tele, ok := r.reverseItems[key]\n\tif !ok {\n\t\treturn\n\t}\n\tif ele != nil {\n\t\tr.currentSize -= uint64(len(r.reverseItems[key].Value.(*element).value))\n\t\tr.items.Remove(ele)\n\t\tdelete(r.reverseItems, key)\n\t\tr.totalEvicted++\n\t\tif r.OnEvicted != nil {\n\t\t\tr.OnEvicted(key)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "849460af76c3632d8c26b430d942848f", "score": "0.6659584", "text": "func (s *Store) Delete(key interface{}) {\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\tdelete(s.entries, key)\n}", "title": "" }, { "docid": "9a03aa1cba667cf0af22105d51886164", "score": "0.65941757", "text": "func (g *gache) Delete(key interface{}) {\n\tg.data.Delete(key)\n}", "title": "" }, { "docid": "b9c6ab311f8f933b5fd8838dd837d50b", "score": "0.65878046", "text": "func (database *Database) Del(key string) {\n database.Lock()\n defer database.Unlock()\n\n delete(database.table, key)\n}", "title": "" }, { "docid": "8aff5e228164476b570ef57d20178277", "score": "0.6558208", "text": "func (sm safeMap) Delete(key string) {\n sm <- commandData{action: remove, key: key}\n}", "title": "" }, { "docid": "abb7d5cbf4c605ba38dd3c1ecdc97034", "score": "0.65264595", "text": "func Delete(key string) {\n\tdelete(store, key)\n\tupdateLog(\"delete \" + key)\n}", "title": "" }, { "docid": "eeb3e248149bb1dcf6aaf44c004f5694", "score": "0.65045685", "text": "func (s *Store) Del(key string) {\n\ts.Lock()\n\tdelete(s.items, key)\n\ts.Unlock()\n}", "title": "" }, { "docid": "0b80e4aeeaeafd228b98c137e6cbc170", "score": "0.648595", "text": "func Delete(key string) {\n\tif s == nil {\n\t\treturn\n\t}\n\ts.Delete(key)\n}", "title": "" }, { "docid": "512c623041c5d2e2983fda79d87f313d", "score": "0.6481628", "text": "func (s *Storage) Delete(key string) error {\n\t// Ain't Nobody Got Time For That\n\tif len(key) <= 0 {\n\t\treturn nil\n\t}\n\t_, err := s.col.DeleteOne(context.Background(), bson.M{\"key\": key})\n\treturn err\n}", "title": "" }, { "docid": "c9890d08f68d9f787250bf12004ae678", "score": "0.6453063", "text": "func (e *EntitySQL) Delete(key int) error {\n\tsql := \"DELETE FROM item WHERE key = ?\"\n\t_, err := e.db.Exec(sql, key)\n\treturn err\n}", "title": "" }, { "docid": "ae19102d4a51d69afa207a8d8f798121", "score": "0.6448857", "text": "func (p Property) Del(key string) {\n\tdelete(p, key)\n}", "title": "" }, { "docid": "a04ef31497515895cf830b5fb0b8e44c", "score": "0.64353114", "text": "func (db *DB) Del(key string) error {\n\treturn db.DB().Delete([]byte(key), nil)\n}", "title": "" }, { "docid": "7507bba3e1c85984dd51fa6c5ca3c76d", "score": "0.6427795", "text": "func (store *MongoStorage) Delete(key string) error {\n\tc, keyName, err := store.getCollectionAndKey(\"kv/\" + key)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn c.Remove(bson.M{\"k\": keyName})\n}", "title": "" }, { "docid": "9c890c42130dffb7cdb42d6bc2c210fc", "score": "0.6411536", "text": "func (s *Store) Delete(key string) error {\n\tconn := s.Pool.Get()\n\tdefer conn.Close()\n\n\t_, err := conn.Do(\"DEL\", key)\n\treturn err\n}", "title": "" }, { "docid": "5b3f61cf91cbc9aa143ac54e0a476793", "score": "0.63526887", "text": "func (t *Tree) Delete(key keytype) {}", "title": "" }, { "docid": "ad92f0aad0f7e450577e311b9ef56d8b", "score": "0.63448125", "text": "func (s Set[T]) Remove(key T) {\n\tdelete(s, key)\n}", "title": "" }, { "docid": "4131d35e334562d2f71c47bb7378465f", "score": "0.63420534", "text": "func Delete(c appengine.Context, key *datastore.Key) error {\n\terr := deleteMulti(c, []*datastore.Key{key})\n\tif me, ok := err.(appengine.MultiError); ok {\n\t\treturn me[0]\n\t}\n\treturn err\n}", "title": "" }, { "docid": "32b28e50396c1ed8dd5fe2f00aa94445", "score": "0.6337753", "text": "func (st *Store) Delete(key interface{}) error {\n\tdelete(st.value, key)\n\tpder.Update(st.sid)\n\treturn nil\n}", "title": "" }, { "docid": "7419f326e7e7c0a869450691f5d53456", "score": "0.633325", "text": "func (k *BasicAuthsCollection) Delete(keyOrID string) error {\n\treturn k.credentialsCollection.Delete(keyOrID)\n}", "title": "" }, { "docid": "ce2cc434314abf5c74193ae74875bb2d", "score": "0.6327861", "text": "func (r *redisDriver) Del(key string) error {\n\tc := r.pool.Get()\n\tdefer c.Close()\n\t_, err := c.Do(\"DEL\", key)\n\treturn err\n}", "title": "" }, { "docid": "37e7204b43394b716a1771635d031ed0", "score": "0.63236296", "text": "func (c Cache) Del(key string) error {\n\tc.mu.Lock()\n\tdefer c.mu.Unlock()\n\tif !c.exist(key) {\n\t\treturn fmt.Errorf(\"Item %s doesn't exists\", key)\n\t}\n\n\tdelete(c.items, key)\n\treturn nil\n}", "title": "" }, { "docid": "150fe794e9723f33d4facfa9a60a0906", "score": "0.63219774", "text": "func (sl *SortedList) Delete(key uint8) {\n\tsl.sort()\n\ti := sort.Search(len(sl.li), func(i int) bool {\n\t\treturn sl.li[i] >= key\n\t})\n\tif i < len(sl.li) && sl.li[i] == key {\n\t\tif i < len(sl.li)-1 {\n\t\t\tcopy(sl.li[i:], sl.li[i+1:])\n\t\t}\n\t\tsl.li = sl.li[:len(sl.li)-1]\n\t}\n}", "title": "" }, { "docid": "c9292727fc6ba4e127ec285690454880", "score": "0.6319843", "text": "func (rs *MemReputations) Delete(key string) {\n\trs.Lock()\n\tdelete(rs.internal, key)\n\trs.Unlock()\n}", "title": "" }, { "docid": "5b34eef0ed7fc20ec3590e1e8667e2cd", "score": "0.6311012", "text": "func (s *Driver) Delete(key string) error {\n\ts.lock.Lock()\n\tdefer s.lock.Unlock()\n\tdelete(s.data, key)\n\treturn nil\n}", "title": "" }, { "docid": "c6c2541aca8358bab32d72ade9b08432", "score": "0.631092", "text": "func (conn *Connection) Delete(space, index interface{}, key interface{}) (resp *Response, err error) {\n\treturn conn.DeleteAsync(space, index, key).Get()\n}", "title": "" }, { "docid": "4e2382f29c79a55bb7a01c706d8e9dca", "score": "0.630331", "text": "func (r *Registry) Delete(key string) {\n\titem, ok := r.m[key]\n\tif !ok {\n\t\treturn\n\t}\n\tdelete(r.m, key)\n\theap.Remove(r.pq, item.index)\n}", "title": "" }, { "docid": "3b38cf91c3c8fbab84e4233114b91af1", "score": "0.63025147", "text": "func (c Client) Remove(key string) error {\n\tc.method = http.MethodDelete\n\tc.url.Path = keyPath\n\tc.query.Set(keyKey, key)\n\tc.url.RawQuery = c.query.Encode()\n\t_, err := c.doReq(nil)\n\treturn err\n}", "title": "" }, { "docid": "099d30f8d2ce281ac1c76f9b569b6226", "score": "0.6302022", "text": "func (db *Database) Delete(key []byte) error {\n\tif 0 != C.sp_delete(db.Pointer, unsafe.Pointer(&key[0]), C.size_t(len(key))) {\n\t\treturn db.Error()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f78cf4c4a7e5107163c4d7e9f07250f8", "score": "0.62648094", "text": "func (r *RadixDriverHashed) Delete(key, field string) error {\n\treturn r.pool.Do(radix.Cmd(nil, \"HDEL\", r.Config.Prefix+key, field))\n}", "title": "" }, { "docid": "42a22ae0d30fb074279a0fd1b8341309", "score": "0.6251475", "text": "func (m *SeriesModel) Delete(selectorKey string, selectorValue interface{}) error {\n\tseries := db.C(SeriesCollection)\n\treturn series.Remove(bson.M{selectorKey: selectorValue})\n}", "title": "" }, { "docid": "523e027814e676be5ba0b380b2bf92f1", "score": "0.62509906", "text": "func (g *Goon) Delete(key *datastore.Key) error {\n\tkeys := []*datastore.Key{key}\n\treturn g.DeleteMulti(keys)\n}", "title": "" }, { "docid": "66b031ffff7e6a308c18f61227f09774", "score": "0.62474674", "text": "func Delete(dst interface{}, key, value string) error {\n return db.Where(key+\" = ?\", value).Delete(dst).Error\n}", "title": "" }, { "docid": "c7c1563c2f1747d52eecabd5187a9ad2", "score": "0.6245671", "text": "func (s *MysqlStore) Delete(key interface{}) error {\n\ts.lock.Lock()\n\tdefer s.lock.Unlock()\n\n\tdelete(s.data, key)\n\treturn nil\n}", "title": "" }, { "docid": "5ef5fc95df70179722d46b44ca9cc1f0", "score": "0.62418896", "text": "func (p *KeyedPool[T]) Remove(key string) {\n\tp.shards[p.hash(key)].remove(key)\n}", "title": "" }, { "docid": "2d7b0773f4b8785c65f9013fac0e123c", "score": "0.62379766", "text": "func (i *Set) Delete(v interface{}) {\n\tdelete(*i, v)\n}", "title": "" }, { "docid": "c54877b91cd97ba8556db41b6b28d203", "score": "0.62348795", "text": "func (m *Map) Delete(key interface{}) error {\n\tkeyPtr, err := m.marshalKey(key)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"can't marshal key: %w\", err)\n\t}\n\n\tattr := sys.MapDeleteElemAttr{\n\t\tMapFd: m.fd.Uint(),\n\t\tKey: keyPtr,\n\t}\n\n\tif err = sys.MapDeleteElem(&attr); err != nil {\n\t\treturn fmt.Errorf(\"delete: %w\", wrapMapError(err))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a1888d0b6c8f5442068b4c76814ebf9c", "score": "0.6214751", "text": "func (m SynMap) Delete(key interface{}) {\n\t(*m.lock).Lock()\n\tdefer (*m.lock).Unlock()\n\tdelete(m.data, key)\n}", "title": "" }, { "docid": "e10931206c2b7564389a1feda921b57c", "score": "0.6211145", "text": "func (db *Database) Delete(key string) error {\n\tif err := hord.ValidKey(key); err != nil {\n\t\treturn err\n\t}\n\n\tif db == nil || db.pool == nil {\n\t\treturn hord.ErrNoDial\n\t}\n\n\tc := db.pool.Get()\n\tdefer c.Close()\n\n\t_, err := c.Do(\"DEL\", key)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to remove key from Redis - %s\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "370c7eb0bde64793334968de7b9614b9", "score": "0.6206899", "text": "func (s *JsonFileData) Delete(key string) {\n\n\tif s.updatesync {\n\t\tdefer s.Sync()\n\t}\n\n\tdefer s.lock.Unlock()\n\ts.lock.Lock()\n\tdelete(s.items, key)\n}", "title": "" }, { "docid": "370a21b85e92fda1fc787fcda77215ae", "score": "0.6193145", "text": "func (k *KeyAuthsCollection) Delete(keyOrID string) error {\n\treturn k.credentialsCollection.Delete(keyOrID)\n}", "title": "" }, { "docid": "8eafee6d76f0b0d2dd785a675339b2e4", "score": "0.6191979", "text": "func (c *context) Delete(r *http.Request, key interface{}) {\n\tc.mutex.Lock()\n\tdefer c.mutex.Unlock()\n\n\tdelete(c.data[r], key)\n}", "title": "" }, { "docid": "9c23bbd75b07750e804f85b63621ed4d", "score": "0.61820835", "text": "func (cmd *Commond) Del(key string) *Result {\n\tcmd.dostr1(CMD_del, key)\n\treturn &cmd.result\n}", "title": "" }, { "docid": "a7bb1bd2d1891567b6b9ab3d763fffb2", "score": "0.61815715", "text": "func (rc *RedisString) Del(key string) error {\n\treturn rc.client.Del(key).Err()\n}", "title": "" }, { "docid": "4f777d2c799b3b534b2d915dc37f9d45", "score": "0.6172316", "text": "func (p QueryParams) Del(key string) {\n\tdelete(p, key)\n}", "title": "" }, { "docid": "87d4262445edcf70d9529d5801528888", "score": "0.6168563", "text": "func (a *Array) Remove(key interface{}) interface{} {\n\tif key == nil {\n\t\treturn nil\n\t}\n\tfor i := 0; i < a.size; i++ {\n\t\tif a.collection[i].key == key {\n\t\t\tremoved := a.collection[i].value\n\t\t\ta.shiftLeft(i)\n\t\t\ta.size--\n\t\t\treturn removed\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9dc730f25675645b117378b01bf1366c", "score": "0.61516213", "text": "func (s *Storage) Del(key []byte) error {\n\treturn s.db.Update(func(tx *bolt.Tx) error {\n\t\treturn tx.Bucket(s.bucket).Delete(key)\n\t})\n}", "title": "" }, { "docid": "507e1b8fda21da8dd472b1a1a1cc65b9", "score": "0.61504555", "text": "func (n *node) Delete(key interface{}) {\n\tn.smap.Delete(key)\n}", "title": "" }, { "docid": "43c0c68713cc482b0e447a96be747bec", "score": "0.6143938", "text": "func (s *Store) Delete(c appengine.Context, key *datastore.Key) error {\n\terr := s.DeleteMulti(c, []*datastore.Key{key})\n\tif me, ok := err.(dserrors.MultiError); ok {\n\t\treturn me[0]\n\t}\n\treturn err\n}", "title": "" }, { "docid": "c0a9a01e4e5970dfb8b3874842189e4d", "score": "0.6121724", "text": "func (c *Client) Delete(key string) error {\n\tdata, err := c.Queryf(\"delete %s\\n\", key)\n\n\treturn c.assertSuccess(data, err)\n\n}", "title": "" }, { "docid": "1f1bca5399e5622fdf5baabd7dcd07a0", "score": "0.6111685", "text": "func DeleteElement(fd int, key unsafe.Pointer) error {\n\tret, err := deleteElement(fd, key)\n\n\tif ret != 0 || err != 0 {\n\t\treturn fmt.Errorf(\"unable to delete element from map with file descriptor %d: %s\", fd, err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "d2ac2006c857009718e6a817df80249f", "score": "0.6110928", "text": "func (s *Store) Delete(key string) {\n\ts.data.Delete(key)\n}", "title": "" }, { "docid": "76d0731c75b8d69799bb32a534d66afa", "score": "0.61054915", "text": "func (o *Collection) Delete(exec boil.Executor) (int64, error) {\n\tif o == nil {\n\t\treturn 0, errors.New(\"mdbmodels: no Collection provided for delete\")\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), collectionPrimaryKeyMapping)\n\tsql := \"DELETE FROM \\\"collections\\\" WHERE \\\"id\\\"=$1\"\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, sql)\n\t\tfmt.Fprintln(boil.DebugWriter, args...)\n\t}\n\tresult, err := exec.Exec(sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"mdbmodels: unable to delete from collections\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"mdbmodels: failed to get rows affected by delete for collections\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "626607355bd2438523b51a33f93aad10", "score": "0.6103229", "text": "func (c *CloudListingPool) Delete(key string) {\n\tc.lock.Lock()\n\tdefer c.lock.Unlock()\n\n\tglog.V(4).Infof(\"Delete %q: %q\", c.name, key)\n\tc.InMemoryPool.Delete(key)\n}", "title": "" }, { "docid": "e0454d21b4d9c7a246f483389b2512af", "score": "0.609736", "text": "func (s *Set) Delete(v interface{}) {\n\ts.once.Do(s.init)\n\tdelete(s.m, hashcode(v))\n}", "title": "" }, { "docid": "3e53578422437daf6e4690556d4a25b2", "score": "0.6087631", "text": "func (s hashmapStorage) Delete(key string) (e error) { return }", "title": "" }, { "docid": "ce50f7426b64b51069610013678a3e83", "score": "0.6082034", "text": "func DeleteKey(dbName string, collectionName string, key string) error {\r\n\terr := aranGO.Database{Name: dbName}.Col(collectionName).Delete(key)\r\n\treturn err\r\n\r\n\t//err := BoltDB.Update(func(tx *bolt.Tx) error {\r\n\t//\t// Get the bucket\r\n\t//\tb := tx.Bucket([]byte(bucketName))\r\n\t//\tif b == nil {\r\n\t//\t\treturn bolt.ErrBucketNotFound\r\n\t//\t}\r\n\t//\r\n\t//\treturn b.Delete([]byte(key))\r\n\t//})\r\n\t//return err\r\n}", "title": "" }, { "docid": "7b95c5b0fddf7f2feac7ba64f2419ab8", "score": "0.6080703", "text": "func (jdb *jsonDb) Delete(key string) error {\n\tlog.Println(\"(JSON DB): deleting value from key:\", key)\n\n\treturn nil\n}", "title": "" }, { "docid": "dcb2d3d311e5b7a7177bbd3b98040dd5", "score": "0.60775125", "text": "func (b *Batch) Delete(key []byte, _ *WriteOptions) error {\n\tdeferredOp := b.DeleteDeferred(len(key))\n\tcopy(deferredOp.Key, key)\n\t// TODO(peter): Manually inline DeferredBatchOp.Finish(). Mid-stack inlining\n\t// in go1.13 will remove the need for this.\n\tif b.index != nil {\n\t\tif err := b.index.Add(deferredOp.offset); err != nil {\n\t\t\t// We never add duplicate entries, so an error should never occur.\n\t\t\tpanic(err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1f355db015565ab9d35cd1dbf6a49100", "score": "0.6051257", "text": "func (opts *ListOpts) Delete(key string) {\n\tfor i, k := range *opts.values {\n\t\tif k == key {\n\t\t\t*opts.values = append((*opts.values)[:i], (*opts.values)[i+1:]...)\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2c4eea0b539d31517c3e97a8f898f7e6", "score": "0.6051131", "text": "func (s *Misframe) Delete(key string) (err error) {\n\ts.Lock()\n\tdefer s.Unlock()\n\n\tdelete(s.data, key)\n\treturn nil\n}", "title": "" }, { "docid": "809456dc06aedc7db7c10ce67b33e9d4", "score": "0.6050373", "text": "func (o *Object) Delete(key string) {\n\tckey := C.CString(key)\n\tdefer C.free(unsafe.Pointer(ckey))\n\n\tC.ucl_object_delete_key(o.object, ckey)\n}", "title": "" }, { "docid": "809456dc06aedc7db7c10ce67b33e9d4", "score": "0.6050373", "text": "func (o *Object) Delete(key string) {\n\tckey := C.CString(key)\n\tdefer C.free(unsafe.Pointer(ckey))\n\n\tC.ucl_object_delete_key(o.object, ckey)\n}", "title": "" }, { "docid": "98ab547f39c56ff0784fff6d7542b11a", "score": "0.6050161", "text": "func (t *SQLTemplateReplacer) Delete(key string) {\n\tdelete(t.entries, key)\n\tt.computeReplacer()\n}", "title": "" }, { "docid": "01da70b90885f9d56893340af1c100e9", "score": "0.6049956", "text": "func (s *Map) Delete(key interface{}) {\n\ts.Lock()\n\tdefer s.Unlock()\n\ts.delete(key)\n}", "title": "" }, { "docid": "2b17db5a3686a9c93bd96b336376e10e", "score": "0.6035904", "text": "func (tm *timap) Delete(key interface{}) {\n\t// check if there is a watcher registered for current key\n\tif stopChan, ok := tm.timers.Load(key); ok {\n\t\t// send stop singnal to watchers goroutine\n\t\tstopChan.(chan struct{}) <- struct{}{}\n\t\t// remove watcher from the list\n\t\ttm.timers.Delete(key)\n\t}\n\t// remove actual value\n\ttm.Map.Delete(key)\n}", "title": "" }, { "docid": "da24576ba9f0c97df7133adb3667cb88", "score": "0.6031955", "text": "func (s *KeyAuthCRUD) Delete(arg ...crud.Arg) (crud.Arg, error) {\n\tevent := eventFromArg(arg[0])\n\tkeyAuth := keyAuthFromStruct(event)\n\tprint.DeletePrintln(\"deleting key-auth\", stripKey(*keyAuth.Key),\n\t\t\"(last 5) for consumer\", *keyAuth.Consumer.ID)\n\treturn keyAuth, nil\n}", "title": "" }, { "docid": "f54df7993e9011172bd828d23c8c6474", "score": "0.6027168", "text": "func (s _Set[Elem]) Delete(v Elem) {\n\tdelete(s.m, v)\n}", "title": "" }, { "docid": "f8e7f877f19a97a9d888c1c0280b14aa", "score": "0.60257167", "text": "func (m *Map) Delete(key string) { m.Set(key, &nilVar{}) }", "title": "" }, { "docid": "59d2e91b2270c8454415d9aa9c72b753", "score": "0.602508", "text": "func Delete(r *http.Request, key interface{}) {\n\tmutex.Lock()\n\tif data[r] != nil {\n\t\tdelete(data[r], key)\n\t}\n\tmutex.Unlock()\n}", "title": "" }, { "docid": "9732baf9135ee029a4c09f18e8e81f42", "score": "0.60240245", "text": "func (m *Map) Delete(key interface{}) {\n\tread, _ := m.read.Load().(readOnly)\n\te, ok := read.m[key]\n\tif !ok && read.amended {\n\t\tm.mu.Lock()\n\t\tread, _ = m.read.Load().(readOnly)\n\t\te, ok = read.m[key]\n\t\tif !ok && read.amended {\n\t\t\tdelete(m.dirty, key)\n\t\t}\n\t\tm.mu.Unlock()\n\t}\n\tif ok {\n\t\te.delete()\n\t}\n}", "title": "" }, { "docid": "5c2dbc8d2fa430aa538a54fc68427f08", "score": "0.601937", "text": "func (s *kvstore) Delete(k item) error {\n\two := gorocksdb.NewDefaultWriteOptions()\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\n\tbyteK := toBytes(k)\n\terr := s.db.Delete(wo, byteK)\n\treturn err\n}", "title": "" }, { "docid": "03b161af926eb249e104e9ba0833f403", "score": "0.6003939", "text": "func (f *FreecacheStore) Delete(key interface{}) error {\n\tif v, ok := key.(string); ok {\n\t\tif f.client.Del([]byte(v)) {\n\t\t\treturn nil\n\t\t}\n\t\treturn fmt.Errorf(\"failed to delete key %v\", key)\n\t}\n\treturn errors.New(\"key type not supported by Freecache store\")\n\n}", "title": "" }, { "docid": "360b9ac9adf6b66d3d2ca051cbf3fd71", "score": "0.60017437", "text": "func (b *Bitcask) Delete(key []byte) error {\n\tb.mu.Lock()\n\tdefer b.mu.Unlock()\n\t_, _, err := b.put(key, []byte{})\n\tif err != nil {\n\t\treturn err\n\t}\n\tb.t.Delete(key)\n\treturn nil\n}", "title": "" }, { "docid": "15b01f4de4b704d0c605b75776711bb0", "score": "0.60013527", "text": "func (c *lruCache) Delete(key interface{}) (ok bool) {\n\tvar node *list.Element\n\tnode, ok = c.hashMap[key]\n\tif ok {\n\t\tlst := c.list\n\t\tlst.Remove(node)\n\t\tdelete(c.hashMap, key)\n\t}\n\treturn\n}", "title": "" }, { "docid": "f97817a10c5e16476e60f7fbe61e10e6", "score": "0.6000731", "text": "func (client Client) Del(key string) error {\n\t_, err := client.conn.Do(\"del\", key).Result()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "5052f8a20b732f7256b56c68a048d68a", "score": "0.5999981", "text": "func (m *Float64) Delete(key interface{}) {\n\tm.m.Delete(key)\n}", "title": "" }, { "docid": "d230678a77ff13d20259f086227a3840", "score": "0.5999605", "text": "func Delete(ops *CollectionInfo, query interface{}) error {\n\tcol, shutdown := PrepareCollection(ops)\n\tdefer func() {\n\t\tclose(shutdown)\n\t}()\n\n\treturn col.Remove(query)\n}", "title": "" }, { "docid": "672549cc57d8f8486a350e8de4ca88af", "score": "0.59984607", "text": "func (b *Blocklist) Del(key string) error {\n\tb.mu.Lock()\n\tdelete(b.entries, key)\n\tb.mu.Unlock()\n\n\treturn nil\n}", "title": "" }, { "docid": "bd1241bf722504581d7eeb81eb4759f0", "score": "0.5996026", "text": "func (di *DBInterface) Delete(key int64) error {\n\tkVal, err := (di.ecf).EncodeKey(&key)\n\tif err != nil {\n\t\tdi.logger.Println(\"Raft DBInterface: enconding failed\", err)\n\t\treturn err\n\t}\n\terr = di.conn.DeleteEntry(kVal)\n\treturn err\n}", "title": "" }, { "docid": "8dc3cb0e2aafa1689639e120fd4a3550", "score": "0.59957546", "text": "func (c *Context) Del(key string) {\n\tdelete(c.store, key)\n}", "title": "" }, { "docid": "f2abff47e31e1e2cc168c88e805c56fd", "score": "0.5994455", "text": "func (s *Session) Delete(key interface{}) {\n\ts.m.Delete(key)\n}", "title": "" }, { "docid": "6663ee2935c72035af708cffbbdc2ade", "score": "0.5989228", "text": "func (n *Nats) Delete(key string) error {\n\treturn errors.New(\"Not implemented in Nats\")\n}", "title": "" }, { "docid": "9223d8d8ebce8bd2acb803657c9961a3", "score": "0.5986405", "text": "func (s *Storage) Delete(key string) error {\n\t// Ain't Nobody Got Time For That\n\tif len(key) <= 0 {\n\t\treturn nil\n\t}\n\t_, err := s.db.Exec(s.sqlDelete, key)\n\treturn err\n}", "title": "" }, { "docid": "8d10682c183fa40e45686081100e928e", "score": "0.5986039", "text": "func (c *Cache) Del(key interface{}) {\n\tc.Map.Delete(key)\n}", "title": "" }, { "docid": "74fb2d0603977ca5f7018f786dff788b", "score": "0.5981783", "text": "func (s *Redis) Delete(i store.Item) error {\n\tc := s.pool.Get()\n\tdefer c.Close()\n\n\tvalue := reflect.ValueOf(i).Elem()\n\n\tri := &item{\n\t\tprefix: s.typeName(value),\n\t}\n\n\tri.key = i.Key()\n\tif len(ri.key) == 0 {\n\t\treturn store.ErrEmptyKey\n\t}\n\n\tcount, err := driver.Int(c.Do(\"DEL\", ri.Key()))\n\tif err != nil {\n\t\treturn err\n\t}\n\tif count == 0 {\n\t\treturn store.ErrKeyNotFound\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "522c908f88b103ac7ef0e0b25e6a6f36", "score": "0.5973527", "text": "func (s Set) Delete(v interface{}) {\n\tdelete(s, hashcode(v))\n}", "title": "" }, { "docid": "2f4d90c665990498fa929c946394bf36", "score": "0.5966498", "text": "func (s *store) del(key s2.CellID) Result {\n\tcell := s.cells[key]\n\tdelete(s.cells, key)\n\treturn cell.result()\n}", "title": "" }, { "docid": "bf20d7d8f1d5f9fb472b4d43499b9e8c", "score": "0.5962591", "text": "func (c *InMemTTL[K, V]) Remove(key K) {\n\tc.Lock()\n\tdefer c.Unlock()\n\n\tdelete(c.entries, key)\n}", "title": "" }, { "docid": "217e94d1c433b8cd06c7e4bf514aab45", "score": "0.59617126", "text": "func (rs *SessionStore) Delete(ctx context.Context, key interface{}) error {\n\trs.lock.Lock()\n\tdefer rs.lock.Unlock()\n\tdelete(rs.values, key)\n\treturn nil\n}", "title": "" }, { "docid": "e97d0d21608b1840378a33f2a86be568", "score": "0.5957208", "text": "func (s *Storage) Delete(key string) error {\n\t// Ain't Nobody Got Time For That\n\tif len(key) <= 0 {\n\t\treturn nil\n\t}\n\tk := make(map[string]*awsdynamodb.AttributeValue)\n\tk[keyAttrName] = &awsdynamodb.AttributeValue{\n\t\tS: &key,\n\t}\n\tdeleteItemInput := awsdynamodb.DeleteItemInput{\n\t\tTableName: &s.table,\n\t\tKey: k,\n\t}\n\t_, err := s.db.DeleteItem(&deleteItemInput)\n\treturn err\n}", "title": "" }, { "docid": "952d123f66be0526f01884dde9b53dcd", "score": "0.5947625", "text": "func (c Claims) Delete(key string) interface{} {\n\told, _ := c.Get(key)\n\tdelete(c, key)\n\treturn old\n}", "title": "" } ]
2cc3e7383293a6504404c081f111f283
shouldRestartEncryptionKeyRotation returns `true` if encryption key rotation is necessary and the fields on the status object are not valid for an encryption key rotation procedure.
[ { "docid": "80c4f88a644be545641d60c0ca631f00", "score": "0.79782057", "text": "func shouldRestartEncryptionKeyRotation(cp *rkev1.RKEControlPlane) bool {\n\tif !capr.Ready.IsTrue(cp) {\n\t\treturn false\n\t}\n\tif cp.Spec.RotateEncryptionKeys.Generation > 0 && cp.Status.RotateEncryptionKeys == nil {\n\t\treturn true\n\t}\n\tif (cp.Status.RotateEncryptionKeysPhase == rkev1.RotateEncryptionKeysPhaseDone ||\n\t\tcp.Status.RotateEncryptionKeysPhase == rkev1.RotateEncryptionKeysPhaseFailed ||\n\t\tcp.Status.RotateEncryptionKeysPhase == \"\") &&\n\t\tcp.Spec.RotateEncryptionKeys.Generation != cp.Status.RotateEncryptionKeys.Generation {\n\t\treturn true\n\t}\n\tif !hasValidNonFailedRotateEncryptionKeyStatus(cp) {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" } ]
[ { "docid": "4bfb233d44ea8a3b91eeced4a4575867", "score": "0.68459135", "text": "func rotateEncryptionKeyInProgress(cp *rkev1.RKEControlPlane) bool {\n\treturn cp.Status.RotateEncryptionKeysPhase == rkev1.RotateEncryptionKeysPhasePrepare ||\n\t\tcp.Status.RotateEncryptionKeysPhase == rkev1.RotateEncryptionKeysPhasePostPrepareRestart ||\n\t\tcp.Status.RotateEncryptionKeysPhase == rkev1.RotateEncryptionKeysPhaseRotate ||\n\t\tcp.Status.RotateEncryptionKeysPhase == rkev1.RotateEncryptionKeysPhasePostRotateRestart ||\n\t\tcp.Status.RotateEncryptionKeysPhase == rkev1.RotateEncryptionKeysPhaseReencrypt ||\n\t\tcp.Status.RotateEncryptionKeysPhase == rkev1.RotateEncryptionKeysPhasePostReencryptRestart\n}", "title": "" }, { "docid": "0f71b210a30dbef29e58bf3ab8a509a2", "score": "0.6488401", "text": "func canRotateEncryptionKeys(cp *rkev1.RKEControlPlane) bool {\n\tif (!capr.Ready.IsTrue(cp) && !rotateEncryptionKeyInProgress(cp)) ||\n\t\tcp.Spec.RotateEncryptionKeys == nil ||\n\t\t(cp.Status.RotateEncryptionKeys != nil && cp.Status.RotateEncryptionKeys.Generation == cp.Spec.RotateEncryptionKeys.Generation &&\n\t\t\t(cp.Status.RotateEncryptionKeysPhase == rkev1.RotateEncryptionKeysPhaseDone || cp.Status.RotateEncryptionKeysPhase == rkev1.RotateEncryptionKeysPhaseFailed)) {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "b253f9f4639ee97ebb07b15c3d7f89d9", "score": "0.63393295", "text": "func hasValidNonFailedRotateEncryptionKeyStatus(cp *rkev1.RKEControlPlane) bool {\n\treturn rotateEncryptionKeyInProgress(cp) ||\n\t\tcp.Status.RotateEncryptionKeysPhase == rkev1.RotateEncryptionKeysPhaseDone\n}", "title": "" }, { "docid": "c6f0b89447ba867360eaaee843b5f0f1", "score": "0.6120887", "text": "func (p *Planner) rotateEncryptionKeys(cp *rkev1.RKEControlPlane, status rkev1.RKEControlPlaneStatus, tokensSecret plan.Secret, clusterPlan *plan.Plan, releaseData *model.Release) (rkev1.RKEControlPlaneStatus, error) {\n\tif cp == nil || releaseData == nil || clusterPlan == nil {\n\t\treturn status, fmt.Errorf(\"cannot pass nil parameters to rotateEncryptionKeys\")\n\t}\n\n\tif cp.Spec.RotateEncryptionKeys == nil {\n\t\treturn p.resetEncryptionKeyRotateState(status)\n\t}\n\n\tif supported, err := encryptionKeyRotationSupported(releaseData); err != nil {\n\t\treturn status, err\n\t} else if !supported {\n\t\tlogrus.Debugf(\"rkecluster %s/%s: marking encryption key rotation phase as failed as it was not supported by version: %s\", cp.Namespace, cp.Name, cp.Spec.KubernetesVersion)\n\t\treturn p.setEncryptionKeyRotateState(status, cp.Spec.RotateEncryptionKeys, rkev1.RotateEncryptionKeysPhaseFailed)\n\t}\n\n\tif !canRotateEncryptionKeys(cp) {\n\t\treturn status, nil\n\t}\n\n\tif !status.Initialized {\n\t\t// cluster is not yet initialized, so return nil for now.\n\t\tlogrus.Warnf(\"[planner] rkecluster %s/%s: skipping encryption key rotation as cluster was not initialized\", cp.Namespace, cp.Name)\n\t\treturn status, nil\n\t}\n\n\tfound, joinServer, initNode, err := p.findInitNode(cp, clusterPlan)\n\tif err != nil {\n\t\tlogrus.Errorf(\"[planner] rkecluster %s/%s: error encountered while searching for init node during encryption key rotation: %v\", cp.Namespace, cp.Name, err)\n\t\treturn status, err\n\t}\n\tif !found || joinServer == \"\" {\n\t\tlogrus.Warnf(\"[planner] rkecluster %s/%s: skipping encryption key rotation as cluster does not have an init node\", cp.Namespace, cp.Name)\n\t\treturn status, nil\n\t}\n\n\tif shouldRestartEncryptionKeyRotation(cp) {\n\t\tlogrus.Debugf(\"[planner] rkecluster %s/%s: starting/restarting encryption key rotation\", cp.Namespace, cp.Name)\n\t\treturn p.setEncryptionKeyRotateState(status, cp.Spec.RotateEncryptionKeys, rkev1.RotateEncryptionKeysPhasePrepare)\n\t}\n\n\tleader, err := p.encryptionKeyRotationFindLeader(status, clusterPlan, initNode)\n\tif err != nil {\n\t\treturn status, err\n\t}\n\n\tif status.RotateEncryptionKeysLeader != leader.Machine.Name {\n\t\tstatus.RotateEncryptionKeysLeader = leader.Machine.Name\n\t\treturn status, errWaitingf(\"elected %s as control plane leader for encryption key rotation\", leader.Machine.Name)\n\t}\n\n\tlogrus.Debugf(\"[planner] rkecluster %s/%s: current encryption key rotation phase: [%s]\", cp.Namespace, cp.Spec.ClusterName, cp.Status.RotateEncryptionKeysPhase)\n\n\tswitch cp.Status.RotateEncryptionKeysPhase {\n\tcase rkev1.RotateEncryptionKeysPhasePrepare:\n\t\tif err := p.pauseCAPICluster(cp, true); err != nil {\n\t\t\treturn status, errWaiting(\"pausing CAPI cluster\")\n\t\t}\n\t\tstatus, err = p.encryptionKeyRotationLeaderPhaseReconcile(cp, status, tokensSecret, joinServer, leader)\n\t\tif err != nil {\n\t\t\treturn status, err\n\t\t}\n\t\treturn p.setEncryptionKeyRotateState(status, cp.Spec.RotateEncryptionKeys, rkev1.RotateEncryptionKeysPhasePostPrepareRestart)\n\tcase rkev1.RotateEncryptionKeysPhasePostPrepareRestart:\n\t\tstatus, err = p.encryptionKeyRotationRestartNodes(cp, status, tokensSecret, clusterPlan, leader, initNode, joinServer)\n\t\tif err != nil {\n\t\t\treturn status, err\n\t\t}\n\t\treturn p.setEncryptionKeyRotateState(status, cp.Spec.RotateEncryptionKeys, rkev1.RotateEncryptionKeysPhaseRotate)\n\tcase rkev1.RotateEncryptionKeysPhaseRotate:\n\t\tstatus, err = p.encryptionKeyRotationLeaderPhaseReconcile(cp, status, tokensSecret, joinServer, leader)\n\t\tif err != nil {\n\t\t\treturn status, err\n\t\t}\n\t\treturn p.setEncryptionKeyRotateState(status, cp.Spec.RotateEncryptionKeys, rkev1.RotateEncryptionKeysPhasePostRotateRestart)\n\tcase rkev1.RotateEncryptionKeysPhasePostRotateRestart:\n\t\tstatus, err = p.encryptionKeyRotationRestartNodes(cp, status, tokensSecret, clusterPlan, leader, initNode, joinServer)\n\t\tif err != nil {\n\t\t\treturn status, err\n\t\t}\n\t\treturn p.setEncryptionKeyRotateState(status, cp.Spec.RotateEncryptionKeys, rkev1.RotateEncryptionKeysPhaseReencrypt)\n\tcase rkev1.RotateEncryptionKeysPhaseReencrypt:\n\t\tstatus, err = p.encryptionKeyRotationLeaderPhaseReconcile(cp, status, tokensSecret, joinServer, leader)\n\t\tif err != nil {\n\t\t\treturn status, err\n\t\t}\n\t\treturn p.setEncryptionKeyRotateState(status, cp.Spec.RotateEncryptionKeys, rkev1.RotateEncryptionKeysPhasePostReencryptRestart)\n\tcase rkev1.RotateEncryptionKeysPhasePostReencryptRestart:\n\t\tstatus, err = p.encryptionKeyRotationRestartNodes(cp, status, tokensSecret, clusterPlan, leader, initNode, joinServer)\n\t\tif err != nil {\n\t\t\treturn status, err\n\t\t}\n\t\tif err = p.pauseCAPICluster(cp, false); err != nil {\n\t\t\treturn status, errWaiting(\"unpausing CAPI cluster\")\n\t\t}\n\t\tstatus.RotateEncryptionKeysLeader = \"\"\n\t\treturn p.setEncryptionKeyRotateState(status, cp.Spec.RotateEncryptionKeys, rkev1.RotateEncryptionKeysPhaseDone)\n\t}\n\n\treturn status, fmt.Errorf(\"encountered unknown encryption key rotation phase: %s\", cp.Status.RotateEncryptionKeysPhase)\n}", "title": "" }, { "docid": "d2d947922796db306c1f0f64bed838b6", "score": "0.593683", "text": "func (p *Planner) encryptionKeyRotationRestartService(cp *rkev1.RKEControlPlane, status rkev1.RKEControlPlaneStatus, tokensSecret plan.Secret, joinServer string, entry *planEntry, scrapeStage bool, leaderStage string) (string, rkev1.RKEControlPlaneStatus, error) {\n\tnodePlan, config, joinedServer, err := p.generatePlanWithConfigFiles(cp, tokensSecret, entry, joinServer, true)\n\tif err != nil {\n\t\treturn \"\", status, err\n\t}\n\n\tnodePlan.Files = append(nodePlan.Files, plan.File{\n\t\tContent: base64.StdEncoding.EncodeToString([]byte(encryptionKeyRotationWaitForSystemctlStatus)),\n\t\tPath: encryptionKeyRotationScriptPath(cp, encryptionKeyRotationWaitForSystemctlStatusPath),\n\t})\n\n\tnodePlan.Instructions = []plan.OneTimeInstruction{}\n\n\truntime := capr.GetRuntime(cp.Spec.KubernetesVersion)\n\tif runtime == capr.RuntimeRKE2 {\n\t\tif generated, instruction := generateManifestRemovalInstruction(runtime, entry); generated {\n\t\t\tnodePlan.Instructions = append(nodePlan.Instructions, convertToIdempotentInstruction(strings.ToLower(fmt.Sprintf(\"encryption-key-rotation/manifest-cleanup/%s\", cp.Status.RotateEncryptionKeysPhase)), strconv.FormatInt(cp.Spec.RotateEncryptionKeys.Generation, 10), instruction))\n\t\t}\n\t}\n\n\tnodePlan.Instructions = append(nodePlan.Instructions, idempotentRestartInstructions(strings.ToLower(fmt.Sprintf(\"encryption-key-rotation/restart/%s\", cp.Status.RotateEncryptionKeysPhase)), strconv.FormatInt(cp.Spec.RotateEncryptionKeys.Generation, 10), capr.GetRuntimeServerUnit(cp.Spec.KubernetesVersion))...)\n\n\tnodePlan.Instructions = append(nodePlan.Instructions, encryptionKeyRotationWaitForSystemctlStatusInstruction(cp))\n\n\tif isControlPlane(entry) {\n\t\tnodePlan.Files = append(nodePlan.Files,\n\t\t\tplan.File{\n\t\t\t\tContent: base64.StdEncoding.EncodeToString([]byte(encryptionKeyRotationSecretsEncryptStatusScript)),\n\t\t\t\tPath: encryptionKeyRotationScriptPath(cp, encryptionKeyRotationSecretsEncryptStatusPath),\n\t\t\t},\n\t\t\tplan.File{\n\t\t\t\tContent: base64.StdEncoding.EncodeToString([]byte(encryptionKeyRotationWaitForSecretsEncryptStatusScript)),\n\t\t\t\tPath: encryptionKeyRotationScriptPath(cp, encryptionKeyRotationWaitForSecretsEncryptStatusPath),\n\t\t\t},\n\t\t)\n\t\tnodePlan.Instructions = append(nodePlan.Instructions,\n\t\t\tencryptionKeyRotationWaitForSecretsEncryptStatus(cp),\n\t\t\tencryptionKeyRotationSecretsEncryptStatusScriptOneTimeInstruction(cp, leaderStage),\n\t\t\tencryptionKeyRotationSecretsEncryptStatusOneTimeInstruction(cp),\n\t\t)\n\t}\n\n\tprobes, err := p.generateProbes(cp, entry, config)\n\tif err != nil {\n\t\treturn \"\", status, err\n\t}\n\tnodePlan.Probes = probes\n\n\t// retry is important here because without it, we always seem to run into some sort of issue such as:\n\t// - the follower node reporting the wrong status after a restart\n\t// - the plan failing with the k3s/rke2-server services crashing the first, and resuming subsequent times\n\t// It's not necessarily ideal if encryption key rotation can never complete, especially since we don't have access to\n\t// the downstream k3s/rke2-server service logs, but it has to be done in order for encryption key rotation to succeed\n\terr = assignAndCheckPlan(p.store, fmt.Sprintf(\"encryption key rotation [%s] for machine [%s]\", cp.Status.RotateEncryptionKeysPhase, entry.Machine.Name), entry, nodePlan, joinedServer, 5, 5)\n\tif err != nil {\n\t\tif IsErrWaiting(err) {\n\t\t\tif planAppliedButWaitingForProbes(entry) {\n\t\t\t\treturn \"\", status, errWaitingf(\"%s: %s\", err.Error(), probesMessage(entry.Plan))\n\t\t\t}\n\t\t\treturn \"\", status, err\n\t\t}\n\t\tstatus, err = p.encryptionKeyRotationFailed(status, err)\n\t\treturn \"\", status, err\n\t}\n\n\tif !scrapeStage || !isControlPlane(entry) {\n\t\treturn \"\", status, nil\n\t}\n\n\tstage, err := encryptionKeyRotationSecretsEncryptStageFromOneTimeStatus(entry)\n\tif err != nil {\n\t\treturn \"\", status, err\n\t}\n\treturn stage, status, nil\n}", "title": "" }, { "docid": "90cdaad46bf04ca869eb0db7f2a51e2c", "score": "0.5875167", "text": "func (p *Planner) encryptionKeyRotationFailed(status rkev1.RKEControlPlaneStatus, err error) (rkev1.RKEControlPlaneStatus, error) {\n\tstatus.RotateEncryptionKeysPhase = rkev1.RotateEncryptionKeysPhaseFailed\n\treturn status, errors.Wrap(err, \"encryption key rotation failed, please perform an etcd restore\")\n}", "title": "" }, { "docid": "faf8a1b453f66a83b45c298f1baecbfb", "score": "0.5861412", "text": "func (t *TransportESFactory) ShouldRestart(newConfig transports.TransportFactory) bool {\n\t// Check template chanages\n\tnewConfigImpl := newConfig.(*TransportESFactory)\n\tif newConfigImpl.IndexPattern != t.IndexPattern {\n\t\treturn true\n\t}\n\tif newConfigImpl.Password != t.Password {\n\t\treturn true\n\t}\n\tif newConfigImpl.Retry != t.Retry {\n\t\treturn true\n\t}\n\tif newConfigImpl.RetryMax != t.RetryMax {\n\t\treturn true\n\t}\n\tif newConfigImpl.Routines != t.Routines {\n\t\treturn true\n\t}\n\tif newConfigImpl.TemplateFile != t.TemplateFile {\n\t\treturn true\n\t}\n\tif newConfigImpl.Username != t.Username {\n\t\treturn true\n\t}\n\tif !reflect.DeepEqual(newConfigImpl.TemplatePatterns, t.TemplatePatterns) {\n\t\treturn true\n\t}\n\n\treturn t.ClientTlsConfiguration.HasChanged(newConfigImpl.ClientTlsConfiguration)\n}", "title": "" }, { "docid": "6a326f862f7c9916722e518ac6c7ad69", "score": "0.5793576", "text": "func (j *JobStatus) ShouldRestart(spec *JobSpec) bool {\n\tif j == nil || !j.IsFailed() || spec == nil {\n\t\treturn false\n\t}\n\tvar restartEnabled = spec.RestartPolicy != nil && *spec.RestartPolicy == JobRestartPolicyFromSavepointOnFailure\n\tvar jobCompletionTime = j.CompletionTime.Time\n\treturn restartEnabled && j.IsSavepointUpToDate(spec, jobCompletionTime)\n}", "title": "" }, { "docid": "abbd0266aa933986c682d0d82244145f", "score": "0.5793372", "text": "func (p *Planner) encryptionKeyRotationRestartNodes(cp *rkev1.RKEControlPlane, status rkev1.RKEControlPlaneStatus, tokensSecret plan.Secret, clusterPlan *plan.Plan, leader *planEntry, initNode *planEntry, joinServer string) (rkev1.RKEControlPlaneStatus, error) {\n\t// in certain cases with multi-node setups, we must restart the init node before we can proceed to restarting the leader.\n\tif !isInitNode(leader) {\n\t\tlogrus.Debugf(\"[planner] rkecluster %s/%s: leader %s was not the init node, finding and restarting etcd nodes\", cp.Namespace, cp.Name, leader.Machine.Name)\n\n\t\t_, status, err := p.encryptionKeyRotationRestartService(cp, status, tokensSecret, joinServer, initNode, false, \"\")\n\t\tif err != nil {\n\t\t\treturn status, err\n\t\t}\n\t\tlogrus.Debugf(\"[planner] rkecluster %s/%s: collecting etcd and not control plane\", cp.Namespace, cp.Name)\n\t\tfor _, entry := range collect(clusterPlan, encryptionKeyRotationIsEtcdAndNotControlPlaneAndNotLeaderAndInit(cp)) {\n\t\t\t_, status, err = p.encryptionKeyRotationRestartService(cp, status, tokensSecret, joinServer, entry, false, \"\")\n\t\t\tif err != nil {\n\t\t\t\treturn status, err\n\t\t\t}\n\t\t}\n\t}\n\n\tleaderStage, status, err := p.encryptionKeyRotationRestartService(cp, status, tokensSecret, joinServer, leader, true, \"\")\n\tif err != nil {\n\t\treturn status, err\n\t}\n\n\tlogrus.Debugf(\"[planner] rkecluster %s/%s: collecting control plane and not leader and init nodes\", cp.Namespace, cp.Name)\n\tfor _, entry := range collect(clusterPlan, encryptionKeyRotationIsControlPlaneAndNotLeaderAndInit(cp)) {\n\t\tvar stage string\n\t\tstage, status, err = p.encryptionKeyRotationRestartService(cp, status, tokensSecret, joinServer, entry, true, leaderStage)\n\t\tif err != nil {\n\t\t\treturn status, err\n\t\t}\n\n\t\tif stage != leaderStage {\n\t\t\t// secrets-encrypt command was run on another node. this is considered a failure, but might be a bit too sensitive. to be tested.\n\t\t\treturn p.encryptionKeyRotationFailed(status, fmt.Errorf(\"leader [%s] with %s stage and follower [%s] with %s stage\", leader.Machine.Status.NodeRef.Name, leaderStage, entry.Machine.Status.NodeRef.Name, stage))\n\t\t}\n\t}\n\n\treturn status, nil\n}", "title": "" }, { "docid": "d1e46ada4d9b6e308695ef7017d74fc3", "score": "0.5784371", "text": "func (f *TransportTestFactory) ShouldRestart(newConfig transports.TransportFactory) bool {\n\tnewConfigImpl := newConfig.(*TransportTestFactory)\n\tif newConfigImpl.MinDelay != f.MinDelay {\n\t\treturn true\n\t}\n\tif newConfigImpl.MaxDelay != f.MaxDelay {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "727dd8814150f1fd8a25cc800c252db1", "score": "0.5757962", "text": "func (r *Reconciler) ReconcileKeyRotation() error {\n\tr.Logger.Infof(\"ReconcileKeyRotation, KMS Starting\")\n\n\tif len(r.SecretRootMasterKey) > 0 {\n\t\t// key rotation not supported by the KMS backend\n\t\tr.Logger.Infof(\"ReconcileKeyRotation, KMS skip reconcile, disabled by configuration\")\n\t\treturn nil\n\t}\n\n\tenabledKeyRotation := r.NooBaa.Spec.Security.KeyManagementService.EnableKeyRotation\n\tif !enabledKeyRotation {\n\t\tr.Logger.Infof(\"ReconcileKeyRotation, KMS skip reconcile, single master root mode\")\n\t\treturn nil\n\t}\n\tscheduleCronSpec := r.NooBaa.Spec.Security.KeyManagementService.Schedule\n\tif len(scheduleCronSpec) == 0 {\n\t\tr.Logger.Infof(\"ReconcileKeyRotation, KMS default monthly rotation schedule\")\n\t\tscheduleCronSpec = \"0 0 1 * *\" // “At 00:00 on day-of-month 1.”\n\t}\n\n\tschedule, err := cron.ParseStandard(scheduleCronSpec)\n\tif err != nil {\n\t\tr.Logger.Errorf(\"ReconcileKeyRotation, KMS rotation schedule parse error: %v\", err)\n\t\treturn err\n\t}\n\tlastTime := r.NooBaa.Status.LastKeyRotateTime.Time\n\tnow := time.Now()\n\tif lastTime.IsZero() {\n\t\tr.Logger.Infof(\"ReconcileKeyRotation, KMS skip reconcile: initial set LastKeyRotateTime %v\", now)\n\t\tr.NooBaa.Status.LastKeyRotateTime = metav1.Time{Time: now}\n\t\treturn nil\n\t}\n\tnextSchedule := schedule.Next(lastTime)\n\n\tr.Logger.Infof(\"ReconcileKeyRotation, KMS rotation nextSchedule: %v\", nextSchedule)\n\tif nextSchedule.After(now) {\n\t\tr.Logger.Infof(\"ReconcileKeyRotation, KMS skip reconcile, now %v before nextSchedule %v\", now, nextSchedule)\n\t\treturn nil\n\t}\n\terr = r.keyRotate()\n\tif err != nil {\n\t\tr.Logger.Errorf(\"ReconcileKeyRotation, KMS keyRotate error %v\", err)\n\t\treturn err\n\t}\n\tr.Logger.Infof(\"ReconcileKeyRotation, KMS Updating Last Key Rotate time: %v\", now)\n\tr.NooBaa.Status.LastKeyRotateTime = metav1.Time{Time: now}\n\n\treturn nil\n}", "title": "" }, { "docid": "68e9bf01f8c8c92761765d178b80155b", "score": "0.5670598", "text": "func encryptionKeyRotationIsCurrentStageAllowed(leaderStage string, currentPhase rkev1.RotateEncryptionKeysPhase) error {\n\tswitch currentPhase {\n\tcase rkev1.RotateEncryptionKeysPhasePrepare:\n\t\tif leaderStage == encryptionKeyRotationCommandPrepare {\n\t\t\treturn nil\n\t\t}\n\tcase rkev1.RotateEncryptionKeysPhaseRotate:\n\t\tif leaderStage == encryptionKeyRotationCommandRotate {\n\t\t\treturn nil\n\t\t}\n\tcase rkev1.RotateEncryptionKeysPhaseReencrypt:\n\t\tif leaderStage == encryptionKeyRotationStageReencryptRequest ||\n\t\t\tleaderStage == encryptionKeyRotationStageReencryptActive ||\n\t\t\tleaderStage == encryptionKeyRotationStageReencryptFinished {\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn fmt.Errorf(\"unexpected encryption key rotation stage [%s] for phase [%s]\", leaderStage, currentPhase)\n}", "title": "" }, { "docid": "9531db539ad9a39e50e5ca7d654ea1d6", "score": "0.5659551", "text": "func encryptionKeyRotationSupported(releaseData *model.Release) (bool, error) {\n\tif releaseData == nil {\n\t\treturn false, fmt.Errorf(\"unable to find KDM release data for encryption key rotation support in release\")\n\t}\n\tif featureVersion, ok := releaseData.FeatureVersions[\"encryption-key-rotation\"]; ok {\n\t\tversion, err := semver.Make(featureVersion)\n\t\tif err != nil {\n\t\t\treturn false, fmt.Errorf(\"unable to parse semver version for encryption key rotation: %s\", featureVersion)\n\t\t}\n\t\t// v2.6.4 - v2.6.6 are looking for 1.x.x, but encryption key rotation does not work in those versions. Rather than\n\t\t// enable it retroactively, those versions will not be able to rotate encryption keys since some cluster\n\t\t// configurations can break in such a way that they become unrecoverable. Additionally, we want to be careful\n\t\t// updating the encryption-key-rotation feature gate in KDM in the future, so as not to break backwards\n\t\t// compatibility for existing clusters.\n\t\tif version.Major == 2 {\n\t\t\treturn true, nil\n\t\t}\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "ec0eb92f14d0d6badf7482e95f2cace5", "score": "0.5654576", "text": "func encryptionKeyRotationWaitForSecretsEncryptStatus(cp *rkev1.RKEControlPlane) plan.OneTimeInstruction {\n\treturn plan.OneTimeInstruction{\n\t\tName: \"wait-for-secrets-encrypt-status\",\n\t\tCommand: \"sh\",\n\t\tArgs: []string{\n\t\t\t\"-x\", encryptionKeyRotationScriptPath(cp, encryptionKeyRotationWaitForSecretsEncryptStatusPath), capr.GetRuntimeCommand(cp.Spec.KubernetesVersion),\n\t\t},\n\t\tEnv: []string{\n\t\t\tencryptionKeyRotationEndpointEnv,\n\t\t\tencryptionKeyRotationStatusEnv(cp),\n\t\t\tencryptionKeyRotationGenerationEnv(cp),\n\t\t},\n\t\tSaveOutput: true,\n\t}\n}", "title": "" }, { "docid": "6cd062cb91a9b9076063904100e6718b", "score": "0.554694", "text": "func encryptionKeyRotationIsSuitableControlPlane(entry *planEntry) bool {\n\treturn isControlPlane(entry) && isNotDeleting(entry) && entry.Machine.Status.NodeRef != nil && capr.Ready.IsTrue(entry.Machine)\n}", "title": "" }, { "docid": "2c93eb2ce363ef89b56133d52e9c3008", "score": "0.5544579", "text": "func (container *Container) ShouldRestart() bool {\n\tshouldRestart, _, _ := container.RestartManager().ShouldRestart(uint32(container.ExitCode()), container.HasBeenManuallyStopped, container.FinishedAt.Sub(container.StartedAt))\n\treturn shouldRestart\n}", "title": "" }, { "docid": "bf20958e1b86f4a7f3aecebc3214fe81", "score": "0.5505319", "text": "func TestEncryptionRotation(t *testing.T) {\n\t// TODO: dump events, conditions in case of an failure for all scenarios\n\n\t// test data\n\tns := operatorclient.GlobalMachineSpecifiedConfigNamespace\n\tlabelSelector := \"encryption.apiserver.operator.openshift.io/component\" + \"=\" + operatorclient.TargetNamespace\n\n\t// step 1: create the secret of life\n\te := encryption.NewE(t)\n\tclientSet := encryption.GetClients(e)\n\toperatorencryption.CreateAndStoreTokenOfLife(e, operatorencryption.GetClients(e))\n\n\t// step 2: run encryption aescbc scenario\n\toperatorencryption.TestEncryptionTypeAESCBC(t)\n\n\t// step 3: take samples\n\trawEncryptedTokenOfLifeWithKey1 := operatorencryption.GetRawTokenOfLife(e, clientSet)\n\n\t// step 4: force key rotation and wait for migration to complete\n\tlastMigratedKeyMeta, err := encryption.GetLastKeyMeta(clientSet.Kube, ns, labelSelector)\n\trequire.NoError(e, err)\n\trequire.NoError(e, encryption.ForceKeyRotation(e, func(raw []byte) error {\n\t\tcs := operatorencryption.GetClients(t)\n\t\tapiServerOperator, err := cs.OperatorClient.Get(\"cluster\", metav1.GetOptions{})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tapiServerOperator.Spec.UnsupportedConfigOverrides.Raw = raw\n\t\t_, err = cs.OperatorClient.Update(apiServerOperator)\n\t\treturn err\n\t}, fmt.Sprintf(\"test-key-rotation-%s\", rand.String(4))))\n\tencryption.WaitForNextMigratedKey(e, clientSet.Kube, lastMigratedKeyMeta, operatorencryption.DefaultTargetGRs, ns, labelSelector)\n\toperatorencryption.AssertRoutesAndTokens(e, clientSet, configv1.EncryptionTypeAESCBC, ns, labelSelector)\n\n\t// step 5: verify if the secret of life was encrypted with a different key (step 2 vs step 4)\n\trawEncryptedTokenOfLifeWithKey2 := operatorencryption.GetRawTokenOfLife(e, clientSet)\n\tif rawEncryptedTokenOfLifeWithKey1 == rawEncryptedTokenOfLifeWithKey2 {\n\t\tt.Errorf(\"expected the token of life to has a differnt content after a key rotation,\\ncontentBeforeRotation %s\\ncontentAfterRotation %s\", rawEncryptedTokenOfLifeWithKey1, rawEncryptedTokenOfLifeWithKey2)\n\t}\n\n\t// TODO: assert conditions - operator and encryption migration controller must report status as active not progressing, and not failing for all scenarios\n\t// TODO: assert encryption config (resources) for all scenarios\n}", "title": "" }, { "docid": "ec853e08bd93a14d82f974f6db673b38", "score": "0.54063565", "text": "func (p *Planner) encryptionKeyRotationLeaderPhaseReconcile(cp *rkev1.RKEControlPlane, status rkev1.RKEControlPlaneStatus, tokensSecret plan.Secret, joinServer string, leader *planEntry) (rkev1.RKEControlPlaneStatus, error) {\n\tnodePlan, _, joinedServer, err := p.generatePlanWithConfigFiles(cp, tokensSecret, leader, joinServer, true)\n\tif err != nil {\n\t\treturn status, err\n\t}\n\n\tapply, err := encryptionKeyRotationSecretsEncryptInstruction(cp)\n\tif err != nil {\n\t\treturn p.encryptionKeyRotationFailed(status, err)\n\t}\n\n\tnodePlan.Files = append(nodePlan.Files, []plan.File{\n\t\t{\n\t\t\tContent: base64.StdEncoding.EncodeToString([]byte(encryptionKeyRotationWaitForSecretsEncryptStatusScript)),\n\t\t\tPath: encryptionKeyRotationScriptPath(cp, encryptionKeyRotationWaitForSecretsEncryptStatusPath),\n\t\t},\n\t\t{\n\t\t\tContent: base64.StdEncoding.EncodeToString([]byte(encryptionKeyRotationSecretsEncryptStatusScript)),\n\t\t\tPath: encryptionKeyRotationScriptPath(cp, encryptionKeyRotationSecretsEncryptStatusPath),\n\t\t},\n\t}...)\n\n\tnodePlan.Instructions = []plan.OneTimeInstruction{\n\t\tapply,\n\t\tencryptionKeyRotationSecretsEncryptStatusScriptOneTimeInstruction(cp, \"\"),\n\t\tencryptionKeyRotationSecretsEncryptStatusOneTimeInstruction(cp),\n\t}\n\tnodePlan.PeriodicInstructions = []plan.PeriodicInstruction{\n\t\tencryptionKeyRotationSecretsEncryptStatusPeriodicInstruction(cp),\n\t}\n\terr = assignAndCheckPlan(p.store, fmt.Sprintf(\"encryption key rotation [%s] for machine [%s]\", cp.Status.RotateEncryptionKeysPhase, leader.Machine.Name), leader, nodePlan, joinedServer, 1, 1)\n\tif err != nil {\n\t\tif IsErrWaiting(err) {\n\t\t\tif strings.HasPrefix(err.Error(), \"starting\") {\n\t\t\t\tlogrus.Infof(\"[planner] rkecluster %s/%s: applying encryption key rotation stage command: [%s]\", cp.Namespace, cp.Spec.ClusterName, apply.Args[1])\n\t\t\t}\n\t\t\treturn status, err\n\t\t}\n\t\treturn p.encryptionKeyRotationFailed(status, err)\n\t}\n\tscrapedStageFromOneTimeInstructions, err := encryptionKeyRotationSecretsEncryptStageFromOneTimeStatus(leader)\n\tif err != nil {\n\t\treturn status, err\n\t}\n\tperiodic, err := encryptionKeyRotationSecretsEncryptStageFromPeriodic(leader)\n\tif err != nil {\n\t\treturn status, err\n\t}\n\terr = encryptionKeyRotationIsCurrentStageAllowed(scrapedStageFromOneTimeInstructions, cp.Status.RotateEncryptionKeysPhase)\n\tif err != nil {\n\t\treturn p.encryptionKeyRotationFailed(status, err)\n\t}\n\tif scrapedStageFromOneTimeInstructions == encryptionKeyRotationStageReencryptRequest || scrapedStageFromOneTimeInstructions == encryptionKeyRotationStageReencryptActive {\n\t\tif periodic != encryptionKeyRotationStageReencryptFinished {\n\t\t\treturn status, errWaitingf(\"waiting for encryption key rotation stage to be finished\")\n\t\t}\n\t}\n\t// successful restart, complete same phases for rotate & reencrypt\n\tlogrus.Infof(\"[planner] rkecluster %s/%s: successfully applied encryption key rotation stage command: [%s]\", cp.Namespace, cp.Spec.ClusterName, leader.Plan.Plan.Instructions[0].Args[1])\n\treturn status, nil\n}", "title": "" }, { "docid": "916669e46d0603a41aee99dae7194c8e", "score": "0.5357607", "text": "func encryptionKeyRotationIsControlPlaneAndNotLeaderAndInit(cp *rkev1.RKEControlPlane) roleFilter {\n\treturn func(entry *planEntry) bool {\n\t\treturn isControlPlaneAndNotInitNode(entry) &&\n\t\t\tcp.Status.RotateEncryptionKeysLeader != entry.Machine.Name\n\t}\n}", "title": "" }, { "docid": "221c00a26a8451ab0ce8a081f6d9b728", "score": "0.5354133", "text": "func ShouldRotate(cert certificate.Certificater) bool {\n\t// The certificate is going to expire at a timestamp T\n\t// We want to renew earlier. How much earlier is defined in renewBeforeCertExpires.\n\t// We add a few seconds noise to the early renew period so that certificates that may have been\n\t// created at the same time are not renewed at the exact same time.\n\n\tintNoise := rand.Intn(maxNoiseSeconds-minNoiseSeconds) + minNoiseSeconds /* #nosec G404 */\n\tsecondsNoise := time.Duration(intNoise) * time.Second\n\treturn time.Until(cert.GetExpiration()) <= (renewBeforeCertExpires + secondsNoise)\n}", "title": "" }, { "docid": "f45aecfa7ef8679c0f9f4285c84ea459", "score": "0.5317086", "text": "func encryptionKeyRotationStatusEnv(cp *rkev1.RKEControlPlane) string {\n\treturn fmt.Sprintf(\"ENCRYPTION_KEY_ROTATION_STAGE=%s\", cp.Status.RotateEncryptionKeysPhase)\n}", "title": "" }, { "docid": "d0cd6af54a3cca51fa6369d8a569be28", "score": "0.52778167", "text": "func encryptionKeyRotationWaitForSystemctlStatusInstruction(cp *rkev1.RKEControlPlane) plan.OneTimeInstruction {\n\treturn plan.OneTimeInstruction{\n\t\tName: \"wait-for-systemctl-status\",\n\t\tCommand: \"sh\",\n\t\tArgs: []string{\n\t\t\t\"-x\", encryptionKeyRotationScriptPath(cp, encryptionKeyRotationWaitForSystemctlStatusPath), capr.GetRuntimeServerUnit(cp.Spec.KubernetesVersion),\n\t\t},\n\t\tEnv: []string{\n\t\t\tencryptionKeyRotationEndpointEnv,\n\t\t\tencryptionKeyRotationStatusEnv(cp),\n\t\t\tencryptionKeyRotationGenerationEnv(cp),\n\t\t},\n\t\tSaveOutput: false,\n\t}\n}", "title": "" }, { "docid": "82f8139ba3a5bd2f93b048b90446b52a", "score": "0.5267218", "text": "func encryptionKeyRotationIsEtcdAndNotControlPlaneAndNotLeaderAndInit(cp *rkev1.RKEControlPlane) roleFilter {\n\treturn func(entry *planEntry) bool {\n\t\treturn isEtcd(entry) && !isControlPlane(entry) &&\n\t\t\tcp.Status.RotateEncryptionKeysLeader != entry.Machine.Name &&\n\t\t\t!isInitNode(entry)\n\t}\n}", "title": "" }, { "docid": "cc529a260394c3a1c9c63305c5fce896", "score": "0.52531546", "text": "func encryptionKeyRotationSecretsEncryptStatusPeriodicInstruction(cp *rkev1.RKEControlPlane) plan.PeriodicInstruction {\n\treturn plan.PeriodicInstruction{\n\t\tName: encryptionKeyRotationSecretsEncryptStatusCommand,\n\t\tCommand: capr.GetRuntimeCommand(cp.Spec.KubernetesVersion),\n\t\tArgs: []string{\n\t\t\t\"secrets-encrypt\",\n\t\t\t\"status\",\n\t\t},\n\t\tPeriodSeconds: 5,\n\t}\n}", "title": "" }, { "docid": "c584452ebd76fb967a6a09a52f5b375e", "score": "0.52060515", "text": "func (s SignalAct) IsRestart() bool {\n\treturn s.Flags&SignalFlagRestart != 0\n}", "title": "" }, { "docid": "857921dcf76fc3c3819e5a30269ffdb5", "score": "0.51212096", "text": "func (s *State) Restarting() (bool, RestartType) {\n\ts.restartLck.Lock()\n\tdefer s.restartLck.Unlock()\n\treturn s.restarting != RestartUnset, s.restarting\n}", "title": "" }, { "docid": "f5d1b0f71bfa7ecfc22f80845b122694", "score": "0.50954014", "text": "func encryptionKeyRotationSecretsEncryptStatusOneTimeInstruction(cp *rkev1.RKEControlPlane) plan.OneTimeInstruction {\n\treturn plan.OneTimeInstruction{\n\t\tName: encryptionKeyRotationSecretsEncryptStatusCommand,\n\t\tCommand: capr.GetRuntimeCommand(cp.Spec.KubernetesVersion),\n\t\tArgs: []string{\n\t\t\t\"secrets-encrypt\",\n\t\t\t\"status\",\n\t\t},\n\t\tEnv: []string{\n\t\t\tencryptionKeyRotationStatusEnv(cp),\n\t\t\tencryptionKeyRotationGenerationEnv(cp),\n\t\t},\n\t\tSaveOutput: true,\n\t}\n}", "title": "" }, { "docid": "0757bacf563d15949fed0c5f78e7d077", "score": "0.50327486", "text": "func TestRotateKeyInvalidRoles(t *testing.T) {\n\tsetUp(t)\n\tinvalids := []string{\n\t\t\"notevenARole\",\n\t\t\"targets/a\",\n\t}\n\tfor _, role := range invalids {\n\t\tfor _, serverManaged := range []bool{true, false} {\n\t\t\tk := &keyCommander{\n\t\t\t\tconfigGetter: func() (*viper.Viper, error) { return viper.New(), nil },\n\t\t\t\tgetRetriever: func() notary.PassRetriever { return passphrase.ConstantRetriever(\"pass\") },\n\t\t\t\trotateKeyRole: role,\n\t\t\t\trotateKeyServerManaged: serverManaged,\n\t\t\t}\n\t\t\tcommands := []string{\"gun\", role}\n\t\t\tif serverManaged {\n\t\t\t\tcommands = append(commands, \"-r\")\n\t\t\t}\n\t\t\terr := k.keysRotate(&cobra.Command{}, commands)\n\t\t\trequire.Error(t, err)\n\t\t\trequire.Contains(t, err.Error(),\n\t\t\t\tfmt.Sprintf(\"does not currently permit rotating the %s key\", role))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "edc82e6da48a76bf08261c8c6c975ec3", "score": "0.5022462", "text": "func testRotation(t *testing.T, gotPrimary *DecryptResponse, wantRotation bool, wantIfRotated *DecryptResponse, keySrcs []string) {\n\tt.Helper()\n\n\tt.Run(\"key or algorithm rotation\", func(t *testing.T) {\n\t\tt.Helper()\n\n\t\tgotRotation := len(gotPrimary.ReEncryptedData) > 0\n\t\tif gotRotation != wantRotation {\n\t\t\tt.Fatalf(\"Decrypt() got re-encrypted data %t; want %t\", gotRotation, wantRotation)\n\t\t}\n\t\tif !gotRotation {\n\t\t\treturn\n\t\t}\n\n\t\tcr := NewCrypto()\n\t\treq := DecryptRequest{\n\t\t\tEncryptedData: gotPrimary.ReEncryptedData,\n\t\t\tKeySources: keySrcs,\n\t\t\tAllowedModes: map[pb.Ciphertext_Mode]bool{\n\t\t\t\tpb.Ciphertext_AESGCM: true,\n\t\t\t},\n\t\t}\n\t\tgot := new(DecryptResponse)\n\t\tif err := cr.Decrypt(req, got); err != nil {\n\t\t\tt.Fatalf(\"Decrypt(re-encrypted data) error %v\", err)\n\t\t}\n\n\t\tif diff := cmp.Diff(wantIfRotated, got, cmpHexOpt()); diff != \"\" {\n\t\t\tt.Errorf(\"Decrypt(re-encrypted data) diff (-want +got):\\n%s\", diff)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "dc8daf264bcc990ad2bc52512cf3f4eb", "score": "0.5012127", "text": "func (sa *Job) ShouldRetry() bool {\n\treturn false\n}", "title": "" }, { "docid": "249f0f73c7af405b55bb4019c47d1e8c", "score": "0.50050205", "text": "func (j *Job) ShouldRetry() bool {\n\treturn false\n}", "title": "" }, { "docid": "c74608968e2e652a41a8a80e846434b0", "score": "0.5001243", "text": "func ExampleKMS_EnableKeyRotation_shared00() {\n\tsvc := kms.New(session.New())\n\tinput := &kms.EnableKeyRotationInput{\n\t\tKeyId: aws.String(\"1234abcd-12ab-34cd-56ef-1234567890ab\"),\n\t}\n\n\tresult, err := svc.EnableKeyRotation(input)\n\tif err != nil {\n\t\tif aerr, ok := err.(awserr.Error); ok {\n\t\t\tswitch aerr.Code() {\n\t\t\tcase kms.ErrCodeNotFoundException:\n\t\t\t\tfmt.Println(kms.ErrCodeNotFoundException, aerr.Error())\n\t\t\tcase kms.ErrCodeDisabledException:\n\t\t\t\tfmt.Println(kms.ErrCodeDisabledException, aerr.Error())\n\t\t\tcase kms.ErrCodeInvalidArnException:\n\t\t\t\tfmt.Println(kms.ErrCodeInvalidArnException, aerr.Error())\n\t\t\tcase kms.ErrCodeDependencyTimeoutException:\n\t\t\t\tfmt.Println(kms.ErrCodeDependencyTimeoutException, aerr.Error())\n\t\t\tcase kms.ErrCodeInternalException:\n\t\t\t\tfmt.Println(kms.ErrCodeInternalException, aerr.Error())\n\t\t\tcase kms.ErrCodeInvalidStateException:\n\t\t\t\tfmt.Println(kms.ErrCodeInvalidStateException, aerr.Error())\n\t\t\tcase kms.ErrCodeUnsupportedOperationException:\n\t\t\t\tfmt.Println(kms.ErrCodeUnsupportedOperationException, aerr.Error())\n\t\t\tdefault:\n\t\t\t\tfmt.Println(aerr.Error())\n\t\t\t}\n\t\t} else {\n\t\t\t// Print the error, cast err to awserr.Error to get the Code and\n\t\t\t// Message from an error.\n\t\t\tfmt.Println(err.Error())\n\t\t}\n\t\treturn\n\t}\n\n\tfmt.Println(result)\n}", "title": "" }, { "docid": "49f351c21c7adf20c229a7569c7aff12", "score": "0.49737534", "text": "func (c *ChatRPC) ShouldRetry(_ string, _ error) bool {\n\treturn false\n}", "title": "" }, { "docid": "5ba5e9f0bad315f4ccdfa90b8d8257f5", "score": "0.49299583", "text": "func TestRaftEncryptionKeyRotationWait(t *testing.T) {\n\tt.Parallel()\n\tnodes := make(map[uint64]*raftutils.TestNode)\n\tvar clockSource *fakeclock.FakeClock\n\n\traftConfig := raft.DefaultRaftConfig()\n\tnodes[1], clockSource = raftutils.NewInitNode(t, tc, &raftConfig)\n\tdefer raftutils.TeardownCluster(nodes)\n\n\tnodeIDs := []string{\"id1\", \"id2\", \"id3\"}\n\tvalues := make([]*api.Node, len(nodeIDs))\n\n\t// Propose 3 values\n\tvar err error\n\tfor i, nodeID := range nodeIDs[:3] {\n\t\tvalues[i], err = raftutils.ProposeValue(t, nodes[1], DefaultProposalTime, nodeID)\n\t\trequire.NoError(t, err, \"failed to propose value\")\n\t}\n\n\tsnapDir := filepath.Join(nodes[1].StateDir, \"snap-v3-encrypted\")\n\n\tstartingKeys := nodes[1].KeyRotator.GetKeys()\n\n\t// rotate the encryption key\n\tnodes[1].KeyRotator.QueuePendingKey([]byte(\"key2\"))\n\tnodes[1].KeyRotator.RotationNotify() <- struct{}{}\n\n\t// the rotation should trigger a snapshot, which should notify the rotator when it's done\n\trequire.NoError(t, testutils.PollFunc(clockSource, func() error {\n\t\tsnapshots, err := storage.ListSnapshots(snapDir)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif len(snapshots) != 1 {\n\t\t\treturn fmt.Errorf(\"expected 1 snapshot, found %d on new node\", len(snapshots))\n\t\t}\n\t\tif nodes[1].KeyRotator.NeedsRotation() {\n\t\t\treturn fmt.Errorf(\"rotation never finished\")\n\t\t}\n\t\treturn nil\n\t}))\n\traftutils.CheckValuesOnNodes(t, clockSource, nodes, nodeIDs, values)\n\n\t// Propose a 4th value\n\tnodeIDs = append(nodeIDs, \"id4\")\n\tv, err := raftutils.ProposeValue(t, nodes[1], DefaultProposalTime, \"id4\")\n\trequire.NoError(t, err, \"failed to propose value\")\n\tvalues = append(values, v)\n\traftutils.CheckValuesOnNodes(t, clockSource, nodes, nodeIDs, values)\n\n\tnodes[1].Server.Stop()\n\tnodes[1].ShutdownRaft()\n\n\t// Try to restart node 1. Without the new unlock key, it can't actually start\n\tn, ctx := raftutils.CopyNode(t, clockSource, nodes[1], false, raftutils.NewSimpleKeyRotator(startingKeys))\n\trequire.Error(t, n.Node.JoinAndStart(ctx),\n\t\t\"should not have been able to restart since we can't read snapshots\")\n\n\t// with the right key, it can start, even if the right key is only the pending key\n\tnewKeys := startingKeys\n\tnewKeys.PendingDEK = []byte(\"key2\")\n\tnodes[1].KeyRotator = raftutils.NewSimpleKeyRotator(newKeys)\n\tnodes[1] = raftutils.RestartNode(t, clockSource, nodes[1], false)\n\n\traftutils.WaitForCluster(t, clockSource, nodes)\n\n\t// as soon as we joined, it should have finished rotating the key\n\trequire.False(t, nodes[1].KeyRotator.NeedsRotation())\n\traftutils.CheckValuesOnNodes(t, clockSource, nodes, nodeIDs, values)\n\n\t// break snapshotting, and ensure that key rotation never finishes\n\ttempSnapDir := filepath.Join(nodes[1].StateDir, \"snap-backup\")\n\trequire.NoError(t, os.Rename(snapDir, tempSnapDir))\n\trequire.NoError(t, ioutil.WriteFile(snapDir, []byte(\"this is no longer a directory\"), 0644))\n\n\tnodes[1].KeyRotator.QueuePendingKey([]byte(\"key3\"))\n\tnodes[1].KeyRotator.RotationNotify() <- struct{}{}\n\n\ttime.Sleep(250 * time.Millisecond)\n\n\t// rotation has not been finished, because we cannot take a snapshot\n\trequire.True(t, nodes[1].KeyRotator.NeedsRotation())\n\n\t// Propose a 5th value, so we have WALs written with the new key\n\tnodeIDs = append(nodeIDs, \"id5\")\n\tv, err = raftutils.ProposeValue(t, nodes[1], DefaultProposalTime, \"id5\")\n\trequire.NoError(t, err, \"failed to propose value\")\n\tvalues = append(values, v)\n\traftutils.CheckValuesOnNodes(t, clockSource, nodes, nodeIDs, values)\n\n\tnodes[1].Server.Stop()\n\tnodes[1].ShutdownRaft()\n\n\t// restore the snapshot dir\n\trequire.NoError(t, os.RemoveAll(snapDir))\n\trequire.NoError(t, os.Rename(tempSnapDir, snapDir))\n\n\t// Now the wals are a mix of key2 and key3 - we can't actually start with either key\n\tsingleKey := raft.EncryptionKeys{CurrentDEK: []byte(\"key2\")}\n\tn, ctx = raftutils.CopyNode(t, clockSource, nodes[1], false, raftutils.NewSimpleKeyRotator(singleKey))\n\trequire.Error(t, n.Node.JoinAndStart(ctx),\n\t\t\"should not have been able to restart since we can't read all the WALs, even if we can read the snapshot\")\n\tsingleKey = raft.EncryptionKeys{CurrentDEK: []byte(\"key3\")}\n\tn, ctx = raftutils.CopyNode(t, clockSource, nodes[1], false, raftutils.NewSimpleKeyRotator(singleKey))\n\trequire.Error(t, n.Node.JoinAndStart(ctx),\n\t\t\"should not have been able to restart since we can't read all the WALs, and also not the snapshot\")\n\n\tnodes[1], ctx = raftutils.CopyNode(t, clockSource, nodes[1], false,\n\t\traftutils.NewSimpleKeyRotator(raft.EncryptionKeys{\n\t\t\tCurrentDEK: []byte(\"key2\"),\n\t\t\tPendingDEK: []byte(\"key3\"),\n\t\t}))\n\trequire.NoError(t, nodes[1].Node.JoinAndStart(ctx))\n\n\t// we can load, but we still need a snapshot because rotation hasn't finished\n\tsnapshots, err := storage.ListSnapshots(snapDir)\n\trequire.NoError(t, err)\n\trequire.Len(t, snapshots, 1, \"expected 1 snapshot\")\n\trequire.True(t, nodes[1].KeyRotator.NeedsRotation())\n\tcurrSnapshot := snapshots[0]\n\n\t// start the node - everything should fix itself\n\tgo nodes[1].Node.Run(ctx)\n\traftutils.WaitForCluster(t, clockSource, nodes)\n\n\trequire.NoError(t, testutils.PollFunc(clockSource, func() error {\n\t\tsnapshots, err := storage.ListSnapshots(snapDir)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif len(snapshots) != 1 {\n\t\t\treturn fmt.Errorf(\"expected 1 snapshots, found %d on new node\", len(snapshots))\n\t\t}\n\t\tif snapshots[0] == currSnapshot {\n\t\t\treturn fmt.Errorf(\"new snapshot not done yet\")\n\t\t}\n\t\tif nodes[1].KeyRotator.NeedsRotation() {\n\t\t\treturn fmt.Errorf(\"rotation never finished\")\n\t\t}\n\t\tcurrSnapshot = snapshots[0]\n\t\treturn nil\n\t}))\n\traftutils.CheckValuesOnNodes(t, clockSource, nodes, nodeIDs, values)\n\n\t// If we can't update the keys, we wait for the next snapshot to do so\n\tnodes[1].KeyRotator.SetUpdateFunc(func() error { return fmt.Errorf(\"nope!\") })\n\tnodes[1].KeyRotator.QueuePendingKey([]byte(\"key4\"))\n\tnodes[1].KeyRotator.RotationNotify() <- struct{}{}\n\n\trequire.NoError(t, testutils.PollFunc(clockSource, func() error {\n\t\tsnapshots, err := storage.ListSnapshots(snapDir)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif len(snapshots) != 1 {\n\t\t\treturn fmt.Errorf(\"expected 1 snapshots, found %d on new node\", len(snapshots))\n\t\t}\n\t\tif snapshots[0] == currSnapshot {\n\t\t\treturn fmt.Errorf(\"new snapshot not done yet\")\n\t\t}\n\t\tcurrSnapshot = snapshots[0]\n\t\treturn nil\n\t}))\n\trequire.True(t, nodes[1].KeyRotator.NeedsRotation())\n\n\t// Fix updating the key rotator, and propose a 6th value - this should trigger the key\n\t// rotation to finish\n\tnodes[1].KeyRotator.SetUpdateFunc(nil)\n\tnodeIDs = append(nodeIDs, \"id6\")\n\tv, err = raftutils.ProposeValue(t, nodes[1], DefaultProposalTime, \"id6\")\n\trequire.NoError(t, err, \"failed to propose value\")\n\tvalues = append(values, v)\n\traftutils.CheckValuesOnNodes(t, clockSource, nodes, nodeIDs, values)\n\n\trequire.NoError(t, testutils.PollFunc(clockSource, func() error {\n\t\tif nodes[1].KeyRotator.NeedsRotation() {\n\t\t\treturn fmt.Errorf(\"rotation never finished\")\n\t\t}\n\t\treturn nil\n\t}))\n\n\t// no new snapshot\n\tsnapshots, err = storage.ListSnapshots(snapDir)\n\trequire.NoError(t, err)\n\trequire.Len(t, snapshots, 1)\n\trequire.Equal(t, currSnapshot, snapshots[0])\n\n\t// Even if something goes wrong with getting keys, and needs rotation returns a false positive,\n\t// if there's no PendingDEK nothing happens.\n\n\tfakeTrue := true\n\tnodes[1].KeyRotator.SetNeedsRotation(&fakeTrue)\n\tnodes[1].KeyRotator.RotationNotify() <- struct{}{}\n\n\t// propose another value\n\tnodeIDs = append(nodeIDs, \"id7\")\n\tv, err = raftutils.ProposeValue(t, nodes[1], DefaultProposalTime, \"id7\")\n\trequire.NoError(t, err, \"failed to propose value\")\n\tvalues = append(values, v)\n\traftutils.CheckValuesOnNodes(t, clockSource, nodes, nodeIDs, values)\n\n\t// no new snapshot\n\tsnapshots, err = storage.ListSnapshots(snapDir)\n\trequire.NoError(t, err)\n\trequire.Len(t, snapshots, 1)\n\trequire.Equal(t, currSnapshot, snapshots[0])\n\n\t// and when we restart, we can restart with the original key (the WAL written for the new proposed value)\n\t// is written with the old key\n\tnodes[1].Server.Stop()\n\tnodes[1].ShutdownRaft()\n\n\tnodes[1].KeyRotator = raftutils.NewSimpleKeyRotator(raft.EncryptionKeys{\n\t\tCurrentDEK: []byte(\"key4\"),\n\t})\n\tnodes[1] = raftutils.RestartNode(t, clockSource, nodes[1], false)\n\traftutils.WaitForCluster(t, clockSource, nodes)\n\traftutils.CheckValuesOnNodes(t, clockSource, nodes, nodeIDs, values)\n}", "title": "" }, { "docid": "bee9f523e5c4c5f5227779134a480f91", "score": "0.49112678", "text": "func TestRaftEncryptionKeyRotationStress(t *testing.T) {\n\tt.Parallel()\n\n\t// Bring up a 3 nodes cluster\n\tnodes, clockSource := raftutils.NewRaftCluster(t, tc)\n\tdefer raftutils.TeardownCluster(nodes)\n\tleader := nodes[1]\n\n\t// constantly propose values\n\tdone, stop, restart, clusterReady := make(chan struct{}), make(chan struct{}), make(chan struct{}), make(chan struct{})\n\tgo func() {\n\t\tcounter := len(nodes)\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-stop:\n\t\t\t\tclose(done)\n\t\t\t\treturn\n\t\t\tcase <-restart:\n\t\t\t\t// the node restarts may trigger a leadership change, so wait until the cluster has 3\n\t\t\t\t// nodes again and a leader is selected before proposing more values\n\t\t\t\t<-clusterReady\n\t\t\t\tleader = raftutils.Leader(nodes)\n\t\t\tdefault:\n\t\t\t\tcounter += 1\n\t\t\t\traftutils.ProposeValue(t, leader, DefaultProposalTime, fmt.Sprintf(\"id%d\", counter))\n\t\t\t}\n\t\t}\n\t}()\n\n\tfor i := 0; i < 30; i++ {\n\t\t// rotate the encryption key\n\t\tnodes[3].KeyRotator.QueuePendingKey([]byte(fmt.Sprintf(\"newKey%d\", i)))\n\t\tnodes[3].KeyRotator.RotationNotify() <- struct{}{}\n\n\t\trequire.NoError(t, testutils.PollFunc(clockSource, func() error {\n\t\t\tif nodes[3].KeyRotator.GetKeys().PendingDEK == nil {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn fmt.Errorf(\"not done rotating yet\")\n\t\t}))\n\n\t\t// restart the node and wait for everything to settle and a leader to be elected\n\t\tnodes[3].Server.Stop()\n\t\tnodes[3].ShutdownRaft()\n\t\trestart <- struct{}{}\n\t\tnodes[3] = raftutils.RestartNode(t, clockSource, nodes[3], false)\n\t\traftutils.AdvanceTicks(clockSource, 1)\n\n\t\traftutils.WaitForCluster(t, clockSource, nodes)\n\t\tclusterReady <- struct{}{}\n\t}\n\n\tclose(stop)\n\t<-done\n}", "title": "" }, { "docid": "741cebde863dbf5d6e370b3bf90e4817", "score": "0.49100792", "text": "func TestEncryptionRotation(t *testing.T) {\n\tctx := context.TODO()\n\tlibrary.TestEncryptionRotation(t, library.RotationScenario{\n\t\tBasicScenario: library.BasicScenario{\n\t\t\tNamespace: \"openshift-config-managed\",\n\t\t\t// TODO: update the LabelSelector in 4.7, in 4.6 OAS-O is managing the encryption configuration for CAO\n\t\t\t// LabelSelector: \"encryption.apiserver.operator.openshift.io/component\" + \"=\" + \"openshift-oauth-apiserver\"\n\t\t\tLabelSelector: \"encryption.apiserver.operator.openshift.io/component\" + \"=\" + \"openshift-apiserver\",\n\t\t\tEncryptionConfigSecretName: fmt.Sprintf(\"encryption-config-openshift-oauth-apiserver\"),\n\t\t\tEncryptionConfigSecretNamespace: \"openshift-config-managed\",\n\t\t\tOperatorNamespace: \"openshift-authentication-operator\",\n\t\t\tTargetGRs: DefaultTargetGRs,\n\t\t\tAssertFunc: assertTokens,\n\t\t},\n\t\tCreateResourceFunc: func(t testing.TB, _ library.ClientSet, _ string) runtime.Object {\n\t\t\treturn CreateAndStoreTokenOfLife(ctx, t, GetClients(t))\n\t\t},\n\t\tGetRawResourceFunc: func(t testing.TB, clientSet library.ClientSet, _ string) string {\n\t\t\treturn GetRawTokenOfLife(t, clientSet)\n\t\t},\n\t\tUnsupportedConfigFunc: func(raw []byte) error {\n\t\t\tcs := GetClients(t)\n\t\t\tapiServerOperator, err := cs.OperatorClient.Get(ctx, \"cluster\", metav1.GetOptions{})\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tapiServerOperator.Spec.UnsupportedConfigOverrides.Raw = raw\n\t\t\t_, err = cs.OperatorClient.Update(ctx, apiServerOperator, metav1.UpdateOptions{})\n\t\t\treturn err\n\t\t},\n\t})\n}", "title": "" }, { "docid": "ee133b01485a7650c1b03b5704db1a43", "score": "0.4909311", "text": "func (r *RedisError) IsTryAgain() bool {\n\treturn strings.HasPrefix(r.string, \"TRYAGAIN\")\n}", "title": "" }, { "docid": "2e5bc2aefd1c05d7bcd5e75917f45136", "score": "0.48883557", "text": "func TestRotateKeyTimestampCannotBeLocallyManaged(t *testing.T) {\n\tsetUp(t)\n\tk := &keyCommander{\n\t\tconfigGetter: func() (*viper.Viper, error) { return viper.New(), nil },\n\t\tgetRetriever: func() notary.PassRetriever { return passphrase.ConstantRetriever(\"pass\") },\n\t\trotateKeyRole: data.CanonicalTimestampRole.String(),\n\t\trotateKeyServerManaged: false,\n\t}\n\terr := k.keysRotate(&cobra.Command{}, []string{\"gun\", data.CanonicalTimestampRole.String()})\n\trequire.Error(t, err)\n\trequire.IsType(t, client.ErrInvalidLocalRole{}, err)\n}", "title": "" }, { "docid": "822d8544d5e4be734be7bcb3a3f36580", "score": "0.487226", "text": "func (r *Reconciler) keyRotate() error {\n\tr.Logger.Infof(\"Key rotation started at %v\", time.Now())\n\tif len(r.SecretRootMasterKey) > 0 {\n\t\treturn fmt.Errorf(\"Master root key rotation is not supported by the KMS backend\")\n\t}\n\n\t// KMS Spec\n\tconnectionDetails := r.NooBaa.Spec.Security.KeyManagementService.ConnectionDetails\n\tauthTokenSecretName := r.NooBaa.Spec.Security.KeyManagementService.TokenSecretName\n\n\tk, err := kms.NewKMS(connectionDetails, authTokenSecretName, r.Request.Name, r.Request.Namespace, string(r.NooBaa.UID))\n\tif err != nil {\n\t\tr.Logger.Errorf(\"keyRotate, NewKMS error %v\", err)\n\t\tr.setKMSConditionStatus(nbv1.ConditionKMSInvalid)\n\t\treturn err\n\t}\n\n\t// Generate new random root key and set it in the KMS\n\t// Key - rotate begins\n\terr = k.Set(util.RandomBase64(32))\n\tif err != nil {\n\t\tr.Logger.Errorf(\"keyRotate, KMS Set error %v\", err)\n\t\tr.setKMSConditionStatus(nbv1.ConditionKMSErrorWrite)\n\t\treturn err\n\t}\n\n\t// Set the value from KMS\n\t// Set new root key with system reconciler\n\t// to propogate change to noobaa pods\n\terr = k.Reconcile(r)\n\tif err != nil {\n\t\tr.Logger.Errorf(\"keyRotate, KMS reconcile error %v\", err)\n\t\tr.setKMSConditionStatus(nbv1.ConditionKMSErrorSecretReconcile)\n\t\treturn err\n\t}\n\n\tr.setKMSConditionStatus(nbv1.ConditionKMSKeyRotate)\n\n\treturn nil\n}", "title": "" }, { "docid": "1c40384b8ba5f5bdd1ba8e9ddf99ecfa", "score": "0.48575523", "text": "func (mw *MainWindow) canRecreateKeys(userName string) bool {\n\tconst (\n\t\tmsgFormat = \"Keys for user %s already exists\"\n\t\tmsgSecond = \"Would you like to recreate keys?\"\n\t)\n\n\ttitle := fmt.Sprintf(msgFormat, userName)\n\tif dialog := gtk.MessageDialogNew(mw.app.GetActiveWindow(), gtk.DIALOG_MODAL, gtk.MESSAGE_WARNING, gtk.BUTTONS_OK, title); dialog != nil {\n\t\tdefer dialog.Destroy()\n\t\tif _, err := dialog.AddButton(\"Cancel\", gtk.RESPONSE_CANCEL); tr.IsOK(err) {\n\t\t\tdialog.FormatSecondaryText(msgSecond)\n\t\t\treturn dialog.Run() == gtk.RESPONSE_OK\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "244e1168f70451c3fa209aa984eb6506", "score": "0.48438564", "text": "func (md *RootMetadataV3) IsRekeySet() bool {\n\treturn md.Flags&MetadataFlagRekey != 0\n}", "title": "" }, { "docid": "cb4afaa89cb451aa3c926dcd1d4eff3c", "score": "0.48151278", "text": "func (m *Manager) ShouldMigrateCredentials() bool {\n\treturn string(m.schema.Credentials) != credentials.CNABSpecVersion\n}", "title": "" }, { "docid": "38c95686bf7875cc13864079ca63adc8", "score": "0.4813477", "text": "func (bwa *BatchedWriterAssembly) NeedsRotate(rotate RotateConfig, forceRotate bool) (bool, error) {\n\t// File does not exist?\n\tif !bwa.HasWriter() {\n\t\tbwa.logger.Debug(\"Rotate true: \", \"no writer\")\n\t\treturn true, nil\n\t}\n\n\t// File can be accessed?\n\tif !bwa.GetWriter().IsAccessible() {\n\t\tbwa.logger.Debug(\"Rotate false: \", \"no access\")\n\t\treturn false, errors.New(\"can' access file to rotate\")\n\t}\n\n\t// File needs rotation?\n\tif !rotate.Enabled {\n\t\tbwa.logger.Debug(\"Rotate false: \", \"not active\")\n\t\treturn false, nil\n\t}\n\n\tif forceRotate {\n\t\tbwa.logger.Debug(\"Rotate true: \", \"forced\")\n\t\treturn true, nil\n\t}\n\n\t// File is too large?\n\tif bwa.GetWriter().Size() >= rotate.SizeByte {\n\t\tbwa.logger.Debug(\"Rotate true: \", \"size > rotation size\")\n\t\treturn true, nil // ### return, too large ###\n\t}\n\n\t// File is too old?\n\tif time.Since(bwa.Created) >= rotate.Timeout {\n\t\tbwa.logger.Debug(\"Rotate true: \", \"lifetime > timeout setting\")\n\t\treturn true, nil // ### return, too old ###\n\t}\n\n\t// RotateAt crossed?\n\tif rotate.AtHour > -1 && rotate.AtMinute > -1 {\n\t\tnow := time.Now()\n\t\trotateAt := time.Date(now.Year(), now.Month(), now.Day(), rotate.AtHour, rotate.AtMinute, 0, 0, now.Location())\n\n\t\tif rotateAt.Before(bwa.Created) {\n\t\t\treturn false, nil\n\t\t}\n\n\t\tif now.After(rotateAt) {\n\t\t\tbwa.logger.Debug(\"Rotate true: \", \"rotateAt time reached\")\n\t\t\treturn true, nil // ### return, too old ###\n\t\t}\n\t}\n\n\t// nope, everything is ok\n\treturn false, nil\n}", "title": "" }, { "docid": "6e92b18758d0f400597c25933da91053", "score": "0.48000917", "text": "func getCMKRotateStatus(svc *kms.KMS, key *kms.KeyListEntry) *kms.GetKeyRotationStatusOutput {\n\tparams := &kms.GetKeyRotationStatusInput{\n\t\tKeyId: aws.String(*key.KeyId), // Required\n\t}\n\tresp, err := svc.GetKeyRotationStatus(params)\n\n\tif err != nil {\n\t\t// Log the error\n\t\tlog.Fatalf(\"Couldn't get CMK rotation status: %v\\n\", err)\n\t\treturn nil\n\t}\n\n\t// return response data.\n\treturn resp\n}", "title": "" }, { "docid": "97dcd9785e6b41e7f11bc9d42a9a3a23", "score": "0.4787052", "text": "func (client IntegrationRuntimesClient) RegenerateAuthKey(ctx context.Context, resourceGroupName string, factoryName string, integrationRuntimeName string, regenerateKeyParameters IntegrationRuntimeRegenerateKeyParameters) (result IntegrationRuntimeAuthKeys, err error) {\n\tif tracing.IsEnabled() {\n\t\tctx = tracing.StartSpan(ctx, fqdn+\"/IntegrationRuntimesClient.RegenerateAuthKey\")\n\t\tdefer func() {\n\t\t\tsc := -1\n\t\t\tif result.Response.Response != nil {\n\t\t\t\tsc = result.Response.Response.StatusCode\n\t\t\t}\n\t\t\ttracing.EndSpan(ctx, sc, err)\n\t\t}()\n\t}\n\tif err := validation.Validate([]validation.Validation{\n\t\t{TargetValue: resourceGroupName,\n\t\t\tConstraints: []validation.Constraint{{Target: \"resourceGroupName\", Name: validation.MaxLength, Rule: 90, Chain: nil},\n\t\t\t\t{Target: \"resourceGroupName\", Name: validation.MinLength, Rule: 1, Chain: nil},\n\t\t\t\t{Target: \"resourceGroupName\", Name: validation.Pattern, Rule: `^[-\\w\\._\\(\\)]+$`, Chain: nil}}},\n\t\t{TargetValue: factoryName,\n\t\t\tConstraints: []validation.Constraint{{Target: \"factoryName\", Name: validation.MaxLength, Rule: 63, Chain: nil},\n\t\t\t\t{Target: \"factoryName\", Name: validation.MinLength, Rule: 3, Chain: nil},\n\t\t\t\t{Target: \"factoryName\", Name: validation.Pattern, Rule: `^[A-Za-z0-9]+(?:-[A-Za-z0-9]+)*$`, Chain: nil}}},\n\t\t{TargetValue: integrationRuntimeName,\n\t\t\tConstraints: []validation.Constraint{{Target: \"integrationRuntimeName\", Name: validation.MaxLength, Rule: 63, Chain: nil},\n\t\t\t\t{Target: \"integrationRuntimeName\", Name: validation.MinLength, Rule: 3, Chain: nil},\n\t\t\t\t{Target: \"integrationRuntimeName\", Name: validation.Pattern, Rule: `^[A-Za-z0-9]+(?:-[A-Za-z0-9]+)*$`, Chain: nil}}}}); err != nil {\n\t\treturn result, validation.NewError(\"datafactory.IntegrationRuntimesClient\", \"RegenerateAuthKey\", err.Error())\n\t}\n\n\treq, err := client.RegenerateAuthKeyPreparer(ctx, resourceGroupName, factoryName, integrationRuntimeName, regenerateKeyParameters)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"datafactory.IntegrationRuntimesClient\", \"RegenerateAuthKey\", nil, \"Failure preparing request\")\n\t\treturn\n\t}\n\n\tresp, err := client.RegenerateAuthKeySender(req)\n\tif err != nil {\n\t\tresult.Response = autorest.Response{Response: resp}\n\t\terr = autorest.NewErrorWithError(err, \"datafactory.IntegrationRuntimesClient\", \"RegenerateAuthKey\", resp, \"Failure sending request\")\n\t\treturn\n\t}\n\n\tresult, err = client.RegenerateAuthKeyResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"datafactory.IntegrationRuntimesClient\", \"RegenerateAuthKey\", resp, \"Failure responding to request\")\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "1384833b626677a432ecdde21ef3286c", "score": "0.47832337", "text": "func ExampleKMS_GetKeyRotationStatus_shared00() {\n\tsvc := kms.New(session.New())\n\tinput := &kms.GetKeyRotationStatusInput{\n\t\tKeyId: aws.String(\"1234abcd-12ab-34cd-56ef-1234567890ab\"),\n\t}\n\n\tresult, err := svc.GetKeyRotationStatus(input)\n\tif err != nil {\n\t\tif aerr, ok := err.(awserr.Error); ok {\n\t\t\tswitch aerr.Code() {\n\t\t\tcase kms.ErrCodeNotFoundException:\n\t\t\t\tfmt.Println(kms.ErrCodeNotFoundException, aerr.Error())\n\t\t\tcase kms.ErrCodeInvalidArnException:\n\t\t\t\tfmt.Println(kms.ErrCodeInvalidArnException, aerr.Error())\n\t\t\tcase kms.ErrCodeDependencyTimeoutException:\n\t\t\t\tfmt.Println(kms.ErrCodeDependencyTimeoutException, aerr.Error())\n\t\t\tcase kms.ErrCodeInternalException:\n\t\t\t\tfmt.Println(kms.ErrCodeInternalException, aerr.Error())\n\t\t\tcase kms.ErrCodeInvalidStateException:\n\t\t\t\tfmt.Println(kms.ErrCodeInvalidStateException, aerr.Error())\n\t\t\tcase kms.ErrCodeUnsupportedOperationException:\n\t\t\t\tfmt.Println(kms.ErrCodeUnsupportedOperationException, aerr.Error())\n\t\t\tdefault:\n\t\t\t\tfmt.Println(aerr.Error())\n\t\t\t}\n\t\t} else {\n\t\t\t// Print the error, cast err to awserr.Error to get the Code and\n\t\t\t// Message from an error.\n\t\t\tfmt.Println(err.Error())\n\t\t}\n\t\treturn\n\t}\n\n\tfmt.Println(result)\n}", "title": "" }, { "docid": "29b3e0a7ce6116584fe5e6c902cd989f", "score": "0.47763985", "text": "func (o *ExportEncryptionKeyUnauthorized) IsSuccess() bool {\n\treturn false\n}", "title": "" }, { "docid": "20c973baeaf110eab77d667102546c96", "score": "0.47449997", "text": "func (o SecretOutput) EnableAutomaticRotation() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *Secret) pulumi.BoolPtrOutput { return v.EnableAutomaticRotation }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "8e98dd7865facfac85a20fbfbf0b4cab", "score": "0.47412345", "text": "func shouldSkipRemediation(m *clusterv1.Machine) (bool, string) {\n\tif annotations.HasPaused(m) {\n\t\treturn true, fmt.Sprintf(\"machine has %q annotation\", clusterv1.PausedAnnotation)\n\t}\n\n\tif annotations.HasSkipRemediation(m) {\n\t\treturn true, fmt.Sprintf(\"machine has %q annotation\", clusterv1.MachineSkipRemediationAnnotation)\n\t}\n\n\treturn false, \"\"\n}", "title": "" }, { "docid": "1706f1811edee8162fdba6c1783aa22e", "score": "0.47364068", "text": "func (r *taskResolver) CanRestart(ctx context.Context, obj *restModel.APITask) (bool, error) {\n\tt, err := obj.ToService()\n\tif err != nil {\n\t\treturn false, InternalServerError.Send(ctx, fmt.Sprintf(\"converting task '%s' to service\", *obj.Id))\n\t}\n\treturn canRestartTask(t), nil\n}", "title": "" }, { "docid": "cdd0f2d4a2331b945b013b2827fae8e2", "score": "0.4732753", "text": "func (md *RootMetadataV2) IsRekeySet() bool {\n\treturn md.Flags&MetadataFlagRekey != 0\n}", "title": "" }, { "docid": "75f5110c5ce4e94f3d1e5f2ccd13bf30", "score": "0.4722936", "text": "func (c *Controller) RotateVerificationKeys(ctx context.Context) error {\n\tvar merr *multierror.Error\n\n\trealms, _, err := c.db.ListRealms(pagination.UnlimitedResults, database.WithRealmAutoKeyRotationEnabled(true))\n\tif err != nil {\n\t\tmerr = multierror.Append(merr, fmt.Errorf(\"unable to list realms to rotate signing keys: %w\", err))\n\t}\n\n\tif len(realms) > 0 {\n\t\tif err := c.createNewKeys(ctx, realms); err != nil {\n\t\t\tmerr = multierror.Append(merr, err)\n\t\t}\n\n\t\tif err := c.activateKeys(ctx, realms); err != nil {\n\t\t\tmerr = multierror.Append(merr, err)\n\t\t}\n\t}\n\n\treturn merr.ErrorOrNil()\n}", "title": "" }, { "docid": "16e0ef9cfc1a98fbe7f5a16614cdf4e6", "score": "0.47154567", "text": "func encryptionKeyRotationSecretsEncryptStatusScriptOneTimeInstruction(cp *rkev1.RKEControlPlane, expected string) plan.OneTimeInstruction {\n\ti := plan.OneTimeInstruction{\n\t\tName: \"secrets-encrypt-status-script\",\n\t\tCommand: \"sh\",\n\t\tArgs: []string{\n\t\t\t\"-x\",\n\t\t\tencryptionKeyRotationScriptPath(cp, encryptionKeyRotationSecretsEncryptStatusPath),\n\t\t\tcapr.GetRuntimeCommand(cp.Spec.KubernetesVersion),\n\t\t},\n\t\tEnv: []string{\n\t\t\tencryptionKeyRotationStatusEnv(cp),\n\t\t\tencryptionKeyRotationGenerationEnv(cp),\n\t\t},\n\t}\n\tif expected != \"\" {\n\t\ti.Args = append(i.Args, expected)\n\t}\n\treturn i\n}", "title": "" }, { "docid": "431283c5139364cd3cf8bb8de9ebde97", "score": "0.46609005", "text": "func (o SecretRoleOutput) OperationRekey() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v *SecretRole) pulumi.BoolOutput { return v.OperationRekey }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "f5db7661f2f74ed061bf5c1140c5671c", "score": "0.46535018", "text": "func encryptionKeyRotationGenerationEnv(cp *rkev1.RKEControlPlane) string {\n\treturn fmt.Sprintf(\"ENCRYPTION_KEY_ROTATION_GENERATION=%d\", cp.Spec.RotateEncryptionKeys.Generation)\n}", "title": "" }, { "docid": "6af3c6611079af474f30df346b904514", "score": "0.46191797", "text": "func encryptSecretKeys(\n\tcr *kdv1.KubeDirectorCluster,\n\tprevCr *kdv1.KubeDirectorCluster,\n\tvalErrors []string,\n\tpatches []clusterPatchSpec,\n) ([]string, []clusterPatchSpec) {\n\tfor roleIndex, role := range cr.Spec.Roles {\n\t\tprevEncryptedValues := map[string]string{}\n\t\tfor _, prevRole := range prevCr.Spec.Roles {\n\t\t\tif prevRole.Name == role.Name {\n\t\t\t\tfor _, secretKey := range prevRole.SecretKeys {\n\t\t\t\t\tprevEncryptedValues[secretKey.Name] = secretKey.EncryptedValue\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tfor secretKeyIndex, secretKey := range role.SecretKeys {\n\t\t\tif secretKey.Value == \"\" && secretKey.EncryptedValue != \"\" {\n\t\t\t\tif secretKey.EncryptedValue != prevEncryptedValues[secretKey.Name] {\n\t\t\t\t\tvalErrors = append(valErrors,\n\t\t\t\t\t\tfmt.Sprintf(forbiddenManualSecretKeyEncryptedValuePlacement, secretKey.Name),\n\t\t\t\t\t)\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tencryptedValue, err := secretkeys.Encrypt(secretKey.Value)\n\t\t\tif err != nil {\n\t\t\t\tvalidatorLog.Error(err, \"cannot encrypt secret key\",\n\t\t\t\t\t\"namespace\", cr.Namespace, \"kdcluster\", cr.Name,\n\t\t\t\t\t\"role\", role.Name,\n\t\t\t\t\t\"secret key\", secretKeyIndex)\n\t\t\t\tvalErrors = append(valErrors,\n\t\t\t\t\tfmt.Sprintf(failedSecretKeyEncryption, secretKey.Name),\n\t\t\t\t)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tpatches = append(patches, clusterPatchSpec{\n\t\t\t\tOp: \"replace\",\n\t\t\t\tPath: \"/spec/roles/\" + strconv.Itoa(roleIndex) + \"/secretKeys/\" + strconv.Itoa(secretKeyIndex),\n\t\t\t\tValue: clusterPatchValue{\n\t\t\t\t\tValueSecretKey: &kdv1.SecretKey{\n\t\t\t\t\t\tName: secretKey.Name,\n\t\t\t\t\t\tEncryptedValue: encryptedValue,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t})\n\t\t}\n\t}\n\n\treturn valErrors, patches\n}", "title": "" }, { "docid": "f515798f246464baaa76a7263d286544", "score": "0.4611306", "text": "func (o ApiCacheOutput) AtRestEncryptionEnabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ApiCache) pulumi.BoolPtrOutput { return v.AtRestEncryptionEnabled }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "b8950b102c349df55b13dd5d10688b16", "score": "0.45947558", "text": "func (e *RegisterEntityError) ShouldRetry() bool {\n\treturn e.StatusCode == StatusCodeConFailure ||\n\t\te.StatusCode == StatusCodeLimitExceed\n}", "title": "" }, { "docid": "e7f8480dde14f0eb1de1084c55385afc", "score": "0.45908576", "text": "func (o InstanceGroupManagerActionsSummaryResponseOutput) Restarting() pulumi.IntOutput {\n\treturn o.ApplyT(func(v InstanceGroupManagerActionsSummaryResponse) int { return v.Restarting }).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "644e558335f1077a4c523e63a5f78386", "score": "0.45857388", "text": "func (this Mat3) IsRotation() bool {\n\treturn closeEq(this.Determinant(), 1, epsilon) && this.Mult(this.Transpose()).IsIdentity()\n}", "title": "" }, { "docid": "f7b289230ec28e8c92325069c3e99ae6", "score": "0.45856842", "text": "func IsRotation(s1 string, s2 string) bool {\n\t// make s1 double, so it contains rotated s2\n\ts1s1 := s1 + s1\n\treturn isSubstring(s1s1, s2)\n}", "title": "" }, { "docid": "2da1d919b72c877baaddee1237de1645", "score": "0.45853016", "text": "func encryptionKeyRotationSecretsEncryptStageFromOneTimeStatus(plan *planEntry) (string, error) {\n\toutput, ok := plan.Plan.Output[encryptionKeyRotationSecretsEncryptStatusCommand]\n\tif !ok {\n\t\treturn \"\", errWaitingf(\"could not extract current status from plan for [%s]: no output for status\", plan.Machine.Name)\n\t}\n\tstatus, err := encryptionKeyRotationStageFromOutput(plan, string(output))\n\treturn status, err\n}", "title": "" }, { "docid": "630f99111740eaa13d6144f939e793a8", "score": "0.45847166", "text": "func encryptionKeyRotationSecretsEncryptInstruction(cp *rkev1.RKEControlPlane) (plan.OneTimeInstruction, error) {\n\tif cp == nil {\n\t\treturn plan.OneTimeInstruction{}, fmt.Errorf(\"controlplane cannot be nil\")\n\t}\n\n\tvar command string\n\tswitch cp.Status.RotateEncryptionKeysPhase {\n\tcase rkev1.RotateEncryptionKeysPhasePrepare:\n\t\tcommand = encryptionKeyRotationCommandPrepare\n\tcase rkev1.RotateEncryptionKeysPhaseRotate:\n\t\tcommand = encryptionKeyRotationCommandRotate\n\tcase rkev1.RotateEncryptionKeysPhaseReencrypt:\n\t\tcommand = encryptionKeyRotationCommandReencrypt\n\tdefault:\n\t\treturn plan.OneTimeInstruction{}, fmt.Errorf(\"cannot determine desired secrets-encrypt command for phase: [%s]\", cp.Status.RotateEncryptionKeysPhase)\n\t}\n\n\treturn idempotentInstruction(\n\t\tstrings.ToLower(fmt.Sprintf(\"encryption-key-rotation/%s\", cp.Status.RotateEncryptionKeysPhase)),\n\t\tstrconv.FormatInt(cp.Spec.RotateEncryptionKeys.Generation, 10),\n\t\tcapr.GetRuntimeCommand(cp.Spec.KubernetesVersion),\n\t\t[]string{\n\t\t\t\"secrets-encrypt\",\n\t\t\tcommand,\n\t\t},\n\t\t[]string{},\n\t), nil\n}", "title": "" }, { "docid": "61b0a6cb977e9ebec3313b024a0c8c3d", "score": "0.45737943", "text": "func TestRotateKeyBothKeys(t *testing.T) {\n\tsetUp(t)\n\t// Temporary directory where test files will be created\n\ttempBaseDir, err := ioutil.TempDir(\"\", \"notary-test-\")\n\tdefer os.RemoveAll(tempBaseDir)\n\trequire.NoError(t, err, \"failed to create a temporary directory: %s\", err)\n\tvar gun data.GUN = \"docker.com/notary\"\n\n\tret := passphrase.ConstantRetriever(\"pass\")\n\n\tts, initialKeys := setUpRepo(t, tempBaseDir, gun, ret)\n\tdefer ts.Close()\n\n\tk := &keyCommander{\n\t\tconfigGetter: func() (*viper.Viper, error) {\n\t\t\tv := viper.New()\n\t\t\tv.SetDefault(\"trust_dir\", tempBaseDir)\n\t\t\tv.SetDefault(\"remote_server.url\", ts.URL)\n\t\t\treturn v, nil\n\t\t},\n\t\tgetRetriever: func() notary.PassRetriever { return ret },\n\t}\n\trequire.NoError(t, k.keysRotate(&cobra.Command{}, []string{gun.String(), data.CanonicalTargetsRole.String()}))\n\trequire.NoError(t, k.keysRotate(&cobra.Command{}, []string{gun.String(), data.CanonicalSnapshotRole.String()}))\n\n\trepo, err := client.NewFileCachedNotaryRepository(tempBaseDir, data.GUN(gun), ts.URL, nil, ret, trustpinning.TrustPinConfig{})\n\trequire.NoError(t, err, \"error creating repo: %s\", err)\n\n\tcl, err := repo.GetChangelist()\n\trequire.NoError(t, err, \"unable to get changelist: %v\", err)\n\trequire.Len(t, cl.List(), 0)\n\n\t// two new keys have been created, and the old keys should still be gone\n\tnewKeys := repo.CryptoService.ListAllKeys()\n\t// there should be 3 keys - snapshot, targets, and root\n\trequire.Len(t, newKeys, 3)\n\n\t// the old snapshot/targets keys should be gone\n\tfor keyID, role := range initialKeys {\n\t\tr, ok := newKeys[keyID]\n\t\tswitch r {\n\t\tcase data.CanonicalSnapshotRole, data.CanonicalTargetsRole:\n\t\t\trequire.False(t, ok, \"original key %s still there\", keyID)\n\t\tcase data.CanonicalRootRole:\n\t\t\trequire.Equal(t, role, r)\n\t\t\trequire.True(t, ok, \"old root key has changed\")\n\t\t}\n\t}\n\n\tfound := make(map[data.RoleName]bool)\n\tfor _, role := range newKeys {\n\t\tfound[role] = true\n\t}\n\trequire.True(t, found[data.CanonicalTargetsRole], \"targets key was not created\")\n\trequire.True(t, found[data.CanonicalSnapshotRole], \"snapshot key was not created\")\n\trequire.True(t, found[data.CanonicalRootRole], \"root key was removed somehow\")\n}", "title": "" }, { "docid": "c66aeb2f6c6caa91175b70b14274fe86", "score": "0.45731017", "text": "func IsRotation(src, dst string) bool {\n\tif len(src) != len(dst) {\n\t\treturn false\n\t}\n\treturn strings.Contains(src+src, dst)\n}", "title": "" }, { "docid": "2a5a8139fabf7620b621381947411b43", "score": "0.4563246", "text": "func TestRotateKeyNoGUN(t *testing.T) {\n\tsetUp(t)\n\tk := &keyCommander{\n\t\tconfigGetter: func() (*viper.Viper, error) { return viper.New(), nil },\n\t\tgetRetriever: func() notary.PassRetriever { return passphrase.ConstantRetriever(\"pass\") },\n\t\trotateKeyRole: data.CanonicalTargetsRole.String(),\n\t}\n\terr := k.keysRotate(&cobra.Command{}, []string{})\n\trequire.Error(t, err)\n\trequire.Contains(t, err.Error(), \"Must specify a GUN\")\n}", "title": "" }, { "docid": "337bce61671e39f8eac6244a5508466c", "score": "0.45475873", "text": "func ExampleClustersClient_BeginRotateDiskEncryptionKey() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclientFactory, err := armhdinsight.NewClientFactory(\"<subscription-id>\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tpoller, err := clientFactory.NewClustersClient().BeginRotateDiskEncryptionKey(ctx, \"rg1\", \"cluster1\", armhdinsight.ClusterDiskEncryptionParameters{\n\t\tKeyName: to.Ptr(\"newkeyname\"),\n\t\tKeyVersion: to.Ptr(\"newkeyversion\"),\n\t\tVaultURI: to.Ptr(\"https://newkeyvault.vault.azure.net/\"),\n\t}, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\t_, err = poller.PollUntilDone(ctx, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to pull the result: %v\", err)\n\t}\n}", "title": "" }, { "docid": "df569202693f600fd09a9cd0930cc260", "score": "0.45458135", "text": "func (v *Error) IsSetShouldRetry() bool {\n\treturn v != nil && v.ShouldRetry != nil\n}", "title": "" }, { "docid": "8f69a296d16d0b92456eb3f37155568c", "score": "0.45333543", "text": "func (c *RekeyCommand) rekeyStatus(client *api.Client, recovery bool) int {\n\t// Check the status\n\tvar status *api.RekeyStatusResponse\n\tvar err error\n\tif recovery {\n\t\tstatus, err = client.Sys().RekeyRecoveryKeyStatus()\n\t} else {\n\t\tstatus, err = client.Sys().RekeyStatus()\n\t}\n\tif err != nil {\n\t\tc.Ui.Error(fmt.Sprintf(\"Error reading rekey status: %s\", err))\n\t\treturn 1\n\t}\n\n\treturn c.dumpRekeyStatus(status)\n}", "title": "" }, { "docid": "39b0031e4c2178a867f1ca3714642a3d", "score": "0.45302674", "text": "func (o *ExportEncryptionKeyNotFound) IsSuccess() bool {\n\treturn false\n}", "title": "" }, { "docid": "76e1a2b546e6c4fd71866ee3680f2b30", "score": "0.45295286", "text": "func (f *FailRetryManager) ShouldDelay(key string, isFailure func() bool) (bool, time.Duration) {\n\tif !isFailure() {\n\t\tlog.Log.V(4).Infof(\"%s: Not a failure\", key)\n\t\treturn false, 0\n\t}\n\n\tnow := time.Now()\n\n\tf.stateLock.Lock()\n\tdefer f.stateLock.Unlock()\n\n\tstate := f.retryStates[key]\n\n\t// When first failure occurs we set when should be the next run(`nextRun`) but do not delay\n\t// letting the VMI try to start again.\n\t// From this moment we wait for `maxFailResponseTime` amount of time.\n\tif state == nil {\n\t\tf.retryStates[key] = f.newState(now)\n\t\tlog.Log.V(4).Infof(\"%s: First failure. Creating a new state and do not delay.\", key)\n\t\treturn false, 0\n\t}\n\n\t// `lastRunFailed` is a flag that allows us to join or separate different run/fail cycles.\n\t// When a failure occurs within a \"maxFailResponseTime\" amount of time, we consider it related to previous start,\n\t// and we start the backoff.\n\tif !state.lastRunFailed {\n\t\t// If another failure occurs during this waiting time we delay the enqueue\n\t\t// based on the difference between now and `nextRun`:\n\t\t//\t- If now > nextRun \t=> we should not delay\n\t\t//\t- If now <= nextRun => we need to wait (nextRun - now) amount of time before processing the vm again\n\t\tif state.lastRun.Add(f.maxFailResponseTime).After(now) {\n\t\t\t// This is a failure due to previous try.\n\t\t\tstate.lastRunFailed = true\n\t\t\tlog.Log.V(4).Infof(\"%s: Received failure withing %f seconds.\", key, f.maxFailResponseTime.Seconds())\n\t\t\tlog.Log.V(4).Infof(\"%s: Delaying: %t\", key, state.nextRun.After(now))\n\t\t\treturn state.nextRun.After(now), state.nextRun.Sub(now)\n\t\t} else {\n\t\t\t// This is a new failure. Reset the status.\n\t\t\tf.retryStates[key] = f.newState(now)\n\t\t\tlog.Log.V(4).Infof(\"%s: New failure detected. Resetting the state and do not delay.\", key)\n\t\t\treturn false, 0\n\t\t}\n\t}\n\n\t// If this function has been triggered too early we delay the processing of the remaining backoff amount of time.\n\tif !now.After(state.nextRun) {\n\t\tlog.Log.V(4).Infof(\"%s: Delaying vm processing for %f.\", key, state.nextRun.Sub(now).Seconds())\n\t\treturn true, state.nextRun.Sub(now)\n\t}\n\n\t// Backoff ended. Increase it and do not delay the processing.\n\tstate.waitInterval = state.waitInterval * 2\n\tif state.waitInterval > f.maxWait {\n\t\tstate.waitInterval = f.maxWait\n\t}\n\tstate.nextRun = now.Add(state.waitInterval)\n\tstate.lastRun = now\n\tstate.lastRunFailed = false\n\tlog.Log.V(4).Infof(\"%s: Backoff increased. New backoff time is %f\", key, state.waitInterval.Seconds())\n\treturn false, 0\n}", "title": "" }, { "docid": "e323b7a37779c33da9471449d13a3058", "score": "0.45218065", "text": "func (o *ExportEncryptionKeyForbidden) IsSuccess() bool {\n\treturn false\n}", "title": "" }, { "docid": "4a1b071bfcde341f854ce9c5ad155ebb", "score": "0.452055", "text": "func PodRequiresRestart(pod metav1.Object) bool {\n\tif pod == nil {\n\t\treturn false\n\t}\n\n\t// TODO(cbandy): This works only when using Kubernetes for DCS.\n\n\t// - https://github.com/zalando/patroni/blob/v2.1.1/patroni/ha.py#L198\n\t// - https://github.com/zalando/patroni/blob/v2.1.1/patroni/postgresql/config.py#L977\n\t// - https://github.com/zalando/patroni/blob/v2.1.1/patroni/postgresql/config.py#L1007\n\tstatus := pod.GetAnnotations()[\"status\"]\n\treturn strings.Contains(status, `\"pending_restart\":true`)\n}", "title": "" }, { "docid": "5326ea330cbf184834da0441c7c9fc29", "score": "0.4520139", "text": "func TestRotateKeyTargetCannotBeServerManaged(t *testing.T) {\n\tsetUp(t)\n\tk := &keyCommander{\n\t\tconfigGetter: func() (*viper.Viper, error) { return viper.New(), nil },\n\t\tgetRetriever: func() notary.PassRetriever { return passphrase.ConstantRetriever(\"pass\") },\n\t\trotateKeyRole: data.CanonicalTargetsRole.String(),\n\t\trotateKeyServerManaged: true,\n\t}\n\terr := k.keysRotate(&cobra.Command{}, []string{\"gun\", data.CanonicalTargetsRole.String()})\n\trequire.Error(t, err)\n\trequire.IsType(t, client.ErrInvalidRemoteRole{}, err)\n}", "title": "" }, { "docid": "9582c93bfce7a6a09208fc5ab8210271", "score": "0.4508786", "text": "func (m *managedInstancesRoleProvider) rotatePrivateKey(fingerprint string, exponentialBackoff *backoff.ExponentialBackOff) error {\n\tm.log.Infof(\"Attempting to rotate private key\")\n\n\toldPrivateKey := managedInstance.PrivateKey(m.log)\n\toldKeyType := managedInstance.PrivateKeyType(m.log)\n\toldPublicKey, err := managedInstance.GeneratePublicKey(oldPrivateKey)\n\tif err != nil {\n\t\tm.log.Warnf(\"Failed to generate old public key: %v\", err)\n\t\treturn err\n\t}\n\n\tnewPublicKey, newPrivateKey, newKeyType, err := managedInstance.GenerateKeyPair()\n\n\tif err != nil {\n\t\tm.log.Warnf(\"Failed to generate new key pair: %v\", err)\n\t\treturn err\n\t}\n\n\t// Update remote public key\n\terr = backoffRetry(func() error {\n\t\t_, innerErr := m.client.UpdateManagedInstancePublicKey(newPublicKey, newKeyType)\n\t\treturn innerErr\n\t}, exponentialBackoff)\n\n\tif err != nil {\n\t\tm.log.Warnf(\"Failed to update public key, trying to recover: %s\", err)\n\n\t\t// Updating public key failed, test if old public key is stored in SSM\n\t\terr = backoffRetry(func() error {\n\t\t\t_, innerErr := m.client.RequestManagedInstanceRoleToken(fingerprint)\n\t\t\treturn innerErr\n\t\t}, exponentialBackoff)\n\n\t\tif err == nil {\n\t\t\treturn fmt.Errorf(\"Failed to update remote public key, old key still works\")\n\t\t}\n\n\t\t// Test if new key works\n\t\tm.InitializeClient(newPrivateKey)\n\n\t\terr = backoffRetry(func() error {\n\t\t\t_, innerErr := m.client.RequestManagedInstanceRoleToken(fingerprint)\n\t\t\treturn innerErr\n\t\t}, exponentialBackoff)\n\n\t\tif err != nil {\n\t\t\tm.log.Warnf(\"Unable to verify neither new nor old key, rolling back private key change\")\n\t\t\tm.InitializeClient(managedInstance.PrivateKey(m.log))\n\t\t\treturn err\n\t\t}\n\n\t\tm.log.Infof(\"Successfully verified new key is upstream, updating local key\")\n\t}\n\n\t// New key has been updated remotely, update client to use new private key\n\tm.InitializeClient(newPrivateKey)\n\n\t// New key was successfully updated in service, trying to save new key to disk\n\terr = backoffRetry(func() error {\n\t\tinnerErr := managedInstance.UpdatePrivateKey(m.log, newPrivateKey, newKeyType)\n\t\treturn innerErr\n\t}, exponentialBackoff)\n\n\tif err != nil {\n\t\tm.log.Warn(\"Failed to save private key locally, attempting to update remote key back to old public key: \", err)\n\n\t\t// Attempt to update the remote public key to the old public key\n\t\terr = backoffRetry(func() error {\n\t\t\t_, innerErr := m.client.UpdateManagedInstancePublicKey(oldPublicKey, oldKeyType)\n\t\t\treturn innerErr\n\t\t}, exponentialBackoff)\n\n\t\tif err != nil {\n\t\t\tm.log.Error(\"Failed to roll-back remove public key change, instance most likely needs to be re-registed: %v\", err)\n\t\t\treturn fmt.Errorf(\"Failed to update remote public key after saving locally failed: %v\", err)\n\t\t}\n\n\t\tm.log.Warn(\"Successfully rolled back remote key, and recovered registration\")\n\t\tm.InitializeClient(oldPrivateKey)\n\t\treturn fmt.Errorf(\"Failed to save new private key to disk\")\n\t}\n\n\tm.log.Info(\"Successfully rotated private key\")\n\treturn nil\n}", "title": "" }, { "docid": "89f688bff5f4fd9b70aa591d80e54047", "score": "0.44951323", "text": "func (c Single) IsResignation() bool { return c == -2 }", "title": "" }, { "docid": "81b9480d0e6520737284f2ba903299d1", "score": "0.4491057", "text": "func (*Bgp_PeerGroup_AfiSafi_GracefulRestart) IsYANGGoStruct() {}", "title": "" }, { "docid": "81b9480d0e6520737284f2ba903299d1", "score": "0.44890437", "text": "func (*Bgp_PeerGroup_AfiSafi_GracefulRestart) IsYANGGoStruct() {}", "title": "" }, { "docid": "5cbdfcf4bce3ccec53401db2ef6a8778", "score": "0.4480501", "text": "func (m *Manager) ShouldMigrateParameters() bool {\n\t// Can't reference parameters.CNABSpecVersion because it causes a circular dependency\n\t// It will be resolved when parametersets move to cnab-go\n\treturn string(m.schema.Parameters) != ParameterSetCNABSpecVersion\n}", "title": "" }, { "docid": "a9e84ea0455e0fbfd2b5248f51a8e790", "score": "0.4471922", "text": "func (k PEMKey) IsEncrypted() bool {\n\tprocType := k.block.Headers[\"Proc-Type\"]\n\tif procType == \"\" {\n\t\treturn false\n\t}\n\t// First element is PEM RFC version.\n\tprocTypeSplit := strings.Split(procType, \",\")[1:]\n\n\tfor _, value := range procTypeSplit {\n\t\tif value == \"ENCRYPTED\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "39f222579e1baa5af79f5d9f7627f71b", "score": "0.446136", "text": "func (f *Fs) shouldRetry(ctx context.Context, resp *http.Response, err error) (bool, error) {\n\tif resp != nil && resp.StatusCode == 401 {\n\t\tfs.Debugf(f, \"Unauthorized: %v\", err)\n\t\t// Reauth\n\t\tauthErr := f.authorizeAccount(ctx)\n\t\tif authErr != nil {\n\t\t\terr = authErr\n\t\t}\n\t\treturn true, err\n\t}\n\treturn f.shouldRetryNoReauth(ctx, resp, err)\n}", "title": "" }, { "docid": "8e4effdc4ea2e13844eac0ab67722859", "score": "0.44603625", "text": "func (o *GetCertKeyBadRequest) IsSuccess() bool {\n\treturn false\n}", "title": "" }, { "docid": "a88d9c5f578b4e3e42cc15a229068ddd", "score": "0.4460254", "text": "func (e *Etcd) isRetryNeeded(err error, fn string, key string, retryCount int) bool {\n\tif isClientTimeout(err) || isServerCtxTimeout(err) ||\n\t\terr == rpctypes.ErrTimeout || err == rpctypes.ErrTimeoutDueToLeaderFail {\n\t\tlevel.Debug(e.logger).Log(\"msg\", \"retry execute\", \"action\", fn,\n\t\t\t\"err\", err, \"key\", key, \"count\", retryCount)\n\t\treturn true\n\t}\n\t// NOTE(kiennt): Check isUnavailable or isCanceled?\n\treturn false\n}", "title": "" }, { "docid": "1ba8dcb385b19d3b74af2682b743db16", "score": "0.44591573", "text": "func (b *Briefcase) ShouldRefreshVaultToken(ctx context.Context) bool {\n\n\texpiring := clock.Now(ctx).After(b.AuthTokenLease.NextRefresh)\n\n\tif expiring && !b.AuthTokenLease.Renewable {\n\t\t// now >= expiredAt\n\t\tif !clock.Now(ctx).Before(b.AuthTokenLease.ExpiresAt) {\n\t\t\tb.log.Error().Time(\"expiresAt\", b.AuthTokenLease.ExpiresAt).\n\t\t\t\tTime(\"nextRefresh\", b.AuthTokenLease.NextRefresh).\n\t\t\t\tMsg(\"token has expired and is not renewable - results are unpredictable\")\n\t\t} else {\n\t\t\tb.log.Error().Time(\"expiresAt\", b.AuthTokenLease.ExpiresAt).\n\t\t\t\tTime(\"nextRefresh\", b.AuthTokenLease.NextRefresh).\n\t\t\t\tMsg(\"token is expiring, but is set to be non-renewable - unpredictable results will occur once it expires.\")\n\t\t}\n\t\treturn false\n\t}\n\n\treturn expiring\n}", "title": "" }, { "docid": "7a53d6a070b8d83163f8ce77566fb17f", "score": "0.44535658", "text": "func (c *Controller) HandleRotateVerificationKeys() http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tctx := r.Context()\n\n\t\tlogger := logging.FromContext(ctx).Named(\"rotation.HandleVerificationRotate\")\n\t\tlogger.Debugw(\"starting\")\n\t\tdefer logger.Debugw(\"finishing\")\n\n\t\tctx = logging.WithLogger(ctx, logger)\n\n\t\tok, err := c.db.TryLock(ctx, verificationRotationLock, c.config.MinTTL)\n\t\tif err != nil {\n\t\t\tlogger.Errorw(\"failed to acquire lock\", \"error\", err)\n\t\t\tc.h.RenderJSON(w, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\t\tif !ok {\n\t\t\tlogger.Debugw(\"skipping (too early)\")\n\t\t\tc.h.RenderJSON(w, http.StatusOK, fmt.Errorf(\"too early\"))\n\t\t\treturn\n\t\t}\n\n\t\t// If there are any errors, return them\n\t\tif err := c.RotateVerificationKeys(ctx); err != nil {\n\t\t\tlogger.Errorw(\"failed to rotate verification keys\", \"error\", err)\n\t\t\tc.h.RenderJSON(w, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\n\t\tstats.Record(ctx, mVerificationSuccess.M(1))\n\t\tc.h.RenderJSON(w, http.StatusOK, nil)\n\t})\n}", "title": "" }, { "docid": "141541c9a5ebd8b7a04b628fefccf047", "score": "0.44477537", "text": "func (p *MigrationOptions) MustEncrypted() InheritableBoolean {\n\tif p.encrypted == nil {\n\t\tpanic(\"the encrypted must not be nil, please use Encrypted() function instead\")\n\t}\n\treturn *p.encrypted\n}", "title": "" }, { "docid": "faf995d857f0b09dd129bb8e9d5090a7", "score": "0.44462627", "text": "func (s *DockerRunStep) ShouldSyncEnv() bool {\n\t// If disable-sync is set, only sync if it is not true\n\tif disableSync, ok := s.data[\"disable-sync\"]; ok {\n\t\treturn disableSync != \"true\"\n\t}\n\treturn true\n}", "title": "" }, { "docid": "c34dbc59f39531bb81929f3730c6a165", "score": "0.44431362", "text": "func (c *Client) GetKeyRotationStatus(ctx context.Context, params *GetKeyRotationStatusInput, optFns ...func(*Options)) (*GetKeyRotationStatusOutput, error) {\n\tif params == nil {\n\t\tparams = &GetKeyRotationStatusInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"GetKeyRotationStatus\", params, optFns, c.addOperationGetKeyRotationStatusMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*GetKeyRotationStatusOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "title": "" }, { "docid": "6c0559f744c77b0309664a4b2048abee", "score": "0.4440444", "text": "func TestRotateKeyRemoteServerManagesKey(t *testing.T) {\n\tfor _, role := range []string{data.CanonicalSnapshotRole.String(), data.CanonicalTimestampRole.String()} {\n\t\tsetUp(t)\n\t\t// Temporary directory where test files will be created\n\t\ttempBaseDir, err := ioutil.TempDir(\"\", \"notary-test-\")\n\t\tdefer os.RemoveAll(tempBaseDir)\n\t\trequire.NoError(t, err, \"failed to create a temporary directory: %s\", err)\n\t\tvar gun data.GUN = \"docker.com/notary\"\n\n\t\tret := passphrase.ConstantRetriever(\"pass\")\n\n\t\tts, initialKeys := setUpRepo(t, tempBaseDir, gun, ret)\n\t\tdefer ts.Close()\n\t\trequire.Len(t, initialKeys, 3)\n\n\t\tk := &keyCommander{\n\t\t\tconfigGetter: func() (*viper.Viper, error) {\n\t\t\t\tv := viper.New()\n\t\t\t\tv.SetDefault(\"trust_dir\", tempBaseDir)\n\t\t\t\tv.SetDefault(\"remote_server.url\", ts.URL)\n\t\t\t\treturn v, nil\n\t\t\t},\n\t\t\tgetRetriever: func() notary.PassRetriever { return ret },\n\t\t\trotateKeyServerManaged: true,\n\t\t}\n\t\trequire.NoError(t, k.keysRotate(&cobra.Command{}, []string{gun.String(), role, \"-r\"}))\n\n\t\trepo, err := client.NewFileCachedNotaryRepository(tempBaseDir, data.GUN(gun), ts.URL, http.DefaultTransport, ret, trustpinning.TrustPinConfig{})\n\t\trequire.NoError(t, err, \"error creating repo: %s\", err)\n\n\t\tcl, err := repo.GetChangelist()\n\t\trequire.NoError(t, err, \"unable to get changelist: %v\", err)\n\t\trequire.Len(t, cl.List(), 0, \"expected the changes to have been published\")\n\n\t\tfinalKeys := repo.CryptoService.ListAllKeys()\n\t\t// no keys have been created, since a remote key was specified\n\t\tif role == data.CanonicalSnapshotRole.String() {\n\t\t\trequire.Len(t, finalKeys, 2)\n\t\t\tfor k, r := range initialKeys {\n\t\t\t\tif r != data.CanonicalSnapshotRole {\n\t\t\t\t\t_, ok := finalKeys[k]\n\t\t\t\t\trequire.True(t, ok)\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\trequire.Len(t, finalKeys, 3)\n\t\t\tfor k := range initialKeys {\n\t\t\t\t_, ok := finalKeys[k]\n\t\t\t\trequire.True(t, ok)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1ef5ec6958a365f1702138ccbc4800ef", "score": "0.44385332", "text": "func (o *ExportEncryptionKeyOK) IsSuccess() bool {\n\treturn true\n}", "title": "" }, { "docid": "b8ce6b627c95acee2e8d617e77753d82", "score": "0.44338793", "text": "func (r *retryPolicy) shouldRetry(ctx context.Context, err error) bool {\n\tif err == nil {\n\t\treturn false\n\t}\n\tif aerr, ok := err.(awserr.Error); ok {\n\t\tswitch aerr.Code() {\n\t\tcase s3.ErrCodeNoSuchBucket, s3.ErrCodeNoSuchKey:\n\t\t\t// No point in trying again.\n\t\t\tr.clients = nil\n\t\t\treturn false\n\t\tcase \"NotFound\":\n\t\t\t// GetObject seems to return this error rather ErrCodeNoSuchKey\n\t\t\tr.clients = nil\n\t\t\treturn false\n\t\tcase awsrequest.ErrCodeSerialization, awsrequest.ErrCodeRead, \"SlowDown\":\n\t\t\t// Transient errors. Retry with the same client.\n\t\t\tif retry.Wait(ctx, r.policy, r.retries) != nil {\n\t\t\t\t// Context timeout or cancellation\n\t\t\t\tr.clients = nil\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tr.retries++\n\t\t\treturn true\n\t\tdefault:\n\t\t\t// Possible cases:\n\t\t\t//\n\t\t\t//- permission errors: we retry using a different client.\n\t\t\t//\n\t\t\t//- non-retriable errors: we retry using a different client, and it will\n\t\t\t// fail again, and we eventually give up. The code it at least correct, if\n\t\t\t// suboptimal.\n\t\t\t//\n\t\t\t// - transient errors we don't yet know. We'll abort when we shouldn't,\n\t\t\t// but there's not much we can do. We'll add these errors to the above\n\t\t\t// case as we discover them.\n\t\t}\n\t}\n\tif len(r.clients) <= 1 {\n\t\t// No more alternate clients to try\n\t\tr.clients = nil\n\t\treturn false\n\t}\n\tr.clients = r.clients[1:]\n\treturn true\n}", "title": "" }, { "docid": "2fee92b3d7fc0229d5a60615a26b6634", "score": "0.44247225", "text": "func (k KeyCode) IsModifier() bool {\n\treturn (k >= KeyCodeLeftControl) && (k < KeyCodeCompose)\n}", "title": "" }, { "docid": "567ae80415691d30939d9deacd85d9b4", "score": "0.441768", "text": "func (c *ChatRPC) ShouldRetryOnConnect(err error) bool {\n\t_, inputCanceled := err.(libkb.InputCanceledError)\n\treturn !inputCanceled\n}", "title": "" }, { "docid": "a958de2f2fa77f6f1797417444e748d5", "score": "0.44168222", "text": "func (e RetryPolicyValidationError) Key() bool { return e.key }", "title": "" }, { "docid": "968fa1cc4bca6dfb747668d0349014a4", "score": "0.44117233", "text": "func nextRotation(s *v1.ServiceAccount) (time.Time, bool) {\n\tif s.Metadata == nil || len(s.Metadata.Annotations) == 0 {\n\t\treturn time.Time{}, false\n\t}\n\tnextRotation := s.Metadata.Annotations[annotationNextRotation]\n\tif nextRotation == \"\" {\n\t\treturn time.Time{}, false\n\t}\n\texpiresAt, err := time.Parse(timeFormat, nextRotation)\n\tif err != nil {\n\t\t// ignore any parsing errors.\n\t\treturn time.Time{}, false\n\t}\n\treturn expiresAt, true\n}", "title": "" }, { "docid": "86a45fe4cb47fdfaf74f282ba0f7e570", "score": "0.44115472", "text": "func testKeyRotation(t *testing.T, dbStore keyRotator, newValidAlias string) (data.PrivateKey, data.PrivateKey) {\n\ttestKeys := make([]data.PrivateKey, 2)\n\tfor i := 0; i < len(testKeys); i++ {\n\t\ttestKey, err := utils.GenerateECDSAKey(rand.Reader)\n\t\trequire.NoError(t, err)\n\t\ttestKeys[i] = testKey\n\n\t\t// Add them to the DB\n\t\terr = dbStore.AddKey(data.CanonicalTimestampRole, \"gun\", testKey)\n\t\trequire.NoError(t, err)\n\t}\n\n\t// Try rotating the key to a valid alias\n\terr := dbStore.RotateKeyPassphrase(testKeys[0].ID(), newValidAlias)\n\trequire.NoError(t, err)\n\n\t// Try rotating the key to an invalid alias\n\terr = dbStore.RotateKeyPassphrase(testKeys[0].ID(), \"invalidAlias\")\n\trequire.Error(t, err, \"there should be no password for invalidAlias so rotation should fail\")\n\n\treturn testKeys[0], testKeys[1]\n}", "title": "" }, { "docid": "3228a672f469205b07973c770bcce75a", "score": "0.44103816", "text": "func (o LifecyclePolicyPolicyDetailsActionCrossRegionCopyEncryptionConfigurationOutput) Encrypted() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v LifecyclePolicyPolicyDetailsActionCrossRegionCopyEncryptionConfiguration) *bool {\n\t\treturn v.Encrypted\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "c7cc08f1bd0fd54ab7a3227d1c68ab7f", "score": "0.44060138", "text": "func (*NetworkInstance_Protocol_Bgp_PeerGroup_AfiSafi_GracefulRestart) IsYANGGoStruct() {}", "title": "" }, { "docid": "c7cc08f1bd0fd54ab7a3227d1c68ab7f", "score": "0.44046968", "text": "func (*NetworkInstance_Protocol_Bgp_PeerGroup_AfiSafi_GracefulRestart) IsYANGGoStruct() {}", "title": "" }, { "docid": "a121b99510fd32975344c97e4c9948be", "score": "0.43994936", "text": "func (o *ExportEncryptionKeyInternalServerError) IsSuccess() bool {\n\treturn false\n}", "title": "" } ]
fd35de576e6280cbb81cc259a5599eca
Validate and read the incoming webhook
[ { "docid": "8c54cb8ec9a4d4ff0aab8fa099762e14", "score": "0.55559796", "text": "func (c *Client) ReadParcelWebhook(payload []byte, signature string) (*sendcloud.Parcel, error) {\n\thash := hmac.New(sha256.New, []byte(c.apiSecret))\n\thash.Write(payload)\n\n\texpectedSignature := hex.EncodeToString(hash.Sum(nil))\n\tif signature != expectedSignature {\n\t\treturn nil, errors.New(\"invalid signature\")\n\t}\n\n\tparcelResponse := sendcloud.ParcelResponseContainer{}\n\terr := json.Unmarshal(payload, &parcelResponse)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn parcelResponse.GetResponse().(*sendcloud.Parcel), nil\n}", "title": "" } ]
[ { "docid": "5d5a314e65c0cc46584091e7c617b83a", "score": "0.6878892", "text": "func (bot *facebookBot) handleValidateWebhook(w http.ResponseWriter, r *http.Request) {\n\tlog.Debug(\"New Facebook webhook validation request\")\n\n\tqueryParams := r.URL.Query()\n\n\thubMode, err := utils.GetSingleQueryParam(queryParams, \"hub.mode\")\n\n\tif err != nil {\n\t\tlog.WithField(\"param\", \"hub.mode\").Infof(\"Could not fetch param: %s\", err)\n\t\treturn\n\t}\n\n\tif hubMode != \"subscribe\" {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"expected\": \"subscribe\",\n\t\t\t\"mode\": hubMode,\n\t\t}).Info(\"Invalid hub mode\")\n\t\treturn\n\t}\n\n\tverifyToken, err := utils.GetSingleQueryParam(queryParams, \"hub.verify_token\")\n\n\tif err != nil {\n\t\tlog.WithField(\"param\", \"hub.verify_token\").Infof(\"Could not fetch param: %s\", err)\n\t\treturn\n\t}\n\n\tif verifyToken != bot.definition.Parameters[VerifyToken] {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"expected\": bot.definition.Parameters[VerifyToken],\n\t\t\t\"token\": verifyToken,\n\t\t}).Info(\"Invalid verify token\")\n\t\treturn\n\t}\n\n\tchallenge, err := utils.GetSingleQueryParam(queryParams, \"hub.challenge\")\n\n\tif err != nil {\n\t\tlog.WithField(\"param\", \"hub.challenge\").Infof(\"Could not fetch param: %s\", err)\n\t\treturn\n\t}\n\n\t// Validate the webhook by writing back the \"hub.challenge\" query param\n\tw.Write([]byte(challenge))\n}", "title": "" }, { "docid": "acf58d5aaae888a8f8b687e03e72e11e", "score": "0.6565714", "text": "func procGetWebHook(url string, w http.ResponseWriter) utils.CustError {\n\tlog.Println(logInfo + \"--------------- Got GetWebhook Request ---------------\")\n\thttp.Header.Add(w.Header(), \"content-type\", \"application/json\")\n\twebhook := types.WebhookInfo{}\n\n\tlog.Println(logInfo + \"Splitting incomming URL\")\n\t// Split url into usable components\n\tsplitURL, err := utils.GetSplitURL(url, 3)\n\tif err.Status != 0 {\n\t\treturn err\n\t}\n\n\tlog.Println(logInfo + \"Validating GetWebhook request\")\n\t// Validate user input just in case of attack\n\tmatch, errMatch := regexp.MatchString(\"[a-f0-9]{24}\", splitURL[2])\n\tif errMatch != nil {\n\t\t// Somehting went wrong! Inform the user!\n\t\tlog.Println(logWarn + \"Validating failed! Informing user! Couldn't validate id!\")\n\t\treturn utils.CustError{http.StatusNotAcceptable, utils.ErrorStr[3] + \": Something went wrong!\"}\n\t} else if !match { // Doesn' work for some reason: bson.IsObjectIdHex(bson.NewObjectId().Hex()) {\n\t\t// Somehting went wrong! Inform the user!\n\t\tlog.Println(logWarn + \"Validating failed! Informing user! Id not acceptable: \" + splitURL[2])\n\t\treturn utils.CustError{http.StatusNotAcceptable, utils.ErrorStr[3] + \": Given webhook id is invalid!\"}\n\t}\n\n\tlog.Println(logInfo + \"Trying to get requested webhook\")\n\t// Retrieve webhook from database\n\terr = DB.GetWebhook(splitURL[2], &webhook)\n\tif err.Status != 0 {\n\t\treturn err\n\t}\n\n\t// Convert WebhookInfo over to WebhookDisp format\n\tdisplay := types.WebhookDisp{\n\t\twebhook.URL,\n\t\twebhook.BaseCurrency,\n\t\twebhook.TargetCurrency,\n\t\twebhook.MinValue,\n\t\twebhook.MaxValue,\n\t}\n\n\tlog.Println(logInfo + \"Encoding webhook to browser\")\n\t// Dump the fetched webhook to browser\n\terrEncode := json.NewEncoder(w).Encode(&display)\n\tif errEncode != nil {\n\t\t// Somehting went wrong! Inform the user!\n\t\treturn utils.CustError{http.StatusInternalServerError, \"Encoding failed!\"}\n\t}\n\n\tlog.Println(logInfo + \"GetWebhook request finnished successfully\")\n\t// Nothing bad happened\n\treturn utils.CustError{0, utils.ErrorStr[0]}\n}", "title": "" }, { "docid": "a3b9ada151cf57fbb6d2d62dace5f0dc", "score": "0.64591074", "text": "func webhookHandler(res http.ResponseWriter, req *http.Request) {\n // First, decode the JSON response body\n body := &webhookReqBody{}\n if err := json.NewDecoder(req.Body).Decode(body); err != nil {\n logger.Error(\"Parse webhook request\", \"error\", err)\n return\n }\n\n var text = strings.ToLower(body.Message.Text)\n if strings.Contains(text, \"/priceprinttag\") {\n parts := strings.Split(body.Message.Text, \" \")\n if len(parts) < 2 {\n sendReply(body.Message.Chat.ID, \"Error fetching card price!\")\n } else {\n printTag := parts[1]\n response, err := fetchCardPriceByPrintTag(printTag)\n if err != nil || response == nil {\n sendReply(body.Message.Chat.ID, \"Error fetching card price!\")\n } else {\n reply := convertYgoPricesPriceForPrintTagResponseToReply(response)\n sendReply(body.Message.Chat.ID, reply)\n }\n }\n } else {\n sendReply(body.Message.Chat.ID, \"Invalid command!\")\n }\n\n // log a confirmation message if the message is sent successfully\n logger.Info(\"reply sent\", body.Message.Chat.ID)\n}", "title": "" }, { "docid": "644ffea61ea129eb9bea783eab17b478", "score": "0.63975537", "text": "func webhookHandler(w http.ResponseWriter, r *http.Request) {\n\ttk.readYml()\n\ttoken := tk.VerifyToken\n\ttokenTrue := r.URL.Query().Get(\"hub.verify_token\")\n\thubChallenge := r.URL.Query().Get(\"hub.challenge\")\n\n\tlog.Printf(base64.StdEncoding.EncodeToString([]byte(token)))\n\n\tif tokenTrue == token {\n\t\tlog.Printf(\"Tokens matched!\")\n\t\tw.Header().Set(\"Content-Type\", \"text/plain\")\n\t\tw.WriteHeader(http.StatusOK)\n\t\tfmt.Fprintf(w, hubChallenge)\n\t} else {\n\t\tlog.Printf(\"Token didnt match!\")\n\t\tfmt.Fprintf(w, \"Tokens don't match!\")\n\t}\n}", "title": "" }, { "docid": "73bb2e48351d4cc45ab59cf5c50ff522", "score": "0.6281038", "text": "func Web_hooks_get () {\n\n // GET /webhooks.json\n\n }", "title": "" }, { "docid": "bad8d27be71dbb6795ed6fc195c14424", "score": "0.62784964", "text": "func (wh *Webhook) Validate() error {\n\tif wh.ID.Hex() == \"\" || wh.WebhookURL == \"\" || wh.BaseCurrency == \"\" || wh.TargetCurrency == \"\" ||\n\t\twh.MinTriggerValue < 0 || wh.MaxTriggerValue < 0 {\n\t\treturn errors.New(\"missing input\")\n\t}\n\n\tif wh.MinTriggerValue > wh.MaxTriggerValue {\n\t\treturn errors.New(\"min higher than max\")\n\t}\n\n\tu, err := url.Parse(wh.WebhookURL)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif u.Scheme != \"http\" && u.Scheme != \"https\" {\n\t\treturn errors.New(\"only HTTPS or HTTP urls supported\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "fa82a29efcc256c4327f14ba3d9cc535", "score": "0.622993", "text": "func (hook Webhook) ParsePayload(w http.ResponseWriter, r *http.Request) {\n\twebhooks.DefaultLog.Info(\"Parsing Payload...\")\n\n\tevent := r.Header.Get(\"X-Gitlab-Event\")\n\tif len(event) == 0 {\n\t\twebhooks.DefaultLog.Error(\"Missing X-Gitlab-Event Header\")\n\t\thttp.Error(w, \"400 Bad Request - Missing X-Gitlab-Event Header\", http.StatusBadRequest)\n\t\treturn\n\t}\n\twebhooks.DefaultLog.Debug(fmt.Sprintf(\"X-Gitlab-Event:%s\", event))\n\n\tgitLabEvent := Event(event)\n\n\tfn, ok := hook.eventFuncs[gitLabEvent]\n\t// if no event registered\n\tif !ok {\n\t\twebhooks.DefaultLog.Info(fmt.Sprintf(\"Webhook Event %s not registered, it is recommended to setup only events in gitlab that will be registered in the webhook to avoid unnecessary traffic and reduce potential attack vectors.\", event))\n\t\treturn\n\t}\n\n\tpayload, err := ioutil.ReadAll(r.Body)\n\tif err != nil || len(payload) == 0 {\n\t\twebhooks.DefaultLog.Error(\"Issue reading Payload\")\n\t\thttp.Error(w, \"Error reading Payload\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\twebhooks.DefaultLog.Debug(fmt.Sprintf(\"Payload:%s\", string(payload)))\n\n\t// If we have a Secret set, we should check the MAC\n\tif len(hook.secret) > 0 {\n\t\twebhooks.DefaultLog.Info(\"Checking secret\")\n\t\tsignature := r.Header.Get(\"X-Gitlab-Token\")\n\t\tif signature != hook.secret {\n\t\t\twebhooks.DefaultLog.Error(fmt.Sprintf(\"Invalid X-Gitlab-Token of '%s'\", signature))\n\t\t\thttp.Error(w, \"403 Forbidden - Token missmatch\", http.StatusForbidden)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// Make headers available to ProcessPayloadFunc as a webhooks type\n\thd := webhooks.Header(r.Header)\n\n\tswitch gitLabEvent {\n\tcase PushEvents:\n\t\tvar pe PushEventPayload\n\t\tjson.Unmarshal([]byte(payload), &pe)\n\t\thook.runProcessPayloadFunc(fn, pe, hd)\n\n\tcase TagEvents:\n\t\tvar te TagEventPayload\n\t\tjson.Unmarshal([]byte(payload), &te)\n\t\thook.runProcessPayloadFunc(fn, te, hd)\n\n\tcase ConfidentialIssuesEvents:\n\t\tvar cie ConfidentialIssueEventPayload\n\t\tjson.Unmarshal([]byte(payload), &cie)\n\t\thook.runProcessPayloadFunc(fn, cie, hd)\n\n\tcase IssuesEvents:\n\t\tvar ie IssueEventPayload\n\t\tjson.Unmarshal([]byte(payload), &ie)\n\t\thook.runProcessPayloadFunc(fn, ie, hd)\n\n\tcase CommentEvents:\n\t\tvar ce CommentEventPayload\n\t\tjson.Unmarshal([]byte(payload), &ce)\n\t\thook.runProcessPayloadFunc(fn, ce, hd)\n\n\tcase MergeRequestEvents:\n\t\tvar mre MergeRequestEventPayload\n\t\tjson.Unmarshal([]byte(payload), &mre)\n\t\thook.runProcessPayloadFunc(fn, mre, hd)\n\n\tcase WikiPageEvents:\n\t\tvar wpe WikiPageEventPayload\n\t\tjson.Unmarshal([]byte(payload), &wpe)\n\t\thook.runProcessPayloadFunc(fn, wpe, hd)\n\n\tcase PipelineEvents:\n\t\tvar pe PipelineEventPayload\n\t\tjson.Unmarshal([]byte(payload), &pe)\n\t\thook.runProcessPayloadFunc(fn, pe, hd)\n\n\tcase BuildEvents:\n\t\tvar be BuildEventPayload\n\t\tjson.Unmarshal([]byte(payload), &be)\n\t\thook.runProcessPayloadFunc(fn, be, hd)\n\t}\n}", "title": "" }, { "docid": "9d9a4de271da04177e92d54c538e3e95", "score": "0.61761147", "text": "func Web_hooks_get () {\n\n // GET /webhooks/events.json\n\n }", "title": "" }, { "docid": "2d7a29fda09bfddff77ced89109301fe", "score": "0.61507946", "text": "func HandleWebhook(res http.ResponseWriter, req *http.Request) {\n\tvar Payload Payload\n\tdefer req.Body.Close()\n\n\tp, err := github.ValidatePayload(req, []byte(Secret))\n\tif err != nil {\n\t\thttp.Error(res, \"bad request: \"+err.Error(), 400)\n\t\tlog.Printf(\"bad request: %v\", err.Error())\n\t\treturn\n\t}\n\n\terr = json.Unmarshal(p, &Payload)\n\tif err != nil {\n\t\thttp.Error(res, \"bad request: \"+err.Error(), 400)\n\t\tlog.Printf(\"bad request: %v\", err.Error())\n\t\treturn\n\t}\n\n\terr = createNewIssue(&Payload)\n\tif err != nil {\n\t\tlog.Printf(\"bad request: %v\", err.Error())\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "0436d5d328f3c1be9b471d2aab02846c", "score": "0.6107043", "text": "func Web_hooks_create () {\n\n // POST /webhooks.json\n\n }", "title": "" }, { "docid": "830d2bb1617fff1344895832ffa87492", "score": "0.60766053", "text": "func URLValidatingHandler(w http.ResponseWriter, r *http.Request) {\n\n\t// Simply print body\n\tcontent, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tfmt.Println(\"Error when reading body: \" + err.Error())\n\t\thttp.Error(w, \"Error when reading body: \" + err.Error(), http.StatusBadRequest)\n\t}\n\n\tfmt.Println(\"Received invocation with method \" + r.Method + \" and body: \" + string(content))\n\n\t// Extract hash from URL\n\tsplit := strings.Split(r.URL.Path, \"/\")\n\n\tif len(split) != 3 {\n\t\tfmt.Println(\"Wrong number of tokens in \" + r.URL.Path)\n\t\thttp.Error(w, \"Invalid invocation\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// Convert string to []byte\n\treceived, err := hex.DecodeString(split[2])\n\tif err != nil {\n\t\thttp.Error(w, \"Error during HMAC decoding: \" + err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Compare HMAC with received request\n\tif hmac.Equal(received, urlMac.Sum(nil)) {\n\t\tfmt.Println(\"Valid invocation on \" + r.URL.Path)\n\t\t_, err = fmt.Fprint(w, \"Successfully invoked dummy web service.\")\n\t\tif err != nil {\n\t\t\tfmt.Println(\"Something went wrong when sending response: \" + err.Error())\n\t\t}\n\t} else { // Error - invalid HMAC\n\t\tfmt.Println(\"Call to non-existent webhook on \" + r.URL.Path)\n\t\thttp.Error(w, \"Invalid invocation\", http.StatusBadRequest)\n\t}\n}", "title": "" }, { "docid": "d564a45e80533683bc2c0a2229d422de", "score": "0.60272473", "text": "func (hook *Webhook) Valid() error {\n\tif hook.URL == nil {\n\t\treturn errors.New(\"invalid webhook: empty url\")\n\t}\n\n\t_, err := strkey.Decode(\n\t\tstrkey.VersionByteAccountID,\n\t\tstring(hook.DestinationFilter),\n\t)\n\tif err != nil {\n\t\treturn errors.New(\"invalid webhook: bad destination filter\")\n\t}\n\n\tif hook.MemoFilter == nil {\n\t\treturn nil\n\t}\n\n\treturn hook.MemoFilter.Valid()\n}", "title": "" }, { "docid": "3eabb3a620b8591985d79af2ce6d9801", "score": "0.5977893", "text": "func handleWebhook(c *gin.Context) {\n var err error\n\n wr := dialogflowpb.WebhookRequest{}\n var unmar jsonpb.Unmarshaler // https://github.com/google/go-genproto/issues/74\n unmar.AllowUnknownFields = true\n if err = unmar.Unmarshal(c.Request.Body, &wr); err != nil {\n log.Println(err.Error())\n c.Status(http.StatusBadRequest)\n return\n }\n log.Println(wr.GetQueryResult().GetQueryText())\n // log.Println(wr)\n \n fullfillment := dialogflowpb.WebhookResponse{\n FulfillmentText: \"How the fuck should I know?!\",\n Payload: struct{\n Platform: 8,\n RichMessage: {\n \"expectUserResponse\": true,\n \"richResponse\": {\n \"items\": [\n {\n \"simpleResponse\": {\n \"textToSpeech\": \"this is a simple response\"\n }\n }\n ]\n }\n }\n }\n }", "title": "" }, { "docid": "eb5f88cdc3b9401bd78f0039082838e3", "score": "0.59618396", "text": "func parseTelegramWebhookRequest(r *http.Request) (*Update, error) {\n\n\tvar update Update\n\tif err := json.NewDecoder(r.Body).Decode(&update); err != nil {\n\t\tlog.Printf(\"Could not decode incoming update %s\", err.Error())\n\t\treturn nil, err\n\t}\n\n\treturn &update, nil\n}", "title": "" }, { "docid": "487f61ec59bb828c65e7205fc197123d", "score": "0.5957318", "text": "func WebhookValidation(validate bool) gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tc.Set(\"webhookvalidation\", validate)\n\t\tc.Next()\n\t}\n}", "title": "" }, { "docid": "16a3b3a211034adefe4d374135cbdea2", "score": "0.5920071", "text": "func (whsvr *WebhookServer) serve(w http.ResponseWriter, r *http.Request) {\n\t// Read request body\n\tvar body []byte\n\n\tif r.Body != nil {\n\t\tvar data []byte\n\t\tdata, err := ioutil.ReadAll(r.Body)\n\t\tif err != nil {\n\t\t\tglog.Error(\"Failed to read request body\")\n\t\t\thttp.Error(w, \"Failed to read request body\", http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t\tbody = data\n\t}\n\n\t// If request body is empty, return error\n\tif len(body) == 0 {\n\t\tglog.Error(\"Received request with empty body\")\n\t\thttp.Error(w, \"Request body empty\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// Verify the content type is correct\n\tif contentType := r.Header.Get(\"Content-Type\"); contentType != \"application/json\" {\n\t\tglog.Errorf(\"Invalid content type: %s. Expected `application/json`\", contentType)\n\t\thttp.Error(w, \"Invalid content type. Expected `application/json`\", http.StatusUnsupportedMediaType)\n\t\treturn\n\t}\n\n\t// Store response data\n\tadmissionReview := v1beta1.AdmissionReview{\n\t\tResponse: &v1beta1.AdmissionResponse{\n\t\t\tResult: &metav1.Status{},\n\t\t\tAllowed: false,\n\t\t},\n\t}\n\n\t// Store deserialized request\n\tar := v1beta1.AdmissionReview{}\n\n\t// Try to deserialize request\n\tif _, _, err := deserializer.Decode(body, nil, &ar); err != nil {\n\t\tglog.Errorf(\"Can't decode request body: %v\", err)\n\t\tadmissionReview.Response.Result.Message = err.Error()\n\t} else {\n\t\tadmissionReview.Response.UID = ar.Request.UID\n\t\t// If deserialisation succeeded, validate the request\n\t\twhsvr.validate(&ar, admissionReview.Response)\n\t}\n\n\t// Encode response\n\tresp, err := json.Marshal(admissionReview)\n\tif err != nil {\n\t\tglog.Errorf(\"Can't encode response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"Could not encode response: %v\", err), http.StatusInternalServerError)\n\t}\n\n\t// And send it\n\tif _, err := w.Write(resp); err != nil {\n\t\tglog.Errorf(\"Can't write response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"Could not write response: %v\", err), http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "b470bf5528c155ce988d22d22708d648", "score": "0.5917632", "text": "func (w Webhook) Validate() error {\n\treturn validation.ValidateStruct(&w,\n\t\tvalidation.Field(&w.Name, validation.Required, validation.Length(3, 255)),\n\t\tvalidation.Field(&w.URL, validation.Required, is.URL),\n\t\tvalidation.Field(&w.ContentType, validation.Required),\n\t\tvalidation.Field(&w.ValidStatusCodes, validation.Required),\n\t\tvalidation.Field(&w.MaxDeliveryAttempts, validation.Required, validation.Min(1)),\n\t\tvalidation.Field(&w.DeliveryAttemptTimeout, validation.Required, validation.Min(1)),\n\t\tvalidation.Field(&w.RetryMinBackoff, validation.Required, validation.Min(1)),\n\t\tvalidation.Field(&w.RetryMaxBackoff, validation.Required, validation.Min(1)),\n\t)\n}", "title": "" }, { "docid": "fe3f254851c79633ead412fa4a768ab7", "score": "0.58377296", "text": "func (m CreateWebhookRequest) Validate() error {\n\n\treturn validation.ValidateStruct(&m,\n\t\tvalidation.Field(&m.CityId, validation.Required),\n\t\tvalidation.Field(&m.CallbackUrl, validation.Required),\n\t)\n}", "title": "" }, { "docid": "9959a5108921e875e9c08fa3bfd8699d", "score": "0.5823458", "text": "func amWebHook(writer http.ResponseWriter, r *http.Request) {\n\tvar body []byte\n\tvar err error\n\tvar n int\n\n\t// Log the request\n\tw := NewStatusResponseWriter(writer)\n\tdefer logRequest(w, r)\n\n\t// Filter requests for POST\n\tif r.Method != \"POST\" {\n\t\thttp.Error(w, \"Bad request method.\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tbuf := make([]byte, JsonBody)\n\tfor err == nil {\n\t\tn, err = r.Body.Read(buf)\n\t\tif err != nil && err != io.EOF {\n\t\t\tlog.Printf(\"Error reading from client: %s\", err.Error())\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tif n > 0 {\n\t\t\tbody = append(body, buf[:n]...)\n\t\t}\n\t}\n\n\tif verbose {\n\t\tlog.Printf(\"Request Body: \\\"%s\\\"\", string(body))\n\t}\n\n\tevent, err := unmarshalBody(body)\n\tif err != nil {\n\t\tlog.Printf(\"Error parsing request JSON: %s\", err.Error())\n\t\thttp.Error(w, \"Error parsing JSON: \"+err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\toutput, err := handleEvent(event)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t} else {\n\t\tw.WriteHeader(http.StatusOK)\n\t}\n\tif output.Len() > 0 {\n\t\tblob := output.Bytes()\n\t\tw.Write(blob)\n\t\tif verbose {\n\t\t\tlog.Printf(\"Response body: %s\", string(blob))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "00aae10a3bc0ff74e98905b463a617be", "score": "0.58148587", "text": "func WebhookVerify(key string) gin.HandlerFunc {\n\treturn func(ctx *gin.Context) {\n\t\tok := http_shopify_webhook.WebhookVerifyRequest(key, ctx.Writer, ctx.Request)\n\t\tif !ok {\n\t\t\tctx.AbortWithStatus(http.StatusBadRequest)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "30adf0d081f8812098fc288467e8bc2d", "score": "0.5753784", "text": "func HandleTelegramWebHook(w http.ResponseWriter, r *http.Request) {\n\n\t// Parse incoming request\n\tvar update, err = parseTelegramRequest(r)\n\tlog.Println(\"Incoming Message : \", update)\n\tif err != nil {\n\t\tlog.Printf(\"error parsing update, %s\", err.Error())\n\t\treturn\n\t}\n\n\t// Sanitize input\n\tvar sanitizedSeed = sanitize(update.Message.Text)\n\n\treplyMessage := sanitizedSeed\n\n\t// Send the punchline back to Telegram\n\tvar telegramResponseBody, errTelegram = sendTextToTelegramChat(update.Message.Chat.Id, replyMessage)\n\n\tif errTelegram != nil {\n\t\tlog.Printf(\"got error %s from telegram, reponse body is %s\", errTelegram.Error(), telegramResponseBody)\n\t} else {\n\t\tlog.Printf(\"punchline %s successfuly distributed to chat id %d\", replyMessage, update.Message.Chat.Id)\n\t}\n}", "title": "" }, { "docid": "545f0c4c608b222ac8d7a3617a0f2b58", "score": "0.5749537", "text": "func (wj *WebhookJob) Validate(params job.Parameters) error {\n\treturn nil\n}", "title": "" }, { "docid": "df3d9523769f7a9376d9bc279e0ec3a6", "score": "0.5744837", "text": "func verifyWebHook(r *http.Request, slackSigningSecret string) (bool, error) {\n\ttimeStamp := r.Header.Get(slackRequestTimestampHeader)\n\tslackSignature := r.Header.Get(slackSignatureHeader)\n\n\tif timeStamp == \"\" || slackSignature == \"\" {\n\t\treturn false, fmt.Errorf(\"either timeStamp or signature headers were blank\")\n\t}\n\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"ioutil.ReadAll(%v): %v\", r.Body, err)\n\t}\n\n\t// Reset the body so other calls won't fail.\n\tr.Body = ioutil.NopCloser(bytes.NewBuffer(body))\n\n\tbaseString := fmt.Sprintf(\"%s:%s:%s\", version, timeStamp, body)\n\n\tsignature := getSignature([]byte(baseString), []byte(slackSigningSecret))\n\n\ttrimmed := strings.TrimPrefix(slackSignature, fmt.Sprintf(\"%s=\", version))\n\tsignatureInHeader, err := hex.DecodeString(trimmed)\n\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"hex.DecodeString(%v): %v\", trimmed, err)\n\t}\n\n\treturn hmac.Equal(signature, signatureInHeader), nil\n}", "title": "" }, { "docid": "aa0848ac4a99742431d217c59ef4f48a", "score": "0.5735038", "text": "func (w *webhook) handler(writer http.ResponseWriter, request *http.Request) {\n\tw.Log.Info(\"received a request from\", zap.String(\"host\", request.Host))\n\tif request.Method == w.Webhook.Method {\n\t\tpayload, err := ioutil.ReadAll(request.Body)\n\t\tif err != nil {\n\t\t\tw.Log.Warn(\"unable to process request payload. Cause: %v\", zap.Error(err))\n\t\t\twriter.WriteHeader(http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tevent := &event{\n\t\t\twebhook: w,\n\t\t\trequestHost: request.Host,\n\t\t\ttimestamp: time.Now().UTC(),\n\t\t\tpayload: payload,\n\t\t}\n\t\tw.events <- event\n\t\twriter.WriteHeader(http.StatusOK)\n\t} else {\n\t\tw.Log.Warn(\"HTTP method mismatch\", zap.String(\"actual\", request.Method), zap.String(\"expected\", w.Webhook.Method))\n\t\twriter.WriteHeader(http.StatusBadRequest)\n\t}\n}", "title": "" }, { "docid": "d62f01bfd5dd95152a6e0c057966c0b5", "score": "0.5724718", "text": "func (hook Webhook) Parse(r *http.Request, events ...Event) (interface{}, error) {\n\tdefer func() {\n\t\t_, _ = io.Copy(ioutil.Discard, r.Body)\n\t\t_ = r.Body.Close()\n\t}()\n\n\tif len(events) == 0 {\n\t\treturn nil, ErrEventNotSpecifiedToParse\n\t}\n\tif r.Method != http.MethodPost {\n\t\treturn nil, ErrInvalidHTTPMethod\n\t}\n\n\tevent := r.Header.Get(\"X-Nexus-Webhook-Id\")\n\tif event == \"\" {\n\t\treturn nil, ErrMissingWebhookIdHeader\n\t}\n\tSonatypeEvent := Event(event)\n\n\tvar found bool\n\tfor _, evt := range events {\n\t\tif evt == SonatypeEvent {\n\t\t\tfound = true\n\t\t\tbreak\n\t\t}\n\t}\n\t// event not defined to be parsed\n\tif !found {\n\t\treturn nil, ErrEventNotFound\n\t}\n\n\tpayload, err := ioutil.ReadAll(r.Body)\n\tif err != nil || len(payload) == 0 {\n\t\treturn nil, ErrParsingPayload\n\t}\n\n\t// If we have a Secret set, we should check it matches\n\tif len(hook.secret) > 0 {\n\t\tsignature := r.Header.Get(\"X-Nexus-Webhook-Signature\")\n\t\tif len(signature) == 0 {\n\t\t\treturn nil, ErrMissingSignatureHeader\n\t\t}\n\t\tmac := hmac.New(sha1.New, []byte(hook.secret))\n\t\t_, _ = mac.Write(payload)\n\t\texpectedMAC := hex.EncodeToString(mac.Sum(nil))\n\n\t\tif !hmac.Equal([]byte(signature[5:]), []byte(expectedMAC)) {\n\t\t\treturn nil, ErrHMACVerificationFailed\n\t\t}\n\t}\n\n\tswitch SonatypeEvent {\n\tcase PolicyManagement:\n\t\tvar pl PolicyManagementPayload\n\t\terr = json.Unmarshal([]byte(payload), &pl)\n\t\treturn pl, err\n\tcase ApplicationEvaluation:\n\t\tvar pl ApplicationEvaluationPayload\n\t\terr = json.Unmarshal([]byte(payload), &pl)\n\t\treturn pl, err\n\tcase LicenseOverrideManagement:\n\t\tvar pl LicenseOverrideManagementPayload\n\t\terr = json.Unmarshal([]byte(payload), &pl)\n\t\treturn pl, err\n\tcase SecurityVulnerabilityOverrideManagement:\n\t\tvar pl SecurityVulnerabilityOverrideManagementPayload\n\t\terr = json.Unmarshal([]byte(payload), &pl)\n\t\treturn pl, err\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unknown event %s\", SonatypeEvent)\n\t}\n}", "title": "" }, { "docid": "5387a423e6cd75472a044ee963ca2bca", "score": "0.5712353", "text": "func (b *Bot) handleTelegramWebHook(w http.ResponseWriter, r *http.Request) {\n\n\t// parse Update object\n\tupdate, err := parseTelegramWebhookRequest(r)\n\tif err != nil {\n\t\tlog.Printf(\"Error parsing update, %s\", err.Error())\n\t\treturn\n\t}\n\n\t// Dispatch update.\n\tb.dispatchUpdate(update)\n\n}", "title": "" }, { "docid": "b2de97c214ca442292f6fa772f066dfc", "score": "0.56956935", "text": "func (handler *Handler) ReadPayload(req http.Request) *http.Status {\n\n\tvar paramCount int\n\tvar optionalCount int\n\tvar readBodyObject bool\n\tbodyParams := map[string]interface{}{}\n\tstatusMessages := map[string]*http.Status{}\n\n\t// handle payload\n\tswitch params := handler.payloadSchema.(type) {\n\n\t\tcase nil:\n\n\t\t\t// do nothing\n\n\t\tcase []byte:\n\n\t\t// do nothing\n\n\t\tcase map[string]interface{}:\n\n\t\t\tif !readBodyObject {\n\t\t\t\tstatus := req.ReadBodyObject(); if status != nil { return status }\n\t\t\t\treadBodyObject = true\n\t\t\t}\n\n\t\tcase []interface{}:\n\n\t\t\tif !readBodyObject {\n\t\t\t\tstatus := req.ReadBodyObject(); if status != nil { return status }\n\t\t\t\treadBodyObject = true\n\t\t\t}\n\n\t\tcase validation.Array:\n\n\t\t\tif !readBodyObject {\n\t\t\t\tstatus := req.ReadBodyObject(); if status != nil { return status }\n\t\t\t\treadBodyObject = true\n\t\t\t}\n\n\t\t\tarray := params\n\n\t\t\tswitch len(array) {\n\n\t\t\t\tcase 1:\n\n\t\t\t\t\treturn req.Respond(400, \"INVALID TYPE FOR ARRAY PAYLOAD SCHEMA, EXPECTS 0 OR 2 ARGS (*ValidationConfig, paramKey)\")\n\n\t\t\t\tcase 2:\n\n\t\t\t\t\tvc, ok := array[0].(*validation.Config); if !ok { return req.Respond(500, \"INVALID ARRAY PAYLOAD SCHEMA VALIDATION CONFIG\") }\n\n\t\t\t\t\tparamKey, ok := array[1].(string); if !ok { return req.Respond(500, \"INVALID ARRAY PAYLOAD SCHEMA PARAM KEY\") }\n\n\t\t\t\t\tstatus, array := vc.BodyFunction(req, req.BodyArray()); if status != nil {\n\n\t\t\t\t\t\treq.Log().DebugJSON(req.BodyArray())\n\t\t\t\t\t\t//return req.Respond(400, \"INVALID TYPE FOR ARRAY PAYLOAD ITEM, EXPECTED: \"+vc.Type())\n\n\t\t\t\t\t\treturn status\n\t\t\t\t\t}\n\n\t\t\t\t\treq.SetParam(paramKey, array)\n\n\t\t\t}\n\n\t\tcase validation.Object:\n\n\t\t\tif !readBodyObject {\n\t\t\t\tstatus := req.ReadBodyObject(); if status != nil { return status }\n\t\t\t\treadBodyObject = true\n\t\t\t}\n\n\t\tcase validation.Payload:\n\n\t\t\tif !readBodyObject {\n\t\t\t\tstatus := req.ReadBodyObject(); if status != nil { return status }\n\t\t\t\treadBodyObject = true\n\t\t\t}\n\n\t\t\tobject := params\n\n\t\t\tfor key, vc := range object {\n\n\t\t\t\tstatus, x := vc.BodyFunction(\n\t\t\t\t\treq,\n\t\t\t\t\treq.Body(key),\n\t\t\t\t)\n\t\t\t\tif vc.RequiredValue {\n\t\t\t\t\tparamCount++\n\t\t\t\t\tif status != nil {\n\t\t\t\t\t\t// dont leak data to logs\n\t\t\t\t\t\t//status.Value = req.Body(key)\n\t\t\t\t\t\tstatus.Message = fmt.Sprintf(\"%s KEY '%s'\", status.MessageString(), key)\n\t\t\t\t\t\tstatusMessages[key] = status\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\toptionalCount++\n\t\t\t\t\tif status != nil {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tbodyParams[key] = x\n\t\t\t}\n\n\t\tdefault:\n\n\t\t\treturn req.Respond(500, \"INVALID OPTIONAL PAYLOAD SCHEMA CONFIG TYPE: \"+reflect.TypeOf(params).String())\n\n\t}\n\n\tif len(statusMessages) > 0 {\n\t\tb, _ := json.Marshal(statusMessages)\n\t\tfor _, status := range statusMessages {\n\t\t\treturn req.Respond(status.Code, string(b))\n\t\t}\n\t}\n\n\tlp := len(bodyParams)\n\tif len(bodyParams) < paramCount {\n\t\treturn req.Respond(\n\t\t\t400,\n\t\t\tfmt.Sprintf(\n\t\t\t\t\"INVALID PAYLOAD FIELD COUNT %v EXPECTED %v/%v\",\n\t\t\t\tlp,\n\t\t\t\tparamCount,\n\t\t\t\tparamCount+optionalCount,\n\t\t\t),\n\t\t)\n\t}\n\n\treq.SetBodyParams(bodyParams)\n\n\treturn nil\n}", "title": "" }, { "docid": "fc780734c72fcee33e01cbf05072ae10", "score": "0.56854457", "text": "func validationHandler(w http.ResponseWriter, r *http.Request) {\n\tvar body []byte\n\tctx, log := logger.GetNewContextWithLogger()\n\tif r.Body != nil {\n\t\tif data, err := io.ReadAll(r.Body); err == nil {\n\t\t\tbody = data\n\t\t}\n\t}\n\tif len(body) == 0 {\n\t\tlog.Error(\"received empty request body\")\n\t\thttp.Error(w, \"received empty request body\", http.StatusBadRequest)\n\t\treturn\n\t}\n\tlog.Debugf(\"Received request\")\n\t// Verify the content type is accurate.\n\tcontentType := r.Header.Get(\"Content-Type\")\n\tif contentType != \"application/json\" {\n\t\tlog.Errorf(\"content-Type=%s, expect application/json\", contentType)\n\t\thttp.Error(w, \"invalid Content-Type, expect `application/json`\", http.StatusUnsupportedMediaType)\n\t\treturn\n\t}\n\n\tvar admissionResponse *admissionv1.AdmissionResponse\n\tar := admissionv1.AdmissionReview{}\n\tcodecs := serializer.NewCodecFactory(runtime.NewScheme())\n\tdeserializer := codecs.UniversalDeserializer()\n\tif _, _, err := deserializer.Decode(body, nil, &ar); err != nil {\n\t\tlog.Errorf(\"Can't decode body: %v\", err)\n\t\tadmissionResponse = &admissionv1.AdmissionResponse{\n\t\t\tResult: &metav1.Status{\n\t\t\t\tMessage: err.Error(),\n\t\t\t},\n\t\t}\n\t} else {\n\t\tif r.URL.Path == \"/validate\" {\n\t\t\tlog.Debugf(\"request URL path is /validate\")\n\t\t\tlog.Debugf(\"admissionReview: %+v\", ar)\n\t\t\tswitch ar.Request.Kind.Kind {\n\t\t\tcase \"StorageClass\":\n\t\t\t\tadmissionResponse = validateStorageClass(ctx, &ar)\n\t\t\tcase \"PersistentVolumeClaim\":\n\t\t\t\tadmissionResponse = validatePVC(ctx, ar.Request)\n\t\t\tdefault:\n\t\t\t\tlog.Infof(\"Skipping validation for resource type: %q\", ar.Request.Kind.Kind)\n\t\t\t\tadmissionResponse = &admissionv1.AdmissionResponse{\n\t\t\t\t\tAllowed: true,\n\t\t\t\t}\n\t\t\t}\n\t\t\tlog.Debugf(\"admissionResponse: %+v\", admissionResponse)\n\t\t}\n\t}\n\tadmissionReview := admissionv1.AdmissionReview{}\n\tadmissionReview.APIVersion = \"admission.k8s.io/v1\"\n\tadmissionReview.Kind = \"AdmissionReview\"\n\tif admissionResponse != nil {\n\t\tadmissionReview.Response = admissionResponse\n\t\tif ar.Request != nil {\n\t\t\tadmissionReview.Response.UID = ar.Request.UID\n\t\t}\n\t}\n\tresp, err := json.Marshal(admissionReview)\n\tif err != nil {\n\t\tlog.Errorf(\"Can't encode response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not encode response: %v\", err), http.StatusInternalServerError)\n\t}\n\tlog.Debugf(\"Ready to write response\")\n\tif _, err := w.Write(resp); err != nil {\n\t\tlog.Errorf(\"Can't write response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not write response: %v\", err), http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "bc6366de7794a888a79c159767e85028", "score": "0.56665987", "text": "func TestWebhook_Validate(t *testing.T) {\n\twh := Webhook{\n\t\tID: bson.NewObjectId(),\n\t\tWebhookURL: \"http://test.url\",\n\t\tBaseCurrency: \"USD\",\n\t\tTargetCurrency: \"NOK\",\n\t\tMinTriggerValue: 0.2,\n\t\tMaxTriggerValue: 1.3,\n\t}\n\n\terr := wh.Validate()\n\tif err != nil {\n\t\tt.Errorf(\"Unable to validate: %s\", err.Error())\n\t}\n}", "title": "" }, { "docid": "92472acc90b17e7faeb88e86f7f87422", "score": "0.56632173", "text": "func (w *WebHookHandler) ProcessWebHook(writer http.ResponseWriter, req *http.Request, ctx context.Context, name, subpath string) error {\n\tparts := strings.Split(strings.TrimPrefix(subpath, \"/\"), \"/\")\n\tif len(parts) != 2 {\n\t\treturn errors.NewBadRequest(fmt.Sprintf(\"unexpected hook subpath %s\", subpath))\n\t}\n\tsecret, hookType := parts[0], parts[1]\n\n\tplugin, ok := w.plugins[hookType]\n\tif !ok {\n\t\treturn errors.NewNotFound(build.Resource(\"buildconfighook\"), hookType)\n\t}\n\n\tconfig, err := w.buildConfigClient.BuildConfigs(apirequest.NamespaceValue(ctx)).Get(name, metav1.GetOptions{})\n\tif err != nil {\n\t\t// clients should not be able to find information about build configs in\n\t\t// the system unless the config exists and the secret matches\n\t\treturn errors.NewUnauthorized(fmt.Sprintf(\"the webhook %q for %q did not accept your secret\", hookType, name))\n\t}\n\n\ttriggers, err := plugin.GetTriggers(config)\n\tif err != nil {\n\t\treturn errors.NewUnauthorized(fmt.Sprintf(\"the webhook %q for %q did not accept your secret\", hookType, name))\n\t}\n\n\tglog.V(4).Infof(\"checking secret for %q webhook trigger of buildconfig %s/%s\", hookType, config.Namespace, config.Name)\n\ttrigger, err := webhook.CheckSecret(config.Namespace, secret, triggers, w.secretsClient)\n\tif err != nil {\n\t\treturn errors.NewUnauthorized(fmt.Sprintf(\"the webhook %q for %q did not accept your secret\", hookType, name))\n\t}\n\n\trevision, envvars, dockerStrategyOptions, proceed, err := plugin.Extract(config, trigger, req)\n\tif !proceed {\n\t\tswitch err {\n\t\tcase webhook.ErrSecretMismatch, webhook.ErrHookNotEnabled:\n\t\t\treturn errors.NewUnauthorized(fmt.Sprintf(\"the webhook %q for %q did not accept your secret\", hookType, name))\n\t\tcase webhook.MethodNotSupported:\n\t\t\treturn errors.NewMethodNotSupported(build.Resource(\"buildconfighook\"), req.Method)\n\t\t}\n\t\tif _, ok := err.(*errors.StatusError); !ok && err != nil {\n\t\t\treturn errors.NewInternalError(fmt.Errorf(\"hook failed: %v\", err))\n\t\t}\n\t\treturn err\n\t}\n\twarning := err\n\n\tbuildTriggerCauses := webhook.GenerateBuildTriggerInfo(revision, hookType)\n\n\trequest := &buildv1.BuildRequest{\n\t\tTriggeredBy: buildTriggerCauses,\n\t\tObjectMeta: metav1.ObjectMeta{Name: name},\n\t\tRevision: revision,\n\t\tEnv: envvars,\n\t\tDockerStrategyOptions: dockerStrategyOptions,\n\t}\n\n\tnewBuild, err := w.instantiator.Instantiate(config.Namespace, request)\n\tif err != nil {\n\t\treturn errors.NewInternalError(fmt.Errorf(\"could not generate a build: %v\", err))\n\t}\n\n\t// Send back the build name so that the client can alert the user.\n\tif newBuildEncoded, err := runtime.Encode(webhookEncodingCodecFactory.LegacyCodec(w.groupVersion), newBuild); err != nil {\n\t\tutilruntime.HandleError(err)\n\t} else {\n\t\twriter.Write(newBuildEncoded)\n\t}\n\n\treturn warning\n}", "title": "" }, { "docid": "9f39c371dce15fcbe37aa48bc807a8de", "score": "0.5648881", "text": "func WebRead(req *http.Request, dataRef interface{}) error {\n\terr := json.NewDecoder(req.Body).Decode(dataRef)\n\tif err != nil {\n\t\terr := &PgpinError{\n\t\t\tId: \"bad-request\",\n\t\t\tMessage: \"malformed JSON body\",\n\t\t\tHttpStatus: 400,\n\t\t}\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1480d1c273b656e94bb08b7ff01c23eb", "score": "0.5638721", "text": "func Web_hooks_get () {\n\n // GET /webhooks/:id.json\n\n }", "title": "" }, { "docid": "e943f3397ce5e06951c07ccf282cb606", "score": "0.5637518", "text": "func (m *ReadResponse) Validate() error {\n\treturn nil\n}", "title": "" }, { "docid": "8927ca06a5a3915c3607a48d3bc3f5f7", "score": "0.5625868", "text": "func (s *IdentityWebhook) Validate(req admissionctl.Request) bool {\n\tvalid := true\n\tvalid = valid && (req.UserInfo.Username != \"\")\n\tvalid = valid && (req.Kind.Kind == \"Identity\")\n\n\treturn valid\n}", "title": "" }, { "docid": "d177fb0b3993e0e6b116a2be7d192313", "score": "0.56079596", "text": "func (b *bot) WebhookStart() {\n\thttp.HandleFunc(\"/web_hook\", func(w http.ResponseWriter, r *http.Request) {\n\t\tbody, err := ioutil.ReadAll(r.Body)\n\t\tif err != nil {\n\t\t\tfmt.Fprintf(w, \"Not Ok!\")\n\n\t\t\tlog.Error().Err(err).Msg(\"[webhook] read\")\n\t\t\treturn\n\t\t}\n\n\t\tlog.Debug().Msgf(\"[webhook] body %s\", string(body))\n\n\t\tvar statementItemData StatementItemData\n\t\tif err := json.Unmarshal(body, &statementItemData); err != nil {\n\t\t\tfmt.Fprintf(w, \"Not Ok!\")\n\n\t\t\tlog.Error().Err(err).Msg(\"[webhook] unmarshal\")\n\t\t\treturn\n\t\t}\n\n\t\tb.ch <- statementItemData\n\n\t\tfmt.Fprintf(w, \"Ok!\")\n\t})\n\n\terr := http.ListenAndServe(\":8080\", nil)\n\tif err != nil {\n\t\tlog.Panic().Err(err).Msg(\"[webhook] serve\")\n\t}\n}", "title": "" }, { "docid": "c77eb5db736bd733e35298639b2438fe", "score": "0.56002223", "text": "func (wh *webhook) validate(ar *admissionv1.AdmissionReview) *admissionv1.AdmissionResponse {\n\treq := ar.Request\n\tresponse := &admissionv1.AdmissionResponse{}\n\tresponse.Allowed = true\n\tklog.Info(\"Admission webhook request received\")\n\tswitch req.Kind.Kind {\n\tcase \"Namespace\":\n\t\tklog.V(2).Infof(\"Admission webhook request for type %s\", req.Kind.Kind)\n\t\treturn wh.validateNamespace(ar)\n\tcase \"PersistentVolumeClaim\":\n\t\tklog.V(2).Infof(\"Admission webhook request for type %s\", req.Kind.Kind)\n\t\treturn wh.validatePVC(ar)\n\tcase \"StoragePoolClaim\":\n\t\tklog.V(2).Infof(\"Admission webhook request for type %s\", req.Kind.Kind)\n\t\treturn wh.validateSPC(ar)\n\tdefault:\n\t\tklog.V(2).Infof(\"Admission webhook not configured for type %s\", req.Kind.Kind)\n\t\treturn response\n\t}\n}", "title": "" }, { "docid": "d576e7fdd594838564487017783fcc82", "score": "0.55828166", "text": "func (hook Webhook) Parse(r *http.Request, events ...Event) (interface{}, error) {\n\tdefer func() {\n\t\t_, _ = io.Copy(ioutil.Discard, r.Body)\n\t\t_ = r.Body.Close()\n\t}()\n\n\tif len(events) == 0 {\n\t\treturn nil, ErrEventNotSpecifiedToParse\n\t}\n\tif r.Method != http.MethodPost {\n\t\treturn nil, ErrInvalidHTTPMethod\n\t}\n\n\t// If we have a Secret set, we should check the MAC\n\tif len(hook.secret) > 0 {\n\t\tsignature := r.Header.Get(\"X-Gitlab-Token\")\n\t\tif signature != hook.secret {\n\t\t\treturn nil, ErrGitLabTokenVerificationFailed\n\t\t}\n\t}\n\n\tevent := r.Header.Get(\"X-Gitlab-Event\")\n\tif len(event) == 0 {\n\t\treturn nil, ErrMissingGitLabEventHeader\n\t}\n\n\tgitLabEvent := Event(event)\n\n\tpayload, err := ioutil.ReadAll(r.Body)\n\tif err != nil || len(payload) == 0 {\n\t\treturn nil, ErrParsingPayload\n\t}\n\n\treturn eventParsing(gitLabEvent, events, payload)\n}", "title": "" }, { "docid": "01266de8bb616f0eddb01ab7a36229f4", "score": "0.55773056", "text": "func (m *TwitchWebhookHandler) ValidateSignature(r *http.Request) (bool, io.Reader, error) {\n\tdefer r.Body.Close()\n\n\t_, id := path.Split(r.URL.EscapedPath())\n\ttopic, err := SubscriptionIDToTopic(SubscriptionID(id))\n\tif err != nil {\n\t\treturn false, nil, err\n\t}\n\n\tsubscription, err := m.Manager.Get(topic)\n\tif err != nil {\n\t\treturn false, nil, err\n\t}\n\n\tbs, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\treturn false, nil, err\n\t}\n\tbody := bytes.NewReader(bs)\n\n\thasher := hmac.New(sha256.New, []byte(subscription.Secret))\n\t_, err = hasher.Write(bs)\n\tif err != nil {\n\t\treturn false, nil, err\n\t}\n\n\tmac := hasher.Sum(nil)\n\n\tsignature := r.Header.Get(\"X-Hub-Signature\")\n\tif signature == \"\" {\n\t\treturn false, body, nil\n\t}\n\n\tprovidedMac, err := hex.DecodeString(signature)\n\tif err != nil {\n\t\treturn false, nil, err\n\t}\n\n\treturn hmac.Equal(mac, providedMac), body, nil\n}", "title": "" }, { "docid": "86a1d75e40ba2e6ace5dea3a42544ce1", "score": "0.5560402", "text": "func ReadHandler(w http.ResponseWriter, r *http.Request) {\n\tvar in ReadIn\n\tb, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tlogin <- Event{\"Reading POST\", err}\n\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\treturn\n\t}\n\terr = json.Unmarshal(b, &in)\n\tif err != nil {\n\t\tlogin <- Event{\"Parsing JSON\", err}\n\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\treturn\n\t}\n\tverifyin <- in.SignedFingerPrint\n\terr = <-verifyout\n\tif err != nil {\n\t\tlogin <- Event{\"Verification\", err}\n\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\treturn\n\t}\n\treadin <- in\n\tout := <-readout\n\tif out.Err != nil {\n\t\tlogin <- Event{\"Read\", out.Err}\n\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\treturn\n\t}\n\tb, _ = json.Marshal(&out)\n\tw.Write(b)\n}", "title": "" }, { "docid": "47a5541e763d7f92287f65fc319ba9a5", "score": "0.55599195", "text": "func (wh *webhook) Serve(w http.ResponseWriter, r *http.Request) {\n\tvar body []byte\n\tif r.Body != nil {\n\t\tif data, err := ioutil.ReadAll(r.Body); err == nil {\n\t\t\tbody = data\n\t\t}\n\t}\n\tif len(body) == 0 {\n\t\tklog.Error(\"empty body\")\n\t\thttp.Error(w, \"empty body\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// verify the content type is accurate\n\tcontentType := r.Header.Get(\"Content-Type\")\n\tif contentType != \"application/json\" {\n\t\tklog.Errorf(\"Content-Type=%s, expect application/json\", contentType)\n\t\thttp.Error(w, \"invalid Content-Type, expect `application/json`\", http.StatusUnsupportedMediaType)\n\t\treturn\n\t}\n\n\tvar admissionResponse *admissionv1.AdmissionResponse\n\tar := admissionv1.AdmissionReview{}\n\tif _, _, err := deserializer.Decode(body, nil, &ar); err != nil {\n\t\tklog.Errorf(\"Can't decode body: %v\", err)\n\t\tadmissionResponse = &admissionv1.AdmissionResponse{\n\t\t\tResult: &metav1.Status{\n\t\t\t\tMessage: err.Error(),\n\t\t\t},\n\t\t}\n\t} else {\n\t\tif r.URL.Path == \"/validate\" {\n\t\t\tadmissionResponse = wh.validate(&ar)\n\t\t}\n\t}\n\n\tadmissionReview := admissionv1.AdmissionReview{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: admissionv1.SchemeGroupVersion.String(),\n\t\t\tKind: \"AdmissionReview\",\n\t\t},\n\t}\n\tif admissionResponse != nil {\n\t\tadmissionReview.Response = admissionResponse\n\t\tif ar.Request != nil {\n\t\t\tadmissionReview.Response.UID = ar.Request.UID\n\t\t}\n\t}\n\n\tresp, err := json.Marshal(admissionReview)\n\tif err != nil {\n\t\tklog.Errorf(\"Can't encode response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not encode response: %v\", err), http.StatusInternalServerError)\n\t}\n\tklog.V(5).Infof(\"Ready to write reponse ...\")\n\tif _, err := w.Write(resp); err != nil {\n\t\tklog.Errorf(\"Can't write response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not write response: %v\", err), http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "9cab02a3cf1b44836a2512c587e20dd3", "score": "0.5544256", "text": "func Validate(c *fiber.Ctx) {\n\t// Bad request, wrong address length\n\tif len(c.Params(\"addr\")) != 42 {\n\t\tc.SendStatus(fiber.StatusBadRequest) // HTTP 400\n\t\treturn\n\t}\n\t// Parse request body\n\tparams := new(struct {\n\t\tSignature string `json:\"signature\"`\n\t})\n\terr := c.BodyParser(&params)\n\tif err != nil || len(params.Signature) == 0 {\n\t\t// bad request\n\t\tc.SendStatus(fiber.StatusBadRequest) // HTTP 400\n\t\tc.Send(err.Error())\n\t\treturn\n\t}\n\t// Verify challenge\n\taddress, err := auth.VerifyChallenge(c.Params(\"addr\"), params.Signature)\n\tif err != nil {\n\t\tstatus := fiber.StatusInternalServerError\n\t\tif err.Error() == auth.ErrChallengeBadRequest {\n\t\t\tstatus = fiber.StatusBadRequest\n\t\t} else if err.Error() == auth.ErrChallengeNotFound {\n\t\t\tstatus = fiber.StatusNotFound\n\t\t}\n\t\tc.SendStatus(status) // HTTP 403\n\t\tc.Send(err.Error())\n\t\treturn\n\t}\n\tuser := address\n\t// Resolve (reverse) addr into ENS name if we're using ENS\n\tif ResolveENS == true {\n\t\tensName, err := resolver.Eth2ens(address)\n\t\tif err == nil {\n\t\t\t// Fallback on address if we can't resolve the name\n\t\t\tuser = ensName\n\t\t}\n\t}\n\texpTime := time.Now().Add(auth.JWTExpiration)\n\ttoken, err := auth.NewJWT(user, expTime.Unix(), EthSignKey)\n\tif err != nil {\n\t\tc.SendStatus(fiber.StatusInternalServerError) // HTTP 500\n\t\tc.Send(err.Error())\n\t\treturn\n\t}\n\t// Respond\n\tresponse := fiber.Map{}\n\tresponse[\"token\"] = token\n\tresponse[\"user\"] = user\n\tresponse[\"expires\"] = expTime.UTC()\n\tc.JSON(response)\n}", "title": "" }, { "docid": "f15dbc46cff2324fd71f74076268a1e7", "score": "0.55384994", "text": "func validatePayload(r *http.Request, w http.ResponseWriter) bool {\n\tif r.ContentLength == 0 { // empty payload should not be accepted\n\t\thttp.Error(w, \"Empty payload\", http.StatusBadRequest)\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "ab36f829ccf2643536e797645c7a64f4", "score": "0.5508314", "text": "func Handler(w http.ResponseWriter, r *http.Request) {\n\t// payload, err := github.ValidatePayload(r, []byte{})\n\t// if err != nil {\n\t// \tw.WriteHeader(http.StatusForbidden)\n\t// \tw.Write(ErrorInvalidSignature)\n\t// \treturn\n\t// }\n\tvar data map[string]interface{}\n\tpayload, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tlogrus.Error(err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write(ErrorInvalidPayload)\n\t}\n\tevent, err := github.ParseWebHook(github.WebHookType(r), payload)\n\tif err != nil {\n\t\tlogrus.Error(err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write(ErrorInvalidPayload)\n\t\treturn\n\t}\n\tswitch event := event.(type) {\n\tcase *github.IssueCommentEvent:\n\t\tdata, err = receivers.ReceiveIssueComment(event)\n\tdefault:\n\t\tdata, err = map[string]interface{}{\n\t\t\t\"error\": \"Unknown event type\",\n\t\t}, nil\n\t}\n\tbody, err := json.Marshal(data)\n\tif err != nil {\n\t\tlogrus.Error(err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tw.Write(ErrorInternalServer)\n\t}\n\tfmt.Fprintf(w, string(body))\n}", "title": "" }, { "docid": "b16aae255101516dc6226e05c03b502e", "score": "0.5504862", "text": "func checkPayload(t *testing.T, eventType models.EventType, send func(), expectedJson string) {\n\teventChannel := make(chan WebhookEvent)\n\n\t// Set up a server.\n\tsvr := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tdata := WebhookEvent{}\n\t\tjson.NewDecoder(r.Body).Decode(&data)\n\t\teventChannel <- data\n\t}))\n\tdefer svr.Close()\n\n\t// Subscribe to the webhook.\n\thook, err := data.InsertWebhook(svr.URL, []models.EventType{eventType})\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer func() {\n\t\tif err := data.DeleteWebhook(hook); err != nil {\n\t\t\tt.Error(err)\n\t\t}\n\t}()\n\n\t// Send and capture the event.\n\tsend()\n\tevent := <-eventChannel\n\n\tif event.Type != eventType {\n\t\tt.Errorf(\"Got event type %v but expected %v\", event.Type, eventType)\n\t}\n\n\t// Compare.\n\tpayloadJson, err := json.MarshalIndent(event.EventData, \"\", \" \")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tt.Logf(\"Actual payload:\\n%s\", payloadJson)\n\n\tif !jsonpatch.Equal(payloadJson, []byte(expectedJson)) {\n\t\tdiff, err := jsonpatch.CreateMergePatch(payloadJson, []byte(expectedJson))\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tvar out bytes.Buffer\n\t\tif err := json.Indent(&out, diff, \"\", \" \"); err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tt.Errorf(\"Expected difference from actual payload:\\n%s\", out.Bytes())\n\t}\n}", "title": "" }, { "docid": "5ce3fbd6e5d2e1a231e62876344173f0", "score": "0.5496665", "text": "func (r Resource) createWebhook(request *restful.Request, response *restful.Response) {\n\tmodifyingEventListenerLock.Lock()\n\tdefer modifyingEventListenerLock.Unlock()\n\n\tlogging.Log.Infof(\"Webhook creation request received with request: %+v.\", request)\n\tinstallNs := r.Defaults.Namespace\n\n\twebhook := webhook{}\n\tif err := request.ReadEntity(&webhook); err != nil {\n\t\tlogging.Log.Errorf(\"error trying to read request entity as webhook: %s.\", err)\n\t\tRespondError(response, err, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// Sanitize GitRepositoryURL\n\twebhook.GitRepositoryURL = strings.TrimSuffix(webhook.GitRepositoryURL, \".git\")\n\n\tif webhook.PullTask == \"\" {\n\t\twebhook.PullTask = webhookextPullTask\n\t}\n\n\tif webhook.Name != \"\" {\n\t\tif len(webhook.Name) > 57 {\n\t\t\ttooLongMessage := fmt.Sprintf(\"requested release name (%s) must be less than 58 characters\", webhook.Name)\n\t\t\terr := errors.New(tooLongMessage)\n\t\t\tlogging.Log.Errorf(\"error: %s\", err.Error())\n\t\t\tRespondError(response, err, http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t}\n\n\tdockerRegDefault := r.Defaults.DockerRegistry\n\t// remove prefixes if any\n\twebhook.DockerRegistry = strings.TrimPrefix(webhook.DockerRegistry, \"https://\")\n\twebhook.DockerRegistry = strings.TrimPrefix(webhook.DockerRegistry, \"http://\")\n\tif webhook.DockerRegistry == \"\" && dockerRegDefault != \"\" {\n\t\twebhook.DockerRegistry = dockerRegDefault\n\t}\n\tlogging.Log.Debugf(\"Docker registry location is: %s\", webhook.DockerRegistry)\n\n\tnamespace := webhook.Namespace\n\tif namespace == \"\" {\n\t\terr := errors.New(\"a namespace for creating a webhook is required, but none was given\")\n\t\tlogging.Log.Errorf(\"error: %s.\", err.Error())\n\t\tRespondError(response, err, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif !strings.HasPrefix(webhook.GitRepositoryURL, \"http\") {\n\t\terr := errors.New(\"the supplied GitRepositoryURL does not specify the protocol http:// or https://\")\n\t\tlogging.Log.Errorf(\"error: %s\", err.Error())\n\t\tRespondError(response, err, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tpieces := strings.Split(webhook.GitRepositoryURL, \"/\")\n\tif len(pieces) < 4 {\n\t\tlogging.Log.Errorf(\"error creating webhook: GitRepositoryURL format error (%+v).\", webhook.GitRepositoryURL)\n\t\tRespondError(response, errors.New(\"GitRepositoryURL format error\"), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\thooks, err := r.getHooksForRepo(webhook.GitRepositoryURL)\n\tif len(hooks) > 0 {\n\t\tfor _, hook := range hooks {\n\t\t\tif hook.Name == webhook.Name && hook.Namespace == webhook.Namespace {\n\t\t\t\tlogging.Log.Errorf(\"error creating webhook: A webhook already exists for GitRepositoryURL %+v with the Name %s and Namespace %s.\", webhook.GitRepositoryURL, webhook.Name, webhook.Namespace)\n\t\t\t\tRespondError(response, errors.New(\"Webhook already exists for the specified Git repository with the same name, targeting the same namespace\"), http.StatusBadRequest)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif hook.Pipeline == webhook.Pipeline && hook.Namespace == webhook.Namespace {\n\t\t\t\tlogging.Log.Errorf(\"error creating webhook: A webhook already exists for GitRepositoryURL %+v, running pipeline %s in namespace %s.\", webhook.GitRepositoryURL, webhook.Pipeline, webhook.Namespace)\n\t\t\t\tRespondError(response, errors.New(\"Webhook already exists for the specified Git repository, running the same pipeline in the same namespace\"), http.StatusBadRequest)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif hook.PullTask != webhook.PullTask {\n\t\t\t\tmsg := fmt.Sprintf(\"PullTask mismatch. Webhooks on a repository must use the same PullTask existing webhooks use %s not %s.\", hook.PullTask, webhook.PullTask)\n\t\t\t\tlogging.Log.Errorf(\"error creating webhook: \" + msg)\n\t\t\t\tRespondError(response, errors.New(msg), http.StatusBadRequest)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\n\t_, templateErr := r.TriggersClient.TektonV1alpha1().TriggerTemplates(installNs).Get(webhook.Pipeline+\"-template\", metav1.GetOptions{})\n\t_, pushErr := r.TriggersClient.TektonV1alpha1().TriggerBindings(installNs).Get(webhook.Pipeline+\"-push-binding\", metav1.GetOptions{})\n\t_, pullrequestErr := r.TriggersClient.TektonV1alpha1().TriggerBindings(installNs).Get(webhook.Pipeline+\"-pullrequest-binding\", metav1.GetOptions{})\n\tif templateErr != nil || pushErr != nil || pullrequestErr != nil {\n\t\tmsg := fmt.Sprintf(\"Could not find the required trigger template or trigger bindings in namespace: %s. Expected to find: %s, %s and %s\", installNs, webhook.Pipeline+\"-template\", webhook.Pipeline+\"-push-binding\", webhook.Pipeline+\"-pullrequest-binding\")\n\t\tlogging.Log.Errorf(\"%s\", msg)\n\t\tlogging.Log.Errorf(\"template error: `%s`, pushbinding error: `%s`, pullrequest error: `%s`\", templateErr, pushErr, pullrequestErr)\n\t\tRespondError(response, errors.New(msg), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\teventListener, err := r.TriggersClient.TektonV1alpha1().EventListeners(installNs).Get(eventListenerName, metav1.GetOptions{})\n\tif err != nil && !k8serrors.IsNotFound(err) {\n\t\tmsg := fmt.Sprintf(\"unable to create webhook due to error listing Tekton eventlistener: %s\", err)\n\t\tlogging.Log.Errorf(\"%s\", msg)\n\t\tRespondError(response, errors.New(msg), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tgitServer, gitOwner, gitRepo, err := getGitValues(webhook.GitRepositoryURL)\n\tif err != nil {\n\t\tlogging.Log.Errorf(\"error parsing git repository URL %s in getGitValues(): %s\", webhook.GitRepositoryURL, err)\n\t\tRespondError(response, errors.New(\"error parsing GitRepositoryURL, check pod logs for more details\"), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tsanitisedURL := gitServer + \"/\" + gitOwner + \"/\" + gitRepo\n\t// Single monitor trigger for all triggers on a repo - thus name to use for monitor is\n\tmonitorTriggerName := strings.TrimPrefix(gitServer+\"/\"+gitOwner+\"/\"+gitRepo, \"http://\")\n\tmonitorTriggerName = strings.TrimPrefix(monitorTriggerName, \"https://\")\n\n\tif eventListener != nil && eventListener.GetName() != \"\" {\n\t\t_, err := r.updateEventListener(eventListener, webhook, monitorTriggerName)\n\t\tif err != nil {\n\t\t\tmsg := fmt.Sprintf(\"error creating webhook due to error updating eventlistener: %s\", err)\n\t\t\tlogging.Log.Errorf(\"%s\", msg)\n\t\t\tRespondError(response, errors.New(msg), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tlogging.Log.Info(\"No existing eventlistener found, creating a new one...\")\n\t\t_, err := r.createEventListener(webhook, installNs, monitorTriggerName)\n\t\tif err != nil {\n\t\t\tmsg := fmt.Sprintf(\"error creating webhook due to error creating eventlistener. Error was: %s\", err)\n\t\t\tlogging.Log.Errorf(\"%s\", msg)\n\t\t\tRespondError(response, errors.New(msg), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\t_, varexists := os.LookupEnv(\"PLATFORM\")\n\t\tif !varexists {\n\t\t\terr = r.createDeleteIngress(\"create\", installNs)\n\t\t\tif err != nil {\n\t\t\t\tmsg := fmt.Sprintf(\"error creating webhook due to error creating ingress. Error was: %s\", err)\n\t\t\t\tlogging.Log.Errorf(\"%s\", msg)\n\t\t\t\tlogging.Log.Debugf(\"Deleting eventlistener as failed creating Ingress\")\n\t\t\t\terr2 := r.TriggersClient.TektonV1alpha1().EventListeners(installNs).Delete(eventListenerName, &metav1.DeleteOptions{})\n\t\t\t\tif err2 != nil {\n\t\t\t\t\tupdatedMsg := fmt.Sprintf(\"error creating webhook due to error creating ingress. Also failed to cleanup and delete eventlistener. Errors were: %s and %s\", err, err2)\n\t\t\t\t\tRespondError(response, errors.New(updatedMsg), http.StatusInternalServerError)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tRespondError(response, errors.New(msg), http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t} else {\n\t\t\t\tlogging.Log.Debug(\"ingress creation succeeded\")\n\t\t\t}\n\t\t} else {\n\t\t\tif err := r.createOpenshiftRoute(routeName); err != nil {\n\t\t\t\tlogging.Log.Debug(\"Failed to create Route, deleting EventListener...\")\n\t\t\t\terr2 := r.TriggersClient.TektonV1alpha1().EventListeners(installNs).Delete(eventListenerName, &metav1.DeleteOptions{})\n\t\t\t\tif err2 != nil {\n\t\t\t\t\tupdatedMsg := fmt.Sprintf(\"Error creating webhook due to error creating route. Also failed to cleanup and delete eventlistener. Errors were: %s and %s\", err, err2)\n\t\t\t\t\tRespondError(response, errors.New(updatedMsg), http.StatusInternalServerError)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tRespondError(response, err, http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(hooks) == 0 {\n\t\t// // Give the eventlistener a chance to be up and running or webhook ping\n\t\t// // will get a 503 and might confuse people (although resend will work)\n\t\tfor i := 0; i < 30; i = i + 1 {\n\t\t\ta, _ := r.K8sClient.Apps().Deployments(installNs).Get(routeName, metav1.GetOptions{})\n\t\t\treplicas := a.Status.ReadyReplicas\n\t\t\tif replicas > 0 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\ttime.Sleep(1 * time.Second)\n\t\t}\n\n\t\t// Create webhook\n\t\terr = r.AddWebhook(webhook, gitOwner, gitRepo)\n\t\tif err != nil {\n\t\t\terr2 := r.deleteFromEventListener(webhook.Name+\"-\"+webhook.Namespace, installNs, monitorTriggerName, webhook.GitRepositoryURL)\n\t\t\tif err2 != nil {\n\t\t\t\tupdatedMsg := fmt.Sprintf(\"error creating webhook. Also failed to cleanup and delete entry from eventlistener. Errors were: %s and %s\", err, err2)\n\t\t\t\tRespondError(response, errors.New(updatedMsg), http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tRespondError(response, err, http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tlogging.Log.Debug(\"webhook creation succeeded\")\n\t} else {\n\t\tlogging.Log.Debugf(\"webhook already exists for repository %s - not creating new hook in GitHub\", sanitisedURL)\n\t}\n\n\tresponse.WriteHeader(http.StatusCreated)\n}", "title": "" }, { "docid": "e16951ee3e6b0610bc18cb8a476568d8", "score": "0.5482191", "text": "func (m *WebhookPostData) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateData(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateEventType(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateReference(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateVersion(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "94a499441b04d3d621d4308d3cfbf4fb", "score": "0.54495746", "text": "func (lp *LoggingPayload) Validate() error {\n\tcatcher := grip.NewBasicCatcher()\n\tcatcher.NewWhen(lp.Data == nil, \"data cannot be empty\")\n\tswitch lp.Format {\n\tcase \"\", LoggingPayloadFormatBSON, LoggingPayloadFormatJSON, LoggingPayloadFormatString:\n\tdefault:\n\t\tcatcher.Errorf(\"invalid payload format '%s'\", lp.Format)\n\t}\n\treturn catcher.Resolve()\n}", "title": "" }, { "docid": "41a109c5fc3b649d4744334fcd72ff06", "score": "0.542662", "text": "func (h *Hook) Validate() error {\n\tif err := h.HookConfig.Validate(); err != nil {\n\t\treturn err\n\t}\n\n\tif h.Status < 0 {\n\t\treturn errors.New(\"hook status must be greater than or equal to 0\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c170d5ce7bc9ab20d75d6437213a4cda", "score": "0.54000634", "text": "func (requestHandler *RequestHandler) ValidateRequest(request events.APIGatewayProxyRequest) (structs.Request, structs.ErrorResponse) {\n\trequestBody := structs.Request{}\n\terr := json.Unmarshal([]byte(request.Body), &requestBody)\n\tif err != nil {\n\t\tlog.Printf(\"Got err: %s\", err)\n\t\tlog.Println(\"HERESON:\", request.Resource)\n\t\treturn structs.Request{}, structs.ErrorResponse{\n\t\t\tMessage: \"request body is not structured correctly. Please refer to the \" + HOSTED_DOCS_URL + mapToDocs[request.Resource] + \" page for information on how to structure the request body\",\n\t\t\tStatusCode: http.StatusBadRequest}\n\t}\n\n\tif requestBody.PageSize < 1 || requestBody.PageSize > maxPageSize {\n\t\trequestBody.PageSize = defaultPageSize\n\t}\n\n\tif requestBody.Page < 0 {\n\t\trequestBody.Page = 0\n\t}\n\n\tif requestBody.MaxQuotes < 0 || requestBody.MaxQuotes > maxQuotes {\n\t\trequestBody.MaxQuotes = maxQuotes\n\t}\n\n\tif requestBody.MaxQuotes <= 0 {\n\t\trequestBody.MaxQuotes = defaultMaxQuotes\n\t}\n\n\tconst layout = \"2006-01-02\"\n\tif requestBody.Minimum != \"\" {\n\n\t\t_, err := time.Parse(layout, requestBody.Minimum)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Got error when decoding: %s\", err)\n\t\t\treturn structs.Request{}, structs.ErrorResponse{\n\t\t\t\tMessage: fmt.Sprintf(\"the minimum date is not structured correctly, should be in %s format\", layout),\n\t\t\t\tStatusCode: http.StatusBadRequest}\n\t\t}\n\t}\n\n\tif requestBody.Maximum != \"\" {\n\n\t\tparseDate, err := time.Parse(layout, requestBody.Maximum)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Got error when decoding: %s\", err)\n\t\t\treturn structs.Request{}, structs.ErrorResponse{\n\t\t\t\tMessage: fmt.Sprintf(\"the maximum date is not structured correctly, should be in %s format\", layout),\n\t\t\t\tStatusCode: http.StatusBadRequest}\n\t\t}\n\t\trequestBody.Minimum = parseDate.Format(\"01-02-2006\")\n\t}\n\n\treturn requestBody, structs.ErrorResponse{}\n}", "title": "" }, { "docid": "2bdecaef5555e53a7d75d7c731de4eb5", "score": "0.5384207", "text": "func handleRequest(ctx context.Context, request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\tlog.Debug(\"### Event received \")\n\tvar buf bytes.Buffer\n\n\tif !checkMAC(request.Body, request.Headers[\"X-Spark-Signature\"], os.Getenv(\"HTTP_WEBHOOK_SECRET\")) {\n\t\tlog.Warnf(\"WARNING - MESSAGE RECEIVED WITH INVALID AUTH HEADER: \" + request.Headers[\"X-Spark-Signature\"])\n\t\treturn apiGatewayResponse(\"Invalid message signature\", 400, emptyHeader, \"\")\n\t}\n\n\tb := bytes.NewBufferString(request.Body)\n\n\tdecoder := json.NewDecoder(b)\n\tvar t = &webhookData{}\n\n\terr := decoder.Decode(&t)\n\tif err != nil {\n\t\treturn apiGatewayResponse(err.Error(), 400, emptyHeader, \"\")\n\t}\n\n\tattachment := &attachmentData{}\n\t// decode the data and return actionData\n\terr = attachment.decodeTeamsData(t.Data.ID)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// output := &outputEvent{}\n\terr = attachment.SendSQSEvent()\n\n\tif err != nil {\n\t\tlog.Errorf(\"#### ERRROR MAin: %s\\n\", err)\n\t\treturn apiGatewayResponse(err.Error(), 502, emptyHeader, \"\")\n\t}\n\n\tbody, _ := json.Marshal(map[string]interface{}{\n\t\t\"message\": \"accepted\",\n\t})\n\tjson.HTMLEscape(&buf, body)\n\n\treturn events.APIGatewayProxyResponse{\n\t\tStatusCode: 200,\n\t\tIsBase64Encoded: false,\n\t\tBody: buf.String(),\n\t\tHeaders: map[string]string{\n\t\t\t\"Content-Type\": \"application/json\",\n\t\t},\n\t}, nil\n\n}", "title": "" }, { "docid": "e329cdaa4b656a392d9dee9fdf7008a8", "score": "0.5376167", "text": "func (v Viber) Inquire(w http.ResponseWriter, r *http.Request) {\n\tvar req ViberRequest\n\n\tif err := json.NewDecoder(r.Body).Decode(&req); err != nil {\n\t\tswitch err {\n\t\tcase io.EOF:\n\t\t\tlog.Printf(\"EOF in json.Decoder: %v\\n\", err)\n\t\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\t\treturn\n\t\tdefault:\n\t\t\tlog.Printf(\"json.NewDecoder: %v\\n\", err)\n\t\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t}\n\n\tv.userToDB(req)\n\t// Does not look its necessary for webhook callbacks\n\tv.setToken(w.Header())\n\n\tswitch req.Event {\n\tcase \"webhook\":\n\t\tif err := json.NewEncoder(w).Encode(newRegResp()); err != nil {\n\t\t\tlog.Printf(\"web hook -> error: %v\\n\", err)\n\t\t\treturn\n\t\t}\n\t\tlog.Println(\"Webhook registration success.\")\n\n\t\treturn\n\tcase \"message\":\n\t\tlog.Printf(\"senderID: %s, SenderName: %s, Event: %s, Subscribed: %t, Timestamp: %d, MessageType: %s, \"+\n\t\t\t\"MsgText: %s, TrackingData: %v, Media:%v\\n\", req.Sender.ID, req.Sender.Name, req.Event, req.Subscribed,\n\t\t\treq.Timestamp, req.Message.Type, req.Message.Text, req.Message.TrackingData, req.Message.Media)\n\n\t\tuserChoice, err := strconv.Atoi(req.Message.Text)\n\t\tif err != nil && userChoice == 0 {\n\t\t\tif err := v.sendTextMsg(fmt.Sprintf(\"Εδάφιο για σένα:\\n\"+\n\t\t\t\t\"«εγένετο η βασιλεία του κόσμου του Κυρίου ημών και του Χριστού αυτού, και \"+\n\t\t\t\t\"βασιλεύσει εις τους αιώνας των αιώνων»Αποκ Ια:15\\n\\nΕίπατε %q\\n\", req.Message.Text), req.Sender.ID); err != nil {\n\t\t\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\t\t}\n\t\t} else {\n\t\t\tswitch userChoice {\n\t\t\tcase 1:\n\t\t\t\tif err := v.sendTextMsg(\"Αμήν σας περιμένουμε την Κυριακή στις 12:00μμ!\", req.Sender.ID); err != nil {\n\t\t\t\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\t\t\t}\n\t\t\tcase 2:\n\t\t\t\tif err := v.sendTextMsg(\"Αμήν σας περιμένουμε την Κυριακή στις 2:00μμ!\", req.Sender.ID); err != nil {\n\t\t\t\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\t\t\t}\n\t\t\tcase 3:\n\t\t\t\tif err := v.sendTextMsg(\"Είπατε Αμήν, μελετάτε καθημερινά την Αγία Γραφή και θα γευτείτε την ευλογία του Θεού!\", req.Sender.ID); err != nil {\n\t\t\t\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\t\t\t}\n\t\t\tcase 4:\n\t\t\t\tif err := v.sendTextMsg(\"Είπατε Αμήν, ο Χριστός θέλει και δύναται να σας ετοιμάσει να ζήσετε αιώνια μαζί του!\", req.Sender.ID); err != nil {\n\t\t\t\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn\n\n\tcase \"conversation_started\":\n\t\tif err := json.NewEncoder(w).Encode(newWelcomeMsg()); err != nil {\n\t\t\tlog.Printf(\"json.Encoder: %v\\n\", err)\n\t\t}\n\n\t\treturn\n\tcase \"unsubscribed\":\n\t\tlog.Println(\"Received unsubscribed msg:\", req)\n\tdefault:\n\t\tlog.Printf(\"unhandled event: %s, req: %v\\n\", req.Event, req)\n\t}\n}", "title": "" }, { "docid": "127454e0908c8b5ccf93fddcebd2ac6a", "score": "0.5363407", "text": "func (w *Webhook) Handle(response http.ResponseWriter, request *http.Request) {\n\tpayload, err := w.hook.Parse(request, listenEvents...)\n\tif err != nil {\n\t\tif errors.Is(err, ghwebhooks.ErrEventNotFound) {\n\t\t\tw.logger.Warnw(\"received unregistered github event\", \"error\", err)\n\t\t\tresponse.WriteHeader(http.StatusOK)\n\t\t} else {\n\t\t\tw.logger.Errorw(\"received malformed github event\", \"error\", err)\n\t\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\t}\n\t\treturn\n\t}\n\n\tswitch payload := payload.(type) {\n\tcase ghwebhooks.ReleasePayload:\n\t\tw.logger.Debugw(\"received release event\")\n\t\tgo w.a.ProcessReleaseEvent(&payload)\n\tcase ghwebhooks.PullRequestPayload:\n\t\tw.logger.Debugw(\"received pull request event\")\n\t\tgo w.a.ProcessPullRequestEvent(&payload)\n\tcase ghwebhooks.PushPayload:\n\t\tw.logger.Debugw(\"received push event\")\n\t\tgo w.a.ProcessPushEvent(&payload)\n\tcase ghwebhooks.IssuesPayload:\n\t\tw.logger.Debugw(\"received issues event\")\n\tcase ghwebhooks.RepositoryPayload:\n\t\tw.logger.Debugw(\"received repository event\")\n\t\tgo w.a.ProcessRepositoryEvent(&payload)\n\tdefault:\n\t\tw.logger.Warnw(\"missing handler\", \"payload\", payload)\n\t}\n\n\tresponse.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "39797b57da1427afe01936072d4dcb9f", "score": "0.5358581", "text": "func (wh *Webhook) ServeHTTP(w http.ResponseWriter, r *http.Request) {\n\tvar body []byte\n\tvar err error\n\tctx := r.Context()\n\n\tvar res Response\n\tif r.Body == nil {\n\t\terr = errors.New(\"request body is empty\")\n\t\tklog.Errorf(\"bad request: %w\", err)\n\t\tres = Errored(http.StatusBadRequest, err)\n\t\twh.writeResponse(w, res)\n\t\treturn\n\t}\n\n\tdefer r.Body.Close()\n\tif body, err = io.ReadAll(io.LimitReader(r.Body, MaxRespBodyLength)); err != nil {\n\t\tklog.Errorf(\"unable to read the body from the incoming request: %w\", err)\n\t\tres = Errored(http.StatusBadRequest, err)\n\t\twh.writeResponse(w, res)\n\t\treturn\n\t}\n\n\t// verify the content type is accurate\n\tif contentType := r.Header.Get(\"Content-Type\"); contentType != \"application/json\" {\n\t\terr = fmt.Errorf(\"contentType=%s, expected application/json\", contentType)\n\t\tklog.Errorf(\"unable to process a request with an unknown content type: %w\", err)\n\t\tres = Errored(http.StatusBadRequest, err)\n\t\twh.writeResponse(w, res)\n\t\treturn\n\t}\n\n\trequest := Request{}\n\tinterpreterContext := configv1alpha1.ResourceInterpreterContext{}\n\t// avoid an extra copy\n\tinterpreterContext.Request = &request.ResourceInterpreterRequest\n\t_, _, err = admissionCodecs.UniversalDeserializer().Decode(body, nil, &interpreterContext)\n\tif err != nil {\n\t\tklog.Errorf(\"unable to decode the request: %w\", err)\n\t\tres = Errored(http.StatusBadRequest, err)\n\t\twh.writeResponse(w, res)\n\t\treturn\n\t}\n\tklog.V(1).Infof(\"Received request UID: %q, kind: %s\", request.UID, request.Kind)\n\n\tres = wh.Handle(ctx, request)\n\twh.writeResponse(w, res)\n}", "title": "" }, { "docid": "a0f599ae8f0b55f69e4a6a15272f003d", "score": "0.53554595", "text": "func (m *Bot) HandleWebhookPost(w http.ResponseWriter, r *http.Request) {\n\tvar webhookData WebhookRequest\n\n\tdecoder := json.NewDecoder(r.Body)\n\terr := decoder.Decode(&webhookData)\n\tif err != nil {\n\t\thttp.Error(w, \"Error decoding request body\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tfor _, entry := range webhookData.Entries {\n\t\tfor _, messaging := range entry.Messagings {\n\t\t\tif messaging.Message != nil {\n\t\t\t\tgo func(msg Messaging) {\n\t\t\t\t\terr := m.messagingHandler(msg)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Println(\"Error executing messaging handler:\", err)\n\t\t\t\t\t}\n\t\t\t\t}(messaging)\n\t\t\t}\n\t\t}\n\t}\n\n\tw.WriteHeader(200)\n}", "title": "" }, { "docid": "c4561cabbcf9f44fae6effe4c6ede181", "score": "0.5351805", "text": "func (h *WebhookHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {\n\tstatus := 400\n\tdefer func() {\n\t\tw.WriteHeader(status)\n\t}()\n\n\tout := func(string, ...interface{}) {}\n\tif h.Debug {\n\t\tout = log.Printf\n\t}\n\n\tout(\"[DEBUG] Request received\\n\")\n\n\tif r.Method == \"POST\" {\n\t\tout(\"[DEBUG] Request method is POST\\n\")\n\n\t\tbufbody := new(bytes.Buffer)\n\t\tbufbody.ReadFrom(r.Body)\n\t\tbody := bufbody.Bytes()\n\n\t\t// Secretが設定されている場合は\"X-Sakura-Signature\"を検証\n\t\tif h.Secret != \"\" {\n\t\t\tsignature := r.Header.Get(\"X-Sakura-Signature\")\n\t\t\tif !h.verifySignature([]byte(h.Secret), signature, body) {\n\t\t\t\tstatus = 403\n\t\t\t\tout(\"[DEBUG] Invalid signature:%s\", signature)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t}\n\n\t\tout(\"[DEBUG] Request body:%s\\n\", string(body))\n\n\t\tvar payload Payload\n\t\terr := json.Unmarshal(body, &payload)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tif payload.IsChannelValue() {\n\t\t\tif h.HandleFunc == nil {\n\t\t\t\tout(\"[INFO] HandleFunc is nil\\n\")\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tgo h.HandleFunc(payload)\n\t\t}\n\n\t\tif payload.IsConnection() {\n\t\t\tif h.ConnectedFunc == nil {\n\t\t\t\tout(\"[INFO] ConnectedFunc is nil\\n\")\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tgo h.ConnectedFunc(payload)\n\t\t}\n\n\t\tstatus = 200\n\t} else {\n\t\tout(\"[DEBUG] Request method is not POST\\n\")\n\t}\n}", "title": "" }, { "docid": "5fdf7ded498c349d2ad858dbcc73beaa", "score": "0.530067", "text": "func (qw *QuayWebhook) Run() {\n\n\thttp.HandleFunc(\"/webhook\", func(w http.ResponseWriter, r *http.Request) {\n\t\tif r.Method == http.MethodPost {\n\t\t\tlog.Info(\"Quay webhook incoming!\")\n\t\t\tqr := &QuayRepo{}\n\t\t\tjson.NewDecoder(r.Body).Decode(qr)\n\t\t\tfor _, registry := range qw.registryAuths {\n\t\t\t\tif strings.Contains(qr.DockerURL, registry.URL) && len(registry.Token) > 0 {\n\t\t\t\t\tqw.webhook(registry.Token, qr)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t})\n\n\tif len(qw.certificate) > 0 && len(qw.certificateKey) > 0 {\n\t\terrC := ioutil.WriteFile(\"cert\", []byte(qw.certificate), 0644)\n\t\terrK := ioutil.WriteFile(\"key\", []byte(qw.certificateKey), 0644)\n\t\tif errC != nil || errK != nil {\n\t\t\tlog.Errorf(\"Webhook: Writing to a certificate file failed %e %e\", errC, errK)\n\t\t} else {\n\t\t\tlog.Infof(\"Webhook: Starting HTTPs webhook with TLS enabled for quay on :3002 at /webhook\")\n\t\t\terr := http.ListenAndServeTLS(\":3002\", \"cert\", \"key\", nil)\n\t\t\tif err != nil {\n\t\t\t\tlog.Errorf(\"Webhook: HTTPs listener on port 3002 failed: %e\", err)\n\t\t\t}\n\t\t}\n\t} else {\n\t\tlog.Infof(\"Webhook: starting HTTP webhook for quay on :3002 at /webhook\")\n\t\terr := http.ListenAndServe(\":3002\", nil)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Webhook: HTTP listener on port 3002 failed: %e\", err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3acd72a196f63f69c5ea26886506b090", "score": "0.5295559", "text": "func (whsvr *WebhookServer) serve(w http.ResponseWriter, r *http.Request) {\n\tvar body []byte\n\tif r.Body != nil {\n\t\tif data, err := ioutil.ReadAll(r.Body); err == nil {\n\t\t\tbody = data\n\t\t}\n\t}\n\tif len(body) == 0 {\n\t\tlog.Print(\"empty body\")\n\t\thttp.Error(w, \"empty body\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// verify the content type is accurate\n\tcontentType := r.Header.Get(\"Content-Type\")\n\tif contentType != \"application/json\" {\n\t\tlog.Printf(\"Content-Type=%s, expect application/json\", contentType)\n\t\thttp.Error(w, \"invalid Content-Type, expect `application/json`\", http.StatusUnsupportedMediaType)\n\t\treturn\n\t}\n\n\tvar admissionResponse *v1beta1.AdmissionResponse\n\tar := v1beta1.AdmissionReview{}\n\tif _, _, err := deserializer.Decode(body, nil, &ar); err != nil {\n\t\tlog.Printf(\"Can't decode body: %v\", err)\n\t\tadmissionResponse = &v1beta1.AdmissionResponse{\n\t\t\tResult: &metav1.Status{\n\t\t\t\tMessage: err.Error(),\n\t\t\t},\n\t\t}\n\t} else {\n\t\tif r.URL.Path == \"/mutate\" {\n\t\t\tadmissionResponse = whsvr.mutate(&ar)\n\t\t}\n\t}\n\n\tadmissionReview := v1beta1.AdmissionReview{}\n\tif admissionResponse != nil {\n\t\tadmissionReview.Response = admissionResponse\n\t\tif ar.Request != nil {\n\t\t\tadmissionReview.Response.UID = ar.Request.UID\n\t\t}\n\t}\n\n\tresp, err := json.Marshal(admissionReview)\n\tif err != nil {\n\t\tlog.Printf(\"Can't encode response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not encode response: %v\", err), http.StatusInternalServerError)\n\t}\n\n\tif _, err := w.Write(resp); err != nil {\n\t\tlog.Printf(\"Can't write response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not write response: %v\", err), http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "e5c76c40063aa21312aebc14a905883a", "score": "0.52939266", "text": "func (h *Handler) Validate() error {\n\n\tif h.crowdsec == nil {\n\t\treturn errors.New(\"crowdsec app not available\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9ac572c5f5717d304ee4cec37875b2c3", "score": "0.5283134", "text": "func (Vars *EnvVars) ProcWebHook(resp http.ResponseWriter, req *http.Request) {\n\tif req.Method != \"POST\" {\n\t\thttp.Error(resp, \"Method is not supported. Should be a post with json body.\", http.StatusNotFound)\n\t\treturn\n\t}\n\tWebHookData := new(WebhookData)\n\terr := json.NewDecoder(req.Body).Decode(&WebHookData)\n\tif err != nil {\n\t\tlogger.Infof(\"Could not decode webhook data: %v\", err.Error())\n\t\thttp.Error(resp, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\tif WebHookData.ObjectKind == \"push\" {\n\t\tRefsSplitted := strings.Split(WebHookData.Ref, \"/\")\n\t\tvar PipelineID int\n\t\tBranchName := RefsSplitted[len(RefsSplitted)-1]\n\t\tgitFile := CheckIfMonitored(Vars, BranchName)\n\t\tStarterEmail := fmt.Sprintf(\"%s@%s\", WebHookData.UserUsername, Vars.MailDomain)\n\t\tif gitFile.Prometheus {\n\t\t\tlogger.Infof(\"Branch %s is monitored by prometheus, starting prometheus pipeline.\", BranchName)\n\t\t\tPipelineID = RunPipeline(Vars, BranchName, *gitFile, \"prometheus\")\n\t\t\tPipelineIDAsString := fmt.Sprintf(\"%v\", PipelineID)\n\t\t\tPipelineData := PipelineData{\n\t\t\t\tStarter: StarterEmail,\n\t\t\t\tBranch: BranchName,\n\t\t\t\tID: PipelineIDAsString,\n\t\t\t}\n\t\t\tVars.Cache.Set(PipelineIDAsString, PipelineData, cache.DefaultExpiration)\n\t\t\tlogger.Infof(\"User %s started prometheus pipeline %s\", StarterEmail, PipelineIDAsString)\n\t\t} else {\n\t\t\tlogger.Infof(\"Branch %s is not monitored by prometheus, bypassing.\", BranchName)\n\t\t}\n\t\tif gitFile.Operator {\n\t\t\tlogger.Infof(\"Branch %s is monitored by prometheus operator, starting prometheus operator pipeline.\", BranchName)\n\t\t\tPipelineID = RunPipeline(Vars, BranchName, *gitFile, \"operator\")\n\t\t\tPipelineIDAsString := fmt.Sprintf(\"%v\", PipelineID)\n\t\t\tPipelineData := PipelineData{\n\t\t\t\tStarter: StarterEmail,\n\t\t\t\tBranch: BranchName,\n\t\t\t\tID: PipelineIDAsString,\n\t\t\t}\n\t\t\tVars.Cache.Set(PipelineIDAsString, PipelineData, cache.DefaultExpiration)\n\t\t\tlogger.Infof(\"User %s started prometheus operator pipeline %s\", StarterEmail, PipelineIDAsString)\n\t\t} else {\n\t\t\tlogger.Infof(\"Branch %s is not monitored by prometheus operator, bypassing.\", BranchName)\n\t\t}\n\t} else if WebHookData.ObjectKind == \"pipeline\" {\n\t\tPipelineStatus := WebHookData.ObjectAttributes.Status\n\t\tlogger.Infof(\"Pipeline status changed: %s\", PipelineStatus)\n\t\tif PipelineStatus == \"failed\" {\n\t\t\tPipelineIDAsString := fmt.Sprintf(\"%v\", WebHookData.ObjectAttributes.ID)\n\t\t\tP, found := Vars.Cache.Get(PipelineIDAsString)\n\t\t\tif found {\n\t\t\t\tPipelineData := PipelineData{}\n\t\t\t\tPipelineData.ProjectURL = WebHookData.Project.WebURL\n\t\t\t\tmapstructure.Decode(P, &PipelineData)\n\t\t\t\tlogger.Infof(\"Found data in cache: user %s started pipline %s\", PipelineData.Starter, PipelineIDAsString)\n\t\t\t\tsendMail(Vars, PipelineData)\n\t\t\t} else {\n\t\t\t\tPipelineData := PipelineData{\n\t\t\t\t\tStarter: Vars.DefaultMail,\n\t\t\t\t\tBranch: \"master\",\n\t\t\t\t\tID: PipelineIDAsString,\n\t\t\t\t\tProjectURL: WebHookData.Project.WebURL,\n\t\t\t\t}\n\t\t\t\tsendMail(Vars, PipelineData)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "7f1c687079b7b08eae96336aeb3eddee", "score": "0.5277616", "text": "func (s *IdentityWebhook) GetURI() string { return \"/identity-validation\" }", "title": "" }, { "docid": "193403924bddf483218d79e924522189", "score": "0.52766466", "text": "func (p ActionWebhookProperty) Verify() error {\n\tswitch p.Method {\n\tcase http.MethodPost, http.MethodPut:\n\tdefault:\n\t\tif p.Body != \"\" {\n\t\t\treturn fmt.Errorf(\"%s method does not use body field [%s]\", p.Method, p.Body)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "486d3eb2828ec2f78994295e18afe7ce", "score": "0.5272593", "text": "func (c *HTLCSettleRequest) Validate() error {\n\t// We're good!\n\treturn nil\n}", "title": "" }, { "docid": "476d03a87155a23cf106b3d7496d933f", "score": "0.5271465", "text": "func (ut *userPayload) Validate() (err error) {\n\tif ut.Bio != nil {\n\t\tif len(*ut.Bio) > 500 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`response.bio`, *ut.Bio, len(*ut.Bio), 500, false))\n\t\t}\n\t}\n\tif ut.Email != nil {\n\t\tif err2 := goa.ValidateFormat(goa.FormatEmail, *ut.Email); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`response.email`, *ut.Email, goa.FormatEmail, err2))\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "f61ac5d915f58d10348f44627966dd5d", "score": "0.5263981", "text": "func (m *FlowCheckResponse) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "952ab4ca771acc479306add7b72d9677", "score": "0.5261299", "text": "func PaypalWebhook(c *paypal.Client, w http.ResponseWriter, r *http.Request) {\n\n\tw.Header().Set(\"Content-Type\", \"text/html; charset=utf-8\")\n\tdefer r.Body.Close()\n\n\tif r.Method == \"POST\" {\n\n\t\t// Need to pass request onto PayPal for verification\n\t\t// Read the content for local processing, and then reset the io.ReadCloser\n\t\tvar jsonBytes []byte\n\t\tif r.Body != nil {\n\t\t jsonBytes, _ = ioutil.ReadAll(r.Body)\n\t\t}\n\t\t// Restore the io.ReadCloser to its original state\n\t\tr.Body = ioutil.NopCloser(bytes.NewBuffer(jsonBytes))\n\n\t\t// Decode JSON\n\t\tvar transaction paypalevent\n\n\t\td := json.NewDecoder(bytes.NewReader(jsonBytes))\n\t\td.DisallowUnknownFields() // catch unwanted fields\n\t\terr := d.Decode(&transaction)\n\t\t\n\t\tif err != nil {\n\t\t\t//panic(err)\n\t\t\tlog.Print(err)\n\t\t\tlog.Print(\"\\033[31m Received POST, unable to decode into JSON. See log.\\033[0m\");\n\t\t\treturn\n\t\t}\n\t\t\n\t\t//Attempt to check event type of transaction\n\t\tevent_type := transaction.Event.EventType\n\t\tif event_type == \"\" {log.Print(\"\\033[31mReceived Malformed POST request. Ignoring.\\033[0m\"); return}\n\n\t\tevent_id := transaction.Event.ID\n\t\tif event_id == \"\" {log.Print(\"\\033[31mCannot find event id for PayPal Event.\\033[0m\"); return}\n\n\t\tlog.Print(\"\\033[34mNew \",event_type,\" Transaction Received: \", event_id ,\"\\033[0m\")\n\n\t\t//We expect to receive a CHECKOUT ORDER APPROVED EVENT\n\t\tif event_type == \"CHECKOUT.ORDER.APPROVED\" {\n\t\t \n\t\t \t//Get Account and Amount\n\t\t \tvar tr TransactionResource;\n\t\t\terr := json.Unmarshal(transaction.Resource, &tr)\n\t\t\tif err != nil {\n\t\t\t\tlog.Print(err)\n\t\t\t\tlog.Print(\"\\033[31mUnable to decode resource into JSON. See log.\\033[0m\");\n\t\t\t\treturn;\n\t\t\t}\n\n\t\t\tvar account string;\n\t\t\tvar amount float64;\n\t\t\taccount, amount, err = getAccountAndAmount(tr)\n\n\t\t\tif err != nil{\n\t\t \tlog.Print(err)\n\t\t \tlog.Print(\"\\033[31mAn error occured while reading Webhook Content for \",event_id,\", see log.\\033[0m\");\n\t\t \treturn;\n\t\t }\n\n\t\t //Verify\n\t\t var v bool;\n\n\t\t v, err = verifyPaypalEvent(c,r,orderApprovedWebhookID,event_id)\n\t\t if v {\n\t\t \t//DB Update\n\t\t \tlog.Print(\"\\033[35mDB Update Required\\n\",\"Add \", amount, \" to \", account,\".\\033[0m\");\n\n\t\t } else{\n\t\t \tlog.Print(err)\n\t\t \tlog.Print(\"\\033[31mVerification error received for \",event_id,\", see log.\\033[0m\");\n\t\t \treturn;\n\t\t }\n\n\t\t} else { \n\t\t\t//If you receive this message, it means you need to implement a new branching condition for \n\t\t\t//}else if event_type == \"XXX\"{}\n\t\t\tlog.Print(\"Unrecognized event type: \", event_type)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e05db012b2bd6e6b416be0b224fee438", "score": "0.5259748", "text": "func (whsvr *WebhookServer) validate(ar *v1beta1.AdmissionReview, response *v1beta1.AdmissionResponse) {\n\treq := ar.Request\n\n\tglog.Infof(\"AdmissionReview for Kind=%v, Name=%v UID=%v Operation=%v UserInfo=%v\",\n\t\treq.Kind, req.Name, req.UID, req.Operation, req.UserInfo)\n\n\t// DELETE operation for example is currently not supported\n\tswitch req.Operation {\n\t// Validate both CREATE and UPDATE operations, as UPDATE may bring invalid fields too\n\tcase \"CREATE\", \"UPDATE\":\n\t\t// Currently, Kinds other than PodSecurityPolicy are not supported\n\t\tswitch req.Kind.Kind {\n\t\tcase \"PodSecurityPolicy\":\n\t\t\t// Parse received object, to make sure it's correct\n\t\t\tvar object policyv1beta1.PodSecurityPolicy\n\t\t\tif err := json.Unmarshal(req.Object.Raw, &object); err != nil {\n\t\t\t\tglog.Errorf(\"Could not unmarshal raw object: %v\", err)\n\t\t\t\tresponse.Result.Message = err.Error()\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// If object is correct, we can execute queries on it\n\t\t\tif err := whsvr.validator.Validate(string(req.UID), req.Kind.Kind, object); err != nil {\n\t\t\t\tresponse.Result.Message = err.Error()\n\t\t\t\treturn\n\t\t\t}\n\t\tdefault:\n\t\t\tglog.Errorf(\"Kind=%v not supported\", req.Kind.Kind)\n\t\t\tresponse.Result.Message = \"Kind not supported\"\n\t\t\treturn\n\t\t}\n\tdefault:\n\t\tglog.Errorf(\"Operation=%s not supported\", req.Operation)\n\t\tresponse.Result.Message = \"Operation not supported\"\n\t\treturn\n\t}\n\n\tresponse.Allowed = true\n}", "title": "" }, { "docid": "c8f5c43919d187730afae0f1e5aefaa0", "score": "0.5250848", "text": "func (p *FrameRequestStream) Validate() (err error) {\n\tif p.body.Len() < minRequestStreamFrameLen {\n\t\terr = errIncompleteFrame\n\t}\n\treturn\n}", "title": "" }, { "docid": "08138190dd1f34322f865a650de1ed9f", "score": "0.5242725", "text": "func (ut *FilterTodoPayload) Validate() (err error) {\n\n\treturn\n}", "title": "" }, { "docid": "b06a4174a53a4ea1ecb57ed1c80d0499", "score": "0.5239794", "text": "func (v *Validator) Validate(structure interface{}) error {\n\t// Use the ShellHub package validator to validate the request body.\n\tif ok, err := v.validator.Struct(structure); !ok {\n\t\tfields, err := validator.GetInvalidFieldsFromErr(structure, err)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn errors.NewErrInvalidEntity(fields)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "46da20d8e94723380de9db98c77e6622", "score": "0.52386385", "text": "func TestWebhook_Invoke(t *testing.T) {\n\tts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tif r.Method != \"POST\" {\n\t\t\thttp.Error(w, \"Only POST\", http.StatusBadRequest)\n\t\t} else {\n\t\t\twh := Webhook{}\n\t\t\terr := json.NewDecoder(r.Body).Decode(&wh)\n\t\t\tif err != nil {\n\t\t\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif wh.CurrentRate != float32(9.5348) {\n\t\t\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}))\n\tdefer ts.Close()\n\n\twh := Webhook{\n\t\tWebhookURL: ts.URL,\n\t\tBaseCurrency: \"USD\",\n\t\tTargetCurrency: \"NOK\",\n\t\tCurrentRate: 9.5348,\n\t\tMinTriggerValue: 0.2,\n\t\tMaxTriggerValue: 1.3,\n\t}\n\n\terr := wh.Invoke()\n\tif err != nil {\n\t\tt.Errorf(\"Invoke failed: %s\", err.Error())\n\t}\n}", "title": "" }, { "docid": "5886ee1e9766ff56fc8cc6c9e36fc286", "score": "0.5235049", "text": "func slackServer(w http.ResponseWriter, r *http.Request){\n\trequestBody, err:= ioutil.ReadAll(r.Body)\n\tif err!=nil{\n\t\tlog.Printf(\"Encountered %v while reading the http response body\",err)\n\t\thttp.Error(w, \"Couldn't read the response body\", http.StatusBadRequest)\n\t}\n\t\n\tvar request product.ReqBody\n\terr=json.Unmarshal(requestBody, &request)\n\tif err!=nil{\n\t\tlog.Fatal(err)\n\t}\n\t\n\tif request.Type==\"url_verification\"{\n\t\thandleChallenge(request.Challenge,w)\n\t}else if request.Type==\"event_callback\"{\n\t\tw.WriteHeader(http.StatusOK) //Responding to Slack with status OK 200\n\t\thandleEventCallBack(&request)\n\t}\n}", "title": "" }, { "docid": "2600706d7082bb87942278c486d0fced", "score": "0.5214437", "text": "func handleMailchimpWebhookPing(w http.ResponseWriter, r *http.Request) {\n\tif validateSecret(w, r) {\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusNoContent)\n\tw.Write(nil)\n}", "title": "" }, { "docid": "697e3e67532b26d413ed00e558e8b993", "score": "0.5213977", "text": "func handler(w http.ResponseWriter, r *http.Request) {\n\tctx := appengine.NewContext(r)\n\n\t// Read the entire request body\n\tdefer r.Body.Close()\n\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\thttp.Error(w, \"Failed to read request body\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\t// Validate the request against all configured secrets\n\tvalid := len(githubSecrets) == 0\n\tfor _, secret := range githubSecrets {\n\t\t// Generate the desired checksum with the current secret\n\t\tmacer := hmac.New(sha1.New, secret)\n\t\tmacer.Write(body)\n\t\tmacer.Sum(nil)\n\n\t\t// Compare it against the sent header\n\t\tif header, ok := r.Header[\"X-Hub-Signature\"]; ok {\n\t\t\tchecksum := strings.TrimPrefix(header[0], \"sha1=\")\n\t\t\tif checksum == fmt.Sprintf(\"%x\", macer.Sum(nil)) {\n\t\t\t\tvalid = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\tif !valid {\n\t\thttp.Error(w, \"Unauthorized request\", http.StatusUnauthorized)\n\t\treturn\n\t}\n\t// Decode any GitHub event, and check for outside \"opened\" or \"created\" actions exclusively\n\te := new(Event)\n\tif err := json.Unmarshal(body, e); err != nil {\n\t\thttp.Error(w, \"Invalid GitHub event\", http.StatusBadRequest)\n\t\treturn\n\t}\n\tif e.Sender.Login == githubUser {\n\t\treturn\n\t}\n\tif (e.Action != \"opened\" || e.PullRequest == nil) && (e.Action != \"created\" || e.Issue == nil) {\n\t\thttp.Error(w, \"Unsupported method\", http.StatusMethodNotAllowed)\n\t\treturn\n\t}\n\t// Create an authenticated GitHub client\n\tauth := oauth2.NewClient(ctx, oauth2.StaticTokenSource(\n\t\t&oauth2.Token{AccessToken: githubToken},\n\t))\n\tclient := github.NewClient(auth)\n\n\t// Handle the event, depending whether creation or comment\n\tswitch e.Action {\n\tcase \"opened\":\n\t\t// A new issue or pull request was opened, add an empty status report to it\n\t\twarning := \"\"\n\t\tif e.PullRequest.Base.Branch == \"master\" {\n\t\t\twarning = \"Pull request against `master`\"\n\t\t}\n\t\treport := status(warning, nil, nil)\n\t\tif _, _, err := client.Issues.CreateComment(e.Repository.Owner.Login, e.Repository.Name, e.PullRequest.Number, &github.IssueComment{Body: &report}); err != nil {\n\t\t\thttp.Error(w, fmt.Sprintf(\"Failed to comment on issue: %v\", err), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\tcase \"created\":\n\t\t// A comment was added, gather all reactions\n\t\tcomments, _, err := client.Issues.ListComments(e.Repository.Owner.Login, e.Repository.Name, e.Issue.Number, &github.IssueListCommentsOptions{Sort: \"created\"})\n\t\tif err != nil {\n\t\t\thttp.Error(w, fmt.Sprintf(\"Failed to list comments: %v\", err), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\t// Aggregate the votes from every comment and retain any warning messages\n\t\tvotes, reactions := aggregate(comments)\n\n\t\twarning := \"\"\n\t\tfor _, comment := range comments {\n\t\t\tif *comment.User.Login == githubUser {\n\t\t\t\tif matches := regexp.MustCompile(\":exclamation: (.*) :exclamation:\").FindAllStringSubmatch(comment.String(), -1); len(matches) > 0 {\n\t\t\t\t\twarning = matches[0][1]\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\t// Generate a fresh status report and edit the old one\n\t\treport := status(warning, votes, reactions)\n\t\tfor _, comment := range comments {\n\t\t\tif *comment.User.Login == githubUser {\n\t\t\t\tif _, _, err := client.Issues.EditComment(e.Repository.Owner.Login, e.Repository.Name, *comment.ID, &github.IssueComment{Body: &report}); err != nil {\n\t\t\t\t\thttp.Error(w, fmt.Sprintf(\"Failed to update issue report: %v\", err), http.StatusInternalServerError)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "335076336218326b142cd5a44c8d4e34", "score": "0.5190798", "text": "func (m *CallbackRequest) Validate() error {\n\treturn m.validate(false)\n}", "title": "" }, { "docid": "662dcad4f430ad40dd39a0bcbb8520a1", "score": "0.5183483", "text": "func (m *HealthCheckRequest) Validate() error {\n\treturn m.validate(false)\n}", "title": "" }, { "docid": "34972cd77388a3b773f04a5af0343ef5", "score": "0.5173249", "text": "func (nophandler) ReadRequest(_ *http.Request, _ context.Context) error { return nil }", "title": "" }, { "docid": "cf3057758703006fec242a50a991b439", "score": "0.51606035", "text": "func checkRequest(r *http.Request) bool {\n\treturn r.Header.Get(\"Accept\") == \"text/event-stream\"\n}", "title": "" }, { "docid": "801a36c43a3e09ed94bb189d5eb6ae73", "score": "0.5155127", "text": "func (a AddEventRequest) Validate() error {\n\tif err := common.Validate(a); err != nil {\n\t\treturn err\n\t}\n\n\t// BaseReading has the skip(\"-\") validation annotation for BinaryReading and SimpleReading\n\t// Otherwise error will occur as only one of them exists\n\t// Therefore, need to validate the nested BinaryReading and SimpleReading struct here\n\tfor _, r := range a.Event.Readings {\n\t\tif err := r.Validate(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1210229726e533fc7ca0cab24d5affaf", "score": "0.515064", "text": "func (h *OauthStartHandler) validatePayload(p interface{}) (bool, store.TwitchUser) {\n\tpayload, ok := p.(string)\n\tif !ok {\n\t\treturn false, 0\n\t}\n\tif payload == \"streamer\" {\n\t\treturn true, store.Streamer\n\t}\n\tif payload == \"bot\" {\n\t\treturn true, store.Bot\n\t}\n\treturn false, 0\n}", "title": "" }, { "docid": "2ee8fdf738272344a6329d72addbd811", "score": "0.5148892", "text": "func (whsvr *WebhookServer) serve(w http.ResponseWriter, r *http.Request) {\n\tvar body []byte\n\tif r.Body != nil {\n\t\tif data, err := ioutil.ReadAll(r.Body); err == nil {\n\t\t\tbody = data\n\t\t}\n\t}\n\tif len(body) == 0 {\n\t\tglog.Error(\"empty body\")\n\t\thttp.Error(w, \"empty body\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// verify the content type is accurate\n\tcontentType := r.Header.Get(\"Content-Type\")\n\tif contentType != \"application/json\" {\n\t\tglog.Errorf(\"Content-Type=%s, expect application/json\", contentType)\n\t\thttp.Error(w, \"invalid Content-Type, expect `application/json`\", http.StatusUnsupportedMediaType)\n\t\treturn\n\t}\n\n\tvar admissionResponse *v1.AdmissionResponse\n\tar := v1.AdmissionReview{}\n\tif _, _, err := deserializer.Decode(body, nil, &ar); err != nil {\n\t\tglog.Errorf(\"Can't decode body: %v\", err)\n\t\tadmissionResponse = &v1.AdmissionResponse{\n\t\t\tResult: &metav1.Status{\n\t\t\t\tMessage: err.Error(),\n\t\t\t},\n\t\t}\n\t} else {\n\t\tadmissionResponse = whsvr.mutate(&ar)\n\t}\n\n\tadmissionReview := v1.AdmissionReview{}\n\tif admissionResponse != nil {\n\t\tadmissionReview.Response = admissionResponse\n\t\tif ar.Request != nil {\n\t\t\tadmissionReview.Response.UID = ar.Request.UID\n\t\t}\n\t}\n\n\tresp, err := json.Marshal(admissionReview)\n\tif err != nil {\n\t\tglog.Errorf(\"Can't encode response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not encode response: %v\", err), http.StatusInternalServerError)\n\t}\n\tglog.Infof(\"Ready to write reponse ...\")\n\tif _, err := w.Write(resp); err != nil {\n\t\tglog.Errorf(\"Can't write response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not write response: %v\", err), http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "fc2909c757c741545a78c8271cd91da3", "score": "0.5147328", "text": "func (w *Webhook) validate(mode Mode) ([]Warning, error) {\n\tif mode != ComboMode && mode != NotifierMode {\n\t\treturn nil, nil\n\t}\n\tvar ws []Warning\n\tif _, err := url.Parse(w.Target); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to parse target url: %w\", err)\n\t}\n\n\t// Require trailing slash so url.Parse() can easily append notification id.\n\tif !strings.HasSuffix(w.Callback, \"/\") {\n\t\tw.Callback = w.Callback + \"/\"\n\t\tws = append(ws, Warning{\n\t\t\tpath: \".callback\",\n\t\t\tmsg: `URL should end in a \"/\"`,\n\t\t})\n\t}\n\n\tif _, err := url.Parse(w.Callback); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to parse callback url: %w\", err)\n\t}\n\tls, err := w.lint()\n\tws = append(ws, ls...)\n\tif err != nil {\n\t\treturn ws, err\n\t}\n\treturn ws, nil\n}", "title": "" }, { "docid": "f262ba78a359720893e8c032022be76e", "score": "0.5146887", "text": "func (whsvr *WebhookServer) serve(w http.ResponseWriter, r *http.Request) {\n\tvar body []byte\n\tif r.Body != nil {\n\t\tif data, err := ioutil.ReadAll(r.Body); err == nil {\n\t\t\tbody = data\n\t\t}\n\t}\n\tif len(body) == 0 {\n\t\tglog.Error(\"empty body\")\n\t\thttp.Error(w, \"empty body\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// verify the content type is accurate\n\tcontentType := r.Header.Get(\"Content-Type\")\n\tif contentType != \"application/json\" {\n\t\tglog.Errorf(\"Content-Type=%s, expect application/json\", contentType)\n\t\thttp.Error(w, \"invalid Content-Type, expect `application/json`\", http.StatusUnsupportedMediaType)\n\t\treturn\n\t}\n\n\tvar admissionResponse *v1beta1.AdmissionResponse\n\tar := v1beta1.AdmissionReview{}\n\tif _, _, err := deserializer.Decode(body, nil, &ar); err != nil {\n\t\tglog.Errorf(\"Can't decode body: %v\", err)\n\t\tadmissionResponse = &v1beta1.AdmissionResponse{\n\t\t\tResult: &metav1.Status{\n\t\t\t\tMessage: err.Error(),\n\t\t\t},\n\t\t}\n\t} else {\n\t\tadmissionResponse = whsvr.mutate(&ar)\n\t}\n\n\tadmissionReview := v1beta1.AdmissionReview{}\n\tif admissionResponse != nil {\n\t\tadmissionReview.Response = admissionResponse\n\t\tif ar.Request != nil {\n\t\t\tadmissionReview.Response.UID = ar.Request.UID\n\t\t}\n\t}\n\n\tresp, err := json.Marshal(admissionReview)\n\tif err != nil {\n\t\tglog.Errorf(\"Can't encode response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not encode response: %v\", err), http.StatusInternalServerError)\n\t}\n\tglog.Infof(\"Ready to write reponse ...\")\n\tif _, err := w.Write(resp); err != nil {\n\t\tglog.Errorf(\"Can't write response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not write response: %v\", err), http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "f262ba78a359720893e8c032022be76e", "score": "0.5146887", "text": "func (whsvr *WebhookServer) serve(w http.ResponseWriter, r *http.Request) {\n\tvar body []byte\n\tif r.Body != nil {\n\t\tif data, err := ioutil.ReadAll(r.Body); err == nil {\n\t\t\tbody = data\n\t\t}\n\t}\n\tif len(body) == 0 {\n\t\tglog.Error(\"empty body\")\n\t\thttp.Error(w, \"empty body\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// verify the content type is accurate\n\tcontentType := r.Header.Get(\"Content-Type\")\n\tif contentType != \"application/json\" {\n\t\tglog.Errorf(\"Content-Type=%s, expect application/json\", contentType)\n\t\thttp.Error(w, \"invalid Content-Type, expect `application/json`\", http.StatusUnsupportedMediaType)\n\t\treturn\n\t}\n\n\tvar admissionResponse *v1beta1.AdmissionResponse\n\tar := v1beta1.AdmissionReview{}\n\tif _, _, err := deserializer.Decode(body, nil, &ar); err != nil {\n\t\tglog.Errorf(\"Can't decode body: %v\", err)\n\t\tadmissionResponse = &v1beta1.AdmissionResponse{\n\t\t\tResult: &metav1.Status{\n\t\t\t\tMessage: err.Error(),\n\t\t\t},\n\t\t}\n\t} else {\n\t\tadmissionResponse = whsvr.mutate(&ar)\n\t}\n\n\tadmissionReview := v1beta1.AdmissionReview{}\n\tif admissionResponse != nil {\n\t\tadmissionReview.Response = admissionResponse\n\t\tif ar.Request != nil {\n\t\t\tadmissionReview.Response.UID = ar.Request.UID\n\t\t}\n\t}\n\n\tresp, err := json.Marshal(admissionReview)\n\tif err != nil {\n\t\tglog.Errorf(\"Can't encode response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not encode response: %v\", err), http.StatusInternalServerError)\n\t}\n\tglog.Infof(\"Ready to write reponse ...\")\n\tif _, err := w.Write(resp); err != nil {\n\t\tglog.Errorf(\"Can't write response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not write response: %v\", err), http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "cb0a73270e9c94f7dc3379f3657d16b6", "score": "0.51434237", "text": "func (whsvr *WebhookServer) serve(w http.ResponseWriter, r *http.Request) {\n\tvar body []byte\n\tif r.Body != nil {\n\t\tif data, err := ioutil.ReadAll(r.Body); err == nil {\n\t\t\tbody = data\n\t\t}\n\t}\n\tif len(body) == 0 {\n\t\tglog.Error(\"empty body\")\n\t\thttp.Error(w, \"empty body\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// verify the content type is accurate\n\tcontentType := r.Header.Get(\"Content-Type\")\n\tif contentType != \"application/json\" {\n\t\tglog.Errorf(\"Content-Type=%s, expect application/json\", contentType)\n\t\thttp.Error(w, \"invalid Content-Type, expect `application/json`\", http.StatusUnsupportedMediaType)\n\t\treturn\n\t}\n\n\tvar admissionResponse *v1beta1.AdmissionResponse\n\tar := v1beta1.AdmissionReview{}\n\tif _, _, err := deserializer.Decode(body, nil, &ar); err != nil {\n\t\tglog.Errorf(\"Can't decode body: %v\", err)\n\t\tadmissionResponse = &v1beta1.AdmissionResponse {\n\t\t\tResult: &metav1.Status {\n\t\t\t\tMessage: err.Error(),\n\t\t\t},\n\t\t}\n\t} else {\n\t\tadmissionResponse = whsvr.mutate(&ar)\n\t}\n\n\tadmissionReview := v1beta1.AdmissionReview{}\n\tif admissionResponse != nil {\n\t\tadmissionReview.Response = admissionResponse\n\t\tif ar.Request != nil {\n\t\t\tadmissionReview.Response.UID = ar.Request.UID\n\t\t}\n\t}\n\n\tresp, err := json.Marshal(admissionReview)\n\tif err != nil {\n\t\tglog.Errorf(\"Can't encode response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not encode response: %v\", err), http.StatusInternalServerError)\n\t}\n\tglog.Infof(\"Ready to write reponse ...\")\n\tif _, err := w.Write(resp); err != nil {\n\t\tglog.Errorf(\"Can't write response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not write response: %v\", err), http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "3fdbc60060f00fac613814c8d5113bd3", "score": "0.51379097", "text": "func main() {\n\t//check valid payload\n\td := string(getData(validOrder))\n\tok := Valid(d, payloads.Constants[\"order\"][\"0.1\"][\"SchemaPayloadPayload\"])\n\tif !ok {\n\t\tlog.Fatal(\"Unable to validate correct payload\")\n\t}\n\n\t//check invalid payload\n\td = string(getData(invalidOrder))\n\tok = Valid(d, payloads.Constants[\"order\"][\"0.1\"][\"SchemaPayloadPayload\"])\n\tif ok {\n\t\tlog.Fatal(\"Unable to validate incorrect payload\")\n\t}\n\tlog.Println(\"Everything is OK\")\n}", "title": "" }, { "docid": "d19f8f7e9d3d93c20ee7dd862997d4c5", "score": "0.5133734", "text": "func handleValidation(responseWriter http.ResponseWriter, request *http.Request) {\n\trequest.ParseForm()\n\n\tbody, err := ioutil.ReadAll(request.Body)\n\tif err != nil {\n\t\tresponseWriter.WriteHeader(http.StatusUnprocessableEntity)\n\t\tio.WriteString(responseWriter, \"Unprocessable Entity! \"+err.Error()+\"\\n\")\n\t\treturn\n\t}\n\n\tjsonToValidate := strings.TrimSpace(string(body))\n\tif jsonToValidate == \"\" {\n\t\tresponseWriter.WriteHeader(http.StatusBadRequest)\n\t\tio.WriteString(responseWriter, \"Bad Request! No JSON data at HTTP request found.\\n\")\n\t\treturn\n\t}\n\n\tresult, err := jsonschema.Compile(jsonSchema)\n\tif err != nil {\n\t\tresponseWriter.WriteHeader(http.StatusUnprocessableEntity)\n\t\tio.WriteString(responseWriter, \"Unprocessable Entity! Invalid JSON schema. \"+err.Error()+\"\\n\")\n\t\treturn\n\t}\n\n\terr = result.Validate(strings.NewReader(jsonToValidate))\n\tif err != nil {\n\t\tresponseWriter.WriteHeader(http.StatusUnprocessableEntity)\n\t\tio.WriteString(responseWriter, \"Unprocessable Entity! \"+err.Error()+\"\\n\")\n\t\treturn\n\t}\n\n\tresponseWriter.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "6044a7e0baf8592ae91722a43a222c59", "score": "0.51304644", "text": "func validateConfigEndpoint(w http.ResponseWriter, req *http.Request) {\n\tlog.Debug(\"Entering in.... validateConfigEndpoint\")\n\textensionName, _, err := global.GetExtensionNameFromRequest(req)\n\tif err != nil {\n\t\tlogger.AddCallerField().Error(err.Error())\n\t\thttp.Error(w, err.Error(), http.StatusNotFound)\n\t\treturn\n\t}\n\textension, err := state.ReadRegisteredExtension(extensionName)\n\tif err != nil {\n\t\tlogger.AddCallerField().Error(err.Error())\n\t\thttp.Error(w, err.Error(), http.StatusNotFound)\n\t\treturn\n\t}\n\tlog.Debug(\"extension.ValidationConfigURL:\" + extension.ValidationConfigURL)\n\tglobal.ForwardRequest(w, req, extension.ValidationConfigURL)\n\tlog.Debug(\"Exiting in.... validateConfigEndpoint\")\n}", "title": "" }, { "docid": "7b3f59c869a74d232cb1fd2914f20641", "score": "0.5126998", "text": "func webhookCreate(w http.ResponseWriter, r *http.Request, t auth.Token) error {\n\tctx := r.Context()\n\tvar webhook eventTypes.Webhook\n\terr := ParseInput(r, &webhook)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif webhook.TeamOwner == \"\" {\n\t\twebhook.TeamOwner, err = autoTeamOwner(ctx, t, permission.PermWebhookCreate)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tpermCtx := permission.Context(permTypes.CtxTeam, webhook.TeamOwner)\n\tif !permission.Check(t, permission.PermWebhookCreate, permCtx) {\n\t\treturn permission.ErrUnauthorized\n\t}\n\tevt, err := event.New(&event.Opts{\n\t\tTarget: event.Target{Type: event.TargetTypeWebhook, Value: webhook.Name},\n\t\tKind: permission.PermWebhookCreate,\n\t\tOwner: t,\n\t\tRemoteAddr: r.RemoteAddr,\n\t\tCustomData: event.FormToCustomData(InputFields(r)),\n\t\tAllowed: event.Allowed(permission.PermWebhookReadEvents, permCtx),\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tevt.Done(err)\n\t}()\n\terr = servicemanager.Webhook.Create(webhook)\n\tif err == eventTypes.ErrWebhookAlreadyExists {\n\t\tw.WriteHeader(http.StatusConflict)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "4c920d31fc7b3eb2607e579bc57da6e3", "score": "0.5122174", "text": "func Handler(res http.ResponseWriter, req *http.Request) {\n\t// First, decode the JSON response body\n\tbody := &webhookReqBody{}\n\tif err := json.NewDecoder(req.Body).Decode(body); err != nil {\n\t\tfmt.Println(\"could not decode request body\", err)\n\t\treturn\n\t}\n\n\t// Check if the message contains the word \"marco\"\n\t// if not, return without doing anything\n\tif !strings.Contains(strings.ToLower(body.Message.Text), \"marco\") {\n\t\treturn\n\t}\n\n\t// If the text contains marco, call the `sayPolo` function, which\n\t// is defined below\n\tif err := sayPolo(body.Message.Chat.ID); err != nil {\n\t\tfmt.Println(\"error in sending reply:\", err)\n\t\treturn\n\t}\n\n\t// log a confirmation message if the message is sent successfully\n\tfmt.Println(\"reply sent\")\n}", "title": "" }, { "docid": "512dea3dceab9463b3f87159ce3640b1", "score": "0.5121286", "text": "func (ut *sampleDataPayload) Validate() (err error) {\n\tif ut.Origin != nil {\n\t\tif err2 := ut.Origin.Validate(); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, err2)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "1213ad33fb804aae4eca93c9aa2e942e", "score": "0.5116744", "text": "func init() {\n // projectID, authJSON filepath, language, timezone\n dp.init(\"dialogflow-go\", \"dialogflow-go-2728cf6fd9ad.json\", \"en\", \"Europe/Amsterdam\")\n // Starts a new Gin instance with no middle-ware\n r := gin.New()\n log.Println(\"Started listening...\")\n // Define your handlers\n r.GET(\"/\", func(c *gin.Context) {\n c.String(http.StatusOK, \"Hello World!\")\n })\n r.GET(\"/ping\", func(c *gin.Context) {\n c.String(http.StatusOK, \"pong\")\n })\n r.POST(\"/ping\", func(c *gin.Context) {\n c.JSON(200, gin.H{\n \"message\": \"pong\",\n })\n })\n // handle Dialogflow at this endpoint\n r.POST(\"/endpoint\", handleEndpoint)\n // fulfillment webhook (from different medium article)\n r.POST(\"/webhook\", handleWebhook)\n // listen and serve on 0.0.0.0:8080\n r.Run()\n // For Google AppEngine - bridges gin and AppEngine\n // Handle all requests using net/http\n http.Handle(\"/\", r)\n}", "title": "" }, { "docid": "991643f83d7d1555f0b67f49318aa3bb", "score": "0.51150393", "text": "func (c *Client) CreateWebhook(request *CreateWebhookRequest) (*Webhook, error) {\n\tresp, err := c.doPost(c.buildURL(\"/api/webhooks\"), request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer closeBody(resp)\n\n\tswitch resp.StatusCode {\n\tcase http.StatusAccepted:\n\t\treturn WebhookFromReader(resp.Body)\n\n\tdefault:\n\t\treturn nil, errors.Errorf(\"failed with status code %d\", resp.StatusCode)\n\t}\n}", "title": "" }, { "docid": "04c2147483dd6d8fc6dc9a68676054c5", "score": "0.5114099", "text": "func (m *GetAuthCallbackOKBody) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "ba53344089f1e37064dac119da845a8b", "score": "0.51137835", "text": "func (ut *UserPayload) Validate() (err error) {\n\tif ut.Bio != nil {\n\t\tif len(*ut.Bio) > 500 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`response.bio`, *ut.Bio, len(*ut.Bio), 500, false))\n\t\t}\n\t}\n\tif ut.Email != nil {\n\t\tif err2 := goa.ValidateFormat(goa.FormatEmail, *ut.Email); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`response.email`, *ut.Email, goa.FormatEmail, err2))\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "461e0c535a14183d4a0ebaf23a7645e3", "score": "0.51075983", "text": "func (o *SendVerificationBody) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "a22770d3dfdb173c79b7d3978cddb861", "score": "0.50897944", "text": "func (m *PutWebhooksViberWebhookIDOKBodyAllOf1DataItemsAllOf0) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "95465cb5bc08f84e0f96633a95b5b18e", "score": "0.5089791", "text": "func (c *FusionAuthClient) RetrieveWebhooks() (interface{}, error) {\n\tvar body interface{}\n\turi := \"/api/webhook\"\n\tmethod := http.MethodGet\n\treq, err := c.NewRequest(method, uri, body)\n\tvar resp interface{}\n\t_, err = c.Do(req, &resp)\n\treturn resp, err\n}", "title": "" }, { "docid": "ca11434a05e7a751d9f19d30cfc7d3b2", "score": "0.5089477", "text": "func HandleWebHooksBitbucket(c *gin.Context, db *db.Db) model.Build {\n\tvar webhookObject model.Response\n\tfmt.Println(\"Webhook data received for bitbucket...\")\n\twebhookData, _ := ioutil.ReadAll(c.Request.Body)\n\tfmt.Printf(\"headers: %v\\n\", c.Request.Header)\n\tfmt.Printf(\"body: %v\\n\", c.Request.Body)\n\tjson.Unmarshal(webhookData, &webhookObject)\n\tfmt.Println(\"Repository Name: \", webhookObject.Repository.Name)\n\tbuild1 := db.ReadProducComponentAndDockerRegistry(webhookObject.Repository.Name)\n\tprojectId := db.ReadProjectId(build1.ProductName)\n\tbuild := model.Build{\n\t\tProductName: build1.ProductName,\n\t\tComponentName: build1.ComponentName,\n\t\tProjectID: projectId,\n\t\tDockerRegistry: build1.DockerRegistry,\n\t\tRepositoryName: webhookObject.Repository.Name,\n\t\tRepositoryUrl: webhookObject.Repository.Link.Html.RepositoryUrl,\n\t\tBranchName: webhookObject.Push.Changes[0].CommitBranch.Branch,\n\t\tCommitID: webhookObject.Push.Changes[0].Commits[0].CommitID,\n\t\tCommitMsg: webhookObject.Push.Changes[0].Commits[0].CommitMsg,\n\t}\n\tinserted, err := db.InsertCloudBuild(build)\n\tif !inserted {\n\t\tc.JSON(http.StatusInternalServerError, model.APIMessage{Code: 500,\n\t\t\tText: fmt.Sprintf(\"Unexpected Error ! %s\", err.Error())})\n\t\tvar emptyBuild model.Build\n\t\treturn emptyBuild\n\t}\n\n\tc.JSON(http.StatusOK, model.APIMessage{Code: 200, Text: \"Build details inserted\"})\n\treturn build\n\n}", "title": "" }, { "docid": "b58fc5effd410090736bcbb8018a9218", "score": "0.5080919", "text": "func (d *DefaultGitlabRequestParserValidator) ParseAndValidate(r *http.Request, secret []byte) (interface{}, error) {\n\tconst mergeEventHeader = \"Merge Request Hook\"\n\tconst noteEventHeader = \"Note Hook\"\n\n\t// Validate secret if specified.\n\theaderSecret := r.Header.Get(secretHeader)\n\tif len(secret) != 0 && subtle.ConstantTimeCompare(secret, []byte(headerSecret)) != 1 {\n\t\treturn nil, fmt.Errorf(\"header %s=%s did not match expected secret\", secretHeader, headerSecret)\n\t}\n\n\t// Parse request into a gitlab object based on the object type specified\n\t// in the gitlabHeader.\n\tbytes, err := io.ReadAll(r.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tswitch r.Header.Get(gitlabHeader) {\n\tcase mergeEventHeader:\n\t\tvar m gitlab.MergeEvent\n\t\tif err := json.Unmarshal(bytes, &m); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn m, nil\n\tcase noteEventHeader:\n\t\t// First, parse a small part of the json to determine if this is a\n\t\t// comment on a merge request or a commit.\n\t\tvar subset struct {\n\t\t\tObjectAttributes struct {\n\t\t\t\tNoteableType string `json:\"noteable_type\"`\n\t\t\t} `json:\"object_attributes\"`\n\t\t}\n\t\tif err := json.Unmarshal(bytes, &subset); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// We then parse into the correct comment event type.\n\t\tswitch subset.ObjectAttributes.NoteableType {\n\t\tcase \"Commit\":\n\t\t\tvar e gitlab.CommitCommentEvent\n\t\t\terr := json.Unmarshal(bytes, &e)\n\t\t\treturn e, err\n\t\tcase \"MergeRequest\":\n\t\t\tvar e gitlab.MergeCommentEvent\n\t\t\terr := json.Unmarshal(bytes, &e)\n\t\t\treturn e, err\n\t\t}\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "ee6b4440ab917c37a5fa788977ec8db5", "score": "0.50808114", "text": "func BuildValidatingWebhook(mgr *manager.Manager) *admission.Webhook {\n\treturn &admission.Webhook{Handler: &stackValidator{}}\n}", "title": "" } ]
59aa180a18486037e5b0a5d59ab9aa91
DisconnectPeer disconnects from a peer.
[ { "docid": "f32fe4403eb974dd01dfa3c348995220", "score": "0.77957445", "text": "func (net *Net) DisconnectPeer(ctx context.Context, peerID peer.ID) error {\n\t_, err := net.client.DisconnectPeer(ctx, &rpc.DisconnectPeerRequest{PeerId: peerID.String()})\n\treturn err\n}", "title": "" } ]
[ { "docid": "f796b6c933d74966837ec3f0e285e5db", "score": "0.73584735", "text": "func (d *DiscoveryPlugin) PeerDisconnect(s libp2p.Session) {\n\tcid := s.GetEnv(libp2p.EnvConnectID)\n\tun := s.GetPeerAddr().User()\n\tif s.GetEnv(envDHT) == envValue {\n\t\tnode := dht.NodeID{}\n\t\tnode.PublicKey, _ = hex.DecodeString(un)\n\t\td.discDht.RemoveNode(&node)\n\t}\n\td.mu.Lock()\n\tdefer d.mu.Unlock()\n\n\tdelete(d.conns, cid)\n\tids := d.users[un]\n\tfor i, id := range ids {\n\t\tif id != cid {\n\t\t\tcontinue\n\t\t}\n\t\tids[i] = \"\"\n\t\tif ids == [maxConnPreUser]string{} {\n\t\t\tdelete(d.users, un)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "44f88a82913849b64b051c19970df7ca", "score": "0.7147403", "text": "func (ex ExchangeData) PeerDisconnect(client *network.PeerClient) {\n\t// 失去连接\n\t// 一致性hash更新\n\tex.con.Remove(Member{client.Address, client})\n}", "title": "" }, { "docid": "383f72bfb6c2a1c2d760811b774e641b", "score": "0.66029376", "text": "func (p *peer) Disconnect() {\n\t// did we win the race?\n\tif atomic.AddInt32(&p.disconnect, 1) != 1 {\n\t\treturn\n\t}\n\tclose(p.quit)\n\tif atomic.LoadInt32(&p.connected) != 0 {\n\t\tp.conn.Close()\n\t}\n}", "title": "" }, { "docid": "0ebd72d9271c7f6d205501ec143ebbc1", "score": "0.66004354", "text": "func (c *Client) Disconnect() error {\n\tlog.Printf(\"Client-%s::Entering Disconnect()\", c.ID)\n\tdefer log.Printf(\"Client-%s::Leaving Disconnect()\", c.ID)\n\n\tfor _, conn := range c.Peers {\n\t\tvar reply int\n\n\t\tif conn.Conn == nil {\n\t\t\tlog.Println(\"Error: Peer's connection is nil\")\n\t\t\treturn fmt.Errorf(\"Error: Peer's connection is nil\")\n\t\t}\n\t\terr := conn.Conn.Call(\"NodeRPC.Disconnect\", &c.ID, &reply)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Error while disconnecting: %v\", err)\n\t\t\treturn nil\n\t\t}\n\t}\n\tc.Peers = nil\n\n\tif c.trafficGeneration == true && c.msgLoopRunning == true {\n\t\tc.msgLoopChan <- \" \"\n\t\tc.msgLoopRunning = false\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "fa409e38a03f91f3a0a9cd7e782c546a", "score": "0.6354008", "text": "func (h *LibP2PHost) Disconnect(ctx context.Context, publicKey *ecdsa.PublicKey) error {\n\tpeerID, err := peer.IDFromPublicKey(p2pPublicKeyFromEcdsaPublic(publicKey))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not convert public key to peer id: %v\", err)\n\t}\n\n\treturn h.host.Network().ClosePeer(peerID)\n}", "title": "" }, { "docid": "021059462abf48bb9a5f67c66af63d8b", "score": "0.6193942", "text": "func (t *TCPRPC) Disconnect(address string, _ *struct{}) (err error) {\n\tif tcp := t.n.getTCP(); tcp != nil {\n\t\tif c := tcp.getConn(address); c != nil {\n\t\t\terr = c.Close()\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "473a16425056c48cab42f1beed038d65", "score": "0.6042925", "text": "func (k *Kad) Disconnected(peer p2p.Peer) {\n\tk.logger.Info(\"disconnected peer\", \"peer_address\", peer.Address)\n\n\tk.connectedPeers.Remove(peer.Address)\n\n\tk.waitNext.SetTryAfter(peer.Address, time.Now().Add(k.opt.TimeToRetry))\n\n\tk.metrics.TotalInboundDisconnections.Inc()\n\tk.collector.Record(peer.Address, im.PeerLogOut(time.Now()))\n\n\tk.depthMu.Lock()\n\tk.recalcDepth()\n\tk.depthMu.Unlock()\n\n\tk.notifyManageLoop()\n\tk.notifyPeerSig()\n}", "title": "" }, { "docid": "ff6cff7b244e241b9fbc04e597dda301", "score": "0.60401964", "text": "func (self *Network) Disconnect(oneID, otherID string) error {\n\tconn := self.GetConn(oneID, otherID)\n\tif conn == nil {\n\t\treturn fmt.Errorf(\"connection between %v and %v does not exist\", oneID, otherID)\n\t}\n\tif !conn.Up {\n\t\treturn fmt.Errorf(\"%v and %v already disconnected\", oneID, otherID)\n\t}\n\n\tself.nodeMap[conn.One] <- &PeerEvent{\n\t\tType: PeerEventTypeDrop,\n\t\tPeer: conn.other.ID,\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0328a4a413cc27f57a7ad224ef8d8ff9", "score": "0.59331286", "text": "func (k *Kuzzle) Disconnect() error {\n\terr := k.protocol.Close()\n\tk.stopRetryingToConnect = true\n\n\tif err != nil {\n\t\treturn types.NewError(err.Error())\n\t}\n\tk.wasConnected = false\n\tk.EmitEvent(event.Disconnected, nil)\n\n\treturn nil\n}", "title": "" }, { "docid": "84f6ca5c743f97f0f90b5652400876b1", "score": "0.59049106", "text": "func (u *UDPRPC) Disconnect(address string, _ *struct{}) (err error) {\n\tif tcp := u.n.getTCP(); tcp != nil {\n\t\tif c := tcp.getConn(address); c != nil {\n\t\t\terr = c.Close()\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "c5f0d1c5694b3b7570503dd18560b3b5", "score": "0.5746076", "text": "func (n *Node) Disconnect(s *Session) error {\n\tif s.IsResumeable() {\n\t\tn.broker.FinishSession(s.GetID()) // nolint:errcheck\n\t}\n\n\tif n.IsShuttingDown() {\n\t\tif s.IsDisconnectable() {\n\t\t\treturn n.DisconnectNow(s)\n\t\t}\n\t} else {\n\t\tn.hub.RemoveSessionLater(s)\n\n\t\tif s.IsDisconnectable() {\n\t\t\treturn n.disconnector.Enqueue(s)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1c04d9f20f70cf84b1c1c07088e2295e", "score": "0.5731247", "text": "func (c *Communicator) Disconnect() error {\n\tc.lock.Lock()\n\tdefer c.lock.Unlock()\n\n\tif c.cancelKeepAlive != nil {\n\t\tc.cancelKeepAlive()\n\t}\n\n\tif c.config.sshAgent != nil {\n\t\tif err := c.config.sshAgent.Close(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif c.conn != nil {\n\t\tconn := c.conn\n\t\tc.conn = nil\n\t\treturn conn.Close()\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9921766ae36476e359aa5c1f1640df41", "score": "0.56996137", "text": "func (n *Node) Disconnect(user string, reconnect bool) error {\n\t// first disconnect user from this node\n\terr := n.hub.disconnect(user, reconnect)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// second send disconnect control message to other nodes\n\treturn n.pubDisconnect(user, reconnect)\n}", "title": "" }, { "docid": "a5739935b61c893029869de6cfa80a00", "score": "0.5555279", "text": "func (rtm *RTM) Disconnect() {\n\trtm.conn.Close()\n\trtm.stopListener <- true\n\trtm.stopCaptured <- true\n}", "title": "" }, { "docid": "af737416869f0f9dfb196d73e660ad5e", "score": "0.5555102", "text": "func (s *Subscriber) Disconnect() (e error) {\n\tif s.isConnected() {\n\t\tswitch strings.ToLower(s.messageProtocol) {\n\t\tcase \"stomp\":\n\t\t\te = s.stompConn.Unsubscribe(s.stompMsgHeader)\n\t\t\tif e != nil {\n\t\t\t\treturn errors.New(\"ERROR: Disconnect: unsubscribe [\" + s.messageProtocol + \"] failed with \" + fmt.Sprintf(\"%v\", e))\n\t\t\t}\n\t\t\te = s.stompConn.Disconnect(s.stompConnHeader)\n\t\t\tif e != nil {\n\t\t\t\treturn errors.New(\"ERROR: Disconnect: disconnect [\" + s.messageProtocol + \"] failed with \" + fmt.Sprintf(\"%v\", e))\n\t\t\t}\n\t\t\te = s.transportConn.Close()\n\t\t\tif e != nil {\n\t\t\t\treturn errors.New(\"ERROR: Disconnect: close [\" + s.transportProtocol + \"] failed with \" + fmt.Sprintf(\"%v\", e))\n\t\t\t}\n\t\tcase \"ssl\":\n\t\t\tfallthrough\n\t\tdefault:\n\n\t\t}\n\t\ts.connected = false\n\t\treturn nil\n\t}\n\treturn errors.New(\"ERROR: Disconnect: disconnect attempt when not connected\")\n}", "title": "" }, { "docid": "056bf466722dc95924aebab17c520c34", "score": "0.5535514", "text": "func (g *Graph) Disconnect(a, b int) {\n\tg.edges[a].Remove(b)\n\tg.edges[b].Remove(a)\n}", "title": "" }, { "docid": "f3034371697386e860244798b93f5564", "score": "0.5533305", "text": "func (s *ChatSession) disconnect() {\n\t//remove user from SET\n\tRemoveUser(s.user)\n\n\t//close websocket\n\ts.peer.Close()\n\n\t//remove from Peers\n\tdelete(Peers, s.user)\n}", "title": "" }, { "docid": "ed91eb408c48eac47f0dd8ff5f25d4c7", "score": "0.5518132", "text": "func (n *network) disconnectListener() listener {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tif r.Method == http.MethodDelete {\n\t\t\tvar a, p string = r.Header.Get(peeraddress), r.Header.Get(peerport)\n\t\t\tn.node.leave <- Peer{p, a}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4da0e36b939a63ce1c9dc07464930dcc", "score": "0.55085087", "text": "func (a *AgentWorker) Disconnect(ctx context.Context) error {\n\ta.logger.Info(\"Disconnecting...\")\n\terr := roko.NewRetrier(\n\t\troko.WithMaxAttempts(4),\n\t\troko.WithStrategy(roko.Constant(1*time.Second)),\n\t\troko.WithSleepFunc(a.retrySleepFunc),\n\t).DoWithContext(ctx, func(r *roko.Retrier) error {\n\t\tif _, err := a.apiClient.Disconnect(ctx); err != nil {\n\t\t\ta.logger.Warn(\"%s (%s)\", err, r) // e.g. POST https://...: 500 (Attempt 0/4 Retrying in ..)\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n\n\tif err != nil {\n\t\t// none of the retries worked\n\t\ta.logger.Warn(\n\t\t\t\"There was an error sending the disconnect API call to Buildkite. \"+\n\t\t\t\t\"If this agent still appears online, you may have to manually stop it (%s)\",\n\t\t\terr,\n\t\t)\n\t\treturn err\n\t}\n\ta.logger.Info(\"Disconnected\")\n\treturn nil\n}", "title": "" }, { "docid": "2d0d3499e7908260f27e15df1679c117", "score": "0.5505955", "text": "func (wm *WantManager) Disconnected(p peer.ID) {\n\twm.peerHandler.Disconnected(p)\n}", "title": "" }, { "docid": "ffb61dde11ba7cc9bcf474d3fe7d7187", "score": "0.54877025", "text": "func (s *GServer) DisconnectEndpoint(\n\tclientID string) error {\n\n\tlog.Printf(\"Disconnecting %s\", clientID)\n\n\tclient, ok := s.connectedClients[clientID]\n\n\tif !ok {\n\t\tlog.Printf(\"[!] client with uuuid: %s does not exist\\n\", clientID)\n\t\treturn fmt.Errorf(\"disconnectendpoint failed - client does not exist\")\n\t}\n\n\tcontrolMessage := new(cs.EndpointControlMessage)\n\tcontrolMessage.Operation = common.EndpointCtrlDisconnect\n\n\tclient.endpointInput <- controlMessage\n\treturn nil\n}", "title": "" }, { "docid": "4f9275dac33c4654812a4a466d129acd", "score": "0.548588", "text": "func (c *Connection) Disconnect(packet []byte) {\n\tgo c.networkImpl.disconnectClient(c, disconnectTypeDefault, packet)\n}", "title": "" }, { "docid": "d32eec025fd0fd78e07589fc9dddb0b6", "score": "0.5482437", "text": "func (client *Client) RmPeer(peerName string) (string, error) {\n\tresult, err := client.httpVerb(\"DELETE\", fmt.Sprintf(\"/peer/%s\", peerName), nil)\n\treturn result, err\n}", "title": "" }, { "docid": "799112368560b278cbd0fbfbc92a7ea5", "score": "0.5473262", "text": "func (na *networkAPI) NetDisconnect(_ context.Context, p peer.ID) error {\n\treturn na.network.Network.Disconnect(p)\n}", "title": "" }, { "docid": "7007c6e86345d6321e5078708f1934dc", "score": "0.54648775", "text": "func (s *Session) Disconnect() error {\n\ts.mutex.Lock()\n\n\tvar (\n\t\tkill = s.kill\n\t\tstopped = s.stopped\n\t)\n\n\tif stopped == nil {\n\t\ts.mutex.Unlock()\n\t\treturn errors.New(\"a connection to the session has not been established\")\n\t}\n\n\ts.log(\"Disconnecting\")\n\n\ts.mutex.Unlock()\n\n\tkill()\n\t<-stopped\n\n\treturn nil\n}", "title": "" }, { "docid": "cebcf4d2a65ab5bd54eeb87f88c4e0a9", "score": "0.54618716", "text": "func (this *Channel) Disconnect() (int, []byte, error) {\n\tpayload := &PayloadHeader{Type: \"CLOSE\"}\n\tid := this.nextMsg()\n\tdata, err := this.encode(CAST_DEFAULT_SENDER, CAST_DEFAULT_RECEIVER, CAST_NS_CONN, payload.WithId(id))\n\treturn id, data, err\n}", "title": "" }, { "docid": "a24c46179f09e1ee8d9e1a7b1051cb9c", "score": "0.5429553", "text": "func (d *PacksDownloader) UnregisterPeer(peer string) error {\n\td.peersMu.Lock()\n\tdefer d.peersMu.Unlock()\n\n\tif d.peers[peer] == nil {\n\t\treturn nil\n\t}\n\n\tlog.Trace(\"UnRegistering sync peer\", \"peer\", peer)\n\td.peers[peer].Stop()\n\tdelete(d.peers, peer)\n\treturn nil\n}", "title": "" }, { "docid": "09d0c255dfa1a847b70e4cb366e4aeed", "score": "0.5407176", "text": "func (that *Link) disconnectNotify() {\n\tlog.Debug(\"[p2p]call disconnectNotify for\", \"Addr\", that.GetAddr())\n\tthat.CloseConn()\n\n\tmsg, _ := common.MakeEmptyMessage(common.DISCONNECT_TYPE)\n\tdiscMsg := &common.MsgPayload{\n\t\tId: that.id,\n\t\tAddr: that.addr,\n\t\tPayload: msg,\n\t}\n\tthat.recvChan <- discMsg\n}", "title": "" }, { "docid": "13989511cd3fbde321db06efcb4a2360", "score": "0.5399379", "text": "func DeletePeer(conn *ssh.Client, peerKey string) error {\n\tcommand := \"sudo wg set wg0 peer \" + peerKey + \" remove\"\n\n\t_, err := network.RunCommand(conn, command)\n\treturn err\n}", "title": "" }, { "docid": "738abc05bb72dda8b3f42fbd08e198d4", "score": "0.53978133", "text": "func (c *Channel) RemovePeer(peer fab.Peer) {\n\turl := peer.URL()\n\tif c.peers[url] != nil {\n\t\tdelete(c.peers, url)\n\t\tlogger.Debugf(\"Removed peer with URL %s\", url)\n\t}\n}", "title": "" }, { "docid": "de511900323c327ce28562ac13a248c0", "score": "0.53925204", "text": "func (cm *rpcConnManager) DisconnectByAddr(addr string) error {\n\treplyChan := make(chan error)\n\tcm.server.QueryChannel() <- connection.DisconnectNodeMsg{\n\t\tCmp: func(sp *connection.ConnPeer) bool { return sp.Addr() == addr },\n\t\tReply: replyChan,\n\t}\n\treturn <-replyChan\n}", "title": "" }, { "docid": "32067b58c84ebf77dd4ec59df836c8d1", "score": "0.5392392", "text": "func (s *Server) RemovePeer(peer *ws.Conn) error {\n\tdelete(s.peers, peer.RemoteAddr().String())\n\treturn nil\n}", "title": "" }, { "docid": "24de4c087cd5f97e0bc98928c7405615", "score": "0.53899837", "text": "func (s *Session) Disconnect() error {\n\tif err := s.pw.write(s.sessionID, mtDisconnect, false); err != nil {\n\t\treturn err\n\t}\n\t/*\n\t\tDo not read server reply as on slow connections the TCP/IP connection is closed (by Server)\n\t\tbefore the reply can be read completely.\n\n\t\t// if err := s.pr.readSkip(); err != nil {\n\t\t// \treturn err\n\t\t// }\n\n\t*/\n\treturn nil\n}", "title": "" }, { "docid": "0782e325cd32ead67b7fcd2959ed1a9a", "score": "0.53776044", "text": "func (socket *Socket) Disconnect() error {\n\tif !socket.connected {\n\t\treturn fmt.Errorf(\"not connected\")\n\t}\n\terr := socket.conn.Close()\n\tsocket.conn = nil\n\tsocket.connected = false\n\treturn errors.Wrap(err, \"disconnect failed\")\n}", "title": "" }, { "docid": "300bb87021179dbb9c3878954d443dd2", "score": "0.5367966", "text": "func (vcenter *VCenter) Disconnect() error {\n\tctx, cancel := context.WithCancel(context.Background())\n\tdefer cancel()\n\n\tif vcenter.client != nil {\n\t\tif err := vcenter.client.Logout(ctx); err != nil {\n\t\t\tfmt.Println(\"Worker\", vcenter.Worker, \": Could not disconnect properly from vcenter:\", vcenter.Hostname, err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1feeaec75d9f0c9f712dab24a802b296", "score": "0.53600526", "text": "func (self *Connection) Disconnect() {\n\tif self.connected {\n\t\tlog.Debug(\"[%s] Disconnect called\", self.Name)\n\t\tclose(self.Out)\n\t\tself.connected = false\n\t\tself.socket.Close()\n\t\tself.socket = nil\n\t\tself.ConnectWait = make(chan bool, 1)\n\t}\n}", "title": "" }, { "docid": "0ede9b3d2121e2058b2365edc69c5bd4", "score": "0.5349781", "text": "func (c *wsConn) Disconnect(reason string) {\n\tif c.ws != nil {\n\t\tc.Tracef(\"Disconnecting - %s\", reason)\n\t\tc.ws.Close()\n\t}\n}", "title": "" }, { "docid": "bd9bcc19951c29d2493e2610c05f89f6", "score": "0.53450507", "text": "func (socket *Socket) Disconnect() error {\n\tif !socket.connected {\n\t\treturn fmt.Errorf(\"not connected\")\n\t}\n\tsocket.Stop()\n\terr := socket.conn.Close()\n\tif nil != err {\n\t\terr = errs.Wrap(err, codes.SocketCloseFailed, \"could not close socket connection\")\n\t}\n\tsocket.conn = nil\n\tsocket.connected = false\n\treturn err\n}", "title": "" }, { "docid": "d6d83e35a3a09817b1db5faae892e53a", "score": "0.53397244", "text": "func (o *NetworkManager_VPN_Plugin) Disconnect(ctx context.Context) (err error) {\n\terr = o.object.CallWithContext(ctx, InterfaceNetworkManager_VPN_Plugin+\".Disconnect\", 0).Store()\n\treturn\n}", "title": "" }, { "docid": "477f22cd5bb9b16cacc1b603033ad6f5", "score": "0.53357506", "text": "func (p *peer) Shutdown() {\n\tfmt.Printf(\"stopping peer\\n\")\n\tp.Disconnect()\n}", "title": "" }, { "docid": "1c46961acd5a3b2daff5be26ed114e86", "score": "0.53085995", "text": "func (bcR *BlockchainReactor) RemovePeer(peer p2p.Peer, reason interface{}) {\n\tbcR.pool.RemovePeer(peer.ID())\n}", "title": "" }, { "docid": "36fcff4e13d4eb9b1b54edbfc325132b", "score": "0.5307313", "text": "func (n *notifee) Disconnected(network p2pnet.Network, conn p2pnet.Conn) {\n\tlog.WithFields(map[string]interface{}{\n\t\t\"remotePeerID\": conn.RemotePeer(),\n\t\t\"remoteMultiaddress\": conn.RemoteMultiaddr(),\n\t}).Info(\"disconnected from peer\")\n}", "title": "" }, { "docid": "80fb36d8b6242dcff3937772cce3d367", "score": "0.5298953", "text": "func (c *Client) Disconnect() error {\n\tif c.conn != nil {\n\t\terr := c.conn.Close()\n\t\tc.conn = nil\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"closing connection: %w\", err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e29ee29e3eee6b47c4d61291964b83f7", "score": "0.52944547", "text": "func (consumer Consumer) Disconnect() {\n\tconsumer.chManager.channel.Close()\n\tconsumer.chManager.connection.Close()\n}", "title": "" }, { "docid": "738e79ed7b2cd7d07aa68370fd0eee2a", "score": "0.52904457", "text": "func (obj *AdminConnectionImpl) Disconnect() types.TGError {\n\tlogger.Log(fmt.Sprint(\"Entering AdminConnectionImpl:Disconnect\"))\n\terr := obj.GetChannel().Disconnect()\n\tif err != nil {\n\t\tlogger.Error(fmt.Sprintf(\"ERROR: Returning AdminConnectionImpl:Disconnect - unable to channel.Disconnect() w/ error: '%s'\", err.Error()))\n\t\treturn err\n\t}\n\tlogger.Debug(fmt.Sprint(\"Inside AdminConnectionImpl::Disconnect about to obj.GetChannel().Stop()\"))\n\tobj.GetChannel().Stop(false)\n\tlogger.Log(fmt.Sprint(\"Returning AdminConnectionImpl:Disconnect\"))\n\treturn nil\n}", "title": "" }, { "docid": "1f14e17a7a63caa7673a176e019f5391", "score": "0.5287391", "text": "func (c *SsmDataChannel) DisconnectPort() error {\n\tmsg := NewAgentMessage()\n\tmsg.MessageType = InputStreamData\n\tmsg.SequenceNumber = atomic.AddInt64(&c.seqNum, 1)\n\tmsg.Flags = Data\n\tmsg.PayloadType = Flag\n\n\tbuf := make([]byte, 4)\n\tbinary.BigEndian.PutUint32(buf, uint32(DisconnectToPort))\n\tmsg.Payload = buf\n\n\t_, err := c.WriteMsg(msg)\n\treturn err\n}", "title": "" }, { "docid": "96f15fe343aa9685ba4d4aace2ab9a3f", "score": "0.528395", "text": "func (c *Client) Disconnect(timeout ...time.Duration) error {\n\t// acquire mutex\n\tc.mutex.Lock()\n\tdefer c.mutex.Unlock()\n\n\t// check if connected\n\tif atomic.LoadUint32(&c.state) != clientConnected {\n\t\treturn ErrClientNotConnected\n\t}\n\n\t// finish current packets\n\tif len(timeout) > 0 {\n\t\t_ = c.futureStore.Await(timeout[0])\n\t}\n\n\t// set state\n\tatomic.StoreUint32(&c.state, clientDisconnecting)\n\n\t// send disconnect packet\n\terr := c.send(packet.NewDisconnect(), false)\n\n\treturn c.end(err, true)\n}", "title": "" }, { "docid": "59fc0a716fed7a2b1bd64a3540995d22", "score": "0.52619505", "text": "func (client *RelayMQClient) Disconnect() {\n\tclient.disconnectChan <- 1\n}", "title": "" }, { "docid": "533e5ffa9c2a81f33d71db3fac68597a", "score": "0.5256811", "text": "func (p *PktPiper) Disconnect(h PktHandler) {\n\t// Delete handler\n\tp.d.delHandler(h)\n\n\t// Disconnect nodes\n\tastiencoder.DisconnectNodes(p, h)\n}", "title": "" }, { "docid": "d37e2c1ba0d5496b2c65db1bf67cef43", "score": "0.5243674", "text": "func (w *spvWallet) Disconnect() {\n\tw.cancel()\n\tw.wg.Wait()\n}", "title": "" }, { "docid": "d37e2c1ba0d5496b2c65db1bf67cef43", "score": "0.5243674", "text": "func (w *spvWallet) Disconnect() {\n\tw.cancel()\n\tw.wg.Wait()\n}", "title": "" }, { "docid": "6ff23fac76e2ea98ad18540390904ed1", "score": "0.5236651", "text": "func (c *client) Disconnect() error {\n\treturn c.DisconnectContext(c.context)\n}", "title": "" }, { "docid": "f9c2fcfd1dce9ed4ce182fbe3dded56b", "score": "0.52352303", "text": "func (c *Client) Disconnect() error {\n\tif c.connection == nil {\n\t\treturn errors.New(\"client is already disconnected\")\n\t}\n\tc.disconnectEvent.Type = DisconnectUser\n\tc.connection.Close()\n\treturn nil\n}", "title": "" }, { "docid": "503f4d8368b7c327e0b2a650ece88849", "score": "0.52327275", "text": "func (gsr *graphSyncReceiver) Disconnected(p peer.ID) {\n\tgsr.graphSync().peerManager.Disconnected(p)\n\tgsr.graphSync().peerResponseManager.Disconnected(p)\n}", "title": "" }, { "docid": "5dfb406bc7ecd4b587ab145fa16a298d", "score": "0.5227797", "text": "func (b *Builder) RemovePeer(uuid string) *Builder {\n\tif b.err != nil {\n\t\treturn b\n\t}\n\tif _, ok := b.targetPeers[uuid]; !ok {\n\t\tb.err = moerr.NewInternalErrorNoCtx(\"cannot remove peer from %s: not found\", uuid)\n\t} else {\n\t\tdelete(b.targetPeers, uuid)\n\t}\n\treturn b\n}", "title": "" }, { "docid": "3c694ce54429bd29298bff8140af8128", "score": "0.52273947", "text": "func (n *NetworkHarness) DisconnectNodes(ctx context.Context, a, b *HarnessNode) er.R {\n\tbobInfo, errr := b.GetInfo(ctx, &lnrpc.GetInfoRequest{})\n\tif errr != nil {\n\t\treturn er.E(errr)\n\t}\n\n\treq := &lnrpc.DisconnectPeerRequest{\n\t\tPubKey: bobInfo.IdentityPubkey,\n\t}\n\n\tif _, errr := a.DisconnectPeer(ctx, req); errr != nil {\n\t\treturn er.E(errr)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7d07a1cd47676a1908117afc09fe53b0", "score": "0.5221726", "text": "func (d *WgPeerDescriptor) Delete(key string, peer *wg.Peer, metadata *wgidx.WgMetadata) error {\n\tif metadata == nil {\n\t\treturn fmt.Errorf(\"failed to delete peer - metadata is nil\")\n\t}\n\terr := d.wgHandler.RemovePeer(metadata.Index)\n\tif err != nil {\n\t\td.log.Error(err)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "68d7107a31ae7903dc51537f0c7afaaa", "score": "0.52209795", "text": "func (client *SsntpTestClient) DisconnectNotify() {\n\tvar result Result\n\n\tgo client.SendResultAndDelEventChan(ssntp.NodeDisconnected, result)\n}", "title": "" }, { "docid": "7bc274d94e3c446753cb80db9cece20c", "score": "0.5220589", "text": "func (lgtv *Client) Disconnect() error {\n\tif !lgtv.IsConnected() {\n\t\treturn nil\n\t}\n\tif err := lgtv.c.Close(); err != nil {\n\t\treturn err\n\t}\n\n\tif lgtv.onDisconnect != nil {\n\t\tlgtv.onDisconnect(lgtv, nil)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "609b12e08360dfae1493b1de82f28c5d", "score": "0.5217192", "text": "func (cli *Client) Disconnect() {\n\tcli.socket.Write(Disconnect.String())\n}", "title": "" }, { "docid": "e32aee07f2b062005afc16b46947e452", "score": "0.5217037", "text": "func (c *Client) Disconnect() error {\n\treturn c.Conn.Close()\n}", "title": "" }, { "docid": "201629bbeeb10b7be3defab38b8bcdc7", "score": "0.5214078", "text": "func (p *Peer) Stop() error {\n\tif p.command != nil {\n\t\terr := p.command.Process.Kill()\n\t\tif err != nil {\n\t\t\treturn errors.WithMessage(err, \"failed to stop peer\")\n\t\t}\n\t\tp.command = nil\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3403ba066b5b6e8122c2c97686105c64", "score": "0.52075964", "text": "func (s *Session) RemovePeer(pid string) {\n\ts.mu.Lock()\n\tlog.Infof(\"RemovePeer %s from session %s\", pid, s.id)\n\tdelete(s.peers, pid)\n\ts.mu.Unlock()\n\n\t// Close session if no peers\n\tif len(s.peers) == 0 && s.onCloseHandler != nil && !s.closed {\n\t\ts.onCloseHandler()\n\t\ts.closed = true\n\t}\n}", "title": "" }, { "docid": "ec7fcf6e39d62f403134eb1da340f9d2", "score": "0.5201327", "text": "func (h Hub) Disconnect(c Conn, topics ...Topic) {\n\th <- Disconnect{\n\t\tConn: c,\n\t\tTopics: topics,\n\t}\n}", "title": "" }, { "docid": "aaa5ebecc4def29042e10e97fc90f62b", "score": "0.5195906", "text": "func (dl *downloadTester) dropPeer(id string) {\n\tdl.lock.Lock()\n\tdefer dl.lock.Unlock()\n\n\tdelete(dl.peers, id)\n\tdl.downloader.SnapSyncer.Unregister(id)\n\tdl.downloader.UnregisterPeer(id)\n}", "title": "" }, { "docid": "3aa1f37555d235a24f1656b3b3fc10d3", "score": "0.5194946", "text": "func (r ForwardingClient) RemovePeer(addr string, reply *int) error {\n\tif r.fsm.raft.State() != raft.Leader {\n\t\treturn ErrNotLeader\n\t}\n\treturn r.fsm.wrapper.RemoveNode(addr)\n}", "title": "" }, { "docid": "35d5178c02554940eda24f4c0732665c", "score": "0.51910174", "text": "func (client *RPCConnection) Disconnect() {\n\tif !client.isConnected {\n\t\tpin.ReportTestSetupMalfunction(fmt.Errorf(\"%v is already disconnected\", client))\n\t}\n\tclient.isConnected = false\n\tclient.rpcClient.Disconnect()\n\tclient.rpcClient.Shutdown()\n}", "title": "" }, { "docid": "a1f4b32884b27fd5f99a74b5075ead7a", "score": "0.5190736", "text": "func (c *Client) DeletePeerConn(peerConnId, clientToken string) error {\n\treturn bce.NewRequestBuilder(c).\n\t\tWithURL(getURLForPeerConnId(peerConnId)).\n\t\tWithMethod(http.DELETE).\n\t\tWithQueryParamFilter(\"clientToken\", clientToken).\n\t\tDo()\n}", "title": "" }, { "docid": "f1bd4b98f78d38c39e05984dddc9a0cc", "score": "0.5175246", "text": "func (d *Disgord) Disconnect() error {\n\td.Lock()\n\tdefer d.Unlock()\n\treturn d.ws.Disconnect()\n}", "title": "" }, { "docid": "41b21c72aef2d456f52b4e92cb580378", "score": "0.5168644", "text": "func (m *MoInstance) Disconnect(ctx context.Context) error {\n\treturn m.client.Disconnect(ctx)\n}", "title": "" }, { "docid": "b97cf915ef0f2c99bf779148f2168491", "score": "0.51623344", "text": "func (s *Server) OnPeerDisconnected(e dispatcher.Event) {\n\tevent := e.(*peer.OnPeerDisconnectedEvent)\n\tlog.Println(\"On Peer Disconnected \", event.Node)\n\tgo s.initDialClient(event.Node)\n}", "title": "" }, { "docid": "f6045ae19807a0b8d4569cb7f66e9aa4", "score": "0.5145455", "text": "func (s Session) Disconnect() {\n\tC.ssh_disconnect(s.ptr)\n}", "title": "" }, { "docid": "e534fbd0cce0eb86ee175088b69c0dcf", "score": "0.51381844", "text": "func (c *Connection) Disconnect(err error) {\n\tc.cancelCtx(err)\n}", "title": "" }, { "docid": "7bd7400e1cc5b4655f183c6a00363104", "score": "0.51319194", "text": "func Disconnect(mt int, player *models.BasePlayer) {\n\tglobal.Players.RemovePlayer(player)\n\t//SendPlayerList()\n\tutil.LogToConsole(\"Connected Players:\", global.Players.GetPlayerCount())\n}", "title": "" }, { "docid": "72716677b7e0b87f5428024ee3382398", "score": "0.5103882", "text": "func (u *Unchoker) HandleDisconnect(pe Peer) {\n\tdelete(u.peersUnchoked, pe)\n\tdelete(u.peersUnchokedOptimistic, pe)\n}", "title": "" }, { "docid": "ca4d0eb2e9b3aaaae6d109ac4dfd53d6", "score": "0.51027995", "text": "func (c *DBClient) Disconnect() error {\n\tctx, cancel := context.WithTimeout(context.Background(), 60*time.Second)\n\tdefer cancel()\n\tc.col = nil\n\treturn c.mgoClient.Disconnect(ctx)\n}", "title": "" }, { "docid": "4ae3104a4d03adbc23389873011ce83a", "score": "0.50931567", "text": "func (c *Client) Disconnect() error {\n\tif !c.connActive.get() {\n\t\treturn ErrConnectionIsNotOpen\n\t}\n\n\tc.userDisconnect.Close()\n\n\treturn nil\n}", "title": "" }, { "docid": "4e5be3dfe6576cb1ed02b053993a76d4", "score": "0.50865084", "text": "func (bot *Bot) Disconnect() {\n\tselect {\n\tcase _, ok := <-bot.disconnected:\n\t\tif ok {\n\t\t\tclose(bot.disconnected)\n\t\t}\n\tdefault:\n\t}\n}", "title": "" }, { "docid": "98647f2034eb3e3f594c542b4bed58e2", "score": "0.508496", "text": "func (e *Event) Disconnect(c *session.Client) {\n\te.logger.Info(fmt.Sprintf(\"Disconnect() - client with username: %s and ID: %s disconenectd\", c.Username, c.ID))\n}", "title": "" }, { "docid": "93c543953b5febf13b063a8e29b3d258", "score": "0.50703996", "text": "func Disconnect(id *cwfprotos.DisconnectRequest) (*cwfprotos.DisconnectResponse, error) {\n\tcli, err := getUESimClient()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn cli.Disconnect(context.Background(), id)\n}", "title": "" }, { "docid": "ed4aea4e40aecdd1e3387a47791b83e5", "score": "0.5067537", "text": "func (s *VirtualServer) RemovePeer(addr string) {\n\ts.poolLock.Lock()\n\tdelete(s.fails, addr)\n\tdelete(s.timeout, addr)\n\ts.poolLock.Unlock()\n\n\ts.rpLock.Lock()\n\tdelete(s.ReverseProxy, addr)\n\ts.rpLock.Unlock()\n\n\ts.ssLock.Lock()\n\tdelete(s.ServerStats, addr)\n\ts.ssLock.Unlock()\n\n\ts.Pool.Remove(addr)\n}", "title": "" }, { "docid": "809aa9cf3248f592835479c9ba150131", "score": "0.5044526", "text": "func (c *Client) Disconnect() (err error) {\n\tdefer c.transport.Close()\n\n\tid, err := newUUID()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tch := c.receipts.Mark(id)\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tc.receipts.Clear(id)\n\t\t}\n\t}()\n\n\terr = c.transport.Disconnect(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tselect {\n\tcase <-ch:\n\tcase <-c.receipts.closed:\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "5d79e7f2281734beb95ef9510bf27cdd", "score": "0.5044307", "text": "func (c *PartitionClient) disconnect() error {\n\tif c.conn == nil {\n\t\treturn nil\n\t}\n\tc.conn.Close()\n\tc.conn = nil\n\treturn nil\n}", "title": "" }, { "docid": "3186a50f2ebee872acd582319bfe1fdb", "score": "0.50441897", "text": "func (s *Server) Disconnect(ctx context.Context) {\n\ts.mu.Lock()\n\tif s.closed {\n\t\ts.mu.Unlock()\n\t\treturn\n\t}\n\tselect {\n\tcase s.disconnect <- struct{}{}:\n\tcase <-ctx.Done():\n\t}\n\ts.mu.Unlock()\n}", "title": "" }, { "docid": "31e39561b23dd82db1e7d18308a46435", "score": "0.50436884", "text": "func (s *inStream) Disconnect(ctx context.Context, err error) {\n\tif s.getState() == disconnected {\n\t\treturn\n\t}\n\twaitCh := make(chan struct{})\n\ts.runQueue.Run(func() {\n\t\ts.disconnect(ctx, err)\n\t\tclose(waitCh)\n\t})\n\t<-waitCh\n}", "title": "" }, { "docid": "04624507f19451e8e43d3befc1a81867", "score": "0.5041114", "text": "func (c *Client) Disconnect() error {\n\terr := c.ws.Close()\n\treturn err\n}", "title": "" }, { "docid": "473658ac4dd02cf7e768443a18ce35de", "score": "0.50252527", "text": "func (c *Client) Disconnect(server *Server) {\n\t// issue #4: report to other clients that we are ready to disconnect\n\tserver.ClientsReadyToDisconnect.Done()\n\tif c.Socket.Closed {\n\t\tlog.Println(\"Disconnected early\")\n\t\t//TODO(dan): mark as closed badly\n\t} else {\n\t\t// wait for everyone to else to report the same\n\t\tserver.ClientsReadyToDisconnect.Wait()\n\t\tlog.Println(c.Nick, \"disconnecting\")\n\t\tc.SetCloseExpected(true)\n\t\tc.Socket.WriteLine(\"QUIT\")\n\t\t<-c.closed\n\t}\n}", "title": "" }, { "docid": "a12eedd09214be9b636644d758605396", "score": "0.50175554", "text": "func (s *DeviceClient) Disconnect(quiesce uint) {\n\ts.stateUpdateCh <- terminating\n}", "title": "" }, { "docid": "bae236a5ced678bf63652260fe2d8768", "score": "0.50175464", "text": "func Disconnect(connector Interface) error {\n\n return connector.Disconnect()\n}", "title": "" }, { "docid": "9035670a1e2514f8fc5e207ce0f11037", "score": "0.5015423", "text": "func (c *Websocket) Disconnect() *Websocket {\n\tif c.conn == nil || c.isClosed {\n\t\treturn c\n\t}\n\tc.isClosed = true\n\tif err := c.conn.Close(); err != nil {\n\t\tc.chain.fail(\"close error when disconnecting webcoket: \" + err.Error())\n\t}\n\treturn c\n}", "title": "" }, { "docid": "adeb7fdf2b5adcab07ced422bc20c114", "score": "0.50136584", "text": "func (r *ForeignClusterReconciler) Unpeer(fc *discoveryv1alpha1.ForeignCluster,\n\tforeignDiscoveryClient *crdclient.CRDClient) (*discoveryv1alpha1.ForeignCluster, error) {\n\n\t// peering request has to be removed\n\tklog.Infof(\"[%v] Deleting PeeringRequest\", fc.Spec.ClusterIdentity.ClusterID)\n\terr := r.deletePeeringRequest(foreignDiscoveryClient, fc)\n\tif err != nil && !errors.IsNotFound(err) {\n\t\tklog.Error(err)\n\t\treturn nil, err\n\t}\n\t// local advertisement has to be removed\n\terr = r.deleteAdvertisement(fc)\n\tif err != nil && !errors.IsNotFound(err) {\n\t\tklog.Error(err)\n\t\treturn nil, err\n\t}\n\tfc.Status.Outgoing.PeeringPhase = discoveryv1alpha1.PeeringPhaseNone\n\tfc.Status.Outgoing.RemotePeeringRequestName = \"\"\n\tif slice.ContainsString(fc.Finalizers, FinalizerString, nil) {\n\t\tfc.Finalizers = slice.RemoveString(fc.Finalizers, FinalizerString, nil)\n\t}\n\treturn fc, nil\n}", "title": "" }, { "docid": "b3a4405b17bc38ce0e6381044295af3d", "score": "0.5006567", "text": "func (o *NetworkManager_Device) Disconnect(ctx context.Context) (err error) {\n\terr = o.object.CallWithContext(ctx, InterfaceNetworkManager_Device+\".Disconnect\", 0).Store()\n\treturn\n}", "title": "" }, { "docid": "082f3dd9bdf23eb754df147d42fc06e4", "score": "0.50046265", "text": "func (_m *MockP2PService) RemovePeer(_a0 peer.ID) {\n\t_m.Called(_a0)\n}", "title": "" }, { "docid": "56fc04197ee49480cbb5f0bfde768e2a", "score": "0.5002755", "text": "func Disconnect(g *gocui.Gui, v *gocui.View) error {\n\t// Unsubscribe\n\tsub.Unsubscribe()\n\tGetConn().Close()\n\treturn gocui.ErrQuit\n}", "title": "" }, { "docid": "547d373997baafa3ba42429bb2dbcbf1", "score": "0.5002356", "text": "func (gc *GraphiteClient) Disconnect() error {\n\terr := gc.conn.Close()\n\tgc.conn = nil\n\treturn err\n}", "title": "" }, { "docid": "89de3751d6fe5b30ac8e83343b22c1f6", "score": "0.4996346", "text": "func (bd *Device) Disconnect() {\n\tif err := bd.client.Close(); err == nil {\n\t\t<-bd.disconnect\n\t}\n}", "title": "" }, { "docid": "90b111dd2e52ec9b36f51b3c5e66849a", "score": "0.4982163", "text": "func (connection *Connection) Disconnect() {\n\tconnection.tcpConnection.Close()\n\tconnection.socket.Close()\n}", "title": "" }, { "docid": "4781955fa838c3faffa43304b9609de2", "score": "0.49790597", "text": "func (m *mqttv3) Disconnect() {\n\tm.client.Disconnect(0)\n\tm.client = nil\n\tm.state = Disconnected\n\tm.disconnect <- true\n}", "title": "" }, { "docid": "483e76dce835156608cfc8b3923aeaf5", "score": "0.49649942", "text": "func (c *MqttClient) Disconnect(ctx context.Context) error {\n\tc.client.Disconnect(500)\n\texecutor.Notify(conTotal, -1)\n\treturn nil\n}", "title": "" }, { "docid": "2187c28e4228af02dccaa25818023f66", "score": "0.49581826", "text": "func (btc *ExchangeWalletSPV) RemovePeer(addr string) error {\n\treturn btc.spvNode.removePeer(addr)\n}", "title": "" } ]
8a78861fe73b5dc66a976e131aad2e91
OpenFile opens a file using the given flags and the given mode.
[ { "docid": "d761e405023f925dea7236d45e570a8d", "score": "0.68377906", "text": "func (fs *Fs) OpenFile(name string, flag int, perm os.FileMode) (afero.File, error) {\n\tif 0x0 != flag&(^os.O_RDONLY) || 0x0 != perm&0xfffffbbb {\n\t\treturn nil, syscall.EPERM\n\t}\n\treturn fs.Open(name)\n}", "title": "" } ]
[ { "docid": "54faeb05976f41c11c2257a69e661dd3", "score": "0.70052147", "text": "func OpenFile(r *rt.Runtime, name, mode string) (*File, error) {\n\tvar flag, options int\n\tswitch strings.TrimSuffix(mode, \"b\") {\n\tcase \"r\":\n\t\tflag = os.O_RDONLY\n\t\toptions = bufferedRead\n\tcase \"w\":\n\t\tflag = os.O_WRONLY | os.O_CREATE | os.O_TRUNC\n\t\toptions = bufferedWrite\n\tcase \"a\":\n\t\tflag = os.O_WRONLY | os.O_CREATE | os.O_APPEND\n\t\toptions = bufferedWrite\n\tcase \"r+\":\n\t\tflag = os.O_RDWR\n\t\toptions = bufferedRead | bufferedWrite\n\tcase \"w+\":\n\t\tflag = os.O_RDWR | os.O_CREATE | os.O_TRUNC\n\t\toptions = bufferedRead | bufferedWrite\n\tcase \"a+\":\n\t\tflag = os.O_RDWR | os.O_CREATE | os.O_APPEND\n\t\toptions = bufferedRead | bufferedWrite\n\tdefault:\n\t\treturn nil, errors.New(\"invalid mode\")\n\t}\n\tf, err := safeio.OpenFile(r, name, flag, 0666)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn NewFile(f, options), nil\n}", "title": "" }, { "docid": "0ab1e059a57ec922af06fe3a488c3497", "score": "0.70038354", "text": "func OpenFile(name string, flag int, perm os.FileMode) (*os.File, error) {\n\tswitch flag & writeMode {\n\tcase writeMode:\n\t\tdefer updateOSMetrics(osMetricOpenFileW, name)()\n\tdefault:\n\t\tdefer updateOSMetrics(osMetricOpenFileR, name)()\n\t}\n\treturn os.OpenFile(name, flag, perm)\n}", "title": "" }, { "docid": "835d835855f200d2cdfb74848e620912", "score": "0.6977152", "text": "func Open(path string, flag int) (*File, error) {\n\tmu.Lock()\n\tif inhibited {\n\t\tmu.Unlock()\n\t\treturn nil, errors.New(\"file I/O is inhibited\")\n\t}\n\tused = true\n\tmu.Unlock()\n\n\tf, err := os.OpenFile(path, flag, 0600)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &File{f}, nil\n}", "title": "" }, { "docid": "eb270a9c515e56528e9dd580ea38e963", "score": "0.6915067", "text": "func OpenFile(fileName string, flag int, perm os.FileMode) (*os.File, error) {\n\tvar file *os.File\n\tvar err error\n\n\tfile, err = os.OpenFile(fileName, flag, perm)\n\tif err != nil && os.IsNotExist(err) {\n\t\tfile, err = os.Create(fileName)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn file, err\n}", "title": "" }, { "docid": "acf6afafb787169363df2a962f6fdb54", "score": "0.6829355", "text": "func (l *logger) OpenFile(name string, flag int, perm os.FileMode) (afero.File, error) {\n\tret, err := l.backend.OpenFile(name, flag, perm)\n\tl.logf(\"OpenFile(%s, %x, %s) %v\", name, flag, perm, err)\n\treturn ret, err\n}", "title": "" }, { "docid": "c79009f564b379fa9f0518563fa614e5", "score": "0.6814581", "text": "func OpenFile(name string, flag int, _ os.FileMode) (*os.File, error) {\n\treturn openFileSequential(name, flag)\n}", "title": "" }, { "docid": "12c6f501e96f4cb125903e0297918ea1", "score": "0.6788749", "text": "func OpenFile(name string, flag int) (File, error) {\n\treturn fs.OpenFile(name, flag)\n}", "title": "" }, { "docid": "be27482d7c50d2789adb800cc7902b5d", "score": "0.67775303", "text": "func Open(filename string, flags int) (*File, error) {\n\tvar f File\n\truntime.SetFinalizer(&f, func(f *File) {\n\t\tif f.ptr != nil {\n\t\t\tpanic(fmt.Errorf(\"%v was garbage collected without being closed\",\n\t\t\t\tf.filename))\n\t\t}\n\t})\n\n\terr := newError()\n\tif retSuccess != C.libpff_file_initialize(&f.ptr, &err.ptr) {\n\t\treturn nil, err\n\t}\n\n\tcFilename := C.CString(filename)\n\tdefer C.free(unsafe.Pointer(cFilename))\n\n\tif retSuccess != C.libpff_file_open(f.ptr, cFilename, C.int(flags), &err.ptr) {\n\t\treturn nil, err\n\t}\n\n\treturn &f, nil\n}", "title": "" }, { "docid": "924a9abe8db241dc05c5dc2b60806e75", "score": "0.6719111", "text": "func (s *Splay) OpenFile(name string, flag int, perm os.FileMode) (*os.File, error) {\n\tdir, file, err := s.parts(name)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif (flag & os.O_CREATE) == os.O_CREATE {\n\t\t// File is being created\n\t\tif err = mkdirExists(dir); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn os.OpenFile(file, flag, perm)\n}", "title": "" }, { "docid": "b3f7e9147a86aaf8ccde04e1140f7b37", "score": "0.66597116", "text": "func (f *fs) OpenFile(name string, flag int, perm os.FileMode) (afero.File, error) {\n\tp, err := f.strip(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn f.backend.OpenFile(p, flag, perm)\n}", "title": "" }, { "docid": "255038a4d26558e7db3cb067041af00a", "score": "0.65972894", "text": "func Open(name string, flags int) (*File, error) {\n\tfd, err := syscall.Open(name, flags|syscall.O_CLOEXEC|syscall.O_NONBLOCK, 0666)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn NewFile(uintptr(fd), name)\n}", "title": "" }, { "docid": "da224e680321bc305d2e2a36cfb119f4", "score": "0.6553267", "text": "func (f *File) OpenFile(flag int, perm os.FileMode) error {\n\tfile, err := os.OpenFile(f.name, flag, perm)\n\tif err != nil {\n\t\treturn err\n\t}\n\tf.file = file\n\treturn nil\n}", "title": "" }, { "docid": "5f570ced5e58a168a1c5fa463c0fa659", "score": "0.6533145", "text": "func open(name *byte, mode, perm int32) int32", "title": "" }, { "docid": "0292fd42242a04510c48039708202550", "score": "0.6532516", "text": "func (fs Track) OpenFile(name string, flag int, perm os.FileMode) (File, error) {\n\tf, err := fs.FS.OpenFile(fixpath(name), flag, perm)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn newTrackFile(debug.Stack(), name, f), nil\n}", "title": "" }, { "docid": "c33f300a2dd87b06ba608558ebca1392", "score": "0.6520908", "text": "func Open(filename string, flags ...int) *Library {\n\treturn open(filename, flags...)\n}", "title": "" }, { "docid": "6d0f9fc640e30feea0f308ddbcda8776", "score": "0.6501121", "text": "func (vfs *VFS) OpenFile(name string, flags int, perm os.FileMode) (fd Handle, err error) {\n\tdefer log.Trace(name, \"flags=%s, perm=%v\", decodeOpenFlags(flags), perm)(\"fd=%v, err=%v\", &fd, &err)\n\n\t// http://pubs.opengroup.org/onlinepubs/7908799/xsh/open.html\n\t// The result of using O_TRUNC with O_RDONLY is undefined.\n\t// Linux seems to truncate the file, but we prefer to return EINVAL\n\tif flags&accessModeMask == os.O_RDONLY && flags&os.O_TRUNC != 0 {\n\t\treturn nil, EINVAL\n\t}\n\n\tnode, err := vfs.Stat(name)\n\tif err != nil {\n\t\tif err != ENOENT || flags&os.O_CREATE == 0 {\n\t\t\treturn nil, err\n\t\t}\n\t\t// If not found and O_CREATE then create the file\n\t\tdir, leaf, err := vfs.StatParent(name)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tnode, err = dir.Create(leaf, flags)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn node.Open(flags)\n}", "title": "" }, { "docid": "4d27ab86f5e5befd0e96b3c9bb62af80", "score": "0.64079875", "text": "func (fs *FileSystem) OpenFile(p string, flag int) (filesystem.File, error) {\n\tvar f filesystem.File\n\tvar err error\n\n\t// get the path and filename\n\tdir := path.Dir(p)\n\tfilename := path.Base(p)\n\n\t// if the dir == filename, then it is just /\n\tif dir == filename {\n\t\treturn nil, fmt.Errorf(\"cannot open directory %s as file\", p)\n\t}\n\n\t// cannot open to write or append or create if we do not have a workspace\n\twriteMode := flag&os.O_WRONLY != 0 || flag&os.O_RDWR != 0 || flag&os.O_APPEND != 0 || flag&os.O_CREATE != 0 || flag&os.O_TRUNC != 0 || flag&os.O_EXCL != 0\n\tif fs.workspace == \"\" {\n\t\tif writeMode {\n\t\t\treturn nil, fmt.Errorf(\"cannot write to read-only filesystem\")\n\t\t}\n\n\t\t// get the directory entries\n\t\tvar entries []*directoryEntry\n\t\tentries, err = fs.readDirectory(dir)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not read directory entries for %s\", dir)\n\t\t}\n\t\t// we now know that the directory exists, see if the file exists\n\t\tvar targetEntry *directoryEntry\n\t\tfor _, e := range entries {\n\t\t\teName := e.Name()\n\t\t\t// cannot do anything with directories\n\t\t\tif eName == filename && e.IsDir() {\n\t\t\t\treturn nil, fmt.Errorf(\"cannot open directory %s as file\", p)\n\t\t\t}\n\t\t\tif eName == filename {\n\t\t\t\t// if we got this far, we have found the file\n\t\t\t\ttargetEntry = e\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\t// see if the file exists\n\t\t// if the file does not exist, and is not opened for os.O_CREATE, return an error\n\t\tif targetEntry == nil {\n\t\t\treturn nil, fmt.Errorf(\"target file %s does not exist\", p)\n\t\t}\n\t\t// now open the file\n\t\tf = &File{\n\t\t\tdirectoryEntry: targetEntry,\n\t\t\tisReadWrite: false,\n\t\t\tisAppend: false,\n\t\t\toffset: 0,\n\t\t}\n\t} else {\n\t\tf, err = os.OpenFile(path.Join(fs.workspace, p), flag, 0o644)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"target file %s does not exist: %v\", p, err)\n\t\t}\n\t}\n\n\treturn f, nil\n}", "title": "" }, { "docid": "4000fc350b26c1dbdecff214843e045d", "score": "0.639714", "text": "func Open(name string, oflag int, perm int) (int, error) {\n\tfile, err := os.OpenFile(name, oflag, os.FileMode(perm))\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\treturn int(file.Fd()), nil\n}", "title": "" }, { "docid": "d47264a281a4a0c382a1ca6126f4c3be", "score": "0.63900155", "text": "func (e *Executor) OpenFile(name string, flag int, perm os.FileMode) (*os.File, error) {\n\treturn e.ns.OpenFile(name, flag, perm)\n}", "title": "" }, { "docid": "a683df748d30e86bf654ca79b88e1254", "score": "0.63615024", "text": "func OpenFile(name string, create bool) *os.File {\n\tflags := os.O_RDWR\n\tif create {\n\t\tflags |= os.O_CREATE | os.O_TRUNC\n\t}\n\tf, err := os.OpenFile(name, flags, 0666)\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn f\n}", "title": "" }, { "docid": "a4a2eeca160c3db46bd12e88f2507b9a", "score": "0.63229007", "text": "func WithOpenFile(name string, flag int, perm os.FileMode, fun func(*os.File) error) error {\n\tf, err := os.OpenFile(name, flag, perm)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer f.Close()\n\n\treturn fun(f)\n}", "title": "" }, { "docid": "ed9276df94b322c62f90a0c48fc42cee", "score": "0.6320941", "text": "func (f *SpaceFile) Open(ctx context.Context, mode FileHandlerMode) (FileHandler, error) {\n\tfileHandler, err := f.fs.Open(ctx, f.entry.Path(), mode)\n\treturn fileHandler, err\n}", "title": "" }, { "docid": "03b925a482323815b32417e80c1cfd2c", "score": "0.6308758", "text": "func raf_open(frame *rtda.Frame) {\n\tvars := frame.LocalVars()\n\tthis := vars.GetThis()\n\tname := vars.GetRef(1)\n\tmode := vars.GetInt(2) //flag\n\tflag := 0\n\n\tif mode&1 > 0 {\n\t\tflag |= syscall.O_RDONLY\n\t}\n\n\t//write\n\tif mode&2 > 0 {\n\t\tflag |= syscall.O_RDWR | syscall.O_CREAT\n\t}\n\n\tif mode&4 > 0 {\n\t\tflag |= syscall.O_SYNC | syscall.O_CREAT\n\t}\n\n\tif mode&8 > 0 {\n\t\tflag |= syscall.O_DSYNC | syscall.O_CREAT\n\t}\n\n\tgoName := rtda.GoString(name)\n\tgoFile, err := os.OpenFile(goName, flag, 0660)\n\tif err != nil {\n\t\tframe.Thread().ThrowFileNotFoundException(goName)\n\t\treturn\n\t}\n\n\tthis.SetExtra(goFile)\n}", "title": "" }, { "docid": "3644b3ed9e94f09ff8934d34d4910998", "score": "0.6289162", "text": "func (s *Server) OpenFile(name string, mode int32) (File, error) {\n\tu := urlParse(name)\n\n\tif h, ok := s.schemes[u.Scheme]; ok {\n\t\tf, serr := h.Open(u, mode)\n\t\tif serr != os.ErrNotExist {\n\t\t\treturn f, serr\n\t\t}\n\t}\n\n\tswitch mode {\n\tcase OpenModeReadOnly:\n\t\treturn os.Open(filepath.Clean(name))\n\tcase OpenModeWriteOnly:\n\t\tflag := os.O_WRONLY | os.O_CREATE | os.O_TRUNC\n\t\treturn os.OpenFile(name, flag, 0600)\n\tdefault:\n\t\treturn nil, &Status{\n\t\t\tErr: fmt.Errorf(\"open mode(%d) not supported for file %q\", mode, name),\n\t\t\tCode: StatusAccessDenied,\n\t\t}\n\t}\n}", "title": "" }, { "docid": "792cdb02bb90bc54060569a87144771c", "score": "0.62832016", "text": "func (b *Fs) OpenFile(name string, flag int, mode os.FileMode) (f afero.File, err error) {\n\tif name, err = b.realPath(name); err != nil {\n\t\treturn nil, &os.PathError{Op: \"openfile\", Path: name, Err: err}\n\t}\n\n\tsourcef, err := b.source.OpenFile(name, flag, mode)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &File{File: sourcef, start: b.start}, nil\n}", "title": "" }, { "docid": "42b5fab9f65d12659d8c3803c05576af", "score": "0.6267709", "text": "func OpenExistingFile(filename string, flags Flags) (*os.File, error) {\n\topenFlags := os.O_RDWR\n\tif flags&ReadOnly != 0 {\n\t\topenFlags = os.O_RDONLY\n\t}\n\n\tif flags&Sync != 0 {\n\t\topenFlags |= datasyncFileFlag\n\t}\n\treturn os.OpenFile(filename, openFlags, 0)\n}", "title": "" }, { "docid": "2c375870b2dd35a27f91a18557f37bd5", "score": "0.62627184", "text": "func (f *FileSystem) OpenFile(name string, flag int, perm os.FileMode) (absfs.File, error) {\n\tf.m.Lock()\n\tdefer f.m.Unlock()\n\treturn f.fs.OpenFile(name, flag, perm)\n}", "title": "" }, { "docid": "549e41cb4963de052ac2f2f4fcb58f70", "score": "0.625668", "text": "func (s S3Fs) OpenFile(name string, flag int, perm os.FileMode) (afero.File, error) {\n\tfile, err := s.Open(name)\n\ts.Chmod(name, perm)\n\treturn file, err\n}", "title": "" }, { "docid": "0ef6cca6f45cc11aa3260d23333794f4", "score": "0.6252096", "text": "func (fs *Filesystem) OpenFile(path string, flag int, perm os.FileMode) (*os.File, error) {\n\tif err := fs.EnsureMounted(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn os.OpenFile(filepath.Join(fs.RootFS, path), flag, perm)\n}", "title": "" }, { "docid": "9b3454a5c0d047207a462379e61616cc", "score": "0.62377197", "text": "func (driver *ClientDriver) OpenFile(cc server.ClientContext, path string, flag int) (server.FileStream, error) {\n\tpath = driver.baseDir + path\n\n\t// If we are writing and we are not in append mode, we should remove the file\n\tif (flag & os.O_WRONLY) != 0 {\n\t\tflag |= os.O_CREATE\n\t\tif (flag & os.O_APPEND) == 0 {\n\t\t\tif _, err := os.Stat(path); err != nil {\n\t\t\t\tif !os.IsNotExist(err) {\n\t\t\t\t\treturn nil, fmt.Errorf(\"error accessing file %s: %v\", path, err)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tif err := os.Remove(path); err != nil {\n\t\t\t\t\treturn nil, fmt.Errorf(\"error deleting %s: %v\", path, err)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tif driver.FileStream != nil {\n\t\treturn driver.FileStream, nil\n\t}\n\n\treturn os.OpenFile(path, flag, 0600)\n}", "title": "" }, { "docid": "5904dff3280ddfb864aff5559f222757", "score": "0.62172216", "text": "func (f *fuseFS) Open(name string, flags uint32, context *fuse.Context) (nodefs.File, fuse.Status) {\n\tcreate := (int(flags) & os.O_CREATE) != 0\n\texclusive := (int(flags) & os.O_EXCL) != 0\n\tif (int(flags) & os.O_TRUNC) != 0 {\n\t\t// TODO: needed?\n\t}\n\tif (int(flags) & (os.O_WRONLY | os.O_RDWR)) == (os.O_WRONLY | os.O_RDWR) {\n\t\treturn nil, fuse.EINVAL\n\t}\n\twritable := (int(flags) & (os.O_WRONLY)) != 0 || (int(flags) & (os.O_RDWR)) != 0\n\tvar file filesystem.WritableFile\n\tvar err error\n\tif writable {\n\t\tfile, err = f.fs.OpenWrite(\"/\" + name, create, exclusive)\n\t\tif err != nil {\n\t\t\treturn nil, errorToFuseStatus(err)\n\t\t}\n\t} else {\n\t\tsubfile, err := f.fs.OpenRead(\"/\" + name)\n\t\tif err != nil {\n\t\t\treturn nil, errorToFuseStatus(err)\n\t\t}\n\t\tfile = filesystem.WithErroringWrite(subfile)\n\t}\n\tif (int(flags) & os.O_APPEND) != 0 {\n\t\t// TODO: needed?\n\t}\n\treturn &fuseFile{\n\t\tbase: file,\n\t}, fuse.OK\n}", "title": "" }, { "docid": "19a242b7af53b4541a40e8a0bdc65648", "score": "0.6198361", "text": "func (f *Fs) OpenFile(name string, flag int, perm os.FileMode) (afero.File, error) {\n\treturn f.Share.OpenFile(name, flag, perm)\n}", "title": "" }, { "docid": "7ba7bcda6dbc68c70802a83d0f919a02", "score": "0.6172251", "text": "func ReadOpen(path string) (*os.File, error) {\n\n\t// Set all write flags\n\t// This indirectly calls syscall_windows::Open method https://github.com/golang/go/blob/7ebcf5eac7047b1eef2443eda1786672b5c70f51/src/syscall/syscall_windows.go#L251\n\t// As FILE_SHARE_DELETE cannot be passed to Open, os.CreateFile must be implemented directly\n\n\t// This is mostly the code from syscall_windows::Open. Only difference is passing the Delete flag\n\t// TODO: Open pull request to Golang so also Delete flag can be set\n\tif len(path) == 0 {\n\t\treturn nil, fmt.Errorf(\"File '%s' not found. Error: %v\", syscall.ERROR_FILE_NOT_FOUND)\n\t}\n\n\tpathp, err := syscall.UTF16PtrFromString(path)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Error converting to UTF16: %v\", err)\n\t}\n\n\tvar access uint32\n\taccess = syscall.GENERIC_READ\n\n\tsharemode := uint32(syscall.FILE_SHARE_READ | syscall.FILE_SHARE_WRITE | syscall.FILE_SHARE_DELETE)\n\n\tvar sa *syscall.SecurityAttributes\n\n\tvar createmode uint32\n\n\tcreatemode = syscall.OPEN_EXISTING\n\n\thandle, err := syscall.CreateFile(pathp, access, sharemode, sa, createmode, syscall.FILE_ATTRIBUTE_NORMAL, 0)\n\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Error creating file '%s': %v\", pathp, err)\n\t}\n\n\treturn os.NewFile(uintptr(handle), path), nil\n}", "title": "" }, { "docid": "08da9da1ec2f8f0d5c64abfbd31bc23f", "score": "0.61390525", "text": "func (f *Filer) OpenFile(name string, flag int, perm os.FileMode) (*File, error) {\n\tfile, err := f.openFile(name, flag, perm)\n\tif file != nil {\n\t\tfile.pcN = runtime.Callers(0, file.pc[:])\n\t}\n\treturn file, err\n}", "title": "" }, { "docid": "a3ef7adcfeff2e08cb172d628e5f9373", "score": "0.61347586", "text": "func open(name string) (vals.File, error) {\n\treturn os.Open(name)\n}", "title": "" }, { "docid": "cae0288aeddfe6099fe3aa86d94eba18", "score": "0.6123333", "text": "func (fs *SpaceFS) Open(ctx context.Context, path string, mode FileHandlerMode) (FileHandler, error) {\n\tresult, err := fs.store.Open(ctx, path)\n\treturn result, err\n}", "title": "" }, { "docid": "990881954d6a05cb5f9e93f0b5828d02", "score": "0.611769", "text": "func (f *Filer) OpenFile(name string, flag int, perm os.FileMode) (absfs.File, error) {\n\tf.m.Lock()\n\tdefer f.m.Unlock()\n\n\treturn f.fs.OpenFile(name, flag, perm)\n}", "title": "" }, { "docid": "a530b40e3007d73fc7026428c4cd5e45", "score": "0.6108492", "text": "func (f *File) Open() error {\n\treturn f.OpenFile(openFlag, openMode)\n}", "title": "" }, { "docid": "70b1bee9205256e50fcf26640752b67c", "score": "0.61056215", "text": "func (m *Manager) OpenFile(root string, flags int, mode uint32) (*os.File, error) {\n\treturn iou.OpenFrom(m.dir, root, flags, mode)\n}", "title": "" }, { "docid": "cd5fa5f7beb0edb6832573289a3d6a00", "score": "0.60968465", "text": "func openDBFile(filename string, flag int) (*dbfile, error) {\n\tf, err := os.OpenFile(filename, flag, 0)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdb := &dbfile{file: f, rd: bufio.NewReader(f)}\n\tdb.Lock()\n\treturn db, nil\n}", "title": "" }, { "docid": "d3421135a4ca852252ce0e7662dd51bb", "score": "0.6075866", "text": "func (f *File) Open(ctx context.Context, req *fuse.OpenRequest, resp *fuse.OpenResponse) (fh fusefs.Handle, err error) {\n\tdefer fs.Trace(f, \"flags=%v\", req.Flags)(\"fh=%v, err=%v\", &fh, &err)\n\tswitch {\n\tcase req.Flags.IsReadOnly():\n\t\tif mountlib.NoSeek {\n\t\t\tresp.Flags |= fuse.OpenNonSeekable\n\t\t}\n\t\tvar rfh *mountlib.ReadFileHandle\n\t\trfh, err = f.File.OpenRead()\n\t\tfh = &ReadFileHandle{rfh}\n\tcase req.Flags.IsWriteOnly() || (req.Flags.IsReadWrite() && (req.Flags&fuse.OpenTruncate) != 0):\n\t\tresp.Flags |= fuse.OpenNonSeekable\n\t\tvar wfh *mountlib.WriteFileHandle\n\t\twfh, err = f.File.OpenWrite()\n\t\tfh = &WriteFileHandle{wfh}\n\tcase req.Flags.IsReadWrite():\n\t\terr = errors.New(\"can't open for read and write simultaneously\")\n\tdefault:\n\t\terr = errors.Errorf(\"can't figure out how to open with flags %v\", req.Flags)\n\t}\n\n\t/*\n\t // File was opened in append-only mode, all writes will go to end\n\t // of file. OS X does not provide this information.\n\t OpenAppend OpenFlags = syscall.O_APPEND\n\t OpenCreate OpenFlags = syscall.O_CREAT\n\t OpenDirectory OpenFlags = syscall.O_DIRECTORY\n\t OpenExclusive OpenFlags = syscall.O_EXCL\n\t OpenNonblock OpenFlags = syscall.O_NONBLOCK\n\t OpenSync OpenFlags = syscall.O_SYNC\n\t OpenTruncate OpenFlags = syscall.O_TRUNC\n\t*/\n\n\tif err != nil {\n\t\treturn nil, translateError(err)\n\t}\n\treturn fh, nil\n}", "title": "" }, { "docid": "0a3718d3e3ae322192693fc993cceb27", "score": "0.6057604", "text": "func FileMode(o os.FileMode) *os.FileMode {\n\treturn &o\n}", "title": "" }, { "docid": "bb6a64df3dea972993256aea5704cfdd", "score": "0.60352105", "text": "func Open (fname string) (fp *os.File) {\n fp, err := os.Create(fname)\n check.Error(err)\n return\n}", "title": "" }, { "docid": "76f3d1529ce3b99439435d96f79ee47f", "score": "0.6031363", "text": "func Open(name string) (*File, error) {}", "title": "" }, { "docid": "76f3d1529ce3b99439435d96f79ee47f", "score": "0.6031363", "text": "func Open(name string) (*File, error) {}", "title": "" }, { "docid": "fb17c0596335f1af2b164b3b53ef7dc3", "score": "0.6019961", "text": "func Open(name string) (*File, error)", "title": "" }, { "docid": "423f706cc698a441ed4c6fe3d9c5c7b7", "score": "0.5969513", "text": "func (o *Opener) OpenFile(name string, flag int, perm os.FileMode) (*os.File, error) {\n\t// Use a new backoff instance per open attempt.\n\tctx, ctor := o.ctx, o.ctor\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\tif ctor == nil {\n\t\tctor = newDefaultBackoff\n\t}\n\tb := backoff.WithContext(ctor(), ctx)\n\n\tvar f *os.File\n\terr := backoff.RetryNotify(func() error {\n\t\tvar osErr error\n\n\t\tf, osErr = os.OpenFile(name, flag, perm)\n\t\tif osErr == nil {\n\t\t\treturn nil\n\t\t}\n\n\t\tif isWrappedMNFile(osErr) {\n\t\t\treturn osErr\n\t\t}\n\n\t\treturn backoff.Permanent(osErr)\n\t}, b, o.notifier)\n\n\treturn f, err\n}", "title": "" }, { "docid": "ffd2a2d4b19884f91e1ff632b900b808", "score": "0.59586865", "text": "func (*file) open(path string, must_exist bool) *file {\n\n\tf, err := os.OpenFile(path, os.O_RDONLY, 0)\n\tif err == nil {\n\t\treturn &file{\n\t\t\tpath: path,\n\t\t\tfile: f,\n\t\t}\n\t}\n\tif os.IsNotExist(err) && !must_exist {\n\t\treturn nil\n\t}\n\tpanic(err)\n}", "title": "" }, { "docid": "1f8fa7576ef95f8485f3657431d1824c", "score": "0.59505767", "text": "func (f *fs) Open(name string, flags uint32, context *fuse.Context) (nodefs.File, fuse.Status) {\n\tvar file nodefs.File\n\tswitch {\n\tcase name == \"\":\n\t\treturn nil, EISDIR\n\tcase name == \"secret\":\n\t\treturn nil, EISDIR\n\tdefault:\n\t\ts, err := f.client.Logical().Read(name)\n\t\tif err != nil {\n\t\t\treturn nil, fuse.ENOENT\n\t\t}\n\n\t\tif s == nil || s.Data == nil {\n\t\t\treturn nil, fuse.ENOENT\n\t\t}\n\n\t\tfile = nodefs.NewDataFile([]byte(s.Data[\"value\"].(string)))\n\t}\n\n\tif file != nil {\n\t\tfile = nodefs.NewReadOnlyFile(file)\n\t\treturn file, fuse.OK\n\t}\n\treturn nil, fuse.ENOENT\n}", "title": "" }, { "docid": "91540ebd13a00d6a9596031fc8b39b28", "score": "0.594543", "text": "func (rf *RufsFuse) Open(name string, flags uint32, context *fuse.Context) (file nodefs.File, code fuse.Status) {\n\treturn &RufsFile{nodefs.NewDefaultFile(), path.Join(\"/\", name), rf.Tree}, fuse.OK\n}", "title": "" }, { "docid": "2d7c091936b60f0e3d91ae6784f9484b", "score": "0.59301776", "text": "func (db *Database) Open(flags ...DBFlag) (e error) {\n\tif C.sqlite3_threadsafe() == 0 {\n\t\tpanic(\"sqlite library is not thread-safe\")\n\t}\n\tif db.handle != nil {\n\t\te = CANTOPEN\n\t} else {\n\t\tdb.DBFlag = 0\n\t\tfor _, v := range flags {\n\t\t\tdb.DBFlag |= v\n\t\t}\n\n\t\tcs := C.CString(db.Filename)\n\t\tdefer C.free(unsafe.Pointer(cs))\n\t\te = SQLiteError(C.sqlite3_open_v2(cs, &db.handle, C.int(db.DBFlag), nil))\n\n\t\tif e == nil && db.handle == nil {\n\t\t\te = CANTOPEN\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "62f56a174bbd1e54984192d248c9fd25", "score": "0.591239", "text": "func openFile(path string) (*os.File, error) {\n\treturn os.Open(path)\n}", "title": "" }, { "docid": "ea19cbf6fa8ea6134c5f212c5c0a6f3e", "score": "0.5876951", "text": "func (n *Node) Open(ctx context.Context, flags uint32) (fh fusefs.FileHandle, fuseFlags uint32, errno syscall.Errno) {\n\tdefer log.Trace(n, \"flags=%#o\", flags)(\"errno=%v\", &errno)\n\t// fuse flags are based off syscall flags as are os flags, so\n\t// should be compatible\n\thandle, err := n.node.Open(int(flags))\n\tif err != nil {\n\t\treturn nil, 0, translateError(err)\n\t}\n\t// If size unknown then use direct io to read\n\tif entry := n.node.DirEntry(); entry != nil && entry.Size() < 0 {\n\t\tfuseFlags |= fuse.FOPEN_DIRECT_IO\n\t}\n\treturn newFileHandle(handle, n.fsys), fuseFlags, 0\n}", "title": "" }, { "docid": "3b619ea5bf5e77a71fd00e1a37333e98", "score": "0.58353794", "text": "func OpenFile(u *user.User, name string, flags int, perm uint32) (*os.File, error) {\n\tuid, gid, err := getIds(u)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\targs := C.au_open_args_t{\n\t\tids: C.au_ids_t{uid: uid, gid: gid},\n\t\tpath: C.CString(name),\n\t\tflags: C.uint(flags),\n\t\tmode: C.uint(perm),\n\t}\n\n\tfd, err := C.au_open(&args)\n\tif fd < 0 {\n\t\treturn nil, err\n\t}\n\treturn os.NewFile(uintptr(fd), name), nil\n}", "title": "" }, { "docid": "df9aab949c227d90ec6e8e922f38e680", "score": "0.58071905", "text": "func (f *SymlinkFileSystem) OpenFile(name string, flag int, perm os.FileMode) (absfs.File, error) {\n\tf.m.Lock()\n\tdefer f.m.Unlock()\n\treturn f.sfs.OpenFile(name, flag, perm)\n}", "title": "" }, { "docid": "9673c534050c516879510309d99bc12f", "score": "0.5793381", "text": "func (o *OSBuilder) OpenFile(path string) (io.WriteCloser, error) {\n\treturn os.OpenFile(path, os.O_WRONLY|os.O_CREATE, o.FileMode)\n}", "title": "" }, { "docid": "d674245bd593182ea376b2d9d9a2d766", "score": "0.57891566", "text": "func openFile(name string) (*os.File, error) {\n\tfile, err := os.OpenFile(name, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t_, err = file.Seek(0, 2)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn file, nil\n}", "title": "" }, { "docid": "de84b1b6698870a4e6003d9fb904070f", "score": "0.57825685", "text": "func OpenFileDirectIO(filePath string, flag int, perm os.FileMode) (*os.File, error) {\n\treturn os.OpenFile(filePath, flag, perm)\n}", "title": "" }, { "docid": "f5a71cb5658cbc37ec83639d4de09c42", "score": "0.5775061", "text": "func Open(fpath string, options ...ReadOption) (*Reader, error) {\n\tf, err := os.Open(fpath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar (\n\t\toffset int64\n\t\tnum int64\n\t)\n\n\t// Read our reserved header.\n\tif err := binary.Read(f, endian, &offset); err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot read index offset: %q\", err)\n\t}\n\n\tif err := binary.Read(f, endian, &num); err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot read number of entries from reserved header: %q\", err)\n\t}\n\n\tr := &Reader{indexOffset: offset, len: num, file: f}\n\tfor _, option := range options {\n\t\toption(r)\n\t}\n\n\tif r.cacheIndex {\n\t\tr.readOffsets()\n\t}\n\treturn r, nil\n}", "title": "" }, { "docid": "d53133e77be9cf8b24b32b53dda04864", "score": "0.5771707", "text": "func openFile(path string) (file *os.File) {\n\texists, err := checkFileOrDirectory(path)\n\tcheckError(err)\n\n\tif exists {\n\t\tfile, err = os.OpenFile(path, os.O_WRONLY, 0666)\n\t\tcheckError(err)\n\t} else {\n\t\tfile, err = os.Create(path)\n\t\tcheckError(err)\n\t\tfile.Write(make([]byte, CHUNK_SIZE*FILE_SIZE))\n\t\tfile.Sync()\n\t}\n\n\treturn file\n}", "title": "" }, { "docid": "8985cd4b75fc4cfd433651637fe11ae7", "score": "0.5758315", "text": "func (f *File) Open() (io.Reader, error) {\n\tif f.ino.Mode&ifmt != ifreg {\n\t\treturn nil, fmt.Errorf(\"not a regular file\")\n\t}\n\treturn &fileReader{f, 0}, nil\n}", "title": "" }, { "docid": "0e7d5401eeb4c219cd197fff9543a999", "score": "0.5734595", "text": "func Open(\n\tctx context.Context,\n\tpath string,\n\tmode os.FileMode,\n\topts *bbolt.Options,\n) (*bbolt.DB, error) {\n\tif mode == 0 {\n\t\tmode = 0600\n\t}\n\n\tif ctx.Err() != nil {\n\t\t// Bail early if the context is already ended. This is necessary because\n\t\t// if we put a non-positive timeout in the BoltDB options it will just\n\t\t// use the default timeout.\n\t\treturn nil, ctx.Err()\n\t}\n\n\tif timeout, ok := linger.FromContextDeadline(ctx); ok {\n\t\tif opts == nil {\n\t\t\tclone := *bbolt.DefaultOptions\n\t\t\topts = &clone\n\t\t\topts.Timeout = timeout\n\t\t} else if opts.Timeout == 0 || opts.Timeout > timeout {\n\t\t\tclone := *opts\n\t\t\topts = &clone\n\t\t\topts.Timeout = timeout\n\t\t}\n\t}\n\n\tdb, err := bbolt.Open(path, mode, opts)\n\n\tif err != nil && err.Error() == \"timeout\" {\n\t\terr = context.DeadlineExceeded\n\t}\n\n\treturn db, err\n}", "title": "" }, { "docid": "2e96db3f4163e8938839d9ee73e713b7", "score": "0.5728308", "text": "func (scenario *Scenario) openFile(filepath string) {\n\tvar err error\n\n\tscenario.file, err = os.OpenFile(filepath, os.O_RDWR|os.O_CREATE, os.ModePerm)\n\n\tif err != nil {\n\t\tutils.LogE.Printf(\"unable to open %s\", err)\n\t}\n}", "title": "" }, { "docid": "b4e284675bc97a7d347d7dca02a356eb", "score": "0.57223696", "text": "func (n *SdfsConnection) Open(ctx context.Context, path string, flags int32) (fh int64, err error) {\n\tfi, err := n.fc.Open(ctx, &spb.FileOpenRequest{Path: n.GetAbsPath(path), Flags: flags})\n\tif err != nil {\n\t\tlog.Print(err)\n\t\treturn fh, err\n\t} else if fi.GetErrorCode() > 0 {\n\t\treturn fh, &SdfsError{Err: fi.GetError(), ErrorCode: fi.GetErrorCode()}\n\t}\n\tif n.DedupeEnabled {\n\t\tn.Dedupe.Open(n.GetAbsPath(path), fi.FileHandle)\n\t}\n\treturn fi.FileHandle, nil\n}", "title": "" }, { "docid": "d53bf99a4716e3657311fd567728e0dc", "score": "0.5687634", "text": "func openLogFile(dir, name string) *os.File {\n\t/* TODO: Unhardcode modes */\n\t/* Make sure directory exists */\n\tif err := os.MkdirAll(dir, 0755); err != nil {\n\t\tlog.Fatalf(\"Unable to create directory %v: %v\", dir, err)\n\t\treturn nil\n\t}\n\n\tf, err := os.OpenFile(path.Join(dir, name),\n\t\tos.O_WRONLY|os.O_APPEND|os.O_CREATE|os.O_EXCL, 0644)\n\tif err != nil {\n\t\tlog.Printf(\"Unable to open %v: %v\", name, err)\n\t\treturn nil\n\t}\n\treturn f\n}", "title": "" }, { "docid": "31cb588c3b26d00b3b0ce7ecd67f8ec0", "score": "0.56857246", "text": "func Open(f string) (r io.Closer, err error) {\n\tr, err = os.Open(f)\n\tif err != nil {\n\t\tlog.Fatal(\"open file fail\")\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "a04759f0ddd2fe9dd920c1c935c2d288", "score": "0.5663124", "text": "func (o *Opener) Open(name string) (*os.File, error) {\n\treturn o.OpenFile(name, os.O_RDONLY, 0)\n}", "title": "" }, { "docid": "d1c0362c4dbb64fffadbd37d0cd9b829", "score": "0.5636609", "text": "func OpenLog(filepath string) (*os.File, error) {\n\treturn os.Open(filepath)\n}", "title": "" }, { "docid": "f039059c880f7b4ed676c508476522de", "score": "0.5602855", "text": "func OpenFile(name string, flags int) (*File, error) {\n\tc_name := C.CString(name)\n\tdefer C.free(unsafe.Pointer(c_name))\n\n\t// FIXME: file props\n\thid := C.H5Fopen(c_name, C.uint(flags), P_DEFAULT.id)\n\tif err := checkID(hid); err != nil {\n\t\treturn nil, fmt.Errorf(\"error opening hdf5 file: %s\", err)\n\t}\n\treturn newFile(hid), nil\n}", "title": "" }, { "docid": "d93749bce17fd3a5b8de8789d9f44337", "score": "0.55957484", "text": "func Open(path string) (*Flock, error) {\n\tfile, err := os.OpenFile(path, os.O_RDWR|os.O_CREATE, 0600)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Flock{file}, nil\n}", "title": "" }, { "docid": "31a7b888854a6913bb9cc427cf13c7cd", "score": "0.5584424", "text": "func (pd *ProductionDependencies) OpenFile(s string, i int, fm os.FileMode) (File, error) {\n\tif !build.DEBUG {\n\t\treturn os.OpenFile(s, i, fm)\n\t}\n\n\tf, err := os.OpenFile(s, i, fm)\n\tif err != nil {\n\t\treturn f, err\n\t}\n\n\tpd.mu.Lock()\n\tif pd.openFiles == nil {\n\t\tpd.openFiles = make(map[string]int)\n\t}\n\tv := pd.openFiles[s]\n\tpd.openFiles[s] = v + 1\n\tpd.mu.Unlock()\n\treturn &ProductionFile{\n\t\tpd: pd,\n\t\tFile: f,\n\t}, nil\n}", "title": "" }, { "docid": "88d44be866179a79da7a86e305c10089", "score": "0.5580328", "text": "func (fp *FP) openFile(filename string, inclChain location.LocChain,\n) (*os.File, *location.L, error) {\n\tfixedFileName, err := FixFileName(filename)\n\tif err != nil {\n\t\treturn nil, nil, fmt.Errorf(\"%s: Couldn't expand: '%s' : %s\",\n\t\t\tfp.noteStr(inclChain), filename, err.Error())\n\t}\n\n\tloopFound, loopMsg := inclChain.HasLoop(fixedFileName)\n\tif loopFound {\n\t\treturn nil, nil,\n\t\t\tfmt.Errorf(\"loop found: '%s' has been visited before: %s\",\n\t\t\t\tfixedFileName, loopMsg)\n\t}\n\n\tfd, err := os.Open(fixedFileName) // nolint: gosec\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tloc := location.New(fixedFileName)\n\tloc.SetNote(fp.noteStr(inclChain))\n\n\treturn fd, loc, nil\n}", "title": "" }, { "docid": "22c266b394a0ec589697c9aeacf5a617", "score": "0.5576799", "text": "func Open(name string) (File, error) {\n\treturn fs.OpenFile(name, os.O_RDONLY)\n}", "title": "" }, { "docid": "ba4e416e46f3e332090c7f51afcf72ea", "score": "0.5576044", "text": "func Open(filename string, flags ...DBFlag) (db *Database, e error) {\n\tdefer func() {\n\t\tif x := recover(); x != nil {\n\t\t\tdb.Close()\n\t\t\tdb = nil\n\t\t\te = MISUSE\n\t\t}\n\t}()\n\tdb = &Database{Filename: filename}\n\tif len(flags) == 0 {\n\t\te = db.Open(O_FULLMUTEX, O_READWRITE, O_CREATE)\n\t} else {\n\t\te = db.Open(flags...)\n\t}\n\treturn\n}", "title": "" }, { "docid": "a369e25e66a5031bb59474dbab3b87b2", "score": "0.5562932", "text": "func (file *FileStorage) Open(fd FileDesc) (Reader, error) {\n\t// info, err := os.Stat(fd.Path)\n\t// if err != nil {\n\t// \treturn nil, err\n\t// }\n\n\tfile.fd = &FileDesc{\n\t\tType: types.FileStorageType,\n\t\tCap: uint64(fd.Cap),\n\t\tPath: fd.Path,\n\t}\n\n\tfp, err := os.Open(fd.Path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn fp, err\n}", "title": "" }, { "docid": "8a711e5e9f80a1db38c0abf145d3bfdf", "score": "0.55594456", "text": "func OpenOrCreateFile(filename string) (*os.File, error) {\n\treturn os.OpenFile(filename, os.O_RDWR|os.O_CREATE, 0777)\n}", "title": "" }, { "docid": "0d87264a36d8fe5abe93726745209262", "score": "0.5559201", "text": "func (ops *FileOps) Open(file string) (*os.File, error) {\n\treturn os.Open(file)\n}", "title": "" }, { "docid": "d19cc4c573bdcce4a673b57e934d7d9c", "score": "0.5555354", "text": "func (a fileattrs) FileMode() os.FileMode {\n\treturn os.FileMode(a.Mode)\n}", "title": "" }, { "docid": "a30fc191d231ba701a865da2b967daaa", "score": "0.55505353", "text": "func Open(filename string, config *Config) (*File, error) {\n\n\tif config == nil {\n\t\tconfig = DefaultConfig()\n\t}\n\n\tdbname := C.CString(filename)\n\tdefer C.free(unsafe.Pointer(dbname))\n\n\trv := File{name: path.Base(filename)}\n\trv.advLock.Init()\n\tLog.Tracef(\"fdb_open call rv:%p dbname:%v conf:%v\", &rv, dbname, config.config)\n\terrNo := C.fdb_open(&rv.dbfile, dbname, config.config)\n\tLog.Tracef(\"fdb_open ret rv:%p errNo:%v rv:%v\", &rv, errNo, rv)\n\tif errNo != RESULT_SUCCESS {\n\t\tif errNo == C.FDB_NONRECOVERABLE_ERR {\n\t\t\treturn nil, FDB_CORRUPTION_ERR\n\t\t}\n\t\treturn nil, Error(errNo)\n\t}\n\treturn &rv, nil\n}", "title": "" }, { "docid": "efd0f41f7bffdfd7b2089ec6bcf328af", "score": "0.55477726", "text": "func Open(name string) (*os.File, error) {\n\tdefer updateOSMetrics(osMetricOpen, name)()\n\treturn os.Open(name)\n}", "title": "" }, { "docid": "69508d838de7513033adc19bc75ca137", "score": "0.5544339", "text": "func Open(name string) (*FS, error) {\n\tvar off int64\n\tif i := strings.Index(name, \"@\"); i >= 0 {\n\t\tv, err := strconv.ParseInt(name[i+1:], 0, 64)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid offset in name %q\", name)\n\t\t}\n\t\toff = v\n\t\tname = name[:i]\n\t}\n\n\tf, err := os.Open(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar r io.ReaderAt = f\n\tif off != 0 {\n\t\tr = &readerAtOffset{r, off}\n\t}\n\n\tfs, err := Init(r)\n\tif err != nil {\n\t\tf.Close()\n\t\treturn nil, err\n\t}\n\tfs.c = f\n\treturn fs, nil\n}", "title": "" }, { "docid": "3cdc513b83ddaf429864ada671a5a83f", "score": "0.5539727", "text": "func OpenOrCreateFile(path string) (*os.File, error) {\n\treturn os.OpenFile(path, os.O_WRONLY|os.O_APPEND|os.O_CREATE, DEFAULT_PERM)\n}", "title": "" }, { "docid": "fbb76416fbadf274c8a9a4729d9a839b", "score": "0.5507825", "text": "func (opnr *Opener) Open(f io.Reader) error {\n\ttmpfile, err := tmpFile()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"tempfile creation failed\")\n\t}\n\tdefer tmpfile.Close()\n\n\tif err := opnr.prepareFile(tmpfile, f); err != nil {\n\t\treturn errors.Wrap(err, \"tmp file perpare\")\n\t}\n\n\turl := fmt.Sprintf(\"file:///%s\", tmpfile.Name())\n\tcmd := exec.Command(opnr.cmdName, url)\n\tif err := cmd.Run(); err != nil {\n\t\treturn errors.Wrap(err, \"open letter in the browser failed\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "70e5363adcf8055dd38a7e10db13f48c", "score": "0.5497129", "text": "func Open(name string) (*File, error) {\n\tf, err := os.Open(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tff, err := NewFile(f)\n\tif err != nil {\n\t\tf.Close()\n\t\treturn nil, err\n\t}\n\tff.closer = f\n\treturn ff, nil\n}", "title": "" }, { "docid": "76c2e51a1f3a2f38e0f5c358e4fb352b", "score": "0.5495789", "text": "func (cli *Client) Open(path string, flags uint32, attr os.FileInfo) (string, error) {\n\topen := &sshfxp.Open{\n\t\tFilename: path,\n\t\tPFlags: flags,\n\t\tAttributes: sshfxp.Attr{}, // TODO: not yet supported\n\t}\n\n\tresCh, err := cli.send(open)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tres := <-resCh\n\tif err := sshfxp.IsError(res); err != nil {\n\t\treturn \"\", err\n\t}\n\n\tswitch msg := res.(type) {\n\tcase *sshfxp.Handle:\n\t\treturn msg.Handle, nil\n\t}\n\n\treturn \"\", errors.New(\"unexpected response\")\n}", "title": "" }, { "docid": "debb3ef6e81140dd54c8b0db7166e6c6", "score": "0.54951787", "text": "func FileMode(name string) (os.FileMode, error) {\n\tfInfo, err := os.Lstat(name)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\treturn fInfo.Mode(), nil\n}", "title": "" }, { "docid": "458534d84405270c8081f4b251c32608", "score": "0.5482413", "text": "func StatModeToFilemode(mode uint32) os.FileMode {\n\tfm := os.FileMode(mode & 0777)\n\tswitch mode & syscall.S_IFMT {\n\tcase syscall.S_IFBLK:\n\t\tfm |= os.ModeDevice\n\tcase syscall.S_IFCHR:\n\t\tfm |= os.ModeDevice | os.ModeCharDevice\n\tcase syscall.S_IFDIR:\n\t\tfm |= os.ModeDir\n\tcase syscall.S_IFIFO:\n\t\tfm |= os.ModeNamedPipe\n\tcase syscall.S_IFLNK:\n\t\tfm |= os.ModeSymlink\n\tcase syscall.S_IFSOCK:\n\t\tfm |= os.ModeSocket\n\t}\n\tif mode&syscall.S_ISGID != 0 {\n\t\tfm |= os.ModeSetgid\n\t}\n\tif mode&syscall.S_ISUID != 0 {\n\t\tfm |= os.ModeSetuid\n\t}\n\tif mode&syscall.S_ISVTX != 0 {\n\t\tfm |= os.ModeSticky\n\t}\n\treturn fm\n}", "title": "" }, { "docid": "f4960d89bbf317980da7af7a2746535e", "score": "0.547127", "text": "func (f *Agency) OpenAndDonate(flag, path string, flags int) error {\n\tif len(path) == 0 {\n\t\treturn nil\n\t}\n\tfile, err := os.OpenFile(path, flags, 0644)\n\tif err != nil {\n\t\treturn err\n\t}\n\tf.DonateAndClose(flag, file)\n\treturn nil\n}", "title": "" }, { "docid": "87fed412492041e96d22bf5e7c56c316", "score": "0.54669327", "text": "func (ld *LocalDir) NewFileWithMode(size int, mode os.FileMode) (*LocalFile, error) {\n\tfileName := fmt.Sprintf(\"%dbytes - %s\", size, persist.RandomSuffix())\n\treturn ld.newFile(size, fileName, mode)\n}", "title": "" }, { "docid": "b00084a468c5bcc844ff85bd5f762c5e", "score": "0.5465534", "text": "func (f *fs) Open(name string) (afero.File, error) {\n\tp, err := f.strip(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn f.backend.Open(p)\n}", "title": "" }, { "docid": "bf48cdc35a645a6da3dd768245a66141", "score": "0.5448884", "text": "func OpenFile(histPath string) (io.ReadWriteCloser, error) {\n\tconst perms = 0700\n\tfile, err := os.OpenFile(histPath, os.O_RDWR, perms)\n\tif err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\tif err := os.MkdirAll(path.Dir(histPath), perms); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\treturn os.Create(histPath)\n\t\t}\n\t\treturn nil, err\n\t}\n\treturn file, err\n}", "title": "" }, { "docid": "d4b228a52a698f9c830723ee6518f85a", "score": "0.54459214", "text": "func Open(name string) (*os.File, error) {\n\treturn openFileSequential(name, windows.O_RDONLY)\n}", "title": "" }, { "docid": "03a9108392301647f24493503a16d7ca", "score": "0.5445572", "text": "func openFile(fn string) (io.ReadCloser, error) {\n\tif strings.HasSuffix(fn, \".zst\") {\n\t\treturn zstd.NewReader(fn), nil\n\t}\n\treturn os.Open(fn)\n}", "title": "" }, { "docid": "cfdbafc189ae76fc3e2fb8865ac1536b", "score": "0.54281586", "text": "func FileModeVal(o *os.FileMode) os.FileMode {\n\tif o == nil {\n\t\treturn 0\n\t}\n\treturn *o\n}", "title": "" }, { "docid": "64a328506721ad783f604ca11bb5b2e9", "score": "0.5426572", "text": "func OpenFile(f string) (*Database, error) {\n\tl, err := newFilePager(f)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn newDatabase(l, f+\"-journal\")\n}", "title": "" }, { "docid": "6925453c6713b4667a4bfdfbb0711ada", "score": "0.54128015", "text": "func openFile(file string) *os.File {\n\tf, err := os.Open(file)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn f\n}", "title": "" }, { "docid": "b5071b85f848f8364d545d96728cabb4", "score": "0.54110736", "text": "func (c *Context) Open(key string, off uint64) (io.Reader, error) {\n\tfi, fiErr := c.Stat(key)\n\tif fiErr != nil {\n\t\treturn nil, fiErr\n\t}\n\n\treturn c.OpenWithSize(key, off, uint64(fi.Size())), nil\n}", "title": "" }, { "docid": "cf9f0f33bacb8bf7350850a770309d05", "score": "0.54008514", "text": "func OpenFile(path string) (file *File, err os.Error) {\n\n\tfd, err := os.OpenFile(path, os.O_RDWR, 0666)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar header fileHeader\n\terr = binary.Read(fd, binary.BigEndian, &header)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif header.Magic != fileMagic || header.Version != 1 {\n\t\treturn nil, os.NewError(\"Not a valid graphpaper file\")\n\t}\n\n\tfile = &File{fd, &header}\n\treturn file, nil\n}", "title": "" }, { "docid": "73aa4ba72a3daf7d0a3ccd4062ca512a", "score": "0.54006416", "text": "func lOpenFile(L *lua.LState) int {\n\tfilePath := L.CheckString(1)\n\tfile, err := os.Open(filePath)\n\tif err != nil {\n\t\tL.ArgError(1, err.Error())\n\t\treturn 0\n\t}\n\n\tud := L.NewUserData()\n\tud.Value = file\n\tL.SetMetatable(ud, L.GetTypeMetatable(luaFileTypeName))\n\tL.Push(ud)\n\treturn 1\n}", "title": "" }, { "docid": "d14eb34676eb4478d65e05a69fafc248", "score": "0.53907067", "text": "func (p *FS) Open(name string) (io.ReadCloser, error) {\n\tf, err := os.Open(p.base + name)\n\treturn f, err\n}", "title": "" } ]
8164e7ab15d33f4d7a2819c3d52dc8ed
GetCategoryOk returns a tuple with the Category field value if set, nil otherwise and a boolean to check if the value has been set.
[ { "docid": "193fdfe33778183e39b5984917970ae5", "score": "0.7425191", "text": "func (o *InlineResponse200115) GetCategoryOk() (*InlineResponse2002Column, bool) {\n\tif o == nil || o.Category == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Category, true\n}", "title": "" } ]
[ { "docid": "d882b84c21757abcb2e7e698c6da2041", "score": "0.79953665", "text": "func (o *CatalogEntry) GetCategoryOk() (*string, bool) {\n\tif o == nil || o.Category == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Category, true\n}", "title": "" }, { "docid": "47ad4161df92ab8e830a00082f2afc84", "score": "0.77973586", "text": "func (o *SoftwarerepositoryCategoryMapper) GetCategoryOk() (*string, bool) {\n\tif o == nil || o.Category == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Category, true\n}", "title": "" }, { "docid": "0204a1e66608419d8c8fa89868993ad3", "score": "0.7773783", "text": "func (o *Transaction) GetCategoryOk() (*[]string, bool) {\n\tif o == nil || o.Category == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Category, true\n}", "title": "" }, { "docid": "30709f8ef9e7ef6351ad7ea83885db58", "score": "0.7767875", "text": "func (o *BulletinDTO) GetCategoryOk() (*string, bool) {\n\tif o == nil || o.Category == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Category, true\n}", "title": "" }, { "docid": "15b975077acc65ee0d5365325c261ded", "score": "0.76902914", "text": "func (o *IaasDeviceStatusAllOf) GetCategoryOk() (*string, bool) {\n\tif o == nil || o.Category == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Category, true\n}", "title": "" }, { "docid": "f90654c198ddb0a022e5ac1af0fd95c4", "score": "0.7600096", "text": "func (o *InlineObject26) GetCategoryOk() (*MessageCategoriesIdJsonCategory, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Category, true\n}", "title": "" }, { "docid": "9e2ee7b2022dc4057623244c9cd09310", "score": "0.7312984", "text": "func (o *SLOCorrectionCreateRequestAttributes) GetCategoryOk() (*SLOCorrectionCategory, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Category, true\n}", "title": "" }, { "docid": "404c12d8c74410ef425f50221735878d", "score": "0.71769094", "text": "func (o *Transaction) GetCategoryIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CategoryId.Get(), o.CategoryId.IsSet()\n}", "title": "" }, { "docid": "c231f7bf0044f8116cdacdac0038183f", "score": "0.6988527", "text": "func (o *BaseReportTransaction) GetCreditCategoryOk() (*CreditCategory, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreditCategory.Get(), o.CreditCategory.IsSet()\n}", "title": "" }, { "docid": "3cbffc65cd56c641cb0a28a711ebc114", "score": "0.6967232", "text": "func (o *TransactionSplit) GetCategoryIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CategoryId.Get(), o.CategoryId.IsSet()\n}", "title": "" }, { "docid": "5b34dde5388cb47576d7af349dc1e99c", "score": "0.6760692", "text": "func (o *TransactionSplit) GetCategoryNameOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CategoryName.Get(), o.CategoryName.IsSet()\n}", "title": "" }, { "docid": "2a2e20d2d6da85d19a24adae2949cf14", "score": "0.6689462", "text": "func (o *Content) GetContentCategoryOk() (*string, bool) {\n\tif o == nil || o.ContentCategory == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ContentCategory, true\n}", "title": "" }, { "docid": "f90691900fa631411d93dd0a2bf2ba80", "score": "0.6682561", "text": "func (o *FileversionFileversion) GetCategoryIdOk() (*int32, bool) {\n\tif o == nil || o.CategoryId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CategoryId, true\n}", "title": "" }, { "docid": "ffd7806cd1d8cf77ff63f3e566c08217", "score": "0.6556253", "text": "func (o *ViewSampleProject) GetCategoryIdOk() (*int32, bool) {\n\tif o == nil || o.CategoryId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CategoryId, true\n}", "title": "" }, { "docid": "430d8935d6d293a2ba0eae0f19e744fb", "score": "0.6548274", "text": "func (o *MicrosoftGraphControlScore) GetControlCategoryOk() (string, bool) {\n\tif o == nil || o.ControlCategory == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.ControlCategory, true\n}", "title": "" }, { "docid": "1d40e01978230ce5fb977ade4337b135", "score": "0.652781", "text": "func (o *InlineResponse20014Projects) GetCategoryOk() (*InlineResponse2002People12345Company, bool) {\n\tif o == nil || o.Category == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Category, true\n}", "title": "" }, { "docid": "7b430c523dfe6e8b91320f1b2b0f15f8", "score": "0.6465614", "text": "func (o *InlineResponse20049Post) GetCategoryIdOk() (*string, bool) {\n\tif o == nil || o.CategoryId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CategoryId, true\n}", "title": "" }, { "docid": "472c062bfda19d87034836dad81acb93", "score": "0.6460835", "text": "func (o *InlineResponse2012) GetCategoryIdOk() (*string, bool) {\n\tif o == nil || o.CategoryId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CategoryId, true\n}", "title": "" }, { "docid": "4c824a31aa51fe7392f4919004c7b1a1", "score": "0.641847", "text": "func (o *SubTransactionParams) GetCategoryIdOk() (*int64, bool) {\n\tif o == nil || o.CategoryId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CategoryId, true\n}", "title": "" }, { "docid": "b82e5ca1daa054b86a20a022928f3fe5", "score": "0.6288903", "text": "func (o *UsageTopAvgMetricsHour) GetMetricCategoryOk() (*UsageMetricCategory, bool) {\n\tif o == nil || o.MetricCategory == nil {\n\t\treturn nil, false\n\t}\n\treturn o.MetricCategory, true\n}", "title": "" }, { "docid": "e7830c7468825afd26c27b3d6f4b0673", "score": "0.61973095", "text": "func shouldCategory(cat Category, lvl Level) (ok bool, name string) {\n\tcatmx.RLock()\n\tif lvl >= categories[cat].lvl {\n\t\tok = true\n\t\tname = categories[cat].name\n\t}\n\tcatmx.RUnlock()\n\treturn\n}", "title": "" }, { "docid": "5f0990f840f452d0735a51818e807bd6", "score": "0.608531", "text": "func (_Mcapscontroller *McapscontrollerCaller) HasCategory(opts *bind.CallOpts, categoryID *big.Int) (bool, error) {\n\tvar out []interface{}\n\terr := _Mcapscontroller.contract.Call(opts, &out, \"hasCategory\", categoryID)\n\n\tif err != nil {\n\t\treturn *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(bool)).(*bool)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "5a34b274827e7628d65e7da765e0343f", "score": "0.6025744", "text": "func (o *ClientConfiguration) GetCategoryRestrictionsOk() (*[]Category, bool) {\n\tif o == nil || o.CategoryRestrictions == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CategoryRestrictions, true\n}", "title": "" }, { "docid": "d2d879751199af56fca0c6b19771c027", "score": "0.59963834", "text": "func (o *InlineResponse20049Post) GetCategoryNameOk() (*string, bool) {\n\tif o == nil || o.CategoryName == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CategoryName, true\n}", "title": "" }, { "docid": "1fba642fd3e3ed35eb2c7f2d26abe728", "score": "0.597407", "text": "func (o *Transaction) GetPersonalFinanceCategoryOk() (*PersonalFinanceCategory, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.PersonalFinanceCategory.Get(), o.PersonalFinanceCategory.IsSet()\n}", "title": "" }, { "docid": "693b6388da7d30ba0751223f0aca7835", "score": "0.5932327", "text": "func (flag *flag) GetCategory() string {\n\treturn \"\"\n}", "title": "" }, { "docid": "aa2690dc6dc708753d2f8b580456b1e5", "score": "0.5921436", "text": "func (o *InlineResponse200115) HasCategory() bool {\n\tif o != nil && o.Category != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e33ba06738f64ae30de8c6ff2d276cb1", "score": "0.58961076", "text": "func (o *SoftwarerepositoryCategoryMapper) HasCategory() bool {\n\tif o != nil && o.Category != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "303a023c6d4133fa899e9815c66bb3ed", "score": "0.58869857", "text": "func (o *IaasMostRunTasksAllOf) GetTaskCategoryOk() (*string, bool) {\n\tif o == nil || o.TaskCategory == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TaskCategory, true\n}", "title": "" }, { "docid": "8a04aa120f34faab1035775c35f4cbda", "score": "0.58187616", "text": "func (o *InlineResponse20014Projects) HasCategory() bool {\n\tif o != nil && o.Category != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f05105eb80cbbe66ae7a7253defefb6b", "score": "0.5812533", "text": "func (Lawrencium) GetCategory() string {\n\tvar c categoryType = actinoid\n\treturn c.get()\n}", "title": "" }, { "docid": "87e213b916fcf45de4db2c94e45f8de6", "score": "0.5793301", "text": "func (o *IaasDeviceStatusAllOf) HasCategory() bool {\n\tif o != nil && o.Category != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "4c23f7e974fab8c5385f9e223b2eb1f4", "score": "0.57092535", "text": "func (o *BulletinDTO) HasCategory() bool {\n\tif o != nil && o.Category != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "45b76e8e57a888ff12a3547dee7e7b67", "score": "0.5699773", "text": "func (o *CatalogEntry) HasCategory() bool {\n\tif o != nil && o.Category != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "6ba009654e32b9361525469731cd2034", "score": "0.56990266", "text": "func (m *State) Category(channelID discord.Snowflake) bool {\n\tc, err := m.store.Channel(channelID)\n\tif err != nil || !c.CategoryID.Valid() {\n\t\treturn false\n\t}\n\n\treturn m.Channel(c.CategoryID)\n}", "title": "" }, { "docid": "0e8105c0797f3a7cbb80778840a1e956", "score": "0.56769854", "text": "func (Molybdenum) GetCategory() string {\n\tvar c categoryType = transitionMetal\n\treturn c.get()\n}", "title": "" }, { "docid": "69fe5565f8c54fc70a44113caac410a9", "score": "0.56759673", "text": "func (Cadmium) GetCategory() string {\n\tvar c categoryType = transitionMetal\n\treturn c.get()\n}", "title": "" }, { "docid": "9938c2b82e050ba4ad9ef816c80bc3d6", "score": "0.5622822", "text": "func (Samarium) GetCategory() string {\n\tvar c categoryType = lanthanoid\n\treturn c.get()\n}", "title": "" }, { "docid": "2a3ebf497a1f319e753fc0593245e02e", "score": "0.5604776", "text": "func (f *FlagBase[T, C, V]) GetCategory() string {\n\treturn f.Category\n}", "title": "" }, { "docid": "8a922ed8884ebdc018feb2a0d53063e7", "score": "0.55801874", "text": "func (o *SoftwarerepositoryCategoryMapper) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "cad0fa7c6530ae90206934c37a47ccea", "score": "0.5569322", "text": "func (o *IaasDeviceStatusAllOf) GetCategory() string {\n\tif o == nil || o.Category == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Category\n}", "title": "" }, { "docid": "2dc1d25dffc8e9ce2caac6773951b01f", "score": "0.5563848", "text": "func (_Mcapscontroller *McapscontrollerCallerSession) HasCategory(categoryID *big.Int) (bool, error) {\n\treturn _Mcapscontroller.Contract.HasCategory(&_Mcapscontroller.CallOpts, categoryID)\n}", "title": "" }, { "docid": "27790312d1c00e13b2dfeaf0572ce86b", "score": "0.5528955", "text": "func (Manganese) GetCategory() string {\n\tvar c categoryType = transitionMetal\n\treturn c.get()\n}", "title": "" }, { "docid": "244f6feeca5994962599cd0c14def108", "score": "0.54996276", "text": "func (Fermium) GetCategory() string {\n\tvar c categoryType = actinoid\n\treturn c.get()\n}", "title": "" }, { "docid": "3621e2dc469eb11a544ee9e181971f6f", "score": "0.54820585", "text": "func (m *GroupPolicyDefinition) GetCategory()(GroupPolicyCategoryable) {\n val, err := m.GetBackingStore().Get(\"category\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(GroupPolicyCategoryable)\n }\n return nil\n}", "title": "" }, { "docid": "954f16173a408e6c72cc96537fd532ed", "score": "0.547182", "text": "func (Tellurium) GetCategory() string {\n\tvar c categoryType = metalloid\n\treturn c.get()\n}", "title": "" }, { "docid": "8db84c6821cf93fc64a976b3008930f5", "score": "0.54509443", "text": "func (_Mcapscontroller *McapscontrollerSession) HasCategory(categoryID *big.Int) (bool, error) {\n\treturn _Mcapscontroller.Contract.HasCategory(&_Mcapscontroller.CallOpts, categoryID)\n}", "title": "" }, { "docid": "3673e8522f31c120e21d16bc6e152774", "score": "0.54300326", "text": "func (o *VersionedConnection) GetComponentTypeOk() (*string, bool) {\n\tif o == nil || o.ComponentType == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ComponentType, true\n}", "title": "" }, { "docid": "60ecee4b5324f697446e26178cee119c", "score": "0.540376", "text": "func (Technetium) GetCategory() string {\n\tvar c categoryType = transitionMetal\n\treturn c.get()\n}", "title": "" }, { "docid": "cc6be79393622ffcddb67e516b06162d", "score": "0.5366824", "text": "func (o *EventAttributes) GetSourcecategoryOk() (*string, bool) {\n\tif o == nil || o.Sourcecategory == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Sourcecategory, true\n}", "title": "" }, { "docid": "7579bc6858d6e009ae3976bf6227dd73", "score": "0.53592813", "text": "func (lb *Leaderboard) Category(embeds string) (*Category, *Error) {\n\t// we only have the category ID at hand\n\tasserted, okay := lb.CategoryData.(string)\n\tif okay {\n\t\treturn CategoryByID(asserted, embeds)\n\t}\n\n\treturn toCategory(lb.CategoryData, true), nil\n}", "title": "" }, { "docid": "553d68d3940ccc239ed818551240dd46", "score": "0.5340429", "text": "func (g *GetTopChatsRequest) GetCategory() (value TopChatCategoryClass) {\n\tif g == nil {\n\t\treturn\n\t}\n\treturn g.Category\n}", "title": "" }, { "docid": "1114dcfbafdefb2028d17c7bbb40c4c1", "score": "0.53127855", "text": "func (Krypton) GetCategory() string {\n\tvar c categoryType = nobleGas\n\treturn c.get()\n}", "title": "" }, { "docid": "df85eaf3a286a43129d73326d2ddff73", "score": "0.5307905", "text": "func (m *ThreatAssessmentRequest) GetCategory()(*ThreatCategory) {\n val, err := m.GetBackingStore().Get(\"category\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*ThreatCategory)\n }\n return nil\n}", "title": "" }, { "docid": "c2c90f93e40d859e55cc1cc40ca7e4ee", "score": "0.5298666", "text": "func (o *InlineResponse200115) GetCategory() InlineResponse2002Column {\n\tif o == nil || o.Category == nil {\n\t\tvar ret InlineResponse2002Column\n\t\treturn ret\n\t}\n\treturn *o.Category\n}", "title": "" }, { "docid": "797378369e2fbdd76dc2a3043be9467f", "score": "0.5281453", "text": "func (m *WindowsMalwareCategoryCount) GetCategory()(*WindowsMalwareCategory) {\n val, err := m.GetBackingStore().Get(\"category\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*WindowsMalwareCategory)\n }\n return nil\n}", "title": "" }, { "docid": "131773cc6e8b02ddcf6a73d7bdf9db67", "score": "0.52800035", "text": "func (o *NotificationConfig) GetChannelOk() (*string, bool) {\n\tif o == nil || o.Channel == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Channel, true\n}", "title": "" }, { "docid": "2a7645e477f90dfbeb58089c8480065a", "score": "0.5268289", "text": "func (Sodium) GetCategory() string {\n\tvar c categoryType = alkaliMetal\n\treturn c.get()\n}", "title": "" }, { "docid": "ce955ef58af30229f785a59c13f2bcc9", "score": "0.52613807", "text": "func (o *VersionedControllerService) GetComponentTypeOk() (*string, bool) {\n\tif o == nil || o.ComponentType == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ComponentType, true\n}", "title": "" }, { "docid": "d65a9c305907ac1af62cd0cd44273213", "score": "0.52536815", "text": "func TestCategory(t *testing.T) {\n\talltypes := []querypb.Type{\n\t\tNull,\n\t\tInt8,\n\t\tUint8,\n\t\tInt16,\n\t\tUint16,\n\t\tInt24,\n\t\tUint24,\n\t\tInt32,\n\t\tUint32,\n\t\tInt64,\n\t\tUint64,\n\t\tFloat32,\n\t\tFloat64,\n\t\tTimestamp,\n\t\tDate,\n\t\tTime,\n\t\tDatetime,\n\t\tYear,\n\t\tDecimal,\n\t\tText,\n\t\tBlob,\n\t\tVarChar,\n\t\tVarBinary,\n\t\tChar,\n\t\tBinary,\n\t\tBit,\n\t\tEnum,\n\t\tSet,\n\t\tGeometry,\n\t\tTypeJSON,\n\t\tExpression,\n\t\tHexNum,\n\t\tHexVal,\n\t\tBitNum,\n\t}\n\tfor _, typ := range alltypes {\n\t\tmatched := false\n\t\tif IsSigned(typ) {\n\t\t\tif !IsIntegral(typ) {\n\t\t\t\tt.Errorf(\"Signed type %v is not an integral\", typ)\n\t\t\t}\n\t\t\tmatched = true\n\t\t}\n\t\tif IsUnsigned(typ) {\n\t\t\tif !IsIntegral(typ) {\n\t\t\t\tt.Errorf(\"Unsigned type %v is not an integral\", typ)\n\t\t\t}\n\t\t\tif matched {\n\t\t\t\tt.Errorf(\"%v matched more than one category\", typ)\n\t\t\t}\n\t\t\tmatched = true\n\t\t}\n\t\tif IsFloat(typ) {\n\t\t\tif matched {\n\t\t\t\tt.Errorf(\"%v matched more than one category\", typ)\n\t\t\t}\n\t\t\tmatched = true\n\t\t}\n\t\tif IsQuoted(typ) {\n\t\t\tif matched {\n\t\t\t\tt.Errorf(\"%v matched more than one category\", typ)\n\t\t\t}\n\t\t\tmatched = true\n\t\t}\n\t\tif typ == Null || typ == Decimal || typ == Expression || typ == Bit ||\n\t\t\ttyp == HexNum || typ == HexVal || typ == BitNum {\n\t\t\tif matched {\n\t\t\t\tt.Errorf(\"%v matched more than one category\", typ)\n\t\t\t}\n\t\t\tmatched = true\n\t\t}\n\t\tif !matched {\n\t\t\tt.Errorf(\"%v matched no category\", typ)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1223e1606296a10f88d373299556f98e", "score": "0.5244184", "text": "func (tk Kinds) IsCat() bool {\n\treturn tk.Cat() == tk\n}", "title": "" }, { "docid": "822fc92bac5c44504322340f198475c2", "score": "0.52354294", "text": "func (o *WorkflowWorkflowDefinitionAllOf) GetCatalogOk() (*WorkflowCatalogRelationship, bool) {\n\tif o == nil || o.Catalog == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Catalog, true\n}", "title": "" }, { "docid": "6617554411c8e640b21170b0b56cd47e", "score": "0.5226811", "text": "func (w *withCode) Category() categories.Category {\n\tswitch code := w.Code().Int(); {\n\tcase code < 50:\n\t\treturn grpcCategory(w.Code())\n\tcase code >= 50 && code < 100:\n\t\treturn categories.Temporary\n\tcase code >= 100 && code < 150:\n\t\treturn categories.System\n\tcase code >= 150 && code < 200:\n\t\treturn categories.Data\n\tdefault:\n\t\treturn categories.Unknown\n\t}\n}", "title": "" }, { "docid": "f4fc070e5ccced98d10e98cf5c67ab43", "score": "0.5214166", "text": "func (o *MonitorSearchResult) GetClassificationOk() (*string, bool) {\n\tif o == nil || o.Classification == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Classification, true\n}", "title": "" }, { "docid": "41fa5a004ee9318b1bb84277047ffae5", "score": "0.52086955", "text": "func (m *ThreatAssessmentRequest) GetCategory()(*ThreatCategory) {\n return m.category\n}", "title": "" }, { "docid": "faef35ea4f78977d86eca24909856fff", "score": "0.5205631", "text": "func (o *WorkflowServiceItemDefinitionAllOf) GetCatalogOk() (*WorkflowCatalogRelationship, bool) {\n\tif o == nil || o.Catalog == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Catalog, true\n}", "title": "" }, { "docid": "bab76e34bb2d5a39a3ac48a85ab5aadd", "score": "0.5200548", "text": "func (Phosphorus) GetCategory() string {\n\tvar c categoryType = nonMetal\n\treturn c.get()\n}", "title": "" }, { "docid": "a9a23a238abd9d3618cffe9d008d058c", "score": "0.5193774", "text": "func (o *CatalogEntry) GetTypeOk() (*string, bool) {\n\tif o == nil || o.Type == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Type, true\n}", "title": "" }, { "docid": "4df898950a5046141939468a0556bb98", "score": "0.5187213", "text": "func (o *DataPlaneClusterUpdateStatusRequestConditions) GetTypeOk() (*string, bool) {\n\tif o == nil || o.Type == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Type, true\n}", "title": "" }, { "docid": "92673db97bd9730a818ded6b2d6f8dc5", "score": "0.51698434", "text": "func (o *Invoice) GetChannelOk() (*string, bool) {\n\tif o == nil || o.Channel == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Channel, true\n}", "title": "" }, { "docid": "0e2851064f81c72fb53b02663352353d", "score": "0.51691025", "text": "func (o *KubernetesAddonDefinitionAllOf) GetCatalogOk() (*KubernetesCatalogRelationship, bool) {\n\tif o == nil || o.Catalog == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Catalog, true\n}", "title": "" }, { "docid": "97ded8c3a9e6d6aa2a9a44bc8286960b", "score": "0.51675606", "text": "func (o *SoftwarerepositoryCategoryMapper) GetFileTypeOk() (*string, bool) {\n\tif o == nil || o.FileType == nil {\n\t\treturn nil, false\n\t}\n\treturn o.FileType, true\n}", "title": "" }, { "docid": "705dddcbd44ba65a78ebcbfeaf40f2d4", "score": "0.51630247", "text": "func (o *SoftwarerepositoryCategoryMapper) GetCategory() string {\n\tif o == nil || o.Category == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Category\n}", "title": "" }, { "docid": "7e945d2beea33d8eb36d934e51ca4e47", "score": "0.5162894", "text": "func (p *Permission) HasCategory(category category.Category) bool {\n\tfor _, c := range p.Categories {\n\t\tif c == category {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "453af07e221fa1d538dc84d56854c8ba", "score": "0.51521", "text": "func (da *DumbAnalyserImpl) GetCategory(message string) (cat string, confidence int) {\n\n\tfor k, v := range da.categories {\n\t\tfor _, keyword := range v {\n\t\t\tif strings.Contains(message, keyword) {\n\t\t\t\treturn k, 90\n\t\t\t}\n\t\t}\n\t}\n\treturn \"\", 0\n}", "title": "" }, { "docid": "c9e7322ec9ee7eb13363fc50cf535acb", "score": "0.514969", "text": "func (o *SoftwarerepositoryCategoryMapper) GetVersionOk() (*string, bool) {\n\tif o == nil || o.Version == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Version, true\n}", "title": "" }, { "docid": "cffc413aebd7a192b738583c435a02e9", "score": "0.5143294", "text": "func (o *Transaction) GetCategory() []string {\n\tif o == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\n\treturn o.Category\n}", "title": "" }, { "docid": "34c9db55a784ed0aa23cee8aa49ad070", "score": "0.5142881", "text": "func (o *SLOCorrectionCreateRequestAttributes) GetCategory() SLOCorrectionCategory {\n\tif o == nil {\n\t\tvar ret SLOCorrectionCategory\n\t\treturn ret\n\t}\n\treturn o.Category\n}", "title": "" }, { "docid": "f3c21b27f8a7671897087f2016b861a8", "score": "0.51313996", "text": "func (o *FileversionFileversion) HasCategoryId() bool {\n\tif o != nil && o.CategoryId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "18c19f4aaf0a0ae022be0de873c6e96a", "score": "0.5104585", "text": "func (o *ViewSampleProject) HasCategoryId() bool {\n\tif o != nil && o.CategoryId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "05fb45d2ff28889bbf5b96917cae2323", "score": "0.50992614", "text": "func (m *DirectoryAudit) GetCategory()(*string) {\n return m.category\n}", "title": "" }, { "docid": "06b8dba93ecd06d94a6297ef0f94cd77", "score": "0.50886685", "text": "func (o *Transaction) GetPersonalFinanceCategoryIconUrlOk() (*string, bool) {\n\tif o == nil || o.PersonalFinanceCategoryIconUrl == nil {\n\t\treturn nil, false\n\t}\n\treturn o.PersonalFinanceCategoryIconUrl, true\n}", "title": "" }, { "docid": "a9a55be7276ca31dc9da61c6fc10ad02", "score": "0.5080374", "text": "func (m *PatientMutation) CategoryCleared() bool {\n\treturn m.clearedcategory\n}", "title": "" }, { "docid": "453eb4e61fd378f528ef49794ac792a0", "score": "0.5073454", "text": "func (o *SubTransactionParams) HasCategoryId() bool {\n\tif o != nil && o.CategoryId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "69f8b44258c68422f91b11def1288e66", "score": "0.50733155", "text": "func (o *TransactionSplit) HasCategoryName() bool {\n\tif o != nil && o.CategoryName.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "fc64b513c38bfc04712ce6ea0e0206d7", "score": "0.50552243", "text": "func (o *SoftwarerepositoryCategoryMapper) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "title": "" }, { "docid": "ff89562331e2070068f876d8d4742261", "score": "0.5052005", "text": "func (o *TransactionSplit) HasCategoryId() bool {\n\tif o != nil && o.CategoryId.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "1c5cf152f73b6647195053443b520015", "score": "0.5051984", "text": "func (k Feature_Kind) IsCategorical() bool { return k == Feature_CATEGORICAL }", "title": "" }, { "docid": "77b3e69ede6cd4425f223b89f8264cd4", "score": "0.5032645", "text": "func (categories *Categories) CreateCategory(category Category, language string) (Category, error) {\n\texistsCategories, err := categories.ReadCategoriesByName(category.Name, language)\n\tif err != nil && err != ErrCategoriesByNameNotFound {\n\t\tlog.Println(err)\n\t\treturn category, ErrCategoryCanNotBeCreated\n\t}\n\tif existsCategories != nil {\n\t\treturn existsCategories[0], ErrCategoryAlreadyExist\n\t}\n\n\ttransaction := categories.storage.Client.NewTxn()\n\n\tcategory.IsActive = true\n\tencodedCategory, err := json.Marshal(category)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn category, ErrCategoryCanNotBeCreated\n\t}\n\n\tmutation := &dataBaseAPI.Mutation{\n\t\tSetJson: encodedCategory,\n\t\tCommitNow: true}\n\n\tassigned, err := transaction.Mutate(context.Background(), mutation)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn category, ErrCategoryCanNotBeCreated\n\t}\n\n\tcategory.ID = assigned.Uids[\"blank-0\"]\n\tif category.ID == \"\" {\n\t\treturn category, ErrCategoryCanNotBeCreated\n\t}\n\n\terr = categories.AddLanguageOfCategoryName(category.ID, category.Name, language)\n\tif err != nil {\n\t\treturn category, err\n\t}\n\n\tcreatedCategory, err := categories.ReadCategoryByID(category.ID, language)\n\tif err != nil {\n\t\treturn category, err\n\t}\n\n\treturn createdCategory, nil\n}", "title": "" }, { "docid": "6c628214b71e35922ace0ff561895a0e", "score": "0.5023751", "text": "func (o *InlineResponse2012) HasCategoryId() bool {\n\tif o != nil && o.CategoryId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "7c09d0e4a484c49bdd315678cccba293", "score": "0.5023728", "text": "func (o *SoftwarerepositoryCategoryMapper) GetTagTypesOk() ([]string, bool) {\n\tif o == nil || o.TagTypes == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TagTypes, true\n}", "title": "" }, { "docid": "0ac70b3e15cb2cb6feeeb62887756059", "score": "0.50223655", "text": "func (o *EventSubcategory) GetDescriptionOk() (*string, bool) {\n\tif o == nil || o.Description == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Description, true\n}", "title": "" }, { "docid": "311e2a75bce3071c7a66eab3a7ff5e77", "score": "0.50111187", "text": "func (i ID) Category() Category {\n\treturn Category((i.Raw() & CategoryMask) >> BitwidthReserved)\n}", "title": "" }, { "docid": "bfcbecc1931f80997be31a969573b870", "score": "0.49909714", "text": "func (o *BulletinDTO) GetCategory() string {\n\tif o == nil || o.Category == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Category\n}", "title": "" }, { "docid": "8742df7ab59d0b87ca62045998db65c4", "score": "0.49843866", "text": "func (o *InlineResponse20049Post) HasCategoryId() bool {\n\tif o != nil && o.CategoryId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e08e7fde3a4a971a08d213ed746d2e6a", "score": "0.49843276", "text": "func (t Type) Category() orc.Category {\n\tswitch t {\n\tcase Int32:\n\t\treturn orc.CategoryInt\n\tcase Int64:\n\t\treturn orc.CategoryLong\n\tcase Float64:\n\t\treturn orc.CategoryDouble\n\tcase String:\n\t\treturn orc.CategoryString\n\tcase Bool:\n\t\treturn orc.CategoryBoolean\n\tcase Timestamp:\n\t\treturn orc.CategoryTimestamp\n\tcase JSON:\n\t\treturn orc.CategoryString\n\t}\n\n\tpanic(fmt.Errorf(\"typeof: orc type for %v is not found\", t))\n}", "title": "" }, { "docid": "602d06a7806a110db9d377e74e264dbf", "score": "0.49829355", "text": "func (o *InlineResponse20049Post) HasCategoryName() bool {\n\tif o != nil && o.CategoryName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "8127ddcbf10e0b6bb7abfcd17ab681b8", "score": "0.4982731", "text": "func GetCat(catid uint32) (models.Category, error) {\n\tvar catInfo models.Category\n\n\terr := DB.Where(\"id = ?\", catid).First(&catInfo).Error\n\n\tif err == gorm.ErrRecordNotFound {\n\t\tlog.Info.Println(err)\n\t\treturn catInfo, ErrNotFound\n\t} else if err != nil {\n\t\tlog.Warning.Println(err)\n\t\treturn catInfo, ErrInternal\n\t}\n\treturn catInfo, nil\n}", "title": "" }, { "docid": "f964d4871187d0d28cd3ae6c718fab81", "score": "0.4978672", "text": "func (fc *FileCreate) SetNillableCategory(s *string) *FileCreate {\n\tif s != nil {\n\t\tfc.SetCategory(*s)\n\t}\n\treturn fc\n}", "title": "" }, { "docid": "8c32ea82f6236993c2426bd508ff136f", "score": "0.49739152", "text": "func (m *PatientMutation) CategoryID() (id int, exists bool) {\n\tif m.category != nil {\n\t\treturn *m.category, true\n\t}\n\treturn\n}", "title": "" } ]
41f465cba7f0196ae58fc83a502b2155
SetLogLevel sets the log level of the logger
[ { "docid": "f82337e7a7338b07b0de39aa771135a3", "score": "0.7776371", "text": "func (log *Logger) SetLogLevel(level string) {\n\tlog.LogLevel = level\n\tif log.LogLevel == \"debug\" {\n\t\tlog.logLevelCode = 1\n\t} else if log.LogLevel == \"info\" {\n\t\tlog.logLevelCode = 2\n\t} else if log.LogLevel == \"warning\" {\n\t\tlog.logLevelCode = 3\n\t} else if log.LogLevel == \"error\" {\n\t\tlog.logLevelCode = 4\n\t} else if log.LogLevel == \"fatal\" {\n\t\tlog.logLevelCode = 5\n\t} else {\n\t\t// Default case is set to 'info'\n\t\tlog.LogLevel = \"info\"\n\t\tlog.SetLogLevel(log.LogLevel)\n\t}\n}", "title": "" } ]
[ { "docid": "fe59d64138e08b51e8412d751ed0dbd9", "score": "0.861519", "text": "func SetLogLevel(level int) {\n\tlogLevel = level\n}", "title": "" }, { "docid": "fe59d64138e08b51e8412d751ed0dbd9", "score": "0.861519", "text": "func SetLogLevel(level int) {\n\tlogLevel = level\n}", "title": "" }, { "docid": "fe59d64138e08b51e8412d751ed0dbd9", "score": "0.861519", "text": "func SetLogLevel(level int) {\n\tlogLevel = level\n}", "title": "" }, { "docid": "fe59d64138e08b51e8412d751ed0dbd9", "score": "0.861519", "text": "func SetLogLevel(level int) {\n\tlogLevel = level\n}", "title": "" }, { "docid": "af3079f9f7231a14a0c2bfa4962bd0d4", "score": "0.8595141", "text": "func SetLogLevel(level Level) {\n\tlogLevel = level\n}", "title": "" }, { "docid": "f9e6e7e9a413e049e3836acfdd8f839d", "score": "0.85181904", "text": "func SetLogLevel(level LogLevel) {\n\tlogLevel = level\n}", "title": "" }, { "docid": "5cadeab792037bff376d56039c630c95", "score": "0.8515345", "text": "func (l *Logger) SetLogLevel(lv LogLevel) {\n\tl.logLevel = lv\n}", "title": "" }, { "docid": "46cde01978db1048415a1c416ab14865", "score": "0.85006684", "text": "func SetLogLevel(level string) {\n\tlogLevel = level\n}", "title": "" }, { "docid": "28b1ecc36dddf13c9152527f97ed8933", "score": "0.8490985", "text": "func SetLogLevel(level logging.Level) {\n\tlogger.SetLevel(level)\n}", "title": "" }, { "docid": "6afe816edf4650f4061ad634f29c9e97", "score": "0.841766", "text": "func SetLogLevel(lvl logrus.Level) {\n\tlog.Level = lvl\n}", "title": "" }, { "docid": "6afe816edf4650f4061ad634f29c9e97", "score": "0.841766", "text": "func SetLogLevel(lvl logrus.Level) {\n\tlog.Level = lvl\n}", "title": "" }, { "docid": "95c5768c4131d35a13e2bce4c3ed1dd9", "score": "0.8359991", "text": "func SetLogLevel(level LogLevel) {\n\tlogger.SetLevel(level)\n}", "title": "" }, { "docid": "9f869c0772b78654da6715c214bd9d03", "score": "0.8337197", "text": "func (l *Loggie) SetLogLevel(level loglevel) {\n\tl.loglvl = level\n}", "title": "" }, { "docid": "cc4d6d62454d58bac06ca4cd6447554d", "score": "0.8333702", "text": "func SetLogLevel(level logging.Level) {\n\tlogging.SetLevel(level, logger)\n}", "title": "" }, { "docid": "9bdd0b3b6e2cd8cc1de968d32da49225", "score": "0.8327984", "text": "func SetLogLevel(lvl int) {\n\tDefaultLogger.mu.Lock()\n\tdefer DefaultLogger.mu.Unlock()\n\tDefaultLogger.level = lvl\n}", "title": "" }, { "docid": "e8b2f9b28767489a065a3a12b3f14a03", "score": "0.8277953", "text": "func SetLogLevel(lv byte) {\n\tlevel = lv\n}", "title": "" }, { "docid": "42b91d0de762efa5237dd85bda1f9432", "score": "0.8263766", "text": "func (c *Core) SetLogLevel(l uint8) {\n\tc.l.SetLevel(l)\n}", "title": "" }, { "docid": "92615dff5424d715dc742866e627c371", "score": "0.8238001", "text": "func (log *LOG) SetLogLevel(logLevel int) *LOG {\n\tlog.logLevel = logLevel\n\treturn log\n}", "title": "" }, { "docid": "2ab86b455be0f72a2a8a314897fcee70", "score": "0.8213265", "text": "func (s *Service) SetLogLevel() {\n\tif s.LogLevel == \"\" {\n\t\treturn\n\t}\n\n\tlogctx := log.WithField(\"level\", s.LogLevel)\n\tlogctx.Info(\"Setting log level\")\n\n\tlevel, err := log.ParseLevel(s.LogLevel)\n\tif err != nil {\n\t\tlogctx.WithError(err).Warn(\"invalid log level, falling back to level 'info'\")\n\t\treturn\n\t}\n\n\tlog.SetLevel(level)\n}", "title": "" }, { "docid": "0b9d22a2c41dfc4a06ead08a484bd099", "score": "0.82113534", "text": "func SetLogLevel(level logrus.Level) {\n\tAperLog.Infoln(\"set log level :\", level)\n\tlog.SetLevel(level)\n}", "title": "" }, { "docid": "5f12b68116df6be7e55ec0d8bcc7ecb7", "score": "0.8208219", "text": "func SetLogLevel(level int) {\n\tif logImpl != nil {\n\t\tlogImpl.SetLevel(level)\n\t}\n}", "title": "" }, { "docid": "25956bbbf68b2680c51f40052c1aefe5", "score": "0.8184697", "text": "func (l *Logger) SetLogLevel(lv logrus.Level) {\n\tl.Logger.SetLevel(lv)\n}", "title": "" }, { "docid": "f4ba051820a730570de35b953120441e", "score": "0.81832725", "text": "func SetLogLevel(log *logrus.Logger, level int) {\n\tlvls := []logrus.Level{\n\t\tlogrus.WarnLevel,\n\t\tlogrus.InfoLevel,\n\t\tlogrus.DebugLevel,\n\t\tlogrus.TraceLevel,\n\t}\n\tif level > 3 {\n\t\tlevel = 3\n\t} else if level < 0 {\n\t\tlevel = 0\n\t}\n\tlog.SetLevel(lvls[level])\n}", "title": "" }, { "docid": "fdfccf38a0ebbc8dab717f2da9fa7256", "score": "0.8162439", "text": "func SetLogLevel(newLevel LogLevel) {\n\tlevel = newLevel\n}", "title": "" }, { "docid": "f713cd3d47f169f98aa715e5505e9068", "score": "0.81190306", "text": "func SetLogLevel(l LogLevel) {\n\tmux.Lock()\n\tdefer mux.Unlock()\n\tlvl = l\n}", "title": "" }, { "docid": "7c1a42737eb6ddb709315467eebd2c70", "score": "0.81160057", "text": "func SetLogLevel(level int) {\n\tif level == LogDebug {\n\t\tlog.SetLevel(log.DebugLevel)\n\t} else if level == LogVerbose {\n\t\tlog.SetLevel(log.InfoLevel)\n\t} else if level == LogDiscard {\n\t\tlog.SetLevel(log.WarnLevel)\n\t} else {\n\t\tpanic(fmt.Sprintf(\"Incorrect log level - %v\", level))\n\t}\n}", "title": "" }, { "docid": "7891f2bbe91ccec47f89799981b24902", "score": "0.80939066", "text": "func SetLogLevel(logLevel string) {\n\tlevel, err := log.ParseLevel(logLevel)\n\terrors.CheckError(err)\n\tlog.SetLevel(level)\n}", "title": "" }, { "docid": "261e98be9958d971acc5da30ec9c303f", "score": "0.8089022", "text": "func SetLogLevel(level uint8) {\n\tif level > LevelSilent {\n\t\tlevel = LevelSilent\n\t}\n\n\tlogLevel = level\n}", "title": "" }, { "docid": "77c92aa8a598e31c761f1e9596102327", "score": "0.8075109", "text": "func SetLogLevel(level logmod.Level) {\n\tplog.SetLevel(level)\n}", "title": "" }, { "docid": "f27eca7ad480c5fd66591d98ac386c7b", "score": "0.80700225", "text": "func (f *FileLogger) SetLogLevel(lv Level) {\n\tf.level = lv\n}", "title": "" }, { "docid": "00022dbb391b20173f31c476fe0280ea", "score": "0.804803", "text": "func (log *defaultLogger) SetLogLevel(level string) error {\n\tactualLevel, err := rlog.ParseLevel(level)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlog.inner.SetLevel(actualLevel)\n\treturn nil\n}", "title": "" }, { "docid": "cfd025d9948df4e31833184977d8caf8", "score": "0.7969558", "text": "func SetLogLevel(l int) {\r\n\tsessionLogger.SetLevel(l)\r\n}", "title": "" }, { "docid": "8d29d75eb51b8a1940f1e463dce8414b", "score": "0.79264367", "text": "func SetLogLevel() {\n\t// Output to stdout instead of the default stderr\n\t// Can be any io.Writer, see below for File example\n\tlogrus.SetOutput(os.Stdout)\n\tswitch C.LogLevel {\n\tcase \"trace\":\n\t\tlogrus.SetLevel(logrus.TraceLevel)\n\tcase \"debug\":\n\t\tlogrus.SetLevel(logrus.DebugLevel)\n\tcase \"warn\":\n\t\tlogrus.SetLevel(logrus.WarnLevel)\n\tcase \"error\":\n\t\tlogrus.SetLevel(logrus.ErrorLevel)\n\tdefault:\n\t\tlogrus.SetLevel(logrus.InfoLevel)\n\t}\n}", "title": "" }, { "docid": "fbe04a86f028cbe7f40b788f9bd082ee", "score": "0.78886116", "text": "func SetLogLevel(logger *logrus.Logger, l string, def logrus.Level) {\n\tlevel, err := logrus.ParseLevel(l)\n\tif err != nil {\n\t\tlogger.Warnf(\"Could not parse log level, setting to %v\", def)\n\t\tlevel = def\n\t}\n\t// Enables more verbose output if the log level is above info\n\tif level > 4 {\n\t\tlogger.SetReportCaller(true)\n\t}\n\tlogger.SetLevel(level)\n\tlogger.Infof(\"Log level set to %s\", logger.GetLevel().String())\n}", "title": "" }, { "docid": "b8fa8cfedbeff3c1f5fe98cc63c4e8b5", "score": "0.78885734", "text": "func SetLogLevel(logLevel string) {\n\tif logLevel != \"\" {\n\t\tlvl, err := logrus.ParseLevel(logLevel)\n\t\tif err != nil {\n\t\t\tfmt.Fprintf(os.Stderr, \"Unable to parse logging level: %s\\n\", logLevel)\n\t\t\tos.Exit(1)\n\t\t}\n\t\tlogrus.SetLevel(lvl)\n\t} else {\n\t\tlogrus.SetLevel(logrus.InfoLevel)\n\t}\n}", "title": "" }, { "docid": "75f2143217546694f78d5cb7fbe5a3ec", "score": "0.78665876", "text": "func SetLogLevel(level string) {\n\tlevelInt, err := logrus.ParseLevel(level)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tLog.Level = levelInt\n\n\t// guber.Log.SetLevel(level)\n}", "title": "" }, { "docid": "412484b6d66830e4a010a3f1e1df367f", "score": "0.7853255", "text": "func (lc MockLogger) SetLogLevel(loglevel string) error {\n\treturn nil\n}", "title": "" }, { "docid": "99af06930c98ec99818c709edb664322", "score": "0.7849589", "text": "func (obj *ServerLogDetails) SetLogLevel(level TGLogLevel) {\n\tobj.logLevel = level\n}", "title": "" }, { "docid": "358531b109e93a2c9696b6293d40879f", "score": "0.7818645", "text": "func (f *FFXInstance) SetLogLevel(ctx context.Context, level LogLevel) error {\n\treturn f.ConfigSet(ctx, \"log.level\", string(level))\n}", "title": "" }, { "docid": "880adf2ce6faa3f8d7f14ac7531ec585", "score": "0.78146017", "text": "func SetLogLevel(level LogLevel) {\n\tcurrentLevel = level\n}", "title": "" }, { "docid": "624b4ec36418eba6857495d49a93a779", "score": "0.7808176", "text": "func (l dummyLogger) SetLogLevel(level LogLevel) {\n}", "title": "" }, { "docid": "b885f4502bb2e9ab0deddb3a028a2d8a", "score": "0.77746093", "text": "func (m *loggingService) SetLogLevel(level log.Level) {\n\tm.level.Store(int32(level))\n}", "title": "" }, { "docid": "6112ab93689d4221ba41cd23ac4262c7", "score": "0.7744622", "text": "func (options *UpdateFilterConfigOptions) SetLogLevel(logLevel string) *UpdateFilterConfigOptions {\n\toptions.LogLevel = core.StringPtr(logLevel)\n\treturn options\n}", "title": "" }, { "docid": "3f80cd1e04877db8945735a519179594", "score": "0.77416694", "text": "func (c *Config) SetLogLevel(level logging.Level) *Config {\n\tc.logLevel = level\n\treturn c\n}", "title": "" }, { "docid": "470591a503bc2a854815f9fd842f0cbf", "score": "0.77348524", "text": "func SetLogLevel(level string) {\n\tlogLevel, _ := logging.LogLevel(strings.ToUpper(level)) // TODO Validate input\n\tlogging.SetLevel(logLevel, logger.Module)\n}", "title": "" }, { "docid": "dfa8613261a931e8dc639753b7def93c", "score": "0.7734849", "text": "func (l *WriterLogger) SetLogLevel(level LogLevel) {\n\tatomic.StoreInt32((*int32)(&l.level), int32(level))\n}", "title": "" }, { "docid": "54abbd630543a2ac4a60b36713a6309d", "score": "0.7731902", "text": "func (options *CreateFilterConfigOptions) SetLogLevel(logLevel string) *CreateFilterConfigOptions {\n\toptions.LogLevel = core.StringPtr(logLevel)\n\treturn options\n}", "title": "" }, { "docid": "dcb5460c0bcda1f9801f66283e379bc1", "score": "0.7727369", "text": "func SetLogLevel(level logging.Level) {\n\tleveled.SetLevel(level, \"\")\n}", "title": "" }, { "docid": "456b40a373aa8adbc3b74ed303019c5d", "score": "0.7674729", "text": "func SetLogLevel(loggingLevel string) {\n\tlogLevel = LogLevelsMap[loggingLevel]\n}", "title": "" }, { "docid": "ce09dd504fc09e32d540aaa061bf0e9f", "score": "0.7652663", "text": "func SetLogLevel(level string) Option {\n\treturn func(l *CustomLogger) {\n\t\tswitch level {\n\t\tcase \"ERROR\":\n\t\t\tl.logLevel = ERROR\n\t\tcase \"WARN\":\n\t\t\tl.logLevel = WARN\n\t\tcase \"INFO\":\n\t\t\tl.logLevel = INFO\n\t\tcase \"DEBUG\":\n\t\t\tfallthrough\n\t\tcase \"ALL\":\n\t\t\tl.logLevel = DEBUG\n\t\tdefault:\n\t\t\tl.logLevel = ERROR\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "3065d0df9fba9eb466d5a1e7b761ed68", "score": "0.7642433", "text": "func SetLogLevel(level string) {\n\tswitch level {\n\tcase \"TRACE\":\n\t\tLogger.SetLevel(logrus.TraceLevel)\n\tcase \"DEBUG\":\n\t\tLogger.SetLevel(logrus.DebugLevel)\n\tcase \"INFO\":\n\t\tLogger.SetLevel(logrus.InfoLevel)\n\tcase \"WARN\":\n\t\tLogger.SetLevel(logrus.WarnLevel)\n\tcase \"ERROR\":\n\t\tLogger.SetLevel(logrus.ErrorLevel)\n\t}\n}", "title": "" }, { "docid": "fc140aa5c8adf34afb774d0e3f2970d4", "score": "0.762284", "text": "func SetLogLevel(level string) {\n\tswitch strings.ToLower(level) {\n\tcase \"debug\":\n\t\tlog.SetLevel(log.DebugLevel)\n\tcase \"info\":\n\t\tlog.SetLevel(log.InfoLevel)\n\tcase \"warn\":\n\t\tlog.SetLevel(log.WarnLevel)\n\tcase \"error\":\n\t\tlog.SetLevel(log.ErrorLevel)\n\tdefault:\n\t\tlog.Fatalf(\"Unknown level: %s\", level)\n\t}\n}", "title": "" }, { "docid": "cd26df25007c229f53591ca4ee4d5e73", "score": "0.75510174", "text": "func setLogLevel(loglevel string) {\n\tklog.InitFlags(nil)\n\tklog.SetOutput(os.Stderr)\n\terr := level.Set(loglevel)\n\tif err != nil {\n\t\tklog.Exitf(\"fatal: cannot set logging level\\n\")\n\t}\n\tklog.V(1).Infof(\"Log level set to: %s\", loglevel)\n}", "title": "" }, { "docid": "4eb81c2dbf42f852c2094838f7ff6e02", "score": "0.75327975", "text": "func SetLevel(l Level) {\n\tlogger.SetLevel(l)\n}", "title": "" }, { "docid": "649fd9e4c59cbf054c699e8ef0df421c", "score": "0.75291055", "text": "func SetLogLevel(level Level) {\n\tif proxy != nil {\n\t\tproxy.SetLevel(level)\n\t}\n}", "title": "" }, { "docid": "7c7a920c51c1386f6d2ced3fd24c498e", "score": "0.7496715", "text": "func SetLogLevel(level string) {\n\tswitch strings.ToLower(level) {\n\tcase \"debug\":\n\t\tintLogger.internal.SetLevel(logrus.DebugLevel)\n\tcase \"info\":\n\t\tintLogger.internal.SetLevel(logrus.InfoLevel)\n\tcase \"warn\":\n\t\tintLogger.internal.SetLevel(logrus.WarnLevel)\n\tcase \"error\":\n\t\tintLogger.internal.SetLevel(logrus.ErrorLevel)\n\tcase \"fatal\":\n\t\tintLogger.internal.SetLevel(logrus.FatalLevel)\n\t}\n}", "title": "" }, { "docid": "6e9ab463adf69171fdb41f41a7ca01e3", "score": "0.74657744", "text": "func (s *Options) SetLogLevel(v string) *Options {\n\ts.LogLevel = &v\n\treturn s\n}", "title": "" }, { "docid": "3d14528eea187ae9bfb3cac61c281fa3", "score": "0.74166125", "text": "func setLogLevel(logLevel string) {\n\tswitch logLevel {\n\tcase \"debug\":\n\t\tlogrus.SetLevel(logrus.DebugLevel)\n\tcase \"info\":\n\t\tlogrus.SetLevel(logrus.InfoLevel)\n\tcase \"warn\":\n\t\tlogrus.SetLevel(logrus.WarnLevel)\n\tcase \"error\":\n\t\tlogrus.SetLevel(logrus.ErrorLevel)\n\tcase \"fatal\":\n\t\tlogrus.SetLevel(logrus.FatalLevel)\n\tdefault:\n\t\tlogrus.WithField(\"log_level\", logLevel).Fatal(\"invalid value for field log_level\")\n\t}\n}", "title": "" }, { "docid": "4781d8264338bde60681903547ad89a2", "score": "0.73893124", "text": "func (r RepoLogger) SetLogLevel(m map[string]LogLevel) {\n\tlogger.Lock()\n\tdefer logger.Unlock()\n\tif l, ok := m[\"*\"]; ok {\n\t\tr.setRepoLogLevelInternal(l)\n\t}\n\tfor k, v := range m {\n\t\tl, ok := r[k]\n\t\tif !ok {\n\t\t\tcontinue\n\t\t}\n\t\tl.level = v\n\t}\n}", "title": "" }, { "docid": "f1df2e4c9a51a1f9b4ab5d7a42e212e1", "score": "0.73604435", "text": "func SetLevel(l int) {\n\tgoLogger.SetLevel(l)\n}", "title": "" }, { "docid": "f8193d4ab2d78cfde9f7f955c30f8050", "score": "0.73598516", "text": "func (app *App) SetLogLevel(name, loglevel string) error {\n\tlvl, ok := app.loggers[name]\n\tif !ok {\n\t\treturn fmt.Errorf(\"cannot find logger %v\", name)\n\t}\n\n\tif err := lvl.UnmarshalText([]byte(loglevel)); err != nil {\n\t\treturn fmt.Errorf(\"unmarshal text: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "48ee952e6d351eb70a32108d41b3b215", "score": "0.7279311", "text": "func SetLoggerLogLevel() {\n\tswitch strings.TrimSpace(os.Getenv(\"CYPRESS_PARALLEL_API_LOG_LEVEL\")) {\n\tcase \"panic\":\n\t\tzerolog.SetGlobalLevel(zerolog.PanicLevel)\n\tcase \"fatal\":\n\t\tzerolog.SetGlobalLevel(zerolog.FatalLevel)\n\tcase \"error\":\n\t\tzerolog.SetGlobalLevel(zerolog.ErrorLevel)\n\tcase \"warn\":\n\t\tzerolog.SetGlobalLevel(zerolog.WarnLevel)\n\tcase \"debug\":\n\t\tzerolog.SetGlobalLevel(zerolog.DebugLevel)\n\t\tgin.SetMode(\"debug\")\n\tcase \"trace\":\n\t\tzerolog.SetGlobalLevel(zerolog.TraceLevel)\n\tdefault:\n\t\tzerolog.SetGlobalLevel(zerolog.InfoLevel)\n\t}\n}", "title": "" }, { "docid": "8d55813f2b09d6f2bc5213b1d4562d8d", "score": "0.72776175", "text": "func SetLevel(l string) {\n\tlo := mlog.WithLevel(goMicroLevel(l))\n\tmlog.DefaultLogger = mlog.NewLogger(lo)\n\tlogger.level.SetLevel(zapLevel(l))\n\tInfof(\"log level changed to %s\", l)\n}", "title": "" }, { "docid": "bc9fec0c422504d234b2d37924e8de0f", "score": "0.7258772", "text": "func SetLogLevel(level string) {\n\tlogLevelOnce.Do(func() {\n\t\tswitch strings.ToUpper(level) {\n\t\tcase \"TRACE\":\n\t\t\tslog.SetLevel(slog.TraceLevel)\n\t\tcase \"DEBUG\":\n\t\t\tslog.SetLevel(slog.DebugLevel)\n\t\tcase \"INFO\":\n\t\t\tslog.SetLevel(slog.InfoLevel)\n\t\tcase \"WARN\":\n\t\t\tslog.SetLevel(slog.WarnLevel)\n\t\tcase \"PANIC\":\n\t\t\tslog.SetLevel(slog.PanicLevel)\n\t\tcase \"FATAL\":\n\t\t\tslog.SetLevel(slog.FatalLevel)\n\t\tdefault:\n\t\t\tslog.SetLevel(slog.PanicLevel)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "c8c6310cd6e8da35d272f3c4b588430d", "score": "0.7213766", "text": "func (l *Logger) SetLevel(lvl int) {\n\tl.level_log = lvl\n}", "title": "" }, { "docid": "dd7f4bd284877bf2be162df03a66a69b", "score": "0.7192998", "text": "func SetLevel(l int) {\n\tbeeLogger.SetLevel(l)\n}", "title": "" }, { "docid": "4f5fee8f1db176f54f2f5f39d9d663d9", "score": "0.7138346", "text": "func setLogLevel(subsystemID string, logLevel string) {\n\t// Ignore invalid subsystems.\n\tlogger, ok := subsystemLoggers[subsystemID]\n\tif !ok {\n\t\treturn\n\t}\n\n\t// Default to info if the log level is invalid.\n\tlevel, ok := btclog.LogLevelFromString(logLevel)\n\tif !ok {\n\t\tlevel = btclog.InfoLvl\n\t}\n\n\t// Create new logger for the subsystem if needed.\n\tif logger == btclog.Disabled {\n\t\tlogger = btclog.NewSubsystemLogger(backendLog, subsystemID+\": \")\n\n\t\tif admLog != seelog.Disabled {\n\t\t\tlogger = &AdmLogger{\n\t\t\t\tLogger: logger,\n\t\t\t\tadmLog: admLog,\n\t\t\t}\n\t\t}\n\n\t\tuseLogger(subsystemID, logger)\n\t}\n\tlogger.SetLevel(level)\n}", "title": "" }, { "docid": "7f5995d166e5f95b8f778983ac48c028", "score": "0.7113474", "text": "func setLogLevel(level string) {\n\tswitch level {\n\tcase \"debug\":\n\t\tlog.SetLevel(log.DebugLevel)\n\tcase \"info\":\n\t\tlog.SetLevel(log.InfoLevel)\n\tcase \"warn\":\n\t\tlog.SetLevel(log.WarnLevel)\n\tcase \"error\":\n\t\tlog.SetLevel(log.ErrorLevel)\n\tcase \"fatal\":\n\t\tlog.SetLevel(log.FatalLevel)\n\tdefault:\n\t\tlog.SetLevel(log.InfoLevel)\n\t}\n\tlog.WithField(\"level\", log.GetLevel()).Info(\"log level set\")\n}", "title": "" }, { "docid": "97ea02c9c63b4fbd9ef2a14eac2c3721", "score": "0.7102771", "text": "func (c *Ctx) SetLogLevel(level string) error {\n\tcanonical := strings.ToLower(level)\n\t// No strings.TrimSpace.\n\n\tswitch canonical {\n\tcase \"info\", \"debug\", \"none\":\n\tdefault:\n\t\treturn fmt.Errorf(\"Ctx.LogLevel '%s' isn't 'info', 'debug', or 'none'\", canonical)\n\t}\n\tc.LogLevel = canonical\n\treturn nil\n}", "title": "" }, { "docid": "72d97b06ce23f81387dcb66ac8db78ad", "score": "0.70767933", "text": "func SetLevel(level LogLevel) {\n\tmux.Lock()\n\tdefer mux.Unlock()\n\tloggerLevel = level\n}", "title": "" }, { "docid": "47f137a0cfb73c2f4603805a479e8132", "score": "0.70764285", "text": "func SetLevel(level log.Lvl) {\n\tlogger.SetLevel(level)\n}", "title": "" }, { "docid": "1d92b1a8c3a31c2307e7dd1b859f7da7", "score": "0.70465994", "text": "func SetLevel(l logger.Level) {\n\tdefaultLogger.SetLevel(l)\n}", "title": "" }, { "docid": "b3c65dce8052b7b193a3fb32d0b6b8a0", "score": "0.6999521", "text": "func (teo *Teonet) SetLoglevel(loglevel int) {\n\tlogstr := teolog.LoglevelString(loglevel)\n\tif teo.param.Loglevel == logstr {\n\t\tlogstr = teolog.LoglevelString(teolog.NONE)\n\t}\n\tteo.param.Loglevel = logstr\n\tteolog.SetLoglevel(logstr)\n}", "title": "" }, { "docid": "38a08dcddfb14c3b98d6221779ab3e45", "score": "0.6996444", "text": "func SetLoggerLevel(logger *log.Logger, cfg *viper.Viper) {\n\tlevel := cfg.GetString(\"log_level\")\n\tswitch level {\n\tcase \"debug\":\n\t\tlogger.SetLevel(log.DebugLevel)\n\tcase \"info\":\n\t\tlogger.SetLevel(log.InfoLevel)\n\tcase \"warn\":\n\t\tlogger.SetLevel(log.WarnLevel)\n\tcase \"error\":\n\t\tlogger.SetLevel(log.ErrorLevel)\n\tcase \"fatal\":\n\t\tlogger.SetLevel(log.FatalLevel)\n\tdefault:\n\t\tlogger.SetLevel(log.InfoLevel)\n\t}\n\tlogger.Infof(\"Log level: %s\", logger.GetLevel().String())\n}", "title": "" }, { "docid": "ef66432ee0e34364471e2115913f9551", "score": "0.69090533", "text": "func SetLoggerLevel(logger *logrus.Logger, logLevel string) error {\n\n\t// https://godoc.org/github.com/sirupsen/logrus#Level\n\t// https://golang.org/pkg/log/syslog/#Priority\n\t// https://en.wikipedia.org/wiki/Syslog#Severity_level\n\tswitch logLevel {\n\tcase LogLevelEmergency, LogLevelPanic:\n\t\tlogger.SetLevel(logrus.PanicLevel)\n\tcase LogLevelAlert, LogLevelCritical, LogLevelFatal:\n\t\tlogger.SetLevel(logrus.FatalLevel)\n\tcase LogLevelError:\n\t\tlogger.SetLevel(logrus.ErrorLevel)\n\tcase LogLevelWarn, LogLevelNotice:\n\t\tlogger.SetLevel(logrus.WarnLevel)\n\tcase LogLevelInfo:\n\t\tlogger.SetLevel(logrus.InfoLevel)\n\tcase LogLevelDebug:\n\t\tlogger.SetLevel(logrus.DebugLevel)\n\tcase LogLevelTrace:\n\t\tlogger.SetLevel(logrus.TraceLevel)\n\tdefault:\n\t\treturn fmt.Errorf(\"invalid option provided: %v\", logLevel)\n\t}\n\n\t// signal that a case was triggered as expected\n\treturn nil\n\n}", "title": "" }, { "docid": "1c026152d29752b39d3a524158f3dc09", "score": "0.6905791", "text": "func SetLoggerLevel(logger *Logger, lvl string) error {\n\tlevel, err := ParseLevel(lvl)\n\tif err == nil {\n\t\tlogger.SetLevel(level)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "1aa2e7526c96fee1804ba4c682d5214d", "score": "0.6896702", "text": "func (logger XOrmLoggerAdapter) SetLevel(l xorm.LogLevel) {\n\tif l == xorm.LOG_DEBUG {\n\t\tlogger.logLevel = settings.LOGLEVEL_DEBUG\n\t} else if l == xorm.LOG_INFO {\n\t\tlogger.logLevel = settings.LOGLEVEL_INFO\n\t} else if l == xorm.LOG_WARNING {\n\t\tlogger.logLevel = settings.LOGLEVEL_WARN\n\t} else if l == xorm.LOG_ERR {\n\t\tlogger.logLevel = settings.LOGLEVEL_ERROR\n\t}\n\n\tlogger.logLevel = settings.LOGLEVEL_INFO\n}", "title": "" }, { "docid": "a9cce862e9fec8ec0a294f5f7c4617d8", "score": "0.6877856", "text": "func SetLoggingLevel(level uint32, d time.Duration) *master.Call {\n\treturn &master.Call{\n\t\tType: master.Call_SET_LOGGING_LEVEL,\n\t\tSetLoggingLevel: &master.Call_SetLoggingLevel{\n\t\t\tLevel: level,\n\t\t\tDuration: mesos.DurationInfo{\n\t\t\t\tNanoseconds: d.Nanoseconds(),\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "babcce9b6f1e43aa51c9de64ae0fe3cb", "score": "0.6874612", "text": "func SetLoggingLevel(level LogLevel) {\n\tSetLogger(NewLogger(level, nil))\n}", "title": "" }, { "docid": "046e7dd6d2f76fe1d1216b1d929f0b5e", "score": "0.6870073", "text": "func (l *logger) SetLevel(lvl Level) {\n\tl.level = lvl\n}", "title": "" }, { "docid": "3a09885fb8b55e9b7ee01ec1eb152c9e", "score": "0.68691415", "text": "func SetLevel(level Level) {\n\tlogger.SetLevel(level)\n}", "title": "" }, { "docid": "3a09885fb8b55e9b7ee01ec1eb152c9e", "score": "0.68691415", "text": "func SetLevel(level Level) {\n\tlogger.SetLevel(level)\n}", "title": "" }, { "docid": "9da3b1bc35df3261cc5ec657748d620d", "score": "0.68487775", "text": "func SetLevel(lvl Level) {\n\tdefaultLogger.SetLevel(lvl)\n}", "title": "" }, { "docid": "9da3b1bc35df3261cc5ec657748d620d", "score": "0.68487775", "text": "func SetLevel(lvl Level) {\n\tdefaultLogger.SetLevel(lvl)\n}", "title": "" }, { "docid": "9da3b1bc35df3261cc5ec657748d620d", "score": "0.68487775", "text": "func SetLevel(lvl Level) {\n\tdefaultLogger.SetLevel(lvl)\n}", "title": "" }, { "docid": "f893f8d57bb4cca53bf35b1c5b5757b9", "score": "0.6843009", "text": "func (*logbook) SetLevel(string, mlog.Level) error {\n\t// Logging is disabled, return error\n\treturn mlog.ErrDisabledLogging\n}", "title": "" }, { "docid": "286a6b4db4cbf45a422226434e4e7667", "score": "0.68327475", "text": "func setLogLevel(level string) {\n\tswitch strings.ToLower(level) {\n\tcase \"info\":\n\t\tlogger.SetLevel(log.InfoLevel)\n\tcase \"debug\":\n\t\tlogger.SetLevel(log.DebugLevel)\n\tcase \"warn\":\n\t\tlogger.SetLevel(log.WarnLevel)\n\tcase \"error\":\n\t\tlogger.SetLevel(log.ErrorLevel)\n\tcase \"fatal\":\n\t\tlogger.SetLevel(log.FatalLevel)\n\tcase \"panic\":\n\t\tlogger.SetLevel(log.PanicLevel)\n\tdefault:\n\t\tlogger.SetLevel(log.DebugLevel)\n\t\tlogger.Warnf(\"Log level '%s' not recognised. Setting to Debug.\", level)\n\t}\n}", "title": "" }, { "docid": "f308288239dd39732926887bbac79103", "score": "0.68246406", "text": "func SetLevel(lvl int) Logger {\n\treturn defaultLogger.SetLevel(lvl)\n}", "title": "" }, { "docid": "b2b28b418152ecae45e6d840f5ae2177", "score": "0.68026453", "text": "func SetLevel(level Level) {\n\tgLogger.Level = level\n}", "title": "" }, { "docid": "f4f565795eca8aa865b31408684421a1", "score": "0.68005466", "text": "func (log *LeveledLogger) SetLevel(l LoggerLevel) {\n\tif l > FATAL {\n\t\tl = FATAL\n\t}\n\tlog.level = l\n}", "title": "" }, { "docid": "8880c8a58100701e62e7f159c80c2577", "score": "0.67753214", "text": "func setLogLevel(level string) {\n\tswitch level {\n\tcase \"debug\":\n\t\tlog.SetLevel(log.DebugLevel)\n\tcase \"info\":\n\t\tlog.SetLevel(log.InfoLevel)\n\tcase \"warning\":\n\t\tlog.SetLevel(log.WarnLevel)\n\tcase \"error\":\n\t\tlog.SetLevel(log.ErrorLevel)\n\tcase \"fatal\":\n\t\tlog.SetLevel(log.FatalLevel)\n\tcase \"panic\":\n\t\tlog.SetLevel(log.PanicLevel)\n\tdefault:\n\t\tlog.SetLevel(log.InfoLevel)\n\t}\n}", "title": "" }, { "docid": "7fcd8002b33be97ebca01aa698bc4c44", "score": "0.6750244", "text": "func (m *MultiLogger) SetLevel(level LogLevel) {\n\tif level < Everything || level > Off {\n\t\tpanic(\"Invalid log level\")\n\t}\n\tm.level = level\n}", "title": "" }, { "docid": "6dfab9f9f6a35d9552fbe017f8ef886c", "score": "0.67461044", "text": "func setLogLevel(c *Config) {\n\tswitch c.LogLevel {\n\tcase \"WARN\":\n\t\th := log15.CallerStackHandler(\"%+v\", log15.StdoutHandler)\n\t\th = log15.LvlFilterHandler(log15.LvlWarn, h)\n\t\tlog15.Root().SetHandler(h)\n\tcase \"ERROR\":\n\t\th := log15.CallerStackHandler(\"%+v\", log15.StdoutHandler)\n\t\th = log15.LvlFilterHandler(log15.LvlError, h)\n\t\tlog15.Root().SetHandler(h)\n\tcase \"INFO\":\n\t\th := log15.CallerStackHandler(\"%+v\", log15.StdoutHandler)\n\t\th = log15.LvlFilterHandler(log15.LvlInfo, h)\n\t\tlog15.Root().SetHandler(h)\n\tcase \"DEBUG\":\n\t\th := log15.CallerStackHandler(\"%+v\", log15.StdoutHandler)\n\t\th = log15.LvlFilterHandler(log15.LvlDebug, h)\n\t\tlog15.Root().SetHandler(h)\n\tdefault:\n\t\th := log15.CallerStackHandler(\"%+v\", log15.StdoutHandler)\n\t\th = log15.LvlFilterHandler(log15.LvlWarn, h)\n\t\tlog15.Root().SetHandler(h)\n\t\tlog15.Warn(\"Log level was set incorrectly in config file. Default WARN level was set.\")\n\t\tc.LogLevel = \"WARN\"\n\t}\n}", "title": "" }, { "docid": "9ea0d04c4415b74a351024b6d1f71ff6", "score": "0.6730992", "text": "func (this *Logger) SetLoggingLevel(level int) {\n\tthis.loggingLevel = level\n}", "title": "" }, { "docid": "7604992c2b7c340fa03365b31de7968f", "score": "0.6718677", "text": "func SetLevel(level log15.Lvl) {\n\tglobalLogLevel = level\n}", "title": "" }, { "docid": "a8867fd023f60e919b31bd89e69b9fd4", "score": "0.6718662", "text": "func SetLevel(level log.Level) {\n\tlog.SetLevel(level)\n}", "title": "" }, { "docid": "bc17683590a1d7bd83ed664a63adf4df", "score": "0.6713787", "text": "func (l *Logger) SetLevel(level logrus.Level) {\n\tl.logger.Level = level\n}", "title": "" }, { "docid": "e564abad7f114a9acecfad92af0ff80d", "score": "0.6711852", "text": "func SetLoggerLevel(str string) {\n\tloggerLevel = DEBUG\n\tstr = strings.ToUpper(str)\n\tswitch str {\n\t\tcase \"FINEST\":\n\t\tloggerLevel = FINEST\n\t\treturn\n\t\tcase \"DEBUG\":\n\t\tloggerLevel = DEBUG\n\t\treturn\n\t\tcase \"CONFIG\":\n\t\tloggerLevel = CONFIG \n\t\treturn\n\t\tcase \"INFO\":\n\t\tloggerLevel = INFO \n\t\treturn\n\t\tcase \"WARN\":\n\t\tloggerLevel = WARN \n\t\treturn\n\t\tcase \"ERROR\":\n\t\tloggerLevel = ERROR \n\t\treturn\n\t\tcase \"FATAL\":\n\t\tloggerLevel = FATAL\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "7a98ee48f5fe0446e460ca1e7da89a21", "score": "0.67090833", "text": "func SetLevel(level string) {\n\tlogLevel = getLevel(level)\n\n\tfor _, l := range loggers {\n\t\tl.SetLevel(level)\n\t}\n}", "title": "" }, { "docid": "d13c1093c97583a1c3e08c1fb0cb4930", "score": "0.66866976", "text": "func SetLogThreshold(level Level) {\n\tlogThreshold = levelCheck(level)\n\trefreshLogTypes()\n INFO.Printf(\"SetLogThreshold(%+v/%+v)\",level,logThreshold)\n}", "title": "" } ]
09c26f39fbda85530a4a0c817c6826b8
SetProcessorToken sets field value
[ { "docid": "c4eca1c27e029efd0b7e31995b63f690", "score": "0.5675416", "text": "func (o *ProcessorBankTransferCreateRequest) SetProcessorToken(v string) {\n\to.ProcessorToken = v\n}", "title": "" } ]
[ { "docid": "e6fb2e0438b811cc12eaba34c8d2d7b6", "score": "0.6458544", "text": "func (r *Result) SetToken(tok string) { r.tok = tok }", "title": "" }, { "docid": "8aa549d0c5df65936deeef868d27c85b", "score": "0.64016384", "text": "func (s *Scanner) SetToken(input string) {\n\ts.currentLine[s.cursor] = input\n}", "title": "" }, { "docid": "2af7325d2a3ac7be80fb6227813a2d3e", "score": "0.62482905", "text": "func SetToken(token string) {\n\tpinboardToken = token\n}", "title": "" }, { "docid": "a1f5b14bea011e29c8211efb77a9b1e9", "score": "0.61556196", "text": "func SetToken(token string) {\n\tstd.SetToken(token)\n}", "title": "" }, { "docid": "b0e207cdcc1afa3a4070443153534652", "score": "0.6038326", "text": "func (s *Service) SetToken(c context.Context, app, env, token string) (err error) {\n\targ := &model.ArgToken{\n\t\tApp: app,\n\t\tToken: token,\n\t\tEnv: env,\n\t}\n\tif err = s.confSvr.SetToken(c, arg); err != nil {\n\t\tlog.Error(\"SetToken(%v) error(%v)\", arg, err)\n\t}\n\treturn\n}", "title": "" }, { "docid": "c56085f0ac39c43ce46f59328e7aaa03", "score": "0.5836896", "text": "func (bc *BlockChain) SetProcessor(processor Processor) {\n\tbc.procmu.Lock()\n\tdefer bc.procmu.Unlock()\n\tbc.processor = processor\n}", "title": "" }, { "docid": "8cfe16d720c279a38c0a5c3dd0cdfdb9", "score": "0.57699287", "text": "func (o *Oddsy) SetToken(t string) {\n\to.token = t\n\to.logger.Println(\"Slack token is overwritten by environment variable.\")\n}", "title": "" }, { "docid": "c6511383c3169bacdf5ecfe5e299cd9a", "score": "0.5761336", "text": "func SetToken(s string) error {\n\tif s == \"\" {\n\t\treturn errors.New(\"token can not be empty\")\n\t}\n\n\tapiToken = s\n\treturn nil\n}", "title": "" }, { "docid": "c34077b15ed9b47251fe6a760759606e", "score": "0.57488495", "text": "func (e *EventListener) SetToken(token string) {\n\te.Token = token\n}", "title": "" }, { "docid": "d97770b208c6ef98d30c60831a3a8c74", "score": "0.57307005", "text": "func (c *CookieUtils) SetToken() string {\n\ttoken := uuid.Must(uuid.NewV4()).String()\n\tc.token.SetDefault(token, \"2\")\n\treturn token\n}", "title": "" }, { "docid": "21fa308cdab02c7fee8bf84a293531ba", "score": "0.5721452", "text": "func (c *Core) SetValidToken(token, username string) (err error) {\n\tc.CurrentBotUsername = username\n\tc.CurrentToken = token\n\n\terr = replaceFileValue(c.envFile, c.valueKey, token)\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = notifyHTTP(c.notifyURL)\n\n\treturn\n}", "title": "" }, { "docid": "8dbb48408f609984fab0242067a47de5", "score": "0.5718015", "text": "func (f *tokenCredential) SetToken(token string) { f.token.Store(token) }", "title": "" }, { "docid": "c254520d5d6039b82deab1d715c4ac88", "score": "0.56609416", "text": "func (k *Keep2ShareValue) setToken(t string) {\n\n\tk.Token = t\n\tlog.Debugln(\"Token to save in cache\", k.Token)\n\n\tk.Ristretto.Set(\"token\", t, 1)\n\tos.Setenv(\"k2stoken\", t)\n\n}", "title": "" }, { "docid": "6194aa70300740a94808fd3f516e9619", "score": "0.5597682", "text": "func (authenticator *VpcInstanceAuthenticator) setTokenData(tokenData *iamTokenData) {\n\tauthenticator.tokenDataMutex.Lock()\n\tdefer authenticator.tokenDataMutex.Unlock()\n\n\tauthenticator.tokenData = tokenData\n}", "title": "" }, { "docid": "eca8d9a7d9fafb4ea3cb9b32a6272be8", "score": "0.5583517", "text": "func ZBarProcessorSetUserData(processor *ZBarProcessor, userData unsafe.Pointer) {\n\tC.zbar_processor_set_userdata((*C.zbar_processor_t)(unsafe.Pointer(processor)), userData)\n}", "title": "" }, { "docid": "e2beeb2ae5743c92d581d5c037415dad", "score": "0.54981697", "text": "func (s *Settings) SetToken(token string) {\n\ts.Lock()\n\tdefer s.unlockAndSave()\n\ts.UserToken = token\n}", "title": "" }, { "docid": "57d72ac00383456dfb3f084d8b9e6052", "score": "0.5476646", "text": "func (c *Client) SetToken(token Token) {\n\tc.mux.Lock()\n\tc.token = token\n\tc.mux.Unlock()\n}", "title": "" }, { "docid": "45c8c4e73df471d2d28f0d058045d234", "score": "0.5474287", "text": "func SetToken(ctx context.Context, token string) context.Context {\n\treturn context.WithValue(ctx, tokenKey, token)\n}", "title": "" }, { "docid": "087d17ef143e5d904eb47cf285cb59df", "score": "0.54672277", "text": "func (l *Logger) SetProcessors(ps []Processor) { l.processors = ps }", "title": "" }, { "docid": "50f3130eee9f8d5e15ddb2746dc7087b", "score": "0.5407633", "text": "func (p *BaseParser) setTokenFactory(factory TokenFactory) {\n\tp.input.GetTokenSource().setTokenFactory(factory)\n}", "title": "" }, { "docid": "a72060833c34ad8f53787b978b8a63b0", "score": "0.5377862", "text": "func SetToken(tk string) {\n\ttoken = fmt.Sprintf(\"Bearer %s\", tk)\n}", "title": "" }, { "docid": "736aec38d86357b057150db522c35aad", "score": "0.5375448", "text": "func (h *Authorized) setToken(ctx *gin.Context) {\n\theader := ctx.GetHeader(\"Authorization\")\n\tfields := strings.Fields(header)\n\tif len(fields) == 2 && fields[0] == \"Bearer\" {\n\t\th.Token = fields[1]\n\t}\n}", "title": "" }, { "docid": "0f2827c78ff53be64eb7ed7d76c3c73a", "score": "0.5319939", "text": "func SetToken(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(webutilcfg.TokenHeader, csrf.Token(r))\n}", "title": "" }, { "docid": "fe93c5877968af986c0bc505b04f0935", "score": "0.5310454", "text": "func (me *TxsdReplaceableClass) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "57a7c6549b16778f40c1e69ea3a8f7f0", "score": "0.52968097", "text": "func SetToken(ctx context.Context, value *secure.Token) context.Context {\n\treturn context.WithValue(ctx, tokenKey, value)\n}", "title": "" }, { "docid": "a5da3706423f2e79999511d9efd7bd84", "score": "0.52896476", "text": "func (api *API) SetToken(token string) {\n\tapi.config.Token = token\n}", "title": "" }, { "docid": "56279879b7145c1642114f0fae94ec14", "score": "0.5262443", "text": "func (me *TxsdStepalternativesPerformance) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "d52d058b6a74db482f9b2b3579244a6e", "score": "0.524462", "text": "func (me *TxsdOthercreditClass) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "76a14816861006efcc7f604d9b4be186", "score": "0.52270484", "text": "func (db *DB) SetToken (u *User) (*errors.ApiError) {\n return nil\n}", "title": "" }, { "docid": "584d0fed0cef1e90141ea20f1d900739", "score": "0.52148795", "text": "func (tkn *ValueToken) SetValue(value string) {\n\ttkn.tokenValue = value\n}", "title": "" }, { "docid": "38fcfbda60cc5814cf705410065fd436", "score": "0.5183919", "text": "func (_m *IWebSocketChannel) SetChannelToken(_a0 string) {\n\t_m.Called(_a0)\n}", "title": "" }, { "docid": "d846d4dfc3108e5cbca74ef2e6dfc00c", "score": "0.51834136", "text": "func (f *tokenCredentialWithRefresh) SetToken(token string) { f.token.SetToken(token) }", "title": "" }, { "docid": "430961799345484eda256a3512267158", "score": "0.51704884", "text": "func (fbd *FBDAPI) SetToken(token string) {\n\tfbd.token = token\n}", "title": "" }, { "docid": "2f4f453ac8dde3e56b54006e58fa3609", "score": "0.5152303", "text": "func (ctx *Context) setSessionToken(sessionToken string) error {\n if ctx.opCtx == nil {\n ctx.opCtx = &op.Context{}\n }\n ctx.opCtx.SessionToken = sessionToken\n\n err := ctx.keystore.Set(sessionTokenDateKey, time.Now().Format(timeFormat))\n if err != nil {\n return err\n }\n return ctx.keystore.Set(sessionTokenValueKey, sessionToken)\n}", "title": "" }, { "docid": "41521b53069c24474a088516aee87e75", "score": "0.5152284", "text": "func (c *TrustedClusterV2) SetToken(token string) {\n\tc.Spec.Token = token\n}", "title": "" }, { "docid": "1dd97ad108fcab9fc0526c575bf520f9", "score": "0.51503074", "text": "func RegisterProcessor(name string, p thrift.TProcessor){\n\tprocessor.RegisterProcessor(name,p)\n\tTRACE.Printf(\"Registered RegisterProcessor: %s\", name)\n}", "title": "" }, { "docid": "c486460dfab10978487525adef43327d", "score": "0.5138015", "text": "func (c *Client) SetTokenRequest(tokenRequest interface{}) {\n\tc.mux.Lock()\n\tc.tokenRequest = tokenRequest\n\tc.mux.Unlock()\n}", "title": "" }, { "docid": "38e325917c89add35f566e404108fba8", "score": "0.5127236", "text": "func (d *DataBases) SetAppleDeviceToken(accountAddress, value string) (err error) {\n\tkey := appleDeviceToken + accountAddress\n\t_, err = d.Exec(\"SET\", key, value)\n\treturn err\n}", "title": "" }, { "docid": "0e2bc9e1ef003eed3013df992bd09cba", "score": "0.51243335", "text": "func (me *TxsdPremiseNumberNumberType) Set(s string) { (*xsdt.Nmtoken)(me).Set(s) }", "title": "" }, { "docid": "a95c46a7b6300570dcf98597f2393a7b", "score": "0.5119368", "text": "func (me *TxsdParameterClass) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "1edee63258f7c3b82d39dfcc03d6c966", "score": "0.51131123", "text": "func (me *TxsdOrderedlistNumeration) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "34deecbc1f28a43c93174d05f5439449", "score": "0.5112208", "text": "func SetToken(ctx context.Context, token string) context.Context {\r\n\treturn metadata.AppendToOutgoingContext(ctx, headerAuthorize, fmt.Sprintf(\"%s %s\", scheme, token))\r\n}", "title": "" }, { "docid": "1bec6b180ce7ad3ae0d8e8fcf00d12bb", "score": "0.5092444", "text": "func (me *TxsdArticleClass) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "e0e81bca2db329f6d46777117ed58fcb", "score": "0.50876415", "text": "func (me *TxsdMethodparamRep) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "74090e96848a1222074490d176c53eaa", "score": "0.5060133", "text": "func (ga *GenericArgs) SetToken(token string) {\n\tga.Token = token\n}", "title": "" }, { "docid": "59e2edfd5aec57bca5bd89195480e901", "score": "0.50533843", "text": "func (b *BonusLevel) markTokenAsUsed(token string, action int) {\n\t// sync\n\tb.ActionVariants[action].Mux.Lock()\n\tdefer b.ActionVariants[action].Mux.Unlock()\n\tb.ActionVariants[action].MuxValidTokens.Lock()\n\tdefer b.ActionVariants[action].MuxValidTokens.Unlock()\n\tb.ActionVariants[action].ValidTokens[token] = true\n\tSaveWrite(StatValidTokens, b.ActionVariants[action])\n}", "title": "" }, { "docid": "214fbd85010e15e64b5e7da8f0d9b3d5", "score": "0.50321954", "text": "func (userMetadata *userMetadata) UpdateToken(header, trailer metadata.MD) {\n\tif userMetadata.token == \"\" {\n\t\tif val, ok := header[\"bearer-token\"]; ok {\n\t\t\tuserMetadata.token = val[0]\n\t\t}\n\t}\n}", "title": "" }, { "docid": "538b022a0c033dcae0e49f47c24f6bd9", "score": "0.5024042", "text": "func (me *TxsdKeycapFunction) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "927b1d61949142ba4b793a4d72a126e0", "score": "0.50150645", "text": "func (me *TxsdMethodparamChoice) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "ac4ff01b2a704a5f4b880acdd4aa6db0", "score": "0.49905878", "text": "func (me *TxsdApplicationClass) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "bcd14db823745da5ec136a1c1c2c3fc8", "score": "0.4989617", "text": "func (me *TxsdImagedataValign) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "100476166a32e75ce2cb7aef3097ba14", "score": "0.49879602", "text": "func (s *Service) ProcessorContext(ctx context.Context, component, processor, key string) *ProcessorContext {\n\tvar operation *watchv1.Operation\n\n\t_, ok := s.watcher.WatchCount(component, processor, key)\n\tif ok {\n\t\toperation = &watchv1.Operation{}\n\t}\n\n\treturn &ProcessorContext{\n\t\tContext: ctx,\n\t\toperation: operation,\n\t\twatcher: s.watcher,\n\t\tcomponent: component,\n\t\tprocessor: processor,\n\t\tkey: key,\n\t}\n}", "title": "" }, { "docid": "2d5eed77d306b40078e435aea4a6c914", "score": "0.49758103", "text": "func (me *TxsdTagClass) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "466c4c3198830d7a63cf93f03a9f6650", "score": "0.49544463", "text": "func (m *ManagedDevice) SetProcessorArchitecture(value *ManagedDeviceArchitecture)() {\n err := m.GetBackingStore().Set(\"processorArchitecture\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "a9b653026d514be2fe028b38269563b7", "score": "0.49534237", "text": "func (m *CaseExportOperation) SetAzureBlobToken(value *string)() {\n err := m.GetBackingStore().Set(\"azureBlobToken\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "6232dc4f6280ade628027fa27b0511c8", "score": "0.49497458", "text": "func (me *TxsdIndextermClass) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "a2ec24aadd430ae6783c5341961b87e4", "score": "0.49478287", "text": "func ProcessFunc(p Processor) {\n processor = p\n }", "title": "" }, { "docid": "a7ffe6e5c3d2fa5c880abf113a9f28a6", "score": "0.49420962", "text": "func (c *Client) SetToken(token string) {\n\tc.configuration.token = token\n\tc.Transport.SetToken(token)\n}", "title": "" }, { "docid": "dc79d70e656adc283a4b82f4d37ee736", "score": "0.49414447", "text": "func (_PrivatePlacement *PrivatePlacementTransactor) SetTokenRate(opts *bind.TransactOpts, _tokenRate *big.Int) (*types.Transaction, error) {\n\treturn _PrivatePlacement.contract.Transact(opts, \"setTokenRate\", _tokenRate)\n}", "title": "" }, { "docid": "2650337786aeb8324547d9a3ba7b947d", "score": "0.4941266", "text": "func (p *Parser) SetTokenSeparator(sep byte) {\n\tp.mapper.tokenSep = sep\n}", "title": "" }, { "docid": "274711e6abf5f4f7692dddedd2feced4", "score": "0.49408326", "text": "func (me *TxsdBridgeheadRenderas) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "4ad75c2b9dc3b36bd225d472c7c7289c", "score": "0.49338695", "text": "func (me *TxsdParamdefChoice) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "b1a62bcc97d9b805c6cc28dd71d36bf3", "score": "0.49154443", "text": "func (r *AlibabaNazcaTokenAuthapplyGetAPIRequest) SetToken(_token string) error {\n\tr._token = _token\n\tr.Set(\"token\", _token)\n\treturn nil\n}", "title": "" }, { "docid": "3bc54a25f7fcc00bc0aaed27baff99b4", "score": "0.4905805", "text": "func SetAuthToken(token string) (err error) {\n\tcfg, err := readConfigFile(cfgFile)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tn, err := getCurrentClusterName()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tcluster := cfg.Clusters[n]\n\tcluster.Token = token\n\tcfg.Clusters[n] = cluster\n\terr = writeConfigFile(cfgFile, cfg)\n\treturn\n}", "title": "" }, { "docid": "7a7fe1c41f6d6543ef57a994edfa6de2", "score": "0.49043882", "text": "func (b *RouteBuilder) Processor(p Processor) *RouteBuilder {\n\tb.processor = p\n\treturn b\n}", "title": "" }, { "docid": "db03c28d3de9ec824207ae544ca33db2", "score": "0.48741156", "text": "func (m *DeviceAppManagement) SetVppTokens(value []VppTokenable)() {\n err := m.GetBackingStore().Set(\"vppTokens\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "3f122a1b96a7f86850f73335f91d1968", "score": "0.4868075", "text": "func (me *TxsdBibliorelationClass) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "fafbd87d6f22be728ea6663503c9453a", "score": "0.48587203", "text": "func (m *ManagedDevice) SetBootstrapTokenEscrowed(value *bool)() {\n err := m.GetBackingStore().Set(\"bootstrapTokenEscrowed\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "ec468731e8521188df7c62e9eccdf904", "score": "0.48509225", "text": "func (x *fastReflection_MsgEnableTokenizeShares) Set(fd protoreflect.FieldDescriptor, value protoreflect.Value) {\n\tswitch fd.FullName() {\n\tcase \"cosmos.staking.v1beta1.MsgEnableTokenizeShares.delegator_address\":\n\t\tx.DelegatorAddress = value.Interface().(string)\n\tdefault:\n\t\tif fd.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: cosmos.staking.v1beta1.MsgEnableTokenizeShares\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message cosmos.staking.v1beta1.MsgEnableTokenizeShares does not contain field %s\", fd.FullName()))\n\t}\n}", "title": "" }, { "docid": "1810264da6097c1083a9cd6f8a21bf80", "score": "0.4845851", "text": "func SetAuthToken(token string) {\n\tmd := metadata.Pairs(\"AuthToken\", token)\n\tif token != \"\" {\n\t\toptions.AuthContext = metadata.NewOutgoingContext(context.Background(), md)\n\t}\n}", "title": "" }, { "docid": "8d70773d32cb69ccdd67f51072c080f7", "score": "0.4845708", "text": "func (o *RoutesRouteFromIDParams) SetToken(token *string) {\n\to.Token = token\n}", "title": "" }, { "docid": "17115f332d8db149822466f011b7c6f8", "score": "0.48354587", "text": "func (m *UserProcessingResult) SetProcessingStatus(value *LifecycleWorkflowProcessingStatus)() {\n err := m.GetBackingStore().Set(\"processingStatus\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "a3c50b92125bf06c15d8e9babbbeae85", "score": "0.48323658", "text": "func SetAuthorizationToken(parent context.Context, value string) context.Context {\n\treturn context.WithValue(parent, authorizationTokenContextKey, value)\n}", "title": "" }, { "docid": "4739a9872643f2c56240e0165eb85615", "score": "0.48319998", "text": "func (me *TxsdCitetitlePubwork) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "a63cf5a81bfb4022b79419ad18f0a419", "score": "0.48270902", "text": "func (c *CommonTokenStream) SetTokenSource(tokenSource TokenSource) {\n\tc.tokenSource = tokenSource\n\tc.tokens = make([]Token, 0)\n\tc.index = -1\n}", "title": "" }, { "docid": "fcf34f4ddb8d7a3f20c4c2f23442b1d9", "score": "0.4817649", "text": "func (me *TxsdKeycomboAction) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "f3572b40c9a7eaf9f340f161cd4825e4", "score": "0.48112252", "text": "func (l *Logger) PushProcessor(p Processor) { l.processors = append(l.processors, p) }", "title": "" }, { "docid": "e10f6d25ef5eae833986a63e69eeb345", "score": "0.48079097", "text": "func (me *TxsdColValign) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "0f40556e3da718f077cef9d672637d7f", "score": "0.47846672", "text": "func (o *TenantToken) SetValue(v string) {\n\to.Value = &v\n}", "title": "" }, { "docid": "80501b56baba243596c8d84f1da6b247", "score": "0.4783489", "text": "func NewProcessor(wfr *v1alpha1.WorkflowRun, getter SecretGetter) *Processor {\n\treturn &Processor{\n\t\twfr: wfr,\n\t\tsecretRefValue: NewSecretRefValue(),\n\t\tvariableRefValue: NewVariableRefValue(wfr),\n\t\tsecretGetter: getter,\n\t}\n}", "title": "" }, { "docid": "0736681f60eac1161e7e0c0a5b0ab6ad", "score": "0.47698623", "text": "func (me *TxsdSystemitemClass) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "3da2aa81cc9fdf8d4f9611550c719b37", "score": "0.47650832", "text": "func (me *TxsdPremiseSequenceChoiceChoicePremiseNumberRangeNumberRangeOccurence) Set(s string) {\n\t(*xsdt.Nmtoken)(me).Set(s)\n}", "title": "" }, { "docid": "819dec5e516e52366e40d4082557e9d7", "score": "0.47643617", "text": "func SetAdminVerificationToken(vasp *pb.VASP, token string) (err error) {\n\textra := &GDSExtraData{\n\t\tAdminVerificationToken: token,\n\t}\n\tif vasp.Extra, err = anypb.New(extra); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "552944203445a5a5ae88cafb25189974", "score": "0.4759301", "text": "func (me *TxsdSpace) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "5c683c3f7013a145b0609bb274df5145", "score": "0.47590917", "text": "func (o *ProcessorBankTransferCreateRequest) GetProcessorToken() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ProcessorToken\n}", "title": "" }, { "docid": "671e78e295149c4f5104188b5ccad1dd", "score": "0.4750391", "text": "func (me *TxsdInformaltablePgwide) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "e87fbacd2820005124d909d5e8cda367", "score": "0.47105068", "text": "func (m *Process) SetProcessId(value *int32)() {\n err := m.GetBackingStore().Set(\"processId\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "3c4838fa8fa958d10ae08ac4db5b217f", "score": "0.47048432", "text": "func InitProcessor(tfile string, mfile string) I_Processor {\n return &Processor{\n executor: InitExecutor(),\n torg: InitTaskOrg(tfile),\n morg: InitMachineOrg(mfile),\n }\n}", "title": "" }, { "docid": "97c0d006c77bb560e30e07b7a4e3d8c1", "score": "0.4701248", "text": "func SetTokeniser(tokeniser *tokeniser.Tokeniser) OptionFunc {\n\treturn func(opts *Options) { opts.tokeniser = tokeniser }\n}", "title": "" }, { "docid": "1c7900f576ec518251165d40caef5303", "score": "0.46829167", "text": "func (vcdCli *VCDClient) SetToken(org, authHeader, token string) error {\n\tvcdCli.Client.VCDAuthHeader = authHeader\n\tvcdCli.Client.VCDToken = token\n\n\terr := vcdCli.vcdloginurl()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error finding LoginUrl: %s\", err)\n\t}\n\n\tvcdCli.Client.IsSysAdmin = strings.EqualFold(org, \"system\")\n\t// Get query href\n\tvcdCli.QueryHREF = vcdCli.Client.VCDHREF\n\tvcdCli.QueryHREF.Path += \"/query\"\n\n\t// The client is now ready to connect using the token, but has not communicated with the vCD yet.\n\t// To make sure that it is working, we run a request for the org list.\n\t// This list should work always: when run as system administrator, it retrieves all organizations.\n\t// When run as org user, it only returns the organization the user is authorized to.\n\t// In both cases, we discard the list, as we only use it to certify that the token works.\n\torgListHREF := vcdCli.Client.VCDHREF\n\torgListHREF.Path += \"/org\"\n\n\torgList := new(types.OrgList)\n\n\t_, err = vcdCli.Client.ExecuteRequest(orgListHREF.String(), http.MethodGet,\n\t\t\"\", \"error connecting to vCD using token: %s\", nil, orgList)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ec309dbbc57396249bec6c3ada2f35db", "score": "0.46748802", "text": "func (c *Ctx) InitToken(slotID uint, pin string, label string) error {\n\treturn buildError()\n}", "title": "" }, { "docid": "550e3a8d0a9378e5ee0fc4975787e4da", "score": "0.4667297", "text": "func (p *Params) SetTokenThreshold(t float32) {\n\tp.thold_pt = C.float(t)\n}", "title": "" }, { "docid": "64e513513411e7e50d5761d83b4c3cf8", "score": "0.46499348", "text": "func (me *TxsdRefmiscinfoClass) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "6a0329c107374c1a92287a1bdb31da76", "score": "0.4648861", "text": "func (b *Bot) setToken() {\n\tbotToken, exists := os.LookupEnv(\"BOT_TOKEN\")\n\n\tif exists == false {\n\t\tlog.Fatal(\"Discord bot token does not exist. Please set it in your .env!\")\n\t}\n\n\tb.Session.Token = \"Bot \" + botToken\n}", "title": "" }, { "docid": "881882f46e1bb1f9ea0eca3bea791da1", "score": "0.46455583", "text": "func (me *TxsdFilenameClass) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "79e6116ed1a59bb330562074f7335194", "score": "0.46450144", "text": "func (ca *clientAuth) setAuthToken(token string) {\n\tca.mu.Lock()\n\tdefer ca.mu.Unlock()\n\tca.token = token\n\tca.lastRefresh = time.Now()\n}", "title": "" }, { "docid": "1bc52ed23a58ea27a057eef33b1c11c4", "score": "0.46436", "text": "func (me *TxsdIndextermScope) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "4e8797c71231e795d3eb0c282f0d589c", "score": "0.46389169", "text": "func (s *APIClient) SetToken(username string, req *http.Request) (err error) {\n\tif s.TokenStore == nil {\n\t\treturn fmt.Errorf(\"APIClient: TokenStore not initalized.\")\n\t}\n\n\ttoken, err := s.TokenStore.Load(username)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// If we find a token, check if it's still valid.\n\tif token != nil {\n\t\tif token.Expires <= time.Now().Unix() {\n\t\t\t// First attempt to use a refresh token if there is one.\n\t\t\ttoken, err = s.refreshToken(username, token)\n\t\t\tif err != nil && s.secrets.signature_key == nil {\n\t\t\t\tDebug(\"Unable to use refresh token: %v\", err)\n\t\t\t\tFatal(\"Access token has expired, must reauthenticate for new access token.\")\n\t\t\t}\n\t\t\terr = nil\n\t\t}\n\t}\n\n\tif token == nil {\n\t\tif s.NewToken == nil {\n\t\t\treturn fmt.Errorf(\"APIClient: NewToken not initalized.\")\n\t\t}\n\t\ts.TokenStore.Delete(username)\n\t\ttoken, err = s.NewToken(username)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif token != nil {\n\t\treq.Header.Set(\"KiteBrokerUser\", username)\n\t\treq.Header.Set(\"Authorization\", \"Bearer \"+token.AccessToken)\n\t\tif err := s.TokenStore.Save(username, token); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "aea9aa7df03eadd099f7e339aa043d56", "score": "0.4630608", "text": "func (me *TxsdQandasetDefaultlabel) Set(s string) { (*xsdt.Token)(me).Set(s) }", "title": "" }, { "docid": "2a13d758011f39ab43fb9c611ea62250", "score": "0.46283516", "text": "func (n *GoProcessorNode) Setup() { // TODO eventually just inject the code inside of the process string that is used as a template\n\tif userCode, exists := n.Config[\"userCode\"]; exists {\n\t\tif !exists {\n\t\t\tlog.Error(\"Required config `userCode` not present for node \"+n.UUID, nil)\n\t\t\tpanic(\"Required config `userCode` not present for node\")\n\t\t}\n\t\tn.Processor = n.buildStringToSymbol(userCode)\n\t}\n}", "title": "" } ]
18bd4aa57632dcfc532015e1900eed7b
Err returns the last error encountered while paging.
[ { "docid": "d18f0e1ea9752028ec35bab5fc44cc68", "score": "0.0", "text": "func (p *APIIssueAttachmentListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" } ]
[ { "docid": "6ac9a2a4e401537d77a1693b5a8e90f0", "score": "0.7197481", "text": "func (p *ReportsListByAPIPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "3f4b6df5dd906f7a9b93b7537326408f", "score": "0.7140978", "text": "func (p *TopQueryStatisticsListByServerPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "2c676dd88c5265feb7961f8fc437376b", "score": "0.7133936", "text": "func (p *APIOperationListByAPIPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "9f02e7a8b3a4656f5a7294343bc4f3a8", "score": "0.7128575", "text": "func (p *AccountsListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "ab49aca29f4c4c6c78cf18753dc65094", "score": "0.71094483", "text": "func (p *TopLevelDomainsListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "b5f5d59e84e1eecd24be1473f15672b2", "score": "0.70649385", "text": "func (p *UsersListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "faf2640bda31449223059bdc867ca505", "score": "0.70540816", "text": "func (p *DomainsListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "971b26c11f7e9fade1a1c6ca72f692b1", "score": "0.7045339", "text": "func (p *APISchemaListByAPIPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "8f01d1801038a2f018d5b257881bd982", "score": "0.704504", "text": "func (p *APIListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "8bc2592cfc06cb41086747fafc29c2aa", "score": "0.7036085", "text": "func (p *PrivateLinkResourcesListByServerPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "63e85dcbb6d3fe38b80a19c8db3b6c9a", "score": "0.7035266", "text": "func (p *DeletedWebAppsListByLocationPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "d846d11fd9086c2f02a790d1e69b4036", "score": "0.7034591", "text": "func (p *APIListByTagsPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "4a5d1c1842ed8072e4ee168c7998fded", "score": "0.7023799", "text": "func (p *StaticSitesListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "3877fa0f1ece8e9e71fa71ec97a27637", "score": "0.7016418", "text": "func (p *WebAppsListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "2933c5d0e9cf8f82f8d95fae2268adf2", "score": "0.70076835", "text": "func (p *UserIdentitiesListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "79809f4137baef66cc9a3b055e658b0f", "score": "0.70061064", "text": "func (p *ReportsListByUserPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "2109c2e2ac8fe6834354bba0b58b56b8", "score": "0.699547", "text": "func (p *ReportsListByGeoPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "47c65b504fd36ce99eb5d4d983780b22", "score": "0.6990667", "text": "func (p *DeletedAccountsListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "5b2a2fdf3f173695685a4ebc788cb74e", "score": "0.69761366", "text": "func (p *LinkedServicesClientListByFactoryPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "790aaa15a6e2e1e8b53bb36626233a75", "score": "0.6968558", "text": "func (p *WebAppsListByResourceGroupPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "395781e2ac52b70c7d07bb8376a5d0e5", "score": "0.6961864", "text": "func (p *CertificatesListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "6ea82f5ff01f5370f261ac62ef7b0ed3", "score": "0.69583553", "text": "func (p *DomainsListByResourceGroupPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "3faa4fa08a79aafb7a274f65e54edf19", "score": "0.69477665", "text": "func (p *AccountsListByResourceGroupPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "bc957a878f03c0bf9f58d1b84d729b38", "score": "0.69392717", "text": "func (p *BackendListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "3cb6b5f9883407bd26fed04469619a68", "score": "0.69332117", "text": "func (p *WebAppsListPublicCertificatesPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "f039863705872233e95b43da660b79f3", "score": "0.69320524", "text": "func (p *GatewayAPIListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "931edf65b45db70466e05df74b3e6869", "score": "0.69319195", "text": "func (p *VirtualMachinesListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "3a29ab3a13aa884be227d903ce4eda70", "score": "0.69315076", "text": "func (p *PoliciesListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "b31ca873fe14fc59cfe102f43aafed65", "score": "0.6919299", "text": "func (p *PrivateEndpointConnectionsListByResourcePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "20c6bc20f588f25d18d5ffa96da8bbc3", "score": "0.6909471", "text": "func (p *UserListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "6390f4557322bc82ca21108fce660e51", "score": "0.6907156", "text": "func (p *TagListByAPIPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "0b6d29e99c9cc3e62b3ed0c00d7fb0a8", "score": "0.6905679", "text": "func (p *SharedPrivateLinkResourcesListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "540307f2147a529f1e77157e2e383c5e", "score": "0.69022715", "text": "func (p *APIProductListByApisPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "14598dc966712bf5bef01e1199b1aa7d", "score": "0.69001955", "text": "func (p *GroupUserListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "a8eb33cd8670f8c830c107ff05d8c027", "score": "0.6899382", "text": "func (p *DeletedWebAppsListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "c76d1f30f5b2009c152028c29d729b6d", "score": "0.68908817", "text": "func (p *VirtualNetworkRulesListByServerPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "bade4a148359af44f150b60e1e582308", "score": "0.6890445", "text": "func (p *WebAppsListFunctionsPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "c8726f7fdb19dd549c7024406c1d3ca7", "score": "0.68897057", "text": "func (p *CustomImagesListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "c45d5cbd27f26787aa922874dd3070e4", "score": "0.688711", "text": "func (p *WebAppsListUsagesPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "c28ae3f7171c094ef432c05abf2a264b", "score": "0.68742144", "text": "func (p *WebAppsListBackupsPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "64fb28bd1ff469b6bbb959b73e1f16ee", "score": "0.6873353", "text": "func (p *ReportsListByOperationPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "e89324eb0d93652802f42f11277d5a4e", "score": "0.685275", "text": "func (p *DataFlowsClientListByFactoryPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "bf5d5101782ad46cfb7b5047cc89778d", "score": "0.68516076", "text": "func (p *CertificatesListByResourceGroupPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "7528187552e742a102316a81c87df81b", "score": "0.68423766", "text": "func (p *QueryTextsListByServerPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "139d83dbf70333056d676706dbe59e81", "score": "0.68420637", "text": "func (p *IdentityProviderListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "e093e2b58c4898c9cdcb2eb1b4bfda33", "score": "0.6836858", "text": "func (p *CertificateListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "98a147e12f2c421ca956a86b6b839ac2", "score": "0.6835163", "text": "func (p *PrivateEndpointConnectionsListByServerPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "6093fa765a7c6e7cf410092de51311ad", "score": "0.6833416", "text": "func (p *GalleryImagesListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "6822533fd6086ac30be7a71c33c0ed65", "score": "0.6823041", "text": "func (p *ResourceHealthMetadataListBySitePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "0d8d7c0ff39a2a2ddd3296a807388bb2", "score": "0.6822959", "text": "func (p *DisksListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "458a189031ec32081f2a78b5df38772f", "score": "0.6817087", "text": "func (p *OperationsListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "458a189031ec32081f2a78b5df38772f", "score": "0.6817087", "text": "func (p *OperationsListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "18b0111f480b02ed26d3f6faefcd61e9", "score": "0.68160313", "text": "func (p *WebAppsListConfigurationsPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "cbe248d29694b8b2db52422fb35ee256", "score": "0.681523", "text": "func (p *ResourceHealthMetadataListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "d891b094ed1cb666bc7686130bee2e57", "score": "0.6813495", "text": "func (p *WebAppsListSnapshotsPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "0cda7a9843c97f12783a5c40019edfca", "score": "0.68090636", "text": "func (p *ManagedPrivateEndpointsClientListByFactoryPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "564988169e81ce863a879e260e855f1b", "score": "0.68025094", "text": "func (p *WebTestsClientListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "a3fafa84e3ce383b26aca8a236d4403a", "score": "0.67988175", "text": "func (p *UserGroupListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "1cf0d8e16014efcd9bb340be478c90fb", "score": "0.67977697", "text": "func (p *GroupListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "417bc45036460b7b8cd3f976eb1dab24", "score": "0.67945546", "text": "func (p *WebAppsListSiteBackupsPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "05720af84c6f7cfae7b3ff4b479edcf2", "score": "0.67921954", "text": "func (p *StaticSitesListStaticSiteUsersPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "ff3d1ddfea90614b1adefb65150eb72b", "score": "0.67897344", "text": "func (p *WebAppsListWebJobsPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "a7e339da1d9e5f6815fdc76ce7313abf", "score": "0.6785552", "text": "func (p *EmailTemplateListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "768e07e83efb574de04066abbe7011f1", "score": "0.67804563", "text": "func (p *TenantAccessListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "fa227d7402eb790f03968d7db1c2f332", "score": "0.6776531", "text": "func (p *PrivateEndpointConnectionsListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "7daf5bc8a672299b1a5f6b50cf1b6172", "score": "0.67746085", "text": "func (p *ContentItemListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "10538e7cc68c811d85e27dda7b9d7c0e", "score": "0.67725116", "text": "func (p *ServicesListByResourceGroupPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "4d3201270d3092a7d9e09cbc2e477292", "score": "0.677089", "text": "func (p *VaultsListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "cbfbbf47724fbfbc8260949708542967", "score": "0.6767403", "text": "func (p *CacheListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "f310c45b04d79e4d7bb46065fae203a8", "score": "0.6766085", "text": "func (p *GatewayListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "9029f4b2921d282b83b21a40329c4bc6", "score": "0.67649", "text": "func (p *VirtualNetworksListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "1e4aa8c13801eed9ffc10b5254cd0aad", "score": "0.6764174", "text": "func (p *LabsListByResourceGroupPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "c2508139874026d32446f7aeb404b482", "score": "0.67521435", "text": "func (p *MyWorkbooksClientListByResourceGroupPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "968e1a729d741a4928f4fba2adb375dd", "score": "0.67441684", "text": "func (p *KeysListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "9a0355cfcab1f7e375228f0ac4cade8a", "score": "0.67426616", "text": "func (p *AppServicePlansListWebAppsPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "270739fae2dcf66f62a421411a2c9215", "score": "0.6742295", "text": "func (p *TopLevelDomainsListAgreementsPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "170550f984636f7bb0ebf9b1e7dcb76b", "score": "0.6736201", "text": "func (p *WebAppsListInstanceIdentifiersPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "c0ce6ffa0038dcce1425d28a6c4ddbdf", "score": "0.67357314", "text": "func (p *IntegrationRuntimesClientListByFactoryPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "c40f2612e347a13c7848d1c5ed6119a3", "score": "0.67249215", "text": "func (p *LoggerListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "246e1cb921b6022fdf5f3af0c4af1dd4", "score": "0.6718354", "text": "func (p *AppServiceCertificateOrdersListByResourceGroupPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "888d25375331d6b1956189a207656b45", "score": "0.6710198", "text": "func (p *OperationListByTagsPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "cd240b6fbf5f13438ff3aee974d8d22f", "score": "0.671004", "text": "func (p *NamedValueListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "76179ecdef285f2d78d0f36a8b515006", "score": "0.6706444", "text": "func (p *ServiceFabricsListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "2eb6ad3c268b8ceb360931d908af93d0", "score": "0.67050517", "text": "func (p *PipelinesClientListByFactoryPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "d2ad1e33a923f168215122352449d164", "score": "0.6704715", "text": "func (p *APIManagementServiceListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "9598563f647170ce0cd5dd0e151bef69", "score": "0.67040163", "text": "func (p *ResourceHealthMetadataListByResourceGroupPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "cd31a70d7f1fe0a16317c5f91b84dd4f", "score": "0.67034817", "text": "func (p *APIDiagnosticListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "a676062d84b153b3628d4bce34a3a66d", "score": "0.6701496", "text": "func (p *DiagnosticsListSiteDetectorResponsesPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "0429a6ea94887b7c8ee4b6ae1f96ec6a", "score": "0.669993", "text": "func (p *PrivateEndPointConnectionsClientListByFactoryPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "6426dd915f9d00363b97b8e449e92741", "score": "0.669167", "text": "func (p *MHSMPrivateEndpointConnectionsListByResourcePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "6ad748b3ab858e3d670912d872c7c66a", "score": "0.667739", "text": "func (p *APIIssueListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "49b11136290e65c3df1af1b6387f2a25", "score": "0.6676933", "text": "func (p *WebTestsClientListByResourceGroupPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "f457af6c3e9ef0fb7a07155a4acd6d10", "score": "0.66760194", "text": "func (p *AppServiceCertificateOrdersListPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "0ef77ab924a00aa3118445def4049d3e", "score": "0.66751647", "text": "func (p *AppServicePlansListByResourceGroupPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "0e70086e280370775a32f44258a27c26", "score": "0.66709125", "text": "func (p *DiagnosticListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "f8dac293c2b8052c8b4ddd780b20b9b8", "score": "0.6670854", "text": "func (p *DeletedServicesListBySubscriptionPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "699e074919abd8f9c7ca8b97aab99965", "score": "0.666911", "text": "func (p *APIReleaseListByServicePager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "e89b3fe655fd39155d72247c794673f2", "score": "0.6668703", "text": "func (p *WebAppsListProcessThreadsPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "a532db237456344c18a75c6cff214a06", "score": "0.66685647", "text": "func (p *AppServiceEnvironmentsListByResourceGroupPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "6a0f09ae4b908c3a5da55a4d65a4d69d", "score": "0.6664769", "text": "func (p *ServicesListBySubscriptionPager) Err() error {\n\treturn p.err\n}", "title": "" }, { "docid": "f31cf664c7f46fb04360f3b269909a19", "score": "0.66641086", "text": "func (p *StreamingJobsClientListPager) Err() error {\n\treturn p.err\n}", "title": "" } ]
cb4d3acf8824bb5f6b3a0efa6c72a142
ID provides a mock function with given fields:
[ { "docid": "ae809ed44b8a4e9b4890006d571edacc", "score": "0.6151786", "text": "func (_m *Device) ID() uint64 {\n\tret := _m.Called()\n\n\tvar r0 uint64\n\tif rf, ok := ret.Get(0).(func() uint64); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(uint64)\n\t}\n\n\treturn r0\n}", "title": "" } ]
[ { "docid": "d0aeceaa0851e2f94c473075946433dd", "score": "0.69285667", "text": "func mockID(id int) namespace.ID {\n\tswitch {\n\tcase id < 256:\n\t\treturn namespace.ID{0, 0, 0, 0, 0, 0, 0, byte(id)}\n\tdefault:\n\t\treturn namespace.ID{0, 0, 0, 0, 0, 0, 100, 0}\n\t}\n}", "title": "" }, { "docid": "4b2d8ee74edae8c9344834fd388469aa", "score": "0.6795835", "text": "func (Mock) AccountInfo(id string) {\n}", "title": "" }, { "docid": "27053dd917ddc134ca8e3b89864274f4", "score": "0.6508951", "text": "func getMockId(httpMethod string, url string) string {\n\treturn fmt.Sprintf(\"%s_%s\", httpMethod, url)\n}", "title": "" }, { "docid": "09ea85f1bd64589b9312c23a4fb2cd4b", "score": "0.6504537", "text": "func (_m *FieldContainer) ID() string {\n\tret := _m.Called()\n\n\tvar r0 string\n\tif rf, ok := ret.Get(0).(func() string); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(string)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "5f8de3aa6f2be9a7be69ebbd36e2a288", "score": "0.63799125", "text": "func (_m *CacheItem) ID() string {\n\tret := _m.Called()\n\n\tvar r0 string\n\tif rf, ok := ret.Get(0).(func() string); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(string)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "30b78785b2f4c4ef2d425304ffe07a1c", "score": "0.63460124", "text": "func (_m *Chain) ID() *big.Int {\n\tret := _m.Called()\n\n\tvar r0 *big.Int\n\tif rf, ok := ret.Get(0).(func() *big.Int); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*big.Int)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "12a5dd539d77123e7f81e12a90fdbc6a", "score": "0.6333167", "text": "func (a FakeEntity) GetID() string { return a.ID }", "title": "" }, { "docid": "7b73e2b2283d66e1122e66fafdddc5b4", "score": "0.6313238", "text": "func TestGetByID(t *testing.T) {\n\t// Create a slice of test cases\n\tcases := []struct {\n\t\tname string\n\t\texpectedUser *User\n\t\tidToGet int64\n\t\texpectError bool\n\t}{\n\t\t{\n\t\t\t\"User Found\",\n\t\t\t&User{\n\t\t\t\t1,\n\t\t\t\t\"test@test.com\",\n\t\t\t\t[]byte(\"passhash123\"),\n\t\t\t\t\"username\",\n\t\t\t\t\"firstname\",\n\t\t\t\t\"lastname\",\n\t\t\t\t\"photourl\",\n\t\t\t},\n\t\t\t1,\n\t\t\tfalse,\n\t\t},\n\t\t{\n\t\t\t\"User Not Found\",\n\t\t\t&User{},\n\t\t\t2,\n\t\t\ttrue,\n\t\t},\n\t\t{\n\t\t\t\"User With Large ID Found\",\n\t\t\t&User{\n\t\t\t\t1234567890,\n\t\t\t\t\"test@test.com\",\n\t\t\t\t[]byte(\"passhash123\"),\n\t\t\t\t\"username\",\n\t\t\t\t\"firstname\",\n\t\t\t\t\"lastname\",\n\t\t\t\t\"photourl\",\n\t\t\t},\n\t\t\t1234567890,\n\t\t\tfalse,\n\t\t},\n\t}\n\n\tfor _, c := range cases {\n\t\t// Create a new mock database for each case\n\t\tdb, mock, err := sqlmock.New()\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"There was a problem opening a database connection: [%v]\", err)\n\t\t}\n\t\tdefer db.Close()\n\n\t\tmainSQLStore := NewSQLStore(db)\n\n\t\t// Create an expected row to the mock DB\n\t\trow := mock.NewRows([]string{\n\t\t\t\"ID\",\n\t\t\t\"Email\",\n\t\t\t\"PassHash\",\n\t\t\t\"UserName\",\n\t\t\t\"FirstName\",\n\t\t\t\"LastName\",\n\t\t\t\"PhotoURL\"},\n\t\t).AddRow(\n\t\t\tc.expectedUser.ID,\n\t\t\tc.expectedUser.Email,\n\t\t\tc.expectedUser.PassHash,\n\t\t\tc.expectedUser.UserName,\n\t\t\tc.expectedUser.FirstName,\n\t\t\tc.expectedUser.LastName,\n\t\t\tc.expectedUser.PhotoURL,\n\t\t)\n\n\t\t// expected query to be executed\n\t\tquery := regexp.QuoteMeta(\"select * from users where id = ?\")\n\n\t\tif c.expectError {\n\t\t\t// Set up expected query that will expect an error\n\t\t\tmock.ExpectQuery(query).WithArgs(c.idToGet).WillReturnError(ErrUserNotFound)\n\n\t\t\t// Test GetByID()\n\t\t\tuser, err := mainSQLStore.GetByID(c.idToGet)\n\t\t\tif user != nil || err == nil {\n\t\t\t\tt.Errorf(\"Expected error [%v] but got [%v] instead\", ErrUserNotFound, err)\n\t\t\t}\n\t\t} else {\n\t\t\t// Set up an expected query with the expected row from the mock DB\n\t\t\tmock.ExpectQuery(query).WithArgs(c.idToGet).WillReturnRows(row)\n\n\t\t\t// Test GetByID()\n\t\t\tuser, err := mainSQLStore.GetByID(c.idToGet)\n\t\t\tif err != nil {\n\t\t\t\tt.Errorf(\"Unexpected error on successful test [%s]: %v\", c.name, err)\n\t\t\t}\n\t\t\tif !reflect.DeepEqual(user, c.expectedUser) {\n\t\t\t\tt.Errorf(\"Error, invalid match in test [%s]\", c.name)\n\t\t\t}\n\t\t}\n\n\t\tif err := mock.ExpectationsWereMet(); err != nil {\n\t\t\tt.Errorf(\"There were unfulfilled expectations: %s\", err)\n\t\t}\n\n\t}\n}", "title": "" }, { "docid": "1200bb2ba21d64e62754f1f01b8083e2", "score": "0.6306472", "text": "func TestGetByID(t *testing.T) {\n\t// Create a slice of test cases\n\tcases := []struct {\n\t\tname string\n\t\texpectedUser *User\n\t\tidToGet int64\n\t\texpectError bool\n\t}{\n\t\t{\n\t\t\t\"User Found\",\n\t\t\t&User{\n\t\t\t\t1,\n\t\t\t\t\"test@test.com\",\n\t\t\t\t[]byte(\"passhash123\"),\n\t\t\t\t\"username\",\n\t\t\t\t\"firstname\",\n\t\t\t\t\"lastname\",\n\t\t\t\t\"photourl\",\n\t\t\t},\n\t\t\t1,\n\t\t\tfalse,\n\t\t},\n\t\t{\n\t\t\t\"User Not Found\",\n\t\t\t&User{},\n\t\t\t2,\n\t\t\ttrue,\n\t\t},\n\t\t{\n\t\t\t\"User With Large ID Found\",\n\t\t\t&User{\n\t\t\t\t1234567890,\n\t\t\t\t\"test@test.com\",\n\t\t\t\t[]byte(\"passhash123\"),\n\t\t\t\t\"username\",\n\t\t\t\t\"firstname\",\n\t\t\t\t\"lastname\",\n\t\t\t\t\"photourl\",\n\t\t\t},\n\t\t\t1234567890,\n\t\t\tfalse,\n\t\t},\n\t}\n\n\tfor _, c := range cases {\n\t\t// Create a new mock database for each case\n\t\tdb, mock, err := sqlmock.New()\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"There was a problem opening a database connection: [%v]\", err)\n\t\t}\n\t\tdefer db.Close()\n\n\t\t// TODO: update based on the name of your type struct\n\t\tmainSQLStore := &SQLStore{db}\n\n\t\t// Create an expected row to the mock DB\n\t\trow := mock.NewRows([]string{\n\t\t\t\"ID\",\n\t\t\t\"Email\",\n\t\t\t\"PassHash\",\n\t\t\t\"UserName\",\n\t\t\t\"FirstName\",\n\t\t\t\"LastName\",\n\t\t\t\"PhotoURL\"},\n\t\t).AddRow(\n\t\t\tc.expectedUser.ID,\n\t\t\tc.expectedUser.Email,\n\t\t\tc.expectedUser.PassHash,\n\t\t\tc.expectedUser.UserName,\n\t\t\tc.expectedUser.FirstName,\n\t\t\tc.expectedUser.LastName,\n\t\t\tc.expectedUser.PhotoURL,\n\t\t)\n\n\t\t// TODO: update to match the query used in your Store implementation\n\t\tquery := \"select id,email,passHash,username,firstName,lastName,photoUrl from Users where id=?\"\n\t\t// TODO: If you use regular expression characters like * in SELECT * you might need to use\n\t\t// regexp.QuoteMeta() to transform special characters into a literal string that the mock database\n\t\t// can parse. If not delete, this comment.\n\t\t// query := regexp.QuoteMeta(\"select * from Users where id=?\")\n\n\t\tif c.expectError {\n\t\t\t// Set up expected query that will expect an error\n\t\t\tmock.ExpectQuery(query).WithArgs(c.idToGet).WillReturnError(ErrUserNotFound)\n\n\t\t\t// Test GetByID()\n\t\t\tuser, err := mainSQLStore.GetByID(c.idToGet)\n\t\t\tif user != nil || err == nil {\n\t\t\t\tt.Errorf(\"Expected error [%v] but got [%v] instead\", ErrUserNotFound, err)\n\t\t\t}\n\t\t} else {\n\t\t\t// Set up an expected query with the expected row from the mock DB\n\t\t\tmock.ExpectQuery(query).WithArgs(c.idToGet).WillReturnRows(row)\n\n\t\t\t// Test GetByID()\n\t\t\tuser, err := mainSQLStore.GetByID(c.idToGet)\n\t\t\tif err != nil {\n\t\t\t\tt.Errorf(\"Unexpected error on successful test [%s]: %v\", c.name, err)\n\t\t\t}\n\t\t\tif !reflect.DeepEqual(user, c.expectedUser) {\n\t\t\t\tt.Errorf(\"Error, invalid match in test [%s]\", c.name)\n\t\t\t}\n\t\t}\n\n\t\tif err := mock.ExpectationsWereMet(); err != nil {\n\t\t\tt.Errorf(\"There were unfulfilled expectations: %s\", err)\n\t\t}\n\n\t}\n}", "title": "" }, { "docid": "4771cf9de65b50bd823656643a983568", "score": "0.6254031", "text": "func (_m *TableContainer) ID() string {\n\tret := _m.Called()\n\n\tvar r0 string\n\tif rf, ok := ret.Get(0).(func() string); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(string)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "748ecb06950d2965a96fd84a436ad316", "score": "0.6155241", "text": "func (_m *OpSession) ID() uint64 {\n\tret := _m.Called()\n\n\tvar r0 uint64\n\tif rf, ok := ret.Get(0).(func() uint64); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(uint64)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "7452709054a7935502cb92704f839637", "score": "0.61405915", "text": "func (m *MockClient) ID() string {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ID\")\n\tret0, _ := ret[0].(string)\n\treturn ret0\n}", "title": "" }, { "docid": "9eb12ed7298661ec85882c225227bb75", "score": "0.61292547", "text": "func (*Store) UUID() string { return \"mock\" }", "title": "" }, { "docid": "79cb05bd2b391cb8cc8415f385ded1b1", "score": "0.61016357", "text": "func (_m *IndexService) Id(id string) es.IndexService {\n\tret := _m.Called(id)\n\n\tvar r0 es.IndexService\n\tif rf, ok := ret.Get(0).(func(string) es.IndexService); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(es.IndexService)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "b0731f3feb057ccbbaeeccc6b3e71694", "score": "0.60665977", "text": "func (m *MockEngine) ID() string {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ID\")\n\tret0, _ := ret[0].(string)\n\treturn ret0\n}", "title": "" }, { "docid": "c65186e725da31b83bf2f9ddfb1850db", "score": "0.60170543", "text": "func (m *MockServer) ID() string {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ID\")\n\tret0, _ := ret[0].(string)\n\treturn ret0\n}", "title": "" }, { "docid": "79a9fd482dbc7e030e0aa20a9346444b", "score": "0.5961472", "text": "func mockUUID(idx ...int32) string {\n\tif len(idx) == 0 {\n\t\tidx = []int32{0}\n\t}\n\n\treturn fmt.Sprintf(\"%08d-%04d-%04d-%04d-%012d\", idx, idx, idx, idx, idx)\n}", "title": "" }, { "docid": "78678a32a2351354043e4d20d5e663aa", "score": "0.5959372", "text": "func (m *MockServerContext) ID() string {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ID\")\n\tret0, _ := ret[0].(string)\n\treturn ret0\n}", "title": "" }, { "docid": "ff04c551eaeac045ab65ef078239977f", "score": "0.59074694", "text": "func (_m *MockUserRepository) UpdateByID(id int64, confirmationToken []byte, createdAt *time.Time, createdBy nilt.Int64, firstName nilt.String, isActive nilt.Bool, isConfirmed nilt.Bool, isStaff nilt.Bool, isSuperuser nilt.Bool, lastLoginAt *time.Time, lastName nilt.String, password []byte, updatedAt *time.Time, updatedBy nilt.Int64, username nilt.String) (*userEntity, error) {\n\tret := _m.Called(id, confirmationToken, createdAt, createdBy, firstName, isActive, isConfirmed, isStaff, isSuperuser, lastLoginAt, lastName, password, updatedAt, updatedBy, username)\n\n\tvar r0 *userEntity\n\tif rf, ok := ret.Get(0).(func(int64, []byte, *time.Time, nilt.Int64, nilt.String, nilt.Bool, nilt.Bool, nilt.Bool, nilt.Bool, *time.Time, nilt.String, []byte, *time.Time, nilt.Int64, nilt.String) *userEntity); ok {\n\t\tr0 = rf(id, confirmationToken, createdAt, createdBy, firstName, isActive, isConfirmed, isStaff, isSuperuser, lastLoginAt, lastName, password, updatedAt, updatedBy, username)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*userEntity)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int64, []byte, *time.Time, nilt.Int64, nilt.String, nilt.Bool, nilt.Bool, nilt.Bool, nilt.Bool, *time.Time, nilt.String, []byte, *time.Time, nilt.Int64, nilt.String) error); ok {\n\t\tr1 = rf(id, confirmationToken, createdAt, createdBy, firstName, isActive, isConfirmed, isStaff, isSuperuser, lastLoginAt, lastName, password, updatedAt, updatedBy, username)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "3d52f4d3d44ca9f317a8429268aa3250", "score": "0.58786553", "text": "func (m *MockReceptor) ID() id.ID {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ID\")\n\tret0, _ := ret[0].(id.ID)\n\treturn ret0\n}", "title": "" }, { "docid": "317ae667d7e7308b78c26cd766eb227f", "score": "0.58772725", "text": "func (_m *XDCRFactoryIface) partId(prefix string, topic string, kvaddr string, index int) string {\n\tret := _m.Called(prefix, topic, kvaddr, index)\n\n\tvar r0 string\n\tif rf, ok := ret.Get(0).(func(string, string, string, int) string); ok {\n\t\tr0 = rf(prefix, topic, kvaddr, index)\n\t} else {\n\t\tr0 = ret.Get(0).(string)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "2b91028a09be99dba374f67e19672da4", "score": "0.5861061", "text": "func MockBotAndId(t *testing.T, filename, id string) *swarming.SwarmingRpcsBotInfo {\n\tj, err := testutils.ReadFile(filename)\n\tassert.NoError(t, err, \"There was a problem reading in the test data\")\n\tvar s swarming.SwarmingRpcsBotInfo\n\terr = json.Unmarshal([]byte(j), &s)\n\tassert.NoError(t, err, \"There was a problem parsing the test data\")\n\ts.BotId = id\n\treturn &s\n}", "title": "" }, { "docid": "65454074782bdb1f7b45dbc53e16c82a", "score": "0.5858623", "text": "func (_m *FullNode) ID(_a0 context.Context) (peer.ID, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 peer.ID\n\tif rf, ok := ret.Get(0).(func(context.Context) peer.ID); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Get(0).(peer.ID)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "3dac8760e05fba1aafb469d70a3083c4", "score": "0.5833315", "text": "func (_m *GeneralSnapshot) GetID() string {\n\tret := _m.Called()\n\n\tvar r0 string\n\tif rf, ok := ret.Get(0).(func() string); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(string)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "2e51b6ce7ec11180932eff678f67a6be", "score": "0.5807172", "text": "func TestQuestionGetByIDCorrectData(t *testing.T) {\n\tcMock := getMock()\n\tcMock.On(\"GetQuestionByID\", 1).Return(createdQuestion, nil)\n\n\tdata, err := QuestionGET(\"1\")\n\tif assert.Nil(t, err) {\n\t\tcMock.AssertExpectations(t)\n\n\t\tassert.Equal(t, createdQuestion.ID, data.ID)\n\t\tassert.Equal(t, createdQuestion.Title, data.Title)\n\t\tassert.Equal(t, *createdQuestion.Content, *data.Content)\n\t\tassert.Equal(t, createdQuestion.AuthorID, data.AuthorID)\n\t\tassert.Equal(t, *createdQuestion.HasBest, *data.HasBest)\n\t\tassert.Equal(t, createdQuestion.Created, data.Created)\n\t}\n}", "title": "" }, { "docid": "ce96c574af8e460a76b75861d6df7dc6", "score": "0.5798362", "text": "func (_m *Users) GetByID(_a0 context.Context, _a1 int64) (*github.User, *github.Response, error) {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 *github.User\n\tif rf, ok := ret.Get(0).(func(context.Context, int64) *github.User); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*github.User)\n\t\t}\n\t}\n\n\tvar r1 *github.Response\n\tif rf, ok := ret.Get(1).(func(context.Context, int64) *github.Response); ok {\n\t\tr1 = rf(_a0, _a1)\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(*github.Response)\n\t\t}\n\t}\n\n\tvar r2 error\n\tif rf, ok := ret.Get(2).(func(context.Context, int64) error); ok {\n\t\tr2 = rf(_a0, _a1)\n\t} else {\n\t\tr2 = ret.Error(2)\n\t}\n\n\treturn r0, r1, r2\n}", "title": "" }, { "docid": "a6af3180e3277fd286db54812cd981da", "score": "0.5759181", "text": "func (m *MockWorker) ID() string {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ID\")\n\tret0, _ := ret[0].(string)\n\treturn ret0\n}", "title": "" }, { "docid": "bbc40b0fbc9e2a29026cfffdd38cf393", "score": "0.5741326", "text": "func (m *AccountRepositoryMock) MinimockGetByIDInspect() {\n\tfor _, e := range m.GetByIDMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to AccountRepositoryMock.GetByID with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.GetByIDMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterGetByIDCounter) < 1 {\n\t\tif m.GetByIDMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to AccountRepositoryMock.GetByID\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to AccountRepositoryMock.GetByID with params: %#v\", *m.GetByIDMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcGetByID != nil && mm_atomic.LoadUint64(&m.afterGetByIDCounter) < 1 {\n\t\tm.t.Error(\"Expected call to AccountRepositoryMock.GetByID\")\n\t}\n}", "title": "" }, { "docid": "ffbc1c94b4110d2bcf3fd3c73fbc70e3", "score": "0.57233644", "text": "func (_m *ProductService) GetProductJSONByID(ID string) (string, error) {\n\tret := _m.Called(ID)\n\n\tvar r0 string\n\tif rf, ok := ret.Get(0).(func(string) string); ok {\n\t\tr0 = rf(ID)\n\t} else {\n\t\tr0 = ret.Get(0).(string)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string) error); ok {\n\t\tr1 = rf(ID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "1dff049aaf82252f311d456d7c6330a9", "score": "0.57142025", "text": "func (_m *BaseNode) GetID() string {\n\tret := _m.Called()\n\n\tvar r0 string\n\tif rf, ok := ret.Get(0).(func() string); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(string)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "ce6722117a1f7d69894f5ed0bc912546", "score": "0.5681415", "text": "func FuncGetByID(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tid := vars[\"id\"]\n\ttools.Return500(w, fmt.Sprintf(\"FuncGetByID(%s) no implementado\", id))\n}", "title": "" }, { "docid": "84150c15de513be11efd7f91f2358424", "score": "0.56662357", "text": "func (_m *Executor) GetID() string {\n\tret := _m.Called()\n\n\tvar r0 string\n\tif rf, ok := ret.Get(0).(func() string); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(string)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "de9eadaaa100cccc3a50a8f611b67059", "score": "0.565543", "text": "func Id() int64", "title": "" }, { "docid": "d69e5090006bbb53521585af489a9f22", "score": "0.5652446", "text": "func (m *MockInstance) ID() int {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ID\")\n\tret0, _ := ret[0].(int)\n\treturn ret0\n}", "title": "" }, { "docid": "d189b5bf5024810fc3ec22bd80476820", "score": "0.56463474", "text": "func Mock() types.Extra {\n\trandomStr := randStr(10)\n\treturn types.Extra{\n\t\tUserID: randomStr,\n\t\tFirstName: randomStr,\n\t\tLastName: randomStr,\n\t\tGender: \"male\",\n\t\tBirthdayUTC: int64(864466669),\n\t}\n}", "title": "" }, { "docid": "9dc4d910909e7ee4c0fe5c26891dcdd4", "score": "0.56270146", "text": "func (_m *MockGroupRepository) FindOneByID(_a0 int64) (*groupEntity, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 *groupEntity\n\tif rf, ok := ret.Get(0).(func(int64) *groupEntity); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*groupEntity)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int64) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "0a2b6e32fd66ec025273af93751f2466", "score": "0.56198615", "text": "func (_m *Engine) GetDataById(ctx context.Context, ns string, id string) (*fftypes.Data, error) {\n\tret := _m.Called(ctx, ns, id)\n\n\tvar r0 *fftypes.Data\n\tif rf, ok := ret.Get(0).(func(context.Context, string, string) *fftypes.Data); ok {\n\t\tr0 = rf(ctx, ns, id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*fftypes.Data)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string, string) error); ok {\n\t\tr1 = rf(ctx, ns, id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "6f0a7c5e61afaf4af5d10e3984789f7b", "score": "0.56126815", "text": "func (_m *MessageRepository) GetByID(id string) (*data.Message, error) {\n\tret := _m.Called(id)\n\n\tvar r0 *data.Message\n\tif rf, ok := ret.Get(0).(func(string) *data.Message); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*data.Message)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string) error); ok {\n\t\tr1 = rf(id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "434131052875b66799f386fe27b62946", "score": "0.5606965", "text": "func TestGetID(t *testing.T) {\n\tfor _, v := range idTests {\n\t\tres := getID(v.uri)\n\t\tif res != v.res {\n\t\t\tt.Errorf(\"Expected to generate QID '%s' but received '%s'\", v.res, res)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1d65b4f7b7f003f179e1d613fd753dde", "score": "0.55900717", "text": "func (_m *MockGroupRepository) UpdateOneByID(id int64, updatedBy int64, name *nilt.String, description *nilt.String) (*groupEntity, error) {\n\tret := _m.Called(id, updatedBy, name, description)\n\n\tvar r0 *groupEntity\n\tif rf, ok := ret.Get(0).(func(int64, int64, *nilt.String, *nilt.String) *groupEntity); ok {\n\t\tr0 = rf(id, updatedBy, name, description)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*groupEntity)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int64, int64, *nilt.String, *nilt.String) error); ok {\n\t\tr1 = rf(id, updatedBy, name, description)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "6101ca6b0209d924986e7635159f9b29", "score": "0.5567791", "text": "func (_m *ModelService) GetByID(ctx context.Context, id int64, userID int64) (domain.Model, error) {\n\tret := _m.Called(ctx, id, userID)\n\n\tvar r0 domain.Model\n\tif rf, ok := ret.Get(0).(func(context.Context, int64, int64) domain.Model); ok {\n\t\tr0 = rf(ctx, id, userID)\n\t} else {\n\t\tr0 = ret.Get(0).(domain.Model)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, int64, int64) error); ok {\n\t\tr1 = rf(ctx, id, userID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "fa8627216faa424aadd09b765f6182e1", "score": "0.5561369", "text": "func (_m *Docker) ImageID(ctx context.Context, imageName string) (string, bool, error) {\n\tret := _m.Called(ctx, imageName)\n\n\tvar r0 string\n\tif rf, ok := ret.Get(0).(func(context.Context, string) string); ok {\n\t\tr0 = rf(ctx, imageName)\n\t} else {\n\t\tr0 = ret.Get(0).(string)\n\t}\n\n\tvar r1 bool\n\tif rf, ok := ret.Get(1).(func(context.Context, string) bool); ok {\n\t\tr1 = rf(ctx, imageName)\n\t} else {\n\t\tr1 = ret.Get(1).(bool)\n\t}\n\n\tvar r2 error\n\tif rf, ok := ret.Get(2).(func(context.Context, string) error); ok {\n\t\tr2 = rf(ctx, imageName)\n\t} else {\n\t\tr2 = ret.Error(2)\n\t}\n\n\treturn r0, r1, r2\n}", "title": "" }, { "docid": "787c7d1743953d8df35ee1236ccbcf8f", "score": "0.5560471", "text": "func TestGetByID(t *testing.T) {\n\tdb, mock, err := sqlmock.New()\n\tif err != nil {\n\t\tt.Fatalf(\"cant create mock: %s\", err)\n\t}\n\tdefer db.Close()\n\n\telemID := \"qwertyID\"\n\n\t// good query\n\trows := sqlmock.\n\t\tNewRows([]string{\"id\", \"login\", \"password\"})\n\texpect := []*User{\n\t\t{\"CoolGuy\", elemID, \"CoolPass\"},\n\t}\n\tfor _, item := range expect {\n\t\trows = rows.AddRow(item.ID, item.Login, item.password)\n\t}\n\n\tmock.\n\t\tExpectQuery(\"SELECT id, login, password FROM users WHERE\").\n\t\tWithArgs(elemID).\n\t\tWillReturnRows(rows)\n\n\trepo := &UsersRepo{\n\t\tDB: db,\n\t}\n\titem, err := repo.GetByID(elemID)\n\tif err != nil {\n\t\tt.Errorf(\"unexpected err: %s\", err)\n\t\treturn\n\t}\n\tif err := mock.ExpectationsWereMet(); err != nil {\n\t\tt.Errorf(\"there were unfulfilled expectations: %s\", err)\n\t\treturn\n\t}\n\tif !reflect.DeepEqual(item, expect[0]) {\n\t\tt.Errorf(\"results not match, want %v, have %v\", expect[0], item)\n\t\treturn\n\t}\n\n\t// query error\n\tmock.\n\t\tExpectQuery(\"SELECT id, login, password FROM users WHERE\").\n\t\tWithArgs(elemID).\n\t\tWillReturnError(fmt.Errorf(\"db_error\"))\n\n\t_, err = repo.GetByID(elemID)\n\tif err := mock.ExpectationsWereMet(); err != nil {\n\t\tt.Errorf(\"there were unfulfilled expectations: %s\", err)\n\t\treturn\n\t}\n\tif err == nil {\n\t\tt.Errorf(\"expected error, got nil\")\n\t\treturn\n\t}\n\n\t// row scan error\n\trows = sqlmock.NewRows([]string{\"id\", \"login\"}).\n\t\tAddRow(elemID, \"CoolGuy\")\n\n\tmock.\n\t\tExpectQuery(\"SELECT id, login, password FROM users WHERE\").\n\t\tWithArgs(elemID).\n\t\tWillReturnRows(rows)\n\n\t_, err = repo.GetByID(elemID)\n\tif err := mock.ExpectationsWereMet(); err != nil {\n\t\tt.Errorf(\"there were unfulfilled expectations: %s\", err)\n\t\treturn\n\t}\n\tif err == nil {\n\t\tt.Errorf(\"expected error, got nil\")\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "2d85542d05e37827b46ac06c883bfa9d", "score": "0.5554482", "text": "func (_m *MockIdentity) ShortInstanceID() (string, error) {\n\tret := _m.Called()\n\n\tvar r0 string\n\tif rf, ok := ret.Get(0).(func() string); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(string)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func() error); ok {\n\t\tr1 = rf()\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "8ff9f11025aac82e4c31dd626bfd7f0a", "score": "0.55365866", "text": "func (me *mockEvent) SetID(id nuclio.ID) {\n\tme.Called()\n}", "title": "" }, { "docid": "424eeb78fedb92487d9dc87791ffc6d0", "score": "0.5512421", "text": "func (_m *IcecreamDataAccessor) GetById(_a0 context.Context, _a1 *bo.Icecream) (*bo.Icecream, error) {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 *bo.Icecream\n\tif rf, ok := ret.Get(0).(func(context.Context, *bo.Icecream) *bo.Icecream); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*bo.Icecream)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, *bo.Icecream) error); ok {\n\t\tr1 = rf(_a0, _a1)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "db73fa63490378066bf5bba4924ce95f", "score": "0.55103797", "text": "func mockIDs(count, size int) []namespace.ID {\n\tout := make([]namespace.ID, count)\n\tfor i := 0; i < count; i++ {\n\t\tout[i] = mockID(i)\n\t}\n\treturn out\n}", "title": "" }, { "docid": "28aaa57f2fc1d70a779cf9213a14d187", "score": "0.5490056", "text": "func (m *MockResourceData) SetId(arg0 string) {\n\tm.ctrl.Call(m, \"SetId\", arg0)\n}", "title": "" }, { "docid": "19823422df35b6711000c13ce528d685", "score": "0.5485343", "text": "func (_m *AppFunctionContext) PipelineId() string {\n\tret := _m.Called()\n\n\tvar r0 string\n\tif rf, ok := ret.Get(0).(func() string); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(string)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "5c2f36e709c7b51f8a7143374c46bc88", "score": "0.54844683", "text": "func (_m *ServiceDefinitionService) GetByID(application string, id string) (model.ServiceDefinition, apperrors.AppError) {\n\tret := _m.Called(application, id)\n\n\tvar r0 model.ServiceDefinition\n\tif rf, ok := ret.Get(0).(func(string, string) model.ServiceDefinition); ok {\n\t\tr0 = rf(application, id)\n\t} else {\n\t\tr0 = ret.Get(0).(model.ServiceDefinition)\n\t}\n\n\tvar r1 apperrors.AppError\n\tif rf, ok := ret.Get(1).(func(string, string) apperrors.AppError); ok {\n\t\tr1 = rf(application, id)\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(apperrors.AppError)\n\t\t}\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "0ec81d0cc1fada259b08e11fe9f7bf5f", "score": "0.54551995", "text": "func (_m *FilesService) ListFilesById(files []string, userID *uint64) ([]dto.FilePublic, error) {\n\tret := _m.Called(files, userID)\n\n\tvar r0 []dto.FilePublic\n\tif rf, ok := ret.Get(0).(func([]string, *uint64) []dto.FilePublic); ok {\n\t\tr0 = rf(files, userID)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]dto.FilePublic)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func([]string, *uint64) error); ok {\n\t\tr1 = rf(files, userID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "adcb0df8b2d7c1cec70a4a2d9c76c814", "score": "0.5435542", "text": "func (_m *Repository) GetbyID(ctx context.Context, domain playlists.Domain) (playlists.Domain, error) {\n\tret := _m.Called(ctx, domain)\n\n\tvar r0 playlists.Domain\n\tif rf, ok := ret.Get(0).(func(context.Context, playlists.Domain) playlists.Domain); ok {\n\t\tr0 = rf(ctx, domain)\n\t} else {\n\t\tr0 = ret.Get(0).(playlists.Domain)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, playlists.Domain) error); ok {\n\t\tr1 = rf(ctx, domain)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "6395c02c31c012465f578815ab92adaa", "score": "0.5417949", "text": "func (_m *ProductService) GetProductDetailsByID(ID string) (ec.ProductDTO, error) {\n\tret := _m.Called(ID)\n\n\tvar r0 ec.ProductDTO\n\tif rf, ok := ret.Get(0).(func(string) ec.ProductDTO); ok {\n\t\tr0 = rf(ID)\n\t} else {\n\t\tr0 = ret.Get(0).(ec.ProductDTO)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string) error); ok {\n\t\tr1 = rf(ID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "d73f753384560e8071718c38173a3ce0", "score": "0.54155636", "text": "func (_m *SendOnlyNode) ChainID() *big.Int {\n\tret := _m.Called()\n\n\tvar r0 *big.Int\n\tif rf, ok := ret.Get(0).(func() *big.Int); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*big.Int)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "b607ca42fcbdbc373aae623148914878", "score": "0.5401651", "text": "func (m *MockFramework) UniqueID() string {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"UniqueID\")\n\tret0, _ := ret[0].(string)\n\treturn ret0\n}", "title": "" }, { "docid": "b7621bfda2ad3c3ab3ee14e001222cb9", "score": "0.5395409", "text": "func (m *MockProcessorRepository) ByID(arg0 context.Context, arg1 int) (*model.Processor, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ByID\", arg0, arg1)\n\tret0, _ := ret[0].(*model.Processor)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "847a1d733ebef489d0d9906cd23d0cec", "score": "0.5391716", "text": "func (_m *DeliveryJobRepository) GetByID(id string) (*data.DeliveryJob, error) {\n\tret := _m.Called(id)\n\n\tvar r0 *data.DeliveryJob\n\tif rf, ok := ret.Get(0).(func(string) *data.DeliveryJob); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*data.DeliveryJob)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string) error); ok {\n\t\tr1 = rf(id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "0104b70cbc840a0c0bd682838909d72e", "score": "0.53872716", "text": "func (m MockMessage) ID() string {\n\treturn m.MessageID\n}", "title": "" }, { "docid": "045c48e74bde58e3f15fcb5dd06ff756", "score": "0.5387254", "text": "func (_m *Repository) FindByID(id int32) (*products.Product, error) {\n\tret := _m.Called(id)\n\n\tvar r0 *products.Product\n\tif rf, ok := ret.Get(0).(func(int32) *products.Product); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*products.Product)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int32) error); ok {\n\t\tr1 = rf(id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "c03d4fc121609c3310783f89d5babf4f", "score": "0.53848827", "text": "func (mmGetByID *mAccountRepositoryMockGetByID) Set(f func(ctx context.Context, id int64) (ap1 *mm_repository.Account, err error)) *AccountRepositoryMock {\n\tif mmGetByID.defaultExpectation != nil {\n\t\tmmGetByID.mock.t.Fatalf(\"Default expectation is already set for the AccountRepository.GetByID method\")\n\t}\n\n\tif len(mmGetByID.expectations) > 0 {\n\t\tmmGetByID.mock.t.Fatalf(\"Some expectations are already set for the AccountRepository.GetByID method\")\n\t}\n\n\tmmGetByID.mock.funcGetByID = f\n\treturn mmGetByID.mock\n}", "title": "" }, { "docid": "daca0099997b4eda62c375d99cfc2430", "score": "0.5382761", "text": "func (m *MockDatabaseSeries) ID() ident.ID {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ID\")\n\tret0, _ := ret[0].(ident.ID)\n\treturn ret0\n}", "title": "" }, { "docid": "4bfade8f1dc8c66ef35d3eccce9e9754", "score": "0.53784114", "text": "func (m *MockAccessRequester) GetID() string {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetID\")\n\tret0, _ := ret[0].(string)\n\treturn ret0\n}", "title": "" }, { "docid": "6304735d82a258b67a06cf69eeb110c9", "score": "0.535831", "text": "func (_m *TriggerType) ID() flowschema.TriggerTypeID {\n\tret := _m.Called()\n\n\tvar r0 flowschema.TriggerTypeID\n\tif rf, ok := ret.Get(0).(func() flowschema.TriggerTypeID); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(flowschema.TriggerTypeID)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "161a55e6a38b0f181854f59292c80b5b", "score": "0.5350122", "text": "func (_m *UserMock) GetByID(ctx context.Context, app int64, id int64, all bool, isAdmin bool, uid string) (user *entity.User, err error) {\n\tret := _m.Called(ctx, id)\n\n\tvar r0 entity.User\n\tif rf, ok := ret.Get(0).(func(context.Context, int64) entity.User); ok {\n\t\tr0 = rf(ctx, id)\n\t} else {\n\t\tr0 = ret.Get(0).(entity.User)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {\n\t\tr1 = rf(ctx, id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn &r0, r1\n}", "title": "" }, { "docid": "77b4e128665d2d88120c3f01fb208c88", "score": "0.5349905", "text": "func (m *MockHost) GetID() string {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetID\")\n\tret0, _ := ret[0].(string)\n\treturn ret0\n}", "title": "" }, { "docid": "789b6132c9f3d02b2068a160c8a78b52", "score": "0.533955", "text": "func (_m *MerchantRepository) GetByID(id int) (*model.Merchants, error) {\n\tret := _m.Called(id)\n\n\tvar r0 *model.Merchants\n\tif rf, ok := ret.Get(0).(func(int) *model.Merchants); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*model.Merchants)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int) error); ok {\n\t\tr1 = rf(id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "ded9340648c49b684148f1f44a74f34d", "score": "0.5338323", "text": "func (_m *TxSender) ChainID(_a0 context.Context) (*big.Int, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 *big.Int\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(context.Context) (*big.Int, error)); ok {\n\t\treturn rf(_a0)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context) *big.Int); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*big.Int)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "46ab22ba1ec6c5baddf1f34425fa4d98", "score": "0.53324527", "text": "func (m *MockAccessRequester) SetID(arg0 string) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SetID\", arg0)\n}", "title": "" }, { "docid": "ec03f3241cf26103a5663f13253d28ac", "score": "0.5310927", "text": "func (m *MockUserRepository) SelectByID(arg0 context.Context, arg1 int64) (*api.User, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SelectByID\", arg0, arg1)\n\tret0, _ := ret[0].(*api.User)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "76420515a5daac57fdb8e4451f1139b1", "score": "0.53108984", "text": "func (m *MockServerClient) GetByID(arg0 context.Context, arg1 int64) (*hcloud.Server, *hcloud.Response, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetByID\", arg0, arg1)\n\tret0, _ := ret[0].(*hcloud.Server)\n\tret1, _ := ret[1].(*hcloud.Response)\n\tret2, _ := ret[2].(error)\n\treturn ret0, ret1, ret2\n}", "title": "" }, { "docid": "bab1b946ecaeb84a1c888a5f7128a8b8", "score": "0.5306709", "text": "func (_m *PairService) GetByID(id bson.ObjectId) (*types.Pair, error) {\n\tret := _m.Called(id)\n\n\tvar r0 *types.Pair\n\tif rf, ok := ret.Get(0).(func(bson.ObjectId) *types.Pair); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*types.Pair)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(bson.ObjectId) error); ok {\n\t\tr1 = rf(id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "2ff86a6b9ee47f794e14029741227a33", "score": "0.5302124", "text": "func (_m *MockUserRepository) FindOneByID(id int64) (*userEntity, error) {\n\tret := _m.Called(id)\n\n\tvar r0 *userEntity\n\tif rf, ok := ret.Get(0).(func(int64) *userEntity); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*userEntity)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int64) error); ok {\n\t\tr1 = rf(id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "38cef1ed2df08bb6dd80412ba5f36d34", "score": "0.5294719", "text": "func (m *MockCore) GetID() string {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetID\")\n\tret0, _ := ret[0].(string)\n\treturn ret0\n}", "title": "" }, { "docid": "75c2d8f824cb66d70be322c358c7041f", "score": "0.5294346", "text": "func (_m *Usecase) GetByID(ctx context.Context, ID string) (*models.Host, error) {\n\tret := _m.Called(ctx, ID)\n\n\tvar r0 *models.Host\n\tif rf, ok := ret.Get(0).(func(context.Context, string) *models.Host); ok {\n\t\tr0 = rf(ctx, ID)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*models.Host)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string) error); ok {\n\t\tr1 = rf(ctx, ID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "ed8ebbfc1a8a8e7171af2eadba522297", "score": "0.52862316", "text": "func (m *MockGeneralRepository) GetByID(arg0 models.Model) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetByID\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "e506192f19762f0902a7a53030e45c88", "score": "0.52858084", "text": "func (_m *Storer) GetByOldID(ctx context.Context, id int) (*store.WallpaperWithTags, error) {\n\tret := _m.Called(ctx, id)\n\n\tvar r0 *store.WallpaperWithTags\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(context.Context, int) (*store.WallpaperWithTags, error)); ok {\n\t\treturn rf(ctx, id)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, int) *store.WallpaperWithTags); ok {\n\t\tr0 = rf(ctx, id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*store.WallpaperWithTags)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, int) error); ok {\n\t\tr1 = rf(ctx, id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "5126e58454a4c7764830686e1cba4c18", "score": "0.528506", "text": "func (_m *MockPermissionRepository) FindOneByID(id int64) (*permissionEntity, error) {\n\tret := _m.Called(id)\n\n\tvar r0 *permissionEntity\n\tif rf, ok := ret.Get(0).(func(int64) *permissionEntity); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*permissionEntity)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int64) error); ok {\n\t\tr1 = rf(id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "8b2106a5a757242f8faa131cabb1d199", "score": "0.5284839", "text": "func (mock *StandUpRepoMock) GenerateIDCalls() []struct {\n\tTeamID string\n\tT time.Time\n} {\n\tvar calls []struct {\n\t\tTeamID string\n\t\tT time.Time\n\t}\n\tlockStandUpRepoMockGenerateID.RLock()\n\tcalls = mock.calls.GenerateID\n\tlockStandUpRepoMockGenerateID.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "91fd389a5f0232ed12d09b5e0190697b", "score": "0.5281526", "text": "func (_m *UserRepository) FindByID(ID int) (*domain.User, error) {\n\tret := _m.Called(ID)\n\n\tvar r0 *domain.User\n\tif rf, ok := ret.Get(0).(func(int) *domain.User); ok {\n\t\tr0 = rf(ID)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*domain.User)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int) error); ok {\n\t\tr1 = rf(ID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "13a3de7b5dd5c69d292e5d5537b80d14", "score": "0.5280379", "text": "func fakeIDToken(t *testing.T, expiryDate time.Time) string {\n\ttype Header struct {\n\t\tKid string `json:\"kid\"`\n\t\tAlg string `json:\"alg\"`\n\t}\n\ttype Payload struct {\n\t\tIss string `json:\"iss\"`\n\t\tSub string `json:\"sub\"`\n\t\tExp int64 `json:\"exp\"`\n\t}\n\n\theader, err := json.Marshal(Header{Kid: \"123\", Alg: \"none\"})\n\trequire.NoError(t, err)\n\tu := expiryDate.UTC().Unix()\n\tpayload, err := json.Marshal(Payload{Iss: \"fake\", Sub: \"a-sub\", Exp: u})\n\trequire.NoError(t, err)\n\n\tfakeSignature := []byte(\"6ICJm\")\n\treturn fmt.Sprintf(\"%s.%s.%s\", base64.RawURLEncoding.EncodeToString(header), base64.RawURLEncoding.EncodeToString(payload), base64.RawURLEncoding.EncodeToString(fakeSignature))\n}", "title": "" }, { "docid": "f251cdc66202acfcdaf2dd060f821330", "score": "0.5279831", "text": "func (_m *MockOperation) ForEachVulnerabilityID(fn func(*bbolt.Tx, string) error) error {\n\tret := _m.Called(fn)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(func(*bbolt.Tx, string) error) error); ok {\n\t\tr0 = rf(fn)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "e72be82dfa41b273b309bb7663b95722", "score": "0.5268743", "text": "func (m *MockStorageArrayStoreInterface) GetAllByID(arg0 ...uint) ([]model.StorageArray, error) {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{}\n\tfor _, a := range arg0 {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"GetAllByID\", varargs...)\n\tret0, _ := ret[0].([]model.StorageArray)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "7f7a13a58ec024adf9241f850ab5b650", "score": "0.5259887", "text": "func (_m *MockPostsRepoInterface) GetByID(_param0 string) (*post.Post, error) {\n\tret := _m.ctrl.Call(_m, \"GetByID\", _param0)\n\tret0, _ := ret[0].(*post.Post)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "26f8272e2dda1f9141ed11ef0bf8b3b1", "score": "0.52562195", "text": "func (mmGetByID *mAccountRepositoryMockGetByID) When(ctx context.Context, id int64) *AccountRepositoryMockGetByIDExpectation {\n\tif mmGetByID.mock.funcGetByID != nil {\n\t\tmmGetByID.mock.t.Fatalf(\"AccountRepositoryMock.GetByID mock is already set by Set\")\n\t}\n\n\texpectation := &AccountRepositoryMockGetByIDExpectation{\n\t\tmock: mmGetByID.mock,\n\t\tparams: &AccountRepositoryMockGetByIDParams{ctx, id},\n\t}\n\tmmGetByID.expectations = append(mmGetByID.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "bd78fdc00ca7e6dcf908ddbe12ce0798", "score": "0.5252315", "text": "func (_m *PairDao) GetByID(id bson.ObjectId) (*types.Pair, error) {\n\tret := _m.Called(id)\n\n\tvar r0 *types.Pair\n\tif rf, ok := ret.Get(0).(func(bson.ObjectId) *types.Pair); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*types.Pair)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(bson.ObjectId) error); ok {\n\t\tr1 = rf(id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "d795423fb80aa1533ab8b496405991e0", "score": "0.52436495", "text": "func (_m *Repository) GetByIDGlobal(ctx context.Context, id string) (*model.SystemAuth, error) {\n\tret := _m.Called(ctx, id)\n\n\tvar r0 *model.SystemAuth\n\tif rf, ok := ret.Get(0).(func(context.Context, string) *model.SystemAuth); ok {\n\t\tr0 = rf(ctx, id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*model.SystemAuth)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string) error); ok {\n\t\tr1 = rf(ctx, id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "642512abcc10fb6ffa3d2f5bc20c3ea1", "score": "0.52331495", "text": "func (m *MockStorageArrayStoreInterface) GetByID(arg0 uint) (*model.StorageArray, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetByID\", arg0)\n\tret0, _ := ret[0].(*model.StorageArray)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d1d1dcc4ec97e2be58c1b19b895cd73e", "score": "0.5228039", "text": "func (m *AddIn) SetId(value *string)() {\n m.id = value\n}", "title": "" }, { "docid": "60a5754082e1ba0604890ae4cc02f980", "score": "0.5221089", "text": "func TestMotorcycleRepository_FindByID(t *testing.T) {\n\n\t// ARRANGE\n\trepo, _ := NewMotorcycleRepository()\n\tmotorcycle, _ := entity.NewMotorcycle(\"Honda\", \"Shadow\", 2006, \"01234567890123456\")\n\tmoto, _, _ := repo.Insert(motorcycle)\n\n\t// ACT\n\tfoundMoto, _, _ := repo.FindByID(moto.ID)\n\n\t// ASSERT\n\tassert.True(t, moto.ID == foundMoto.ID)\n}", "title": "" }, { "docid": "e7957e01befb442131aebbc12b1fbdd2", "score": "0.5219195", "text": "func (_m *RedisService) GetUserByID(ctx context.Context, userID string) (repository.User, error) {\n\tret := _m.Called(ctx, userID)\n\n\tvar r0 repository.User\n\tif rf, ok := ret.Get(0).(func(context.Context, string) repository.User); ok {\n\t\tr0 = rf(ctx, userID)\n\t} else {\n\t\tr0 = ret.Get(0).(repository.User)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string) error); ok {\n\t\tr1 = rf(ctx, userID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "35ee5572e324b752be0725fe8198a9bf", "score": "0.5215816", "text": "func (_m *MockIdentity) InstanceID() (string, error) {\n\tret := _m.Called()\n\n\tvar r0 string\n\tif rf, ok := ret.Get(0).(func() string); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(string)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func() error); ok {\n\t\tr1 = rf()\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "229b570d354a462d67bc012f663a8c2a", "score": "0.5213805", "text": "func (_m *Repository) FindByID(id int) (*users.Domain, error) {\n\tret := _m.Called(id)\n\n\tvar r0 *users.Domain\n\tif rf, ok := ret.Get(0).(func(int) *users.Domain); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*users.Domain)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int) error); ok {\n\t\tr1 = rf(id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "194ca1ef4b5f74529d71fc11206097a2", "score": "0.52044207", "text": "func TestMetroServiceGetMetroByID(t *testing.T) {\n\t// case 1\n\tMetroRepo.On(\"GetMetroByID\", int64(1)).Once().Return(&model.Metro{Code: \"123\"}, nil)\n\ttestutil.Play(t, MetroSrv, \"GetMetroByID\", int64(1)).Match(&model.Metro{Code: \"123\"}, nil)\n\n\t// case 2\n\tMetroRepo.On(\"GetMetroByID\", int64(2)).Once().Return(nil, gorm.ErrRecordNotFound)\n\ttestutil.Play(t, MetroSrv, \"GetMetroByID\", int64(2)).Match(nil, gorm.ErrRecordNotFound)\n}", "title": "" }, { "docid": "d4abee3969d1b83c9c717a33a18683c7", "score": "0.52023345", "text": "func (_m *FullNode) StateLookupID(_a0 context.Context, _a1 address.Address, _a2 types.TipSetKey) (address.Address, error) {\n\tret := _m.Called(_a0, _a1, _a2)\n\n\tvar r0 address.Address\n\tif rf, ok := ret.Get(0).(func(context.Context, address.Address, types.TipSetKey) address.Address); ok {\n\t\tr0 = rf(_a0, _a1, _a2)\n\t} else {\n\t\tr0 = ret.Get(0).(address.Address)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, address.Address, types.TipSetKey) error); ok {\n\t\tr1 = rf(_a0, _a1, _a2)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "433c83d9f33af3d9d7c66a2ec7619f97", "score": "0.51964843", "text": "func (m *MockFramework) CallerID() string {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CallerID\")\n\tret0, _ := ret[0].(string)\n\treturn ret0\n}", "title": "" }, { "docid": "94785348d83946b580e78aa2bff23858", "score": "0.5188672", "text": "func (_m *Repository) GetByID(ctx context.Context, id uint64) (*models.Music, error) {\n\tret := _m.Called(ctx, id)\n\n\tvar r0 *models.Music\n\tif rf, ok := ret.Get(0).(func(context.Context, uint64) *models.Music); ok {\n\t\tr0 = rf(ctx, id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*models.Music)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, uint64) error); ok {\n\t\tr1 = rf(ctx, id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "0786fb4fe8df354fa9cbf3b5312b14fd", "score": "0.5185982", "text": "func (_m *MockStore) Find(id int) error {\n\tret := _m.Called(id)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(int) error); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "cfe63a0e837782c3588afd7ec7b90797", "score": "0.5183827", "text": "func (mock *RouterMock) IDCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tmock.lockID.RLock()\n\tcalls = mock.calls.ID\n\tmock.lockID.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "4dd16484ef23dc82693004ac3daab239", "score": "0.5183149", "text": "func doSomethingElseForABit(id string) {\n\n}", "title": "" }, { "docid": "581b4d04fa4de200e9a32cacda23d130", "score": "0.5179987", "text": "func (_m *TaskRepository) GetById(id int) (models.Task, error) {\n\tret := _m.Called(id)\n\n\tvar r0 models.Task\n\tif rf, ok := ret.Get(0).(func(int) models.Task); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tr0 = ret.Get(0).(models.Task)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int) error); ok {\n\t\tr1 = rf(id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" } ]
70190dc4456a267843499e5561d7ff7c
getTokenFromWeb uses Config to request a Token. It returns the retrieved Token.
[ { "docid": "7c3a355368bfcfcf908320ac3afdc901", "score": "0.7289129", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar code string\n\tif _, err := fmt.Scan(&code); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(oauth2.NoContext, code)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" } ]
[ { "docid": "1010edf47b907a303a9fd097cdc1c3e7", "score": "0.80971515", "text": "func getTokenFromWeb(config *oauth2.Config, code string) (*oauth2.Token, error) {\n\ttok, err := config.Exchange(oauth2.NoContext, code)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn tok, nil\n}", "title": "" }, { "docid": "a6148fc67e8cacfb34a4eec8ed0bf7de", "score": "0.75873744", "text": "func GetTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "a6148fc67e8cacfb34a4eec8ed0bf7de", "score": "0.75873744", "text": "func GetTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "70ef74b610fd1cfd234dceb203ba65f0", "score": "0.74210143", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tdbglog.Info(fmt.Sprintf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL))\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tdbglog.Fatal(fmt.Sprintf(\"Unable to read authorization code: %v\", err))\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tdbglog.Fatal(fmt.Sprintf(\"Unable to retrieve token from web: %v\", err))\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "2e64794f10c6c08fedfe2f0631c79e2d", "score": "0.7401069", "text": "func getTokenFromWeb(config *oauth2.Config) (*oauth2.Token, error) {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\treturn nil, errors.WithMessage(err, \"Scanning for token failed\")\n\t}\n\n\ttok, err := config.Exchange(oauth2.NoContext, authCode)\n\tif err != nil {\n\t\treturn nil, errors.WithMessage(err, \"Token exchange failed\")\n\t}\n\treturn tok, nil\n}", "title": "" }, { "docid": "b3da52c166d75a0380264ff27c2e22e9", "score": "0.73904765", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\n\tcmd := exec.Command(\"open\", authURL)\n\tif err := cmd.Start(); err != nil {\n\t\tfmt.Errorf(\"Browser Start Error: %v\\n\", err)\n\t\tfmt.Errorf(\"Go to the following link in your browser.\\n\")\n\t}\n\tfmt.Printf(\"URL: %v\\nType the authorization code.\\n\", authURL)\n\n\tvar code string\n\tif _, err := fmt.Scan(&code); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttoken, err := config.Exchange(oauth2.NoContext, code)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn token\n}", "title": "" }, { "docid": "b672ddb66ba154bf4727bd0509a06108", "score": "0.7381212", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"[INFO] go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"[ERROR] unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "42b99fb3c49a08de3a1e5a1cb6a6b55d", "score": "0.737791", "text": "func (app *App) GetTokenFromWeb() *oauth2.Token {\n\tauthURL := app.Config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\n\tfmt.Printf(\"Go to the following link in your browser then type the authorization code: \\n%v\\n\", authURL)\n\tfmt.Printf(\"Enter Verfication Code:\\n\")\n\n\tvar code string\n\tif _, err := fmt.Scan(&code); err != nil {\n\t\tfmt.Printf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := app.Config.Exchange(oauth2.NoContext, code)\n\tif err != nil {\n\t\tfmt.Printf(\"Unable to retrieve token from web %v\", err)\n\t}\n\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "98643fd9833a07f7ccfe9cd33d9f8742", "score": "0.7351675", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "f93834c9f26ab21cc52b399121202918", "score": "0.73493516", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "f93834c9f26ab21cc52b399121202918", "score": "0.73493516", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "f93834c9f26ab21cc52b399121202918", "score": "0.73493516", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "f93834c9f26ab21cc52b399121202918", "score": "0.73493516", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "f93834c9f26ab21cc52b399121202918", "score": "0.73493516", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "f93834c9f26ab21cc52b399121202918", "score": "0.73493516", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "f93834c9f26ab21cc52b399121202918", "score": "0.73493516", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "f93834c9f26ab21cc52b399121202918", "score": "0.73493516", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "e494aadeb458b26c355c7d527ea77cea", "score": "0.7332406", "text": "func getTokenFromWeb(ctx context.Context, config *oauth2.Config) (*oauth2.Token, error) {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(ctx, authCode)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to retrieve token from web: %v\", err)\n\t}\n\n\treturn tok, nil\n}", "title": "" }, { "docid": "d4283874a980421bb19fbe0128599e17", "score": "0.7331175", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(oauth2.NoContext, authCode)\n\tif err != nil {\n\t\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "db2778184679f1764bdf4a8015348fdd", "score": "0.7330249", "text": "func getTokenFromWeb(config *oauth2.Config, f func(string) string) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\n\tcode := f(fmt.Sprintf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL))\n\n\ttok, err := config.Exchange(oauth2.NoContext, code)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "8f6f61a4956da78b6166447d162ee4cf", "score": "0.73242587", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(oauth2.NoContext, authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "8f6f61a4956da78b6166447d162ee4cf", "score": "0.73242587", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(oauth2.NoContext, authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "8f6f61a4956da78b6166447d162ee4cf", "score": "0.73242587", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(oauth2.NoContext, authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "bd258a8cf90be428253dfc9c9fc65325", "score": "0.73218405", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.Background(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "4a508059b1aa8ea26e87216fc0230513", "score": "0.73165536", "text": "func (gd *GoogleDrive) GetTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "3d337e9fd707eca6835d6507ff5cc896", "score": "0.7291881", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\"authorization code: \\n%v\\n\", authURL)\n\n\tvar code string\n\tif _, err := fmt.Scan(&code); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(oauth2.NoContext, code)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "aa19c589d5cd01af4dc26c89efcc6164", "score": "0.72903496", "text": "func getTokenFromWeb(oauthConfig *oauth2.Config) *oauth2.Token {\n\tlog.Warn(\"Deprecated\")\n\tauthURL := oauthConfig.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Authorization URL\\n%v\\nAuthorization code:\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\tlog.Fatal(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := oauthConfig.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\tlog.Fatal(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "b5776e58920473655316d4fd2105efee", "score": "0.72874063", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar code string\n\tif _, err := fmt.Scan(&code); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.Background(), code)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "efcdb53c709d043ea5bf804b52332c7f", "score": "0.72523594", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\r\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\r\n\tlog.Fatalf(\"Go to the following link in your browser then type the \"+\r\n\t\t\"authorization code: \\n%v\\n\", authURL)\r\n\r\n\tvar authCode string\r\n\tif _, err := fmt.Scan(&authCode); err != nil {\r\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\r\n\t}\r\n\r\n\ttok, err := config.Exchange(oauth2.NoContext, authCode)\r\n\tif err != nil {\r\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\r\n\t}\r\n\treturn tok\r\n}", "title": "" }, { "docid": "acf903968aec3e7173495bf89f5e4b31", "score": "0.72362566", "text": "func getTokenFromWeb(config *oauth2.Config) (*oauth2.Token, error) {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tfmt.Printf(\"authorization code: \")\n\n\tvar code string\n\tif _, err := fmt.Scan(&code); err != nil {\n\t\treturn nil, fmt.Errorf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(context.Background(), code)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok, nil\n}", "title": "" }, { "docid": "4678af2d83ced3dfb61271d5b022bd2d", "score": "0.72311515", "text": "func GetOauthTokenFromWeb(ctx context.Context, config *oauth2.Config) (*oauth2.Token, error) {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\treturn nil, fmt.Errorf(\"reading auth code: %w\", err)\n\t}\n\n\ttok, err := config.Exchange(ctx, authCode)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"exchanging auth code: %w\", err)\n\t}\n\n\treturn tok, nil\n}", "title": "" }, { "docid": "47fd8ee8ae974c9d4cc9cf3de7ff1dd9", "score": "0.7211158", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\t// returns a URL to OAuth 2.0 provider's consent page that asks for\n\t// permissions for the required scopes explicitly.\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar code string\n\t// scan the standard input to populate code\n\tif _, err := fmt.Scan(&code); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\t// Exchange converts an authorization code into a token\n\ttok, err := config.Exchange(oauth2.NoContext, code)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "2a743bc08477975011c766014c0960b0", "score": "0.7197246", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\r\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\r\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\r\n\t\t\"authorization code: \\n%v\\n\", authURL)\r\n\r\n\tvar authCode string\r\n\tif _, err := fmt.Scan(&authCode); err != nil {\r\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\r\n\t}\r\n\r\n\ttok, err := config.Exchange(context.TODO(), authCode)\r\n\tif err != nil {\r\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\r\n\t}\r\n\treturn tok\r\n}", "title": "" }, { "docid": "2a743bc08477975011c766014c0960b0", "score": "0.7197246", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\r\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\r\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\r\n\t\t\"authorization code: \\n%v\\n\", authURL)\r\n\r\n\tvar authCode string\r\n\tif _, err := fmt.Scan(&authCode); err != nil {\r\n\t\tlog.Fatalf(\"Unable to read authorization code: %v\", err)\r\n\t}\r\n\r\n\ttok, err := config.Exchange(context.TODO(), authCode)\r\n\tif err != nil {\r\n\t\tlog.Fatalf(\"Unable to retrieve token from web: %v\", err)\r\n\t}\r\n\treturn tok\r\n}", "title": "" }, { "docid": "b2e134ab05ea67884c2de1c10b9d3ee1", "score": "0.71132386", "text": "func tokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tlog.Printf(\"Go to the following link in your browser then type the authorization code: \\n%v\\n\", authURL)\n\n\tvar code string\n\tif _, err := fmt.Scan(&code); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(oauth2.NoContext, code)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "4ee55e6c9c71083df634c86c24a85f03", "score": "0.70563453", "text": "func getTokenFromWeb(ctx context.Context, config *oauth2.Config, out *std.Output) (*oauth2.Token, error) {\n\tout.WriteNoticef(\"Setting up Google token via oAuth - follow the prompts to get set up!\")\n\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\n\tout.Writef(\"Opening %s ...\", authURL)\n\tif err := open.URL(authURL); err != nil {\n\t\treturn nil, err\n\t}\n\n\tfmt.Printf(\"Paste the OAuth token here: \")\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn config.Exchange(ctx, authCode)\n}", "title": "" }, { "docid": "20812ab4c17ff5327f1c77576409e07d", "score": "0.70297486", "text": "func (g *GMail) getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar code string\n\tif _, err := fmt.Scan(&code); err != nil {\n\t\tlog.Fatalf(\"Unable to read authorization code %v\", err)\n\t}\n\n\ttok, err := config.Exchange(oauth2.NoContext, code)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "8da497279feb09e2a59d730ab44a7a52", "score": "0.70036376", "text": "func getToken(config *oauth2.Config) *oauth2.Token {\n\t// The file token.json stores the user's access and refresh tokens, and is\n\t// created automatically when the authorization flow completes for the first\n\t// time.\n\ttokFile := filepath.Join(GetCurrentDir(), \"token.json\")\n\ttok, err := tokenFromFile(tokFile)\n\tif err != nil {\n\t\ttok = getTokenFromWeb(config)\n\t\tsaveToken(tokFile, tok)\n\t}\n\treturn tok\n}", "title": "" }, { "docid": "77050e698ebdd770f999410a6070eb1e", "score": "0.69795215", "text": "func (s *Service) WebToken(c context.Context) (token *model.Token, err error) {\n\tvar (\n\t\ttokenReq *model.TokenResq\n\t)\n\tif tokenReq, err = s.dao.GetToken(c, s.c.Property.TokenBID, metadata.String(c, metadata.RemoteIP)); err != nil {\n\t\terr = errors.WithStack(err)\n\t\treturn\n\t}\n\ttoken = tokenReq.Data\n\treturn\n}", "title": "" }, { "docid": "4f113bc95ac80febe98847bdb83e9ef9", "score": "0.69573325", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\r\n authURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\r\n logger.Print(\"Go to the following link in your browser then type the \"+\r\n \"authorization code: \\n%v\\n\", authURL)\r\n\r\n var authCode string\r\n if _, err := fmt.Scan(&authCode); err != nil {\r\n logger.Fatalf(\"Unable to read authorization code: %v\", err)\r\n }\r\n\r\n tok, err := config.Exchange(oauth2.NoContext, authCode)\r\n if err != nil {\r\n logger.Fatalf(\"Unable to retrieve token from web: %v\", err)\r\n }\r\n return tok\r\n}", "title": "" }, { "docid": "890a7196984bda19f0f445976e69b573", "score": "0.6930117", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n authURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n fmt.Printf(\"Go to the following link in your browser then type the \"+\n \"authorization code: \\n%v\\n\", authURL)\n\n var authCode string\n if _, err := fmt.Scan(&authCode); err != nil {\n log.Printf(\"No se pudo leer el codigo de autorizacion %v\", err)\n }\n\n tok, err := config.Exchange(context.TODO(), authCode)\n if err != nil {\n log.Printf(\"No se pudo recuperar el token de la web %v\", err)\n }\n return tok\n}", "title": "" }, { "docid": "4fe121b58ebb6bc29c2f729b19b51ffc", "score": "0.6923099", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n authURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n fmt.Printf(\"Go to the following link in your browser then type the \"+\n \"authorization code: \\n%v\\n\", authURL)\n\n var authCode string\n if _, err := fmt.Scan(&authCode); err != nil {\n log.Fatalf(\"Unable to read authorization code: %v\", err)\n }\n\n tok, err := config.Exchange(oauth2.NoContext, authCode)\n if err != nil {\n log.Fatalf(\"Unable to retrieve token from web: %v\", err)\n }\n return tok\n}", "title": "" }, { "docid": "a3cb95ed2d0c2153a5b68d11f9fddb72", "score": "0.6903509", "text": "func getTokenFromWeb(config *oauth2.Config) *oauth2.Token {\n authURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n fmt.Printf(\"Go to the following link in your browser then type the \"+\n \"authorization code: \\n%v\\n\", authURL)\n\n var code string\n if _, err := fmt.Scan(&code); err != nil {\n log.Fatalf(\"Unable to read authorization code %v\", err)\n }\n\n tok, err := config.Exchange(oauth2.NoContext, code)\n if err != nil {\n log.Fatalf(\"Unable to retrieve token from web %v\", err)\n }\n return tok\n}", "title": "" }, { "docid": "7a6b3dcb03ba9b0c1f82ef4a79792cbf", "score": "0.68376267", "text": "func tokenFromWeb(config *oauth2.Config) (*oauth2.Token, error) {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tio.WriteString(os.Stdout, \"Enter code> \")\n\n\tbs := bufio.NewScanner(os.Stdin)\n\tif !bs.Scan() {\n\t\treturn nil, errors.New(\"Unable to read authorization code\")\n\t}\n\tcode := strings.TrimSpace(bs.Text())\n\n\ttoken, err := config.Exchange(oauth2.NoContext, code)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Unable to retrieve token from web %v\", err)\n\t}\n\treturn token, nil\n}", "title": "" }, { "docid": "fcc8feaf0fe31df6cf374ada8e4dc8c7", "score": "0.67756766", "text": "func GetToken(ctx context.Context, conf Config) (*oauth2.Token, error) {\n\ttoken, err := conf.Storage.GetToken()\n\tif err == nil && token.Valid() {\n\t\treturn token, err\n\t}\n\turl := conf.AuthCodeURL(\"state\")\n\tfmt.Printf(\"Type the following url into your browser and follow the directions on screen: %v\\n\", url)\n\tfmt.Println(\"Paste the code returned in the redirect URL and hit Enter:\")\n\n\tvar code string\n\tif _, err := fmt.Scan(&code); err != nil {\n\t\treturn nil, err\n\t}\n\treturn conf.Exchange(ctx, code)\n}", "title": "" }, { "docid": "df9d991dd913d31790a24370ff9b01de", "score": "0.67719704", "text": "func getDriveTokenFromWeb(config *oauth2.Config) (*oauth2.Token, error) {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\tvar authCode string\n\tif _, err := fmt.Scan(&authCode); err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to read authorization code %w\", err)\n\t}\n\n\ttok, err := config.Exchange(context.TODO(), authCode)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to retrieve token from web %w\", err)\n\t}\n\treturn tok, nil\n}", "title": "" }, { "docid": "a1c637e67e65f42c7c6cd05478c8daef", "score": "0.6755829", "text": "func getGDriveTokenFromWeb(config *oauth2.Config) (*oauth2.Token, error) {\n\tauthURL := config.AuthCodeURL(\"state-token\", oauth2.AccessTypeOffline)\n\twebbrowser.Open(authURL)\n\n\tcolor.Yellow(\"Enter Auth Code: \")\n\n\tvar code string\n\tif _, err := fmt.Scan(&code); err != nil {\n\t\tcolor.Red(\"Unable to read authorization code %v\", err)\n\t\treturn nil, err\n\t}\n\n\ttok, err := config.Exchange(oauth2.NoContext, code)\n\tif err != nil {\n\t\tcolor.Red(\"Unable to retrieve token from web %v\", err)\n\t\treturn tok, err\n\t}\n\n\treturn tok, nil\n}", "title": "" }, { "docid": "cffce64ffbe47c39ed23e1afa3f0c481", "score": "0.66504884", "text": "func getTokenFromWeb(user string, config *oauth2.Config) string {\n\tauthURL := config.AuthCodeURL(user, oauth2.AccessTypeOffline)\n\tfmt.Printf(\"Go to the following link in your browser then type the \"+\n\t\t\"authorization code: \\n%v\\n\", authURL)\n\n\treturn authURL\n}", "title": "" }, { "docid": "ce956d4755c38cf0a8bc35118e543e91", "score": "0.65207505", "text": "func getToken() string{\n kConfigAddress := \"config.json\"\n file, err := os.Open( kConfigAddress)\n if err != nil{\n log.Fatal(err)\n }\n // On the return close the file\n defer file.Close()\n decoder := json.NewDecoder( file)\n configuration := BotSensitiveConfiguration{}\n err2 := decoder.Decode( &configuration)\n if err2 != nil{\n log.Fatal( err2)\n }\n return configuration.Token\n}", "title": "" }, { "docid": "62ed2538050205d4ccc4e9c779be0efc", "score": "0.6458256", "text": "func GetToken(ctx *pulumi.Context) string {\n\tv, err := config.Try(ctx, \"do:token\")\n\tif err == nil {\n\t\treturn v\n\t}\n\tif dv, ok := getEnvOrDefault(\"\", nil, \"DO_TOKEN\", \"DIGITAL_OCEAN_TOKEN\", \"DIGITALOCEAN_TOKEN\").(string); ok {\n\t\treturn dv\n\t}\n\tpanic(err.Error())\n\treturn v\n}", "title": "" }, { "docid": "53d6f5e1179e65bd993685a3973c4dea", "score": "0.6457059", "text": "func (c *SessionContext) getToken() (types.WebToken, error) {\n\tt, err := types.NewWebToken(c.cfg.Session.GetBearerTokenExpiryTime(), types.WebTokenSpecV3{\n\t\tUser: c.cfg.Session.GetUser(),\n\t\tToken: c.cfg.Session.GetBearerToken(),\n\t})\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\treturn t, nil\n}", "title": "" }, { "docid": "0ac0ecc03aa6b2f83b2b4623a13f5628", "score": "0.6265268", "text": "func (this *WxQy) GetToken() (*WXQyToken, error) {\n\tdat, err := this.HttpGet(\"/cgi-bin/gettoken\", false, map[string]interface{}{\n\t\t\"corpid\": this.config.CorpID,\n\t\t\"corpsecret\": this.config.Secret,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tthis.token = &WXQyToken{}\n\terr = json.Unmarshal(dat, this.token)\n\treturn this.token, err\n}", "title": "" }, { "docid": "bacd9cac0f77fc5a77c1faefd706ee15", "score": "0.6238169", "text": "func getToken(name string) (*oauth2.Token, error) {\n\ttokenString := fs.ConfigFileGet(name, fs.ConfigToken)\n\tif tokenString == \"\" {\n\t\treturn nil, errors.New(\"empty token found - please run rclone config again\")\n\t}\n\ttoken := new(oauth2.Token)\n\terr := json.Unmarshal([]byte(tokenString), token)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// if has data then return it\n\tif token.AccessToken != \"\" && token.RefreshToken != \"\" {\n\t\treturn token, nil\n\t}\n\t// otherwise try parsing as oldToken\n\toldtoken := new(oldToken)\n\terr = json.Unmarshal([]byte(tokenString), oldtoken)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// Fill in result into new token\n\ttoken.AccessToken = oldtoken.AccessToken\n\ttoken.RefreshToken = oldtoken.RefreshToken\n\ttoken.Expiry = oldtoken.Expiry\n\t// Save new format in config file\n\terr = putToken(name, token)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn token, nil\n}", "title": "" }, { "docid": "a63641ceb5c0383e4dfd5a77982a3031", "score": "0.622255", "text": "func GetToken(ctx *pulumi.Context) string {\n\treturn config.Get(ctx, \"spotinst:token\")\n}", "title": "" }, { "docid": "55a468a0ef5a81ede92fbbd693c935c4", "score": "0.6196872", "text": "func (_Uniswapfactory *UniswapfactoryCaller) GetToken(opts *bind.CallOpts, exchange common.Address) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _Uniswapfactory.contract.Call(opts, out, \"getToken\", exchange)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "8d25bfa75892876a6be8847516b3c348", "score": "0.61885136", "text": "func GetToken(ctx *pulumi.Context) string {\n\treturn config.Get(ctx, \"dnsimple:token\")\n}", "title": "" }, { "docid": "84eb2e73e985473165301f531274ce92", "score": "0.61252195", "text": "func (_Uniswapfactory *UniswapfactoryCallerSession) GetToken(exchange common.Address) (common.Address, error) {\n\treturn _Uniswapfactory.Contract.GetToken(&_Uniswapfactory.CallOpts, exchange)\n}", "title": "" }, { "docid": "c711d48127d51d1d3ac930c4f7724765", "score": "0.6081018", "text": "func (c Config) Token(ctx context.Context) (*oauth2.Token, error) {\n\tappJWT, err := newAppJWT(c.AppID, c.PrivateKey)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not generate a jwt: %w\", err)\n\t}\n\tresp, err := c.createInstallationAccessToken(ctx, appJWT)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not create an installation access token: %w\", err)\n\t}\n\treturn &oauth2.Token{\n\t\tAccessToken: resp.Token,\n\t\tExpiry: resp.ExpiresAt,\n\t\tTokenType: \"token\",\n\t}, nil\n}", "title": "" }, { "docid": "5b97ab2714dc379aa57b2d74f4eb92b1", "score": "0.6076751", "text": "func getToken(oauthConfig *oauth2.Config) (*oauth2.Token, error) {\n\tlog.Warn(\"Deprecated\")\n\ttoken, err := TokenFromFile(config.TokenFile)\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t\treturn refreshToken(oauthConfig)\n\t}\n\treturn token, nil\n}", "title": "" }, { "docid": "df6858d2be41df4dc52479eeb8686ce4", "score": "0.6043583", "text": "func (n *templateFunctions) GetToken(key string) (string, error) {\n\tif n.secretStore != nil {\n\t\ttoken, err := n.secretStore.FindSecret(key)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tif token == nil {\n\t\t\treturn \"\", fmt.Errorf(\"token not found: %q\", key)\n\t\t}\n\t\treturn string(token.Data), nil\n\t}\n\n\t// Fallback to direct configuration\n\tglog.Infof(\"Falling back to direct configuration for secrets\")\n\ttoken := n.config.Tokens[key]\n\tif token == \"\" {\n\t\treturn \"\", fmt.Errorf(\"token not found: %q\", key)\n\t}\n\treturn token, nil\n}", "title": "" }, { "docid": "6ec4f0f2a951229cd4d5cea97e83985f", "score": "0.6026033", "text": "func GetToken(ctx *pulumi.Context) string {\n\tv, err := config.Try(ctx, \"sakuracloud:token\")\n\tif err == nil {\n\t\treturn v\n\t}\n\treturn getEnvOrDefault(\"\", nil, \"SAKURACLOUD_ACCESS_TOKEN\").(string)\n}", "title": "" }, { "docid": "ae9f9148478111c13759021f1e765e40", "score": "0.60252506", "text": "func GetToken() (*string,error) {\n\t\t// zuerst nach environment var suchen\n\t\tenvToken:=os.Getenv(\"rnv_api_token\")\n\t\tif (envToken!=\"\"){\n\t\t\treturn &envToken,nil\n\t\t}\n\t\tvar err error\n once.Do(func() {\n apiToken,err = readToken()\n })\n return &apiToken.UserToken,err\n}", "title": "" }, { "docid": "8369b8ce60b0653bd37ae468ddd9be81", "score": "0.6011397", "text": "func (_Uniswapfactory *UniswapfactorySession) GetToken(exchange common.Address) (common.Address, error) {\n\treturn _Uniswapfactory.Contract.GetToken(&_Uniswapfactory.CallOpts, exchange)\n}", "title": "" }, { "docid": "512e75c5d5ac315aae9647fe7b1e3039", "score": "0.59981614", "text": "func (c *Client) getToken() error {\n\ttokenRequest := TokenRequest{c.Config.ClientID, c.Config.ClientSecret, c.Config.Username, c.Config.Password, \"password\"}\n\tform := url.Values{}\n\tform.Add(\"client_id\", tokenRequest.ClientID)\n\tform.Add(\"client_secret\", tokenRequest.ClientSecret)\n\tform.Add(\"username\", tokenRequest.Username)\n\tform.Add(\"password\", tokenRequest.Password)\n\tform.Add(\"grant_type\", tokenRequest.GrantType)\n\tresp, err := http.Post(c.Config.AccessURL, \"application/x-www-form-urlencoded\", strings.NewReader(form.Encode()))\n\tif err != nil {\n\t\treturn err\n\t}\n\tif resp.StatusCode >= 300 {\n\t\treturn fmt.Errorf(\"Could not retrieve a token.\")\n\t}\n\tdefer resp.Body.Close()\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar t Token\n\terr = json.Unmarshal(body, &t)\n\tif err != nil {\n\t\treturn err\n\t}\n\tc.Token = &t\n\tc.setTokenExpireTime()\n\treturn nil\n}", "title": "" }, { "docid": "abfd5c47d7f0e0e903ed17a9a6860451", "score": "0.59846514", "text": "func (testApp *TestApp) GetToken(tenantID string, userID string, scope []string) string {\n\treturn testApp.generateToken(tenantID, userID, \"\", \"\", uuid.UUID{}.String(), \"\", scope, false)\n}", "title": "" }, { "docid": "75b8c5a0ef187806eb03c794da656a0d", "score": "0.5973032", "text": "func (e *PlatformEndpoint) GetToken() (token string) {\n\treturn e.token\n}", "title": "" } ]
252f488090566fc2a85bf55a0d76f655
+kubebuilder:rbac:groups=konfigurator.stakater.com,resources=podmetadatainjectors,verbs=get;list;watch;create;update;patch;delete +kubebuilder:rbac:groups=konfigurator.stakater.com,resources=podmetadatainjectors/status,verbs=get;update;patch +kubebuilder:rbac:groups=konfigurator.stakater.com,resources=podmetadatainjectors/finalizers,verbs=update +kubebuilder:rbac:groups="",resources=pods,verbs=get;list;watch;
[ { "docid": "51772aa7a5666a810a980f9319329242", "score": "0.0", "text": "func (r *PodMetadataInjectorReconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {\n\tlog := r.Log.WithValues(\"PodMetadataInjector\", req.NamespacedName)\n\n\tlog.Info(\"Reconciling PodMetadataInjector: \" + req.Name)\n\tinstance := &konfiguratorv1alpha1.PodMetadataInjector{}\n\n\terr := r.Get(ctx, req.NamespacedName, instance)\n\tif err != nil {\n\t\tif errors.IsNotFound(err) {\n\t\t\treturn ctrl.Result{}, nil\n\t\t}\n\t\t// Error reading the object - requeue the request.\n\t\treturn reconcilerUtil.RequeueWithError(err)\n\t}\n\t// your logic here\n\n\t// Resource is marked for deletion\n\tif instance.DeletionTimestamp != nil {\n\t\tlog.Info(\"Deletion timestamp found for instance \" + req.Name)\n\t\t// Finalizer doesn't exist so clean up is already done\n\t\tif !finalizerUtil.HasFinalizer(instance, PodMetadataInjectorFinalizer) {\n\t\t\treturn ctrl.Result{}, nil\n\t\t}\n\n\t\tif err := r.RemoveFromContext(ctx, instance); err != nil {\n\t\t\treturn reconcilerUtil.ManageError(r.Client, instance, err, false)\n\t\t}\n\t\treturn ctrl.Result{}, nil\n\t}\n\t// Add finalizer if it doesn't exist\n\tif !finalizerUtil.HasFinalizer(instance, PodMetadataInjectorFinalizer) {\n\t\tlog.Info(\"Adding finalizer \" + req.Name)\n\n\t\tfinalizerUtil.AddFinalizer(instance, PodMetadataInjectorFinalizer)\n\n\t\terr := r.Client.Update(ctx, instance)\n\t\tif err != nil {\n\t\t\treturn reconcilerUtil.ManageError(r.Client, instance, err, false)\n\t\t}\n\t\treturn ctrl.Result{}, nil\n\t}\n\n\tif err := r.AddToContext(ctx, instance); err != nil {\n\t\treturn reconcilerUtil.RequeueWithError(err)\n\t}\n\n\treturn reconcilerUtil.RequeueAfter(RequeTime)\n}", "title": "" } ]
[ { "docid": "696ecdd65aa7b4ecdefb4c1be840907d", "score": "0.5745824", "text": "func TestAccAzureDevOpsServiceEndpointKubernetesForKubeconfigCreateAndUpdate(t *testing.T) {\n\tauthorizationType := \"Kubeconfig\"\n\n\tvar attrTestCheckFuncList []resource.TestCheckFunc\n\tattrTestCheckFuncList = append(\n\t\tattrTestCheckFuncList,\n\t\tresource.TestCheckResourceAttrSet(terraformServiceEndpointNode, \"kubeconfig.#\"),\n\t)\n\ttestAccAzureDevOpsServiceEndpoint(t, attrTestCheckFuncList, authorizationType)\n}", "title": "" }, { "docid": "7140cf9f78d11ec7bfb8e74df9c1d4e2", "score": "0.5569602", "text": "func TestAccAzureDevOpsServiceEndpointKubernetesForServiceAccountCreateAndUpdate(t *testing.T) {\n\tauthorizationType := \"ServiceAccount\"\n\n\tvar attrTestCheckFuncList []resource.TestCheckFunc\n\tattrTestCheckFuncList = append(\n\t\tattrTestCheckFuncList,\n\t\tresource.TestCheckResourceAttrSet(terraformServiceEndpointNode, \"service_account.#\"),\n\t)\n\n\ttestAccAzureDevOpsServiceEndpoint(t, attrTestCheckFuncList, authorizationType)\n}", "title": "" }, { "docid": "1e7aef5a07ef15e65b8127401f7e94a0", "score": "0.5487531", "text": "func (wh *webhook) admitPods(ar v1beta1.AdmissionReview) *v1beta1.AdmissionResponse {\n\tklog.V(4).Infof(\"admitting pods\")\n\n\tpodResource := metav1.GroupVersionResource{Group: \"\", Version: \"v1\", Resource: \"pods\"}\n\tif ar.Request.Resource != podResource {\n\t\terr := fmt.Errorf(\"expect resource to be %s\", podResource)\n\t\tklog.Errorf(\"%v\", err)\n\t\treturn toAdmissionResponse(err)\n\t}\n\n\tversionCli, kubeCli, _, _, _ := client.NewCliOrDie()\n\n\tname := ar.Request.Name\n\tnamespace := ar.Request.Namespace\n\n\treviewResponse := v1beta1.AdmissionResponse{}\n\treviewResponse.Allowed = false\n\n\tif !wh.namespaces.Has(namespace) {\n\t\tklog.V(4).Infof(\"%q is not in our namespaces %v, skip\", namespace, wh.namespaces.List())\n\t\treviewResponse.Allowed = true\n\t\treturn &reviewResponse\n\t}\n\n\tpod, err := kubeCli.CoreV1().Pods(namespace).Get(name, metav1.GetOptions{})\n\tif err != nil {\n\t\tklog.Infof(\"api server send wrong pod info namespace %s name %s err %v\", namespace, name, err)\n\t\treturn &reviewResponse\n\t}\n\n\tklog.V(4).Infof(\"delete %s pod [%s]\", pod.Labels[label.ComponentLabelKey], pod.GetName())\n\n\ttc, err := versionCli.PingcapV1alpha1().TidbClusters(namespace).Get(pod.Labels[label.InstanceLabelKey], metav1.GetOptions{})\n\tif err != nil {\n\t\tklog.Infof(\"fail to fetch tidbcluster info namespace %s clustername(instance) %s err %v\", namespace, pod.Labels[label.InstanceLabelKey], err)\n\t\treturn &reviewResponse\n\t}\n\n\tvar pdClient pdapi.PDClient\n\tif tc.IsHeterogeneous() {\n\t\tpdClient = pdapi.NewDefaultPDControl(kubeCli).GetPDClient(pdapi.Namespace(tc.GetNamespace()), tc.Spec.Cluster.Name, tc.IsTLSClusterEnabled())\n\t} else {\n\t\tpdClient = pdapi.NewDefaultPDControl(kubeCli).GetPDClient(pdapi.Namespace(tc.GetNamespace()), tc.GetName(), tc.IsTLSClusterEnabled())\n\t}\n\n\t// if pod is already deleting, return Allowed\n\tif pod.DeletionTimestamp != nil {\n\t\tklog.V(4).Infof(\"pod:[%s/%s] status is timestamp %s\", namespace, name, pod.DeletionTimestamp)\n\t\treviewResponse.Allowed = true\n\t\treturn &reviewResponse\n\t}\n\n\tif pod.Labels[label.ComponentLabelKey] == \"pd\" {\n\n\t\tleader, err := pdClient.GetPDLeader()\n\t\tif err != nil {\n\t\t\tklog.Errorf(\"fail to get pd leader %v\", err)\n\t\t\treturn &reviewResponse\n\t\t}\n\n\t\tif leader.Name == name && tc.Status.PD.StatefulSet.Replicas > 1 {\n\t\t\ttime.Sleep(10 * time.Second)\n\t\t\terr := fmt.Errorf(\"pd is leader, can't be deleted namespace %s name %s\", namespace, name)\n\t\t\tklog.Error(err)\n\t\t\tsendErr := slack.SendErrMsg(err.Error())\n\t\t\tif sendErr != nil {\n\t\t\t\tklog.Error(sendErr)\n\t\t\t}\n\t\t\t// TODO use context instead\n\t\t\tos.Exit(3)\n\t\t}\n\t\tklog.Infof(\"savely delete pod namespace %s name %s leader name %s\", namespace, name, leader.Name)\n\t}\n\treviewResponse.Allowed = true\n\treturn &reviewResponse\n}", "title": "" }, { "docid": "d53ba804aa3cd8225b5086e231234ea2", "score": "0.5446044", "text": "func EndPointPermissions() string {\n\treturn `{\n\t\"permissions\": {\n\t\t\"jwt\": {\n\t\t\t\"default\": {\n\t\t\t\t\"method\": {\n\t\t\t\t\t\"GET\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/client/message\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/address\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/accounts\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/accounts/{account_name}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/assets\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/assets/accounts/{account_name}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/assets/issued\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/assets/participants/{participant_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/balances/accounts/{account_name}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/obligations\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/obligations/{asset_code}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/participants/whitelist\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/participants/{participant_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/payout\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/quotes\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/quotes/request/{request_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/quotes/{quote_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/transactions\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/fundings/instruction\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/fundings/send\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/assets/issued/{anchor_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/participants\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/participants/{participant_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/service_check\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/service_check\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/participants/whitelist/object\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/participants\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t},\n\t\t\t\t\t\"POST\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/client/token/refresh\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/accounts/{account_name}/{cursor}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/accounts/{account_name}/sweep\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/exchange\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/assets\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/fees/request/{participant_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/fees/response/{participant_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/participants\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/quotes\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/quotes/request\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/quotes/{quote_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/sign\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/transactions/reply\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/transactions/send\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/transactions/settle/do\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/fundings/instruction\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/fundings/send\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/trust\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/participants/whitelist\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/payload/sign\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/transactions/redeem\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/trust\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/trust/{anchor_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/assets/redeem\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t},\n\t\t\t\t\t\"PUT\": {\n\t\t\t\t\t\t\"endpoint\": null\n\t\t\t\t\t},\n\t\t\t\t\t\"DELETE\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/client/quotes\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/quotes/{quote_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/participants/whitelist\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"allow\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t},\n\t\t\"participant_permissions\": {\n\t\t\t\"default\": {\n\t\t\t\t\"method\": {\n\t\t\t\t\t\"GET\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/client/message\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/participants\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true,\n\t\t\t\t\t\t\t\t\t\"viewer\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/address\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/accounts\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/accounts/{account_name}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/assets\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/assets/accounts/{account_name}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/assets/issued\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/assets/participants/{participant_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/balances/accounts/{account_name}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/obligations\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/obligations/{asset_code}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/participants/whitelist\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/participants/{participant_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/transactions\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/service_check\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/participants/{participant_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/assets/issued/{anchor_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/service_check\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/participants/whitelist/object\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/participants\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t},\n\t\t\t\t\t\"POST\": {\n\t\t\t\t\t\t\"endpoint\": null\n\t\t\t\t\t},\n\t\t\t\t\t\"PUT\": {\n\t\t\t\t\t\t\"endpoint\": null\n\t\t\t\t\t},\n\t\t\t\t\t\"DELETE\": {\n\t\t\t\t\t\t\"endpoint\": null\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t},\n\t\t\t\"maker_checker\": {\n\t\t\t\t\"method\": {\n\t\t\t\t\t\"GET\": {\n\t\t\t\t\t\t\"endpoint\": null\n\t\t\t\t\t},\n\t\t\t\t\t\"POST\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/client/assets\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/fundings/instruction\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/fundings/send\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/anchor/trust/{anchor_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/trust\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/participants/whitelist\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/transactions/settle/da\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/client/accounts/{account_name}/sweep\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t},\n\t\t\t\t\t\"PUT\": {\n\t\t\t\t\t\t\"endpoint\": null\n\t\t\t\t\t},\n\t\t\t\t\t\"DELETE\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/client/participants/whitelist\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t},\n\t\t\"super_permissions\": {\n\t\t\t\"default\": {\n\t\t\t\t\"method\": {\n\t\t\t\t\t\"GET\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/admin/anchor/{anchor_domain}/onboard/assets\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/anchor/{anchor_domain}/register\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/anchor/assets/issued/{anchor_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/blocklist\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/pr\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/pr/domain/{participant_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/onboarding/accounts/{account_name}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/registry/participants\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/payout\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/service_check\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t},\n\t\t\t\t\t\"POST\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/admin/payout\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/payout/csv\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/pr\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t},\n\t\t\t\t\t\"PATCH\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/admin/payout\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t},\n\t\t\t\t\t\"PUT\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/admin/pr/{participant_id}/status\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/pr/{participant_id}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t},\n\t\t\t\t\t\"DELETE\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/admin/payout\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t},\n\t\t\t\"maker_checker\": {\n\t\t\t\t\"method\": {\n\t\t\t\t\t\"GET\": {\n\t\t\t\t\t\t\"endpoint\": null\n\t\t\t\t\t},\n\t\t\t\t\t\"POST\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/admin/anchor/{anchor_domain}/onboard/assets\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/anchor/{anchor_domain}/register\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/onboarding/accounts/{account_name}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/accounts/{account_name}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/deploy/participant\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/blocklist\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/suspend/{participant_id}/{account_name}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/reactivate/{participant_id}/{account_name}\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"/v1/admin/transaction\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t},\n\t\t\t\t\t\"PUT\": {\n\t\t\t\t\t\t\"endpoint\": null\n\t\t\t\t\t},\n\t\t\t\t\t\"DELETE\": {\n\t\t\t\t\t\t\"endpoint\": {\n\t\t\t\t\t\t\t\"/v1/admin/blocklist\": {\n\t\t\t\t\t\t\t\t\"role\": {\n\t\t\t\t\t\t\t\t\t\"admin\": true,\n\t\t\t\t\t\t\t\t\t\"manager\": true\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}`\n\n}", "title": "" }, { "docid": "a5350a1beb535b177d6838b6502f0a9c", "score": "0.537357", "text": "func KubeGetDeployments(filter string) (map[string]interface{}, error) {\n\tresources := map[string]interface{}{}\n\t// creates the in-cluster config\n\tcurrconfig, err := rest.InClusterConfig()\n\tif err != nil {\n\t\tcommon.LogError.Println(err.Error())\n\t\treturn resources, err\n\t}\n\tclientset, err := kubernetes.NewForConfig(currconfig)\n\tif err != nil {\n\t\tcommon.LogError.Println(\"Error getting clientset of kubernetes\")\n\t\treturn resources, err\n\t}\n\tdeploymentsClient := clientset.AppsV1beta1().Deployments(apiv1.NamespaceDefault)\n\n\tlist, err := deploymentsClient.List(metav1.ListOptions{})\n\tif err != nil {\n\t\tcommon.LogError.Println(err.Error())\n\t\treturn resources, err\n\t}\n\tresourceName := filter\n\tcommon.LogInfo.Println(\"Resource name \", resourceName)\n\tname := \"default\"\n\t//isFirst := true\n\tfor _, d := range list.Items {\n\t\t// If resource matches our filter == 0 Insures we match from the beggining of string\n\t\tif strings.Index(d.Name, resourceName) == 0 {\n\t\t\tpodout := map[string]interface{}{}\n\n\t\t\tpodout[\"name\"] = d.Name\n\t\t\tpodout[\"replicas\"] = d.Spec.Replicas\n\n\t\t\t//set := labels.Set(d.Spec.Selector)\n\t\t\tselector, err := metav1.LabelSelectorAsSelector(d.Spec.Selector)\n\t\t\tif err != nil {\n\t\t\t\treturn resources, fmt.Errorf(\"invalid label selector: %v\", err)\n\t\t\t}\n\n\t\t\t//if pods, err := clientset.Core().Pods(name).List(metav1.ListOptions{LabelSelector: set.AsSelector()}); err != nil {\n\t\t\tif pods, err := clientset.Core().Pods(name).List(metav1.ListOptions{LabelSelector: selector.String()}); err != nil {\n\t\t\t\t//common.LogError.Printf(\"List Pods of service[%s] error:%v\", service.GetName(), err)\n\t\t\t\tcommon.LogError.Printf(\"Errog getting Pods of deployment [%v] error:%v\", d.Name, err)\n\t\t\t} else {\n\t\t\t\tpodList := map[string]interface{}{}\n\t\t\t\tfor _, v := range pods.Items {\n\t\t\t\t\tpod := map[string]interface{}{}\n\t\t\t\t\tpod[\"name\"] = v.GetName()\n\t\t\t\t\tpod[\"node\"] = v.Spec.NodeName\n\t\t\t\t\tpod[\"container\"] = map[string]interface{}{\n\t\t\t\t\t\t\"name\": v.Spec.Containers[0].Name,\n\t\t\t\t\t\t\"image\": v.Spec.Containers[0].Image,\n\t\t\t\t\t}\n\n\t\t\t\t\tpodList[v.GetName()] = pod\n\n\t\t\t\t\tcommon.LogInfo.Printf(\"POD : %v\\nNode: %v\\nContainer Name: %v\\nImage :%v\\n\",\n\t\t\t\t\t\tv.GetName(), v.Spec.NodeName, v.Spec.Containers[0].Name,\n\t\t\t\t\t\tv.Spec.Containers[0].Image)\n\t\t\t\t}\n\t\t\t\tpodout[\"pods\"] = podList\n\t\t\t}\n\t\t\tresources[d.Name] = podout\n\n\t\t}\n\t}\n\treturn resources, nil\n}", "title": "" }, { "docid": "955de390acbe4f1086951581aae05d99", "score": "0.5318829", "text": "func rbac(scheme *runtime.Scheme) mf.Transformer {\n\treturn func(u *unstructured.Unstructured) *unstructured.Unstructured {\n\t\tif u.GetKind() == \"ClusterRole\" && u.GetName() == \"knative-serving-core\" {\n\t\t\trole := &rbacv1.ClusterRole{}\n\t\t\tscheme.Convert(u, role, nil) // check for err?\n\t\tOUT:\n\t\t\tfor i, rule := range role.Rules {\n\t\t\t\tfor _, group := range rule.APIGroups {\n\t\t\t\t\tif group == \"apps\" {\n\t\t\t\t\t\tresource := \"deployments/finalizers\"\n\t\t\t\t\t\tlog.Info(\"Adding RBAC\", \"group\", group, \"resource\", resource)\n\t\t\t\t\t\trole.Rules[i].Resources = append(rule.Resources, resource)\n\t\t\t\t\t\tbreak OUT\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\t// Required to open privileged ports in OpenShift\n\t\t\trule := rbacv1.PolicyRule{\n\t\t\t\tVerbs: []string{\"use\"},\n\t\t\t\tAPIGroups: []string{\"security.openshift.io\"},\n\t\t\t\tResources: []string{\"securitycontextconstraints\"},\n\t\t\t\tResourceNames: []string{\"privileged\", \"anyuid\"},\n\t\t\t}\n\t\t\tlog.Info(\"Adding RBAC\", \"rule\", rule)\n\t\t\trole.Rules = append(role.Rules, rule)\n\t\t\tscheme.Convert(role, u, nil)\n\t\t}\n\t\treturn u\n\t}\n}", "title": "" }, { "docid": "9dca95c0906d71ed98db219f883323b6", "score": "0.53137666", "text": "func ClusterRoleReconciler() reconciling.NamedClusterRoleReconcilerFactory {\n\treturn func() (string, reconciling.ClusterRoleReconciler) {\n\t\treturn roleName, func(r *rbacv1.ClusterRole) (*rbacv1.ClusterRole, error) {\n\t\t\tr.Labels = map[string]string{\"gatekeeper.sh/system\": \"yes\"}\n\t\t\tr.Rules = []rbacv1.PolicyRule{\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"\"},\n\t\t\t\t\tResources: []string{\"events\"},\n\t\t\t\t\tVerbs: []string{\"create\", \"patch\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"*\"},\n\t\t\t\t\tResources: []string{\"*\"},\n\t\t\t\t\tVerbs: []string{\"get\", \"list\", \"watch\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"admissionregistration.k8s.io\"},\n\t\t\t\t\tResourceNames: []string{\"gatekeeper-mutating-webhook-configuration\"},\n\t\t\t\t\tResources: []string{\"mutatingwebhookconfigurations\"},\n\t\t\t\t\tVerbs: []string{\"get\", \"list\", \"patch\", \"update\", \"watch\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"apiextensions.k8s.io\"},\n\t\t\t\t\tResources: []string{\"customresourcedefinitions\"},\n\t\t\t\t\tVerbs: []string{\"create\", \"delete\", \"get\", \"list\", \"patch\", \"update\", \"watch\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"config.gatekeeper.sh\"},\n\t\t\t\t\tResources: []string{\"configs\"},\n\t\t\t\t\tVerbs: []string{\"create\", \"delete\", \"get\", \"list\", \"patch\", \"update\", \"watch\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"config.gatekeeper.sh\"},\n\t\t\t\t\tResources: []string{\"configs/status\"},\n\t\t\t\t\tVerbs: []string{\"get\", \"patch\", \"update\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"constraints.gatekeeper.sh\"},\n\t\t\t\t\tResources: []string{\"*\"},\n\t\t\t\t\tVerbs: []string{\"create\", \"delete\", \"get\", \"list\", \"patch\", \"update\", \"watch\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"externaldata.gatekeeper.sh\"},\n\t\t\t\t\tResources: []string{\"providers\"},\n\t\t\t\t\tVerbs: []string{\"create\", \"delete\", \"get\", \"list\", \"patch\", \"update\", \"watch\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"mutations.gatekeeper.sh\"},\n\t\t\t\t\tResources: []string{\"*\"},\n\t\t\t\t\tVerbs: []string{\"create\", \"delete\", \"get\", \"list\", \"patch\", \"update\", \"watch\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"status.gatekeeper.sh\"},\n\t\t\t\t\tResources: []string{\"*\"},\n\t\t\t\t\tVerbs: []string{\"create\", \"delete\", \"get\", \"list\", \"patch\", \"update\", \"watch\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"templates.gatekeeper.sh\"},\n\t\t\t\t\tResources: []string{\"constrainttemplates\"},\n\t\t\t\t\tVerbs: []string{\"create\", \"delete\", \"get\", \"list\", \"patch\", \"update\", \"watch\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"templates.gatekeeper.sh\"},\n\t\t\t\t\tResources: []string{\"constrainttemplates/finalize,rs\"},\n\t\t\t\t\tVerbs: []string{\"delete\", \"get\", \"patch\", \"update\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"templates.gatekeeper.sh\"},\n\t\t\t\t\tResources: []string{\"constrainttemplates,/status\"},\n\t\t\t\t\tVerbs: []string{\"get\", \"patch\", \"update\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"admissionregistration.k8s.io\"},\n\t\t\t\t\tResourceNames: []string{\"gatekeeper-validating-webhook-configuration\"},\n\t\t\t\t\tResources: []string{\"validatingwebhookconfigurations\"},\n\t\t\t\t\tVerbs: []string{\"create\", \"delete\", \"get\", \"list\", \"patch\", \"update\", \"watch\"},\n\t\t\t\t},\n\t\t\t}\n\t\t\treturn r, nil\n\t\t}\n\t}\n}", "title": "" }, { "docid": "59c5e60c24a7ab71a463ea1dc17ef84b", "score": "0.5313537", "text": "func (s *Deployment) createClusterRoleForAPIManager() error {\n\trules := []rbacv1.PolicyRule{\n\t\t{\n\t\t\tAPIGroups: []string{\"\"},\n\t\t\tResources: []string{\n\t\t\t\t\"endpoints\",\n\t\t\t\t\"services\",\n\t\t\t\t\"configmaps\",\n\t\t\t},\n\t\t\tVerbs: []string{\"create\", \"delete\", \"get\", \"list\", \"patch\", \"update\", \"watch\"},\n\t\t},\n\t\t{\n\t\t\tAPIGroups: []string{\"\"},\n\t\t\tResources: []string{\n\t\t\t\t\"endpoints/status\",\n\t\t\t\t\"services/status\",\n\t\t\t\t\"configmaps/status\",\n\t\t\t},\n\t\t\tVerbs: []string{\"get\", \"patch\", \"update\"},\n\t\t},\n\t\t{\n\t\t\tAPIGroups: []string{\"\"},\n\t\t\tResources: []string{\n\t\t\t\t\"namespaces\",\n\t\t\t\t\"nodes\",\n\t\t\t\t\"persistentvolumeclaims\",\n\t\t\t},\n\t\t\tVerbs: []string{\"get\", \"list\", \"watch\"},\n\t\t},\n\t\t{\n\t\t\tAPIGroups: []string{\"\"},\n\t\t\tResources: []string{\"pods\"},\n\t\t\tVerbs: []string{\"get\", \"list\", \"watch\", \"delete\"},\n\t\t},\n\t\t{\n\t\t\tAPIGroups: []string{\"\"},\n\t\t\tResources: []string{\"events\"},\n\t\t\tVerbs: []string{\"create\", \"patch\"},\n\t\t},\n\t\t{\n\t\t\tAPIGroups: []string{\"coordination.k8s.io\"},\n\t\t\tResources: []string{\"leases\"},\n\t\t\tVerbs: []string{\"get\", \"create\", \"update\"},\n\t\t},\n\t\t{\n\t\t\tAPIGroups: []string{\"storage.k8s.io\"},\n\t\t\tResources: []string{\"volumeattachments\"},\n\t\t\tVerbs: []string{\"get\", \"list\", \"watch\", \"update\", \"patch\", \"delete\"},\n\t\t},\n\t\t{\n\t\t\tAPIGroups: []string{\"storage.k8s.io\"},\n\t\t\tResources: []string{\"storageclasses\"},\n\t\t\tVerbs: []string{\"get\", \"list\", \"watch\"},\n\t\t},\n\t\t{\n\t\t\tAPIGroups: []string{\"admissionregistration.k8s.io\"},\n\t\t\tResources: []string{\"mutatingwebhookconfigurations\"},\n\t\t\tVerbs: []string{\"get\", \"list\", \"watch\", \"update\", \"patch\", \"delete\"},\n\t\t},\n\t}\n\treturn s.k8sResourceManager.ClusterRole(APIManagerClusterRoleName, nil, rules).Create()\n}", "title": "" }, { "docid": "116491a8f2b2b061e27c3cb35c52272e", "score": "0.52833015", "text": "func updateRoles() {\n\tservice := getService(configFilePath, googleAdminEmail)\n\tfor _, element := range namespaceGroupList {\n\t\telementArray := strings.Split(element, \":\")\n\t\tnamespace, email := elementArray[0], elementArray[1]\n\n\t\tif namespace == \"\" || email == \"\" {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"namespace\": namespace,\n\t\t\t\t\"email\": email,\n\t\t\t}).Error(\"Could not update group. Namespace or/and email are empty.\")\n\t\t\treturn\n\t\t}\n\n\t\tresult, error := getMembers(service, email)\n\t\tif error != nil {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"error\": error,\n\t\t\t}).Error(\"Unable to get members.\")\n\t\t\treturn\n\t\t}\n\n\t\tvar kubeClusterConfig *rest.Config\n\t\tif kubeConfig != \"\" {\n\t\t\toutOfClusterConfig, err := clientcmd.BuildConfigFromFlags(\"\", kubeConfig)\n\t\t\tif err != nil {\n\t\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\t\"error\": err,\n\t\t\t\t}).Error(\"Unable to get kube config.\")\n\t\t\t\treturn\n\t\t\t}\n\t\t\tkubeClusterConfig = outOfClusterConfig\n\t\t} else {\n\t\t\tinClusterConfig, err := rest.InClusterConfig()\n\t\t\tif err != nil {\n\t\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\t\"error\": err,\n\t\t\t\t}).Error(\"Unable to get in cluster kube config.\")\n\t\t\t}\n\t\t\tkubeClusterConfig = inClusterConfig\n\t\t}\n\t\tclientset, err := kubernetes.NewForConfig(kubeClusterConfig)\n\t\tif err != nil {\n\t\t\tpromErrors.WithLabelValues(\"get-kube-client\").Inc()\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"error\": err,\n\t\t\t}).Error(\"Unable to get in kube client.\")\n\t\t\treturn\n\t\t}\n\n\t\tvar subjects []rbacv1beta1.Subject\n\t\tfor _, member := range uniq(result) {\n\t\t\tsubjects = append(subjects, rbacv1beta1.Subject{\n\t\t\t\tKind: \"User\",\n\t\t\t\tAPIGroup: \"rbac.authorization.k8s.io\",\n\t\t\t\tName: member.Email,\n\t\t\t})\n\t\t}\n\t\troleBinding := &rbacv1beta1.RoleBinding{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: roleBindingName,\n\t\t\t\tNamespace: namespace,\n\t\t\t\tAnnotations: map[string]string{\n\t\t\t\t\t\"lastSync\": time.Now().UTC().Format(time.RFC3339),\n\t\t\t\t},\n\t\t\t},\n\t\t\tRoleRef: rbacv1beta1.RoleRef{\n\t\t\t\tKind: \"ClusterRole\",\n\t\t\t\tAPIGroup: \"rbac.authorization.k8s.io\",\n\t\t\t\tName: clusterRoleName,\n\t\t\t},\n\t\t\tSubjects: subjects,\n\t\t}\n\n\t\troleClient := clientset.RbacV1beta1().RoleBindings(namespace)\n\t\tupdateResult, updateError := roleClient.Update(roleBinding)\n\t\tif updateError != nil {\n\t\t\tpromErrors.WithLabelValues(\"role-update\").Inc()\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"rolebinding\": roleBindingName,\n\t\t\t\t\"error\": updateError,\n\t\t\t}).Error(\"Unable to update rolebinding.\")\n\t\t\treturn\n\t\t}\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"rolebinding\": updateResult.GetObjectMeta().GetName(),\n\t\t\t\"namespace\": namespace,\n\t\t}).Info(\"Updated rolebinding.\")\n\t\tpromSuccess.WithLabelValues(\"role-update\").Inc()\n\t}\n}", "title": "" }, { "docid": "c1d4d299a09a10202267bdd5455423b1", "score": "0.52604455", "text": "func add(mgr manager.Manager, r reconcile.Reconciler) error {\n\t// Create a new controller\n\tc, err := controller.New(\"kafkacluster-controller\", mgr, controller.Options{Reconciler: r})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Watch for changes to KafkaCluster\n\terr = c.Watch(&source.Kind{Type: &banzaicloudv1alpha1.KafkaCluster{TypeMeta: metav1.TypeMeta{Kind: \"KafkaCluster\", APIVersion: \"banzaicloud.banzaicloud.io/v1alpha1\"}}}, &handler.EnqueueRequestForObject{})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Initialize owner matcher\n\townerMatcher := k8sutil.NewOwnerReferenceMatcher(&banzaicloudv1alpha1.KafkaCluster{TypeMeta: metav1.TypeMeta{Kind: \"KafkaCluster\", APIVersion: \"banzaicloud.banzaicloud.io/v1alpha1\"}}, true, mgr.GetScheme())\n\n\t// Watch for changes to resources managed by the operator\n\tfor _, t := range []runtime.Object{\n\t\t&corev1.Pod{TypeMeta: metav1.TypeMeta{Kind: \"Pod\", APIVersion: \"v1\"}},\n\t\t&corev1.ConfigMap{TypeMeta: metav1.TypeMeta{Kind: \"ConfigMap\", APIVersion: \"v1\"}},\n\t\t&corev1.PersistentVolumeClaim{TypeMeta: metav1.TypeMeta{Kind: \"PersistentVolumeClaim\", APIVersion: \"v1\"}},\n\t} {\n\t\terr = c.Watch(&source.Kind{Type: t}, &handler.EnqueueRequestForOwner{\n\t\t\tIsController: true,\n\t\t\tOwnerType: &banzaicloudv1alpha1.KafkaCluster{},\n\t\t}, predicate.Funcs{\n\t\t\tCreateFunc: func(e event.CreateEvent) bool {\n\t\t\t\treturn false\n\t\t\t},\n\t\t\tDeleteFunc: func(e event.DeleteEvent) bool {\n\t\t\t\trelated, object, err := ownerMatcher.Match(e.Object)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Error(err, \"could not determine relation\", \"kind\", e.Object.GetObjectKind())\n\t\t\t\t}\n\t\t\t\tif related {\n\t\t\t\t\tlog.Info(\"related object deleted\", \"trigger\", object.GetName())\n\t\t\t\t}\n\t\t\t\treturn true\n\t\t\t},\n\t\t\tUpdateFunc: func(e event.UpdateEvent) bool {\n\t\t\t\trelated, object, err := ownerMatcher.Match(e.ObjectNew)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Error(err, \"could not determine relation\", \"kind\", e.ObjectNew.GetObjectKind())\n\t\t\t\t}\n\t\t\t\tif related {\n\t\t\t\t\tlog.Info(\"related object changed\", \"trigger\", object.GetName())\n\t\t\t\t}\n\t\t\t\tpatchResult, err := patch.DefaultPatchMaker.Calculate(e.ObjectOld, e.ObjectNew)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Error(err, \"could not match objects\", \"kind\", e.ObjectOld.GetObjectKind())\n\t\t\t\t} else if patchResult.IsEmpty() {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t\treturn true\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "70b7020d31f8ee8adff45450fe647563", "score": "0.52209896", "text": "func main() {\n\t// var ns string\n\t// flag.StringVar(&ns, \"namespace\", \"\", \"namespace\")\n\n\t// hardcode the namespace / project for testing\n\tns := \"test\"\n\n\t// Bootstrap k8s configuration from local \tKubernetes config file\n\tkubeconfig := filepath.Join(os.Getenv(\"HOME\"), \".kube\", \"config\")\n\tlog.Println(\"Using kubeconfig file: \", kubeconfig)\n\tconfig, err := clientcmd.BuildConfigFromFlags(\"\", kubeconfig)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t// Create an rest client not targeting specific API version\n\tclientset, err := kubernetes.NewForConfig(config)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tpods, err := clientset.CoreV1().Pods(ns).List(metav1.ListOptions{})\n\tif err != nil {\n\t\tlog.Fatalln(\"failed to get pods:\", err)\n\t}\n\n\tservices, err := clientset.CoreV1().Services(ns).List(metav1.ListOptions{})\n\tif err != nil {\n\t\tlog.Fatalln(\"failed to get services:\", err)\n\t}\n\n\t// print pods\n\tfmt.Println(\"List of pods:\")\n\tfor i, pod := range pods.Items {\n\t\t// fmt.Printf(\"[%d] %s\\n\", i, pod.GetName()+pod.GetLabels())\n\t\tfmt.Println(i, pod.GetName(), pod.GetLabels())\n\t}\n\tfmt.Print(\"\\n\")\n\n\t// print services\n\tfmt.Println(\"List of services:\")\n\tfor i, svc := range services.Items {\n\t\tfmt.Println(i, svc.GetName(), svc.GetLabels())\n\t}\n}", "title": "" }, { "docid": "1e5c7e81c43604806a2a8d7a3ac876de", "score": "0.5218604", "text": "func KubeDNSNetworkPolicyReconciler(k8sApiIP string, k8sApiPort int, k8sServiceApi string) reconciling.NamedNetworkPolicyReconcilerFactory {\n\treturn func() (string, reconciling.NetworkPolicyReconciler) {\n\t\tdnsPort := intstr.FromInt(53)\n\t\tapiServicePort := intstr.FromInt(443)\n\t\tapiPort := intstr.FromInt(k8sApiPort)\n\t\tmetricsPort := intstr.FromInt(9153)\n\t\tprotoUdp := corev1.ProtocolUDP\n\t\tprotoTcp := corev1.ProtocolTCP\n\n\t\treturn \"kube-dns\", func(np *networkingv1.NetworkPolicy) (*networkingv1.NetworkPolicy, error) {\n\t\t\tnp.Spec = networkingv1.NetworkPolicySpec{\n\t\t\t\tPodSelector: metav1.LabelSelector{\n\t\t\t\t\tMatchLabels: map[string]string{common.NameLabel: \"kube-dns\"},\n\t\t\t\t},\n\n\t\t\t\tPolicyTypes: []networkingv1.PolicyType{\n\t\t\t\t\tnetworkingv1.PolicyTypeEgress,\n\t\t\t\t\tnetworkingv1.PolicyTypeIngress,\n\t\t\t\t},\n\t\t\t\tIngress: []networkingv1.NetworkPolicyIngressRule{\n\t\t\t\t\t{\n\t\t\t\t\t\tFrom: []networkingv1.NetworkPolicyPeer{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tNamespaceSelector: &metav1.LabelSelector{},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\tPorts: []networkingv1.NetworkPolicyPort{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tProtocol: &protoTcp,\n\t\t\t\t\t\t\t\tPort: &dnsPort,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tProtocol: &protoUdp,\n\t\t\t\t\t\t\t\tPort: &dnsPort,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t{\n\t\t\t\t\t\tFrom: []networkingv1.NetworkPolicyPeer{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tIPBlock: &networkingv1.IPBlock{\n\t\t\t\t\t\t\t\t\tCIDR: \"0.0.0.0/0\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\tPorts: []networkingv1.NetworkPolicyPort{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tProtocol: &protoTcp,\n\t\t\t\t\t\t\t\tPort: &dnsPort,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tProtocol: &protoUdp,\n\t\t\t\t\t\t\t\tPort: &dnsPort,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t{\n\t\t\t\t\t\tFrom: []networkingv1.NetworkPolicyPeer{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tNamespaceSelector: &metav1.LabelSelector{\n\t\t\t\t\t\t\t\t\tMatchLabels: map[string]string{common.ComponentLabel: resources.MLAComponentName},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\tPodSelector: &metav1.LabelSelector{\n\t\t\t\t\t\t\t\t\tMatchLabels: map[string]string{common.ComponentLabel: resources.MLAComponentName},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\tPorts: []networkingv1.NetworkPolicyPort{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tProtocol: &protoTcp,\n\t\t\t\t\t\t\t\tPort: &metricsPort,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t// api access\n\t\t\t\tEgress: []networkingv1.NetworkPolicyEgressRule{\n\t\t\t\t\t{\n\t\t\t\t\t\tTo: []networkingv1.NetworkPolicyPeer{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tIPBlock: &networkingv1.IPBlock{\n\t\t\t\t\t\t\t\t\tCIDR: fmt.Sprintf(\"%s/32\", k8sApiIP),\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\tPorts: []networkingv1.NetworkPolicyPort{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tProtocol: &protoTcp,\n\t\t\t\t\t\t\t\tPort: &apiPort,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t{\n\t\t\t\t\t\tTo: []networkingv1.NetworkPolicyPeer{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tIPBlock: &networkingv1.IPBlock{\n\t\t\t\t\t\t\t\t\tCIDR: fmt.Sprintf(\"%s/32\", k8sServiceApi),\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\tPorts: []networkingv1.NetworkPolicyPort{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tProtocol: &protoTcp,\n\t\t\t\t\t\t\t\tPort: &apiServicePort,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t// world dns access\n\t\t\t\t\t{\n\t\t\t\t\t\tTo: []networkingv1.NetworkPolicyPeer{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tIPBlock: &networkingv1.IPBlock{\n\t\t\t\t\t\t\t\t\tCIDR: \"0.0.0.0/0\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\tPorts: []networkingv1.NetworkPolicyPort{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tProtocol: &protoTcp,\n\t\t\t\t\t\t\t\tPort: &dnsPort,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tProtocol: &protoUdp,\n\t\t\t\t\t\t\t\tPort: &dnsPort,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t}\n\t\t\treturn np, nil\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f8be57cb1f78da01d8a624e5df1ea527", "score": "0.5182593", "text": "func pods(ns string) ([]string, error) {\n\targs := []string{\"get\", \"pods\", \"-n\", ns}\n\tout, err := exe(\"kubectl\", args...)\n\treturn out, err\n}", "title": "" }, { "docid": "7520fdd3e8a0246f9683921f010cbce1", "score": "0.5151752", "text": "func Kubernetes() *cobra.Command {\n\tkubernetesCmd := &cobra.Command{\n\t\tUse: \"kubernetes\",\n\t\tAliases: []string{\"k\"},\n\t\tShort: \"kubernetes is used to access kubernetes commands\",\n\t\tLong: kubernetesLong,\n\t\tExample: kubernetesExample,\n\t}\n\n\tkubernetesCmd.AddCommand(k8Create, k8Get, k8List, k8GetConfig, k8Update, k8Delete, k8DeleteWithResources, k8GetVersions)\n\tk8Create.Flags().StringP(\"label\", \"l\", \"\", \"label for your kubernetes cluster\")\n\tk8Create.Flags().StringP(\"region\", \"r\", \"\", \"region you want your kubernetes cluster to be located in\")\n\tk8Create.Flags().StringP(\"version\", \"v\", \"\", \"the kubernetes version you want for your cluster\")\n\tk8Create.Flags().StringArrayP(\"node-pools\", \"n\", []string{}, \"a comma-separated, key-value pair list of node pools. At least one node pool is required. At least one node is required in node pool. Use / between each new node pool. E.g: `plan:vhf-8c-32gb,label:mynodepool,tag:my-tag,quantity:3/plan:vhf-8c-32gb,label:mynodepool2,quantity:3`\")\n\n\tif err := k8Create.MarkFlagRequired(\"label\"); err != nil {\n\t\tfmt.Printf(\"error marking kubernetes create 'label' flag required: %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n\tif err := k8Create.MarkFlagRequired(\"region\"); err != nil {\n\t\tfmt.Printf(\"error marking kubernetes create 'region' flag required: %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n\tif err := k8Create.MarkFlagRequired(\"version\"); err != nil {\n\t\tfmt.Printf(\"error marking kubernetes create 'version' flag required: %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n\tif err := k8Create.MarkFlagRequired(\"node-pools\"); err != nil {\n\t\tfmt.Printf(\"error marking kubernetes create 'ns-primary' flag required: %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n\n\tk8List.Flags().StringP(\"cursor\", \"c\", \"\", \"(optional) cursor for paging.\")\n\tk8List.Flags().IntP(\"per-page\", \"p\", 100, \"(optional) Number of items requested per page. Default is 100 and Max is 500.\")\n\n\tk8Update.Flags().StringP(\"label\", \"l\", \"\", \"label for your kubernetes cluster\")\n\tif err := k8Update.MarkFlagRequired(\"label\"); err != nil {\n\t\tfmt.Printf(\"error marking kubernetes update 'label' flag required: %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n\n\t// Sub command for upgrade functions\n\tk8UpgradeCmd := &cobra.Command{\n\t\tUse: \"upgrades\",\n\t\tAliases: []string{\"upgrade\", \"e\"},\n\t\tShort: `upgrade commands for kubernetes version upgrades`,\n\t\tLong: upgradesLong,\n\t\tExample: upgradesExample,\n\t}\n\n\tk8UpgradeCmd.AddCommand(k8Upgrade, k8GetUpgrades)\n\tk8Upgrade.Flags().StringP(\"version\", \"v\", \"\", \"the version to upgrade the cluster to\")\n\tif err := k8Upgrade.MarkFlagRequired(\"version\"); err != nil {\n\t\tfmt.Printf(\"error marking kubernetes upgrade 'version' flag required: %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n\tkubernetesCmd.AddCommand(k8UpgradeCmd)\n\n\t// Node Pools SubCommands\n\tnodepoolsCmd := &cobra.Command{\n\t\tUse: \"node-pool\",\n\t\tAliases: []string{\"n\"},\n\t\tShort: \"node pools commands for a kubernetes cluster\",\n\t\tLong: nodepoolLong,\n\t\tExample: nodepoolExample,\n\t}\n\n\t// Node Pools\n\tnpCreate.Flags().StringP(\"label\", \"l\", \"\", \"label you want for your node pool.\")\n\tnpCreate.Flags().StringP(\"tag\", \"t\", \"\", \"tag you want for your node pool.\")\n\tnpCreate.Flags().StringP(\"plan\", \"p\", \"\", \"the plan you want for your node pool.\")\n\tnpCreate.Flags().IntP(\"quantity\", \"q\", 1, \"Number of nodes in your node pool. Note that at least one node is required for a node pool.\")\n\tnpCreate.Flags().BoolP(\"auto-scaler\", \"\", false, \"Enable the auto scaler with your cluster\")\n\tnpCreate.Flags().IntP(\"min-nodes\", \"\", 1, \"Minimum nodes for auto scaler\")\n\tnpCreate.Flags().IntP(\"max-nodes\", \"\", 1, \"Maximum nodes for auto scaler\")\n\n\tif err := npCreate.MarkFlagRequired(\"label\"); err != nil {\n\t\tfmt.Printf(\"error marking kubernetes node-pool create 'label' flag required: %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n\tif err := npCreate.MarkFlagRequired(\"quantity\"); err != nil {\n\t\tfmt.Printf(\"error marking kubernetes node-pool create 'quantity' flag required: %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n\tif err := npCreate.MarkFlagRequired(\"plan\"); err != nil {\n\t\tfmt.Printf(\"error marking kubernetes node-pool create 'plan' flag required: %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n\n\tnpList.Flags().StringP(\"cursor\", \"c\", \"\", \"(optional) cursor for paging.\")\n\tnpList.Flags().IntP(\"per-page\", \"p\", 100, \"(optional) Number of items requested per page. Default is 100 and Max is 500.\")\n\n\tnpUpdate.Flags().IntP(\"quantity\", \"q\", 1, \"Number of nodes in your node pool. Note that at least one node is required for a node pool.\")\n\tnpUpdate.Flags().StringP(\"tag\", \"t\", \"\", \"tag you want for your node pool.\")\n\tnpUpdate.Flags().BoolP(\"auto-scaler\", \"\", false, \"Enable the auto scaler with your cluster\")\n\tnpUpdate.Flags().IntP(\"min-nodes\", \"\", 1, \"Minimum nodes for auto scaler\")\n\tnpUpdate.Flags().IntP(\"max-nodes\", \"\", 1, \"Maximum nodes for auto scaler\")\n\n\t// Node Instance SubCommands\n\tnodeCmd := &cobra.Command{\n\t\tUse: \"node\",\n\t\tShort: \"delete/recycle instances in a cluster's node pool\",\n\t\tLong: nodepoolInstanceLong,\n\t\tExample: nodepoolInstanceExample,\n\t}\n\n\tnodeCmd.AddCommand(npInstanceDelete, npInstanceRecycle)\n\tnodepoolsCmd.AddCommand(nodeCmd, npCreate, npGet, npList, npDelete, npUpdate)\n\tkubernetesCmd.AddCommand(nodepoolsCmd)\n\n\treturn kubernetesCmd\n}", "title": "" }, { "docid": "e78421a295ff44104dc23dbc4bb336af", "score": "0.51103675", "text": "func main() {\n\t// Parse kubeconfig\n\tvar kubeConfigPath string\n\tpflag.CommandLine.StringVar(&kubeConfigPath, \"kubeconfig\", kubeConfigPath, \"Path to kubeconfig file.\")\n\tpflag.Parse()\n\tkubeConfig, err := clientcmd.BuildConfigFromFlags(\"\", kubeConfigPath)\n\tif err != nil {\n\t\tpanic(fmt.Errorf(\"fatal error: failed to get kubeconfig: %v\", err))\n\t}\n\n\t// Create a demo namespace\n\tif err = createDemoNamespace(kubeConfig); err != nil {\n\t\tpanic(fmt.Errorf(\"failed to create a demo namespace: %v\", err))\n\t}\n\n\t// Instantiate a default probe manager using k8s secrets to store and track target info and\n\tprobeManager, err := manager.DefaultProbeManagerForConfig(kubeConfig, demoNs)\n\tif err != nil {\n\t\tpanic(fmt.Errorf(\"failed to instantiate a probe manager: %v\", err))\n\t}\n\n\t// Add a few targets, 3 vCenter targets, 1 Pure Storage target, 1 AppDynamics target\n\tvcTarget1 := target_registrar.UserPassTarget{Id: \"moid1\", Probetype: \"vcenter\", Username: \"testuser1\", Password: \"testpass1\"}\n\tif err = probeManager.AddOrUpdateTarget(vcTarget1); err != nil {\n\t\tpanic(fmt.Errorf(\"failed to add target %v\\n%v\", vcTarget1, err))\n\t}\n\tvcTarget2 := target_registrar.UserPassTarget{Id: \"moid2\", Probetype: \"vcenter\", Username: \"testuser2\", Password: \"testpass2\"}\n\tif err = probeManager.AddOrUpdateTarget(vcTarget2); err != nil {\n\t\tpanic(fmt.Errorf(\"failed to add target %v\\n%v\", vcTarget2, err))\n\t}\n\tvcTarget3 := target_registrar.UserPassTarget{Id: \"moid3\", Probetype: \"vcenter\", Username: \"testuser3\", Password: \"testpass3\"}\n\tif err = probeManager.AddOrUpdateTarget(vcTarget3); err != nil {\n\t\tpanic(fmt.Errorf(\"failed to add target %v\\n%v\", vcTarget3, err))\n\t}\n\tpureTarget := target_registrar.UserPassTarget{Id: \"moid4\", Probetype: \"pure\", Username: \"testuser4\", Password: \"testpass4\"}\n\tif err = probeManager.AddOrUpdateTarget(pureTarget); err != nil {\n\t\tpanic(fmt.Errorf(\"failed to add target %v\\n%v\", pureTarget, err))\n\t}\n\tappdTarget := target_registrar.UserPassTarget{Id: \"moid5\", Probetype: \"appdynamics\", Username: \"testuser5\", Password: \"testpass5\"}\n\tif err = probeManager.AddOrUpdateTarget(appdTarget); err != nil {\n\t\tpanic(fmt.Errorf(\"failed to add target %v\\n%v\", appdTarget, err))\n\t}\n\t// Update the first vCenter target with a different password\n\tvcTarget1update := target_registrar.UserPassTarget{Id: \"moid1\", Probetype: \"vcenter\", Username: \"testuser1\", Password: \"testpass9\"}\n\tif err = probeManager.AddOrUpdateTarget(vcTarget1update); err != nil {\n\t\tpanic(fmt.Errorf(\"failed to update target %v\\n%v\", vcTarget1update, err))\n\t}\n\t// Delete the second vCenter target and the AppD target\n\tif err = probeManager.DeleteTarget(vcTarget2); err != nil {\n\t\tpanic(fmt.Errorf(\"failed to delete target %v\\n%v\", vcTarget2, err))\n\t}\n\tif err = probeManager.DeleteTarget(appdTarget); err != nil {\n\t\tpanic(fmt.Errorf(\"failed to delete target %v\\n%v\", appdTarget, err))\n\t}\n\n\t// Use kubectl to examine the remaining targets and the corresponding probe status -\n\t// There should be 2 vCenter targets and 1 Pure Storage target left. Both the vCenter and the Pure Storage probes\n\t// should be enabled and the AppD probe should be disabled.\n\t//\n\tfmt.Println(\"Issue the following commands to examine the remaining targets and the corresponding probe status\")\n\tfmt.Println(\"1) Check the list of vCenter targets in secret: there should only be two left (moid1 and moid3)\")\n\tfmt.Println(\" kubectl -n probe-lifecycle-demo get secret vcenter -oyaml\")\n\tfmt.Println(\"1a) Decode vCenter target 1 to confirm the password has changed\")\n\tfmt.Println(\" kubectl -n probe-lifecycle-demo get secret vcenter -ojson | jq -j '.data.moid1' | base64 --decode\")\n\tfmt.Println(\"1b) Decode and check vCenter target 3\")\n\tfmt.Println(\" kubectl -n probe-lifecycle-demo get secret vcenter -ojson | jq -j '.data.moid3' | base64 --decode\")\n\tfmt.Println(\"2) Check the list of probes in the t8c XL resource: vcenter/pure are enabled and appdynamics is disabled \")\n\tfmt.Println(\" kubectl -n probe-lifecycle-demo get xl xl-release -ojson | jq -j '.spec'\")\n}", "title": "" }, { "docid": "591f413f918689634d2c480b8565b43d", "score": "0.5096078", "text": "func TestAccAzureDevOpsServiceEndpointKubernetesForAzureSubscriptionCreateAndUpdate(t *testing.T) {\n\tauthorizationType := \"AzureSubscription\"\n\n\tvar attrTestCheckFuncList []resource.TestCheckFunc\n\tattrTestCheckFuncList = append(\n\t\tattrTestCheckFuncList,\n\t\tresource.TestCheckResourceAttrSet(terraformServiceEndpointNode, \"azure_subscription.#\"),\n\t)\n\ttestAccAzureDevOpsServiceEndpoint(t, attrTestCheckFuncList, authorizationType)\n}", "title": "" }, { "docid": "8179513f54702775584c9cb3595cab08", "score": "0.5079922", "text": "func patchKubeadmSecret(runtime connector.Runtime) error {\n\texternalEtcdCerts := []string{\"external-etcd-ca.crt\", \"external-etcd.crt\", \"external-etcd.key\"}\n\tfor _, cert := range externalEtcdCerts {\n\t\t_, err := runtime.GetRunner().SudoCmd(\n\t\t\tfmt.Sprintf(\"/usr/local/bin/kubectl patch -n kube-system secret kubeadm-certs -p '{\\\\\\\"data\\\\\\\": {\\\\\\\"%s\\\\\\\": \\\\\\\"\\\\\\\"}}'\", cert),\n\t\t\ttrue)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(errors.WithStack(err), \"patch kubeadm secret failed\")\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5e27189ef9d809a67b9dd3dbd9a2f9d6", "score": "0.5069019", "text": "func createRules(pm PrincipalMap) *rbac_config.RBAC {\n\trules := &rbac_config.RBAC{\n\t\tAction: rbac_config.RBAC_ALLOW,\n\t\tPolicies: map[string]*rbac_config.Policy{},\n\t}\n\n\tprincipals := []*rbac_config.Principal{}\n\tprincipals = append(principals, pm[policies_api.Allow]...)\n\tprincipals = append(principals, pm[policies_api.AllowWithShadowDeny]...)\n\n\tif len(principals) != 0 {\n\t\trules.Policies[\"MeshTrafficPermission\"] = &rbac_config.Policy{\n\t\t\tPermissions: []*rbac_config.Permission{\n\t\t\t\t{\n\t\t\t\t\tRule: &rbac_config.Permission_Any{\n\t\t\t\t\t\tAny: true,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tPrincipals: principals,\n\t\t}\n\t}\n\n\treturn rules\n}", "title": "" }, { "docid": "cea7c701b0cb790329c106e18a23ad61", "score": "0.50684166", "text": "func (i *NFSManifests) GetNFSServerOperator(namespace string) string {\n\treturn `apiVersion: v1\nkind: Namespace\nmetadata:\n name: ` + namespace + `\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n name: rook-nfs-operator\nrules:\n- apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - create\n - get\n - list\n - patch\n - update\n - watch\n- apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - create\n - get\n - list\n - patch\n - update\n - watch\n- apiGroups:\n - \"\"\n resources:\n - pods\n verbs:\n - list\n - get\n - watch\n - create\n- apiGroups:\n - \"\"\n resources:\n - services\n verbs:\n - create\n - get\n - list\n - patch\n - update\n - watch\n- apiGroups:\n - apps\n resources:\n - statefulsets\n verbs:\n - create\n - get\n - list\n - patch\n - update\n - watch\n- apiGroups:\n - nfs.rook.io\n resources:\n - nfsservers\n verbs:\n - create\n - delete\n - get\n - list\n - patch\n - update\n - watch\n- apiGroups:\n - nfs.rook.io\n resources:\n - nfsservers/status\n verbs:\n - get\n - patch\n - update\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: rook-nfs-operator\n namespace: ` + namespace + `\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: rook-nfs-operator\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: rook-nfs-operator\nsubjects:\n- kind: ServiceAccount\n name: rook-nfs-operator\n namespace: ` + namespace + `\n---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: rook-nfs-operator\n namespace: ` + namespace + `\n labels:\n app: rook-nfs-operator\nspec:\n selector:\n matchLabels:\n app: rook-nfs-operator\n replicas: 1\n template:\n metadata:\n labels:\n app: rook-nfs-operator\n spec:\n serviceAccountName: rook-nfs-operator\n containers:\n - name: rook-nfs-operator\n imagePullPolicy: IfNotPresent\n image: rook/nfs:master\n args: [\"nfs\", \"operator\"]\n env:\n - name: POD_NAME\n valueFrom:\n fieldRef:\n fieldPath: metadata.name\n - name: POD_NAMESPACE\n valueFrom:\n fieldRef:\n fieldPath: metadata.namespace\n`\n}", "title": "" }, { "docid": "a2aa18d67bb972d2fc3dc3b3c686606b", "score": "0.5066427", "text": "func admitPods(ar v1beta1.AdmissionReview) *v1beta1.AdmissionResponse {\n\tglog.V(2).Info(\"admitting pods\")\n\tpodResource := metav1.GroupVersionResource{Group: \"\", Version: \"v1\", Resource: \"pods\"}\n\tif ar.Request.Resource != podResource {\n\t\terr := fmt.Errorf(\"expect resource to be %s\", podResource)\n\t\tglog.Error(err)\n\t\treturn toAdmissionResponse(err)\n\t}\n\n\traw := ar.Request.Object.Raw\n\tpod := corev1.Pod{}\n\tdeserializer := codecs.UniversalDeserializer()\n\tif _, _, err := deserializer.Decode(raw, nil, &pod); err != nil {\n\t\tglog.Error(err)\n\t\treturn toAdmissionResponse(err)\n\t}\n\treviewResponse := v1beta1.AdmissionResponse{}\n\treviewResponse.Allowed = true\n\n\tvar msg string\n\tif v, ok := pod.Labels[\"webhook-e2e-test\"]; ok {\n\t\tif v == \"webhook-disallow\" {\n\t\t\treviewResponse.Allowed = false\n\t\t\tmsg = msg + \"the pod contains unwanted label; \"\n\t\t}\n\t\tif v == \"wait-forever\" {\n\t\t\treviewResponse.Allowed = false\n\t\t\tmsg = msg + \"the pod response should not be sent; \"\n\t\t\t<-make(chan int) // Sleep forever - no one sends to this channel\n\t\t}\n\t}\n\tfor _, container := range pod.Spec.Containers {\n\t\tif strings.Contains(container.Name, \"webhook-disallow\") {\n\t\t\treviewResponse.Allowed = false\n\t\t\tmsg = msg + \"the pod contains unwanted container name; \"\n\t\t}\n\t}\n\tif !reviewResponse.Allowed {\n\t\treviewResponse.Result = &metav1.Status{Message: strings.TrimSpace(msg)}\n\t}\n\treturn &reviewResponse\n}", "title": "" }, { "docid": "b93a5621d50600684a79c0e26fa1e17d", "score": "0.50653917", "text": "func TestKubernetes() {\n\tIt(\"can run Pods\", func() {\n\t\tnamespace := fmt.Sprintf(\"mtest-%d\", getRandomNumber().Int())\n\t\tBy(\"creating namespace \" + namespace)\n\t\t_, stderr, err := kubectl(\"create\", \"namespace\", namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\t\tpsp, err := ioutil.ReadFile(policyYAMLPath)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\t_, stderr, err = kubectlWithInput(psp, \"apply\", \"-f\", \"-\", \"-n=\"+namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\n\t\tBy(\"waiting the default service account gets created\")\n\t\tEventually(func() error {\n\t\t\t_, stderr, err := kubectl(\"get\", \"sa/default\", \"-o\", \"json\")\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%v: stderr=%s\", err, stderr)\n\t\t\t}\n\t\t\treturn nil\n\t\t}).Should(Succeed())\n\n\t\tBy(\"running nginx\")\n\t\tnginx, err := ioutil.ReadFile(nginxYAMLPath)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\t_, stderr, err = kubectlWithInput(nginx, \"apply\", \"-f\", \"-\", \"-n=\"+namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\n\t\tBy(\"checking nginx pod status\")\n\t\tEventually(func() error {\n\t\t\tstdout, stderr, err := kubectl(\"get\", \"pods/nginx\", \"-n=\"+namespace, \"-o\", \"json\")\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%v: stderr=%s\", err, stderr)\n\t\t\t}\n\n\t\t\tvar pod corev1.Pod\n\t\t\terr = json.Unmarshal(stdout, &pod)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif !pod.Spec.HostNetwork {\n\t\t\t\treturn errors.New(\"pod is not running in host network\")\n\t\t\t}\n\n\t\t\tfor _, cond := range pod.Status.Conditions {\n\t\t\t\tif cond.Type == corev1.PodReady && cond.Status == corev1.ConditionTrue {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn errors.New(\"pod is not yet ready\")\n\t\t}).Should(Succeed())\n\t})\n\n\tIt(\"has cluster DNS resources\", func() {\n\t\tfor resource, name := range map[string]string{\n\t\t\t\"serviceaccounts\": \"cke-cluster-dns\",\n\t\t\t\"clusterroles\": \"system:cluster-dns\",\n\t\t\t\"clusterrolebindings\": \"system:cluster-dns\",\n\t\t\t\"configmaps\": \"cluster-dns\",\n\t\t\t\"deployments\": \"cluster-dns\",\n\t\t\t\"services\": \"cluster-dns\",\n\t\t} {\n\t\t\t_, stderr, err := kubectl(\"-n\", \"kube-system\", \"get\", resource+\"/\"+name)\n\t\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\t\t}\n\n\t\tstdout, stderr, err := kubectl(\"-n\", \"kube-system\", \"get\", \"configmaps/cluster-dns\", \"-o=json\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\n\t\tconfigMap := new(corev1.ConfigMap)\n\t\terr = json.Unmarshal(stdout, configMap)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t})\n\n\tIt(\"resolves Service IP\", func() {\n\t\tnamespace := fmt.Sprintf(\"mtest-%d\", getRandomNumber().Int())\n\t\tBy(\"creating namespace \" + namespace)\n\t\t_, stderr, err := kubectl(\"create\", \"namespace\", namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\t\tpsp, err := ioutil.ReadFile(policyYAMLPath)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\t_, stderr, err = kubectlWithInput(psp, \"apply\", \"-f\", \"-\", \"-n=\"+namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\n\t\tBy(\"getting CoreDNS Pods\")\n\t\tstdout, stderr, err := kubectl(\"get\", \"-n=kube-system\", \"pods\", \"--selector=cke.cybozu.com/appname=cluster-dns\", \"-o=json\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\n\t\tvar pods corev1.PodList\n\t\terr = json.Unmarshal(stdout, &pods)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\tExpect(pods.Items).To(HaveLen(2))\n\n\t\tnode := pods.Items[0].Spec.NodeName\n\n\t\tBy(\"deploying Service resource\")\n\t\tnginx, err := ioutil.ReadFile(nginxYAMLPath)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\t_, stderr, err = kubectlWithInput(nginx, \"apply\", \"-f\", \"-\", \"-n=\"+namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\n\t\t_, stderr, err = kubectl(\"expose\", \"-n=\"+namespace, \"pod\", \"nginx\", \"--port=80\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\n\t\toverrides := fmt.Sprintf(`{\n\t\"apiVersion\": \"v1\",\n\t\"spec\": { \"nodeSelector\": { \"kubernetes.io/hostname\": \"%s\" }}\n}`, node)\n\t\toverrideFile := remoteTempFile(overrides)\n\t\t_, stderr, err = kubectl(\"run\",\n\t\t\t\"-n=\"+namespace, \"--image=quay.io/cybozu/ubuntu:18.04\", \"--overrides=\\\"$(cat \"+overrideFile+\")\\\"\", \"--restart=Never\",\n\t\t\t\"client\", \"--\", \"sleep\", \"infinity\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\n\t\tBy(\"waiting pods are ready\")\n\t\tEventually(func() error {\n\t\t\t_, stderr, err = kubectl(\"exec\", \"-n=\"+namespace, \"client\", \"true\")\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%v: stderr=%s\", err, stderr)\n\t\t\t}\n\t\t\treturn nil\n\t\t}).Should(Succeed())\n\n\t\tBy(\"resolving domain names\")\n\t\tEventually(func() error {\n\t\t\t_, stderr, err := kubectl(\"exec\", \"-n=\"+namespace, \"client\", \"getent\", \"hosts\", \"nginx\")\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%v: stderr=%s\", err, stderr)\n\t\t\t}\n\n\t\t\t_, stderr, err = kubectl(\"exec\", \"-n=\"+namespace, \"client\", \"getent\", \"hosts\", \"nginx.\"+namespace+\".svc.cluster.local\")\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%v: stderr=%s\", err, stderr)\n\t\t\t}\n\t\t\treturn nil\n\t\t}).Should(Succeed())\n\t})\n\n\tIt(\"updates unbound config\", func() {\n\t\tcluster := getCluster()\n\t\tfor i := 0; i < 3; i++ {\n\t\t\tcluster.Nodes[i].ControlPlane = true\n\t\t}\n\n\t\tBy(\"updating domain name to neco.local\")\n\t\tbefore := cluster.Options.Kubelet.Domain\n\t\tcluster.Options.Kubelet.Domain = \"neco.local\"\n\t\tckecliClusterSet(cluster)\n\t\tEventually(func() error {\n\t\t\treturn checkCluster(cluster)\n\t\t}).Should(Succeed())\n\n\t\tstdout, stderr, err := kubectl(\"get\", \"-n=kube-system\", \"pods\", \"--selector=cke.cybozu.com/appname=node-dns\", \"-o=json\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\n\t\tvar pods corev1.PodList\n\t\terr = json.Unmarshal(stdout, &pods)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\tExpect(pods.Items).NotTo(BeEmpty())\n\t\tpod := pods.Items[0]\n\n\t\tEventually(func() error {\n\t\t\tstdout, stderr, err := kubectl(\"exec\", \"-n=kube-system\", pod.Name, \"-c=unbound\",\n\t\t\t\t\"/usr/local/unbound/sbin/unbound-control\", \"--\",\n\t\t\t\t\"-c\", \"/etc/unbound/unbound.conf\", \"list_stubs\")\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%v: %s\", err, string(stderr))\n\t\t\t}\n\t\t\tif strings.Contains(string(stdout), \"neco.local. IN stub\") {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn errors.New(\"unbound.conf is not updated\")\n\t\t}).Should(Succeed())\n\n\t\tcluster.Options.Kubelet.Domain = before\n\t\tckecliClusterSet(cluster)\n\t\tEventually(func() error {\n\t\t\treturn checkCluster(cluster)\n\t\t}).Should(Succeed())\n\n\t})\n\n\tIt(\"has node DNS resources\", func() {\n\t\tnamespace := fmt.Sprintf(\"mtest-%d\", getRandomNumber().Int())\n\t\tBy(\"creating namespace \" + namespace)\n\t\t_, stderr, err := kubectl(\"create\", \"namespace\", namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\t\tpsp, err := ioutil.ReadFile(policyYAMLPath)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\t_, stderr, err = kubectlWithInput(psp, \"apply\", \"-f\", \"-\", \"-n=\"+namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\n\t\tfor _, name := range []string{\n\t\t\t\"configmaps/node-dns\",\n\t\t\t\"daemonsets/node-dns\",\n\t\t\t\"serviceaccounts/cke-node-dns\",\n\t\t} {\n\t\t\t_, stderr, err := kubectl(\"-n\", \"kube-system\", \"get\", name)\n\t\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\t\t}\n\n\t\tBy(\"checking node DNS pod status\")\n\t\tEventually(func() error {\n\t\t\tstdout, stderr, err := kubectl(\"-n\", \"kube-system\", \"get\", \"daemonsets/node-dns\", \"-o\", \"json\")\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%v: stderr=%s\", err, stderr)\n\t\t\t}\n\n\t\t\tvar daemonSet appsv1.DaemonSet\n\t\t\terr = json.Unmarshal(stdout, &daemonSet)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif daemonSet.Status.NumberReady != 5 {\n\t\t\t\treturn errors.New(\"NumberReady is not 5\")\n\t\t\t}\n\n\t\t\treturn nil\n\t\t}).Should(Succeed())\n\n\t\tBy(\"querying www.google.com using node DNS from ubuntu pod\")\n\t\t_, stderr, err = kubectl(\"run\", \"-n=\"+namespace, \"--image=quay.io/cybozu/ubuntu:18.04\", \"--restart=Never\",\n\t\t\t\"client\", \"--\", \"sleep\", \"infinity\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\t\tEventually(func() error {\n\t\t\t_, _, err := kubectl(\"exec\", \"-n=\"+namespace, \"client\", \"getent\", \"hosts\", \"www.cybozu.com\")\n\t\t\treturn err\n\t\t}).Should(Succeed())\n\t})\n\n\tIt(\"has kube-system/cke-etcd Service and Endpoints\", func() {\n\t\t_, stderr, err := kubectl(\"-n\", \"kube-system\", \"get\", \"services/cke-etcd\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\t\t_, stderr, err = kubectl(\"-n\", \"kube-system\", \"get\", \"endpoints/cke-etcd\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\t})\n\n\tIt(\"can backup etcd snapshot\", func() {\n\t\tBy(\"deploying local persistent volume\")\n\t\tpv, err := ioutil.ReadFile(localPVYAMLPath)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\t_, stderr, err := kubectlWithInput(pv, \"create\", \"-f\", \"-\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\n\t\tBy(\"enabling etcd backup\")\n\t\tcluster := getCluster()\n\t\tfor i := 0; i < 3; i++ {\n\t\t\tcluster.Nodes[i].ControlPlane = true\n\t\t}\n\t\tcluster.EtcdBackup.Enabled = true\n\t\tckecliClusterSet(cluster)\n\t\tEventually(func() error {\n\t\t\treturn checkCluster(cluster)\n\t\t}).Should(Succeed())\n\n\t\tBy(\"getting hostIP of etcdbackup Pod\")\n\t\tvar hostIP string\n\t\tEventually(func() error {\n\t\t\tstdout, _, err := kubectl(\"-n\", \"kube-system\", \"get\", \"pods/etcdbackup\", \"-o\", \"json\")\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tvar pod corev1.Pod\n\t\t\tif err := json.Unmarshal(stdout, &pod); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\thostIP = pod.Status.HostIP\n\t\t\tif hostIP == \"\" {\n\t\t\t\treturn fmt.Errorf(\"etcdbackup pod is not scheduled: %s\", pod.String())\n\t\t\t}\n\t\t\treturn nil\n\t\t}).Should(Succeed())\n\n\t\tBy(\"deploying cluster-dns to etcdbackup Pod running hostIP\")\n\t\tclusterDNSPatch := fmt.Sprintf(`{ \"spec\": { \"template\": { \"spec\": { \"nodeSelector\": { \"kubernetes.io/hostname\": \"%s\" } } } } } }`, hostIP)\n\t\tpatchFile := remoteTempFile(clusterDNSPatch)\n\t\t_, stderr, err = kubectl(\"patch\", \"deployment\", \"cluster-dns\", \"-n\", \"kube-system\", \"--patch=\\\"$(cat \"+patchFile+\")\\\"\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\n\t\tBy(\"deploying etcdbackup CronJob to etcdbackup Pod running hostIP\")\n\t\tetcdbackupPatch := fmt.Sprintf(`{\"spec\": { \"jobTemplate\": { \"spec\": { \"template\": { \"spec\": { \"nodeSelector\": { \"kubernetes.io/hostname\": \"%s\" } } } } } } }`, hostIP)\n\t\tpatchFile = remoteTempFile(etcdbackupPatch)\n\t\t_, stderr, err = kubectl(\"patch\", \"cronjob\", \"etcdbackup\", \"-n\", \"kube-system\", \"--patch=\\\"$(cat \"+patchFile+\")\\\"\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\n\t\tBy(\"checking etcd backup job status\")\n\t\tEventually(func() error {\n\t\t\tstdout, stderr, err := kubectl(\"-n\", \"kube-system\", \"get\", \"job\", \"--sort-by=.metadata.creationTimestamp\", \"-o\", \"json\")\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%v: stderr=%s\", err, stderr)\n\t\t\t}\n\n\t\t\tvar jobs batchv1.JobList\n\t\t\terr = json.Unmarshal(stdout, &jobs)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif len(jobs.Items) < 1 {\n\t\t\t\treturn fmt.Errorf(\"no etcd backup jobs, JobList: %v\", jobs)\n\t\t\t}\n\t\t\tif jobs.Items[len(jobs.Items)-1].Status.Succeeded != 1 {\n\t\t\t\treturn fmt.Errorf(\".Succeeded is not 1, JobList: %v\", jobs)\n\t\t\t}\n\n\t\t\treturn nil\n\t\t}).Should(Succeed())\n\n\t\tBy(\"checking etcd snapshot is correct\")\n\t\tstdout := ckecliSafe(\"etcd\", \"backup\", \"list\")\n\t\tvar list []string\n\t\terr = json.Unmarshal(stdout, &list)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\t\tExpect(list[0]).To(ContainSubstring(\"snapshot-\"))\n\n\t\tckecliSafe(\"etcd\", \"backup\", \"get\", list[0])\n\t\t_, stderr, err = execAt(host1, \"gunzip\", \"snapshot-*.db.gz\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\t\tstdout, stderr, err = execAt(host1, \"env\", \"ETCDCTL_API=3\", \"/opt/bin/etcdctl\", \"snapshot\", \"status\", \"snapshot-*.db\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stdout=%s, stderr=%s\", stdout, stderr)\n\n\t\tBy(\"confirming etcdbackup CronJob is removed when etcdbackup is disabled\")\n\t\tcluster.EtcdBackup.Enabled = false\n\t\tckecliClusterSet(cluster)\n\t\tEventually(func() error {\n\t\t\treturn checkCluster(cluster)\n\t\t}).Should(Succeed())\n\t})\n\n\tIt(\"can rotate pod log\", func() {\n\t\tif containerRuntime == \"docker\" {\n\t\t\tSkip(\"docker doesn't support log rotation\")\n\t\t}\n\n\t\tnamespace := fmt.Sprintf(\"mtest-%d\", getRandomNumber().Int())\n\t\tBy(\"creating namespace \" + namespace)\n\t\t_, stderr, err := kubectl(\"create\", \"namespace\", namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\t\tpsp, err := ioutil.ReadFile(policyYAMLPath)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\t_, stderr, err = kubectlWithInput(psp, \"apply\", \"-f\", \"-\", \"-n=\"+namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\n\t\tBy(\"waiting the default service account gets created\")\n\t\tEventually(func() error {\n\t\t\t_, stderr, err := kubectl(\"get\", \"sa/default\", \"-o\", \"json\")\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%v: stderr=%s\", err, stderr)\n\t\t\t}\n\t\t\treturn nil\n\t\t}).Should(Succeed())\n\n\t\tBy(\"running nginx\")\n\t\tnginx, err := ioutil.ReadFile(nginxYAMLPath)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\t_, stderr, err = kubectlWithInput(nginx, \"apply\", \"-f\", \"-\", \"-n=\"+namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\n\t\tBy(\"checking nginx pod status\")\n\t\tvar pod corev1.Pod\n\t\tEventually(func() error {\n\t\t\tstdout, stderr, err := kubectl(\"get\", \"pods/nginx\", \"-n=\"+namespace, \"-o\", \"json\")\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%v: stderr=%s\", err, stderr)\n\t\t\t}\n\n\t\t\terr = json.Unmarshal(stdout, &pod)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tfor _, cond := range pod.Status.Conditions {\n\t\t\t\tif cond.Type == corev1.PodReady && cond.Status == corev1.ConditionTrue {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn errors.New(\"pod is not yet ready\")\n\t\t}).Should(Succeed())\n\n\t\tEventually(func() error {\n\t\t\tfor i := 0; i < 5; i++ {\n\t\t\t\t_, stderr, err = execAt(pod.Status.HostIP, \"curl\", pod.Status.PodIP)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"%v: stderr=%s\", err, stderr)\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn nil\n\t\t}).Should(Succeed())\n\n\t\tlogFile := fmt.Sprintf(\"%d.log\", pod.Status.ContainerStatuses[0].RestartCount)\n\t\tsubDirName := fmt.Sprintf(\"%s_%s_%s\", namespace, \"nginx\", string(pod.ObjectMeta.UID))\n\t\tlogPath := filepath.Join(\"/var/log/pods\", subDirName, \"nginx\", logFile)\n\t\tpattern := fmt.Sprintf(\"%s.*\", logPath)\n\n\t\tBy(\"checking log file\")\n\t\tEventually(func() error {\n\t\t\t_, _, err = execAt(pod.Status.HostIP, \"test\", \"-f\", logPath)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"log file doesn't exist\")\n\t\t\t}\n\t\t\treturn nil\n\t\t}).Should(Succeed())\n\n\t\t// kubelet rotates logfile every 10 second.\n\t\ttime.Sleep(10 * time.Second)\n\n\t\t_, _, err = execAt(pod.Status.HostIP, \"test\", \"-f\", pattern)\n\t\tExpect(err).To(HaveOccurred(), \"log file is already rotated\")\n\n\t\tfor i := 0; i < 5; i++ {\n\t\t\t_, _, err = execAt(pod.Status.HostIP, \"curl\", pod.Status.PodIP)\n\t\t\tExpect(err).NotTo(HaveOccurred(), \"stderr=%s\", stderr)\n\t\t}\n\n\t\tEventually(func() error {\n\t\t\t_, _, err = execAt(pod.Status.HostIP, \"test\", \"-f\", pattern)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"log file isn't rotated\")\n\t\t\t}\n\t\t\treturn nil\n\t\t}).Should(Succeed())\n\t})\n\n\tIt(\"can output audit log\", func() {\n\t\tBy(\"confirming journald does not have audit log\")\n\t\tlogs, _, err := execAt(node1, \"sudo\", \"journalctl\", \"CONTAINER_NAME=kube-apiserver\", \"-p\", \"6..6\", \"-q\")\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\tExpect(logs).Should(BeEmpty())\n\n\t\tBy(\"enabling audit log\")\n\t\tcluster := getCluster()\n\t\tfor i := 0; i < 3; i++ {\n\t\t\tcluster.Nodes[i].ControlPlane = true\n\t\t}\n\t\tcluster.Options.APIServer.AuditLogEnabled = true\n\t\tcluster.Options.APIServer.AuditLogPolicy = `apiVersion: audit.k8s.io/v1\nkind: Policy\nrules:\n- level: Metadata`\n\t\tckecliClusterSet(cluster)\n\t\tEventually(func() error {\n\t\t\treturn checkCluster(cluster)\n\t\t}).Should(Succeed())\n\t\tlogs, _, err = execAt(node1, \"sudo\", \"journalctl\", \"CONTAINER_NAME=kube-apiserver\", \"-p\", \"6..6\", \"-q\")\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\tExpect(logs).ShouldNot(BeEmpty())\n\t\tstatus, _, err := getClusterStatus(cluster)\n\t\tvar policyFile string\n\t\tfor _, v := range status.NodeStatuses[node1].APIServer.BuiltInParams.ExtraArguments {\n\t\t\tif strings.HasPrefix(v, \"--audit-policy-file=\") {\n\t\t\t\tpolicyFile = v\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tExpect(policyFile).ShouldNot(BeEmpty())\n\n\t\tBy(\"changing audit policy\")\n\t\tcluster.Options.APIServer.AuditLogPolicy = `apiVersion: audit.k8s.io/v1\nkind: Policy\nrules:\n- level: Request`\n\t\tckecliClusterSet(cluster)\n\t\tEventually(func() error {\n\t\t\treturn checkCluster(cluster)\n\t\t}).Should(Succeed())\n\t\tstatus, _, err = getClusterStatus(cluster)\n\t\tvar currentPolicyFile string\n\t\tfor _, v := range status.NodeStatuses[node1].APIServer.BuiltInParams.ExtraArguments {\n\t\t\tif strings.HasPrefix(v, \"--audit-policy-file=\") {\n\t\t\t\tcurrentPolicyFile = v\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tExpect(currentPolicyFile).ShouldNot(BeEmpty())\n\t\tExpect(currentPolicyFile).ShouldNot(Equal(policyFile))\n\n\t\tBy(\"disabling audit log\")\n\t\tcluster.Options.APIServer.AuditLogEnabled = false\n\t\tcluster.Options.APIServer.AuditLogPolicy = \"\"\n\t\tckecliClusterSet(cluster)\n\t\tEventually(func() error {\n\t\t\treturn checkCluster(cluster)\n\t\t}).Should(Succeed())\n\t})\n\n\tIt(\"updates user-defined resources\", func() {\n\t\tBy(\"set user-defined resource\")\n\t\tresources := `apiVersion: v1\nkind: Namespace\nmetadata:\n name: foo\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n namespace: foo\n name: sa1\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: foo\n name: pod-reader\nrules:\n- apiGroups: [\"\"]\n resources: [\"pods\"]\n verbs: [\"get\", \"watch\", \"list\"]\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: read-pods\n namespace: foo\nsubjects:\n- kind: ServiceAccount\n name: sa1\n namespace: foo\nroleRef:\n kind: Role\n name: pod-reader\n apiGroup: rbac.authorization.k8s.io\n`\n\t\tckecliWithInput([]byte(resources), \"resource\", \"set\", \"-\")\n\t\tdefer ckecliWithInput([]byte(resources), \"resource\", \"delete\", \"-\")\n\n\t\tcluster := getCluster()\n\t\tfor i := 0; i < 3; i++ {\n\t\t\tcluster.Nodes[i].ControlPlane = true\n\t\t}\n\t\tEventually(func() error {\n\t\t\treturn checkCluster(cluster)\n\t\t}).Should(Succeed())\n\n\t\tBy(\"updating user-defined resources\")\n\t\tnewResources := `apiVersion: v1\nkind: Namespace\nmetadata:\n name: foo\n labels:\n test: value\n`\n\t\tckecliWithInput([]byte(newResources), \"resource\", \"set\", \"-\")\n\t\tdefer ckecliWithInput([]byte(newResources), \"resource\", \"delete\", \"-\")\n\t\tEventually(func() error {\n\t\t\treturn checkCluster(cluster)\n\t\t}).Should(Succeed())\n\n\t\tstdout, _, err := kubectl(\"get\", \"namespaces/foo\", \"-o\", \"json\")\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\tvar ns corev1.Namespace\n\t\terr = json.Unmarshal(stdout, &ns)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\tExpect(ns.Labels).Should(HaveKeyWithValue(\"test\", \"value\"))\n\t})\n\n\tIt(\"recreates user-defined resources\", func() {\n\t\tnamespace := fmt.Sprintf(\"mtest-%d\", getRandomNumber().Int())\n\t\tBy(\"creating namespace \" + namespace)\n\t\t_, stderr, err := kubectl(\"create\", \"namespace\", namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\t\tpsp, err := ioutil.ReadFile(policyYAMLPath)\n\t\tExpect(err).ShouldNot(HaveOccurred())\n\t\t_, stderr, err = kubectlWithInput(psp, \"apply\", \"-f\", \"-\", \"-n=\"+namespace)\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\n\t\tBy(\"setting original resource\")\n\t\toriginals := `apiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: testhttpd\n namespace: ` + namespace + `\n labels:\n app.kubernetes.io/name: testhttpd\nspec:\n replicas: 2\n selector:\n matchLabels:\n app.kubernetes.io/name: testhttpd\n template:\n metadata:\n labels:\n app.kubernetes.io/name: testhttpd\n spec:\n containers:\n - name: testhttpd\n image: quay.io/cybozu/testhttpd:0\n imagePullPolicy: Always\n ports:\n - name: target\n containerPort: 18000\n protocol: TCP\n - name: target-udp\n containerPort: 18000\n protocol: UDP\n restartPolicy: Always\n securityContext:\n runAsUser: 10000\n`\n\n\t\t_, stderr, err = kubectlWithInput([]byte(originals), \"apply\", \"-f\", \"-\")\n\t\tExpect(err).NotTo(HaveOccurred(), \"stderr: %s\", stderr)\n\n\t\tBy(\"setting modified resource\")\n\t\tmodified := `apiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: testhttpd\n namespace: ` + namespace + `\n labels:\n app.kubernetes.io/name: testhttpd\n annotations:\n cke.cybozu.com/revision: \"1\"\nspec:\n replicas: 2\n selector:\n matchLabels:\n app.kubernetes.io/name: testhttpd\n template:\n metadata:\n labels:\n app.kubernetes.io/name: testhttpd\n spec:\n containers:\n - name: testhttpd\n image: quay.io/cybozu/testhttpd:0\n imagePullPolicy: Always\n ports:\n - name: target\n containerPort: 18001\n protocol: TCP\n - name: target-udp\n containerPort: 18001\n protocol: UDP\n restartPolicy: Always\n securityContext:\n runAsUser: 10000\n`\n\t\tckecliWithInput([]byte(modified), \"resource\", \"set\", \"-\")\n\t\tdefer ckecliWithInput([]byte(modified), \"resource\", \"delete\", \"-\")\n\n\t\tBy(\"changing containerPort to 18001\")\n\t\tcluster := getCluster()\n\t\tfor i := 0; i < 3; i++ {\n\t\t\tcluster.Nodes[i].ControlPlane = true\n\t\t}\n\t\tEventually(func() error {\n\t\t\treturn checkCluster(cluster)\n\t\t}).Should(Succeed())\n\n\t\tEventually(func() error {\n\t\t\tstdout, _, err := kubectl(\"get\", \"-n\", namespace, \"deployment\", \"testhttpd\", \"-o\", \"json\")\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tvar dep appsv1.Deployment\n\t\t\terr = json.Unmarshal(stdout, &dep)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tports := dep.Spec.Template.Spec.Containers[0].Ports\n\t\t\tif len(ports) != 2 {\n\t\t\t\treturn fmt.Errorf(\"ports len is not 2: %v\", ports)\n\t\t\t}\n\t\t\tif ports[0].ContainerPort != 18001 {\n\t\t\t\treturn fmt.Errorf(\"port[0] is not 18001: %d\", ports[0].ContainerPort)\n\t\t\t}\n\t\t\tif ports[1].ContainerPort != 18001 {\n\t\t\t\treturn fmt.Errorf(\"port[1] is not 18001: %d\", ports[1].ContainerPort)\n\t\t\t}\n\n\t\t\treturn nil\n\t\t}).Should(Succeed())\n\t})\n}", "title": "" }, { "docid": "6784a0d3679baa6f9e554914587520e1", "score": "0.50528747", "text": "func main() {\n\tp := flag.String(\"p\", \"\", \"Filter by the pod name (default:empty means all pods)\")\n\td := flag.String(\"d\", \"\", \"Filter by the deployment name (default:empty means all deployments)\")\n\tn := flag.String(\"n\", \"\", \"Filter by namespace name (default:empty means all namespaces)\")\n\tv := flag.Bool(\"v\", false, \"Show the plugin version\")\n\tshow := flag.String(\"print\", \"all\", \"Define what will be printed. Valid values all|pods|hpas|nodes \")\n\tcsv := flag.String(\"csv-output\", \"\", \"Save the result to files with format 'kubectl-snapshot-<date>-<csv-output>-<pods|hpas|nohpa|nodes|all>.csv'\")\n\tdebug := flag.Bool(\"debug\", false, \"Show debug info\")\n\tflag.Parse()\n\tprintFlags(*p, *d, *n, *v, *show, *csv, *debug)\n\n\tif *v || *debug {\n\t\tfmt.Printf(\"Plugin Version: %s (%s)\\n\", version, versionDesciption)\n\t\tif *v {\n\t\t\tos.Exit(0)\n\t\t}\n\t}\n\tcsvFilePrefix := \"\"\n\tif *csv != \"\" {\n\t\tnow := time.Now()\n\t\tcsvFilePrefix = now.Format(fmt.Sprintf(\"kubectl-snapshot-2006-01-02-1504-%s\", *csv))\n\t}\n\n\t// Pods with resource usage (top) ..\n\tpodList := RetrievePods(*n)\n\tif *p != \"\" {\n\t\tpodList = filterPod(podList, func(pod Pod) bool { return pod.Metadata.Name == *p })\n\t} else if *d != \"\" {\n\t\tpodList = filterPod(podList, func(pod Pod) bool { return pod.GetDeploymentName() == *d })\n\t}\n\n\t// Hpas, use podList to confirm resource usgage ..\n\thpaList := RetrieveHpas(*n, podList)\n\tif *p != \"\" {\n\t\thpaList = filterHpa(hpaList, func(h Hpa) bool { return h.ContainsPod(*p) })\n\t} else if *d != \"\" {\n\t\thpaList = filterHpa(hpaList, func(h Hpa) bool { return h.RefToDeployment(*d) })\n\t}\n\n\t// Deployments for non-hpas, use podList to confirm resource usgage ..\n\tdeploymentList := RetrieveDeployments(*n, podList)\n\tif *p != \"\" {\n\t\tdeploymentList = filterDeployment(deploymentList, func(deploy Deployment) bool { return deploy.ContainsPod(*p) })\n\t} else if *d != \"\" {\n\t\tdeploymentList = filterDeployment(deploymentList, func(deploy Deployment) bool { return deploy.Name == *d })\n\t}\n\thpaMap := make(map[string]Hpa)\n\tfor _, hpa := range hpaList {\n\t\thpaMap[hpa.Namespace+\"|\"+hpa.ReferenceName] = hpa\n\t}\n\tdeploymentWithoutHpa := []Deployment{}\n\tfor _, deploy := range deploymentList {\n\t\tif _, hasHpa := hpaMap[deploy.GetDeploymentKey()]; !hasHpa {\n\t\t\tdeploymentWithoutHpa = append(deploymentWithoutHpa, deploy)\n\t\t}\n\t}\n\n\t// Nodes, use podList to confirm resource usgage ..\n\tnodeList := RetrieveNodes(podList)\n\t// TODO: filter\n\n\t// Print standard io or send to csv files ..\n\tswitch *show {\n\tcase \"pod\":\n\tcase \"pods\":\n\t\tprintPodsTab(podList, csvFilePrefix, *debug)\n\tcase \"hpa\":\n\tcase \"hpas\":\n\t\tprintHpaTab(hpaList, csvFilePrefix, *debug)\n\t\tprintNoHpaTab(deploymentWithoutHpa, csvFilePrefix, *debug)\n\tcase \"node\":\n\tcase \"nodes\":\n\t\tprintNodesTab(nodeList, csvFilePrefix, *debug)\n\tdefault:\n\t\tprintPodsTab(podList, csvFilePrefix, *debug)\n\t\tprintHpaTab(hpaList, csvFilePrefix, *debug)\n\t\tprintNoHpaTab(deploymentWithoutHpa, csvFilePrefix, *debug)\n\t\tprintNodesTab(nodeList, csvFilePrefix, *debug)\n\t}\n\n}", "title": "" }, { "docid": "6102a4aeaa2670198630fcdaab286858", "score": "0.50355375", "text": "func ParsePrincipalsKadminLong(contents string) ([]KPrincipal, error) {\n var principals []KPrincipal\n\n scanner := bufio.NewScanner(strings.NewReader(contents))\n for scanner.Scan() {\n line := strings.Trim(scanner.Text(), \" \\t\")\n if strings.HasPrefix(line, \"Principal:\") {\n p, err := ParsePrincipal(line[11:])\n if err != nil {\n return nil, err\n }\n principals = append(principals, p)\n }\n\n }\n return principals, scanner.Err()\n}", "title": "" }, { "docid": "c902327ea949613bf68c2bf94e609344", "score": "0.500986", "text": "func getControlPlaneSubCommands(outDir, defaultKubernetesVersion string) []*cobra.Command {\n\n\tcfg := &kubeadmapiv1alpha3.InitConfiguration{}\n\n\t// This is used for unit testing only...\n\t// If we wouldn't set this to something, the code would dynamically look up the version from the internet\n\t// By setting this explicitly for tests workarounds that\n\tif defaultKubernetesVersion != \"\" {\n\t\tcfg.KubernetesVersion = defaultKubernetesVersion\n\t}\n\n\t// Default values for the cobra help text\n\tkubeadmscheme.Scheme.Default(cfg)\n\n\tvar cfgPath, featureGatesString string\n\tvar subCmds []*cobra.Command\n\n\tsubCmdProperties := []struct {\n\t\tuse string\n\t\tshort string\n\t\tlong string\n\t\texamples string\n\t\tcmdFunc func(outDir string, cfg *kubeadmapi.InitConfiguration) error\n\t}{\n\t\t{\n\t\t\tuse: \"all\",\n\t\t\tshort: \"Generates all static Pod manifest files necessary to establish the control plane\",\n\t\t\tlong: allControlplaneLongDesc,\n\t\t\texamples: allControlplaneExample,\n\t\t\tcmdFunc: controlplanephase.CreateInitStaticPodManifestFiles,\n\t\t},\n\t\t{\n\t\t\tuse: \"apiserver\",\n\t\t\tshort: \"Generates the API server static Pod manifest\",\n\t\t\tlong: apiServerControlplaneLongDesc,\n\t\t\tcmdFunc: controlplanephase.CreateAPIServerStaticPodManifestFile,\n\t\t},\n\t\t{\n\t\t\tuse: \"controller-manager\",\n\t\t\tshort: \"Generates the controller-manager static Pod manifest\",\n\t\t\tlong: controllerManagerControlplaneLongDesc,\n\t\t\tcmdFunc: controlplanephase.CreateControllerManagerStaticPodManifestFile,\n\t\t},\n\t\t{\n\t\t\tuse: \"scheduler\",\n\t\t\tshort: \"Generates the scheduler static Pod manifest\",\n\t\t\tlong: schedulerControlplaneLongDesc,\n\t\t\tcmdFunc: controlplanephase.CreateSchedulerStaticPodManifestFile,\n\t\t},\n\t}\n\n\tfor _, properties := range subCmdProperties {\n\t\t// Creates the UX Command\n\t\tcmd := &cobra.Command{\n\t\t\tUse: properties.use,\n\t\t\tShort: properties.short,\n\t\t\tLong: properties.long,\n\t\t\tExample: properties.examples,\n\t\t\tRun: runCmdControlPlane(properties.cmdFunc, &outDir, &cfgPath, &featureGatesString, cfg),\n\t\t}\n\n\t\t// Add flags to the command\n\t\tcmd.Flags().StringVar(&cfg.CertificatesDir, \"cert-dir\", cfg.CertificatesDir, `The path where certificates are stored`)\n\t\tcmd.Flags().StringVar(&cfg.KubernetesVersion, \"kubernetes-version\", cfg.KubernetesVersion, `Choose a specific Kubernetes version for the control plane`)\n\n\t\tif properties.use == \"all\" || properties.use == \"apiserver\" {\n\t\t\tcmd.Flags().StringVar(&cfg.APIEndpoint.AdvertiseAddress, \"apiserver-advertise-address\", cfg.APIEndpoint.AdvertiseAddress, \"The IP address of the API server is accessible on\")\n\t\t\tcmd.Flags().Int32Var(&cfg.APIEndpoint.BindPort, \"apiserver-bind-port\", cfg.APIEndpoint.BindPort, \"The port the API server is accessible on\")\n\t\t\tcmd.Flags().StringVar(&cfg.Networking.ServiceSubnet, \"service-cidr\", cfg.Networking.ServiceSubnet, \"The range of IP address used for service VIPs\")\n\t\t\tcmd.Flags().StringVar(&featureGatesString, \"feature-gates\", featureGatesString, \"A set of key=value pairs that describe feature gates for various features. \"+\n\t\t\t\t\"Options are:\\n\"+strings.Join(features.KnownFeatures(&features.InitFeatureGates), \"\\n\"))\n\t\t\tcmd.Flags().Var(utilflag.NewMapStringString(&cfg.APIServerExtraArgs), \"apiserver-extra-args\", \"A set of extra flags to pass to the API Server or override default ones in form of <flagname>=<value>\")\n\t\t}\n\n\t\tif properties.use == \"all\" || properties.use == \"controller-manager\" {\n\t\t\tcmd.Flags().StringVar(&cfg.Networking.PodSubnet, \"pod-network-cidr\", cfg.Networking.PodSubnet, \"The range of IP addresses used for the Pod network\")\n\t\t\tcmd.Flags().Var(utilflag.NewMapStringString(&cfg.ControllerManagerExtraArgs), \"controller-manager-extra-args\", \"A set of extra flags to pass to the Controller Manager or override default ones in form of <flagname>=<value>\")\n\t\t}\n\n\t\tif properties.use == \"all\" || properties.use == \"scheduler\" {\n\t\t\tcmd.Flags().Var(utilflag.NewMapStringString(&cfg.SchedulerExtraArgs), \"scheduler-extra-args\", \"A set of extra flags to pass to the Scheduler or override default ones in form of <flagname>=<value>\")\n\t\t}\n\n\t\tcmd.Flags().StringVar(&cfgPath, \"config\", cfgPath, \"Path to kubeadm config file. WARNING: Usage of a configuration file is experimental\")\n\n\t\tsubCmds = append(subCmds, cmd)\n\t}\n\n\treturn subCmds\n}", "title": "" }, { "docid": "c4734360374b143387c85cc282ac02fb", "score": "0.49965528", "text": "func makeKubernetesPod(t *testing.T, pod TestPodDescriptor) *v1.Pod {\n\n\tvolumeMounts := make([]v1.VolumeMount, 0)\n\tvolumeDevices := make([]v1.VolumeDevice, 0)\n\tvolumes := make([]v1.Volume, 0)\n\tluksSecrets := make([]v1.Secret, 0)\n\n\tfor i, volume := range pod.Volumes {\n\t\tvolumeName := fmt.Sprintf(\"volume-%v\", i)\n\t\tif !volume.Block {\n\t\t\tvolumeMounts = append(volumeMounts, v1.VolumeMount{\n\t\t\t\tMountPath: fmt.Sprintf(\"/data-%v\", i),\n\t\t\t\tName: volumeName,\n\t\t\t})\n\t\t} else {\n\t\t\tvolumeDevices = append(volumeDevices, v1.VolumeDevice{\n\t\t\t\tDevicePath: fmt.Sprintf(\"/dev/xvd-%v\", i),\n\t\t\t\tName: volumeName,\n\t\t\t})\n\t\t}\n\t\tvolumes = append(volumes, v1.Volume{\n\t\t\tName: volumeName,\n\t\t\tVolumeSource: v1.VolumeSource{\n\t\t\t\tPersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{\n\t\t\t\t\tClaimName: volume.ClaimName,\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif volume.LuksKey != \"\" {\n\t\t\tluksSecrets = append(luksSecrets, v1.Secret{\n\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\tName: fmt.Sprintf(\"%v-luks-key\", volume.ClaimName),\n\t\t\t\t\tNamespace: namespace,\n\t\t\t\t},\n\t\t\t\tType: v1.SecretTypeOpaque,\n\t\t\t\tStringData: map[string]string{\n\t\t\t\t\t\"luksKey\": volume.LuksKey,\n\t\t\t\t},\n\t\t\t})\n\t\t}\n\t}\n\n\tfor _, secret := range luksSecrets {\n\t\tt.Logf(\"Creating luks-secret %v\", secret.Name)\n\t\t_, err := client.CoreV1().Secrets(namespace).Create(context.Background(), &secret, metav1.CreateOptions{})\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t}\n\n\tkubernetesPod := &v1.Pod{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: pod.Name,\n\t\t\tNamespace: namespace,\n\t\t},\n\t\tSpec: v1.PodSpec{\n\t\t\t// use google's pause container instead of a sleeping busybox\n\t\t\t// reasoning: the pause container properly terminates when the container runtime\n\t\t\t// signals TERM; a sleeping busybox will not and it will take a while before the\n\t\t\t// container is killed, unless we were to explicitly handle the TERM signal\n\t\t\tContainers: []v1.Container{\n\t\t\t\t{\n\t\t\t\t\tName: \"pause\",\n\t\t\t\t\tImage: \"gcr.io/google-containers/pause-amd64:3.1\",\n\t\t\t\t\tVolumeMounts: volumeMounts,\n\t\t\t\t\tVolumeDevices: volumeDevices,\n\t\t\t\t},\n\t\t\t},\n\t\t\tVolumes: volumes,\n\t\t},\n\t}\n\n\tt.Log(\"Creating pod\")\n\t_, err := client.CoreV1().Pods(namespace).Create(context.Background(), kubernetesPod, metav1.CreateOptions{})\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\treturn kubernetesPod\n}", "title": "" }, { "docid": "7a2ba01b94c69dfcf804ac581fcfcc7f", "score": "0.49928457", "text": "func defaults(o unstructured.Unstructured) {\n\tgk := o.GroupVersionKind().GroupKind()\n\n\tswitch gk.String() {\n\tcase \"CronJob.batch\":\n\t\tfor _, c := range jsonpath.MustCompile(\"$.spec.jobTemplate.spec.template.spec\").Get(o.Object) {\n\t\t\tdefaultPodSpec(c.(map[string]interface{}))\n\t\t}\n\n\t\tjsonpath.MustCompile(\"$.spec.concurrencyPolicy\").DeleteIfMatch(o.Object, \"Allow\")\n\t\tjsonpath.MustCompile(\"$.spec.failedJobsHistoryLimit\").DeleteIfMatch(o.Object, int64(1))\n\t\tjsonpath.MustCompile(\"$.spec.successfulJobsHistoryLimit\").DeleteIfMatch(o.Object, int64(3))\n\t\tjsonpath.MustCompile(\"$.spec.suspend\").DeleteIfMatch(o.Object, false)\n\n\tcase \"DaemonSet.apps\":\n\t\tjsonpath.MustCompile(\"$.spec.revisionHistoryLimit\").DeleteIfMatch(o.Object, int64(10))\n\n\t\tfor _, c := range jsonpath.MustCompile(\"$.spec.template.spec\").Get(o.Object) {\n\t\t\tdefaultPodSpec(c.(map[string]interface{}))\n\t\t}\n\n\t\tjsonpath.MustCompile(\"$.spec.updateStrategy.rollingUpdate.maxUnavailable\").DeleteIfMatch(o.Object, int64(1))\n\t\tjsonpath.MustCompile(\"$.spec.updateStrategy.rollingUpdate\").DeleteIfMatch(o.Object, map[string]interface{}{})\n\t\tjsonpath.MustCompile(\"$.spec.updateStrategy.type\").DeleteIfMatch(o.Object, \"RollingUpdate\")\n\t\tjsonpath.MustCompile(\"$.spec.updateStrategy\").DeleteIfMatch(o.Object, map[string]interface{}{})\n\n\tcase \"Deployment.apps\":\n\t\tjsonpath.MustCompile(\"$.spec.progressDeadlineSeconds\").DeleteIfMatch(o.Object, int64(600))\n\t\tjsonpath.MustCompile(\"$.spec.revisionHistoryLimit\").DeleteIfMatch(o.Object, int64(10))\n\n\t\tjsonpath.MustCompile(\"$.spec.strategy.rollingUpdate.maxSurge\").DeleteIfMatch(o.Object, \"25%\")\n\t\tjsonpath.MustCompile(\"$.spec.strategy.rollingUpdate.maxUnavailable\").DeleteIfMatch(o.Object, \"25%\")\n\t\tjsonpath.MustCompile(\"$.spec.strategy.rollingUpdate\").DeleteIfMatch(o.Object, map[string]interface{}{})\n\t\tjsonpath.MustCompile(\"$.spec.strategy.type\").DeleteIfMatch(o.Object, \"RollingUpdate\")\n\t\tjsonpath.MustCompile(\"$.spec.strategy\").DeleteIfMatch(o.Object, map[string]interface{}{})\n\n\t\tfor _, c := range jsonpath.MustCompile(\"$.spec.template.spec\").Get(o.Object) {\n\t\t\tdefaultPodSpec(c.(map[string]interface{}))\n\t\t}\n\n\tcase \"Secret\":\n\t\tjsonpath.MustCompile(\"$.type\").DeleteIfMatch(o.Object, \"Opaque\")\n\n\tcase \"Service\":\n\t\tjsonpath.MustCompile(\"$.spec.ports.*.protocol\").DeleteIfMatch(o.Object, \"TCP\")\n\t\tjsonpath.MustCompile(\"$.spec.sessionAffinity\").DeleteIfMatch(o.Object, \"None\")\n\t\tjsonpath.MustCompile(\"$.spec.type\").DeleteIfMatch(o.Object, \"ClusterIP\")\n\n\t\tfor _, p := range jsonpath.MustCompile(\"$.spec.ports.*\").Get(o.Object) {\n\t\t\tjsonpath.MustCompile(\"$.targetPort\").DeleteIfMatch(p, jsonpath.MustCompile(\"$.port\").Get(p)[0].(int64))\n\t\t}\n\n\tcase \"StatefulSet.apps\":\n\t\tjsonpath.MustCompile(\"$.spec.podManagementPolicy\").DeleteIfMatch(o.Object, \"OrderedReady\")\n\t\tjsonpath.MustCompile(\"$.spec.revisionHistoryLimit\").DeleteIfMatch(o.Object, int64(10))\n\t\tjsonpath.MustCompile(\"$.spec.serviceName\").DeleteIfMatch(o.Object, \"\")\n\n\t\tjsonpath.MustCompile(\"$.spec.updateStrategy.rollingUpdate.partition\").DeleteIfMatch(o.Object, int64(0))\n\t\tjsonpath.MustCompile(\"$.spec.updateStrategy.rollingUpdate\").DeleteIfMatch(o.Object, map[string]interface{}{})\n\t\tjsonpath.MustCompile(\"$.spec.updateStrategy.type\").DeleteIfMatch(o.Object, \"RollingUpdate\")\n\t\tjsonpath.MustCompile(\"$.spec.updateStrategy\").DeleteIfMatch(o.Object, map[string]interface{}{})\n\n\t\tfor _, c := range jsonpath.MustCompile(\"$.spec.template.spec\").Get(o.Object) {\n\t\t\tdefaultPodSpec(c.(map[string]interface{}))\n\t\t}\n\n\tcase \"StorageClass.storage.k8s.io\":\n\t\tjsonpath.MustCompile(\"$.reclaimPolicy\").DeleteIfMatch(o.Object, \"Delete\")\n\t\tjsonpath.MustCompile(\"$.volumeBindingMode\").DeleteIfMatch(o.Object, \"Immediate\")\n\t}\n}", "title": "" }, { "docid": "ef25841e9b05505476c429c2e5f24202", "score": "0.49901056", "text": "func Rc(app, component, containerip, containername, image, etcdpath string) {\n\tclient, err := etcdclient.NewEtcdClient(etcdpath)\n\tif err != nil {\n\t\tlog.Fatalf(\"cli.RC() Error when create etcdclient:%+v\\n\", err)\n\t\treturn\n\t}\n\tapiserver, err := client.GetAbsoluteKey(\"/commiter/config/apiserver\")\n\tif err != nil {\n\t\tlog.Fatalf(\"cli.RC() Error when get apiserver address from etcd:%+v\\n\", err)\n\t}\n\tftpserver, err := client.GetAbsoluteKey(\"/commiter/config/ftpserver\")\n\tif err != nil {\n\t\tlog.Fatalf(\"cli.RC() Error when get ftpserver address from etcd:%+v\\n\", err)\n\t}\n\tBuildDownload(app, component, containername, ftpserver)\n\tBUildUpload(app, component, containerip, containername, ftpserver)\n\t//get component1 which include the info of level\n\tpodname := strings.Split(containername, \"_\")[2]\n\tvar component1 string\n\tif len(strings.Split(podname, \"-\")) == 3 {\n\t\tcomponent1 = component\n\t} else if len(strings.Split(podname, \"-\")) == 4 {\n\t\tcomponent1 = component + \"-\" + strings.Split(podname, \"-\")[2]\n\t} else {\n\t\tlog.Fatalln(\"cli.BuildDownload(): There are some error when get component name.\")\n\t}\n\tpodyamlname := \"/home/commiter/\" + app + \"rc-\" + component1 + \"-\" + containerip + \".yaml\"\n\t//todo: run download.sh,run upload.sh\n\tcommandname1 := \"bash\"\n\tcommandname2 := \"kubectl\"\n\tparams1 := []string{download}\n\tparams2 := []string{upload}\n\tparams3 := []string{\"--server=\" + apiserver, \"label\", \"pods\", strings.Split(containername, \"_\")[2], \"ip=\" + containerip}\n\tparams4 := []string{\"--server=\" + apiserver, \"create\", \"-f\", podyamlname}\n\t//get the app-componnet1.yaml from ftpserver\n\tif err := cmd.ExecCommand(commandname1, params1); !err {\n\t\tlog.Fatalf(\"cli.RC() Error when run the script of download rc template:%+v\\n\", err)\n\t} else {\n\t\tlog.Infoln(\"cli.RC() Download rc template success\")\n\t}\n\t//create rc for pod\n\tBuildYaml(app, component, containerip, image, containername)\n\t//upload the rc of pod to ftpserver\n\tif err := cmd.ExecCommand(commandname1, params2); !err {\n\t\tlog.Fatalf(\"cli.RC() Error when run the script of upload rc template:%+v\\n\", err)\n\t} else {\n\t\tlog.Infoln(\"cli.RC() Upload rc template success\")\n\t}\n\t//add label of ip:containerip for pod\n\tif err := cmd.ExecCommand(commandname2, params3); !err {\n\t\tlog.Fatalf(\"cli.RC() Error when add label ip to the pod:%+v,err:%+v\\n\", strings.Split(containername, \"_\")[2], err)\n\t} else {\n\t\tlog.Infof(\"cli.RC() Add label ip successful. Pod:%+v. IP:%+v\\n\", strings.Split(containername, \"_\")[2], containerip)\n\t}\n\t//create rc for the pod rc\n\tif err := cmd.ExecCommand(commandname2, params4); !err {\n\t\tlog.Fatalf(\"cli.RC() K8s create rc for the pod rc:%+v\\n\", err)\n\t}\n\treturn\n}", "title": "" }, { "docid": "2f6503d24202d917a7aed16c0447ca3a", "score": "0.4963097", "text": "func main() {\n\tenf = casbin.NewEnforcer(\"rbac.conf\", \"rbac.csv\")\n\tuser1 := \"di\"\n\tuser2 := \"kancheng\"\n\torg1 := \"org1\"\n\torg2 := \"org2\"\n\t// user di (org1, admin) has the backup permission for vm1_1\n\thasPermissionForObject(user1, org1, \"vm1_1\", \"backup\") // true\n\t// user kancheng (org2, end_user) has view permission for hyperv1_1\n\thasPermissionForObject(user2, org2, \"hyperv1_1\", \"view\") // true\n\n\t// user di has backup permission for at least one object in type vm\n\ttypeName := \"vm\"\n\thasPermissionForAtLeastOneObjInType(user1, org1, typeName, \"backup\") // true\n}", "title": "" }, { "docid": "01f91d99775dc2ba6c6244f988cf3594", "score": "0.49623784", "text": "func Generate_secret_config(clientset *kubernetes.Clientset) {\n\t\t// Loop through all the namespaces and get the list of services\n\t\n\tsecret, err := clientset.CoreV1().Secrets(\"default\").List(context.TODO(), metav1.ListOptions{})\n\tif err != nil {\n\t\tfmt.Printf(\"Could not read kubernetes SVC using cluster client: %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n \n for _, item := range secret.Items {\n \tfmt.Println(item.ObjectMeta.Name)\t\n }\t\n \n // Remove default secret from each namespace\n for i, item := range secret.Items {\n \tif strings.Contains(item.ObjectMeta.Name, \"default-token-\") {\n \t\tsecret.Items = append(secret.Items[:i], secret.Items[i+1:]...)\n \t\tbreak\n \t}\n }\n \n fmt.Println()\n // append list of services in this namespace to glabal services list\n\tfor _, item := range secret.Items {\n \tfmt.Println(item.ObjectMeta.Name)\t\n }\n}", "title": "" }, { "docid": "04e5a7abc6539bdfdaf4300ef55e3e72", "score": "0.4960185", "text": "func (b *backend) pathRolesCRUD() *framework.Path {\n return &framework.Path{\n\tPattern: fmt.Sprintf(\"roles/\" + framework.GenericNameRegex(\"role\")),\n\tHelpSynopsis: \"Configure a Backblaze B2 role.\",\n\tHelpDescription: \"Use this endpoint to set the polices for generated keys in this role.\",\n\n\tFields: map[string]*framework.FieldSchema{\n\t \"role\": &framework.FieldSchema{\n\t\tType: framework.TypeString,\n\t\tDescription: \"Role name.\",\n\t },\n\t \"key_name_prefix\": &framework.FieldSchema{\n\t\tType: framework.TypeString,\n\t\tDescription: \"Prefix for key names generated by this role\",\n\t },\n\t \"capabilities\": &framework.FieldSchema{\n\t\tType: framework.TypeCommaStringSlice,\n\t\tDescription: \"Comma-separated list of capabilities\",\n\t },\n\t \"bucket\": &framework.FieldSchema{\n\t\tType: framework.TypeString,\n\t\tDescription: \"Optional bucket on which to restrict this key.\",\n\t },\n\t \"name_prefix\": &framework.FieldSchema{\n\t\tType: framework.TypeString,\n\t\tDescription: \"Optional prefix to further restrict a bucket key.\",\n\t },\n\t \"default_ttl\": &framework.FieldSchema{\n\t\tType: framework.TypeDurationSecond,\n\t\tDescription: \"Optional default TTL to apply to keys.\",\n\t },\n\t \"max_ttl\": &framework.FieldSchema{\n\t\tType: framework.TypeDurationSecond,\n\t\tDescription: \"Optional maximum TTL to apply to keys.\",\n\t },\n\t},\n\n\tExistenceCheck: b.pathRoleExistsCheck,\n\n\tCallbacks: map[logical.Operation]framework.OperationFunc{\n\t logical.CreateOperation: b.pathRoleWrite,\n\t logical.ReadOperation: b.pathRoleRead,\n\t logical.UpdateOperation: b.pathRoleWrite,\n\t logical.DeleteOperation: b.pathRoleDelete,\n\t},\n }\n}", "title": "" }, { "docid": "b1e205b8ac8a20bf5946a0124225fd4a", "score": "0.49433568", "text": "func (wh *webhook) admitPods(ar v1.AdmissionReview) *v1.AdmissionResponse {\n\tlog.Logf(\"admitting pods\")\n\n\tpodResource := metav1.GroupVersionResource{Group: \"\", Version: \"v1\", Resource: \"pods\"}\n\tif ar.Request.Resource != podResource {\n\t\terr := fmt.Errorf(\"expect resource to be %s\", podResource)\n\t\tlog.Logf(\"ERROR: %v\", err)\n\t\treturn toAdmissionResponse(err)\n\t}\n\n\treviewResponse := v1.AdmissionResponse{}\n\treviewResponse.Allowed = true\n\treturn &reviewResponse\n}", "title": "" }, { "docid": "ff9a997b0700180d040162515c66df99", "score": "0.49182516", "text": "func getNormalPodAnnotation() map[string]string {\n\treturn map[string]string{\n\t\t\"kubernetes.io/created-by\": \"{\\\"kind\\\":\\\"SerializedReference\\\",\\\"apiVersion\\\":\\\"v1\\\",\\\"reference\\\":{\\\"kind\\\":\\\"Pod\\\"}}\",\n\t}\n}", "title": "" }, { "docid": "134d724c8b2f7034be9d77c21c4ca8e8", "score": "0.48842463", "text": "func TestCredentialsRUDThatDoNotExist(t *testing.T) {\n\tr := dummyResource()\n\tnamespace := \"tekton-pipelines\"\n\tr.K8sClient.CoreV1().Namespaces().Create(&corev1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: namespace}})\n\tbogusNamespace := \"bogusnamespace\"\n\texpectedError := fmt.Sprintf(\"Namespace provided does not exist: '%s'.\", bogusNamespace)\n\tcred := credential{\n\t\tName: \"aCred\",\n\t\tUsername: \"alfred\",\n\t\tPassword: \"alfredsPassword\",\n\t\tURL: map[string]string{\n\t\t\t\"tekton.dev/git-0\": \"https://github.com\",\n\t\t},\n\t}\n\tcreateCredentialTest(bogusNamespace, cred, expectedError, r, t)\n\t//empty expected for get all with unknown namespace\n\treadAllCredentialsTest(bogusNamespace, []credential{}, \"\", r, t)\n\treadCredentialTest(bogusNamespace, cred, expectedError, r, t)\n\tupdateCredentialTest(bogusNamespace, cred, expectedError, r, t)\n\tdeleteCredentialTest(bogusNamespace, cred.Name, expectedError, r, t)\n}", "title": "" }, { "docid": "155629595c44c81ddeae9cea01299aad", "score": "0.48617905", "text": "func (p *Kubestr) validateRBACHelper() (*v1.APIGroup, error) {\n\tserverGroups, err := p.cli.Discovery().ServerGroups()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, group := range serverGroups.Groups {\n\t\tif group.Name == RbacGroupName {\n\t\t\treturn &group, nil\n\t\t}\n\t}\n\treturn nil, fmt.Errorf(\"Kubernetes RBAC is not enabled\")\n}", "title": "" }, { "docid": "599d26e685fb5c499e76067991c02489", "score": "0.48556212", "text": "func KubeletFlags(log *zap.SugaredLogger, version, cloudProvider, hostname string, dnsIPs []net.IP, external bool, ipFamily util.IPFamily, pauseImage string, initialTaints []corev1.Taint, extraKubeletFlags []string) (string, error) {\n\twithNodeIPFlag := withNodeIPFlag(ipFamily, cloudProvider, external)\n\n\ttmpl, err := template.New(\"kubelet-flags\").Funcs(TxtFuncMap(log)).\n\t\tParse(kubeletFlagsTpl(withNodeIPFlag))\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to parse kubelet-flags template: %w\", err)\n\t}\n\n\tinitialTaintsArgs := []string{}\n\tfor _, taint := range initialTaints {\n\t\tinitialTaintsArgs = append(initialTaintsArgs, fmt.Sprintf(\"%s=%s:%s\", taint.Key, taint.Value, taint.Effect))\n\t}\n\n\tkubeletFlags := make([]string, len(extraKubeletFlags))\n\tcopy(kubeletFlags, extraKubeletFlags)\n\n\tdata := struct {\n\t\tCloudProvider string\n\t\tHostname string\n\t\tClusterDNSIPs []net.IP\n\t\tKubeletVersion string\n\t\tIsExternal bool\n\t\tIPFamily util.IPFamily\n\t\tPauseImage string\n\t\tInitialTaints string\n\t\tExtraKubeletFlags []string\n\t}{\n\t\tCloudProvider: cloudProvider,\n\t\tHostname: hostname,\n\t\tClusterDNSIPs: dnsIPs,\n\t\tKubeletVersion: version,\n\t\tIsExternal: external,\n\t\tIPFamily: ipFamily,\n\t\tPauseImage: pauseImage,\n\t\tInitialTaints: strings.Join(initialTaintsArgs, \",\"),\n\t\tExtraKubeletFlags: kubeletFlags,\n\t}\n\n\tvar buf strings.Builder\n\tif err = tmpl.Execute(&buf, data); err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to execute kubelet-flags template: %w\", err)\n\t}\n\n\treturn buf.String(), nil\n}", "title": "" }, { "docid": "2f4322290a9a690d6ad876635b2614e2", "score": "0.48554936", "text": "func buildRBAC(node *model.Proxy, push *model.PushContext, suffix string, context *tls.DownstreamTlsContext,\n\ta rbacpb.RBAC_Action, policies []model.AuthorizationPolicy,\n) *rbacpb.RBAC {\n\trules := &rbacpb.RBAC{\n\t\tAction: a,\n\t\tPolicies: map[string]*rbacpb.Policy{},\n\t}\n\tfor _, policy := range policies {\n\t\tfor i, rule := range policy.Spec.Rules {\n\t\t\tname := fmt.Sprintf(\"%s-%s-%d\", policy.Namespace, policy.Name, i)\n\t\t\tm, err := authzmodel.New(rule)\n\t\t\tif err != nil {\n\t\t\t\tlog.Warnf(\"Invalid rule %v: %v\", rule, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tgenerated, _ := m.Generate(false, true, a)\n\t\t\trules.Policies[name] = generated\n\t\t}\n\t}\n\n\treturn rules\n}", "title": "" }, { "docid": "82bdd60408b1788951c7e6dff19213c2", "score": "0.48520586", "text": "func WebhookMutator(w http.ResponseWriter, r *http.Request) {\n\tvar body []byte\n\tmode := os.Getenv(\"MODE\")\n\tclientset, err := kubernetes.NewForConfig(GetKubeConfig(mode))\n\tif err != nil {\n\t\tlog.Println(\"error creating the clientset from kubeconfig\")\n\t\tpanic(err.Error())\n\t}\n\tvar msg string\n\tif r.Body != nil {\n\t\tif data, err := ioutil.ReadAll(r.Body); err == nil {\n\t\t\tbody = data\n\t\t}\n\t}\n\tif len(body) == 0 {\n\t\tlog.Println(\"empty body\")\n\t\thttp.Error(w, \"empty body\", http.StatusBadRequest)\n\t\treturn\n\t}\n\tlog.Println(\"Received request\")\n\n\tif r.URL.Path != \"/mutate\" {\n\t\tlog.Println(\"no mutate\")\n\t\thttp.Error(w, \"no mutate\", http.StatusBadRequest)\n\t\treturn\n\t}\n\tpod := v1.Pod{}\n\tif mode == \"DEV\" {\n\t\t//Code for testing the pod config on local setup\n\t\tif err := json.Unmarshal(body, &pod); err != nil {\n\t\t\tlog.Println(\"error deserializing pod\")\n\t\t\treturn\n\t\t}\n\t} else {\n\t\t// Code for InCluster config on k8s cluster\n\t\tarRequest := v1beta1.AdmissionReview{}\n\t\tif err := json.Unmarshal(body, &arRequest); err != nil {\n\t\t\thttp.Error(w, \"incorrect body\", http.StatusBadRequest)\n\t\t}\n\t\traw := arRequest.Request.Object.Raw\n\t\tif err := json.Unmarshal(raw, &pod); err != nil {\n\t\t\tlog.Println(\"error deserializing pod\")\n\t\t\treturn\n\t\t}\n\t}\n\tif pod.Labels[\"cross-platform-build\"] != \"enabled\" {\n\t\tmsg = \"No action required for pod :\" + pod.Name\n\t} else {\n\t\tdupPod := CopyPod(pod)\n\t\tif dupPod == nil {\n\t\t\tmsg = \"No supported orig image found. \" + pod.Name\n\t\t} else {\n\t\t\t//log.Println(dupPod.Spec.Containers[0].Args[0])\n\t\t\t//log.Println(dupPod.Spec.Containers[0].Args[1])\n\t\t\tlog.Println(dupPod.Spec.Tolerations)\n\t\t\t_, err := clientset.CoreV1().Pods(pod.Namespace).Create(context.TODO(), dupPod, metav1.CreateOptions{})\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t\tmsg = \"Error. Cross platform Pod didnt create successfully for pod \" + pod.Name\n\t\t\t} else {\n\t\t\t\tmsg = \"Cross platform Pod created successfully for pod \" + pod.Name\n\t\t\t}\n\t\t\tlog.Println(msg)\n\t\t}\n\t}\n\tarResponse := v1beta1.AdmissionReview{\n\t\tResponse: &v1beta1.AdmissionResponse{\n\t\t\tAllowed: true,\n\t\t\tResult: &metav1.Status{\n\t\t\t\tMessage: msg,\n\t\t\t},\n\t\t},\n\t}\n\tresp, err := json.Marshal(arResponse)\n\tif err != nil {\n\t\tlog.Printf(\"Can't encode response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not encode response: %v\", err), http.StatusInternalServerError)\n\t}\n\tlog.Println(\"Ready to write reponse ...\")\n\tif _, err := w.Write(resp); err != nil {\n\t\tlog.Printf(\"Can't write response: %v\", err)\n\t\thttp.Error(w, fmt.Sprintf(\"could not write response: %v\", err), http.StatusInternalServerError)\n\t}\n\n}", "title": "" }, { "docid": "103327a74e44b8c3f9479b524dab14a2", "score": "0.48412597", "text": "func TestGetKubeResources(t *testing.T) {\n\tdefer os.Remove(TempManifest)\n\tc := NewMockClient(t, nil)\n\tmanifest := `---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: nginx-deployment\n\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: my-service\n\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: lb-service\n spec:\n type: LoadBalancer`\n\texpectedMap := map[string]interface{}{\n\t\t\"Deployment\": map[string]interface{}{\n\t\t\t\"nginx-deployment\": map[string]interface{}{\n\t\t\t\t\"Namespace\": \"default\", \"Spec\": interface{}(nil), \"Status\": map[string]interface{}{\n\t\t\t\t\t\"ReadyReplicas\": \"1\",\n\t\t\t\t},\n\t\t\t},\n\t\t}, \"Service\": map[string]interface{}{\n\t\t\t\"lb-service\": map[string]interface{}{\n\t\t\t\t\"Namespace\": \"default\", \"Spec\": map[string]interface{}{\n\t\t\t\t\t\"ClusterIP\": \"127.0.0.1\", \"Type\": \"LoadBalancer\",\n\t\t\t\t}, \"Status\": map[string]interface{}{\n\t\t\t\t\t\"LoadBalancer\": map[string]interface{}{\n\t\t\t\t\t\t\"Ingress\": []interface{}{\n\t\t\t\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\t\t\t\"Hostname\": \"elb.test.com\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t}, \"my-service\": map[string]interface{}{\n\t\t\t\t\"Namespace\": \"default\", \"Spec\": map[string]interface{}{\n\t\t\t\t\t\"ClusterIP\": \"127.0.0.1\", \"Type\": \"ClusterIP\",\n\t\t\t\t}, \"Status\": interface{}(nil),\n\t\t\t},\n\t\t},\n\t}\n\trd := &ReleaseData{\n\t\tName: \"test\",\n\t\tNamespace: \"default\",\n\t\tManifest: manifest,\n\t}\n\tresult, err := c.GetKubeResources(rd)\n\tassert.Nil(t, err)\n\tassert.EqualValues(t, expectedMap, result)\n}", "title": "" }, { "docid": "192eb56f564bd7ac86146d40761f27b3", "score": "0.483649", "text": "func (c Config) rules() []admissionregv1.RuleWithOperations {\n\twhConfig := admissionregv1.RuleWithOperations{\n\t\tRule: admissionregv1.Rule{\n\t\t\tAPIGroups: c.Groups,\n\t\t\tAPIVersions: c.Versions,\n\t\t\tResources: c.Resources,\n\t\t},\n\t\tOperations: make([]admissionregv1.OperationType, len(c.Verbs)),\n\t}\n\n\tfor i, verbRaw := range c.Verbs {\n\t\twhConfig.Operations[i] = verbToAPIVariant(verbRaw)\n\t}\n\n\t// fix the group names, since letting people type \"core\" is nice\n\tfor i, group := range whConfig.APIGroups {\n\t\tif group == \"core\" {\n\t\t\twhConfig.APIGroups[i] = \"\"\n\t\t}\n\t}\n\n\treturn []admissionregv1.RuleWithOperations{whConfig}\n}", "title": "" }, { "docid": "c9bfc788d81b612b62b152bfb1ac3a2a", "score": "0.48350847", "text": "func TestPodAdmission(t *testing.T) {\n\tnamespace := &corev1.Namespace{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: \"testProject\",\n\t\t\tNamespace: \"\",\n\t\t},\n\t}\n\n\thandler := &podNodeEnvironment{}\n\tpod := &kapi.Pod{\n\t\tObjectMeta: metav1.ObjectMeta{Name: \"testPod\"},\n\t}\n\n\ttests := []struct {\n\t\tdefaultNodeSelector string\n\t\tprojectNodeSelector string\n\t\tpodNodeSelector map[string]string\n\t\tmergedNodeSelector map[string]string\n\t\tignoreProjectNodeSelector bool\n\t\tadmit bool\n\t\ttestName string\n\t}{\n\t\t{\n\t\t\tdefaultNodeSelector: \"\",\n\t\t\tpodNodeSelector: map[string]string{},\n\t\t\tmergedNodeSelector: map[string]string{},\n\t\t\tignoreProjectNodeSelector: true,\n\t\t\tadmit: true,\n\t\t\ttestName: \"No node selectors\",\n\t\t},\n\t\t{\n\t\t\tdefaultNodeSelector: \"infra = false\",\n\t\t\tpodNodeSelector: map[string]string{},\n\t\t\tmergedNodeSelector: map[string]string{\"infra\": \"false\"},\n\t\t\tignoreProjectNodeSelector: true,\n\t\t\tadmit: true,\n\t\t\ttestName: \"Default node selector and no conflicts\",\n\t\t},\n\t\t{\n\t\t\tdefaultNodeSelector: \"\",\n\t\t\tprojectNodeSelector: \"infra = false\",\n\t\t\tpodNodeSelector: map[string]string{},\n\t\t\tmergedNodeSelector: map[string]string{\"infra\": \"false\"},\n\t\t\tadmit: true,\n\t\t\ttestName: \"Project node selector and no conflicts\",\n\t\t},\n\t\t{\n\t\t\tdefaultNodeSelector: \"infra = false\",\n\t\t\tprojectNodeSelector: \"\",\n\t\t\tpodNodeSelector: map[string]string{},\n\t\t\tmergedNodeSelector: map[string]string{},\n\t\t\tadmit: true,\n\t\t\ttestName: \"Empty project node selector and no conflicts\",\n\t\t},\n\t\t{\n\t\t\tdefaultNodeSelector: \"infra = false\",\n\t\t\tprojectNodeSelector: \"infra=true\",\n\t\t\tpodNodeSelector: map[string]string{},\n\t\t\tmergedNodeSelector: map[string]string{\"infra\": \"true\"},\n\t\t\tadmit: true,\n\t\t\ttestName: \"Default and project node selector, no conflicts\",\n\t\t},\n\t\t{\n\t\t\tdefaultNodeSelector: \"infra = false\",\n\t\t\tprojectNodeSelector: \"infra=true\",\n\t\t\tpodNodeSelector: map[string]string{\"env\": \"test\"},\n\t\t\tmergedNodeSelector: map[string]string{\"infra\": \"true\", \"env\": \"test\"},\n\t\t\tadmit: true,\n\t\t\ttestName: \"Project and pod node selector, no conflicts\",\n\t\t},\n\t\t{\n\t\t\tdefaultNodeSelector: \"env = test\",\n\t\t\tprojectNodeSelector: \"infra=true\",\n\t\t\tpodNodeSelector: map[string]string{\"infra\": \"false\"},\n\t\t\tmergedNodeSelector: map[string]string{\"infra\": \"false\"},\n\t\t\tadmit: false,\n\t\t\ttestName: \"Conflicting pod and project node selector, one label\",\n\t\t},\n\t\t{\n\t\t\tdefaultNodeSelector: \"env=dev\",\n\t\t\tprojectNodeSelector: \"infra=false, env = test\",\n\t\t\tpodNodeSelector: map[string]string{\"env\": \"dev\", \"color\": \"blue\"},\n\t\t\tmergedNodeSelector: map[string]string{\"env\": \"dev\", \"color\": \"blue\"},\n\t\t\tadmit: false,\n\t\t\ttestName: \"Conflicting pod and project node selector, multiple labels\",\n\t\t},\n\t}\n\tfor _, test := range tests {\n\t\tindexer := cache.NewIndexer(cache.MetaNamespaceKeyFunc, cache.Indexers{})\n\t\tindexer.Add(namespace)\n\t\thandler.nsLister = corev1listers.NewNamespaceLister(indexer)\n\t\thandler.nsListerSynced = func() bool { return true }\n\t\thandler.defaultNodeSelector = test.defaultNodeSelector\n\n\t\tif !test.ignoreProjectNodeSelector {\n\t\t\tnamespace.ObjectMeta.Annotations = map[string]string{projectv1.ProjectNodeSelector: test.projectNodeSelector}\n\t\t}\n\t\tpod.Spec = kapi.PodSpec{NodeSelector: test.podNodeSelector}\n\n\t\tattrs := admission.NewAttributesRecord(pod, nil, kapi.Kind(\"Pod\").WithVersion(\"version\"), \"testProject\", namespace.ObjectMeta.Name, kapi.Resource(\"pods\").WithVersion(\"version\"), \"\", admission.Create, nil, false, nil)\n\t\terr := handler.Admit(context.TODO(), attrs, nil)\n\t\tif test.admit && err != nil {\n\t\t\tt.Errorf(\"Test: %s, expected no error but got: %s\", test.testName, err)\n\t\t} else if !test.admit && err == nil {\n\t\t\tt.Errorf(\"Test: %s, expected an error\", test.testName)\n\t\t} else if err == nil {\n\t\t\tif err := handler.Validate(context.TODO(), attrs, nil); err != nil {\n\t\t\t\tt.Errorf(\"Test: %s, unexpected Validate error after Admit succeeded: %v\", test.testName, err)\n\t\t\t}\n\t\t}\n\n\t\tif !labelselector.Equals(test.mergedNodeSelector, pod.Spec.NodeSelector) {\n\t\t\tt.Errorf(\"Test: %s, expected: %s but got: %s\", test.testName, test.mergedNodeSelector, pod.Spec.NodeSelector)\n\t\t} else if len(test.projectNodeSelector) > 0 {\n\t\t\tfirstProjectKey := strings.TrimSpace(strings.Split(test.projectNodeSelector, \"=\")[0])\n\t\t\tdelete(pod.Spec.NodeSelector, firstProjectKey)\n\t\t\tif err := handler.Validate(context.TODO(), attrs, nil); err == nil {\n\t\t\t\tt.Errorf(\"Test: %s, expected Validate error after removing project key %q\", test.testName, firstProjectKey)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "7c9e65945aff3c2068a7e155ac53b708", "score": "0.4828232", "text": "func TestAdmission(t *testing.T) {\n\tnamespace := \"test\"\n\thandler := admissiontesting.WithReinvocationTesting(t, &AlwaysPullImages{})\n\tpod := api.Pod{\n\t\tObjectMeta: metav1.ObjectMeta{Name: \"123\", Namespace: namespace},\n\t\tSpec: api.PodSpec{\n\t\t\tInitContainers: []api.Container{\n\t\t\t\t{Name: \"init1\", Image: \"image\"},\n\t\t\t\t{Name: \"init2\", Image: \"image\", ImagePullPolicy: api.PullNever},\n\t\t\t\t{Name: \"init3\", Image: \"image\", ImagePullPolicy: api.PullIfNotPresent},\n\t\t\t\t{Name: \"init4\", Image: \"image\", ImagePullPolicy: api.PullAlways},\n\t\t\t},\n\t\t\tContainers: []api.Container{\n\t\t\t\t{Name: \"ctr1\", Image: \"image\"},\n\t\t\t\t{Name: \"ctr2\", Image: \"image\", ImagePullPolicy: api.PullNever},\n\t\t\t\t{Name: \"ctr3\", Image: \"image\", ImagePullPolicy: api.PullIfNotPresent},\n\t\t\t\t{Name: \"ctr4\", Image: \"image\", ImagePullPolicy: api.PullAlways},\n\t\t\t},\n\t\t},\n\t}\n\terr := handler.Admit(context.TODO(), admission.NewAttributesRecord(&pod, nil, api.Kind(\"Pod\").WithVersion(\"version\"), pod.Namespace, pod.Name, api.Resource(\"pods\").WithVersion(\"version\"), \"\", admission.Create, &metav1.CreateOptions{}, false, nil), nil)\n\tif err != nil {\n\t\tt.Errorf(\"Unexpected error returned from admission handler\")\n\t}\n\tfor _, c := range pod.Spec.InitContainers {\n\t\tif c.ImagePullPolicy != api.PullAlways {\n\t\t\tt.Errorf(\"Container %v: expected pull always, got %v\", c, c.ImagePullPolicy)\n\t\t}\n\t}\n\tfor _, c := range pod.Spec.Containers {\n\t\tif c.ImagePullPolicy != api.PullAlways {\n\t\t\tt.Errorf(\"Container %v: expected pull always, got %v\", c, c.ImagePullPolicy)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "6cd7d3fe96404763c7c26f5a53d12e0b", "score": "0.48079067", "text": "func namespacesWithAccess(serverResources []*metav1.APIResourceList, allRules map[string][]authorizationv1.ResourceRule) []string {\n\t// There is always at least one rule, which allows \"create\" on \"selfsubjectaccessreviews\"\n\tnamespaced := make(map[string]bool)\n\tfor _, resList := range serverResources {\n\t\tgroup := \"\"\n\t\tif gv := resList.GroupVersion; strings.Contains(gv, \"/\") {\n\t\t\tgroup = strings.Split(gv, \"/\")[0]\n\t\t}\n\t\tfor _, res := range resList.APIResources {\n\t\t\tif !res.Namespaced {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tg := res.Group\n\t\t\tif g == \"\" {\n\t\t\t\tg = group\n\t\t\t}\n\t\t\tnamespaced[fmt.Sprintf(\"*/%s\", res.Name)] = true\n\t\t\tif g != \"\" {\n\t\t\t\tnamespaced[fmt.Sprintf(\"%s/%s\", g, res.Name)] = true\n\t\t\t} else {\n\t\t\t\tnamespaced[res.Name] = true\n\t\t\t}\n\t\t}\n\t}\n\tresult := make([]string, 0)\n\tfor ns, rules := range allRules {\n\tL:\n\t\tfor _, rule := range rules {\n\t\t\tfor _, ag := range rule.APIGroups {\n\t\t\t\tfor _, r := range rule.Resources {\n\t\t\t\t\trg := r\n\t\t\t\t\tif ag != \"\" {\n\t\t\t\t\t\trg = ag + \"/\" + r\n\t\t\t\t\t}\n\t\t\t\t\tif rg == \"*\" || rg == \"*/*\" || namespaced[rg] {\n\t\t\t\t\t\tresult = append(result, ns)\n\t\t\t\t\t\tbreak L\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "7864f0bf8f8d17f8151857e4190283c4", "score": "0.47882333", "text": "func List(namespace string) (releases map[string]ParametersType, err error) {\n\targs := []string{\"get\", \"all\", fmt.Sprintf(\"--namespace=%s\", namespace), \"-o\", \"yaml\"}\n\tcmd := exec.Command(\"kubectl\", args...)\n\n\toutput, err := cmd.Output()\n\n\tif err != nil {\n\t\tif err, ok := err.(*exec.ExitError); ok {\n\t\t\treturn nil, fmt.Errorf(\"kubectl failed: %s\", err.Stderr)\n\t\t}\n\n\t\treturn nil, err\n\t}\n\n\tdocument := Document{Context: NewContext(\"\", namespace)}\n\n\tif err = yaml.NewDecoder(bytes.NewBuffer(output)).Decode(&document); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to decode YAML output of kubectl: %s\", err)\n\t}\n\n\treleases = make(map[string]ParametersType)\n\n\tfor _, document := range document.AsFlatList() {\n\t\tif release := document.Release(); release != \"\" {\n\t\t\t// TODO: Read parameters for deployment unit\n\t\t\treleases[release] = nil\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "35952cca1b5703f7e127ef4485aeceb3", "score": "0.4776988", "text": "func (r *ServiceAccountReconciler) Reconcile(req ctrl.Request) (ctrl.Result, error) {\n\treqLogger := log.WithValues(\"Request.Namespace\", req.Namespace, \"Request.Name\", req.Name)\n\n\tinstance := &corev1.ServiceAccount{}\n\terr := r.Client.Get(context.TODO(), req.NamespacedName, instance)\n\tif err != nil {\n\t\tif k8serrors.IsNotFound(err) {\n\t\t\treturn reconcile.Result{}, nil\n\t\t}\n\t\treturn reconcile.Result{}, err\n\t}\n\n\tif val, ok := instance.Annotations[AnnotationPrefix+\"/\"+AutoConfigureAnnotation]; !ok || val != \"true\" {\n\t\treturn reconcile.Result{}, nil\n\t}\n\n\tif instance.ObjectMeta.Name == \"default\" {\n\t\treqLogger.V(1).Info(fmt.Sprintf(\"Explicitly ignoring 'default' ServiceAccount in namespace %s, to avoid overwriting Vaults 'default' policy\", instance.ObjectMeta.Namespace))\n\t\treturn reconcile.Result{}, nil\n\t}\n\n\tvaultConfig := &bankvaultsv1alpha1.Vault{}\n\tns, _ := getOperatorNamespace()\n\terr = r.Client.Get(context.TODO(), types.NamespacedName{Name: TargetVaultName, Namespace: ns}, vaultConfig)\n\tif err != nil {\n\t\treturn reconcile.Result{}, err\n\t}\n\tvar bvConfig BankVaultsConfig\n\tjsonData, _ := json.Marshal(vaultConfig.Spec.ExternalConfig)\n\terr = json.Unmarshal(jsonData, &bvConfig)\n\tif err != nil {\n\t\treturn reconcile.Result{}, err\n\t}\n\tconfigMap := &corev1.ConfigMap{}\n\terr = r.Client.Get(context.TODO(), types.NamespacedName{Name: \"vault-dynamic-configuration\", Namespace: \"vault\"}, configMap)\n\tif err != nil {\n\t\treqLogger.V(1).Info(\"vault-dynamic-configuration ConfigMap not found, using defaults\")\n\t}\n\terr = addOrUpdatePolicy(&bvConfig, instance.ObjectMeta, *configMap)\n\tif err != nil {\n\t\treturn reconcile.Result{}, err\n\t}\n\tkubernetesAuth, err := bvConfig.getKubernetesAuth()\n\tif err != nil {\n\t\treturn reconcile.Result{}, err\n\t}\n\taddOrUpdateKubernetesRole(kubernetesAuth, instance.ObjectMeta)\n\treqLogger.V(1).Info(\"Added Kubernetes role\")\n\terr = updateKubernetesConfiguration(bvConfig, vaultConfig)\n\tif err != nil {\n\t\treturn reconcile.Result{}, err\n\t}\n\tr.Client.Update(context.TODO(), vaultConfig)\n\n\ttargetDb, ok := instance.Annotations[AnnotationPrefix+\"/\"+DynamicDBCredentialsAnnotation]\n\tif !ok {\n\t\treturn reconcile.Result{}, nil\n\t}\n\terr = addOrUpdateDBRole(&bvConfig, instance.ObjectMeta, *configMap, targetDb)\n\tif err != nil {\n\t\treturn reconcile.Result{}, err\n\t}\n\terr = updateDBSecretConfiguration(bvConfig, vaultConfig)\n\tif err != nil {\n\t\treturn reconcile.Result{}, err\n\t}\n\tr.Client.Update(context.TODO(), vaultConfig)\n\treturn reconcile.Result{}, nil\n}", "title": "" }, { "docid": "503d536cb7339ce586ec2887e3831010", "score": "0.47669446", "text": "func updateClaimOwnerRefForSetAndPod(logger klog.Logger, claim *v1.PersistentVolumeClaim, set *apps.StatefulSet, pod *v1.Pod) bool {\n\tneedsUpdate := false\n\t// Sometimes the version and kind are not set {pod,set}.TypeMeta. These are necessary for the ownerRef.\n\t// This is the case both in real clusters and the unittests.\n\t// TODO: there must be a better way to do this other than hardcoding the pod version?\n\tupdateMeta := func(tm *metav1.TypeMeta, kind string) {\n\t\tif tm.APIVersion == \"\" {\n\t\t\tif kind == \"StatefulSet\" {\n\t\t\t\ttm.APIVersion = \"apps/v1\"\n\t\t\t} else {\n\t\t\t\ttm.APIVersion = \"v1\"\n\t\t\t}\n\t\t}\n\t\tif tm.Kind == \"\" {\n\t\t\ttm.Kind = kind\n\t\t}\n\t}\n\tpodMeta := pod.TypeMeta\n\tupdateMeta(&podMeta, \"Pod\")\n\tsetMeta := set.TypeMeta\n\tupdateMeta(&setMeta, \"StatefulSet\")\n\tpolicy := getPersistentVolumeClaimRetentionPolicy(set)\n\tconst retain = apps.RetainPersistentVolumeClaimRetentionPolicyType\n\tconst delete = apps.DeletePersistentVolumeClaimRetentionPolicyType\n\tswitch {\n\tdefault:\n\t\tlogger.Error(nil, \"Unknown policy, treating as Retain\", \"policy\", set.Spec.PersistentVolumeClaimRetentionPolicy)\n\t\tfallthrough\n\tcase policy.WhenScaled == retain && policy.WhenDeleted == retain:\n\t\tneedsUpdate = removeOwnerRef(claim, set) || needsUpdate\n\t\tneedsUpdate = removeOwnerRef(claim, pod) || needsUpdate\n\tcase policy.WhenScaled == retain && policy.WhenDeleted == delete:\n\t\tneedsUpdate = setOwnerRef(claim, set, &setMeta) || needsUpdate\n\t\tneedsUpdate = removeOwnerRef(claim, pod) || needsUpdate\n\tcase policy.WhenScaled == delete && policy.WhenDeleted == retain:\n\t\tneedsUpdate = removeOwnerRef(claim, set) || needsUpdate\n\t\tpodScaledDown := !podInOrdinalRange(pod, set)\n\t\tif podScaledDown {\n\t\t\tneedsUpdate = setOwnerRef(claim, pod, &podMeta) || needsUpdate\n\t\t}\n\t\tif !podScaledDown {\n\t\t\tneedsUpdate = removeOwnerRef(claim, pod) || needsUpdate\n\t\t}\n\tcase policy.WhenScaled == delete && policy.WhenDeleted == delete:\n\t\tpodScaledDown := !podInOrdinalRange(pod, set)\n\t\tif podScaledDown {\n\t\t\tneedsUpdate = removeOwnerRef(claim, set) || needsUpdate\n\t\t\tneedsUpdate = setOwnerRef(claim, pod, &podMeta) || needsUpdate\n\t\t}\n\t\tif !podScaledDown {\n\t\t\tneedsUpdate = setOwnerRef(claim, set, &setMeta) || needsUpdate\n\t\t\tneedsUpdate = removeOwnerRef(claim, pod) || needsUpdate\n\t\t}\n\t}\n\treturn needsUpdate\n}", "title": "" }, { "docid": "fe2365239c2517b18822baca3421bc9f", "score": "0.4765767", "text": "func main() {\n\tctx := context.Background()\n\tlog.SetFlags(0)\n\tkcfg := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(clientcmd.NewDefaultClientConfigLoadingRules(), &clientcmd.ConfigOverrides{})\n\tcfg, err := kcfg.ClientConfig()\n\tif err != nil {\n\t\tlog.Fatalf(\"cannot load config: %v\", err)\n\t}\n\n\tclient := apiext.NewForConfigOrDie(cfg)\n\tfor _, path := range []string{\n\t\t\"vendor/github.com/openshift/api/config/v1/0000_00_cluster-version-operator_01_clusterversion.crd.yaml\",\n\t\t\"vendor/github.com/openshift/api/config/v1/0000_00_cluster-version-operator_01_clusteroperator.crd.yaml\",\n\t} {\n\t\tvar name string\n\t\terr := wait.PollUntilContextTimeout(ctx, time.Second, 30*time.Second, true, func(localCtx context.Context) (bool, error) {\n\t\t\tdata, err := os.ReadFile(path)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"Unable to read %s: %v\", path, err)\n\t\t\t}\n\t\t\tvar crd v1.CustomResourceDefinition\n\t\t\tif err := yaml.Unmarshal(data, &crd); err != nil {\n\t\t\t\tlog.Fatalf(\"Unable to parse CRD %s: %v\", path, err)\n\t\t\t}\n\t\t\tname = crd.Name\n\t\t\t_, err = client.ApiextensionsV1().CustomResourceDefinitions().Create(localCtx, &crd, metav1.CreateOptions{})\n\t\t\tif errors.IsAlreadyExists(err) {\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\tlog.Printf(\"error: failed creating CRD %s: %v\", name, err)\n\t\t\t\treturn false, nil\n\t\t\t}\n\t\t\tlog.Printf(\"Installed %s CRD\", crd.Name)\n\t\t\treturn true, nil\n\t\t})\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Could not install %s CRD: %v\", name, err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "347e48953b2df054187fc5d753f30bbe", "score": "0.47641462", "text": "func add(mgr manager.Manager, r reconcile.Reconciler) error {\n\t// Create a new controller\n\tc, err := controller.New(\"argocdcluster-controller\", mgr, controller.Options{Reconciler: r})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif utils.IsReadyACMClusterRegistry(mgr.GetAPIReader()) {\n\t\t// Watch for ACM cluster secret changes\n\t\terr = c.Watch(\n\t\t\t&source.Kind{Type: &v1.Secret{}}, &handler.EnqueueRequestForObject{}, utils.AcmClusterSecretPredicateFunc,\n\t\t)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Watch for ArgoCD cluster secret changes\n\t\terr = c.Watch(\n\t\t\t&source.Kind{Type: &v1.Secret{}},\n\t\t\t&handler.EnqueueRequestsFromMapFunc{ToRequests: &argocdSecretRuleMapper{mgr.GetClient()}},\n\t\t\tutils.ArgocdClusterSecretPredicateFunc)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Watch for KlusterletAddonConfig argocdCluster setting changes\n\t\terr = c.Watch(\n\t\t\t&source.Kind{Type: &agentv1.KlusterletAddonConfig{}},\n\t\t\t&handler.EnqueueRequestsFromMapFunc{ToRequests: &argocdAddonConfigRuleMapper{mgr.GetClient()}})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Watch for argocd server changes\n\t\terr = c.Watch(\n\t\t\t&source.Kind{Type: &v1.Service{}},\n\t\t\t&handler.EnqueueRequestsFromMapFunc{ToRequests: &argocdServerRuleMapper{mgr.GetClient()}},\n\t\t\tutils.ArgocdServerPredicateFunc)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6e95049af364ef08b9f7fb2f6c3e0e49", "score": "0.47586355", "text": "func updateHelp(names []string, c *cobra.Command) {\n\tfor i := range names {\n\t\tname := names[i]\n\t\tc.Short = strings.ReplaceAll(c.Short, \"kubectl \"+name, \"kapply \"+name)\n\t\tc.Long = strings.ReplaceAll(c.Long, \"kubectl \"+name, \"kapply \"+name)\n\t\tc.Example = strings.ReplaceAll(c.Example, \"kubectl \"+name, \"kapply \"+name)\n\t}\n}", "title": "" }, { "docid": "c856471d6eaf444b02d9a286a60a1bb1", "score": "0.47574362", "text": "func getKubeConfigSubCommands(out io.Writer, outDir, defaultKubernetesVersion string) []*cobra.Command {\n\n\tcfg := &kubeadmapiext.MasterConfiguration{}\n\n\t// This is used for unit testing only...\n\t// If we wouldn't set this to something, the code would dynamically look up the version from the internet\n\t// By setting this explicitely for tests workarounds that\n\tif defaultKubernetesVersion != \"\" {\n\t\tcfg.KubernetesVersion = defaultKubernetesVersion\n\t}\n\n\t// Default values for the cobra help text\n\tapi.Scheme.Default(cfg)\n\n\tvar cfgPath, token, clientName string\n\tvar subCmds []*cobra.Command\n\n\tsubCmdProperties := []struct {\n\t\tuse string\n\t\tshort string\n\t\tcmdFunc func(outDir string, cfg *kubeadmapi.MasterConfiguration) error\n\t}{\n\t\t{\n\t\t\tuse: \"all\",\n\t\t\tshort: \"Generate all kubeconfig files necessary to establish the control plane and the admin kubeconfig file.\",\n\t\t\tcmdFunc: kubeconfigphase.CreateInitKubeConfigFiles,\n\t\t},\n\t\t{\n\t\t\tuse: \"admin\",\n\t\t\tshort: \"Generate a kubeconfig file for the admin to use and for kubeadm itself.\",\n\t\t\tcmdFunc: kubeconfigphase.CreateAdminKubeConfigFile,\n\t\t},\n\t\t{\n\t\t\tuse: \"kubelet\",\n\t\t\tshort: \"Generate a kubeconfig file for the Kubelet to use. Please note that this should *only* be used for bootstrapping purposes. After your control plane is up, you should request all kubelet credentials from the CSR API.\",\n\t\t\tcmdFunc: kubeconfigphase.CreateKubeletKubeConfigFile,\n\t\t},\n\t\t{\n\t\t\tuse: \"controller-manager\",\n\t\t\tshort: \"Generate a kubeconfig file for the Controller Manager to use.\",\n\t\t\tcmdFunc: kubeconfigphase.CreateControllerManagerKubeConfigFile,\n\t\t},\n\t\t{\n\t\t\tuse: \"scheduler\",\n\t\t\tshort: \"Generate a kubeconfig file for the Scheduler to use.\",\n\t\t\tcmdFunc: kubeconfigphase.CreateSchedulerKubeConfigFile,\n\t\t},\n\t\t{\n\t\t\tuse: \"user\",\n\t\t\tshort: \"Outputs a kubeconfig file for an additional user.\",\n\t\t\tcmdFunc: func(outDir string, cfg *kubeadmapi.MasterConfiguration) error {\n\t\t\t\tif clientName == \"\" {\n\t\t\t\t\treturn fmt.Errorf(\"missing required argument client-name\")\n\t\t\t\t}\n\n\t\t\t\t// if the kubeconfig file for an additional user has to use a token, use it\n\t\t\t\tif token != \"\" {\n\t\t\t\t\treturn kubeconfigphase.WriteKubeConfigWithToken(out, cfg, clientName, token)\n\t\t\t\t}\n\n\t\t\t\t// Otherwise, write a kubeconfig file with a generate client cert\n\t\t\t\treturn kubeconfigphase.WriteKubeConfigWithClientCert(out, cfg, clientName)\n\t\t\t},\n\t\t},\n\t}\n\n\tfor _, properties := range subCmdProperties {\n\t\t// Creates the UX Command\n\t\tcmd := &cobra.Command{\n\t\t\tUse: properties.use,\n\t\t\tShort: properties.short,\n\t\t\tRun: runCmdPhase(properties.cmdFunc, &outDir, &cfgPath, cfg),\n\t\t}\n\n\t\t// Add flags to the command\n\t\tif properties.use != \"user\" {\n\t\t\tcmd.Flags().StringVar(&cfgPath, \"config\", cfgPath, \"Path to kubeadm config file (WARNING: Usage of a configuration file is experimental)\")\n\t\t}\n\t\tcmd.Flags().StringVar(&cfg.CertificatesDir, \"cert-dir\", cfg.CertificatesDir, \"The path where certificates are stored.\")\n\t\tcmd.Flags().StringVar(&cfg.API.AdvertiseAddress, \"apiserver-advertise-address\", cfg.API.AdvertiseAddress, \"The IP address or DNS name the API Server is accessible on.\")\n\t\tcmd.Flags().Int32Var(&cfg.API.BindPort, \"apiserver-bind-port\", cfg.API.BindPort, \"The port the API Server is accessible on.\")\n\t\tif properties.use == \"all\" || properties.use == \"kubelet\" {\n\t\t\tcmd.Flags().StringVar(&cfg.NodeName, \"node-name\", cfg.NodeName, `The node name that the kubelet client cert should use.`)\n\t\t}\n\t\tif properties.use == \"user\" {\n\t\t\tcmd.Flags().StringVar(&token, \"token\", token, \"The token that should be used as the authentication mechanism for this kubeconfig.\")\n\t\t\tcmd.Flags().StringVar(&clientName, \"client-name\", clientName, \"The name of the KubeConfig user that will be created. Will also be used as the CN if client certs are created.\")\n\t\t}\n\n\t\tsubCmds = append(subCmds, cmd)\n\t}\n\n\treturn subCmds\n}", "title": "" }, { "docid": "2cdeac3042e536de9061497edae42e29", "score": "0.47573808", "text": "func TestCanIDoReturnsTrueForAllowedAction(t *testing.T) {\n\tt.Parallel()\n\n\taction := authv1.ResourceAttributes{\n\t\tNamespace: \"kube-system\",\n\t\tVerb: \"list\",\n\t\tResource: \"pod\",\n\t}\n\toptions := NewKubectlOptions(\"\", \"\", \"kube-system\")\n\tassert.True(t, CanIDo(t, options, action))\n}", "title": "" }, { "docid": "fe763cb62888bfdfb00988f5d9682c13", "score": "0.4753988", "text": "func object(name, ns string, data map[string]interface{}) ([]byte, error) {\n\t// get the appName and inject it to metadata.labels\n\tvar appName string\n\n\t// strings.Split returns a slice of byte [byte1 byte2 byte3]\n\tstr := strings.Split(name, \"-\")\n\t// verify if the slice is not empty otherwise return an error\n\tif len(str) == 0 {\n\t\treturn nil, fmt.Errorf(\"name of secrets does not satisfy the naming requirement\")\n\t}\n\t// get the second byte from right\n\tenv := str[len(str)-2]\n\t// current env name\n\tenvName := strings.Split(ns, \"-\")[0]\n\t// get the last byte from right\n\tlastByte := str[len(str)-1]\n\n\t// check the name of object has the env string or not and return the app name only\n\tif env == envName {\n\t\tif lastByte == \"secret\" || lastByte == \"secrets\" {\n\t\t\tappName = strings.Join(str[:len(str)-2], \"-\")\n\t\t} else {\n\t\t\tappName = strings.Join(str[:len(str)-1], \"-\")\n\t\t}\n\t} else if lastByte == \"secret\" || lastByte == \"secrets\" || lastByte == envName {\n\t\tappName = strings.Join(str[:len(str)-1], \"-\")\n\t} else {\n\t\tappName = name\n\t}\n\n\t// get the component or the environment\n\t// namespace naming convention is in this format env + group/squad ex. sit-sre\n\tvar component string\n\n\t// verify if the slice is not empty otherwise return an error\n\tnamespace := strings.Split(ns, \"-\")\n\tif len(namespace) == 0 {\n\t\treturn nil, fmt.Errorf(\"namespace does not satisfy the naming requirement\")\n\t}\n\t// get the component or the environment\n\tcomponent = strings.Join(namespace[1:], \"-\")\n\n\t// construct the manifest and return the values\n\tmanifest := &Secret{\n\t\tApiVersion: \"v1\",\n\t\tKind: \"Secret\",\n\t\tType: \"Opaque\",\n\t\tData: data,\n\t\tMetadata: &Meta{\n\t\t\tName: name,\n\t\t\tNamespace: ns,\n\t\t\tLabels: map[string]interface{}{\n\t\t\t\t\"app.kubernetes.io/name\": appName,\n\t\t\t\t\"app.kubernetes.io/component\": component,\n\t\t\t\t\"app.kubernetes.io/managed-by\": \"vault-gopher\",\n\t\t\t},\n\t\t},\n\t}\n\n\tret, _ := json.Marshal(manifest)\n\treturn ret, nil\n}", "title": "" }, { "docid": "4b6e650ef7dddcddc37d36371f7e5d5d", "score": "0.47533137", "text": "func getMirrorPodAnnotation() map[string]string {\n\treturn map[string]string{\n\t\t\"kubernetes.io/created-by\": \"{\\\"kind\\\":\\\"SerializedReference\\\",\\\"apiVersion\\\":\\\"v1\\\",\\\"reference\\\":{\\\"kind\\\":\\\"Pod\\\"}}\",\n\t\t\"kubernetes.io/config.source\": \"api\",\n\t\t\"kubernetes.io/config.mirror\": \"mirror\",\n\t}\n}", "title": "" }, { "docid": "333629f1b240860a3286b85cc9de1673", "score": "0.4739212", "text": "func getCli(cp cliParams) kubernetes.Interface {\n\tconst dUID types.UID = \"1234\"\n\tconst pUID types.UID = \"4567\"\n\n\tkubeObjects := []runtime.Object{\n\t\t&appsv1.Deployment{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: cp.name,\n\t\t\t\tNamespace: cp.namespace,\n\t\t\t\tUID: dUID,\n\t\t\t\tGeneration: cp.generation,\n\t\t\t},\n\t\t\tSpec: appsv1.DeploymentSpec{\n\t\t\t\tReplicas: &cp.specReplicas,\n\t\t\t},\n\t\t\tStatus: appsv1.DeploymentStatus{\n\t\t\t\tReplicas: cp.statusReplicas,\n\t\t\t\tUpdatedReplicas: cp.statusUpdatedReplicas,\n\t\t\t\tAvailableReplicas: cp.statusAvailableReplicas,\n\t\t\t\tObservedGeneration: cp.observedGeneration,\n\t\t\t},\n\t\t},\n\t\t&v1.Pod{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: \"pod\",\n\t\t\t\tNamespace: cp.namespace,\n\t\t\t\tOwnerReferences: []metav1.OwnerReference{{UID: pUID}},\n\t\t\t},\n\t\t\tStatus: v1.PodStatus{\n\t\t\t\tPhase: cp.podStatus,\n\t\t\t},\n\t\t},\n\t}\n\n\tvar podSet runtime.Object\n\tif cp.stateful {\n\t\tpodSet = &appsv1.StatefulSet{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: cp.name,\n\t\t\t\tNamespace: cp.namespace,\n\t\t\t\tUID: pUID,\n\t\t\t\tOwnerReferences: []metav1.OwnerReference{{UID: dUID}},\n\t\t\t},\n\t\t\tSpec: appsv1.StatefulSetSpec{\n\t\t\t\tReplicas: &cp.specReplicas,\n\t\t\t},\n\t\t\tStatus: appsv1.StatefulSetStatus{\n\t\t\t\tReadyReplicas: cp.statusReplicas,\n\t\t\t},\n\t\t}\n\t} else {\n\t\tpodSet = &appsv1.ReplicaSet{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: \"repset\",\n\t\t\t\tNamespace: cp.namespace,\n\t\t\t\tUID: pUID,\n\t\t\t\tOwnerReferences: []metav1.OwnerReference{{UID: dUID}},\n\t\t\t},\n\t\t\tSpec: appsv1.ReplicaSetSpec{\n\t\t\t\tReplicas: &cp.specReplicas,\n\t\t\t},\n\t\t\tStatus: appsv1.ReplicaSetStatus{},\n\t\t}\n\t}\n\tkubeObjects = append(kubeObjects, podSet)\n\n\treturn fake.NewSimpleClientset(kubeObjects...)\n}", "title": "" }, { "docid": "2df3897cdf6842a7beb9988fac232e66", "score": "0.47343087", "text": "func (cfg *Config) buildLeaderStop() []byte {\n\tstr := fmt.Sprintf(`#!/usr/bin/env bash\ncurl -X PATCH -H \"Authorization: Bearer $(cat /var/run/secrets/kubernetes.io/serviceaccount/token)\" -H \"Content-Type: application/json-patch+json\" \\\n--cacert /var/run/secrets/kubernetes.io/serviceaccount/ca.crt https://$KUBERNETES_SERVICE_HOST:$KUBERNETES_PORT_443_TCP_PORT/api/v1/namespaces/%s/pods/$HOSTNAME \\\n-d '[{\"op\": \"replace\", \"path\": \"/metadata/labels/role\", \"value\": \"follower\"}]'\n`, cfg.NameSpace)\n\treturn utils.StringToBytes(str)\n}", "title": "" }, { "docid": "d7a814dd6b8e89287d614dc5ba81df39", "score": "0.47264358", "text": "func (b *KubeControllerManagerBuilder) buildPod(kcm *kops.KubeControllerManagerConfig) (*v1.Pod, error) {\n\tpathSrvKCM := filepath.Join(b.PathSrvKubernetes(), \"kube-controller-manager\")\n\n\tflags, err := flagbuilder.BuildFlagsList(kcm)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error building kube-controller-manager flags: %v\", err)\n\t}\n\n\tflags = append(flags, \"--cloud-config=\"+InTreeCloudConfigFilePath)\n\n\t// Add kubeconfig flags\n\tfor _, flag := range []string{\"\", \"authentication-\", \"authorization-\"} {\n\t\tflags = append(flags, \"--\"+flag+\"kubeconfig=\"+\"/var/lib/kube-controller-manager/kubeconfig\")\n\t}\n\n\t// Configure CA certificate to be used to sign keys\n\tflags = append(flags, []string{\n\t\t\"--cluster-signing-cert-file=\" + filepath.Join(pathSrvKCM, \"ca.crt\"),\n\t\t\"--cluster-signing-key-file=\" + filepath.Join(pathSrvKCM, \"ca.key\"),\n\t}...)\n\n\tpod := &v1.Pod{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"Pod\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: \"kube-controller-manager\",\n\t\t\tNamespace: \"kube-system\",\n\t\t\tLabels: map[string]string{\n\t\t\t\t\"k8s-app\": \"kube-controller-manager\",\n\t\t\t},\n\t\t},\n\t\tSpec: v1.PodSpec{\n\t\t\tHostNetwork: true,\n\t\t},\n\t}\n\n\tvolumePluginDir := b.NodeupConfig.KubeletConfig.VolumePluginDirectory\n\n\t// Ensure the Volume Plugin dir is mounted on the same path as the host machine so DaemonSet deployment is possible\n\tif volumePluginDir == \"\" {\n\t\tswitch b.Distribution {\n\t\tcase distributions.DistributionContainerOS:\n\t\t\t// Default is different on ContainerOS, see https://github.com/kubernetes/kubernetes/pull/58171\n\t\t\tvolumePluginDir = \"/home/kubernetes/flexvolume/\"\n\n\t\tcase distributions.DistributionFlatcar:\n\t\t\t// The /usr directory is read-only for Flatcar\n\t\t\tvolumePluginDir = \"/var/lib/kubelet/volumeplugins/\"\n\n\t\tdefault:\n\t\t\tvolumePluginDir = \"/usr/libexec/kubernetes/kubelet-plugins/volume/exec/\"\n\t\t}\n\t}\n\n\t// Add the volumePluginDir flag if provided in the kubelet spec, or set above based on the OS\n\tflags = append(flags, \"--flex-volume-plugin-dir=\"+volumePluginDir)\n\n\timage := b.RemapImage(kcm.Image)\n\n\tcontainer := &v1.Container{\n\t\tName: \"kube-controller-manager\",\n\t\tImage: image,\n\t\tEnv: proxy.GetProxyEnvVars(b.NodeupConfig.Networking.EgressProxy),\n\t\tLivenessProbe: &v1.Probe{\n\t\t\tProbeHandler: v1.ProbeHandler{\n\t\t\t\tHTTPGet: &v1.HTTPGetAction{\n\t\t\t\t\tHost: \"127.0.0.1\",\n\t\t\t\t\tPath: \"/healthz\",\n\t\t\t\t\tPort: intstr.FromInt(10257),\n\t\t\t\t\tScheme: \"HTTPS\",\n\t\t\t\t},\n\t\t\t},\n\t\t\tInitialDelaySeconds: 15,\n\t\t\tTimeoutSeconds: 15,\n\t\t},\n\t\tResources: v1.ResourceRequirements{\n\t\t\tRequests: v1.ResourceList{\n\t\t\t\tv1.ResourceCPU: resource.MustParse(\"100m\"),\n\t\t\t},\n\t\t},\n\t}\n\n\t// Log both to docker and to the logfile\n\tkubemanifest.AddHostPathMapping(pod, container, \"logfile\", \"/var/log/kube-controller-manager.log\", kubemanifest.WithReadWrite())\n\t// We use lighter containers that don't include shells\n\t// But they have richer logging support via klog\n\t{\n\t\tcontainer.Command = []string{\"/go-runner\"}\n\t\tcontainer.Args = []string{\n\t\t\t\"--log-file=/var/log/kube-controller-manager.log\",\n\t\t\t\"--also-stdout\",\n\t\t\t\"/usr/local/bin/kube-controller-manager\",\n\t\t}\n\t\tcontainer.Args = append(container.Args, sortedStrings(flags)...)\n\t}\n\tfor _, path := range b.SSLHostPaths() {\n\t\tname := strings.Replace(path, \"/\", \"\", -1)\n\t\tkubemanifest.AddHostPathMapping(pod, container, name, path)\n\t}\n\n\tkubemanifest.AddHostPathMapping(pod, container, \"cloudconfig\", InTreeCloudConfigFilePath)\n\n\tkubemanifest.AddHostPathMapping(pod, container, \"cabundle\", filepath.Join(b.PathSrvKubernetes(), \"ca.crt\"))\n\n\tkubemanifest.AddHostPathMapping(pod, container, \"srvkcm\", pathSrvKCM)\n\n\tkubemanifest.AddHostPathMapping(pod, container, \"varlibkcm\", \"/var/lib/kube-controller-manager\")\n\n\tkubemanifest.AddHostPathMapping(pod, container, \"volplugins\", volumePluginDir, kubemanifest.WithReadWrite())\n\n\tpod.Spec.Containers = append(pod.Spec.Containers, *container)\n\n\tkubemanifest.MarkPodAsCritical(pod)\n\tkubemanifest.MarkPodAsClusterCritical(pod)\n\n\tkubemanifest.AddHostPathSELinuxContext(pod, b.NodeupConfig)\n\n\treturn pod, nil\n}", "title": "" }, { "docid": "5a233dbe72005be494348fe4f64c3ab6", "score": "0.47260976", "text": "func resourceVolterraDiscovery() *schema.Resource {\n\treturn &schema.Resource{\n\t\tCreate: resourceVolterraDiscoveryCreate,\n\t\tRead: resourceVolterraDiscoveryRead,\n\t\tUpdate: resourceVolterraDiscoveryUpdate,\n\t\tDelete: resourceVolterraDiscoveryDelete,\n\n\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\"annotations\": {\n\t\t\t\tType: schema.TypeMap,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"description\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"disable\": {\n\t\t\t\tType: schema.TypeBool,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"labels\": {\n\t\t\t\tType: schema.TypeMap,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"name\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tRequired: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"namespace\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tRequired: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"cluster_id\": {\n\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"no_cluster_id\": {\n\n\t\t\t\tType: schema.TypeBool,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"discovery_consul\": {\n\n\t\t\t\tType: schema.TypeSet,\n\t\t\t\tOptional: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\"access_info\": {\n\n\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\"connection_info\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"api_server\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"tls_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"ca_certificate_url\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info_internal\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding_type\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"clear_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"url\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"vault_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"key\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"version\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"wingman_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"certificate\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"certificate_url\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info_internal\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding_type\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"clear_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"url\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"vault_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"key\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"version\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"wingman_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"key_url\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info_internal\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding_type\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"clear_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"url\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"vault_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"key\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"version\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"wingman_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"server_name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"trusted_ca_url\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"http_basic_auth_info\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"passwd_url\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info_internal\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding_type\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"clear_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"url\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"vault_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"key\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"version\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"wingman_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"user_name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"scheme\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\"publish_info\": {\n\n\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\"disable\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"publish\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\n\t\t\t\"discovery_k8s\": {\n\n\t\t\t\tType: schema.TypeSet,\n\t\t\t\tOptional: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\"access_info\": {\n\n\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\"connection_info\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"api_server\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"tls_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"ca_certificate_url\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info_internal\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding_type\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"clear_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"url\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"vault_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"key\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"version\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"wingman_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"certificate\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"certificate_url\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info_internal\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding_type\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"clear_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"url\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"vault_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"key\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"version\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"wingman_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"key_url\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info_internal\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding_type\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"clear_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"url\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"vault_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"key\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"version\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"wingman_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"server_name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"trusted_ca_url\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"in_cluster\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"kubeconfig_url\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info_internal\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding_type\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"blindfold_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"decryption_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"store_provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"clear_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"url\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"vault_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"key\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"location\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"provider\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"secret_encoding\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"version\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"wingman_secret_info\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"isolated\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"reachable\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\"publish_info\": {\n\n\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\"disable\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"dns_delegation\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"dns_mode\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"subdomain\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"publish\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"namespace\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"publish_fqdns\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\n\t\t\t\"where\": {\n\n\t\t\t\tType: schema.TypeSet,\n\t\t\t\tOptional: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\"site\": {\n\n\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\"disable_internet_vip\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"enable_internet_vip\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"network_type\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"ref\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"kind\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tComputed: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\"namespace\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\"tenant\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\"virtual_network\": {\n\n\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\"ref\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"kind\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tComputed: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\"namespace\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\"tenant\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\"virtual_site\": {\n\n\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\"disable_internet_vip\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"enable_internet_vip\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"network_type\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\"ref\": {\n\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"kind\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tComputed: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\"namespace\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\"tenant\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "8313e1c0f25d65809bf3aac11d52959d", "score": "0.47186816", "text": "func (p *podNodeEnvironment) Admit(a admission.Attributes) (err error) {\n\tresource := a.GetResource().GroupResource()\n\tif resource != kapi.Resource(\"pods\") {\n\t\treturn nil\n\t}\n\tif a.GetSubresource() != \"\" {\n\t\t// only run the checks below on pods proper and not subresources\n\t\treturn nil\n\t}\n\n\tobj := a.GetObject()\n\tpod, ok := obj.(*kapi.Pod)\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tname := pod.Name\n\n\tif !p.cache.Running() {\n\t\treturn err\n\t}\n\tnamespace, err := p.cache.GetNamespace(a.GetNamespace())\n\tif err != nil {\n\t\treturn apierrors.NewForbidden(resource, name, err)\n\t}\n\n\t// If scheduler.alpha.kubernetes.io/node-selector is set on the pod,\n\t// do not process the pod further.\n\tif len(namespace.ObjectMeta.Annotations) > 0 {\n\t\tif _, ok := namespace.ObjectMeta.Annotations[KubeProjectNodeSelector]; ok {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\tprojectNodeSelector, err := p.cache.GetNodeSelectorMap(namespace)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif labelselector.Conflicts(projectNodeSelector, pod.Spec.NodeSelector) {\n\t\treturn apierrors.NewForbidden(resource, name, fmt.Errorf(\"pod node label selector conflicts with its project node label selector\"))\n\t}\n\n\t// modify pod node selector = project node selector + current pod node selector\n\tpod.Spec.NodeSelector = labelselector.Merge(projectNodeSelector, pod.Spec.NodeSelector)\n\n\treturn nil\n}", "title": "" }, { "docid": "5b3ff6fb244938627132f906519144d9", "score": "0.47136796", "text": "func recreate(cfg *Configuration, resources kube.ResourceList) error {\n\tfor _, res := range resources {\n\t\tversioned := kube.AsVersioned(res)\n\t\tselector, err := kube.SelectorsForObject(versioned)\n\t\tif err != nil {\n\t\t\t// If no selector is returned, it means this object is\n\t\t\t// definitely not a pod, so continue onward\n\t\t\tcontinue\n\t\t}\n\n\t\tclient, err := cfg.KubernetesClientSet()\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"unable to recreate pods for object %s/%s because an error occurred\", res.Namespace, res.Name)\n\t\t}\n\n\t\tpods, err := client.CoreV1().Pods(res.Namespace).List(context.Background(), metav1.ListOptions{\n\t\t\tLabelSelector: selector.String(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"unable to recreate pods for object %s/%s because an error occurred\", res.Namespace, res.Name)\n\t\t}\n\n\t\t// Restart pods\n\t\tfor _, pod := range pods.Items {\n\t\t\t// Delete each pod for get them restarted with changed spec.\n\t\t\tif err := client.CoreV1().Pods(pod.Namespace).Delete(context.Background(), pod.Name, *metav1.NewPreconditionDeleteOptions(string(pod.UID))); err != nil {\n\t\t\t\treturn errors.Wrapf(err, \"unable to recreate pods for object %s/%s because an error occurred\", res.Namespace, res.Name)\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "31be11a377ca38c38c9abbe672acc038", "score": "0.4712914", "text": "func Test_Authorization_RoleAssignment_OnResourceGroup_CRUD(t *testing.T) {\n\tt.Parallel()\n\n\ttc := globalTestContext.ForTest(t)\n\n\trg := tc.CreateTestResourceGroupAndWait()\n\n\tconfigMapName := \"my-configmap\"\n\tprincipalIdKey := \"principalId\"\n\n\t// Create a dummy managed identity which we will assign to a role\n\tmi := &managedidentity.UserAssignedIdentity{\n\t\tObjectMeta: tc.MakeObjectMeta(\"mi\"),\n\t\tSpec: managedidentity.UserAssignedIdentity_Spec{\n\t\t\tLocation: tc.AzureRegion,\n\t\t\tOwner: testcommon.AsOwner(rg),\n\t\t\tOperatorSpec: &managedidentity.UserAssignedIdentityOperatorSpec{\n\t\t\t\tConfigMaps: &managedidentity.UserAssignedIdentityOperatorConfigMaps{\n\t\t\t\t\tPrincipalId: &genruntime.ConfigMapDestination{\n\t\t\t\t\t\tName: configMapName,\n\t\t\t\t\t\tKey: principalIdKey,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\ttc.CreateResourceAndWait(mi)\n\ttc.Expect(mi.Status.TenantId).ToNot(BeNil())\n\ttc.Expect(mi.Status.PrincipalId).ToNot(BeNil())\n\n\t// Now assign that managed identity to a new role\n\troleAssignment := &authorization.RoleAssignment{\n\t\tObjectMeta: tc.MakeObjectMeta(\"roleassignment\"),\n\t\tSpec: authorization.RoleAssignment_Spec{\n\t\t\tOwner: tc.AsExtensionOwner(rg),\n\t\t\tPrincipalIdFromConfig: &genruntime.ConfigMapReference{\n\t\t\t\tName: configMapName,\n\t\t\t\tKey: principalIdKey,\n\t\t\t},\n\t\t\tRoleDefinitionReference: &genruntime.ResourceReference{\n\t\t\t\tARMID: fmt.Sprintf(\"/subscriptions/%s/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c\", tc.AzureSubscription), // This is contributor\n\t\t\t},\n\t\t},\n\t}\n\n\ttc.CreateResourceAndWait(roleAssignment)\n\n\ttc.Expect(roleAssignment.Status.Id).ToNot(BeNil())\n\tarmId := *roleAssignment.Status.Id\n\n\ttc.DeleteResourceAndWait(roleAssignment)\n\n\t// Ensure that the resource group was really deleted in Azure\n\texists, _, err := tc.AzureClient.HeadByID(\n\t\ttc.Ctx,\n\t\tarmId,\n\t\tstring(authorization.APIVersion_Value))\n\ttc.Expect(err).ToNot(HaveOccurred())\n\ttc.Expect(exists).To(BeFalse())\n}", "title": "" }, { "docid": "526e74a7c23f69411041966e432ef6d1", "score": "0.47111437", "text": "func KubePublicRoleReconciler() reconciling.NamedRoleReconcilerFactory {\n\treturn func() (string, reconciling.RoleReconciler) {\n\t\treturn resources.MachineControllerRoleName, func(r *rbacv1.Role) (*rbacv1.Role, error) {\n\t\t\tr.Name = resources.MachineControllerRoleName\n\t\t\tr.Namespace = metav1.NamespacePublic\n\t\t\tr.Labels = resources.BaseAppLabels(machinecontroller.Name, nil)\n\n\t\t\tr.Rules = []rbacv1.PolicyRule{\n\t\t\t\t{\n\t\t\t\t\tAPIGroups: []string{\"\"},\n\t\t\t\t\tResources: []string{\"configmaps\"},\n\t\t\t\t\tVerbs: []string{\n\t\t\t\t\t\t\"get\",\n\t\t\t\t\t\t\"list\",\n\t\t\t\t\t\t\"watch\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t}\n\t\t\treturn r, nil\n\t\t}\n\t}\n}", "title": "" }, { "docid": "5721da5b61f09abe2f855827cd20e5d3", "score": "0.47110263", "text": "func patchKubeadmControlPlaneTemplate(ctx context.Context, kcpTemplate *controlplanev1.KubeadmControlPlaneTemplate, templateVariables map[string]apiextensionsv1.JSON) error {\n\tlog := ctrl.LoggerFrom(ctx)\n\n\t// 1) If the Kubernetes version from builtin.controlPlane.version is below 1.24.0 set \"cgroup-driver\": \"cgroupfs\" to\n\t// - kubeadmConfigSpec.InitConfiguration.NodeRegistration.KubeletExtraArgs\n\t// - kubeadmConfigSpec.JoinConfiguration.NodeRegistration.KubeletExtraArgs\n\tcpVersion, found, err := topologymutation.GetStringVariable(templateVariables, \"builtin.controlPlane.version\")\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"could not set cgroup-driver to control plane template kubeletExtraArgs\")\n\t}\n\t// This is a required variable. Return an error if it's not found.\n\t// NOTE: this should never happen because it is enforced by the patch engine.\n\tif !found {\n\t\treturn errors.New(\"could not set cgroup-driver to control plane template kubeletExtraArgs: variable \\\"builtin.controlPlane.version\\\" not found\")\n\t}\n\n\tcontrolPlaneVersion, err := version.ParseMajorMinorPatchTolerant(cpVersion)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif version.Compare(controlPlaneVersion, cgroupDriverPatchVersionCeiling) == -1 {\n\t\tlog.Info(fmt.Sprintf(\"Setting KubeadmControlPlaneTemplate cgroup-driver to %q\", cgroupDriverCgroupfs))\n\t\t// Set the cgroupDriver in the InitConfiguration.\n\t\tif kcpTemplate.Spec.Template.Spec.KubeadmConfigSpec.InitConfiguration == nil {\n\t\t\tkcpTemplate.Spec.Template.Spec.KubeadmConfigSpec.InitConfiguration = &bootstrapv1.InitConfiguration{}\n\t\t}\n\t\tif kcpTemplate.Spec.Template.Spec.KubeadmConfigSpec.InitConfiguration.NodeRegistration.KubeletExtraArgs == nil {\n\t\t\tkcpTemplate.Spec.Template.Spec.KubeadmConfigSpec.InitConfiguration.NodeRegistration.KubeletExtraArgs = map[string]string{}\n\t\t}\n\t\tkcpTemplate.Spec.Template.Spec.KubeadmConfigSpec.InitConfiguration.NodeRegistration.KubeletExtraArgs[\"cgroup-driver\"] = cgroupDriverCgroupfs\n\n\t\t// Set the cgroupDriver in the JoinConfiguration.\n\t\tif kcpTemplate.Spec.Template.Spec.KubeadmConfigSpec.JoinConfiguration == nil {\n\t\t\tkcpTemplate.Spec.Template.Spec.KubeadmConfigSpec.JoinConfiguration = &bootstrapv1.JoinConfiguration{}\n\t\t}\n\t\tif kcpTemplate.Spec.Template.Spec.KubeadmConfigSpec.JoinConfiguration.NodeRegistration.KubeletExtraArgs == nil {\n\t\t\tkcpTemplate.Spec.Template.Spec.KubeadmConfigSpec.JoinConfiguration.NodeRegistration.KubeletExtraArgs = map[string]string{}\n\t\t}\n\t\tkcpTemplate.Spec.Template.Spec.KubeadmConfigSpec.JoinConfiguration.NodeRegistration.KubeletExtraArgs[\"cgroup-driver\"] = cgroupDriverCgroupfs\n\t}\n\n\t// 2) Patch RolloutStrategy RollingUpdate MaxSurge with the value from the Cluster Topology variable.\n\t// If this is unset continue as this variable is not required.\n\tkcpControlPlaneMaxSurge, found, err := topologymutation.GetStringVariable(templateVariables, \"kubeadmControlPlaneMaxSurge\")\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"could not set KubeadmControlPlaneTemplate MaxSurge\")\n\t}\n\tif found {\n\t\t// This has to be converted to IntOrString type.\n\t\tkubeadmControlPlaneMaxSurgeIntOrString := intstrutil.Parse(kcpControlPlaneMaxSurge)\n\t\tlog.Info(fmt.Sprintf(\"Setting KubeadmControlPlaneMaxSurge to %q\", kubeadmControlPlaneMaxSurgeIntOrString.String()))\n\t\tif kcpTemplate.Spec.Template.Spec.RolloutStrategy == nil {\n\t\t\tkcpTemplate.Spec.Template.Spec.RolloutStrategy = &controlplanev1.RolloutStrategy{}\n\t\t}\n\t\tif kcpTemplate.Spec.Template.Spec.RolloutStrategy.RollingUpdate == nil {\n\t\t\tkcpTemplate.Spec.Template.Spec.RolloutStrategy.RollingUpdate = &controlplanev1.RollingUpdate{}\n\t\t}\n\t\tkcpTemplate.Spec.Template.Spec.RolloutStrategy.RollingUpdate.MaxSurge = &kubeadmControlPlaneMaxSurgeIntOrString\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8c9e7c8c375c5fb43227d0b7dd70aaf1", "score": "0.47008368", "text": "func validateResource(tsspec *TSSpec) error {\n\n strns := fmt.Sprintf(\"--namespace=%s\", tsspec.NameSpace)\n\tpattern := \".*\" + tsspec.SubResource + \".*\"\n\n //There should be no white space in the argument of the command,otherwise error.\n\tcmd := exec.Command(\"kubectl\", \"-s\", KUBE_LOCAL_APISERVER, \"get\", \"rc\",strns)\n\n\tvar out bytes.Buffer\n\tcmd.Stdout = &out\n\terr := cmd.Run()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Kubectl Failed Due to %s \", err.Error())\n\t}\n\n\tmatched, err := regexp.MatchString(pattern, out.String())\n\n\tif matched {\n\t\treturn nil\n\t} else {\n\t\treturn fmt.Errorf(\"%s Not Exist in Rc List : %s\", tsspec.SubResource,out.String())\n\t}\n\n}", "title": "" }, { "docid": "20a249c44b34c056625fabe82884ad4d", "score": "0.46999815", "text": "func labelsForResourceQuota(name string) map[string]string {\n\treturn map[string]string{\"app.kubernetes.io/managed-by\": \"k8s-resourcequota-autoscaler\", \"app.kubernetes.io/name\": name}\n}", "title": "" }, { "docid": "9a2f9b7814756558f122dc66137e46c8", "score": "0.46981013", "text": "func (p *Planner) getDesiredManifests() error {\n\tvar err error\n\tfor key, value := range p.ComponentManifests {\n\t\t// set the common label i.e., openebs-upgrade.dao.mayadata.io/managed: true\n\t\t// here since this label should be present in all the components irrespective\n\t\t// of their k8s kind, however some specific labels could be set per component\n\t\t// such as openebs-upgrade.dao.mayadata.io/component-name: ndm for NDM components,\n\t\t// etc.\n\t\tcomponentLabels := value.GetLabels()\n\t\tif componentLabels == nil {\n\t\t\tcomponentLabels = make(map[string]string, 0)\n\t\t} else {\n\t\t\tif _, exist := componentLabels[types.OpenEBSVersionLabelKey]; exist {\n\t\t\t\t// update the version label as per the given OpenEBS version and imageTagSuffix\n\t\t\t\t// if given.\n\t\t\t\tcomponentLabels[types.OpenEBSVersionLabelKey] =\n\t\t\t\t\tp.ObservedOpenEBS.Spec.Version + p.ObservedOpenEBS.Spec.ImageTagSuffix\n\t\t\t}\n\t\t}\n\t\tcomponentLabels[types.OpenEBSUpgradeDAOManagedLabelKey] =\n\t\t\ttypes.OpenEBSUpgradeDAOManagedLabelValue\n\t\tvalue.SetLabels(componentLabels)\n\n\t\tkind := strings.Split(key, \"_\")[1]\n\t\tswitch kind {\n\t\tcase types.KindNamespace:\n\t\t\tvalue, err = p.getDesiredNamespace(value)\n\t\tcase types.KindServiceAccount:\n\t\t\tvalue, err = p.getDesiredServiceAccount(value)\n\t\tcase types.KindClusterRole:\n\t\t\tvalue, err = p.getDesiredClusterRole(value)\n\t\tcase types.KindClusterRoleBinding:\n\t\t\tvalue, err = p.getDesiredClusterRoleBinding(value)\n\t\tcase types.KindDeployment:\n\t\t\tvalue, err = p.getDesiredDeployment(value)\n\t\tcase types.KindDaemonSet:\n\t\t\tvalue, err = p.getDesiredDaemonSet(value)\n\t\tcase types.KindConfigMap:\n\t\t\tvalue, err = p.getDesiredConfigmap(value)\n\t\tcase types.KindService:\n\t\t\tvalue, err = p.getDesiredService(value)\n\t\tcase types.KindStatefulset:\n\t\t\tvalue, err = p.getDesiredStatefulSet(value)\n\t\tcase types.KindCustomResourceDefinition:\n\t\t\tvalue, err = p.getDesiredCustomResourceDefinition(value)\n\t\t\tp.DesiredOpenEBSCRDs = append(p.DesiredOpenEBSCRDs, value)\n\t\tcase types.KindCSIDriver:\n\t\t\tif OpenEBSVersionAbove240 {\n\t\t\t\tif len(p.ObservedCStorCSIDriver) > 0 {\n\t\t\t\t\tfor _, observedCStorCSIDriver := range p.ObservedCStorCSIDriver {\n\t\t\t\t\t\tvar isAttachRequired bool\n\t\t\t\t\t\t// check the value of attachRequired, it will be true for OpenEBS\n\t\t\t\t\t\t// versions below 2.5.0 which means it needs an upgrade which will\n\t\t\t\t\t\t// be carried out by deletion and recreation of CSIDriver.\n\t\t\t\t\t\tisAttachRequired, _, err = unstructured.NestedBool(observedCStorCSIDriver.Object,\n\t\t\t\t\t\t\t\"spec\", \"attachRequired\")\n\t\t\t\t\t\tif isAttachRequired {\n\t\t\t\t\t\t\t// we will not add the latest CSI driver to the desired components list in\n\t\t\t\t\t\t\t// this iteration so that the older CSI driver gets deleted.\n\t\t\t\t\t\t\tp.ExplicitDeletes = append(p.ExplicitDeletes, observedCStorCSIDriver)\n\t\t\t\t\t\t\tdelete(p.ComponentManifests, key)\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tvalue, err = p.getDesiredCSIDriver(value)\n\t\tcase types.KindPriorityClass:\n\t\t\tvalue, err = p.getDesiredPriorityClass(value)\n\t\tdefault:\n\t\t\t// Doing nothing if an unknown kind\n\t\t\tcontinue\n\t\t}\n\t\tif err != nil {\n\t\t\treturn errors.Errorf(\"Error updating manifests: %+v\", err)\n\t\t}\n\t\t// update manifest with the updated values\n\t\tp.ComponentManifests[key] = value\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "281470073ce21d02cccafca251f7b5ef", "score": "0.46969157", "text": "func updatePodAnnotations(pod corev1.Pod, secrets string) corev1.Pod {\n\tannotations := pod.GetAnnotations()\n\n\t_, reconcilablePresent := annotations[reconcilableAnnotation]\n\tignore, ignorePresent := annotations[ignoreAnnotation]\n\tif ignorePresent && ignore == \"true\" {\n\t\treturn pod\n\t}\n\tif !reconcilablePresent {\n\t\t// pod currently is not marked as reconcilable, add the annotation!\n\t\tpod.Annotations[reconcilableAnnotation] = \"true\"\n\t\tpod.Annotations[ignoreAnnotation] = \"false\"\n\t\tpod.Annotations[reconcileWithAnnotation] = secrets\n\t}\n\treturn pod\n}", "title": "" }, { "docid": "f2b8c04a049c73620e197dc574a5b2f9", "score": "0.46869653", "text": "func main() {\n\n\t// // Load Root CA cert example\n\t// CACert := []byte{}\n\n\t// caCertPool := x509.NewCertPool()\n\t// caCertPool.AppendCertsFromPEM([]byte(CACert))\n\n\t// clientTLSConfig := &tls.Config{\n\t// \tRootCAs: caCertPool,\n\t// }\n\t// clientTLSConfig.BuildNameToCertificate()\n\t// transport := &http.Transport{TLSClientConfig: clientTLSConfig}\n\t// httpClient := &http.Client{Transport: transport}\n\n\t// Create a new configuration with a custom root certificate pool\n\tconfig := client.NewConfiguration()\n\t// config.HTTPClient = httpClient\n\n\tctx := context.WithValue(context.Background(), client.ContextAccessToken, os.Getenv(\"TOKEN\"))\n\tpipeline := client.NewAPIClient(config)\n\n\t// Create a new token for a virtual user\n\ttokenRequest := client.TokenCreateRequest{Name: \"drone token\", VirtualUser: \"banzaicloud/pipeline\"}\n\ttokenResponse, _, err := pipeline.AuthApi.CreateToken(ctx, tokenRequest)\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Overwrite the existing context token\n\tctx = context.WithValue(context.Background(), client.ContextAccessToken, tokenResponse.Token)\n\n\t// Create a new Generic secret\n\tsecretRequest := client.CreateSecretRequest{\n\t\tName: \"my-password\",\n\t\tType: \"generic\",\n\t\tValues: map[string]interface{}{\"password\": \"s3cr3t\"},\n\t\tTags: []string{\"banzai:hidden\"},\n\t}\n\n\tsecretResponse, _, err := pipeline.SecretsApi.AddSecrets(ctx, 2, secretRequest, &client.AddSecretsOpts{\n\t\tValidate: optional.NewBool(true),\n\t})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tprintln(\"Secret id:\", secretResponse.Id)\n}", "title": "" }, { "docid": "f57603f7779f528f4d473aa73cdb47f6", "score": "0.4681119", "text": "func RBAC(r *RBACRequest) error {\n\t_, err := casbin.NewEnforcer(\"config/rbac.conf\", \"config/policy.csv\")\n\tif err != nil {\n\t\tlog.WithError(err).Error(\"Failed to load RBAC config\")\n\t}\n\n\t// @TODO: implement RBAC check\n\treturn nil\n\n}", "title": "" }, { "docid": "b58b0d521975eee3e91e7f18e8ede273", "score": "0.46741745", "text": "func Remap(context *model.KopsModelContext, addon *addonsapi.AddonSpec, objects []*kubemanifest.Object) error {\n\tif !context.UseServiceAccountExternalPermissions() {\n\t\treturn nil\n\t}\n\n\tvar deployments []*kubemanifest.Object\n\tfor _, object := range objects {\n\t\tif object.Kind() != \"Deployment\" {\n\t\t\tcontinue\n\t\t}\n\t\tif object.APIVersion() != \"apps/v1\" {\n\t\t\tcontinue\n\t\t}\n\t\tdeployments = append(deployments, object)\n\t}\n\n\tif len(deployments) != 1 {\n\t\treturn fmt.Errorf(\"expected exactly one Deployment in dns-controller manifest, found %d\", len(deployments))\n\t}\n\n\tpodSpec := &corev1.PodSpec{}\n\tif err := deployments[0].Reparse(podSpec, \"spec\", \"template\", \"spec\"); err != nil {\n\t\treturn fmt.Errorf(\"failed to parse spec.template.spec from Deployment: %v\", err)\n\t}\n\n\tcontainers := podSpec.Containers\n\tif len(containers) != 1 {\n\t\treturn fmt.Errorf(\"expected exactly one container in dns-controller Deployment, found %d\", len(containers))\n\t}\n\n\tif err := iam.AddServiceAccountRole(&context.IAMModelContext, podSpec, &ServiceAccount{}); err != nil {\n\t\treturn err\n\t}\n\n\tif err := deployments[0].Set(podSpec, \"spec\", \"template\", \"spec\"); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "8c4b560777c89fb5d76537d3f516bf2e", "score": "0.46716633", "text": "func newNode(cfg nodeConfig) (kubelet, kubeProxy, error) {\n\tcfg.lg.Info(\"creating kubelet flags\")\n\tkubeletFlags := kubelet_options.NewKubeletFlags()\n\n\tcfg.lg.Info(\"creating kubelet configuration\")\n\tkubeletConfig, err := kubelet_options.NewKubeletConfiguration()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\trootDir := fileutil.MkTmpDir(os.TempDir(), \"hollow-kubelet\")\n\tkubeletFlags.RootDirectory = rootDir\n\n\t// podFilesDir := fileutil.MkTmpDir(os.TempDir(), \"static-pods\")\n\t// c.StaticPodPath = podFilesDir\n\tkubeletConfig.StaticPodPath = \"\"\n\tkubeletConfig.StaticPodURL = \"\"\n\n\t// f.EnableServer = true\n\t// c.Port = int32(cfg.kubeletPort)\n\t// c.ReadOnlyPort = int32(cfg.kubeletReadOnlyPort)\n\tkubeletFlags.ReallyCrashForTesting = true\n\tkubeletFlags.EnableServer = false\n\tkubeletConfig.Port = 0\n\tkubeletConfig.ReadOnlyPort = 0\n\n\tkubeletFlags.HostnameOverride = cfg.nodeName\n\tkubeletFlags.NodeLabels = cfg.nodeLabels\n\tkubeletFlags.RegisterWithTaints = []core.Taint{{Key: \"provider\", Effect: \"NoSchedule\", Value: \"kubemark\"}}\n\n\tkubeletFlags.MinimumGCAge = metav1.Duration{Duration: 1 * time.Minute}\n\tkubeletFlags.MaxContainerCount = 1\n\tkubeletFlags.MaxPerPodContainerCount = 1\n\tkubeletFlags.ContainerRuntimeOptions.ContainerRuntime = kubelet_types.RemoteContainerRuntime\n\tkubeletFlags.RegisterNode = true\n\tkubeletFlags.RegisterSchedulable = true\n\tkubeletFlags.ProviderID = fmt.Sprintf(\"kubemark://%v\", cfg.nodeName)\n\n\tkubeletConfig.Address = \"0.0.0.0\" /* bind address */\n\tkubeletConfig.Authentication.Anonymous.Enabled = true\n\n\tkubeletConfig.FileCheckFrequency.Duration = 20 * time.Second\n\tkubeletConfig.HTTPCheckFrequency.Duration = 20 * time.Second\n\n\t// default is 10-second\n\t// https://github.com/kubernetes/kubernetes/blob/master/pkg/kubelet/apis/config/v1beta1/defaults.go\n\tkubeletConfig.NodeStatusUpdateFrequency.Duration = 10 * time.Second\n\n\t// default is 5-minute\n\t// https://github.com/kubernetes/kubernetes/blob/master/pkg/kubelet/apis/config/v1beta1/defaults.go\n\t// \"tryUpdateNodeStatus\" patches node status\n\t// https://github.com/kubernetes/kubernetes/blob/master/pkg/kubelet/kubelet_node_status.go\n\tkubeletConfig.NodeStatusReportFrequency.Duration = 5 * time.Minute\n\n\t// node lease renew interval\n\t// default is 40 seconds\n\t// https://github.com/kubernetes/kubernetes/blob/master/pkg/kubelet/apis/config/v1beta1/defaults.go\n\tkubeletConfig.NodeLeaseDurationSeconds = 40\n\n\tkubeletConfig.SyncFrequency.Duration = 10 * time.Second\n\tkubeletConfig.EvictionPressureTransitionPeriod.Duration = 5 * time.Minute\n\tkubeletConfig.ClusterDNS = []string{}\n\tkubeletConfig.ImageGCHighThresholdPercent = 90\n\tkubeletConfig.ImageGCLowThresholdPercent = 80\n\tkubeletConfig.VolumeStatsAggPeriod.Duration = time.Minute\n\tkubeletConfig.CgroupRoot = \"\"\n\tkubeletConfig.CPUCFSQuota = true\n\tkubeletConfig.EnableControllerAttachDetach = false\n\tkubeletConfig.EnableDebuggingHandlers = true\n\tkubeletConfig.CgroupsPerQOS = false\n\t// hairpin-veth is used to allow hairpin packets. Note that this deviates from\n\t// what the \"real\" kubelet currently does, because there's no way to\n\t// set promiscuous mode on docker0.\n\tkubeletConfig.HairpinMode = kubelet_config.HairpinVeth\n\n\t// \"cmd/kubelet/app.rlimit.SetNumFiles(MaxOpenFiles)\" sets this for the host\n\t// TODO: increase if we run this in remote\n\tkubeletConfig.MaxOpenFiles = 1000000\n\n\tkubeletConfig.RegistryBurst = 10\n\tkubeletConfig.RegistryPullQPS = 5.0\n\tkubeletConfig.ResolverConfig = kubelet_types.ResolvConfDefault\n\tkubeletConfig.KubeletCgroups = \"/kubelet\"\n\tkubeletConfig.SerializeImagePulls = true\n\tkubeletConfig.SystemCgroups = \"\"\n\tkubeletConfig.ProtectKernelDefaults = false\n\n\tcadvisorInterface := &cadvisor_test.Fake{NodeName: cfg.nodeName}\n\tcontainerManager := kubelet_cm.NewStubContainerManager()\n\n\tfakeEndpoint, err := kubelet_remote_fake.GenerateEndpoint()\n\tif err != nil {\n\t\tcfg.lg.Warn(\"failed to generate fake endpoint\", zap.Error(err))\n\t\treturn nil, nil, err\n\t}\n\tfakeRemoteRuntime := kubelet_remote_fake.NewFakeRemoteRuntime()\n\tif err = fakeRemoteRuntime.Start(fakeEndpoint); err != nil {\n\t\tcfg.lg.Warn(\"failed to start fake runtime\", zap.Error(err))\n\t\treturn nil, nil, err\n\t}\n\tfakeRuntimeService, err := kubelet_remote.NewRemoteRuntimeService(fakeEndpoint, 15*time.Second)\n\tif err != nil {\n\t\tcfg.lg.Warn(\"failed to init runtime service\", zap.Error(err))\n\t\treturn nil, nil, err\n\t}\n\thollowKube := &hollowKubelet{\n\t\tcfg: cfg,\n\n\t\tkubeletFlags: kubeletFlags,\n\t\tkubeletConfig: kubeletConfig,\n\n\t\tfakeRemoteRuntime: fakeRemoteRuntime,\n\n\t\tdeps: &pkg_kubelet.Dependencies{\n\t\t\tKubeClient: cfg.cli.KubernetesClientSet(),\n\t\t\tHeartbeatClient: cfg.cli.KubernetesClientSet(),\n\n\t\t\tRemoteRuntimeService: fakeRuntimeService,\n\t\t\tRemoteImageService: fakeRemoteRuntime.ImageService,\n\t\t\tCAdvisorInterface: cadvisorInterface,\n\n\t\t\t// TODO: mock\n\t\t\tCloud: nil,\n\n\t\t\tOSInterface: &container_test.FakeOS{},\n\t\t\tContainerManager: containerManager,\n\t\t\tVolumePlugins: volumePlugins(),\n\n\t\t\tTLSOptions: nil,\n\n\t\t\tOOMAdjuster: oom.NewFakeOOMAdjuster(),\n\t\t\tMounter: &mount.FakeMounter{},\n\t\t\tSubpather: &subpath.FakeSubpath{},\n\t\t\tHostUtil: hostutil.NewFakeHostUtil(nil),\n\t\t},\n\t}\n\n\tfakeIptables := iptables_testing.NewFake()\n\tfakeSysctl := sysctl_testing.NewFake()\n\tfakeExec := &exec_testing.FakeExec{\n\t\tLookPathFunc: func(_ string) (string, error) { return \"\", errors.New(\"fake execer\") },\n\t}\n\tfakeEventBroadcaster := record.NewBroadcaster()\n\tfakeRecorder := fakeEventBroadcaster.NewRecorder(legacyscheme.Scheme, v1.EventSource{Component: \"kube-proxy\", Host: cfg.nodeName})\n\n\tvar proxier proxy.Provider\n\tif cfg.remote {\n\t\tnodeIP := util_node.GetNodeIP(cfg.cli.KubernetesClientSet(), cfg.nodeName)\n\t\tif nodeIP == nil {\n\t\t\tcfg.lg.Warn(\"failed to find node IP; assuming 127.0.0.1\", zap.String(\"node-name\", cfg.nodeName))\n\t\t\tnodeIP = net.ParseIP(\"127.0.0.1\")\n\t\t} else {\n\t\t\tcfg.lg.Warn(\"found node IP\", zap.String(\"node-name\", cfg.nodeName), zap.String(\"node-ip\", fmt.Sprintf(\"%+v\", nodeIP)))\n\t\t}\n\t\tproxier, err = proxy_iptables.NewProxier(\n\t\t\tfakeIptables,\n\t\t\tfakeSysctl,\n\t\t\tfakeExec,\n\t\t\t30*time.Second,\n\t\t\t0,\n\t\t\tfalse,\n\t\t\t0,\n\t\t\tutils_iptables.NewNoOpLocalDetector(),\n\t\t\tcfg.nodeName,\n\t\t\tnodeIP,\n\t\t\tfakeRecorder,\n\t\t\tnil,\n\t\t\t[]string{},\n\t\t)\n\t\tif err != nil {\n\t\t\tcfg.lg.Warn(\"failed to create a new proxier\", zap.String(\"node-name\", cfg.nodeName), zap.Error(err))\n\t\t\tproxier = nil\n\t\t}\n\t}\n\tif proxier == nil {\n\t\tcfg.lg.Info(\"use fake proxy\", zap.String(\"node-name\", cfg.nodeName))\n\t\tproxier = &fakeProxy{}\n\t}\n\thollowPxy := &hollowKubeProxy{\n\t\tcfg: cfg,\n\t\tserver: &proxy_app.ProxyServer{\n\t\t\tClient: cfg.cli.KubernetesClientSet(),\n\t\t\tEventClient: cfg.cli.KubernetesClientSet().CoreV1(),\n\t\t\tIptInterface: fakeIptables,\n\t\t\tProxier: proxier,\n\t\t\tBroadcaster: fakeEventBroadcaster,\n\t\t\tRecorder: fakeRecorder,\n\t\t\tProxyMode: \"fake\",\n\t\t\tNodeRef: &v1.ObjectReference{\n\t\t\t\tKind: \"Node\",\n\t\t\t\tName: cfg.nodeName,\n\t\t\t\tUID: types.UID(cfg.nodeName),\n\t\t\t\tNamespace: \"\",\n\t\t\t},\n\t\t\tOOMScoreAdj: util_pointer.Int32Ptr(0),\n\t\t\tConfigSyncPeriod: 30 * time.Second,\n\t\t},\n\t}\n\treturn hollowKube, hollowPxy, nil\n}", "title": "" }, { "docid": "8655325370b4bc2ae8de11249cfa5d41", "score": "0.46658617", "text": "func (k Kubernetes) Name() string { return \"kubernetes\" }", "title": "" }, { "docid": "7cd94a5f4fa42e1b0f70a2554f581bd4", "score": "0.46609193", "text": "func (p *podNodeEnvironment) Admit(a admission.Attributes) (err error) {\n\tresource := a.GetResource()\n\tif resource != \"pods\" {\n\t\treturn nil\n\t}\n\tif a.GetSubresource() != \"\" {\n\t\t// only run the checks below on pods proper and not subresources\n\t\treturn nil\n\t}\n\n\tobj := a.GetObject()\n\tpod, ok := obj.(*kapi.Pod)\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tname := pod.Name\n\n\tprojects, err := projectcache.GetProjectCache()\n\tif err != nil {\n\t\treturn err\n\t}\n\tnamespace, err := projects.GetNamespaceObject(a.GetNamespace())\n\tif err != nil {\n\t\treturn apierrors.NewForbidden(resource, name, err)\n\t}\n\tprojectNodeSelector, err := projects.GetNodeSelectorMap(namespace)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif labelselector.Conflicts(projectNodeSelector, pod.Spec.NodeSelector) {\n\t\treturn apierrors.NewForbidden(resource, name, fmt.Errorf(\"pod node label selector conflicts with its project node label selector\"))\n\t}\n\n\t// modify pod node selector = project node selector + current pod node selector\n\tpod.Spec.NodeSelector = labelselector.Merge(projectNodeSelector, pod.Spec.NodeSelector)\n\n\treturn nil\n}", "title": "" }, { "docid": "aae4c2ee720488727a93dd7784e33701", "score": "0.46602547", "text": "func createPatch(pod *corev1.Pod, tsiMutateConfig *tsiMutateConfig) ([]byte, error) {\n\tvar patch []patchOperation\n\n\t// by default, mutate the pod with the new sidecar and required volumes\n\tvar mutateAll bool = true\n\n\t// check if the pod already mutated, if so, only update the annotations\n\tcurrentAnnotations := pod.ObjectMeta.GetAnnotations()\n\tif currentAnnotations != nil {\n\t\tstatus := currentAnnotations[admissionWebhookAnnotationStatusKey]\n\t\tif strings.ToLower(status) == \"mutated\" {\n\t\t\tglog.Infof(\"Pod already mutated. Update only the annotations\")\n\t\t\tmutateAll = false\n\t\t}\n\t}\n\n\t// always get updated annotations\n\tannotations := tsiMutateConfig.Annotations\n\tpatch = append(patch, updateAnnotation(pod.Annotations, annotations)...)\n\tglog.Infof(\"Annotations are always updated. New values: %#v\", annotations)\n\n\t// update everything only if not mutated before\n\tif mutateAll {\n\t\tpatch = append(patch, addContainer(pod.Spec.Containers, tsiMutateConfig.SidecarContainers,\n\t\t\t\"/spec/containers\")...)\n\t\tpatch = append(patch, addVolume(pod.Spec.Volumes, tsiMutateConfig.Volumes, \"/spec/volumes\")...)\n\n\t\tfor i, c := range pod.Spec.Containers {\n\t\t\tpatch = append(patch, addVolumeMount(c.VolumeMounts, tsiMutateConfig.AddVolumeMounts, fmt.Sprintf(\"/spec/containers/%d/volumeMounts\", i))...)\n\t\t}\n\t}\n\n\treturn json.Marshal(patch)\n}", "title": "" }, { "docid": "a5f1f629de0700b73b66b28bce68688b", "score": "0.46561164", "text": "func CRUD(obj *unstructured.Unstructured, r *SpecialResourceReconciler) error {\n\n\tvar logger logr.Logger\n\tif resourceNamespaced(obj.GetKind()) {\n\t\tlogger = log.WithValues(\"Kind\", obj.GetKind()+\": \"+obj.GetNamespace()+\"/\"+obj.GetName())\n\t} else {\n\t\tlogger = log.WithValues(\"Kind\", obj.GetKind()+\": \"+obj.GetName())\n\t}\n\n\tfound := obj.DeepCopy()\n\n\t// SpecialResource is the parent, all other objects are childs and need a reference\n\tif obj.GetKind() != \"SpecialResource\" {\n\t\tif err := controllerutil.SetControllerReference(&r.specialresource, obj, r.Scheme); err != nil {\n\t\t\treturn errs.Wrap(err, \"Failed to set controller reference\")\n\t\t}\n\t}\n\n\terr := r.Get(context.TODO(), types.NamespacedName{Namespace: obj.GetNamespace(), Name: obj.GetName()}, found)\n\n\tif apierrors.IsNotFound(err) {\n\t\tlogger.Info(\"Not found, creating\")\n\t\tif err := r.Create(context.TODO(), obj); err != nil {\n\t\t\treturn errs.Wrap(err, \"Couldn't Create Resource\")\n\t\t}\n\t\treturn nil\n\t}\n\n\tif apierrors.IsForbidden(err) {\n\t\treturn errs.Wrap(err, \"Forbidden check Role, ClusterRole and Bindings for operator\")\n\t}\n\n\tif err != nil {\n\t\treturn errs.Wrap(err, \"Unexpected error\")\n\t}\n\t// Not updating Pod because we can only update image and some other\n\t// specific minor fields.\n\t//\n\t// ServiceAccounts cannot be updated, maybe delete and create?\n\tif obj.GetKind() == \"ServiceAccount\" || obj.GetKind() == \"Pod\" || obj.GetKind() == \"BuildConfig\" {\n\t\t// Not updating BuildConfig since it triggers a new build in 4.6 was not doing that in <4.6\n\t\t//logger.Info(\"TODO: Found, not updating, does not work, why? Secret accumulation?\")\n\t\treturn nil\n\t}\n\n\tlogger.Info(\"Found, updating\")\n\trequired := obj.DeepCopy()\n\n\t// required.ResourceVersion = found.ResourceVersion this is only needed\n\t// before we update a resource, we do not care when creating, hence\n\t// !leave this here!\n\tif err := updateResourceVersion(required, found); err != nil {\n\t\treturn errs.Wrap(err, \"Couldn't Update ResourceVersion\")\n\t}\n\n\tif err := r.Update(context.TODO(), required); err != nil {\n\t\treturn errs.Wrap(err, \"Couldn't Update Resource\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a68f1b7bcea18717d482bae363b1039d", "score": "0.4654178", "text": "func updateServiceAccountAnnotations(sa corev1.ServiceAccount, secrets string) corev1.ServiceAccount {\n\tannotations := sa.GetAnnotations()\n\n\t_, reconcilablePresent := annotations[reconcilableAnnotation]\n\tignore, ignorePresent := annotations[ignoreAnnotation]\n\tif ignorePresent && ignore == \"true\" {\n\t\treturn sa\n\t}\n\tif !reconcilablePresent {\n\t\t// pod currently is not marked as reconcilable, add the annotation!\n\t\tsa.Annotations[reconcilableAnnotation] = \"true\"\n\t\tsa.Annotations[ignoreAnnotation] = \"false\"\n\t\tsa.Annotations[reconcileWithAnnotation] = secrets\n\t}\n\treturn sa\n}", "title": "" }, { "docid": "573e4d862a0777194328e898809a11ab", "score": "0.46507156", "text": "func namespaces() ([]string, error) {\n\targs := []string{\"get\", \"namespaces\", \"-A\"}\n\tout, err := exe(\"kubectl\", args...)\n\treturn out, err\n}", "title": "" }, { "docid": "90d6d421415f1efa65e0767e4963fb77", "score": "0.46506095", "text": "func ReconcileMCtoKube(p *mcwss.Player, clientset *kubernetes.Clientset) {\n\n\tfmt.Println(\"MCtoKube\")\n\tp.Exec(\"testfor @e\", func(response map[string]interface{}) {\n\n\t\tvictims := fmt.Sprintf(\"%s\", response[\"victim\"])\n\t\tmcentities := strings.Fields(victims[1 : len(victims)-1])\n\n\t\t// Get all Kube entities\n\t\tpods, _ := clientset.CoreV1().Pods(\"\").List(context.TODO(), metav1.ListOptions{})\n\t\tservices, _ := clientset.CoreV1().Services(\"\").List(context.TODO(), metav1.ListOptions{})\n\t\tdeployments, _ := clientset.AppsV1().Deployments(\"\").List(context.TODO(), metav1.ListOptions{})\n\t\trc, _ := clientset.AppsV1().ReplicaSets(\"\").List(context.TODO(), metav1.ListOptions{})\n\n\t\tfor _, pod := range pods.Items {\n\t\t\tif strings.Compare(pod.Namespace, \"default\") == 0 {\n\t\t\t\tif !Contains(mcentities, fmt.Sprintf(\"%s:pod:%s\", pod.Namespace, pod.Name)) {\n\t\t\t\t\tfmt.Printf(fmt.Sprintf(\"Kill %s:pod:%s!!\\n\", pod.Namespace, pod.Name))\n\t\t\t\t\t// freshlydeleted.Put(fmt.Sprintf(\"%s:pod:%s\", pod.Namespace, pod.Name), \"locked\")\n\t\t\t\t\t// fmt.Printf(\"%s locked\\n\", (fmt.Sprintf(\"%s:pod:%s\", pod.Namespace, pod.Name)))\n\t\t\t\t\tclientset.CoreV1().Pods(pod.Namespace).Delete(context.TODO(), pod.Name, metav1.DeleteOptions{})\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tfor _, deployment := range deployments.Items {\n\t\t\tif !Contains(mcentities, fmt.Sprintf(\"%s:deployment:%s\", deployment.Namespace, deployment.Name)) {\n\t\t\t\tfmt.Printf(fmt.Sprintf(\"kill %s:deployment:%s\\n\", deployment.Namespace, deployment.Name))\n\t\t\t}\n\t\t}\n\t\tfor _, rcontr := range rc.Items {\n\t\t\tif !Contains(mcentities, fmt.Sprintf(\"%s:replicaset:%s\", rcontr.Namespace, rcontr.Name)) {\n\t\t\t\tfmt.Printf(fmt.Sprintf(\"kill %s:replicaset:%s\\n\", rcontr.Namespace, rcontr.Name))\n\t\t\t}\n\t\t}\n\t\tfor _, service := range services.Items {\n\t\t\tif !Contains(mcentities, fmt.Sprintf(\"%s:service:%s\", service.Namespace, service.Name)) {\n\t\t\t\tfmt.Printf(fmt.Sprintf(\"kill %s:service:%s\\n\", service.Namespace, service.Name))\n\t\t\t}\n\t\t}\n\t})\n}", "title": "" }, { "docid": "4466088112b6125450b2ea14c1d74bae", "score": "0.4649797", "text": "func (k8sh *K8sHelper) Kubectl(args ...string) (string, error) {\n\tresult, err := k8sh.executor.ExecuteCommandWithTimeout(15*time.Second, \"kubectl\", args...)\n\tif err != nil {\n\t\tk8slogger.Errorf(\"Failed to execute: %s %+v : %+v. %s\", cmd, args, err, result)\n\t\tif args[0] == \"delete\" {\n\t\t\t// allow the tests to continue if we were deleting a resource that timed out\n\t\t\treturn result, nil\n\t\t}\n\t\treturn result, fmt.Errorf(\"Failed to run: %s %v : %v\", cmd, args, err)\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "f998b5f0ff174a9c856672914c5a3b62", "score": "0.46484545", "text": "func validate(cmd *cobra.Command, f *clientcmd.Factory, args []string) error {\n\tnamespace, enforceNamespace, err := f.DefaultNamespace()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tkc, err := f.ClientSet()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tr := f.NewBuilder().\n\t\tInternal().\n\t\tContinueOnError().\n\t\tNamespaceParam(namespace).DefaultNamespace().\n\t\tFilenameParam(enforceNamespace, &resource.FilenameOptions{Recursive: false, Filenames: kcmdutil.GetFlagStringSlice(cmd, \"filename\")}).\n\t\tResourceTypeOrNameArgs(false, args...).\n\t\tFlatten().\n\t\tDo()\n\tinfos, err := r.Infos()\n\tif err != nil {\n\t\treturn kcmdutil.UsageErrorf(cmd, err.Error())\n\t}\n\n\twildcardpolicy := kcmdutil.GetFlagString(cmd, \"wildcard-policy\")\n\tif len(wildcardpolicy) > 0 && (wildcardpolicy != \"Subdomain\" && wildcardpolicy != \"None\") {\n\t\treturn fmt.Errorf(\"only \\\"Subdomain\\\" or \\\"None\\\" are supported for wildcard-policy\")\n\t}\n\n\tif len(infos) > 1 {\n\t\treturn fmt.Errorf(\"multiple resources provided: %v\", args)\n\t}\n\tinfo := infos[0]\n\tmapping := info.ResourceMapping()\n\n\tgenerator := kcmdutil.GetFlagString(cmd, \"generator\")\n\tswitch mapping.GroupVersionKind.GroupKind() {\n\tcase kapi.Kind(\"Service\"):\n\t\tswitch generator {\n\t\tcase \"service/v1\", \"service/v2\":\n\t\t\t// Set default protocol back for generating services\n\t\t\tif len(kcmdutil.GetFlagString(cmd, \"protocol\")) == 0 {\n\t\t\t\tcmd.Flags().Set(\"protocol\", \"TCP\")\n\t\t\t}\n\t\tcase \"\":\n\t\t\t// Default exposing services as a route\n\t\t\tgenerator = \"route/v1\"\n\t\t\tcmd.Flags().Set(\"generator\", generator)\n\t\t\tfallthrough\n\t\tcase \"route/v1\":\n\t\t\t// The upstream generator will incorrectly chose service.Port instead of service.TargetPort\n\t\t\t// for the route TargetPort when no port is present. Passing forcePort=true\n\t\t\t// causes UnsecuredRoute to always set a Port so the upstream default is not used.\n\t\t\troute, err := cmdutil.UnsecuredRoute(kc, namespace, info.Name, info.Name, kcmdutil.GetFlagString(cmd, \"port\"), true)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif route.Spec.Port != nil {\n\t\t\t\tcmd.Flags().Set(\"port\", route.Spec.Port.TargetPort.String())\n\t\t\t}\n\t\t}\n\n\tdefault:\n\t\tswitch generator {\n\t\tcase \"route/v1\":\n\t\t\treturn fmt.Errorf(\"cannot expose a %s as a route\", mapping.GroupVersionKind.Kind)\n\t\tcase \"\":\n\t\t\t// Default exposing everything except services as a service\n\t\t\tgenerator = \"service/v2\"\n\t\t\tcmd.Flags().Set(\"generator\", generator)\n\t\t\tfallthrough\n\t\tcase \"service/v1\", \"service/v2\":\n\t\t\t// Set default protocol back for generating services\n\t\t\tif len(kcmdutil.GetFlagString(cmd, \"protocol\")) == 0 {\n\t\t\t\tcmd.Flags().Set(\"protocol\", \"TCP\")\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cb61b6467e7420af30902b2b0ba3fe27", "score": "0.4648243", "text": "func (i *NFSManifests) GetNFSServer(namespace string, count int, storageClassName string) string {\n\treturn `\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: rook-nfs-server\n namespace: ` + namespace + `\n---\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: rook-nfs-provisioner-runner\nrules:\n - apiGroups: [\"\"]\n resources: [\"persistentvolumes\"]\n verbs: [\"get\", \"list\", \"watch\", \"create\", \"delete\"]\n - apiGroups: [\"\"]\n resources: [\"persistentvolumeclaims\"]\n verbs: [\"get\", \"list\", \"watch\", \"update\"]\n - apiGroups: [\"storage.k8s.io\"]\n resources: [\"storageclasses\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"events\"]\n verbs: [\"create\", \"update\", \"patch\"]\n - apiGroups: [\"\"]\n resources: [\"services\", \"endpoints\"]\n verbs: [\"get\"]\n - apiGroups: [\"extensions\"]\n resources: [\"podsecuritypolicies\"]\n resourceNames: [\"nfs-provisioner\"]\n verbs: [\"use\"]\n - apiGroups: [\"\"]\n resources: [\"endpoints\"]\n verbs: [\"get\", \"list\", \"watch\", \"create\", \"update\", \"patch\"]\n - apiGroups:\n - nfs.rook.io\n resources:\n - \"*\"\n verbs:\n - \"*\"\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: run-nfs-provisioner\nsubjects:\n - kind: ServiceAccount\n name: rook-nfs-server\n namespace: ` + namespace + `\nroleRef:\n kind: ClusterRole\n name: rook-nfs-provisioner-runner\n apiGroup: rbac.authorization.k8s.io\n---\napiVersion: v1\nkind: PersistentVolumeClaim\nmetadata:\n name: test-claim\n namespace: ` + namespace + `\nspec:\n storageClassName: ` + storageClassName + `\n accessModes:\n - ReadWriteMany\n resources:\n requests:\n storage: 1Mi\n---\napiVersion: v1\nkind: PersistentVolumeClaim\nmetadata:\n name: test-claim1\n namespace: ` + namespace + `\nspec:\n storageClassName: ` + storageClassName + `\n accessModes:\n - ReadWriteMany\n resources:\n requests:\n storage: 2Mi\n---\napiVersion: nfs.rook.io/v1alpha1\nkind: NFSServer\nmetadata:\n name: ` + namespace + `\n namespace: ` + namespace + `\nspec:\n replicas: ` + strconv.Itoa(count) + `\n exports:\n - name: nfs-share\n server:\n accessMode: ReadWrite\n squash: \"none\"\n persistentVolumeClaim:\n claimName: test-claim\n - name: nfs-share1\n server:\n accessMode: ReadWrite\n squash: \"none\"\n persistentVolumeClaim:\n claimName: test-claim1\n`\n}", "title": "" }, { "docid": "5a9dabd6573b638e2dfd4dca497f40ce", "score": "0.46464193", "text": "func kubeAPIServerFlags() []string {\n\tflags, found := []string{\n\t\t\"--disable-admission-plugins=ServiceAccount\",\n\t\t\"--enable-admission-plugins=AlwaysAdmit\",\n\t}, false\n\tfor _, flag := range envtest.DefaultKubeAPIServerFlags {\n\t\tif flag == \"--admission-control=AlwaysAdmit\" {\n\t\t\tfound = true\n\t\t\tcontinue\n\t\t}\n\n\t\tflags = append(flags, flag)\n\t}\n\n\tif !found {\n\t\tpanic(\"controller-runtime have changed the default api-server flags! Please check this function is still appropriate\")\n\t}\n\n\treturn flags\n}", "title": "" }, { "docid": "3254e45915cf1b7ad2e44f341de6931e", "score": "0.4643686", "text": "func add(mgr manager.Manager, r reconcile.Reconciler) error {\n\t// Create a new controller\n\tc, err := controller.New(\"permission_controller\", mgr, controller.Options{Reconciler: r})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Watch for changes to Api\n\terr = c.Watch(&source.Kind{Type: &corev1.Namespace{}}, &handler.EnqueueRequestForObject{})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "577d728491051eafb51c17f305552009", "score": "0.46418506", "text": "func CreateTestNamespaceCommand(namespace string) *Command {\n\tcmd := fmt.Sprintf(`kubectl apply -f - <<\"EOF\"\napiVersion: v1\nkind: Namespace\nmetadata:\n name: %s\n labels: {\"%s\": \"%s\"}\nEOF\nwhile true; do\n kubectl -n %s get serviceaccount default\n if [ $? -eq 0 ]; then\n break\n fi\n sleep 1\ndone\n\t`, namespace, namespaceLabelKey, namespaceLabelValue, namespace)\n\n\treturn &Command{\n\t\tName: \"Create test namespace\",\n\t\tCmd: cmd,\n\t}\n}", "title": "" }, { "docid": "53a87deb470120065954e4f0114a7622", "score": "0.4638795", "text": "func K8sApplyFile(fileName string) error {\n\tf, err := os.ReadFile(fileName)\n\n\tif err != nil {\n\t\tlog.Errorf(\"error reading file %v\", err.Error())\n\t\treturn err\n\t}\n\t// register ksp scheme\n\terr = kcScheme.AddToScheme(scheme.Scheme)\n\tif err != nil {\n\t\tlog.Errorf(\"unable to register ksp scheme error= %s\", err)\n\t\treturn err\n\t}\n\n\t// multiple yaml files seperate by ---\n\tfileAsString := string(f[:])\n\tsepYamlfiles := strings.Split(fileAsString, \"---\")\n\n\tfor _, f := range sepYamlfiles {\n\t\tif f == \"\\n\" || f == \"\" {\n\t\t\t// ignore empty cases\n\t\t\tcontinue\n\t\t}\n\n\t\tdecode := scheme.Codecs.UniversalDeserializer().Decode\n\t\tobj, _, err := decode([]byte(f), nil, nil)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"unable to decode yaml error=%s\", err)\n\t\t\treturn err\n\t\t}\n\t\tswitch obj := obj.(type) {\n\t\tcase *appsV1.Deployment:\n\t\t\tdeployment := obj\n\t\t\tnamespace := deployment.Namespace\n\n\t\t\tresult, err := k8sClient.K8sClientset.AppsV1().Deployments(namespace).Create(context.TODO(), deployment, metav1.CreateOptions{})\n\t\t\tif err != nil {\n\t\t\t\tif strings.Contains(err.Error(), \"already exists\") {\n\t\t\t\t\tlog.Printf(\"Deployment %s already exists ...\", deployment.Name)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tlog.Printf(\"Created Deployment %q\", result.GetObjectMeta().GetName())\n\n\t\tcase *kcV1.KubeArmorPolicy:\n\t\t\tksp := obj\n\n\t\t\tksp.Spec.Capabilities = kcV1.CapabilitiesType{\n\t\t\t\tMatchCapabilities: append([]kcV1.MatchCapabilitiesType{}, ksp.Spec.Capabilities.MatchCapabilities...),\n\t\t\t}\n\t\t\tksp.Spec.Network = kcV1.NetworkType{\n\t\t\t\tMatchProtocols: append([]kcV1.MatchNetworkProtocolType{}, ksp.Spec.Network.MatchProtocols...),\n\t\t\t}\n\n\t\t\tresult, err := k8sClient.KSPClientset.KubeArmorPolicies(ksp.Namespace).Create(context.TODO(), ksp, metav1.CreateOptions{})\n\t\t\tif err != nil {\n\t\t\t\tif strings.Contains(err.Error(), \"already exists\") {\n\t\t\t\t\tlog.Printf(\"Policy %s already exists ...\", ksp.Name)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tlog.Printf(\"Created policy %q\", result.GetObjectMeta().GetName())\n\t\tcase *corev1.Service:\n\t\t\tsvc := obj\n\t\t\tns := svc.Namespace\n\n\t\t\t_, err := k8sClient.K8sClientset.CoreV1().Services(ns).Create(context.TODO(), svc, metav1.CreateOptions{})\n\n\t\t\tif err != nil {\n\t\t\t\tif strings.Contains(err.Error(), \"port is already allocated\") {\n\t\t\t\t\tsv, err := k8sClient.K8sClientset.CoreV1().Services(ns).Get(context.TODO(), svc.Name, metav1.GetOptions{})\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t\tif sv.Name == svc.Name && sv.Namespace == svc.Namespace {\n\t\t\t\t\t\tlog.Printf(\"Service %s already exists...\", svc.Name)\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif strings.Contains(err.Error(), \"already exists\") {\n\t\t\t\t\tlog.Printf(\"Service %s already exists ...\", svc.Name)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tlog.Printf(\"Service %s created ...\", svc.Name)\n\t\tcase *corev1.Namespace:\n\t\t\tns := obj\n\t\t\t_, err := k8sClient.K8sClientset.CoreV1().Namespaces().Create(context.TODO(), ns, metav1.CreateOptions{})\n\t\t\tif err != nil {\n\t\t\t\tif strings.Contains(err.Error(), \"already exists\") {\n\t\t\t\t\tlog.Printf(\"Namespace %s already exists ...\", ns.Name)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tlog.Printf(\"Namespace %s created ...\", ns.Name)\n\t\tcase *kcV1.KubeArmorHostPolicy:\n\t\t\thsp := obj\n\n\t\t\thsp.Spec.Capabilities = kcV1.HostCapabilitiesType{\n\t\t\t\tMatchCapabilities: append([]kcV1.MatchHostCapabilitiesType{}, hsp.Spec.Capabilities.MatchCapabilities...),\n\t\t\t}\n\t\t\thsp.Spec.Network = kcV1.HostNetworkType{\n\t\t\t\tMatchProtocols: append([]kcV1.MatchHostNetworkProtocolType{}, hsp.Spec.Network.MatchProtocols...),\n\t\t\t}\n\n\t\t\tresult, err := kcClient.KubeArmorHostPolicies().Create(context.TODO(), hsp, metav1.CreateOptions{})\n\t\t\tif err != nil {\n\t\t\t\tif strings.Contains(err.Error(), \"already exists\") {\n\t\t\t\t\tlog.Printf(\"Policy %s already exists ...\", hsp.Name)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tlog.Printf(\"Created policy %q\", result.GetObjectMeta().GetName())\n\t\t}\n\t}\n\t// waiting for a policy to be created is better\n\t// as it implicitly gives us waiting for old policy to be deleted also\n\ttime.Sleep(5 * time.Second)\n\treturn nil\n}", "title": "" }, { "docid": "aa2caeb2dbc5cce6dd52b495834a317b", "score": "0.4634604", "text": "func kubeletConfiguration(log *zap.SugaredLogger, clusterDomain string, clusterDNS []net.IP, featureGates map[string]bool, kubeletConfigs map[string]string) (string, error) {\n\tclusterDNSstr := make([]string, 0, len(clusterDNS))\n\tfor _, ip := range clusterDNS {\n\t\tclusterDNSstr = append(clusterDNSstr, ip.String())\n\t}\n\n\tcfg := kubeletv1b1.KubeletConfiguration{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"KubeletConfiguration\",\n\t\t\tAPIVersion: kubeletv1b1.SchemeGroupVersion.String(),\n\t\t},\n\t\tAuthentication: kubeletv1b1.KubeletAuthentication{\n\t\t\tX509: kubeletv1b1.KubeletX509Authentication{\n\t\t\t\tClientCAFile: \"/etc/kubernetes/pki/ca.crt\",\n\t\t\t},\n\t\t\tWebhook: kubeletv1b1.KubeletWebhookAuthentication{\n\t\t\t\tEnabled: ptr.To(true),\n\t\t\t},\n\t\t\tAnonymous: kubeletv1b1.KubeletAnonymousAuthentication{\n\t\t\t\tEnabled: ptr.To(false),\n\t\t\t},\n\t\t},\n\t\tAuthorization: kubeletv1b1.KubeletAuthorization{\n\t\t\tMode: kubeletv1b1.KubeletAuthorizationModeWebhook,\n\t\t},\n\t\tCgroupDriver: \"systemd\",\n\t\tClusterDNS: clusterDNSstr,\n\t\tClusterDomain: clusterDomain,\n\t\tFeatureGates: featureGates,\n\t\tProtectKernelDefaults: true,\n\t\tReadOnlyPort: 0,\n\t\tRotateCertificates: true,\n\t\tServerTLSBootstrap: true,\n\t\tStaticPodPath: \"/etc/kubernetes/manifests\",\n\t\tKubeReserved: map[string]string{\"cpu\": \"200m\", \"memory\": \"200Mi\", \"ephemeral-storage\": \"1Gi\"},\n\t\tSystemReserved: map[string]string{\"cpu\": \"200m\", \"memory\": \"200Mi\", \"ephemeral-storage\": \"1Gi\"},\n\t\tEvictionHard: map[string]string{\"memory.available\": \"100Mi\", \"nodefs.available\": \"10%\", \"nodefs.inodesFree\": \"5%\", \"imagefs.available\": \"15%\"},\n\t\tVolumePluginDir: \"/var/lib/kubelet/volumeplugins\",\n\t\tTLSCipherSuites: kubeletTLSCipherSuites,\n\t\tContainerLogMaxSize: defaultKubeletContainerLogMaxSize,\n\t}\n\n\tif kubeReserved, ok := kubeletConfigs[common.KubeReservedKubeletConfig]; ok {\n\t\tfor _, krPair := range strings.Split(kubeReserved, \",\") {\n\t\t\tkrKV := strings.SplitN(krPair, \"=\", 2)\n\t\t\tif len(krKV) != 2 {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tcfg.KubeReserved[krKV[0]] = krKV[1]\n\t\t}\n\t}\n\n\tif systemReserved, ok := kubeletConfigs[common.SystemReservedKubeletConfig]; ok {\n\t\tfor _, srPair := range strings.Split(systemReserved, \",\") {\n\t\t\tsrKV := strings.SplitN(srPair, \"=\", 2)\n\t\t\tif len(srKV) != 2 {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tcfg.SystemReserved[srKV[0]] = srKV[1]\n\t\t}\n\t}\n\n\tif evictionHard, ok := kubeletConfigs[common.EvictionHardKubeletConfig]; ok {\n\t\tfor _, ehPair := range strings.Split(evictionHard, \",\") {\n\t\t\tehKV := strings.SplitN(ehPair, \"<\", 2)\n\t\t\tif len(ehKV) != 2 {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tcfg.EvictionHard[ehKV[0]] = ehKV[1]\n\t\t}\n\t}\n\n\tif maxPods, ok := kubeletConfigs[common.MaxPodsKubeletConfig]; ok {\n\t\tmp, err := strconv.ParseInt(maxPods, 10, 32)\n\t\tif err != nil {\n\t\t\t// Instead of breaking the workflow, just print a warning and skip the configuration\n\t\t\tlog.Info(\"Skipping invalid MaxPods value for Kubelet configuration\", \"value\", maxPods)\n\t\t} else {\n\t\t\tcfg.MaxPods = int32(mp)\n\t\t}\n\t}\n\n\tif containerLogMaxSize, ok := kubeletConfigs[common.ContainerLogMaxSizeKubeletConfig]; ok {\n\t\tcfg.ContainerLogMaxSize = containerLogMaxSize\n\t}\n\tif containerLogMaxFiles, ok := kubeletConfigs[common.ContainerLogMaxFilesKubeletConfig]; ok {\n\t\tmaxFiles, err := strconv.Atoi(containerLogMaxFiles)\n\t\tif err != nil || maxFiles < 0 {\n\t\t\t// Instead of breaking the workflow, just print a warning and skip the configuration\n\t\t\tlog.Infow(\"Skipping invalid ContainerLogMaxSize value for Kubelet configuration\", \"value\", containerLogMaxFiles)\n\t\t} else {\n\t\t\tcfg.ContainerLogMaxFiles = ptr.To(int32(maxFiles))\n\t\t}\n\t}\n\n\tif enabled, ok := featureGates[\"SeccompDefault\"]; ok && enabled {\n\t\tcfg.SeccompDefault = ptr.To(true)\n\t}\n\n\tbuf, err := kyaml.Marshal(cfg)\n\treturn string(buf), err\n}", "title": "" }, { "docid": "00ae5b88684756f190191c8c6c91bed1", "score": "0.46260256", "text": "func TestNameTransformation_skippingSecrets(t *testing.T) {\n\tth := kusttest_test.MakeHarness(t)\n\n\tth.WriteK(\"/nameandconfig\", `\nnamePrefix: p1-\nnameSuffix: -s1\nresources:\n- resources.yaml\nconfigurations:\n- skip-secrets-prefix.yaml\n`)\n\n\tth.WriteF(\"/nameandconfig/resources.yaml\", `\napiVersion: v1\nkind: ConfigMap\nmetadata:\n name: cm1\n---\napiVersion: v1\nkind: Secret\nmetadata:\n name: secret\n---\nkind: CustomResourceDefinition\nmetadata:\n name: my-crd\n`)\n\n\tth.WriteF(\"/nameandconfig/skip-secrets-prefix.yaml\", `\nnamePrefix:\n- path: metadata/name\n apiVersion: v1\n kind: Secret\n skip: true\n`)\n\n\tm := th.Run(\"/nameandconfig\", th.MakeDefaultOptions())\n\tth.AssertActualEqualsExpected(m, `\napiVersion: v1\nkind: ConfigMap\nmetadata:\n name: p1-cm1-s1\n---\napiVersion: v1\nkind: Secret\nmetadata:\n name: secret\n---\nkind: CustomResourceDefinition\nmetadata:\n name: my-crd\n`)\n}", "title": "" }, { "docid": "36aba19e46748e3b4db80e0ac8d135b2", "score": "0.46226642", "text": "func add(mgr manager.Manager, r reconcile.Reconciler) error {\n\t// Create a new controller\n\tc, err := controller.New(\"certsecret-controller\", mgr, controller.Options{Reconciler: r})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Watch for changes to primary resource CertSecret\n\terr = c.Watch(&source.Kind{Type: &appv1alpha1.CertSecret{}}, &handler.EnqueueRequestForObject{})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Watch for changes to secondary resource Pods and requeue the owner CertSecret\n\terr = c.Watch(&source.Kind{Type: &appsv1.Deployment{}}, &handler.EnqueueRequestForOwner{\n\t\tIsController: true,\n\t\tOwnerType: &appv1alpha1.CertSecret{},\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\t// 监听namespace变化\n\terr = c.Watch(&source.Kind{Type: &corev1.Namespace{}}, &enqueueRequestForNs{client: mgr.GetClient()})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "49ae2ad6252fcb52dc019edb9bcb669e", "score": "0.4621069", "text": "func promGroupByLabelNames(resource *pb.Resource) model.LabelNames {\n\tnames := model.LabelNames{namespaceLabel}\n\n\tif resource.Type != k8s.Namespaces {\n\t\tnames = append(names, promResourceType(resource))\n\t}\n\treturn names\n}", "title": "" }, { "docid": "ebb0b67bda5ce2162ca67aaa899250ce", "score": "0.4620895", "text": "func TestDedicatedAdmins(t *testing.T) {\n\ttests := []namespaceTestSuites{\n\t\t{\n\t\t\t// Should be able to create an unprivileged namespace\n\t\t\ttestID: \"dedi-create-nonpriv-ns\",\n\t\t\ttargetNamespace: \"my-ns\",\n\t\t\tusername: \"test-user\",\n\t\t\tuserGroups: []string{\"dedicated-admins\", \"system:authenticated\", \"system:authenticated:oauth\"},\n\t\t\toperation: admissionv1.Create,\n\t\t\tshouldBeAllowed: true,\n\t\t},\n\t\t{\n\t\t\t// Should not be able to delete a privileged namespace\n\t\t\ttestID: \"dedi-delete-priv-ns\",\n\t\t\ttargetNamespace: privilegedNamespace,\n\t\t\tusername: \"test-user\",\n\t\t\tuserGroups: []string{\"dedicated-admins\", \"system:authenticated\", \"system:authenticated:oauth\"},\n\t\t\toperation: admissionv1.Delete,\n\t\t\tshouldBeAllowed: false,\n\t\t},\n\t\t{\n\t\t\t// Should not be able to create a privileged namespace\n\t\t\ttestID: \"dedi-create-priv-ns\",\n\t\t\ttargetNamespace: privilegedNamespace,\n\t\t\tusername: \"test-user\",\n\t\t\tuserGroups: []string{\"dedicated-admins\", \"system:authenticated\", \"system:authenticated:oauth\"},\n\t\t\toperation: admissionv1.Create,\n\t\t\tshouldBeAllowed: false,\n\t\t},\n\t\t{\n\t\t\t// Should be able to create a namespace starting with 'openshift-' but not listed in the PrivilegedNamespaces list\n\t\t\ttestID: \"dedi-create-nonpriv-openshift-ns\",\n\t\t\ttargetNamespace: \"openshift-unpriv-ns\",\n\t\t\tusername: \"test-user\",\n\t\t\tuserGroups: []string{\"dedicated-admins\", \"system:authenticated\", \"system:authenticated:oauth\"},\n\t\t\toperation: admissionv1.Create,\n\t\t\tshouldBeAllowed: true,\n\t\t},\n\t\t{\n\t\t\t// Should not be able to update layered product namespace\n\t\t\ttestID: \"dedi-update-layered-prod-ns\",\n\t\t\ttargetNamespace: \"redhat-layered-product-ns\",\n\t\t\tusername: \"test-user\",\n\t\t\tuserGroups: []string{\"dedicated-admins\", \"system:authenticated\", \"system:authenticated:oauth\"},\n\t\t\toperation: admissionv1.Update,\n\t\t\tshouldBeAllowed: false,\n\t\t},\n\t\t{\n\t\t\t// Should not be able to kube-system\n\t\t\ttestID: \"dedi-update-kube-system-ns\",\n\t\t\ttargetNamespace: \"kube-system\",\n\t\t\tusername: \"test-user\",\n\t\t\tuserGroups: []string{\"dedicated-admins\", \"system:authenticated\", \"system:authenticated:oauth\"},\n\t\t\toperation: admissionv1.Update,\n\t\t\tshouldBeAllowed: false,\n\t\t},\n\t\t{\n\t\t\t// Should not be able to default\n\t\t\ttestID: \"dedi-update-default-ns\",\n\t\t\ttargetNamespace: \"default\",\n\t\t\tusername: \"test-user\",\n\t\t\tuserGroups: []string{\"dedicated-admins\", \"system:authenticated\", \"system:authenticated:oauth\"},\n\t\t\toperation: admissionv1.Update,\n\t\t\tshouldBeAllowed: false,\n\t\t},\n\t\t{\n\t\t\t// Should be able to delete a general namespace\n\t\t\ttestID: \"dedi-delete-random-ns\",\n\t\t\ttargetNamespace: \"my-ns\",\n\t\t\tusername: \"test-user\",\n\t\t\tuserGroups: []string{\"dedicated-admins\", \"system:authenticated\", \"system:authenticated:oauth\"},\n\t\t\toperation: admissionv1.Delete,\n\t\t\tshouldBeAllowed: true,\n\t\t},\n\t\t{\n\t\t\t// Should be able to updte a general namespace\n\t\t\ttestID: \"dedi-update-random-ns\",\n\t\t\ttargetNamespace: \"my-ns\",\n\t\t\tusername: \"test-user\",\n\t\t\tuserGroups: []string{\"dedicated-admins\", \"system:authenticated\", \"system:authenticated:oauth\"},\n\t\t\toperation: admissionv1.Update,\n\t\t\tshouldBeAllowed: true,\n\t\t},\n\t\t{\n\t\t\t// Should not be able to create an privileged namespace\n\t\t\ttestID: \"dedi-create-com-ns\",\n\t\t\ttargetNamespace: \"com\",\n\t\t\tusername: \"test-user\",\n\t\t\tuserGroups: []string{\"dedicated-admins\", \"system:authenticated\", \"system:authenticated:oauth\"},\n\t\t\toperation: admissionv1.Create,\n\t\t\tshouldBeAllowed: false,\n\t\t},\n\t\t{\n\t\t\t// Should not be able to create an privileged namespace\n\t\t\ttestID: \"dedi-create-io-ns\",\n\t\t\ttargetNamespace: \"io\",\n\t\t\tusername: \"test-user\",\n\t\t\tuserGroups: []string{\"dedicated-admins\", \"system:authenticated\", \"system:authenticated:oauth\"},\n\t\t\toperation: admissionv1.Create,\n\t\t\tshouldBeAllowed: false,\n\t\t},\n\t\t{\n\t\t\t// Should not be able to create an privileged namespace\n\t\t\ttestID: \"dedi-create-in-ns\",\n\t\t\ttargetNamespace: \"in\",\n\t\t\tusername: \"test-user\",\n\t\t\tuserGroups: []string{\"dedicated-admins\", \"system:authenticated\", \"system:authenticated:oauth\"},\n\t\t\toperation: admissionv1.Create,\n\t\t\tshouldBeAllowed: false,\n\t\t},\n\t}\n\trunNamespaceTests(t, tests)\n}", "title": "" }, { "docid": "f9f7852091fe3958db7b57dbf96e7203", "score": "0.46198767", "text": "func OwnershipModifierFactory(owner metav1.Object, scheme *runtime.Scheme) reconciling.ObjectModifier {\n\treturn func(create reconciling.ObjectReconciler) reconciling.ObjectReconciler {\n\t\treturn func(existing ctrlruntimeclient.Object) (ctrlruntimeclient.Object, error) {\n\t\t\tobj, err := create(existing)\n\t\t\tif err != nil {\n\t\t\t\treturn obj, err\n\t\t\t}\n\n\t\t\to, ok := obj.(metav1.Object)\n\t\t\tif !ok {\n\t\t\t\treturn obj, nil\n\t\t\t}\n\n\t\t\t// Sometimes, the KKP operator needs to deal with objects that are owned by Helm\n\t\t\t// and then re-appropriated by KKP. This will however interfere with Helm's own\n\t\t\t// ownership concept. Also, reconciling resources owned by Helm will just lead to\n\t\t\t// increased resourceVersions, which might then trigger Deployments to be reconciled\n\t\t\t// due to the VolumeVersion annotations.\n\t\t\t// To prevent this, if an object is already owned by Helm, we never touch it.\n\t\t\tif _, exists := o.GetAnnotations()[helmReleaseAnnotation]; exists {\n\t\t\t\treturn obj, nil\n\t\t\t}\n\n\t\t\t// try to set an owner reference; on shared resources this would fail to set\n\t\t\t// the second owner ref, we ignore this error and rely on the existing\n\t\t\t// KubermaticConfiguration ownership\n\t\t\terr = controllerutil.SetControllerReference(owner, o, scheme)\n\t\t\tif err != nil {\n\t\t\t\tvar cerr *controllerutil.AlreadyOwnedError // do not use errors.Is() on this error type\n\t\t\t\tif !errors.As(err, &cerr) {\n\t\t\t\t\treturn obj, fmt.Errorf(\"failed to set owner reference: %w\", err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tlabels := o.GetLabels()\n\t\t\tif labels == nil {\n\t\t\t\tlabels = make(map[string]string)\n\t\t\t}\n\t\t\tlabels[ManagedByLabel] = OperatorName\n\t\t\to.SetLabels(labels)\n\n\t\t\treturn obj, nil\n\t\t}\n\t}\n}", "title": "" }, { "docid": "100279c0e31e2c5783762aeea9d4a254", "score": "0.4619611", "text": "func getKubePodInfo(reverseProxyResponseMap map[string]ReverseProxyResponseObject, projects []string) error {\n\t// Get list of containers for all projects in projectsSlice\n\tlabels := make(map[string]string)\n\tlabels[\"namespace\"] = \"~\\\"\" + strings.Join(projects[:], \"|\") + \"\\\"\"\n\tbody, err := queryPromQL(\"\", \"kube_pod_info\", labels, \"\")\n\n\t// Unmarshal response body\n\tprometheusResponse, err := unmarshalPrometheusResponse(body)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn err\n\t}\n\n\t// fill response map with unmarshaled data\n\tfor _, result := range prometheusResponse.Data.Result {\n\t\t// instantiate reverseProxyResponseObject\n\t\treverseProxyResponseObject := newReverseProxyResponseObject()\n\n\t\t// fill in pod value\n\t\tif str, ok := result.Metric[\"pod\"].(string); ok {\n\t\t\treverseProxyResponseObject.Pod = str\n\t\t} else {\n\t\t\tfmt.Println(err)\n\t\t\treturn err\n\t\t}\n\n\t\t// fill in namespace value\n\t\tif str, ok := result.Metric[\"namespace\"].(string); ok {\n\t\t\treverseProxyResponseObject.Namespace = str\n\t\t} else {\n\t\t\tfmt.Println(err)\n\t\t\treturn err\n\t\t}\n\n\t\t// fill in created_by_name value\n\t\tif str, ok := result.Metric[\"created_by_name\"].(string); ok {\n\t\t\treverseProxyResponseObject.CreatedByName = str\n\t\t} else {\n\t\t\tfmt.Println(err)\n\t\t\treturn err\n\t\t}\n\n\t\t// fill in node value\n\t\tif str, ok := result.Metric[\"node\"].(string); ok {\n\t\t\treverseProxyResponseObject.Node = str\n\t\t} else {\n\t\t\tfmt.Println(err)\n\t\t\treturn err\n\t\t}\n\n\t\t// save struct as object\n\t\treverseProxyResponseMap[reverseProxyResponseObject.Pod] = *reverseProxyResponseObject\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "424ca754995016015b6aca2ba402b90b", "score": "0.4612897", "text": "func getChildNamesByType(obj podController) (map[string]configMetadata, map[string]configMetadata) {\n\tconfigMaps := make(map[string]configMetadata)\n\tsecrets := make(map[string]configMetadata)\n\n\t// Loop all Volumes and check the VolumeSources for ConfigMaps and Secrets\n\tfor _, vol := range obj.GetPodTemplate().Spec.Volumes {\n\t\tif cm := vol.VolumeSource.ConfigMap; cm != nil {\n\t\t\tconfigMaps[cm.Name] = configMetadata{required: true, allKeys: true}\n\t\t}\n\t\tif s := vol.VolumeSource.Secret; s != nil {\n\t\t\tsecrets[s.SecretName] = configMetadata{required: true, allKeys: true}\n\t\t}\n\t}\n\n\t// Loop all Containers and the respective EnvFrom,\n\t// check the EnvFromSources for ConfigMaps and Secrets\n\tfor _, container := range obj.GetPodTemplate().Spec.Containers {\n\t\tfor _, env := range container.EnvFrom {\n\t\t\tif cm := env.ConfigMapRef; cm != nil {\n\t\t\t\tconfigMaps[cm.Name] = configMetadata{required: true, allKeys: true}\n\t\t\t}\n\t\t\tif s := env.SecretRef; s != nil {\n\t\t\t\tsecrets[s.Name] = configMetadata{required: true, allKeys: true}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Loop all Containers and the respective Env\n\tfor _, container := range obj.GetPodTemplate().Spec.Containers {\n\t\tfor _, env := range container.Env {\n\t\t\tif valFrom := env.ValueFrom; valFrom != nil {\n\t\t\t\tif cm := valFrom.ConfigMapKeyRef; cm != nil {\n\t\t\t\t\tconfigMaps[cm.Name] = parseConfigMapKeyRef(configMaps[cm.Name], cm)\n\t\t\t\t}\n\t\t\t\tif s := valFrom.SecretKeyRef; s != nil {\n\t\t\t\t\tsecrets[s.Name] = parseSecretKeyRef(secrets[s.Name], s)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn configMaps, secrets\n}", "title": "" }, { "docid": "aeb5745675f11cf38fd901c3cc0e9fa7", "score": "0.46115342", "text": "func controlPlaneRoleName(clusterName string) string {\n\treturn fmt.Sprintf(\"%s%s-control-plane\", resourceNamePrefix, clusterName)\n}", "title": "" }, { "docid": "a390cb641afca07f51ca793d09c3a05b", "score": "0.46099335", "text": "func getKubePodCreated(reverseProxyResponseMap map[string]ReverseProxyResponseObject, projects []string) error {\n\t// Get list of containers for all projects in projectsSlice\n\tlabels := make(map[string]string)\n\tlabels[\"namespace\"] = \"~\\\"\" + strings.Join(projects[:], \"|\") + \"\\\"\"\n\tbody, err := queryPromQL(\"\", \"kube_pod_created\", labels, \"\")\n\n\t// Unmarshal response body\n\tprometheusResponse, err := unmarshalPrometheusResponse(body)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn err\n\t}\n\n\t// fill response map with unmarshaled data\n\tfor _, result := range prometheusResponse.Data.Result {\n\t\t// get pod value\n\t\tpod, ok := result.Metric[\"pod\"].(string)\n\t\tif !ok {\n\t\t\tfmt.Println(err)\n\t\t\treturn err\n\t\t}\n\n\t\t// Check if key exists\n\t\tif _, ok := reverseProxyResponseMap[pod]; ok {\n\t\t\t// get reverseProxyResponseObject\n\t\t\treverseProxyResponseObject := reverseProxyResponseMap[pod]\n\n\t\t\t// fill in kube_pod_created value\n\t\t\tif str, ok := result.Value[1].(string); ok {\n\t\t\t\treverseProxyResponseObject.KubePodCreated = str\n\t\t\t} else {\n\t\t\t\tfmt.Println(err)\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// save struct as object\n\t\t\treverseProxyResponseMap[pod] = reverseProxyResponseObject\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4e8efb07733dfcbb861359d95f57e528", "score": "0.4609055", "text": "func TestClusterPolicyListRespectingLabels(t *testing.T) {\n\ttestCache, cacheChannel, testChannel := beforeTestingSetup_readonlyclusterpolicycache()\n\tdefer close(cacheChannel)\n\n\tvar clusterPolicies *authorizationapi.ClusterPolicyList\n\tvar err error\n\n\tdesiredName := \"uniqueClusterPolicyName\"\n\tkey := \"labelToMatchOn\"\n\toperator := labels.EqualsOperator\n\tval := sets.NewString(\"someValue\")\n\trequirement, err := labels.NewRequirement(key, operator, val)\n\tif err != nil {\n\t\tt.Errorf(\"labels.Selector misconstructed: %v\", err)\n\t}\n\n\tlabel := labels.NewSelector().Add(*requirement)\n\n\tutilwait.Until(func() {\n\t\tclusterPolicies, err = testCache.List(&kapi.ListOptions{LabelSelector: label})\n\n\t\tif (err == nil) &&\n\t\t\t(clusterPolicies != nil) &&\n\t\t\t(len(clusterPolicies.Items) == 1) &&\n\t\t\t(clusterPolicies.Items[0].Name == desiredName) {\n\t\t\tclose(testChannel)\n\t\t}\n\t}, 1*time.Millisecond, testChannel)\n\n\tswitch {\n\tcase err != nil:\n\t\tt.Errorf(\"Error getting clusterPolicyList with labelSelector using ReadOnlyClusterPolicyCache: %v\", err)\n\tcase clusterPolicies == nil:\n\t\tt.Error(\"ClusterPolicyList is nil.\")\n\tcase len(clusterPolicies.Items) != 1:\n\t\tt.Errorf(\"Expected clusterPolicyList to contain 2 clusterPolicies, contained %d\", len(clusterPolicies.Items))\n\tcase clusterPolicies.Items[0].Name != desiredName:\n\t\tt.Errorf(\"Expected label-selected clusterPolicy name to be '%s', was '%s'\", desiredName, clusterPolicies.Items[0].Name)\n\t}\n}", "title": "" }, { "docid": "3c8b2de77fe2161940b4a7f304bd6143", "score": "0.46044254", "text": "func PatchPodAnnotations(kubeClient *kubernetes.Clientset, pod *v1.Pod, annotations map[string]string) error {\n\top := \"replace\"\n\tif len(pod.Annotations) == 0 {\n\t\top = \"add\"\n\t}\n\tif pod.Annotations == nil {\n\t\tpod.Annotations = map[string]string{}\n\t}\n\n\tfor k, v := range annotations {\n\t\tif _, ok := pod.Annotations[k]; ok {\n\t\t\t//log.Debug().Msgf(\"Annotation has exist in pod k:% v:%s\",k,pod.Annotations[k])\n\t\t\treturn nil\n\t\t}\n\t\tpod.Annotations[k] = v\n\t}\n\n\tpatchPayloadTemplate :=\n\t\t`[{\n \"op\": \"%s\",\n \"path\": \"/metadata/annotations\",\n \"value\": %s\n }]`\n\n\traw, _ := json.Marshal(pod.Annotations)\n\tpatchPayload := fmt.Sprintf(patchPayloadTemplate, op, raw)\n\tif _, err := kubeClient.CoreV1().Pods(\"default\").Patch(pod.Name, types.JSONPatchType, []byte(patchPayload)); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "35e4fa6d2691b952f98bbb209a8d8180", "score": "0.4597984", "text": "func createScheme() *runtime.Scheme {\n\tscheme := runtime.NewScheme()\n\t_ = clientgoscheme.AddToScheme(scheme)\n\t_ = appconfiguration_v1beta20220501.AddToScheme(scheme)\n\t_ = appconfiguration_v1beta20220501s.AddToScheme(scheme)\n\t_ = appconfiguration_v20220501.AddToScheme(scheme)\n\t_ = appconfiguration_v20220501s.AddToScheme(scheme)\n\t_ = authorization_v1beta20200801p.AddToScheme(scheme)\n\t_ = authorization_v1beta20200801ps.AddToScheme(scheme)\n\t_ = authorization_v20200801p.AddToScheme(scheme)\n\t_ = authorization_v20200801ps.AddToScheme(scheme)\n\t_ = batch_v1beta20210101.AddToScheme(scheme)\n\t_ = batch_v1beta20210101s.AddToScheme(scheme)\n\t_ = batch_v20210101.AddToScheme(scheme)\n\t_ = batch_v20210101s.AddToScheme(scheme)\n\t_ = cache_v1beta20201201.AddToScheme(scheme)\n\t_ = cache_v1beta20201201s.AddToScheme(scheme)\n\t_ = cache_v1beta20210301.AddToScheme(scheme)\n\t_ = cache_v1beta20210301s.AddToScheme(scheme)\n\t_ = cache_v20201201.AddToScheme(scheme)\n\t_ = cache_v20201201s.AddToScheme(scheme)\n\t_ = cache_v20210301.AddToScheme(scheme)\n\t_ = cache_v20210301s.AddToScheme(scheme)\n\t_ = cdn_v1beta20210601.AddToScheme(scheme)\n\t_ = cdn_v1beta20210601s.AddToScheme(scheme)\n\t_ = cdn_v20210601.AddToScheme(scheme)\n\t_ = cdn_v20210601s.AddToScheme(scheme)\n\t_ = compute_v1beta20200930.AddToScheme(scheme)\n\t_ = compute_v1beta20200930s.AddToScheme(scheme)\n\t_ = compute_v1beta20201201.AddToScheme(scheme)\n\t_ = compute_v1beta20201201s.AddToScheme(scheme)\n\t_ = compute_v1beta20210701.AddToScheme(scheme)\n\t_ = compute_v1beta20210701s.AddToScheme(scheme)\n\t_ = compute_v1beta20220301.AddToScheme(scheme)\n\t_ = compute_v1beta20220301s.AddToScheme(scheme)\n\t_ = compute_v20200930.AddToScheme(scheme)\n\t_ = compute_v20200930s.AddToScheme(scheme)\n\t_ = compute_v20201201.AddToScheme(scheme)\n\t_ = compute_v20201201s.AddToScheme(scheme)\n\t_ = compute_v20210701.AddToScheme(scheme)\n\t_ = compute_v20210701s.AddToScheme(scheme)\n\t_ = compute_v20220301.AddToScheme(scheme)\n\t_ = compute_v20220301s.AddToScheme(scheme)\n\t_ = containerinstance_v1beta20211001.AddToScheme(scheme)\n\t_ = containerinstance_v1beta20211001s.AddToScheme(scheme)\n\t_ = containerinstance_v20211001.AddToScheme(scheme)\n\t_ = containerinstance_v20211001s.AddToScheme(scheme)\n\t_ = containerregistry_v1beta20210901.AddToScheme(scheme)\n\t_ = containerregistry_v1beta20210901s.AddToScheme(scheme)\n\t_ = containerregistry_v20210901.AddToScheme(scheme)\n\t_ = containerregistry_v20210901s.AddToScheme(scheme)\n\t_ = containerservice_v1beta20210501.AddToScheme(scheme)\n\t_ = containerservice_v1beta20210501s.AddToScheme(scheme)\n\t_ = containerservice_v20210501.AddToScheme(scheme)\n\t_ = containerservice_v20210501s.AddToScheme(scheme)\n\t_ = containerservice_v20230201.AddToScheme(scheme)\n\t_ = containerservice_v20230201s.AddToScheme(scheme)\n\t_ = containerservice_v20230202p.AddToScheme(scheme)\n\t_ = containerservice_v20230202ps.AddToScheme(scheme)\n\t_ = datafactory_v20180601.AddToScheme(scheme)\n\t_ = datafactory_v20180601s.AddToScheme(scheme)\n\t_ = dataprotection_v20230101.AddToScheme(scheme)\n\t_ = dataprotection_v20230101s.AddToScheme(scheme)\n\t_ = dbformariadb_v1beta20180601.AddToScheme(scheme)\n\t_ = dbformariadb_v1beta20180601s.AddToScheme(scheme)\n\t_ = dbformariadb_v20180601.AddToScheme(scheme)\n\t_ = dbformariadb_v20180601s.AddToScheme(scheme)\n\t_ = dbformysql_v1beta20210501.AddToScheme(scheme)\n\t_ = dbformysql_v1beta20210501s.AddToScheme(scheme)\n\t_ = dbformysql_v20210501.AddToScheme(scheme)\n\t_ = dbformysql_v20210501s.AddToScheme(scheme)\n\t_ = dbformysql_v20220101.AddToScheme(scheme)\n\t_ = dbformysql_v20220101s.AddToScheme(scheme)\n\t_ = dbforpostgresql_v1beta20210601.AddToScheme(scheme)\n\t_ = dbforpostgresql_v1beta20210601s.AddToScheme(scheme)\n\t_ = dbforpostgresql_v1beta20220120p.AddToScheme(scheme)\n\t_ = dbforpostgresql_v1beta20220120ps.AddToScheme(scheme)\n\t_ = dbforpostgresql_v20210601.AddToScheme(scheme)\n\t_ = dbforpostgresql_v20210601s.AddToScheme(scheme)\n\t_ = dbforpostgresql_v20220120p.AddToScheme(scheme)\n\t_ = dbforpostgresql_v20220120ps.AddToScheme(scheme)\n\t_ = devices_v20210702.AddToScheme(scheme)\n\t_ = devices_v20210702s.AddToScheme(scheme)\n\t_ = documentdb_v1beta20210515.AddToScheme(scheme)\n\t_ = documentdb_v1beta20210515s.AddToScheme(scheme)\n\t_ = documentdb_v20210515.AddToScheme(scheme)\n\t_ = documentdb_v20210515s.AddToScheme(scheme)\n\t_ = eventgrid_v1beta20200601.AddToScheme(scheme)\n\t_ = eventgrid_v1beta20200601s.AddToScheme(scheme)\n\t_ = eventgrid_v20200601.AddToScheme(scheme)\n\t_ = eventgrid_v20200601s.AddToScheme(scheme)\n\t_ = eventhub_v1beta20211101.AddToScheme(scheme)\n\t_ = eventhub_v1beta20211101s.AddToScheme(scheme)\n\t_ = eventhub_v20211101.AddToScheme(scheme)\n\t_ = eventhub_v20211101s.AddToScheme(scheme)\n\t_ = insights_v1beta20180501p.AddToScheme(scheme)\n\t_ = insights_v1beta20180501ps.AddToScheme(scheme)\n\t_ = insights_v1beta20200202.AddToScheme(scheme)\n\t_ = insights_v1beta20200202s.AddToScheme(scheme)\n\t_ = insights_v20180501p.AddToScheme(scheme)\n\t_ = insights_v20180501ps.AddToScheme(scheme)\n\t_ = insights_v20200202.AddToScheme(scheme)\n\t_ = insights_v20200202s.AddToScheme(scheme)\n\t_ = keyvault_v1beta20210401p.AddToScheme(scheme)\n\t_ = keyvault_v1beta20210401ps.AddToScheme(scheme)\n\t_ = keyvault_v20210401p.AddToScheme(scheme)\n\t_ = keyvault_v20210401ps.AddToScheme(scheme)\n\t_ = machinelearningservices_v1beta20210701.AddToScheme(scheme)\n\t_ = machinelearningservices_v1beta20210701s.AddToScheme(scheme)\n\t_ = machinelearningservices_v20210701.AddToScheme(scheme)\n\t_ = machinelearningservices_v20210701s.AddToScheme(scheme)\n\t_ = managedidentity_v1beta20181130.AddToScheme(scheme)\n\t_ = managedidentity_v1beta20181130s.AddToScheme(scheme)\n\t_ = managedidentity_v1beta20220131p.AddToScheme(scheme)\n\t_ = managedidentity_v1beta20220131ps.AddToScheme(scheme)\n\t_ = managedidentity_v20181130.AddToScheme(scheme)\n\t_ = managedidentity_v20181130s.AddToScheme(scheme)\n\t_ = managedidentity_v20220131p.AddToScheme(scheme)\n\t_ = managedidentity_v20220131ps.AddToScheme(scheme)\n\t_ = network_v1beta20180901.AddToScheme(scheme)\n\t_ = network_v1beta20180901s.AddToScheme(scheme)\n\t_ = network_v1beta20201101.AddToScheme(scheme)\n\t_ = network_v1beta20201101s.AddToScheme(scheme)\n\t_ = network_v20180501.AddToScheme(scheme)\n\t_ = network_v20180501s.AddToScheme(scheme)\n\t_ = network_v20180901.AddToScheme(scheme)\n\t_ = network_v20180901s.AddToScheme(scheme)\n\t_ = network_v20200601.AddToScheme(scheme)\n\t_ = network_v20200601s.AddToScheme(scheme)\n\t_ = network_v20201101.AddToScheme(scheme)\n\t_ = network_v20201101s.AddToScheme(scheme)\n\t_ = network_v20220701.AddToScheme(scheme)\n\t_ = network_v20220701s.AddToScheme(scheme)\n\t_ = operationalinsights_v1beta20210601.AddToScheme(scheme)\n\t_ = operationalinsights_v1beta20210601s.AddToScheme(scheme)\n\t_ = operationalinsights_v20210601.AddToScheme(scheme)\n\t_ = operationalinsights_v20210601s.AddToScheme(scheme)\n\t_ = resources_v1beta20200601.AddToScheme(scheme)\n\t_ = resources_v1beta20200601s.AddToScheme(scheme)\n\t_ = resources_v20200601.AddToScheme(scheme)\n\t_ = resources_v20200601s.AddToScheme(scheme)\n\t_ = search_v20220901.AddToScheme(scheme)\n\t_ = search_v20220901s.AddToScheme(scheme)\n\t_ = servicebus_v1beta20210101p.AddToScheme(scheme)\n\t_ = servicebus_v1beta20210101ps.AddToScheme(scheme)\n\t_ = servicebus_v20210101p.AddToScheme(scheme)\n\t_ = servicebus_v20210101ps.AddToScheme(scheme)\n\t_ = signalrservice_v1beta20211001.AddToScheme(scheme)\n\t_ = signalrservice_v1beta20211001s.AddToScheme(scheme)\n\t_ = signalrservice_v20211001.AddToScheme(scheme)\n\t_ = signalrservice_v20211001s.AddToScheme(scheme)\n\t_ = sql_v20211101.AddToScheme(scheme)\n\t_ = sql_v20211101s.AddToScheme(scheme)\n\t_ = storage_v1beta20210401.AddToScheme(scheme)\n\t_ = storage_v1beta20210401s.AddToScheme(scheme)\n\t_ = storage_v20210401.AddToScheme(scheme)\n\t_ = storage_v20210401s.AddToScheme(scheme)\n\t_ = storage_v20220901.AddToScheme(scheme)\n\t_ = storage_v20220901s.AddToScheme(scheme)\n\t_ = subscription_v1beta20211001.AddToScheme(scheme)\n\t_ = subscription_v1beta20211001s.AddToScheme(scheme)\n\t_ = subscription_v20211001.AddToScheme(scheme)\n\t_ = subscription_v20211001s.AddToScheme(scheme)\n\t_ = synapse_v20210601.AddToScheme(scheme)\n\t_ = synapse_v20210601s.AddToScheme(scheme)\n\t_ = web_v1beta20220301.AddToScheme(scheme)\n\t_ = web_v1beta20220301s.AddToScheme(scheme)\n\t_ = web_v20220301.AddToScheme(scheme)\n\t_ = web_v20220301s.AddToScheme(scheme)\n\treturn scheme\n}", "title": "" }, { "docid": "04c21ff18abde018d075a2f0d2d8cfd2", "score": "0.4595189", "text": "func (o *RBACOptions) findRules(exp *redskyv1alpha1.Experiment) ([]*rbacv1.PolicyRule, error) {\n\tvar rules []*rbacv1.PolicyRule\n\n\t// Patches require \"get\" and \"patch\" permissions\n\tfor i := range exp.Spec.Patches {\n\t\t// TODO This needs to use patch_controller.go `renderTemplate` to get the correct reference (e.g. SMP may have the ref in the payload)\n\t\t// NOTE: Technically we can not get the target reference without an actual trial; in most cases a dummy trial should work\n\t\tref := exp.Spec.Patches[i].TargetRef\n\t\tif ref != nil {\n\t\t\trules = append(rules, o.newPolicyRule(ref, \"get\", \"patch\"))\n\t\t}\n\t}\n\n\t// Readiness checks with no name require \"list\" permissions\n\tfor i := range exp.Spec.Template.Spec.ReadinessChecks {\n\t\tref := &exp.Spec.Template.Spec.ReadinessChecks[i].TargetRef\n\t\tif ref.Name == \"\" {\n\t\t\trules = append(rules, o.newPolicyRule(ref, \"list\"))\n\t\t}\n\t}\n\n\t// Readiness gates will be converted to readiness checks; therefore we need the same check on non-empty names\n\tfor i := range exp.Spec.Template.Spec.ReadinessGates {\n\t\tr := &exp.Spec.Template.Spec.ReadinessGates[i]\n\t\tif r.Name == \"\" {\n\t\t\tref := &corev1.ObjectReference{Kind: r.Kind, APIVersion: r.APIVersion}\n\t\t\trules = append(rules, o.newPolicyRule(ref, \"list\"))\n\t\t}\n\t}\n\n\treturn rules, nil\n}", "title": "" }, { "docid": "a4abff5019e4fb2add9f7cdfe9e0d985", "score": "0.45935178", "text": "func makeKubernetesDeployment(t *testing.T, pod TestPodDescriptor) *appsv1.Deployment {\n\treplicaCount := new(int32)\n\t*replicaCount = 1\n\n\tvolumeMounts := make([]v1.VolumeMount, 0)\n\tvolumes := make([]v1.Volume, 0)\n\n\tfor i, volume := range pod.Volumes {\n\t\tvolumeName := fmt.Sprintf(\"volume-%v\", i)\n\t\tvolumeMounts = append(volumeMounts, v1.VolumeMount{\n\t\t\tMountPath: fmt.Sprintf(\"/data-%v\", i),\n\t\t\tName: volumeName,\n\t\t})\n\t\tvolumes = append(volumes, v1.Volume{\n\t\t\tName: volumeName,\n\t\t\tVolumeSource: v1.VolumeSource{\n\t\t\t\tPersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{\n\t\t\t\t\tClaimName: volume.ClaimName,\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t}\n\n\tdeployment := &appsv1.Deployment{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: pod.Name,\n\t\t},\n\t\tSpec: appsv1.DeploymentSpec{\n\t\t\tReplicas: replicaCount,\n\t\t\tSelector: &metav1.LabelSelector{\n\t\t\t\tMatchLabels: map[string]string{\n\t\t\t\t\t\"app\": pod.Name,\n\t\t\t\t},\n\t\t\t},\n\t\t\tTemplate: v1.PodTemplateSpec{\n\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\tLabels: map[string]string{\n\t\t\t\t\t\t\"app\": pod.Name,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tSpec: v1.PodSpec{\n\t\t\t\t\t// use google's pause container instead of a sleeping busybox\n\t\t\t\t\t// reasoning: the pause container properly terminates when the container runtime\n\t\t\t\t\t// signals TERM; a sleeping busybox will not and it will take a while before the\n\t\t\t\t\t// container is killed, unless we were to explicitly handle the TERM signal\n\t\t\t\t\tContainers: []v1.Container{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"pause\",\n\t\t\t\t\t\t\tImage: \"gcr.io/google-containers/pause-amd64:3.1\",\n\t\t\t\t\t\t\tVolumeMounts: volumeMounts,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tVolumes: volumes,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\tt.Logf(\"Creating deployment %v\", pod.Name)\n\t_, err := client.AppsV1().Deployments(namespace).Create(context.Background(), deployment, metav1.CreateOptions{})\n\tassert.NoError(t, err)\n\n\treturn deployment\n}", "title": "" }, { "docid": "266bfd631cf948a1fcf7da6b0fd2e62f", "score": "0.4588128", "text": "func resourceAccess(k8sClient kubernetes.Interface, namespace, group, resource string) (bool, error) {\n\t// first check for cluster-wide access\n\tallowed, _, err := ResourceAuthz(\n\t\tk8sClient,\n\t\t\"\",\n\t\t\"list\",\n\t\tgroup,\n\t\t\"\",\n\t\tresource,\n\t\t\"\",\n\t)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\tif allowed {\n\t\t// authorized for cluster-wide access\n\t\treturn true, nil\n\t}\n\n\t// next check for namespace-wide access\n\tallowed, reason, err := ResourceAuthz(\n\t\tk8sClient,\n\t\tnamespace,\n\t\t\"list\",\n\t\tgroup,\n\t\t\"\",\n\t\tresource,\n\t\t\"\",\n\t)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\tif allowed {\n\t\t// authorized for namespace-wide access\n\t\treturn false, nil\n\t}\n\n\tif len(reason) > 0 {\n\t\treturn false, fmt.Errorf(\"not authorized to access \\\"%s\\\" namespace: %s\", namespace, reason)\n\t}\n\treturn false, fmt.Errorf(\"not authorized to access \\\"%s\\\" namespace\", namespace)\n}", "title": "" }, { "docid": "07595da9ac2a7fd75bbca0581a359c0a", "score": "0.45855808", "text": "func (c *Controller) applyKR(namespace string, name string, kr *kaosv1.KaosRule) {\n\n\tsel, err := metav1.LabelSelectorAsSelector(kr.Spec.PodSelector)\n\tif err != nil {\n\t\tglog.Fatalf(\"%s Error parsing PodSelector: %v\", kr.String(), err)\n\t\tc.recorder.Event(kr, corev1.EventTypeWarning, PodSelectingError, fmt.Sprintf(\"Error selecting pods: %v\", err))\n\t\treturn\n\t}\n\n\tglog.V(4).Info(fmt.Sprintf(\"%s Apply filtered rule (filter=%s)\", kr.String(), sel.String()))\n\tlist, err := c.kubeclientset.CoreV1().Pods(namespace).List(metav1.ListOptions{\n\t\tLabelSelector: sel.String(),\n\t\tFieldSelector: fields.OneTermEqualSelector(api.PodStatusField, \"Running\").String()})\n\tif err != nil {\n\t\tglog.Fatalf(\"%s Error listing pods: %v\", kr.String(), err)\n\t\tc.recorder.Event(kr, corev1.EventTypeWarning, PodListingError, fmt.Sprintf(\"Error listing pods: %v\", err))\n\t\treturn\n\t}\n\n\tglog.V(4).Info(fmt.Sprintf(\"%s Apply rule got %d items from list %s\", kr.String(), len(list.Items), list))\n\tif len(list.Items) == 0 {\n\t\tglog.V(2).Info(fmt.Sprintf(\"%s No pod matching (%s), leaving\", kr.String(), sel.String()))\n\t\tc.recorder.Event(kr, corev1.EventTypeWarning, PodListingEmpty, fmt.Sprintf(\"No pods matching %s\", sel.String()))\n\t\treturn\n\t}\n\n\tvictimIndex := c.rand.Intn(len(list.Items))\n\tvictimName := list.Items[victimIndex].Name\n\n\tglog.V(2).Info(fmt.Sprintf(\"%s About to delete pod index %d from list matching %s\", kr.String(), victimIndex, sel.String()))\n\terr = c.kubeclientset.CoreV1().Pods(namespace).Delete(victimName, nil)\n\tif err != nil && !errors.IsConflict(err) && !errors.IsNotFound(err) {\n\t\tglog.Fatalf(\"%s Error deleting pod %s in: %v\", kr.String(), victimName, err)\n\t\tc.recorder.Event(kr, corev1.EventTypeWarning, PodDeletingError, fmt.Sprintf(\"Error deleting pod %s: %v\", victimName, err))\n\t} else {\n\t\tc.recorder.Event(kr, corev1.EventTypeNormal, KaosCreated, fmt.Sprintf(\"Pod %s has been deleted\", victimName))\n\t\tKilledPods.WithLabelValues(namespace, name).Inc()\n\t}\n}", "title": "" }, { "docid": "58c2c18aab77cf8195ff4b1fd5420573", "score": "0.45855114", "text": "func TestPolicy(t *testing.T) {\n\tctx := context.Background()\n\n\t// Test authorization stats\n\tTestHelper.WithDataPlaneNamespace(ctx, \"stat-authz-test\", map[string]string{}, t, func(t *testing.T, prefixedNs string) {\n\t\temojivotoYaml, err := testutil.ReadFile(\"testdata/emojivoto.yaml\")\n\t\tif err != nil {\n\t\t\ttestutil.AnnotatedFatalf(t, \"failed to read emojivoto yaml\",\n\t\t\t\t\"failed to read emojivoto yaml\\n%s\\n\", err)\n\t\t}\n\t\temojivotoYaml = strings.ReplaceAll(emojivotoYaml, \"___NS___\", prefixedNs)\n\t\tout, stderr, err := TestHelper.PipeToLinkerdRun(emojivotoYaml, \"inject\", \"-\")\n\t\tif err != nil {\n\t\t\ttestutil.AnnotatedFatalf(t, \"'linkerd inject' command failed\",\n\t\t\t\t\"'linkerd inject' command failed\\n%s\\n%s\", out, stderr)\n\t\t}\n\n\t\tout, err = TestHelper.KubectlApply(out, prefixedNs)\n\t\tif err != nil {\n\t\t\ttestutil.AnnotatedFatalf(t, \"failed to apply emojivoto resources\",\n\t\t\t\t\"failed to apply emojivoto resources: %s\\n %s\", err, out)\n\t\t}\n\n\t\temojivotoPolicy, err := testutil.ReadFile(\"testdata/emoji-policy.yaml\")\n\t\tif err != nil {\n\t\t\ttestutil.AnnotatedFatalf(t, \"failed to read emoji-policy yaml\",\n\t\t\t\t\"failed to read emoji-policy yaml\\n%s\\n\", err)\n\t\t}\n\n\t\tout, err = TestHelper.KubectlApply(emojivotoPolicy, prefixedNs)\n\t\tif err != nil {\n\t\t\ttestutil.AnnotatedFatalf(t, \"failed to apply emojivoto policy resources\",\n\t\t\t\t\"failed to apply emojivoto policy resources: %s\\n %s\", err, out)\n\t\t}\n\n\t\t// wait for deployments to start\n\t\tfor _, deploy := range []string{\"web\", \"emoji\", \"vote-bot\", \"voting\"} {\n\t\t\tif err := TestHelper.CheckPods(ctx, prefixedNs, deploy, 1); err != nil {\n\t\t\t\t//nolint:errorlint\n\t\t\t\tif rce, ok := err.(*testutil.RestartCountError); ok {\n\t\t\t\t\ttestutil.AnnotatedWarn(t, \"CheckPods timed-out\", rce)\n\t\t\t\t} else {\n\t\t\t\t\ttestutil.AnnotatedError(t, \"CheckPods timed-out\", err)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\ttestCases := []struct {\n\t\t\targs []string\n\t\t\texpectedRows []string\n\t\t\tisServer bool\n\t\t}{\n\t\t\t{\n\t\t\t\targs: []string{\"viz\", \"stat\", \"srv\", \"-n\", prefixedNs},\n\t\t\t\texpectedRows: []string{\n\t\t\t\t\t\"emoji-grpc\",\n\t\t\t\t\t\"voting-grpc\",\n\t\t\t\t\t\"web-http\",\n\t\t\t\t},\n\t\t\t\tisServer: true,\n\t\t\t},\n\t\t\t{\n\t\t\t\targs: []string{\"viz\", \"stat\", \"srv/emoji-grpc\", \"-n\", prefixedNs},\n\t\t\t\texpectedRows: []string{\n\t\t\t\t\t\"emoji-grpc\",\n\t\t\t\t},\n\t\t\t\tisServer: true,\n\t\t\t},\n\t\t\t{\n\t\t\t\targs: []string{\"viz\", \"stat\", \"saz\", \"-n\", prefixedNs},\n\t\t\t\texpectedRows: []string{\n\t\t\t\t\t\"emoji-grpc\",\n\t\t\t\t\t\"voting-grpc\",\n\t\t\t\t\t\"web-public\",\n\t\t\t\t},\n\t\t\t\tisServer: false,\n\t\t\t},\n\t\t\t{\n\t\t\t\targs: []string{\"viz\", \"stat\", \"saz/emoji-grpc\", \"-n\", prefixedNs},\n\t\t\t\texpectedRows: []string{\n\t\t\t\t\t\"emoji-grpc\",\n\t\t\t\t},\n\t\t\t\tisServer: false,\n\t\t\t},\n\t\t}\n\n\t\tfor _, tt := range testCases {\n\t\t\ttt := tt // pin\n\t\t\ttimeout := 3 * time.Minute\n\t\t\tt.Run(\"linkerd \"+strings.Join(tt.args, \" \"), func(t *testing.T) {\n\t\t\t\terr := testutil.RetryFor(timeout, func() error {\n\t\t\t\t\t// Use a short time window so that transient errors at startup\n\t\t\t\t\t// fall out of the window.\n\t\t\t\t\ttt.args = append(tt.args, \"-t\", \"30s\")\n\t\t\t\t\tout, err := TestHelper.LinkerdRun(tt.args...)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\ttestutil.AnnotatedFatalf(t, \"unexpected stat error\",\n\t\t\t\t\t\t\t\"unexpected stat error: %s\\n%s\", err, out)\n\t\t\t\t\t}\n\n\t\t\t\t\tvar expectedColumnCount int\n\t\t\t\t\tif tt.isServer {\n\t\t\t\t\t\texpectedColumnCount = 8\n\t\t\t\t\t} else {\n\t\t\t\t\t\texpectedColumnCount = 6\n\t\t\t\t\t}\n\n\t\t\t\t\trowStats, err := ParseAuthzRows(out, len(tt.expectedRows), expectedColumnCount, tt.isServer)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\n\t\t\t\t\tfor _, name := range tt.expectedRows {\n\t\t\t\t\t\tif err := validateAuthzRows(name, rowStats, tt.isServer); err != nil {\n\t\t\t\t\t\t\treturn err\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\treturn nil\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\ttestutil.AnnotatedFatal(t, fmt.Sprintf(\"timed-out checking policy stats (%s)\", timeout), err)\n\t\t\t\t}\n\t\t\t})\n\t\t}\n\t})\n}", "title": "" } ]
602c5814e2f1906b433d275ab89f5529
NewOwnableFilterer creates a new log filterer instance of Ownable, bound to a specific deployed contract.
[ { "docid": "74b93ead3bb61d6b2b8ce9d23c180134", "score": "0.80254406", "text": "func NewOwnableFilterer(address common.Address, filterer bind.ContractFilterer) (*OwnableFilterer, error) {\n\tcontract, err := bindOwnable(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableFilterer{contract: contract}, nil\n}", "title": "" } ]
[ { "docid": "7f03f95dd47d6c56f75398c9a1128c74", "score": "0.7039219", "text": "func NewOwnableDelegateProxyFilterer(address common.Address, filterer bind.ContractFilterer) (*OwnableDelegateProxyFilterer, error) {\n\tcontract, err := bindOwnableDelegateProxy(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableDelegateProxyFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "a4707f395e37b7a5f1084e4228a44894", "score": "0.66030467", "text": "func NewOwnedFilterer(address common.Address, filterer bind.ContractFilterer) (*OwnedFilterer, error) {\n\tcontract, err := bindOwned(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnedFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "a4707f395e37b7a5f1084e4228a44894", "score": "0.66030467", "text": "func NewOwnedFilterer(address common.Address, filterer bind.ContractFilterer) (*OwnedFilterer, error) {\n\tcontract, err := bindOwned(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnedFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "a4707f395e37b7a5f1084e4228a44894", "score": "0.66030467", "text": "func NewOwnedFilterer(address common.Address, filterer bind.ContractFilterer) (*OwnedFilterer, error) {\n\tcontract, err := bindOwned(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnedFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "aed8ecbf175bd43f35806701edb1a98d", "score": "0.6356733", "text": "func NewOwnable(address common.Address, backend bind.ContractBackend) (*Ownable, error) {\n\tcontract, err := bindOwnable(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Ownable{OwnableCaller: OwnableCaller{contract: contract}, OwnableTransactor: OwnableTransactor{contract: contract}, OwnableFilterer: OwnableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "aed8ecbf175bd43f35806701edb1a98d", "score": "0.6356733", "text": "func NewOwnable(address common.Address, backend bind.ContractBackend) (*Ownable, error) {\n\tcontract, err := bindOwnable(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Ownable{OwnableCaller: OwnableCaller{contract: contract}, OwnableTransactor: OwnableTransactor{contract: contract}, OwnableFilterer: OwnableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "aed8ecbf175bd43f35806701edb1a98d", "score": "0.6356733", "text": "func NewOwnable(address common.Address, backend bind.ContractBackend) (*Ownable, error) {\n\tcontract, err := bindOwnable(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Ownable{OwnableCaller: OwnableCaller{contract: contract}, OwnableTransactor: OwnableTransactor{contract: contract}, OwnableFilterer: OwnableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "aed8ecbf175bd43f35806701edb1a98d", "score": "0.6356733", "text": "func NewOwnable(address common.Address, backend bind.ContractBackend) (*Ownable, error) {\n\tcontract, err := bindOwnable(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Ownable{OwnableCaller: OwnableCaller{contract: contract}, OwnableTransactor: OwnableTransactor{contract: contract}, OwnableFilterer: OwnableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "aed8ecbf175bd43f35806701edb1a98d", "score": "0.6356733", "text": "func NewOwnable(address common.Address, backend bind.ContractBackend) (*Ownable, error) {\n\tcontract, err := bindOwnable(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Ownable{OwnableCaller: OwnableCaller{contract: contract}, OwnableTransactor: OwnableTransactor{contract: contract}, OwnableFilterer: OwnableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "aed8ecbf175bd43f35806701edb1a98d", "score": "0.6356733", "text": "func NewOwnable(address common.Address, backend bind.ContractBackend) (*Ownable, error) {\n\tcontract, err := bindOwnable(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Ownable{OwnableCaller: OwnableCaller{contract: contract}, OwnableTransactor: OwnableTransactor{contract: contract}, OwnableFilterer: OwnableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "1bf7f415bb0d5af04597cdbb9989aaa5", "score": "0.60961896", "text": "func NewOwnableCaller(address common.Address, caller bind.ContractCaller) (*OwnableCaller, error) {\n\tcontract, err := bindOwnable(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "1bf7f415bb0d5af04597cdbb9989aaa5", "score": "0.60961896", "text": "func NewOwnableCaller(address common.Address, caller bind.ContractCaller) (*OwnableCaller, error) {\n\tcontract, err := bindOwnable(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "1bf7f415bb0d5af04597cdbb9989aaa5", "score": "0.60961896", "text": "func NewOwnableCaller(address common.Address, caller bind.ContractCaller) (*OwnableCaller, error) {\n\tcontract, err := bindOwnable(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "1bf7f415bb0d5af04597cdbb9989aaa5", "score": "0.60961896", "text": "func NewOwnableCaller(address common.Address, caller bind.ContractCaller) (*OwnableCaller, error) {\n\tcontract, err := bindOwnable(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "1bf7f415bb0d5af04597cdbb9989aaa5", "score": "0.60961896", "text": "func NewOwnableCaller(address common.Address, caller bind.ContractCaller) (*OwnableCaller, error) {\n\tcontract, err := bindOwnable(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "1bf7f415bb0d5af04597cdbb9989aaa5", "score": "0.60961896", "text": "func NewOwnableCaller(address common.Address, caller bind.ContractCaller) (*OwnableCaller, error) {\n\tcontract, err := bindOwnable(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "35f874ab31bcca2f3db0cb0ecc1cca6b", "score": "0.5802769", "text": "func bindOwnable(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor, filterer bind.ContractFilterer) (*bind.BoundContract, error) {\n\tparsed, err := ParsedABI(K_Ownable)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, *parsed, caller, transactor, filterer), nil\n}", "title": "" }, { "docid": "35f874ab31bcca2f3db0cb0ecc1cca6b", "score": "0.5802769", "text": "func bindOwnable(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor, filterer bind.ContractFilterer) (*bind.BoundContract, error) {\n\tparsed, err := ParsedABI(K_Ownable)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, *parsed, caller, transactor, filterer), nil\n}", "title": "" }, { "docid": "9f0abbc8d365d4f3da2e747ea9ae595a", "score": "0.57844925", "text": "func bindOwnable(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor, filterer bind.ContractFilterer) (*bind.BoundContract, error) {\n\tparsed, err := abi.JSON(strings.NewReader(OwnableABI))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, parsed, caller, transactor, filterer), nil\n}", "title": "" }, { "docid": "9f0abbc8d365d4f3da2e747ea9ae595a", "score": "0.57844925", "text": "func bindOwnable(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor, filterer bind.ContractFilterer) (*bind.BoundContract, error) {\n\tparsed, err := abi.JSON(strings.NewReader(OwnableABI))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, parsed, caller, transactor, filterer), nil\n}", "title": "" }, { "docid": "9f0abbc8d365d4f3da2e747ea9ae595a", "score": "0.57844925", "text": "func bindOwnable(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor, filterer bind.ContractFilterer) (*bind.BoundContract, error) {\n\tparsed, err := abi.JSON(strings.NewReader(OwnableABI))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, parsed, caller, transactor, filterer), nil\n}", "title": "" }, { "docid": "9f0abbc8d365d4f3da2e747ea9ae595a", "score": "0.57844925", "text": "func bindOwnable(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor, filterer bind.ContractFilterer) (*bind.BoundContract, error) {\n\tparsed, err := abi.JSON(strings.NewReader(OwnableABI))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, parsed, caller, transactor, filterer), nil\n}", "title": "" }, { "docid": "653bb013441867dc1135894c8afdee5c", "score": "0.5543501", "text": "func NewFilter(ctx *pulumi.Context,\n\tname string, args *FilterArgs, opts ...pulumi.ResourceOption) (*Filter, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.FilterAction == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'FilterAction'\")\n\t}\n\tif args.FilterCriteria == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'FilterCriteria'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Filter\n\terr := ctx.RegisterResource(\"aws-native:inspectorv2:Filter\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "b79a4232111687a443d8fb94112e881e", "score": "0.54830074", "text": "func NewFilterer(f func(ptr interface{}) error) Filterer {\n return funcFilterer(f)\n}", "title": "" }, { "docid": "3733ded229be3e4c01953c89a9a29ee3", "score": "0.5459607", "text": "func NewUpgradeableFilterer(address common.Address, filterer bind.ContractFilterer) (*UpgradeableFilterer, error) {\n\tcontract, err := bindUpgradeable(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &UpgradeableFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "b35edc1eaf10290070e2ed022cea92fe", "score": "0.5399369", "text": "func NewAuditableFilterer(address common.Address, filterer bind.ContractFilterer) (*AuditableFilterer, error) {\n\tcontract, err := bindAuditable(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &AuditableFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "9cc7df551625cd80d11e9f30c309b5a8", "score": "0.53972185", "text": "func NewAicumenFilterer(address common.Address, filterer bind.ContractFilterer) (*AicumenFilterer, error) {\n\tcontract, err := bindAicumen(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &AicumenFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "5393e3ddc8d980d983c60e2fcdf1780b", "score": "0.53750205", "text": "func NewGovernableFilterer(address common.Address, filterer bind.ContractFilterer) (*GovernableFilterer, error) {\n\tcontract, err := bindGovernable(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &GovernableFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "7682887e9ceace169cc65f01aa5867aa", "score": "0.5280282", "text": "func NewSuperuserableFilterer(address common.Address, filterer bind.ContractFilterer) (*SuperuserableFilterer, error) {\n\tcontract, err := bindSuperuserable(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &SuperuserableFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "a6a75028f1448cee076440e37561ca10", "score": "0.5130518", "text": "func NewFooFilterer(address common.Address, filterer bind.ContractFilterer) (*FooFilterer, error) {\n\tcontract, err := bindFoo(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &FooFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "685d82b2c091bfb3c9c777fa4f1b8782", "score": "0.50979286", "text": "func NewOutboxFilterer(address common.Address, filterer bind.ContractFilterer) (*OutboxFilterer, error) {\n\tcontract, err := bindOutbox(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OutboxFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "8ca21a2ad069d9ed9bcc98f9e4dc24bb", "score": "0.5084641", "text": "func NewOwnerProxyRegistryFilterer(address common.Address, filterer bind.ContractFilterer) (*OwnerProxyRegistryFilterer, error) {\n\tcontract, err := bindOwnerProxyRegistry(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnerProxyRegistryFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "0fff3b6df13b26ad49104afb38d6741b", "score": "0.50838894", "text": "func NewMonsterOwnershipFilterer(address common.Address, filterer bind.ContractFilterer) (*MonsterOwnershipFilterer, error) {\n\tcontract, err := bindMonsterOwnership(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &MonsterOwnershipFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "6fde520518ce3f0de966048488f00324", "score": "0.50780135", "text": "func NewFilterReadCloser(\n\treq *http.Request,\n\trc io.ReadCloser,\n\thandler Handler,\n\tserializer *serializer.Serializer,\n\townerName string,\n\tstopCh <-chan struct{}) (int, io.ReadCloser, error) {\n\n\tctx := req.Context()\n\tinfo, _ := apirequest.RequestInfoFrom(ctx)\n\tdr := &filterReadCloser{\n\t\treq: req,\n\t\trc: rc,\n\t\tch: make(chan watch.Event),\n\t\tdata: new(bytes.Buffer),\n\t\thandler: handler,\n\t\tisWatch: info.Verb == \"watch\",\n\t\tserializer: serializer,\n\t\townerName: ownerName,\n\t\tstopCh: stopCh,\n\t}\n\n\tif dr.isWatch {\n\t\tgo func(req *http.Request, rc io.ReadCloser, ch chan watch.Event) {\n\t\t\terr := handler.StreamResponseFilter(rc, ch)\n\t\t\tif err != nil && err != io.EOF && err != context.Canceled {\n\t\t\t\tklog.Errorf(\"filter(%s) watch response ended with error, %v\", dr.ownerName, err)\n\t\t\t}\n\t\t}(req, rc, dr.ch)\n\t\treturn 0, dr, nil\n\t} else {\n\t\tvar newData []byte\n\t\tn, err := dr.data.ReadFrom(rc)\n\t\tif err != nil {\n\t\t\treturn int(n), dr, err\n\t\t}\n\n\t\tnewData, err = handler.ObjectResponseFilter(dr.data.Bytes())\n\t\tdr.data = bytes.NewBuffer(newData)\n\t\treturn len(newData), dr, err\n\t}\n}", "title": "" }, { "docid": "4e393b8fc3db5dd84ad0bd1d17a1d4d1", "score": "0.50669676", "text": "func NewUniv2Filterer(address common.Address, filterer bind.ContractFilterer) (*Univ2Filterer, error) {\n\tcontract, err := bindUniv2(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Univ2Filterer{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.50416315", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.50416315", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.50416315", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.50416315", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.50416315", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.50416315", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "177e321eef7bfc2cced712326cb25a59", "score": "0.503134", "text": "func (o *StandardOptions) NewFilter(agent string) (*protocol.Filter, error) {\n\treturn filter.NewFilter(\n\t\tfilter.FactFilter(o.FactFilter...),\n\t\tfilter.AgentFilter(o.AgentFilter...),\n\t\tfilter.ClassFilter(o.ClassFilter...),\n\t\tfilter.IdentityFilter(o.IdentityFilter...),\n\t\tfilter.CombinedFilter(o.CombinedFilter...),\n\t\tfilter.CompoundFilter(o.CompoundFilter),\n\t\tfilter.AgentFilter(agent),\n\t)\n}", "title": "" }, { "docid": "036652afad9908e21a01f5d553a2f4e3", "score": "0.50296384", "text": "func NewTransactableFilterer(address common.Address, filterer bind.ContractFilterer) (*TransactableFilterer, error) {\n\tcontract, err := bindTransactable(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TransactableFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "fc18d4e903a1fbe88b83bd46046ba61a", "score": "0.501853", "text": "func NewOwnedUpgradeableTokenStorageFilterer(address common.Address, filterer bind.ContractFilterer) (*OwnedUpgradeableTokenStorageFilterer, error) {\n\tcontract, err := bindOwnedUpgradeableTokenStorage(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnedUpgradeableTokenStorageFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "a9be95c8312b9083961a7fdbf05ccaeb", "score": "0.5014032", "text": "func NewOwnableFromArgs() *router.Chaincode {\n\treturn router.NewChaincode(router.\n\t\tNew(`ownableFromArgs`).\n\t\tInit(InvokeSetFromArgs).\n\t\tInvoke(QueryMethod, Query))\n}", "title": "" }, { "docid": "3bee011a5b8a59b9bf53d9af22dfb28c", "score": "0.4989525", "text": "func newACLFilter(authorizer acl.Authorizer, logger *log.Logger, enforceVersion8 bool) *aclFilter {\n\tif logger == nil {\n\t\tlogger = log.New(os.Stderr, \"\", log.LstdFlags)\n\t}\n\treturn &aclFilter{\n\t\tauthorizer: authorizer,\n\t\tlogger: logger,\n\t\tenforceVersion8: enforceVersion8,\n\t}\n}", "title": "" }, { "docid": "e71a78365ed110e3275a55bff807f51c", "score": "0.4987285", "text": "func NewFilter(level Level, writer Appender) *Filter {\n\tf := &Filter{\n\t\tLevel: level,\n\t\tAppender: writer,\n\n\t\trec: make(chan *LogRecord, LogBufferLength),\n\t\tclosing: false,\n\t}\n\n\tready := make(chan struct{})\n\tgo f.run(ready)\n\t<-ready\n\treturn f\n}", "title": "" }, { "docid": "9ffd54d9c56a362ecab07aba0a598a8f", "score": "0.49692693", "text": "func NewIncognitoFilterer(address common.Address, filterer bind.ContractFilterer) (*IncognitoFilterer, error) {\n\tcontract, err := bindIncognito(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &IncognitoFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "6aa6f304e25bcec88d124f624f78d1f1", "score": "0.49673042", "text": "func NewUserableFilterer(address common.Address, filterer bind.ContractFilterer) (*UserableFilterer, error) {\n\tcontract, err := bindUserable(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &UserableFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "6a3d54f30b5f83cd0c94e816847986e8", "score": "0.49672076", "text": "func NewAccessibleFilterer(address common.Address, filterer bind.ContractFilterer) (*AccessibleFilterer, error) {\n\tcontract, err := bindAccessible(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &AccessibleFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "0871d0684a8431e31760acd3603cec6f", "score": "0.49657798", "text": "func (d *Data) NewFilter(fs storage.FilterSpec) (storage.Filter, error) {\n\tfilter := &Filter{Data: d, fs: fs}\n\n\t// Get associated labelblk. If none, we can't use roi filter so just do standard data send.\n\tlblk, err := d.GetSyncedLabelblk()\n\tif err != nil {\n\t\tdvid.Infof(\"Unable to get synced labelblk for labelvol %q. Unable to do any ROI-based filtering.\\n\", d.DataName())\n\t\treturn nil, nil\n\t}\n\n\troiIterator, _, found, err := roi.NewIteratorBySpec(fs, lblk)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !found || roiIterator == nil {\n\t\tdvid.Debugf(\"No ROI found so using generic data push for data %q.\\n\", d.DataName())\n\t\treturn nil, nil\n\t}\n\tfilter.it = roiIterator\n\n\treturn filter, nil\n}", "title": "" }, { "docid": "3daa7bf2bcb746b184a110341b5a727c", "score": "0.49418586", "text": "func NewPermInterfaceFilterer(address common.Address, filterer bind.ContractFilterer) (*PermInterfaceFilterer, error) {\n\tcontract, err := bindPermInterface(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PermInterfaceFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "73addd4dae0bf141b716e87f633c44ab", "score": "0.49367517", "text": "func NewOwned(address common.Address, backend bind.ContractBackend) (*Owned, error) {\n\tcontract, err := bindOwned(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Owned{OwnedCaller: OwnedCaller{contract: contract}, OwnedTransactor: OwnedTransactor{contract: contract}, OwnedFilterer: OwnedFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "73addd4dae0bf141b716e87f633c44ab", "score": "0.49367517", "text": "func NewOwned(address common.Address, backend bind.ContractBackend) (*Owned, error) {\n\tcontract, err := bindOwned(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Owned{OwnedCaller: OwnedCaller{contract: contract}, OwnedTransactor: OwnedTransactor{contract: contract}, OwnedFilterer: OwnedFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "73addd4dae0bf141b716e87f633c44ab", "score": "0.49367517", "text": "func NewOwned(address common.Address, backend bind.ContractBackend) (*Owned, error) {\n\tcontract, err := bindOwned(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Owned{OwnedCaller: OwnedCaller{contract: contract}, OwnedTransactor: OwnedTransactor{contract: contract}, OwnedFilterer: OwnedFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "50cf395aa7488260f0aaacb00035a79f", "score": "0.49208456", "text": "func NewPausableFilterer(address common.Address, filterer bind.ContractFilterer) (*PausableFilterer, error) {\n\tcontract, err := bindPausable(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "50cf395aa7488260f0aaacb00035a79f", "score": "0.49208456", "text": "func NewPausableFilterer(address common.Address, filterer bind.ContractFilterer) (*PausableFilterer, error) {\n\tcontract, err := bindPausable(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "50cf395aa7488260f0aaacb00035a79f", "score": "0.49208456", "text": "func NewPausableFilterer(address common.Address, filterer bind.ContractFilterer) (*PausableFilterer, error) {\n\tcontract, err := bindPausable(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "d4301c0112be0bd350dfa3f90408c168", "score": "0.4897789", "text": "func NewIStakingFilterer(address common.Address, filterer bind.ContractFilterer) (*IStakingFilterer, error) {\n\tcontract, err := bindIStaking(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &IStakingFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "bf0075d3cd733a4c80cb9ed55cc8d5ea", "score": "0.48822138", "text": "func NewOwnableDelegateProxyCaller(address common.Address, caller bind.ContractCaller) (*OwnableDelegateProxyCaller, error) {\n\tcontract, err := bindOwnableDelegateProxy(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableDelegateProxyCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "181be597d20093ffc540f752e6c32fca", "score": "0.4875148", "text": "func newFilterView(gui *gocui.Gui) (controller *Filter) {\n\tcontroller = new(Filter)\n\n\tcontroller.filterEditListeners = make([]FilterEditListener, 0)\n\n\t// populate main fields\n\tcontroller.name = \"filter\"\n\tcontroller.gui = gui\n\tcontroller.labelStr = \"Path Filter: \"\n\tcontroller.hidden = true\n\n\tcontroller.requestedHeight = 1\n\n\treturn controller\n}", "title": "" }, { "docid": "b0b8c06b427970ecd5b93224e24a6cf8", "score": "0.48680788", "text": "func bindOwnableDelegateProxy(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor, filterer bind.ContractFilterer) (*bind.BoundContract, error) {\n\tparsed, err := ParsedABI(K_OwnableDelegateProxy)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, *parsed, caller, transactor, filterer), nil\n}", "title": "" }, { "docid": "1b31bccf8863e6c70f2ecb7ce3ba1af8", "score": "0.48512766", "text": "func DeployOwnable(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Ownable, error) {\n\tparsed, err := abi.JSON(strings.NewReader(OwnableABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(OwnableBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Ownable{OwnableCaller: OwnableCaller{contract: contract}, OwnableTransactor: OwnableTransactor{contract: contract}, OwnableFilterer: OwnableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "1b31bccf8863e6c70f2ecb7ce3ba1af8", "score": "0.48512766", "text": "func DeployOwnable(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Ownable, error) {\n\tparsed, err := abi.JSON(strings.NewReader(OwnableABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(OwnableBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Ownable{OwnableCaller: OwnableCaller{contract: contract}, OwnableTransactor: OwnableTransactor{contract: contract}, OwnableFilterer: OwnableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "1b31bccf8863e6c70f2ecb7ce3ba1af8", "score": "0.48512766", "text": "func DeployOwnable(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Ownable, error) {\n\tparsed, err := abi.JSON(strings.NewReader(OwnableABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(OwnableBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Ownable{OwnableCaller: OwnableCaller{contract: contract}, OwnableTransactor: OwnableTransactor{contract: contract}, OwnableFilterer: OwnableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "1b31bccf8863e6c70f2ecb7ce3ba1af8", "score": "0.48512766", "text": "func DeployOwnable(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Ownable, error) {\n\tparsed, err := abi.JSON(strings.NewReader(OwnableABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(OwnableBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Ownable{OwnableCaller: OwnableCaller{contract: contract}, OwnableTransactor: OwnableTransactor{contract: contract}, OwnableFilterer: OwnableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "3611f9a4391ff504ae47ecadf009e302", "score": "0.4849566", "text": "func NewVaultFilterer(address common.Address, filterer bind.ContractFilterer) (*VaultFilterer, error) {\n\tcontract, err := bindVault(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &VaultFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "f81376baf76fc644e748116512d65db1", "score": "0.48471576", "text": "func newWSClientFilter(addresses []string, unspentOutPoints []wire.OutPoint, params *chaincfg.Params) *wsClientFilter {\n\tfilter := &wsClientFilter{\n\t\tpubKeyHashes: map[[ripemd160.Size]byte]struct{}{},\n\t\tscriptHashes: map[[ripemd160.Size]byte]struct{}{},\n\t\tcompressedPubKeys: map[[33]byte]struct{}{},\n\t\tuncompressedPubKeys: map[[65]byte]struct{}{},\n\t\totherAddresses: map[string]struct{}{},\n\t\tunspent: make(map[wire.OutPoint]struct{}, len(unspentOutPoints)),\n\t}\n\n\tfor _, s := range addresses {\n\t\tfilter.addAddressStr(s, params)\n\t}\n\tfor i := range unspentOutPoints {\n\t\tfilter.addUnspentOutPoint(&unspentOutPoints[i])\n\t}\n\n\treturn filter\n}", "title": "" }, { "docid": "21371b1f8ed0f8ec4f374c9f73381fb4", "score": "0.48339957", "text": "func NewHubFilterer(address common.Address, filterer bind.ContractFilterer) (*HubFilterer, error) {\n\tcontract, err := bindHub(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &HubFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "a9c690d767b8bbb32780d266eb443139", "score": "0.48311853", "text": "func NewAbiFilterer(address common.Address, filterer bind.ContractFilterer) (*AbiFilterer, error) {\n\tcontract, err := bindAbi(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &AbiFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "e5ae7275bb76be7a3262c604ca445327", "score": "0.48237455", "text": "func (k ClusterName) OwnedTagFilter() *ec2.Filter {\n\treturn &ec2.Filter{\n\t\tName: aws.String(fmt.Sprintf(\"tag:kubernetes.io/cluster/%s\", k)),\n\t\tValues: aws.StringSlice([]string{\"owned\"}),\n\t}\n}", "title": "" }, { "docid": "99cae42f018356168ebcbd6fb7bdfe34", "score": "0.48214814", "text": "func DeployOwnable(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Ownable, error) {\n\tparsed, err := ParsedABI(K_Ownable)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\tif parsed == nil {\n\t\treturn common.Address{}, nil, nil, errors.New(\"GetABI returned nil\")\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, *parsed, common.FromHex(OwnableBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Ownable{OwnableCaller: OwnableCaller{contract: contract}, OwnableTransactor: OwnableTransactor{contract: contract}, OwnableFilterer: OwnableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "ecd09b0200ca10877e0d5260f433e0db", "score": "0.4810921", "text": "func (_CrToken *CrTokenFilterer) FilterNewImplementation(opts *bind.FilterOpts) (*CrTokenNewImplementationIterator, error) {\n\n\tlogs, sub, err := _CrToken.contract.FilterLogs(opts, \"NewImplementation\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &CrTokenNewImplementationIterator{contract: _CrToken.contract, event: \"NewImplementation\", logs: logs, sub: sub}, nil\n}", "title": "" }, { "docid": "ca356b80161d1891bf025ca29f799124", "score": "0.48090026", "text": "func NewFilter(mod *elf.Module) *Filter {\n\treturn &Filter{\n\t\tmod: mod,\n\t\tconfig: mod.Map(defaultFilterConfig),\n\t\tfilter: mod.Map(defaultFilterName),\n\t\trules: make([]*FilterRule, 0),\n\t}\n}", "title": "" }, { "docid": "d167c8cf837730326b67cbd9055bf047", "score": "0.48011667", "text": "func (_Bindings *BindingsFilterer) FilterNewComptroller(opts *bind.FilterOpts) (*BindingsNewComptrollerIterator, error) {\n\n\tlogs, sub, err := _Bindings.contract.FilterLogs(opts, \"NewComptroller\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &BindingsNewComptrollerIterator{contract: _Bindings.contract, event: \"NewComptroller\", logs: logs, sub: sub}, nil\n}", "title": "" }, { "docid": "ca0c726f1fa0e660760ca8a56a0cd444", "score": "0.47982594", "text": "func NewClinicFilterer(address common.Address, filterer bind.ContractFilterer) (*ClinicFilterer, error) {\n\tcontract, err := bindClinic(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ClinicFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "d9e42dfc4a51efc4c254f91db8c2f5f4", "score": "0.47938097", "text": "func NewContractFilterer(address common.Address, filterer bind.ContractFilterer) (*ContractFilterer, error) {\n\tcontract, err := bindContract(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ContractFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "d9e42dfc4a51efc4c254f91db8c2f5f4", "score": "0.47938097", "text": "func NewContractFilterer(address common.Address, filterer bind.ContractFilterer) (*ContractFilterer, error) {\n\tcontract, err := bindContract(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ContractFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "d9e42dfc4a51efc4c254f91db8c2f5f4", "score": "0.47938097", "text": "func NewContractFilterer(address common.Address, filterer bind.ContractFilterer) (*ContractFilterer, error) {\n\tcontract, err := bindContract(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ContractFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "d9e42dfc4a51efc4c254f91db8c2f5f4", "score": "0.47938097", "text": "func NewContractFilterer(address common.Address, filterer bind.ContractFilterer) (*ContractFilterer, error) {\n\tcontract, err := bindContract(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ContractFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "d9e42dfc4a51efc4c254f91db8c2f5f4", "score": "0.47938097", "text": "func NewContractFilterer(address common.Address, filterer bind.ContractFilterer) (*ContractFilterer, error) {\n\tcontract, err := bindContract(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ContractFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "2de03faaf07c1daa09d434927be6c007", "score": "0.47904164", "text": "func NewFilter(config *config.Config) (filter *Filter) {\n\tfilter = new(Filter)\n\tfilter.Config = config\n\treturn\n}", "title": "" }, { "docid": "ce6d572a265b2487b4f1793fc6ca7670", "score": "0.47892338", "text": "func NewFilter(controllerChannel chan Frame, messageCenter MessageCenter) Filter {\n\tfilter := Filter{}\n\n\tfilter.FilterChannel = make(chan Frame)\n\tfilter.FilterFunc = defaultFilterFunc\n\tfilter.controllerChannel = controllerChannel\n\tfilter.messageCenter = messageCenter\n\n\treturn filter\n}", "title": "" }, { "docid": "a3ec2d3b84a7595b904c8ecbc0d081e1", "score": "0.47873715", "text": "func NewPrivilegesFilterer(address common.Address, filterer bind.ContractFilterer) (*PrivilegesFilterer, error) {\n\tcontract, err := bindPrivileges(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PrivilegesFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "9c63175a751715f21b7575f4cf02cbef", "score": "0.47712797", "text": "func NewAbstractFilterI(args ...interface{}) *AbstractFilter {\n return &AbstractFilter{js.Global.Get(\"PIXI\").Get(\"AbstractFilter\").New(args)}\n}", "title": "" }, { "docid": "3d9dbe31c9c4e5aa01814e796d66221c", "score": "0.4765455", "text": "func NewMockFilter(ok bool) MockFilter {\r\n\treturn MockFilter{\r\n\t\tok: ok,\r\n\t}\r\n}", "title": "" }, { "docid": "87dbdc225731116078ec7bf0ffbf74ea", "score": "0.47579244", "text": "func NewCfnFilter_Override(c CfnFilter, scope awscdk.Construct, id *string, props *CfnFilterProps) {\n\t_init_.Initialize()\n\n\t_jsii_.Create(\n\t\t\"monocdk.aws_guardduty.CfnFilter\",\n\t\t[]interface{}{scope, id, props},\n\t\tc,\n\t)\n}", "title": "" }, { "docid": "03019a5b75eb5afa00de651158a7b21e", "score": "0.47435284", "text": "func NewFinalizableFilterer(address common.Address, filterer bind.ContractFilterer) (*FinalizableFilterer, error) {\n\tcontract, err := bindFinalizable(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &FinalizableFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "517b69b41a345d349fc3e2ca5ffa59f8", "score": "0.4727791", "text": "func NewConsoleFilterer(address common.Address, filterer bind.ContractFilterer) (*ConsoleFilterer, error) {\n\tcontract, err := bindConsole(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ConsoleFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "16e77dd79eac4cb1f52150a943259c4b", "score": "0.47257283", "text": "func (_Ownable *OwnableFilterer) WatchOwnershipRenounced(opts *bind.WatchOpts, sink chan<- *OwnableOwnershipRenounced, previousOwner []common.Address) (event.Subscription, error) {\n\n\tvar previousOwnerRule []interface{}\n\tfor _, previousOwnerItem := range previousOwner {\n\t\tpreviousOwnerRule = append(previousOwnerRule, previousOwnerItem)\n\t}\n\n\tlogs, sub, err := _Ownable.contract.WatchLogs(opts, \"OwnershipRenounced\", previousOwnerRule)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn event.NewSubscription(func(quit <-chan struct{}) error {\n\t\tdefer sub.Unsubscribe()\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase log := <-logs:\n\t\t\t\t// New log arrived, parse the event and forward to the user\n\t\t\t\tevent := new(OwnableOwnershipRenounced)\n\t\t\t\tif err := _Ownable.contract.UnpackLog(event, \"OwnershipRenounced\", log); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tevent.Raw = log\n\n\t\t\t\tselect {\n\t\t\t\tcase sink <- event:\n\t\t\t\tcase err := <-sub.Err():\n\t\t\t\t\treturn err\n\t\t\t\tcase <-quit:\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\tcase err := <-sub.Err():\n\t\t\t\treturn err\n\t\t\tcase <-quit:\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t}), nil\n}", "title": "" }, { "docid": "16e77dd79eac4cb1f52150a943259c4b", "score": "0.47257283", "text": "func (_Ownable *OwnableFilterer) WatchOwnershipRenounced(opts *bind.WatchOpts, sink chan<- *OwnableOwnershipRenounced, previousOwner []common.Address) (event.Subscription, error) {\n\n\tvar previousOwnerRule []interface{}\n\tfor _, previousOwnerItem := range previousOwner {\n\t\tpreviousOwnerRule = append(previousOwnerRule, previousOwnerItem)\n\t}\n\n\tlogs, sub, err := _Ownable.contract.WatchLogs(opts, \"OwnershipRenounced\", previousOwnerRule)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn event.NewSubscription(func(quit <-chan struct{}) error {\n\t\tdefer sub.Unsubscribe()\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase log := <-logs:\n\t\t\t\t// New log arrived, parse the event and forward to the user\n\t\t\t\tevent := new(OwnableOwnershipRenounced)\n\t\t\t\tif err := _Ownable.contract.UnpackLog(event, \"OwnershipRenounced\", log); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tevent.Raw = log\n\n\t\t\t\tselect {\n\t\t\t\tcase sink <- event:\n\t\t\t\tcase err := <-sub.Err():\n\t\t\t\t\treturn err\n\t\t\t\tcase <-quit:\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\tcase err := <-sub.Err():\n\t\t\t\treturn err\n\t\t\tcase <-quit:\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t}), nil\n}", "title": "" }, { "docid": "b4366cf3e98724fe15eed5737fff0c97", "score": "0.47255602", "text": "func NewLoggerFilterer(address common.Address, filterer bind.ContractFilterer) (*LoggerFilterer, error) {\n\tcontract, err := bindLogger(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &LoggerFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "9c008e7bb95f0b883f53fc14a83549cd", "score": "0.47212785", "text": "func NewWithdrawableFilterer(address common.Address, filterer bind.ContractFilterer) (*WithdrawableFilterer, error) {\n\tcontract, err := bindWithdrawable(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &WithdrawableFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "21df05199a0b693e78f8dca29fa34df2", "score": "0.4716387", "text": "func (_Upgradeable *UpgradeableFilterer) FilterAddedOwner(opts *bind.FilterOpts) (*UpgradeableAddedOwnerIterator, error) {\n\n\tlogs, sub, err := _Upgradeable.contract.FilterLogs(opts, \"AddedOwner\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &UpgradeableAddedOwnerIterator{contract: _Upgradeable.contract, event: \"AddedOwner\", logs: logs, sub: sub}, nil\n}", "title": "" }, { "docid": "6c9270452da47953b81cce8120533466", "score": "0.47065604", "text": "func NewLelecoinFilterer(address common.Address, filterer bind.ContractFilterer) (*LelecoinFilterer, error) {\n\tcontract, err := bindLelecoin(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &LelecoinFilterer{contract: contract}, nil\n}", "title": "" } ]
318cc5c69a048c8f5b858398811d3526
FindNamespace : namespace creation http handler
[ { "docid": "8e7e8d5ad69a4de49fba7012f4957332", "score": "0.65503114", "text": "func FindNamespace(c echo.Context) error {\n\tm := echo.Map{}\n\tif err := c.Bind(&m); err != nil {\n\t\treturn err\n\t}\n\tname := m[\"name\"].(string)\n\n\tdata, err := db.SelectNamespaceStartsWith(name)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn c.JSON(http.StatusInternalServerError, echo.Map{\n\t\t\t\"error\": \"error finding namespace\",\n\t\t})\n\t}\n\treturn c.JSON(http.StatusOK, &data)\n\n}", "title": "" } ]
[ { "docid": "0ba36f2d98f18b2203008ce7cc6053a9", "score": "0.6377313", "text": "func (r *Router) Namespace(namespace string) *RouteMatch { return r.next().Namespace(namespace) }", "title": "" }, { "docid": "610432c1aae7cb78978df09b72542c29", "score": "0.61994123", "text": "func (r *contentResolver) Namespace(ctx context.Context, obj *content.Content) (string, error) {\n\tpanic(\"not implemented\")\n}", "title": "" }, { "docid": "80989bde8dcc81dca4496e63ea2327df", "score": "0.6140349", "text": "func (r *RouteMatch) Namespace(namespace string) *RouteMatch { r.namespace = namespace; return r }", "title": "" }, { "docid": "c7efcaa9789b4d3b7cb8d9496f62328e", "score": "0.61252123", "text": "func NewNamespace(name string, intermediate router.Signaler, final rack.Middleware) *router.Router {\n\tr := router.New()\n\tr.Routing = router.SignalFunc(func(vars map[string]interface{}) bool {\n\t\tsection := router.V(vars).CurrentSection()\n\n\t\tif !router.V(vars).IsCaseSensitive() {\n\t\t\tname = strings.ToLower(name)\n\t\t}\n\n\t\tif section != name {\n\t\t\treturn false\n\t\t}\n\n\t\tif intermediate != nil {\n\t\t\treturn intermediate.Run(vars)\n\t\t}\n\n\t\treturn true\n\t})\n\n\tr.Action = final\n\treturn r\n}", "title": "" }, { "docid": "a365e9ba10eb450b756bf2b4dbdf6a10", "score": "0.61228156", "text": "func (kube *kubeComponent) CreateNamespace() error {\n\tkubeReqUrl := kube.apiServerUri + \"/api/v1/namespaces\"\n\treqMap := make(map[string]interface{})\n\treqMap[\"metadata\"] = map[string]string{\"name\": kube.namespace}\n\treqBody, err := json.Marshal(reqMap)\n\tif err != nil {\n\t\treturn errors.New(\"marshal data for creating namespace error: \" + err.Error())\n\t}\n\tlog.Debugf(\"[kubeComponent CreateNamespace]: send request to %s with body%s\\n\", kubeReqUrl, string(reqBody))\n\n\tresp, err := http.Post(kubeReqUrl, \"application/json\", bytes.NewReader(reqBody))\n\tif err != nil {\n\t\tlog.Debugf(\"[kubeComponent CreateNamespace]: send request to %s with body %s error: %s\\n\", kubeReqUrl, reqBody, err)\n\t\treturn fmt.Errorf(\"create k8s namespace error: %s\", err)\n\t}\n\n\tdefer resp.Body.Close()\n\n\t//TODO: handle error when namespace exists\n\tswitch resp.StatusCode {\n\tcase http.StatusCreated:\n\t\treturn nil\n\tdefault:\n\t\tbody, err := ioutil.ReadAll(resp.Body)\n\t\tif err != nil {\n\t\t\treturn errors.New(\"read response body from create namespace error: \" + err.Error())\n\t\t} else {\n\t\t\treturn fmt.Errorf(\"create namespace error, status code is %d, body is %s\",\n\t\t\t\tresp.StatusCode, string(body))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "67d12e9697444df78b27d90eb2a6ba29", "score": "0.6109131", "text": "func createNamespace(client ingress.DirektivIngressClient, ns string) (codes.Code, error) {\n\tctx := context.Background()\n\n\t// prepare request\n\trequest := ingress.AddNamespaceRequest{\n\t\tName: &ns,\n\t}\n\n\t// send grpc request\n\t_, err := client.AddNamespace(ctx, &request)\n\tif err != nil {\n\t\ts := status.Convert(err)\n\t\treturn s.Code(), errors.New(s.Message())\n\t}\n\n\treturn 0, nil\n\n}", "title": "" }, { "docid": "f2f0978248288fb21115121db9dbcb70", "score": "0.5962576", "text": "func (r *Resolver) Namespace() NamespaceResolver { return &namespaceResolver{r} }", "title": "" }, { "docid": "1850b459d94b972b97659cd57bf6caa9", "score": "0.58828217", "text": "func (a *NVMeApiService) NvmeNamespaceCreate(ctx _context.Context, info NvmeNamespace) (NvmeNamespaceResponse, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue NvmeNamespaceResponse\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/storage/namespaces\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/hal+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\", \"application/hal+json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &info\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 201 {\n\t\t\tvar v NvmeNamespaceResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v ErrorResponse\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "885931fb4860ba1c5506c79d415b2a7e", "score": "0.584975", "text": "func NSNamespace(prefix string, params ...LinkNamespace) LinkNamespace {\n\treturn func(ns *Namespace) {\n\t\tnps := oldToNewLinkNs(params)\n\t\tweb.NSNamespace(prefix, nps...)\n\t}\n}", "title": "" }, { "docid": "854e0bad819d002ffdf97158739ccded", "score": "0.5844488", "text": "func (fn GetNamespaceByNameHandlerFunc) Handle(params GetNamespaceByNameParams) middleware.Responder {\n\treturn fn(params)\n}", "title": "" }, { "docid": "0adefbbbab9ec60699bd1bdb0cb1265e", "score": "0.58316165", "text": "func (a *NVMeApiService) NvmeNamespaceGet(ctx _context.Context, uuid string, localVarOptionals *NvmeNamespaceGetOpts) (NvmeNamespace, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue NvmeNamespace\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/storage/namespaces/{uuid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"uuid\"+\"}\", _neturl.QueryEscape(parameterToString(uuid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Fields.IsSet() {\n\t\tlocalVarQueryParams.Add(\"fields\", parameterToString(localVarOptionals.Fields.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\", \"application/hal+json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v NvmeNamespace\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v ErrorResponse\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "d2fc786c5308c512e1b2352d0a1a9e39", "score": "0.5831604", "text": "func NSGet(rootpath string, f FilterFunc) LinkNamespace {\n\treturn func(ns *Namespace) {\n\t\tweb.NSGet(rootpath, func(ctx *context.Context) {\n\t\t\tf((*adtContext.Context)(ctx))\n\t\t})\n\t}\n}", "title": "" }, { "docid": "d309c992f9bc2572e72e0df9370a1e79", "score": "0.5762481", "text": "func Handle(req []byte) string {\n\tconfig, err := rest.InClusterConfig()\n\n\tif err != nil {\n\t\tfmt.Println(\"couldn't get cluster config - err:\", err)\n\t\tos.Exit(-1)\n\t}\n\n\tclientset, err := kubernetes.NewForConfig(config)\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\n\tdata, err := clientset.CoreV1().Namespaces().List(metav1.ListOptions{})\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\n\tnamespaces := \"Namespaces\"\n\n\tfor _, namespace := range data.Items {\n\t\tnamespaces = fmt.Sprintf(\"%s\\n%s\", namespaces, namespace.GetName())\n\t}\n\n\treturn fmt.Sprintf(namespaces)\n}", "title": "" }, { "docid": "eecb71689130841624b367f2435325b3", "score": "0.574916", "text": "func CreateNamespace(c echo.Context) error {\n\tm := echo.Map{}\n\tif err := c.Bind(&m); err != nil {\n\t\treturn err\n\t}\n\tname := m[\"name\"].(string)\n\tmaxTTL := m[\"max_ttl\"].(string)\n\trefreshMaxTTL := m[\"refresh_max_ttl\"].(string)\n\tenableEndpoint := m[\"enable_endpoint\"].(bool)\n\n\tkey := tokens.GenKey()\n\trefreshKey := tokens.GenKey()\n\tns, exists, err := createNamespace(name, key, refreshKey, maxTTL, refreshMaxTTL, enableEndpoint)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, echo.Map{\n\t\t\t\"error\": \"error creating namespace\",\n\t\t})\n\t}\n\tif exists {\n\t\treturn c.JSON(http.StatusConflict, echo.Map{\n\t\t\t\"error\": \"namespace already exists\",\n\t\t})\n\t}\n\n\treturn c.JSON(http.StatusOK, echo.Map{\n\t\t\"namespace_id\": ns.ID,\n\t})\n}", "title": "" }, { "docid": "7207d245e4ed3fb2797f27c85f68d0dc", "score": "0.5747706", "text": "func (v NamespacesResource) Create(c buffalo.Context) error {\n\tuser, err := getLoggedInUser(c)\n\tif err != nil {\n\t\treturn c.Error(403, errors.New(\"Permission denied\"))\n\t}\n\n\t// Get the DB connection from the context\n\ttx, ok := c.Value(\"tx\").(*pop.Connection)\n\tif !ok {\n\t\t// return errors.WithStack(errors.New(\"no transaction found\"))\n\t\treturn c.Error(500, errors.New(\"Could not establish database connection\"))\n\t}\n\n\t// Allocate an empty Namespace\n\tnamespace := &models.Namespace{}\n\n\t// Bind namespace to the html form elements\n\tif err := c.Bind(namespace); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\tprefix := user.NamespacePrefix()\n\tnamespaceName := prefix + \"-\" + namespace.Name\n\n\tnameErrors := ValidateNamespaceName(prefix, namespace.Name)\n\tif len(nameErrors) > 0 {\n\t\treturn errors.New(strings.Join(nameErrors, \"\\n\"))\n\t}\n\n\t// Validate the data from the html form\n\t_, err = namespace.Validate(tx)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\tkubeClient, err := getKubernetesClient()\n\tif err != nil {\n\t\treturn c.Error(500, err)\n\t}\n\n\tnewNamespaceID, err := kubeClient.CreateNamespace(namespaceName, user.ID)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\tnewNamespace := &models.Namespace{}\n\t// To find the Namespace the parameter namespace_id is used.\n\tif err := tx.Eager().Find(newNamespace, newNamespaceID); err != nil {\n\t\treturn c.Error(404, errors.New(\"Namespace not found\"))\n\t}\n\n\treturn c.Render(201, r.JSON(newNamespace))\n}", "title": "" }, { "docid": "907cffec0b273e90f756c5c86d314cc7", "score": "0.5741914", "text": "func (c *BCSAppClient) CreateNamespace(projectID, clusterID string, req CreateNamespaceRequest) (\n\t*CreateNamespaceResponse, error) {\n\tif c == nil {\n\t\treturn nil, ErrServerNotInit\n\t}\n\n\turl := fmt.Sprintf(\"%s/apis/resources/projects/%s/clusters/%s/namespaces/\", c.server, projectID, clusterID)\n\tuserAuth, err := c.generateGateWayAuth()\n\tif err != nil {\n\t\tblog.Errorf(\"bcs app client generateGateWayAuth failed: %v\", err)\n\t\treturn nil, err\n\t}\n\n\tvar (\n\t\tdefaultRetryCnt uint = 10\n\t\tdefaultRetryTime = 10 * time.Second\n\t)\n\n\t// create namespace\n\tresp := &CreateNamespaceResponse{}\n\terr = retry.Do(func() error {\n\t\t_, _, errs := gorequest.New().\n\t\t\tTimeout(defaultTimeOut).\n\t\t\tPost(url).\n\t\t\tSet(\"Content-Type\", \"application/json\").\n\t\t\tSet(\"Accept\", \"application/json\").\n\t\t\tSet(\"X-Bkapi-Authorization\", userAuth).\n\t\t\tSetDebug(c.debug).\n\t\t\tSend(req).\n\t\t\tEndStruct(resp)\n\t\tif len(errs) > 0 {\n\t\t\tblog.Errorf(\"call api CreateNamespace failed: %v\", errs[0])\n\t\t\treturn errs[0]\n\t\t}\n\t\tif resp.Code != 0 {\n\t\t\tblog.Warnf(\"call api CreateNamespace failed: %s\", utils.ToJSONString(resp))\n\t\t\treturn ErrThirdPartyTimeout\n\t\t}\n\t\treturn nil\n\t}, retry.Attempts(defaultRetryCnt), retry.Delay(defaultRetryTime), retry.DelayType(retry.FixedDelay))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"call api CreateNamespace failed: %v, resp: %s\", err, utils.ToJSONString(resp))\n\t}\n\n\tblog.Infof(\"BCSAppClient CreateNamespace successful[%s:%s:%s]\", projectID, clusterID, req.Name)\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "2907fb3d84ce8686c7b23e300998dce2", "score": "0.56888217", "text": "func (r *DocumentHandler) Namespace() string {\n\treturn r.namespace\n}", "title": "" }, { "docid": "631f06726f4dc18fb58946a44233b095", "score": "0.5687528", "text": "func createNamespace(ns Namespace, nsclient corev1typed.NamespaceInterface) error {\n\t_, err := nsclient.Create(context.TODO(), &v1.Namespace{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: ns.Name,\n\t\t\tLabels: ns.Labels,\n\t\t\tAnnotations: ns.Annotations,\n\t\t},\n\t}, metav1.CreateOptions{})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"creating namespace %q: %w\", ns.Name, err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7ab7176447bf4fd997f169751ca1781a", "score": "0.5660041", "text": "func createNamespace(name, key, refreshKey, ttl, refreshMaxTTL string, endpoint bool) (server.Namespace, bool, error) {\n\tns := server.Namespace{}\n\n\texists, err := db.NamespaceExists(name)\n\tif err != nil {\n\t\treturn ns, false, err\n\t}\n\tif exists {\n\t\treturn ns, true, nil\n\t}\n\n\tuid, err := db.CreateNamespace(name, key, refreshKey, ttl, refreshMaxTTL, endpoint)\n\tif err != nil {\n\t\treturn ns, false, err\n\t}\n\tns.ID = uid\n\tns.Name = name\n\treturn ns, false, nil\n}", "title": "" }, { "docid": "a25bf9c7787d86cc47837e25a486d408", "score": "0.5658333", "text": "func namespace() (string, error) {\n\treturn namespaceFor(clientConfig, &overrides)\n}", "title": "" }, { "docid": "4a7fed3627423246e5100048bcfb2fbe", "score": "0.56433225", "text": "func GetNamespace(req *rest.Request) string {\n\tenv := req.Env[util.Namespace]\n\tif namespace, ok := env.(auth.Namespace); ok {\n\t\treturn namespace.String()\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "a7f57a50217b777484feaf4d90b3337f", "score": "0.56408066", "text": "func parseNamespace(params map[string]string) (string, error) {\n\tnamespace, exists := params[\"namespace\"]\n\tif !exists {\n\t\treturn \"\", ErrNoNamespace\n\t}\n\n\tnamespace, err := url.PathUnescape(namespace)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn namespace, nil\n}", "title": "" }, { "docid": "5fbce74014a27d601573c33538b576d5", "score": "0.56009245", "text": "func NewNamespace(prefix string, params ...LinkNamespace) *Namespace {\n\tnps := oldToNewLinkNs(params)\n\treturn (*Namespace)(web.NewNamespace(prefix, nps...))\n}", "title": "" }, { "docid": "0ad08e96cf8c2bd9843d9bd7eff9a1b1", "score": "0.5586407", "text": "func (c *Client) CreateNamespaceController(\n\taddFunc func(addedApiStruct *api.Namespace) error, deleteFunc func(deletedApiStruct *api.Namespace) error, updateFunc func(oldApiStruct, updatedApiStruct *api.Namespace) error) (cache.Store, cache.Controller) {\n\n\treturn CreateResourceController(c.KubeClient().Core().RESTClient(), \"namespaces\", \"\", &api.Namespace{}, fields.Everything(),\n\t\tfunc(addedApiStruct interface{}) {\n\t\t\tif err := addFunc(addedApiStruct.(*api.Namespace)); err != nil {\n\t\t\t\tzap.L().Error(\"Error while handling Add NameSpace\", zap.Error(err))\n\t\t\t}\n\t\t},\n\t\tfunc(deletedApiStruct interface{}) {\n\t\t\tif err := deleteFunc(deletedApiStruct.(*api.Namespace)); err != nil {\n\t\t\t\tzap.L().Error(\"Error while handling Delete NameSpace\", zap.Error(err))\n\n\t\t\t}\n\t\t},\n\t\tfunc(oldApiStruct, updatedApiStruct interface{}) {\n\t\t\tif err := updateFunc(oldApiStruct.(*api.Namespace), updatedApiStruct.(*api.Namespace)); err != nil {\n\t\t\t\tzap.L().Error(\"Error while handling Update NameSpace\", zap.Error(err))\n\n\t\t\t}\n\t\t})\n}", "title": "" }, { "docid": "3c76c59c3cb239463c1c74aad184fee8", "score": "0.5583232", "text": "func (api *API) CreateNamespace(c *common.Context) (interface{}, error) {\n\treturn api.NS.Create(&models.Namespace{\n\t\tName: c.GetNamespace(),\n\t})\n}", "title": "" }, { "docid": "54cfa90e6e912e438fbad0fdbbed4882", "score": "0.55798113", "text": "func NamespaceUpdate(w http.ResponseWriter, r *http.Request) {\n\tparams := mux.Vars(r)\n\tbusiness, err := getBusiness(r)\n\tif err != nil {\n\t\tRespondWithError(w, http.StatusInternalServerError, \"Namespace initialization error: \"+err.Error())\n\t\treturn\n\t}\n\tnamespace := params[\"namespace\"]\n\tbody, err := io.ReadAll(r.Body)\n\tif err != nil {\n\t\tRespondWithError(w, http.StatusBadRequest, \"Update request with bad update patch: \"+err.Error())\n\t}\n\tjsonPatch := string(body)\n\n\tquery := r.URL.Query()\n\tcluster := clusterNameFromQuery(query)\n\n\tns, err := business.Namespace.UpdateNamespace(r.Context(), namespace, jsonPatch, cluster)\n\tif err != nil {\n\t\thandleErrorResponse(w, err)\n\t\treturn\n\t}\n\taudit(r, \"UPDATE on Namespace: \"+namespace+\" Patch: \"+jsonPatch)\n\tRespondWithJSON(w, http.StatusOK, ns)\n}", "title": "" }, { "docid": "2d0c4b31c4094c1c893e38ffd427ea38", "score": "0.55532676", "text": "func NewNamespaceRetrieve(client kubernetes.Interface) *NamespaceRetrieve {\n\treturn &NamespaceRetrieve{\n\t\t//namespace: namespace,\n\t\tclient: client,\n\t}\n}", "title": "" }, { "docid": "89d332f8521192c2781a682fdc26370d", "score": "0.5527379", "text": "func parseNamespace(ns []string) (name string) {\n\tif len(ns) > len(nsPrefix) {\n\t\tname = ns[len(nsPrefix)]\n\t}\n\treturn name\n}", "title": "" }, { "docid": "68645c41da166b17440079c94ba6551e", "score": "0.55209637", "text": "func (r Route) Namespace(namespace string) string {\n\t// Prefix the namespace to the pattern\n\treturn namespace + r.Pattern\n}", "title": "" }, { "docid": "d928fcc85711e59dd505dd42db5613de", "score": "0.5520351", "text": "func (ns *Namespaces) ExecuteNamespace(w io.Writer, path string, data interface{}) error {\n\tns.mu.Lock()\n\tdefer ns.mu.Unlock()\n\n\ttt, found := ns.namespaces[path]\n\tif !found {\n\t\treturn fmt.Errorf(\"%w: %s\", ErrNotFound, path)\n\t}\n\treturn tt.ExecuteTemplate(w, ns.index+ns.ext, data)\n}", "title": "" }, { "docid": "c0294c096af08c812e536780fa4824d2", "score": "0.55080914", "text": "func (k *Kubernetes) createNamespace() error {\n\tvar err error\n\n\tif _, err = k.clientset.CoreV1().Namespaces().Get(k.namespace, metav1.GetOptions{}); err != nil {\n\t\tif !errors.IsNotFound(err) {\n\t\t\treturn err\n\t\t}\n\n\t\tk.logger.Infof(\"Creating namespace '%s'\", k.namespace)\n\t\tspec := &corev1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: k.namespace}}\n\t\tif _, err = k.clientset.CoreV1().Namespaces().Create(spec); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "da18f6db9da8406dbe54029498637689", "score": "0.5503707", "text": "func NewNamespace(fs afero.Fs, root, name string) Namespace {\n\treturn Namespace{\n\t\tPath: name,\n\t\troot: root,\n\t\tfs: fs,\n\t}\n}", "title": "" }, { "docid": "ad8cf1f40484e0f0e5b822cebe809a77", "score": "0.5497495", "text": "func (m *Manager) Namespace(namespace string) (*Socket, error) {\n\tm.Lock()\n\tdefer m.Unlock()\n\n\tif nsSocket, ok := m.sockets[namespace]; ok {\n\t\treturn nsSocket, nil\n\t}\n\n\tnsSocket := newSocket(namespace, m.conn.ID(), m.fromSockets)\n\n\tm.sockets[namespace] = nsSocket\n\n\tnsSocket.onOpen(m.socketCtx, m.conn.ID())\n\n\treturn nsSocket, nil\n}", "title": "" }, { "docid": "c0c47f2cddfe772bd5103a7e2bee3fc4", "score": "0.5492151", "text": "func (h *Headscale) CreateNamespace(name string) (*Namespace, error) {\n\tn := Namespace{}\n\tif err := h.db.Where(\"name = ?\", name).First(&n).Error; err == nil {\n\t\treturn nil, errorNamespaceExists\n\t}\n\tn.Name = name\n\tif err := h.db.Create(&n).Error; err != nil {\n\t\tlog.Printf(\"Could not create row: %s\", err)\n\t\treturn nil, err\n\t}\n\treturn &n, nil\n}", "title": "" }, { "docid": "cdb6a3e25c04b35df0d17c91b8552010", "score": "0.5490072", "text": "func (a *Client) CreateNamespace(params *CreateNamespaceParams, authInfo runtime.ClientAuthInfoWriter) (*CreateNamespaceCreated, *CreateNamespaceBadRequest, *CreateNamespaceUnauthorized, *CreateNamespaceForbidden, *CreateNamespaceConflict, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewCreateNamespaceParams()\n\t}\n\n\tif params.Context == nil {\n\t\tparams.Context = context.Background()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"createNamespace\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/v1/admin/namespaces\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &CreateNamespaceReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, nil, nil, nil, err\n\t}\n\n\tswitch v := result.(type) {\n\n\tcase *CreateNamespaceCreated:\n\t\treturn v, nil, nil, nil, nil, nil\n\tcase *CreateNamespaceBadRequest:\n\t\treturn nil, v, nil, nil, nil, nil\n\tcase *CreateNamespaceUnauthorized:\n\t\treturn nil, nil, v, nil, nil, nil\n\tcase *CreateNamespaceForbidden:\n\t\treturn nil, nil, nil, v, nil, nil\n\tcase *CreateNamespaceConflict:\n\t\treturn nil, nil, nil, nil, v, nil\n\tdefault:\n\t\treturn nil, nil, nil, nil, nil, fmt.Errorf(\"Unexpected Type %v\", reflect.TypeOf(v))\n\t}\n}", "title": "" }, { "docid": "2ba1585430ab513d7c7177f279f6ba99", "score": "0.5468764", "text": "func (c *NamespaceController) Get(ctx *app.GetNamespaceContext) error {\n\t// NamespaceController_Get: start_implement\n\tns, ok := c.ds.Namespace(ctx.Namespaceid)\n\tif !ok {\n\t\treturn ctx.NotFound()\n\t}\n\tres := MarshalNamespaceObject(ns)\n\treturn ctx.OK(res)\n\t// NamespaceController_Get: end_implement\n}", "title": "" }, { "docid": "061527014af5d3f35de83215c3c4786b", "score": "0.5458361", "text": "func GetNamespace(str string) string {\n\treturn strings.Split(str, \"/\")[0]\n}", "title": "" }, { "docid": "82ebb2b007ce77060da88bd2d7719df9", "score": "0.54552513", "text": "func NewNamespace(base string) (ns Namespace) {\n\treturn Namespace(base)\n}", "title": "" }, { "docid": "ff51a17be07b779866b1cf4bc27092de", "score": "0.5454622", "text": "func (c *NamespaceController) Create(ctx *app.CreateNamespaceContext) error {\n\t// NamespaceController_Create: start_implement\n\tproj, ok := c.ds.Project(ctx.Projectid)\n\tif !ok {\n\t\treturn ctx.NotFound()\n\t}\n\tns := c.ds.NewNamespace(ctx.Payload.Name)\n\tif ns == nil {\n\t\treturn ctx.InternalServerError()\n\t}\n\turl := APIVersion + APIProjects + ctx.Projectid + APINamespaces + ns.OID\n\tproj.Namespaces = append(proj.Namespaces, &ObjectLink{OID: ns.OID, URL: url})\n\treturn ctx.Created(MarshalNamespaceObject(ns))\n\t// NamespaceController_Create: end_implement\n}", "title": "" }, { "docid": "d76d5f1ee39cad1d7533a04d41aac7da", "score": "0.54521453", "text": "func getNamespace(methodName string) string {\n\treturn strings.Split(methodName, \".\")[0]\n}", "title": "" }, { "docid": "d74a95461a305a7fcb42d42928c7c495", "score": "0.5445702", "text": "func (c *NameSpaceClient) Get(ctx context.Context, param *scheduler.Namespace) (*scheduler.Namespace, error) {\n\tns, err := c.apiClient.clientSet.CoreV1().Namespaces().Get(ctx, param.Name, meta_v1.GetOptions{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn convertToNamespace(ns), nil\n}", "title": "" }, { "docid": "f53eb44fa239b34632ed478fc81e41da", "score": "0.54388475", "text": "func NewNamespaceRequestor(host string) namespaceGetter {\n\treturn namespaceGetter{host: host}\n}", "title": "" }, { "docid": "fc3b25eade4120724a118e4631d4ffdb", "score": "0.5438713", "text": "func (c *namespace) Register(router *mux.Router) {\n\trouter = router.PathPrefix(\"/api/v1\").Subrouter()\n\n\t// create\n\trouter.Methods(\"POST\").Path(\"/namespace\").HandlerFunc(\n\t\tmiddleware.Authenticate(http.HandlerFunc((c.createNamespace))))\n\n\t// get\n\trouter.Methods(\"GET\").Path(\"/namespace/{name}\").HandlerFunc(\n\t\tmiddleware.Authenticate(http.HandlerFunc((c.getNamespace))))\n\n\t// update\n\trouter.Methods(\"PUT\").Path(\"/namespace\").HandlerFunc(\n\t\tmiddleware.Authenticate(http.HandlerFunc((c.updateNamespace))))\n\n\t// delete\n\trouter.Methods(\"DELETE\").Path(\"/namespace\").HandlerFunc(\n\t\tmiddleware.Authenticate(http.HandlerFunc((c.deleteNamespace))))\n}", "title": "" }, { "docid": "25c5aac6ca32a0e13dc319f77f20f785", "score": "0.5431209", "text": "func createNamespace(name string) []string {\n\treturn append(nsPrefix, name)\n}", "title": "" }, { "docid": "e357cb359a21a6a70d84bc53531842ef", "score": "0.5402561", "text": "func getNamespace(env string, app string) string {\n\tif app == \"\" {\n\t\treturn fmt.Sprintf(\"/%s\", env)\n\t}\n\treturn fmt.Sprintf(\"/%s/%s\", env, app)\n}", "title": "" }, { "docid": "df531ca03778adee61cbbf435445c4a2", "score": "0.5401016", "text": "func NamespaceInfo(c echo.Context) error {\n\tm := echo.Map{}\n\tif err := c.Bind(&m); err != nil {\n\t\treturn err\n\t}\n\tID := int64(m[\"id\"].(float64))\n\n\tnu, err := db.CountUsersForNamespace(ID)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn c.JSON(http.StatusInternalServerError, echo.Map{\n\t\t\t\"error\": \"error counting users in namespace\",\n\t\t})\n\t}\n\n\tg, err := db.SelectGroupsForNamespace(ID)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn c.JSON(http.StatusInternalServerError, echo.Map{\n\t\t\t\"error\": \"error counting users in namespace\",\n\t\t})\n\t}\n\n\tdata := server.NamespaceInfo{\n\t\tNumUsers: nu,\n\t\tGroups: g,\n\t}\n\n\treturn c.JSON(http.StatusOK, &data)\n}", "title": "" }, { "docid": "1c4f521a06669e9472f8592c47cfe35b", "score": "0.5395555", "text": "func (s serviceDiscoveryHTTPNamespaceNamespaceLister) Get(name string) (*v1alpha1.ServiceDiscoveryHTTPNamespace, error) {\n\tobj, exists, err := s.indexer.GetByKey(s.namespace + \"/\" + name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !exists {\n\t\treturn nil, errors.NewNotFound(v1alpha1.Resource(\"servicediscoveryhttpnamespace\"), name)\n\t}\n\treturn obj.(*v1alpha1.ServiceDiscoveryHTTPNamespace), nil\n}", "title": "" }, { "docid": "d5ec384d4859ee7fdbc6467ddb2d2f0e", "score": "0.53905684", "text": "func createNamespace(name ...string) plugin.Namespace {\n\tname = append([]string{vendor, prefix}, name...)\n\treturn plugin.NewNamespace(name...)\n}", "title": "" }, { "docid": "53e6d2e27df09c9977d448e779b459e8", "score": "0.5388164", "text": "func MakeNamespacesLister(defaultNamespace string, clientset kubernetes.Interface) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Println(\"Query namespaces\")\n\n\t\tres := list(defaultNamespace, clientset)\n\n\t\tout, _ := json.Marshal(res)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\t\tw.WriteHeader(http.StatusAccepted)\n\t\tw.Write(out)\n\t}\n}", "title": "" }, { "docid": "853614cf94fa63be608a603abc5bfe64", "score": "0.5372954", "text": "func GETPipelineNamespaceName(ctx *macaron.Context) (int, []byte) {\n\treturn http.StatusOK, []byte(\"\")\n}", "title": "" }, { "docid": "11504021313b9519c5d08299b3e2495b", "score": "0.53715426", "text": "func generateNamespaceName(antidoteID, liveLessonID string) string {\n\treturn fmt.Sprintf(\"%s-%s\", antidoteID, liveLessonID)\n}", "title": "" }, { "docid": "1d88e94d0b0d79e1e6253a0b26a78e29", "score": "0.5357175", "text": "func (c* Container) GetNamespace(uid int) *Namespace{\n\tnamesp, ok := c.list[uid]\n\tif !ok\t{\n\t\treturn nil\n\t}\n\treturn namesp\n}", "title": "" }, { "docid": "c9c39ee49e150bf72835c56c09e85822", "score": "0.5347916", "text": "func (c *OktetoClient) CreateNamespace(ctx context.Context, namespace string) (string, error) {\n\tvar mutation struct {\n\t\tSpace struct {\n\t\t\tId graphql.String\n\t\t} `graphql:\"createSpace(name: $name)\"`\n\t}\n\tvariables := map[string]interface{}{\n\t\t\"name\": graphql.String(namespace),\n\t}\n\terr := c.client.Mutate(ctx, &mutation, variables)\n\tif err != nil {\n\t\treturn \"\", translateAPIErr(err)\n\t}\n\n\treturn string(mutation.Space.Id), nil\n}", "title": "" }, { "docid": "aaf3c67ff1e4022f57dd73f8e4e4898e", "score": "0.5342738", "text": "func NewNamespaceController(service *goa.Service, store *DataStore) *NamespaceController {\n\treturn &NamespaceController{\n\t\tController: service.NewController(\"NamespaceController\"),\n\t\tds: store,\n\t}\n}", "title": "" }, { "docid": "287fc4fd90bc9ddbedf3dd2eec5c6f50", "score": "0.5333173", "text": "func (c *NameSpaceClient) Create(ctx context.Context, param *scheduler.Namespace, options scheduler.Options) error {\n\treq := &v1.Namespace{\n\t\tTypeMeta: meta_v1.TypeMeta{\n\t\t\tKind: \"Namespace\",\n\t\t\tAPIVersion: \"v1\",\n\t\t},\n\t\tObjectMeta: meta_v1.ObjectMeta{\n\t\t\tName: param.Name,\n\t\t\tLabels: param.Labels,\n\t\t},\n\t}\n\n\t_, err := c.apiClient.clientSet.CoreV1().Namespaces().Create(ctx, req, meta_v1.CreateOptions{})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "45fd2e5e800e77991ac391bea992c57f", "score": "0.5331657", "text": "func GetNamespace(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *NamespaceState, opts ...pulumi.ResourceOption) (*Namespace, error) {\n\tvar resource Namespace\n\terr := ctx.ReadResource(\"azure:relay/namespace:Namespace\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "d3e2d53c823c076ce8b08464b18e912b", "score": "0.53274435", "text": "func (h *Headscale) GetNamespace(name string) (*Namespace, error) {\n\tn := Namespace{}\n\tif result := h.db.First(&n, \"name = ?\", name); errors.Is(result.Error, gorm.ErrRecordNotFound) {\n\t\treturn nil, errorNamespaceNotFound\n\t}\n\treturn &n, nil\n}", "title": "" }, { "docid": "4800787e01e0e615e5e111ce933e37bc", "score": "0.5326738", "text": "func (m *MasterController) waitForNamespace(name string) (*kapi.Namespace, error) {\n\tvar namespaceBackoff = wait.Backoff{Duration: 1 * time.Second, Steps: 7, Factor: 1.5, Jitter: 0.1}\n\tvar namespace *kapi.Namespace\n\tif err := wait.ExponentialBackoff(namespaceBackoff, func() (bool, error) {\n\t\tvar err error\n\t\tnamespaceLister := listers.NewNamespaceLister(m.namespaceEventHandler.GetIndexer())\n\t\tnamespace, err = namespaceLister.Get(name)\n\t\tif err != nil {\n\t\t\tif errors.IsNotFound(err) {\n\t\t\t\t// Namespace not found; retry\n\t\t\t\treturn false, nil\n\t\t\t}\n\t\t\tklog.Warningf(\"Error getting namespace: %v\", err)\n\t\t\treturn false, err\n\t\t}\n\t\treturn true, nil\n\t}); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get namespace object: %v\", err)\n\t}\n\treturn namespace, nil\n}", "title": "" }, { "docid": "fda991ef0c6668def78ef18f10a725e8", "score": "0.5304779", "text": "func (a *NVMeApiService) NvmeNamespaceModify(ctx _context.Context, uuid string, info NvmeNamespace) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPatch\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/storage/namespaces/{uuid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"uuid\"+\"}\", _neturl.QueryEscape(parameterToString(uuid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/hal+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\", \"application/hal+json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &info\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tvar v ErrorResponse\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "763c1a50c45315ac2ee16caa3bd1b035", "score": "0.530072", "text": "func (meta *ObjectMeta) GetNamespace() string { return meta.Namespace }", "title": "" }, { "docid": "7163bfd7c6d60d7f93ac41b1053ab4ce", "score": "0.53001225", "text": "func logNamespace(c clientset.Interface, namespace string) {\n\tns, err := c.CoreV1().Namespaces().Get(context.TODO(), namespace, metav1.GetOptions{})\n\tif err != nil {\n\t\tif apierrs.IsNotFound(err) {\n\t\t\te2elog.Logf(\"namespace: %v no longer exists\", namespace)\n\t\t\treturn\n\t\t}\n\t\te2elog.Logf(\"namespace: %v, unable to get namespace due to error: %v\", namespace, err)\n\t\treturn\n\t}\n\te2elog.Logf(\"namespace: %v, DeletionTimetamp: %v, Finalizers: %v, Phase: %v\", ns.Name, ns.DeletionTimestamp, ns.Spec.Finalizers, ns.Status.Phase)\n}", "title": "" }, { "docid": "5a6e86683c872d47a1833d86e6ed9220", "score": "0.5297731", "text": "func (h hubImpl) ensureNamespace(ctx context.Context, namespace string) error {\n\tfound, err := h.Store().Client().Has(ctx,\n\t\tstore.HasOptions.From(&corev1.Namespace{}),\n\t\tstore.HasOptions.InNamespace(HubNamespace),\n\t\tstore.HasOptions.WithName(namespace),\n\t)\n\tif err != nil || found {\n\t\treturn err\n\t}\n\n\tlog.WithFields(log.Fields{\n\t\t\"namespace\": namespace,\n\t}).Info(\"provisioning the namespace in api\")\n\n\t// @step: we need to create it\n\treturn h.Store().Client().Create(ctx,\n\t\tstore.CreateOptions.From(&corev1.Namespace{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: namespace,\n\t\t\t},\n\t\t}),\n\t)\n}", "title": "" }, { "docid": "1582801b875942e46b3f31d9af69bc60", "score": "0.5296807", "text": "func ToRouteNs(ns *linuxcalls.Namespace) (*l3.LinuxStaticRoutes_Route_Namespace, error) {\n\tif ns == nil {\n\t\treturn nil, fmt.Errorf(\"provided namespace is nil\")\n\t}\n\tvar namespaceType l3.LinuxStaticRoutes_Route_Namespace_NamespaceType\n\tswitch ns.Type {\n\tcase 0:\n\t\tnamespaceType = l3.LinuxStaticRoutes_Route_Namespace_PID_REF_NS\n\tcase 1:\n\t\tnamespaceType = l3.LinuxStaticRoutes_Route_Namespace_MICROSERVICE_REF_NS\n\tcase 2:\n\t\tnamespaceType = l3.LinuxStaticRoutes_Route_Namespace_NAMED_NS\n\tcase 3:\n\t\tnamespaceType = l3.LinuxStaticRoutes_Route_Namespace_FILE_REF_NS\n\t}\n\treturn &l3.LinuxStaticRoutes_Route_Namespace{Type: namespaceType, Pid: ns.Pid, Microservice: ns.Microservice, Name: ns.Name, Filepath: ns.Filepath}, nil\n}", "title": "" }, { "docid": "8840030e184a4b809473aef8203214a1", "score": "0.5295781", "text": "func (r *Reconciler) createNamespace(ctx context.Context, serverClient k8sclient.Client,\n\tinstallation *integreatlyv1alpha1.RHMI) (integreatlyv1alpha1.StatusPhase, error) {\n\tnamespace, err := resources.GetNS(ctx, r.Config.GetNamespace(), serverClient)\n\tif err != nil {\n\t\tif !k8serr.IsNotFound(err) {\n\t\t\treturn integreatlyv1alpha1.PhaseFailed, err\n\t\t}\n\t\t_, err := resources.CreateNSWithProjectRequest(ctx, r.Config.GetNamespace(),\n\t\t\tserverClient, installation, false, true, true)\n\t\tif err != nil {\n\t\t\treturn integreatlyv1alpha1.PhaseFailed, err\n\t\t}\n\t\treturn integreatlyv1alpha1.PhaseCompleted, nil\n\t}\n\n\tresources.PrepareObjectLabels(namespace, installation, true, false, true)\n\n\terr = serverClient.Update(ctx, namespace)\n\tif err != nil {\n\t\treturn integreatlyv1alpha1.PhaseFailed, err\n\t}\n\treturn integreatlyv1alpha1.PhaseCompleted, nil\n}", "title": "" }, { "docid": "2588b18857aad9cb99315ef02f18cc94", "score": "0.52910227", "text": "func namespaceExists(ctx context.Context, inNamespace string, cl client.Client) (bool, error) {\r\n\tnamespace := &unstructured.Unstructured{}\r\n\tnamespace.SetGroupVersionKind(schema.GroupVersionKind{\r\n\t\tGroup: \"\",\r\n\t\tKind: \"Namespace\",\r\n\t\tVersion: \"v1\",\r\n\t})\r\n\terr := cl.Get(ctx, client.ObjectKey{Namespace: inNamespace, Name: inNamespace}, namespace)\r\n\tif err == nil {\r\n\t\treturn true, nil\r\n\t}\r\n\r\n\tif kerrors.IsNotFound(err) {\r\n\t\treturn false, nil\r\n\t}\r\n\r\n\treturn false, err\r\n}", "title": "" }, { "docid": "462844bdeb501f911ed8a1044318475b", "score": "0.5286732", "text": "func (k TestKubernetes) NewNamespace(namespace string) {\n\tfmt.Printf(\"Create namespace %s\\n\", namespace)\n\tobj := &corev1.Namespace{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: namespace,\n\t\t},\n\t}\n\n\terr := k.Kubernetes.Client.Get(context.TODO(), types.NamespacedName{Name: namespace}, obj)\n\tif err != nil && k8serrors.IsNotFound(err) {\n\t\terr = k.Kubernetes.Client.Create(context.TODO(), obj)\n\t\tExpectNoError(err)\n\t\treturn\n\t}\n\tExpectNoError(err)\n}", "title": "" }, { "docid": "3e2b22eea66b6430de1f35224d424f10", "score": "0.5286607", "text": "func (nopEncoder) OpenNamespace(key string) {}", "title": "" }, { "docid": "dfd6d495eafcbe7be87494594f4bde38", "score": "0.52857447", "text": "func CreateOrUpdateNamespace(ns Namespace, nsclient corev1typed.NamespaceInterface) error {\n\tif ns.Name == \"\" {\n\t\treturn fmt.Errorf(\"namespace name can't be empty\")\n\t}\n\n\tnamespace, err := nsclient.Get(context.TODO(), ns.Name, metav1.GetOptions{})\n\tif err != nil {\n\t\tif apierrors.IsNotFound(err) {\n\t\t\treturn createNamespace(ns, nsclient)\n\t\t}\n\n\t\treturn fmt.Errorf(\"getting namespace %q: %w\", ns.Name, err)\n\t}\n\t// Namespace exists, hence updating the namespace.\n\treturn updateNamespace(namespace, ns, nsclient)\n}", "title": "" }, { "docid": "5c1c52989b43820688056821e8fcbf8d", "score": "0.52709264", "text": "func NewNamespace(ctx *pulumi.Context,\n\tname string, args *NamespaceArgs, opts ...pulumi.ResourceOption) (*Namespace, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.Properties == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Properties'\")\n\t}\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:notificationhubs/v20140901:Namespace\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:notificationhubs:Namespace\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:notificationhubs:Namespace\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:notificationhubs/v20160301:Namespace\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:notificationhubs/v20160301:Namespace\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:notificationhubs/v20170401:Namespace\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:notificationhubs/v20170401:Namespace\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource Namespace\n\terr := ctx.RegisterResource(\"azure-native:notificationhubs/v20140901:Namespace\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "80893cbb3d020d66c2a87505d5c83600", "score": "0.5270424", "text": "func (o NomadSecretBackendOutput) Namespace() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *NomadSecretBackend) pulumi.StringPtrOutput { return v.Namespace }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "bad9009faa755b8413d8b744eb2e3ebc", "score": "0.5265513", "text": "func CreateNamespace(clientset kubernetes.Interface, namespace string) error {\n\tns := &apiv1.Namespace{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: namespace,\n\t\t},\n\t}\n\t_, err := clientset.CoreV1().Namespaces().Create(ns)\n\treturn err\n}", "title": "" }, { "docid": "4ef21bafe232e373fa39508a33c9015c", "score": "0.5263064", "text": "func getNamespace(mkey string) (ns core.Namespace) {\n replacer := strings.NewReplacer(\".\", \"-\", \",\", \"-\", \" \", \"-\")\n rc := replacer.Replace(mkey)\n ss := strings.Split(rc, \"/\")\n ns = core.NewNamespace(ss...)\n return ns\n}", "title": "" }, { "docid": "d8d71ecfa9c384c539ba66c93bed9802", "score": "0.5260392", "text": "func (d *dumper) namespace(start bool) {\n\tns := d.getstr(d.peek(4))\n\turi := d.getstr(d.peek(5))\n\td.nsp[uri] = ns\n\td.off += 6 * WORD_SIZE\n}", "title": "" }, { "docid": "743a3ae1d6bafc8c2d207a184e5a2e7b", "score": "0.525113", "text": "func (api *API) GetNamespace(c *common.Context) (interface{}, error) {\n\tres, err := api.NS.Get(c.GetNamespace())\n\tif res == nil {\n\t\treturn nil, common.Error(common.ErrResourceNotFound,\n\t\t\tcommon.Field(\"type\", \"namespace\"),\n\t\t\tcommon.Field(\"name\", c.GetNamespace()))\n\t}\n\treturn res, err\n}", "title": "" }, { "docid": "6337cb0a7601b865cd2e217506b6a855", "score": "0.5249932", "text": "func GetNamespace() string {\n\treturn namesapce\n}", "title": "" }, { "docid": "d7e811508de24c3167b2a26657cc9bb2", "score": "0.5249373", "text": "func NS(rw ResponseWriter, req *Message, ttl uint32, nameservers []net.NS) {\n\treq.SetResponseHeader(RcodeNoError, uint16(len(nameservers)))\n\treq.Raw = AppendNSRecord(req.Raw, req, ttl, nameservers)\n\t_, _ = rw.Write(req.Raw)\n}", "title": "" }, { "docid": "2d6b02a422874c1d962d1018fa740309", "score": "0.52493066", "text": "func newNamespace(s *store, dir string) (p *namespace, e errors.Error) {\n\tp = new(namespace)\n\tp.store = s\n\tp.name = dir\n\n\te = p.loadKeyspaces()\n\treturn\n}", "title": "" }, { "docid": "33cbf229acf7934daadf16327c4f1e5b", "score": "0.5247631", "text": "func (ns *NamespaceService) CreateNamespace(namespace string) error {\n\tkns := &corev1.Namespace{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: namespace,\n\t\t},\n\t}\n\n\tif _, err := ns.kubeClient.CoreV1().Namespaces().Create(kns); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a3eba3e326ba2033aa117270413850bf", "score": "0.52437603", "text": "func CreateNamespace(ctx context.Context, logger *logger.Logger, name string, organizationName string, organizationVcs string) (*CreateNamespaceResponse, error) {\n\torganizationID, err := getOrganization(ctx, logger, organizationName, organizationVcs)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn createNamespaceWithOwnerID(ctx, logger, name, organizationID)\n}", "title": "" }, { "docid": "2bc2b458d66a1d49434fe9517b7fccb7", "score": "0.52399963", "text": "func (a *NamespacesApiService) ApiNamespacesIdGetExecute(r ApiApiNamespacesIdGetRequest) (*ModelsNamespace, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *ModelsNamespace\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"NamespacesApiService.ApiNamespacesIdGet\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/namespaces/{id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"id\"+\"}\", url.PathEscape(parameterToString(r.id, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"ApiKeyAuth\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "16644565e38bc611457db00ddc65c511", "score": "0.5233436", "text": "func (r *registry) getNamespace(name Name) (*Namespace, error) {\n\tr.cacheLock.RLock()\n\tdefer r.cacheLock.RUnlock()\n\tif id, ok := r.cacheNameToID.Get(name).(ID); ok {\n\t\treturn r.getNamespaceByIDLocked(id)\n\t}\n\treturn nil, serviceerror.NewNotFound(\n\t\tfmt.Sprintf(\"Namespace name %q not found\", name))\n}", "title": "" }, { "docid": "a8cbe55ee25fab5053f37da2cfd16629", "score": "0.5230598", "text": "func CreateNamespace(clusterAdminKubeConfig, name string) (err error) {\n\tclusterAdminKubeClient, err := GetClusterAdminKubeClient(clusterAdminKubeConfig)\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = clusterAdminKubeClient.CoreV1().Namespaces().Create(&corev1.Namespace{\n\t\tObjectMeta: metav1.ObjectMeta{Name: name},\n\t})\n\treturn err\n}", "title": "" }, { "docid": "9f4cfbb0a27fda30a3e763905e34f17f", "score": "0.522529", "text": "func (r *VpNamespaceReconciler) handleCreate(req ctrl.Request, vpNamespace v1beta1.VpNamespace) (ctrl.Result, error) {\n\tlog := r.getLogger(req)\n\tctx := context.TODO()\n\t// create it\n\tnamespace, err := r.PlatformClient.Namespaces().CreateNamespace(ctx, platformapiclient.Namespace{\n\t\tName: vpNamespace.Name,\n\t\tRoleBindings: nativeconverters.NamespaceRoleBindingsFromNative(vpNamespace.Spec.RoleBindings),\n\t})\n\n\tif errors.Is(err, vvperrors.ErrBadRequest) {\n\t\tlog.Error(err, \"Not requeuing\")\n\t\treturn ctrl.Result{Requeue: false}, nil\n\t}\n\n\tif err != nil {\n\t\tlog.Info(\"Error creating VP namespace\")\n\t\treturn ctrl.Result{}, err\n\t}\n\tlog.Info(\"Created namespace\", \"namespace\", namespace)\n\n\t// Now update the k8s resource and status as well\n\tif err := r.updateResource(&vpNamespace, namespace); err != nil {\n\t\treturn ctrl.Result{}, err\n\t}\n\n\tr.ensurePollersAreRunning(req, &vpNamespace)\n\n\treturn ctrl.Result{}, nil\n}", "title": "" }, { "docid": "baf0bc5f728d6fe63ae84c5f2819a04c", "score": "0.52252245", "text": "func New(index, ext string) *Namespaces {\n\treturn &Namespaces{\n\t\tmu: &sync.Mutex{},\n\t\tindex: index,\n\t\text: ext,\n\t\tnamespaces: make(map[string]*template.Template),\n\t}\n}", "title": "" }, { "docid": "cafd0929a37c2e1f364d8c60d7939f79", "score": "0.5192598", "text": "func NewNamespace() Namespace {\n\treturn &namespace{\n\t\ttaken: make(map[string]struct{}),\n\t\tgave: make(map[string][]string),\n\t}\n}", "title": "" }, { "docid": "5c81c0b529d2e33d6f8f79a25a2496e6", "score": "0.5174694", "text": "func (o GetReposResultOutput) Namespace() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GetReposResult) *string { return v.Namespace }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d781ea4a576a4658dcf837f19aad2714", "score": "0.51735795", "text": "func CreateNamespace(name string, client client.Client, reqLogger logr.Logger) (reconcile.Result, error) {\n\tfound := &corev1.Namespace{}\n\n\terr := client.Get(context.TODO(), types.NamespacedName{Name: name}, found)\n\tif err != nil && errors.IsNotFound(err) {\n\t\treqLogger.Info(\"Creating a new Namespace\", \" Namespace\", name)\n\t\terr = client.Create(context.TODO(), NewNamespace(name))\n\t\tif err != nil {\n\t\t\treturn reconcile.Result{}, err\n\t\t}\n\n\t\t// Pod created successfully - don't requeue\n\t\treturn reconcile.Result{}, nil\n\t} else if err != nil {\n\t\treturn reconcile.Result{}, err\n\t}\n\treturn reconcile.Result{}, nil\n}", "title": "" }, { "docid": "cf3fef347c0aaf882b400f57825921c3", "score": "0.5167001", "text": "func ProcessNamespace(namespace string) string {\n\tif namespace == \"\" {\n\t\treturn defaults.Namespace\n\t}\n\treturn namespace\n}", "title": "" }, { "docid": "746642211e1db317309089424f9479eb", "score": "0.5165969", "text": "func (c ControllerRuntimeClient) CreateNameSpace(ctx context.Context, data []byte) error {\n\tscheme := runtime.NewScheme()\n\tutilruntime.Must(clientgoscheme.AddToScheme(scheme))\n\n\truntimeObj, _, err := serializer.NewCodecFactory(scheme).UniversalDeserializer().Decode(data, nil, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// check if it is a supported type\n\tnamespaceObj, ok := runtimeObj.(*corev1.Namespace)\n\tif !ok {\n\t\treturn fmt.Errorf(\"unsupported object type\")\n\t}\n\n\tnamespaces := &corev1.NamespaceList{}\n\terr = c.client.List(ctx, namespaces)\n\tif err != nil {\n\t\t// ignore this and continue to create namespace\n\t} else {\n\t\tfor _, namespace := range namespaces.Items {\n\t\t\tif namespace.Name == namespaceObj.Name {\n\t\t\t\tc.Logger.Info(\"Namespace already exists. Returning with success\")\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t}\n\terr = c.client.Create(ctx, namespaceObj)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Println(\"Successfully created namespace: \", namespaceObj.Name)\n\n\treturn nil\n}", "title": "" }, { "docid": "0bcd5278680a9496299a7d070cb025f0", "score": "0.51635957", "text": "func (m *MasterController) AddNamespace(ns *kapi.Namespace) error {\n\tpodLister := listers.NewPodLister(m.podEventHandler.GetIndexer())\n\tpods, err := podLister.Pods(ns.Name).List(labels.Everything())\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor _, pod := range pods {\n\t\tif err := houtil.CopyNamespaceAnnotationsToPod(m.kube, ns, pod); err != nil {\n\t\t\tklog.Errorf(\"Unable to copy hybrid-overlay namespace annotations to pod %s\", pod.Name)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6c49103de7fbf5c95433d9d0e9bcb3a9", "score": "0.51583266", "text": "func NewNamespace(ctx *pulumi.Context,\n\tname string, args *NamespaceArgs, opts ...pulumi.ResourceOption) (*Namespace, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\tif args.SkuName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'SkuName'\")\n\t}\n\tsecrets := pulumi.AdditionalSecretOutputs([]string{\n\t\t\"primaryConnectionString\",\n\t\t\"primaryKey\",\n\t\t\"secondaryConnectionString\",\n\t\t\"secondaryKey\",\n\t})\n\topts = append(opts, secrets)\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Namespace\n\terr := ctx.RegisterResource(\"azure:relay/namespace:Namespace\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "93c99909e823d9c71d75ada27b671367", "score": "0.51555127", "text": "func NewNamespacesRouter(store store.ResourceStore, auth authorization.Authorizer) *NamespacesRouter {\n\treturn &NamespacesRouter{\n\t\tstore: store,\n\t\tauth: auth,\n\t\thandlers: handlers.Handlers{\n\t\t\tResource: &corev2.Namespace{},\n\t\t\tStore: store,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "90e7f1f3f18e0959e833ea18ac1a3dc1", "score": "0.5151782", "text": "func (w *K8sClient) CreateNamespace(namespace string) error {\n\t_, err := w.kubeClient.CoreV1().Namespaces().Create(context.TODO(), &corev1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: namespace}}, metav1.CreateOptions{})\n\tif k8sErrors.IsAlreadyExists(err) {\n\t\treturn nil\n\t}\n\treturn err\n}", "title": "" }, { "docid": "90c9d52b7eecbb7dbf5cabbbdb84b9e2", "score": "0.51512676", "text": "func (c *NamespaceController) Handle(namespace *kapi.Namespace) (err error) {\n\t// if namespace is not terminating, ignore it\n\tif namespace.Status.Phase != kapi.NamespaceTerminating {\n\t\treturn nil\n\t}\n\n\t// if we already processed this namespace, ignore it\n\tif projectutil.Finalized(namespace) {\n\t\treturn nil\n\t}\n\n\t// there may still be content for us to remove\n\terr = deleteAllContent(c.Client, namespace.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// we have removed content, so mark it finalized by us\n\t_, err = projectutil.Finalize(c.KubeClient, namespace)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9dfd20db29cec130e073c5bf19132ab8", "score": "0.5146857", "text": "func NamespaceOrDefault(ns string) string {\n\tif ns != \"\" {\n\t\treturn ns\n\t}\n\n\treturn metav1.NamespaceDefault\n}", "title": "" }, { "docid": "e9956f0dc6c196f73e85d794d15451f7", "score": "0.5144332", "text": "func (cmd *GetNamespaceCommand) Run(c *client.Client, args []string) error {\n\tvar path string\n\tif len(args) > 0 {\n\t\tpath = args[0]\n\t} else {\n\t\tpath = fmt.Sprintf(\"/v1/projects/%v/namespaces/%v\", url.QueryEscape(cmd.Projectid), url.QueryEscape(cmd.Namespaceid))\n\t}\n\tlogger := goa.NewLogger(log.New(os.Stderr, \"\", log.LstdFlags))\n\tctx := goa.WithLogger(context.Background(), logger)\n\tresp, err := c.GetNamespace(ctx, path)\n\tif err != nil {\n\t\tgoa.LogError(ctx, \"failed\", \"err\", err)\n\t\treturn err\n\t}\n\n\tgoaclient.HandleResponse(c.Client, resp, cmd.PrettyPrint)\n\treturn nil\n}", "title": "" }, { "docid": "1f0b5eff564ce3fcae17cb18b05eb831", "score": "0.5142468", "text": "func graphNamespace(w http.ResponseWriter, r *http.Request, client *prometheus.Client) {\n\to := options.NewOptions(r)\n\troots := graphNamespaces(o, client)\n\tgenerateGraph(roots, w, o)\n}", "title": "" }, { "docid": "6dcbf504be35057c117da120fd69f5ea", "score": "0.51423955", "text": "func (c *Resolver) LookupNS(ctx context.Context, name string) (ns []*net.NS, err error) {\n\terr = errNotImpl\n\treturn\n}", "title": "" }, { "docid": "05029f1be32c8167fde11e2c4d5e6d37", "score": "0.5139866", "text": "func (o AclBindingRuleOutput) Namespace() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AclBindingRule) pulumi.StringPtrOutput { return v.Namespace }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "27ce8ac08540bac75d2e2ee3a6e148f5", "score": "0.51393896", "text": "func GraphNamespace(w http.ResponseWriter, r *http.Request) {\n\tdefer handlePanic(w)\n\n\tclient, err := prometheus.NewClient()\n\tcheckError(err)\n\n\tgraphNamespace(w, r, client)\n}", "title": "" } ]
25124ad8a7449babe06ce9676599faa5
ImportTimePanelFromCSV import time panel from csv format string, using the first column for time, second column for secondary keys.
[ { "docid": "9c58e1076b051079d1f6a0acc75ba367", "score": "0.84102255", "text": "func ImportTimePanelFromCSV(str string) (*TimePanel, error) {\n\treader := csv.NewReader(strings.NewReader(str))\n\treader.TrimLeadingSpace = true\n\trecords, err := reader.ReadAll()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\theadLine := records[0]\n\tif len(headLine) < 3 {\n\t\treturn nil, errors.New(\"Need more columns (dateKey, secondKey, thirdKeys ...)\")\n\t}\n\tthirdIndex := NewStringIndex(headLine[2:], true)\n\tsecondMap := make(map[string]bool)\n\trecords = records[1:]\n\tfor i := range records {\n\t\tsecondMap[records[i][1]] = true\n\t}\n\tsecondKeys := make([]string, 0, len(secondMap))\n\tfor k := range secondMap {\n\t\tsecondKeys = append(secondKeys, k)\n\t}\n\tsort.Strings(secondKeys)\n\tsecondIndex := NewStringIndex(secondKeys, false)\n\tdata := make(map[int64][][]float64)\n\tfor _, record := range records {\n\t\tdate, err := time.ParseInLocation(time.RFC3339, record[0], time.Local)\n\t\tif err != nil {\n\t\t\tdate, err = time.ParseInLocation(\"2006-01-02\", record[0], time.Local)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, errors.New(\"Unknown timeformat\")\n\t\t\t}\n\t\t}\n\t\tunix := date.Unix()\n\t\tkey := record[1]\n\t\tkeyIdx := secondIndex.Index(key)\n\t\tdf := data[unix]\n\t\tif len(df) == 0 {\n\t\t\tdf = make([][]float64, secondIndex.Length())\n\t\t}\n\t\tvalues := make([]float64, thirdIndex.Length())\n\t\tfor j := range values {\n\t\t\tvalues[j], err = strconv.ParseFloat(record[j+2], 64)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t\tdf[keyIdx] = values\n\t\tdata[unix] = df\n\t}\n\tdates := make([]int, 0, len(data))\n\tfor k := range data {\n\t\tdates = append(dates, int(k))\n\t}\n\tsort.Ints(dates)\n\tpanel := NewTimePanel(secondIndex, thirdIndex)\n\tfor _, date := range dates {\n\t\tpanel.AddMat(time.Unix(int64(date), 0), data[int64(date)])\n\t}\n\treturn panel, nil\n}", "title": "" } ]
[ { "docid": "166d5586e2884c35e4ac72fb47f5fd6b", "score": "0.62814337", "text": "func (togglCSVImporter *TogglCSVImporter) Import(input io.Reader) error {\n\n\t// read the CSV data\n\tcsvReader := csv.NewReader(input)\n\trows, csvError := csvReader.ReadAll()\n\tif csvError != nil {\n\t\treturn fmt.Errorf(\"Failed to read time records from CSV: %s\", csvError.Error())\n\t}\n\n\ttimeRecords, timeRecordsError := togglCSVImporter.csvMapper.GetTimeRecords(rows)\n\tif timeRecordsError != nil {\n\t\treturn timeRecordsError\n\t}\n\n\t// abort if no time records were returned\n\tif len(timeRecords) == 0 {\n\t\treturn nil\n\t}\n\n\t// upload the time entries to toggl\n\tprogressbar := pb.New(len(timeRecords))\n\tprogressbar.ShowTimeLeft = true\n\tif togglCSVImporter.output != nil {\n\t\tprogressbar.Output = togglCSVImporter.output\n\t\tprogressbar.Start()\n\t}\n\n\t// create the records\n\tfor recordIndex, record := range timeRecords {\n\n\t\tif err := togglCSVImporter.timeRecordRepository.CreateTimeRecord(record); err != nil {\n\t\t\treturn errors.Wrap(err, fmt.Sprintf(\"Failed to create time record %d of %d\", recordIndex+1, len(timeRecords)))\n\t\t}\n\n\t\tif togglCSVImporter.output != nil {\n\t\t\tprogressbar.Increment()\n\t\t}\n\n\t}\n\n\tif togglCSVImporter.output != nil {\n\t\t// FinishPrint writes to os.Stdout\n\t\t// see:\n\t\t// https://github.com/cheggaaa/pb/issues/87\n\t\t// https://github.com/cheggaaa/pb/commit/7f4253899ba18226b3c52aca004d298182360edc#commitcomment-18923803\n\t\t// progressbar.FinishPrint(\"Import complete.\")\n\t\tprogressbar.Finish()\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "498ceec938319414ff2219fcd562b34c", "score": "0.5998122", "text": "func (this *activitiesStruct) ImportCSV(data string) error {\n\trstr := strings.NewReader(data)\n\trcsv := csv.NewReader(rstr)\n\trecords, err := rcsv.ReadAll()\n\n\t/*\n\t * Check if an error occured.\n\t */\n\tif err != nil {\n\t\tmsg := err.Error()\n\t\treturn fmt.Errorf(\"Error importing activity data from CSV: %s\", msg)\n\t} else {\n\t\tthis.mutex.Lock()\n\t\tgroups := this.groups\n\t\tnumGroups := len(groups)\n\t\tgroupsCopy := make([]activityGroupStruct, numGroups)\n\t\tcopy(groupsCopy, groups)\n\t\tfirstError := error(nil)\n\t\tidxFirstErr := uint64(0)\n\t\tnumErrors := uint64(0)\n\n\t\t/*\n\t\t * Iterate over all records and parse activity data.\n\t\t */\n\t\tfor idx, record := range records {\n\t\t\trecordHasErrors := false\n\t\t\tnumFields := len(record)\n\n\t\t\t/*\n\t\t\t * Check that sufficient number of fields is present.\n\t\t\t */\n\t\t\tif numFields < EXPECTED_NUM_FIELDS {\n\n\t\t\t\t/*\n\t\t\t\t * Store first error occuring.\n\t\t\t\t */\n\t\t\t\tif firstError == nil {\n\t\t\t\t\tfirstError = fmt.Errorf(\"Expected %d fields, found %d.\", EXPECTED_NUM_FIELDS, numFields)\n\t\t\t\t\tidxFirstErr = uint64(idx)\n\t\t\t\t}\n\n\t\t\t\t/*\n\t\t\t\t * Increment error count.\n\t\t\t\t */\n\t\t\t\tif !recordHasErrors && numErrors < math.MaxUint64 {\n\t\t\t\t\tnumErrors++\n\t\t\t\t\trecordHasErrors = true\n\t\t\t\t}\n\n\t\t\t} else {\n\t\t\t\tbeginString := record[0]\n\t\t\t\tbegin, err := filter.ParseTime(beginString, false, false)\n\n\t\t\t\t/*\n\t\t\t\t * Check if begin time could be parsed.\n\t\t\t\t */\n\t\t\t\tif err != nil {\n\n\t\t\t\t\t/*\n\t\t\t\t\t * Store first error occuring.\n\t\t\t\t\t */\n\t\t\t\t\tif firstError == nil {\n\t\t\t\t\t\tmsg := err.Error()\n\t\t\t\t\t\tfirstError = fmt.Errorf(\"Failed to parse begin time stamp: %s\", msg)\n\t\t\t\t\t\tidxFirstErr = uint64(idx)\n\t\t\t\t\t}\n\n\t\t\t\t\t/*\n\t\t\t\t\t * Increment error count.\n\t\t\t\t\t */\n\t\t\t\t\tif !recordHasErrors && numErrors < math.MaxUint64 {\n\t\t\t\t\t\tnumErrors++\n\t\t\t\t\t\trecordHasErrors = true\n\t\t\t\t\t}\n\n\t\t\t\t}\n\n\t\t\t\tweightKG := record[1]\n\n\t\t\t\t/*\n\t\t\t\t * Allow for empty weight.\n\t\t\t\t */\n\t\t\t\tif weightKG == \"\" {\n\t\t\t\t\tweightKG = \"0.0\"\n\t\t\t\t}\n\n\t\t\t\trunningDurationString := record[2]\n\t\t\t\trunningDuration := time.Duration(0)\n\n\t\t\t\t/*\n\t\t\t\t * Allow for empty running duration.\n\t\t\t\t */\n\t\t\t\tif runningDurationString != \"\" {\n\t\t\t\t\trunningDuration, err = time.ParseDuration(runningDurationString)\n\n\t\t\t\t\t/*\n\t\t\t\t\t * Check if running duration could be parsed.\n\t\t\t\t\t */\n\t\t\t\t\tif err != nil {\n\n\t\t\t\t\t\t/*\n\t\t\t\t\t\t * Store first error occuring.\n\t\t\t\t\t\t */\n\t\t\t\t\t\tif firstError == nil {\n\t\t\t\t\t\t\tmsg := err.Error()\n\t\t\t\t\t\t\tfirstError = fmt.Errorf(\"Failed to parse running duration: %s\", msg)\n\t\t\t\t\t\t\tidxFirstErr = uint64(idx)\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\t/*\n\t\t\t\t\t\t * Increment error count.\n\t\t\t\t\t\t */\n\t\t\t\t\t\tif !recordHasErrors && numErrors < math.MaxUint64 {\n\t\t\t\t\t\t\tnumErrors++\n\t\t\t\t\t\t\trecordHasErrors = true\n\t\t\t\t\t\t}\n\n\t\t\t\t\t}\n\n\t\t\t\t}\n\n\t\t\t\trunningDistanceKM := record[3]\n\n\t\t\t\t/*\n\t\t\t\t * Allow for empty running distance.\n\t\t\t\t */\n\t\t\t\tif runningDistanceKM == \"\" {\n\t\t\t\t\trunningDistanceKM = \"0.0\"\n\t\t\t\t}\n\n\t\t\t\trunningStepCountString := record[4]\n\t\t\t\trunningStepCount := uint64(0)\n\n\t\t\t\t/*\n\t\t\t\t * Allow for empty running step count.\n\t\t\t\t */\n\t\t\t\tif runningStepCountString != \"\" {\n\t\t\t\t\trunningStepCount, err = strconv.ParseUint(runningStepCountString, 10, 64)\n\n\t\t\t\t\t/*\n\t\t\t\t\t * Check if running step count could be parsed.\n\t\t\t\t\t */\n\t\t\t\t\tif err != nil {\n\n\t\t\t\t\t\t/*\n\t\t\t\t\t\t * Store first error occuring.\n\t\t\t\t\t\t */\n\t\t\t\t\t\tif firstError == nil {\n\t\t\t\t\t\t\tmsg := err.Error()\n\t\t\t\t\t\t\tfirstError = fmt.Errorf(\"Failed to parse running step count: %s\", msg)\n\t\t\t\t\t\t\tidxFirstErr = uint64(idx)\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\t/*\n\t\t\t\t\t\t * Increment error count.\n\t\t\t\t\t\t */\n\t\t\t\t\t\tif !recordHasErrors && numErrors < math.MaxUint64 {\n\t\t\t\t\t\t\tnumErrors++\n\t\t\t\t\t\t\trecordHasErrors = true\n\t\t\t\t\t\t}\n\n\t\t\t\t\t}\n\n\t\t\t\t}\n\n\t\t\t\trunningEnergyKJString := record[5]\n\t\t\t\trunningEnergyKJ := uint64(0)\n\n\t\t\t\t/*\n\t\t\t\t * Allow for empty running energy.\n\t\t\t\t */\n\t\t\t\tif runningEnergyKJString != \"\" {\n\t\t\t\t\trunningEnergyKJ, err = strconv.ParseUint(runningEnergyKJString, 10, 64)\n\n\t\t\t\t\t/*\n\t\t\t\t\t * Check if running energy could be parsed.\n\t\t\t\t\t */\n\t\t\t\t\tif err != nil {\n\n\t\t\t\t\t\t/*\n\t\t\t\t\t\t * Store first error occuring.\n\t\t\t\t\t\t */\n\t\t\t\t\t\tif firstError == nil {\n\t\t\t\t\t\t\tmsg := err.Error()\n\t\t\t\t\t\t\tfirstError = fmt.Errorf(\"Failed to parse running energy: %s\", msg)\n\t\t\t\t\t\t\tidxFirstErr = uint64(idx)\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\t/*\n\t\t\t\t\t\t * Increment error count.\n\t\t\t\t\t\t */\n\t\t\t\t\t\tif !recordHasErrors && numErrors < math.MaxUint64 {\n\t\t\t\t\t\t\tnumErrors++\n\t\t\t\t\t\t\trecordHasErrors = true\n\t\t\t\t\t\t}\n\n\t\t\t\t\t}\n\n\t\t\t\t}\n\n\t\t\t\tcyclingDurationString := record[6]\n\t\t\t\tcyclingDuration := time.Duration(0)\n\n\t\t\t\t/*\n\t\t\t\t * Allow for empty cycling duration.\n\t\t\t\t */\n\t\t\t\tif cyclingDurationString != \"\" {\n\t\t\t\t\tcyclingDuration, err = time.ParseDuration(cyclingDurationString)\n\n\t\t\t\t\t/*\n\t\t\t\t\t * Check if cycling duration could be parsed.\n\t\t\t\t\t */\n\t\t\t\t\tif err != nil {\n\n\t\t\t\t\t\t/*\n\t\t\t\t\t\t * Store first error occuring.\n\t\t\t\t\t\t */\n\t\t\t\t\t\tif firstError == nil {\n\t\t\t\t\t\t\tmsg := err.Error()\n\t\t\t\t\t\t\tfirstError = fmt.Errorf(\"Failed to parse cycling duration: %s\", msg)\n\t\t\t\t\t\t\tidxFirstErr = uint64(idx)\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\t/*\n\t\t\t\t\t\t * Increment error count.\n\t\t\t\t\t\t */\n\t\t\t\t\t\tif !recordHasErrors && numErrors < math.MaxUint64 {\n\t\t\t\t\t\t\tnumErrors++\n\t\t\t\t\t\t\trecordHasErrors = true\n\t\t\t\t\t\t}\n\n\t\t\t\t\t}\n\n\t\t\t\t}\n\n\t\t\t\tcyclingDistanceKM := record[7]\n\n\t\t\t\t/*\n\t\t\t\t * Allow for empty cycling distance.\n\t\t\t\t */\n\t\t\t\tif cyclingDistanceKM == \"\" {\n\t\t\t\t\tcyclingDistanceKM = \"0.0\"\n\t\t\t\t}\n\n\t\t\t\tcyclingEnergyKJString := record[8]\n\t\t\t\tcyclingEnergyKJ := uint64(0)\n\n\t\t\t\t/*\n\t\t\t\t * Allow for empty cycling energy.\n\t\t\t\t */\n\t\t\t\tif cyclingEnergyKJString != \"\" {\n\t\t\t\t\tcyclingEnergyKJ, err = strconv.ParseUint(cyclingEnergyKJString, 10, 64)\n\n\t\t\t\t\t/*\n\t\t\t\t\t * Check if cycling energy could be parsed.\n\t\t\t\t\t */\n\t\t\t\t\tif err != nil {\n\n\t\t\t\t\t\t/*\n\t\t\t\t\t\t * Store first error occuring.\n\t\t\t\t\t\t */\n\t\t\t\t\t\tif firstError == nil {\n\t\t\t\t\t\t\tmsg := err.Error()\n\t\t\t\t\t\t\tfirstError = fmt.Errorf(\"Failed to parse cycling energy: %s\", msg)\n\t\t\t\t\t\t\tidxFirstErr = uint64(idx)\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\t/*\n\t\t\t\t\t\t * Increment error count.\n\t\t\t\t\t\t */\n\t\t\t\t\t\tif !recordHasErrors && numErrors < math.MaxUint64 {\n\t\t\t\t\t\t\tnumErrors++\n\t\t\t\t\t\t\trecordHasErrors = true\n\t\t\t\t\t\t}\n\n\t\t\t\t\t}\n\n\t\t\t\t}\n\n\t\t\t\totherEnergyKJString := record[9]\n\t\t\t\totherEnergyKJ := uint64(0)\n\n\t\t\t\t/*\n\t\t\t\t * Allow for empty other energy.\n\t\t\t\t */\n\t\t\t\tif otherEnergyKJString != \"\" {\n\t\t\t\t\totherEnergyKJ, err = strconv.ParseUint(otherEnergyKJString, 10, 64)\n\n\t\t\t\t\t/*\n\t\t\t\t\t * Check if other energy could be parsed.\n\t\t\t\t\t */\n\t\t\t\t\tif err != nil {\n\n\t\t\t\t\t\t/*\n\t\t\t\t\t\t * Store first error occuring.\n\t\t\t\t\t\t */\n\t\t\t\t\t\tif firstError == nil {\n\t\t\t\t\t\t\tmsg := err.Error()\n\t\t\t\t\t\t\tfirstError = fmt.Errorf(\"Failed to parse other energy: %s\", msg)\n\t\t\t\t\t\t\tidxFirstErr = uint64(idx)\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\t/*\n\t\t\t\t\t\t * Increment error count.\n\t\t\t\t\t\t */\n\t\t\t\t\t\tif !recordHasErrors && numErrors < math.MaxUint64 {\n\t\t\t\t\t\t\tnumErrors++\n\t\t\t\t\t\t\trecordHasErrors = true\n\t\t\t\t\t\t}\n\n\t\t\t\t\t}\n\n\t\t\t\t}\n\n\t\t\t\t/*\n\t\t\t\t * Create activity info.\n\t\t\t\t */\n\t\t\t\tinfo := ActivityInfo{\n\t\t\t\t\tBegin: begin,\n\t\t\t\t\tWeightKG: weightKG,\n\t\t\t\t\tRunningDuration: runningDuration,\n\t\t\t\t\tRunningDistanceKM: runningDistanceKM,\n\t\t\t\t\tRunningStepCount: runningStepCount,\n\t\t\t\t\tRunningEnergyKJ: runningEnergyKJ,\n\t\t\t\t\tCyclingDuration: cyclingDuration,\n\t\t\t\t\tCyclingDistanceKM: cyclingDistanceKM,\n\t\t\t\t\tCyclingEnergyKJ: cyclingEnergyKJ,\n\t\t\t\t\tOtherEnergyKJ: otherEnergyKJ,\n\t\t\t\t}\n\n\t\t\t\tg, err := createActivityGroup(&info)\n\n\t\t\t\t/*\n\t\t\t\t * Check if activity group could be parsed.\n\t\t\t\t */\n\t\t\t\tif err != nil {\n\n\t\t\t\t\t/*\n\t\t\t\t\t * Store first error occuring.\n\t\t\t\t\t */\n\t\t\t\t\tif firstError == nil {\n\t\t\t\t\t\tfirstError = err\n\t\t\t\t\t\tidxFirstErr = uint64(idx)\n\t\t\t\t\t}\n\n\t\t\t\t\t/*\n\t\t\t\t\t * Increment error count.\n\t\t\t\t\t */\n\t\t\t\t\tif !recordHasErrors && numErrors < math.MaxUint64 {\n\t\t\t\t\t\tnumErrors++\n\t\t\t\t\t}\n\n\t\t\t\t} else {\n\t\t\t\t\tgroupsCopy = append(groupsCopy, g)\n\t\t\t\t}\n\n\t\t\t}\n\n\t\t}\n\n\t\t/*\n\t\t * Only modify activity groups if no error occured.\n\t\t */\n\t\tif firstError == nil {\n\n\t\t\t/*\n\t\t\t * Comparison function for sorting algorithm.\n\t\t\t */\n\t\t\tless := func(i int, j int) bool {\n\t\t\t\tgi := groupsCopy[i]\n\t\t\t\tgiBegin := gi.begin\n\t\t\t\tgj := groupsCopy[j]\n\t\t\t\tgjBegin := gj.begin\n\t\t\t\tresult := giBegin.Before(gjBegin)\n\t\t\t\treturn result\n\t\t\t}\n\n\t\t\tsort.SliceStable(groupsCopy, less)\n\t\t\tthis.groups = groupsCopy\n\t\t\tthis.revision++\n\t\t}\n\n\t\tthis.mutex.Unlock()\n\n\t\t/*\n\t\t * Check if error occured.\n\t\t */\n\t\tif firstError != nil {\n\t\t\tmsg := firstError.Error()\n\t\t\treturn fmt.Errorf(\"Error deserializing activity data: %d erroneous activity groups, first at group number %d: %s\", numErrors, idxFirstErr, msg)\n\t\t} else {\n\t\t\treturn nil\n\t\t}\n\n\t}\n\n}", "title": "" }, { "docid": "fe97d29a9968fd8dc28fed197a7ae47a", "score": "0.5783621", "text": "func (c *Collection) ImportCSV(buf io.Reader, idCol int, skipHeaderRow bool, overwrite bool, verboseLog bool) (int, error) {\n\tvar (\n\t\tfieldNames []string\n\t\tkey string\n\t\terr error\n\t)\n\tr := csv.NewReader(buf)\n\tr.FieldsPerRecord = -1\n\tr.TrimLeadingSpace = true\n\tlineNo := 0\n\tif skipHeaderRow == true {\n\t\tlineNo++\n\t\tfieldNames, err = r.Read()\n\t\tif err != nil {\n\t\t\treturn lineNo, fmt.Errorf(\"Can't read header csv table at %d, %s\", lineNo, err)\n\t\t}\n\t}\n\tfor {\n\t\tlineNo++\n\t\trow, err := r.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn lineNo, fmt.Errorf(\"Can't read row csv table at %d, %s\", lineNo, err)\n\t\t}\n\t\tvar fieldName string\n\t\trecord := map[string]interface{}{}\n\t\tif idCol < 0 {\n\t\t\tkey = fmt.Sprintf(\"%d\", lineNo)\n\t\t}\n\t\tfor i, val := range row {\n\t\t\tif i < len(fieldNames) {\n\t\t\t\tfieldName = fieldNames[i]\n\t\t\t\tif idCol == i {\n\t\t\t\t\tkey = val\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tfieldName = fmt.Sprintf(fmtColumnName, i+1)\n\t\t\t}\n\t\t\t//Note: We need to convert the value\n\t\t\tif i, err := strconv.ParseInt(val, 10, 64); err == nil {\n\t\t\t\trecord[fieldName] = i\n\t\t\t} else if f, err := strconv.ParseFloat(val, 64); err == nil {\n\t\t\t\trecord[fieldName] = f\n\t\t\t} else if strings.ToLower(val) == \"true\" {\n\t\t\t\trecord[fieldName] = true\n\t\t\t} else if strings.ToLower(val) == \"false\" {\n\t\t\t\trecord[fieldName] = false\n\t\t\t} else {\n\t\t\t\tval = strings.TrimSpace(val)\n\t\t\t\tif len(val) > 0 {\n\t\t\t\t\trecord[fieldName] = val\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif len(key) > 0 && len(record) > 0 {\n\t\t\tif c.HasKey(key) {\n\t\t\t\tif overwrite == true {\n\t\t\t\t\terr = c.Update(key, record)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn lineNo, fmt.Errorf(\"can't update %+v to %s, %s\", record, key, err)\n\t\t\t\t\t}\n\t\t\t\t} else if verboseLog {\n\t\t\t\t\tlog.Printf(\"Skipping row %d, key %q, already exists\", lineNo, key)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\terr = c.Create(key, record)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn lineNo, fmt.Errorf(\"can't create %+v to %s, %s\", record, key, err)\n\t\t\t\t}\n\t\t\t}\n\t\t} else if verboseLog {\n\t\t\tlog.Printf(\"Skipping row %d, key value missing\", lineNo)\n\t\t}\n\t\tif verboseLog == true && (lineNo%1000) == 0 {\n\t\t\tlog.Printf(\"%d rows processed\", lineNo)\n\t\t}\n\t}\n\treturn lineNo, nil\n}", "title": "" }, { "docid": "61d6be2208a8bd3e150c9bee30a53710", "score": "0.57175046", "text": "func ImportLogsFromCSV(fileName string) (DataCollection, error) {\n\tfile, err := os.Open(fileName)\n\tif err != nil {\n\t\treturn DataCollection{}, fmt.Errorf(ImportCSVError, err.Error())\n\t}\n\tdefer file.Close()\n\n\tdata := DataCollection{}\n\tvar skipHeader bool\n\tr := csv.NewReader(file)\n\tfor {\n\t\trecord, err := r.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn DataCollection{}, err\n\t\t}\n\t\tif !skipHeader {\n\t\t\tskipHeader = true\n\t\t\tcontinue\n\t\t}\n\n\t\t// CSV is missing Data\n\t\tif len(record) < 3 {\n\t\t\treturn DataCollection{}, fmt.Errorf(ImportCSVError, \"Expected at least 3 rows\")\n\t\t}\n\n\t\t// Parsing the endTime\n\t\tendTime, err := ParseDate(record[1])\n\t\tif err != nil {\n\t\t\treturn DataCollection{}, err\n\t\t}\n\n\t\ttimeTaken, err := strconv.Atoi(record[2])\n\t\tif err != nil {\n\t\t\treturn DataCollection{}, err\n\t\t}\n\n\t\tstartTime := endTime.Add(time.Duration(time.Duration(-timeTaken) * time.Millisecond))\n\t\tdata = append(data, Data{record[0], startTime, endTime, timeTaken, record[1]})\n\t}\n\n\tsort.Sort(data)\n\treturn data, nil\n}", "title": "" }, { "docid": "13fc902fd8cf009ed9951e9d948fbffd", "score": "0.56322277", "text": "func (date *DateTime) UnmarshalCSV(csv string) (err error) {\n\tdate.Time, err = time.Parse(\"2006-01-02 15:04:05\", csv)\n\treturn err\n}", "title": "" }, { "docid": "f1bdc25229a2cbbe8cdfee0613da5216", "score": "0.5542445", "text": "func parseCSV(s string, tw timeWindow) []csvLine {\n\t// open CSV file\n\tfile, err := os.Open(s)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"There was a problem opening the file! :. %s\", err))\n\t}\n\t// make sure we eventually close the CSV file\n\tdefer func() {\n\t\tif err = file.Close(); err != nil {\n\t\t\tpanic(fmt.Sprintf(\"There was a problem closing the file! :. %s\", err))\n\t\t}\n\t}()\n\t// create a reader for the file\n\treader := csv.NewReader(file)\n\tvar content []csvLine\n\n\t// if the read line is in the specified time window put it into the content slice\n\tfor {\n\t\tEOF := readCSVLine(&content, reader, tw)\n\t\tif EOF {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn content\n}", "title": "" }, { "docid": "7c6b8d724e0b653241e375595b52bf56", "score": "0.5406508", "text": "func importCSV(name string, courseName string) error {\n\n\tdb, err := sql.Open(\"mysql\", DB_USER_NAME+\":\"+DB_PASSWORD+\"@unix(/var/run/mysql/mysql.sock)/\"+DB_NAME)\n\tif err != nil {\n\t\treturn errors.New(\"No connection\")\n\t}\n\n\tmysql.RegisterLocalFile(name)\n\n\t// TODO : Solve password @dummy issue, also CSV quotation issue, trailing comma issue\n\tres, err := db.Exec(\"LOAD DATA LOCAL INFILE '\" + name + \"' INTO TABLE Users FIELDS TERMINATED BY ',' ENCLOSED BY '\\\"' LINES TERMINATED BY '\\n' IGNORE 1 LINES (@dummy, FirstName, MiddleInitial, LastName, UserName, Password, @dummy, @dummy, @dummy, @dummy, @dummy)\")\n\n\tif err != nil {\n\t\treturn errors.New(\"Import failed.\")\n\t}\n\n\trowsAffected, err := res.RowsAffected()\n\n\trows, err := db.Query(\"select UserID from Users order by UserID DESC Limit ?\", rowsAffected)\n\n\tif err != nil {\n\t\treturn errors.New(\"Query error.\")\n\t}\n\n\tfor i := 0; ; i++ {\n\n\t\tvar userID int\n\n\t\tif rows.Next() == false {\n\t\t\tbreak\n\t\t}\n\n\t\trows.Scan(&userID)\n\n\t\t_, err = db.Exec(\"INSERT INTO StudentCourses(Student, CourseName) VALUES (?, ?)\", userID, courseName)\n\n\t\tif err != nil {\n\t\t\treturn errors.New(\"User unable to be added to student courses.\")\n\t\t}\n\n\t\tuserName, _ := getUserName(userID)\n\t\tsendRandomPassword(userName)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "88f53c11dda9315085e5167b5a9d9277", "score": "0.5363664", "text": "func (date *DateTime) UnmarshalCSV(csv string) (err error) {\n\tdate.Time, err = time.Parse(\"01/02/2006 15:04:05 AM\", csv)\n\tif err != nil {\n\t\tdate.Time, err = time.Parse(\"01/02/2006 15:04:05 PM\", csv)\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "76cafef17f417e82a0d944bdce713256", "score": "0.5313332", "text": "func FromCSV(\n\tthread *starlark.Thread,\n\tbuiltin *starlark.Builtin,\n\targs starlark.Tuple,\n\tkwargs []starlark.Tuple,\n) (starlark.Value, error) {\n\treturn starlark.None, nil\n}", "title": "" }, { "docid": "cbc0ae50f4893d9d00011fc9e2351cdf", "score": "0.52956903", "text": "func LoadCSV() {\n\n\tsession := util.MongoSession.Copy()\n\tdefer session.Close()\n\n\tsession.SetMode(mgo.Monotonic, true)\n\n\tcollection := session.DB(util.Config.DbName).C(\"csvload\")\n\tabsPath, _ := filepath.Abs(\"../Go_Docker/data/convertcsv.csv\")\n\tfile, err := os.Open(absPath)\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer file.Close()\n\n\treader := csv.NewReader(file)\n\n\tfor {\n\t\trecord, err := reader.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t} else if err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tif record[0] != \"key\" {\n\t\t\terr = collection.Insert(&Mongo{Key: record[0], Value: record[1]})\n\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t\tlog.Printf(\"%#v\", record)\n\t\t}\n\n\t}\n}", "title": "" }, { "docid": "7a803b55e82d20178a0d7be7a413b6da", "score": "0.52727956", "text": "func (date *DateTime) UnmarshalCSV(csv string) (err error) {\n\tdate.Time, err = time.Parse(\"2006-01-02\", csv)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9d2f8723acf8f78e2846c0281092cd5b", "score": "0.5253421", "text": "func readTimeColumns(csvData [][]string, columnIndex []int, conf *Configuration) (epochCol []int64, nanosCol []int32) {\n\tvar err error\n\tepochCol = make([]int64, len(csvData))\n\tnanosCol = make([]int32, len(csvData))\n\t/*\n\t\tNow we can calculate which fields are present that define the Epoch - we either have a pre-defined Epoch\n\t\tor we must compose one from a date and time\n\t*/\n\tmustComposeEpoch := columnIndex[2] == -1\n\tif mustComposeEpoch {\n\t\tif columnIndex[0] == -1 || columnIndex[1] == -1 {\n\t\t\tfmt.Println(\"Unable to build Epoch time from mapping - need both a date and time\")\n\t\t\treturn nil, nil\n\t\t}\n\t}\n\n\t/*\n\t\tObtain the time index values\n\t*/\n\t// var tzLoc *time.Location\n\tvar tzLoc *time.Location\n\tif len(conf.Timezone) != 0 {\n\t\ttzLoc, err = time.LoadLocation(conf.Timezone)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Unable to parse timezone %s: %s\\n\", conf.Timezone, err.Error())\n\t\t\treturn nil, nil\n\t\t}\n\t}\n\n\tvar dateTime string\n\tvar rowTime time.Time\n\tfirstParse := true\n\tvar formatAdj int\n\tfor i, row := range csvData {\n\t\tif mustComposeEpoch {\n\t\t\trowDateIdx := columnIndex[0]\n\t\t\trowTimeIdx := columnIndex[1]\n\t\t\tdateTime = row[rowDateIdx] + \" \" + row[rowTimeIdx]\n\t\t} else {\n\t\t\tdateTime = row[columnIndex[2]]\n\t\t}\n\t\trowTime, err = parseTime(conf.TimeFormat, dateTime, tzLoc, formatAdj)\n\t\tif firstParse && err != nil {\n\t\t\t// Attempt to \"tune\" the time format\n\t\t\tformatAdj = len(dateTime) - len(conf.TimeFormat)\n\t\t\tif formatAdj > 0 {\n\t\t\t\trowTime, err = parseTime(conf.TimeFormat, dateTime, tzLoc, formatAdj)\n\t\t\t}\n\t\t\tfirstParse = false\n\t\t}\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Error parsing Epoch column(s) from input data file: %s\\n\", err.Error())\n\t\t\treturn nil, nil\n\t\t}\n\t\tepochCol[i] = rowTime.UTC().Unix()\n\t\tnanosCol[i] = int32(rowTime.UTC().Nanosecond())\n\t}\n\n\treturn epochCol, nanosCol\n}", "title": "" }, { "docid": "3abd5cb01c5aa66db4617667f07ccdbe", "score": "0.52483547", "text": "func (date *DateTime) UnmarshalCSV(csv string) (err error) {\n\tdate.Time, err = time.Parse(dateFormat, csv)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5eb80d8be4e87cb6dfb7345a210a08fb", "score": "0.5143904", "text": "func ImportCSVFile(DB services.Database, filePath, tableName string) {\n\tlog.Printf(\"start ImportCSVFile for filePath %s\", filePath)\n\ttimeStampCurrent := time.Now()\n\tlog.Printf(\"time started: %v\", timeStampCurrent)\n\tmysql.RegisterLocalFile(filePath)\n\tres, err := DB.DatabaseConnection.Exec(\"LOAD DATA LOCAL INFILE '\" + filePath + \"' INTO TABLE \" + tableName + \" FIELDS TERMINATED BY ',' LINES TERMINATED BY '\\\\n'\")\n\tif err != nil {\n\t\tlog.Fatalf(\"importCSVFile load err %v\", err)\n\t}\n\tval, err := res.RowsAffected()\n\tif err != nil {\n\t\tlog.Printf(\"res.RowsAffected err %v\", err)\n\t}\n\tmysql.DeregisterLocalFile(filePath)\n\tlog.Printf(\"LOAD DATA LOCAL INFILE took %s time\", time.Since(timeStampCurrent).String())\n\tlog.Printf(\"Rows affected %d\", val)\n\tlog.Printf(\"finished ImportCSVFile for filePath %s\", filePath)\n\n}", "title": "" }, { "docid": "3b47e502b631247d5cf723714bba70f8", "score": "0.510863", "text": "func (a *Client) ImportFromCSV(params *ImportFromCSVParams, authInfo runtime.ClientAuthInfoWriter) error {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewImportFromCSVParams()\n\t}\n\n\t_, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"importFromCSV\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/contacts/import/csv\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &ImportFromCSVReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "87f672104a6842df9e2d02bc64aacded", "score": "0.50823313", "text": "func (s *Services) Import(filePath string) error {\n\n\tfile, err := os.Open(filePath)\n\tdefer file.Close()\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tscanner := bufio.NewScanner(file)\n\ti := 0\n\n\tfor scanner.Scan() {\n\t\ti++\n\t\tfields := strings.Split(scanner.Text(), \",\")\n\t\tif len(fields) < 2 {\n\t\t\treturn errors.New(\"CSV: Column \" + string(i) + \" is not in format\")\n\t\t}\n\n\t\t// Check CSV format\n\t\tif i == 1 {\n\n\t\t\tif fields[0] != \"name\" {\n\t\t\t\treturn errors.New(\"CSV: cannot find field 'name'\")\n\t\t\t}\n\n\t\t\tif fields[1] != \"url\" {\n\t\t\t\treturn errors.New(\"CSV: cannot find field 'url'\")\n\t\t\t}\n\n\t\t\tcontinue\n\t\t}\n\t\ts.Stats = append(s.Stats, makeService(fields[0], fields[1]))\n\t}\n\n\tif err = scanner.Err(); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3b9b7ad4319f30d459a4e0b6ab4bb202", "score": "0.5031257", "text": "func (date *Date) UnmarshalCSV(csv string) (err error) {\n\tdate.Time, err = time.Parse(\"2006-01-02\", csv)\n\treturn err\n}", "title": "" }, { "docid": "3b0fe978f36bafdee3b637f1f121b7bd", "score": "0.50209004", "text": "func LoadCSV() *starlarkstruct.Struct {\n\treturn starlarkstruct.FromStringDict(\n\t\tstarlarkstruct.Default,\n\t\tstarlark.StringDict{\n\t\t\t\"ToCSV\": starlark.NewBuiltin(\"csv\", ToCSV),\n\t\t\t\"FromCSV\": starlark.NewBuiltin(\"object\", FromCSV),\n\t\t},\n\t)\n}", "title": "" }, { "docid": "e845550877db542849a89ba9dc01948b", "score": "0.5015952", "text": "func CreatePositionCsv(csv string) (p *Position) {\n\tbar0 := make([]int, WIDTH()+1)\n\tbar1 := make([]int, WIDTH()+1)\n\tp = &Position{}\n\tp.Row[0] = Side{Items: bar0}\n\tp.Row[1] = Side{Items: bar1}\n\tfor i, s := range strings.Split(csv, \",\") {\n\t\tr := i / (WIDTH() + 1)\n\t\tc := i % (WIDTH() + 1)\n\t\tif v, err := strconv.Atoi(s); err == nil {\n\t\t\tp.Row[r%2].Items[c] = v\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "68af3e8cbafab2224b9f62df67958eb2", "score": "0.4973318", "text": "func (c *Conn) ImportCSV(in io.Reader, ic ImportConfig, dbName, table string) error {\n\tcolumns, err := c.Columns(dbName, table)\n\tif err != nil {\n\t\treturn err\n\t}\n\tr := yacr.NewReader(in, ic.Separator, ic.Quoted, ic.Guess)\n\tr.Trim = ic.Trim\n\tr.Comment = ic.Comment\n\tnCol := len(columns)\n\tif nCol == 0 { // table does not exist, let's create it\n\t\tvar sql string\n\t\tif len(dbName) == 0 {\n\t\t\tsql = fmt.Sprintf(`CREATE TABLE \"%s\" `, escapeQuote(table))\n\t\t} else {\n\t\t\tsql = fmt.Sprintf(`CREATE TABLE %s.\"%s\" `, doubleQuote(dbName), escapeQuote(table))\n\t\t}\n\t\tsep := '('\n\t\t// TODO if headers flag is false...\n\t\tfor i := 0; r.Scan(); i++ {\n\t\t\tif i == 0 && r.EndOfRecord() && len(r.Bytes()) == 0 { // empty line\n\t\t\t\ti = -1\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tsql += fmt.Sprintf(\"%c\\n \\\"%s\\\" %s\", sep, r.Text(), ic.getType(i))\n\t\t\tsep = ','\n\t\t\tnCol++\n\t\t\tif r.EndOfRecord() {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif err = r.Err(); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif sep == '(' {\n\t\t\treturn errors.New(\"empty file/input\")\n\t\t}\n\t\tsql += \"\\n)\"\n\t\tif err = c.FastExec(sql); err != nil {\n\t\t\treturn err\n\t\t}\n\t} else if ic.Headers { // skip headers line\n\t\tfor r.Scan() {\n\t\t\tif r.EndOfRecord() {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif err = r.Err(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tvar sql string\n\tif len(dbName) == 0 {\n\t\tsql = fmt.Sprintf(`INSERT INTO \"%s\" VALUES (?%s)`, escapeQuote(table), strings.Repeat(\", ?\", nCol-1))\n\t} else {\n\t\tsql = fmt.Sprintf(`INSERT INTO %s.\"%s\" VALUES (?%s)`, doubleQuote(dbName), escapeQuote(table), strings.Repeat(\", ?\", nCol-1))\n\t}\n\ts, err := c.prepare(sql)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer s.Finalize()\n\tac := c.GetAutocommit()\n\tif ac {\n\t\tif err = c.Begin(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tdefer func() {\n\t\tif err != nil && ac {\n\t\t\t_ = c.Rollback()\n\t\t}\n\t}()\n\tstartLine := r.LineNumber()\n\tfor i := 1; r.Scan(); i++ {\n\t\tif i == 1 && r.EndOfRecord() && len(r.Bytes()) == 0 { // empty line\n\t\t\ti = 0\n\t\t\tstartLine = r.LineNumber()\n\t\t\tcontinue\n\t\t}\n\t\tif i <= nCol {\n\t\t\tif err = s.BindByIndex(i, r.Text()); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\tif r.EndOfRecord() {\n\t\t\tif i < nCol {\n\t\t\t\tif ic.Log != nil {\n\t\t\t\t\t_, _ = fmt.Fprintf(ic.Log, \"%s:%d: expected %d columns but found %d - filling the rest with NULL\\n\", ic.Name, startLine, nCol, i)\n\t\t\t\t}\n\t\t\t\tfor ; i <= nCol; i++ {\n\t\t\t\t\tif err = s.BindByIndex(i, nil); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} else if i > nCol && ic.Log != nil {\n\t\t\t\t_, _ = fmt.Fprintf(ic.Log, \"%s:%d: expected %d columns but found %d - extras ignored\\n\", ic.Name, startLine, nCol, i)\n\t\t\t}\n\t\t\tif _, err = s.Next(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\ti = 0\n\t\t\tstartLine = r.LineNumber()\n\t\t}\n\t}\n\tif err = r.Err(); err != nil {\n\t\treturn err\n\t}\n\tif ac {\n\t\tif err = c.Commit(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b1dac09fda42d9b1e812e45c1039ea69", "score": "0.4897275", "text": "func ReadCSV(fpath string) (*CSV, error) {\n\tf, err := fileutil.OpenToRead(fpath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer f.Close()\n\n\trd := csv.NewReader(f)\n\n\t// in case that rows have Deltaerent number of fields\n\trd.FieldsPerRecord = -1\n\n\trows, err := rd.ReadAll()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(rows) <= 1 {\n\t\treturn nil, fmt.Errorf(\"expected len(rows)>1, got %d\", len(rows))\n\t}\n\tif rows[0][0] != \"UNIX-NANOSECOND\" {\n\t\treturn nil, fmt.Errorf(\"expected header at top, got %+v\", rows[0])\n\t}\n\n\t// remove header\n\trows = rows[1:len(rows):len(rows)]\n\tmin, err := strconv.ParseInt(rows[0][0], 10, 64)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tmax, err := strconv.ParseInt(rows[len(rows)-1][0], 10, 64)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tc := &CSV{\n\t\tFilePath: fpath,\n\t\tPID: 0,\n\t\tDiskDevice: \"\",\n\t\tNetworkInterface: \"\",\n\n\t\tHeader: ProcHeader,\n\t\tHeaderIndex: ProcHeaderIndex,\n\t\tMinUnixNanosecond: min,\n\t\tMinUnixSecond: nanoToUnix(min),\n\t\tMaxUnixNanosecond: max,\n\t\tMaxUnixSecond: nanoToUnix(max),\n\n\t\tRows: make([]Proc, 0, len(rows)),\n\t}\n\tfor _, row := range rows {\n\t\tts, err := strconv.ParseInt(row[ProcHeaderIndex[\"UNIX-NANOSECOND\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttss, err := strconv.ParseInt(row[ProcHeaderIndex[\"UNIX-SECOND\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tpid, err := strconv.ParseInt(row[ProcHeaderIndex[\"PID\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tppid, err := strconv.ParseInt(row[ProcHeaderIndex[\"PPID\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfd, err := strconv.ParseUint(row[ProcHeaderIndex[\"FD\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tthreads, err := strconv.ParseUint(row[ProcHeaderIndex[\"THREADS\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvolCtxNum, err := strconv.ParseUint(row[ProcHeaderIndex[\"VOLUNTARY-CTXT-SWITCHES\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tnonVolCtxNum, err := strconv.ParseUint(row[ProcHeaderIndex[\"NON-VOLUNTARY-CTXT-SWITCHES\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcpuNum, err := strconv.ParseFloat(row[ProcHeaderIndex[\"CPU-NUM\"]], 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvmRssNum, err := strconv.ParseUint(row[ProcHeaderIndex[\"VMRSS-NUM\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvmSizeNum, err := strconv.ParseUint(row[ProcHeaderIndex[\"VMSIZE-NUM\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tloadAvg1min, err := strconv.ParseFloat(row[ProcHeaderIndex[\"LOAD-AVERAGE-1-MINUTE\"]], 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tloadAvg5min, err := strconv.ParseFloat(row[ProcHeaderIndex[\"LOAD-AVERAGE-5-MINUTE\"]], 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tloadAvg15min, err := strconv.ParseFloat(row[ProcHeaderIndex[\"LOAD-AVERAGE-15-MINUTE\"]], 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treadsCompleted, err := strconv.ParseUint(row[ProcHeaderIndex[\"READS-COMPLETED\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsectorsRead, err := strconv.ParseUint(row[ProcHeaderIndex[\"SECTORS-READ\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\twritesCompleted, err := strconv.ParseUint(row[ProcHeaderIndex[\"WRITES-COMPLETED\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsectorsWritten, err := strconv.ParseUint(row[ProcHeaderIndex[\"SECTORS-WRITTEN\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttimeSpentOnReadingMs, err := strconv.ParseUint(row[ProcHeaderIndex[\"MILLISECONDS(READS)\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttimeSpentOnWritingMs, err := strconv.ParseUint(row[ProcHeaderIndex[\"MILLISECONDS(WRITES)\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treadsCompletedDelta, err := strconv.ParseUint(row[ProcHeaderIndex[\"READS-COMPLETED-DELTA\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsectorsReadDelta, err := strconv.ParseUint(row[ProcHeaderIndex[\"SECTORS-READ-DELTA\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\twritesCompletedDelta, err := strconv.ParseUint(row[ProcHeaderIndex[\"WRITES-COMPLETED-DELTA\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsectorsWrittenDelta, err := strconv.ParseUint(row[ProcHeaderIndex[\"SECTORS-WRITTEN-DELTA\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treadBytesDelta, err := strconv.ParseUint(row[ProcHeaderIndex[\"READ-BYTES-DELTA\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treadMegabytesDelta, err := strconv.ParseUint(row[ProcHeaderIndex[\"READ-MEGABYTES-DELTA\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\twriteBytesDelta, err := strconv.ParseUint(row[ProcHeaderIndex[\"WRITE-BYTES-DELTA\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\twriteMegabytesDelta, err := strconv.ParseUint(row[ProcHeaderIndex[\"WRITE-MEGABYTES-DELTA\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treceivePackets, err := strconv.ParseUint(row[ProcHeaderIndex[\"RECEIVE-PACKETS\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttransmitPackets, err := strconv.ParseUint(row[ProcHeaderIndex[\"TRANSMIT-PACKETS\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treceiveBytesNum, err := strconv.ParseUint(row[ProcHeaderIndex[\"RECEIVE-BYTES-NUM\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttransmitBytesNum, err := strconv.ParseUint(row[ProcHeaderIndex[\"TRANSMIT-BYTES-NUM\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treceivePacketsDelta, err := strconv.ParseUint(row[ProcHeaderIndex[\"RECEIVE-PACKETS-DELTA\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttransmitPacketsDelta, err := strconv.ParseUint(row[ProcHeaderIndex[\"TRANSMIT-PACKETS-DELTA\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treceiveBytesNumDelta, err := strconv.ParseUint(row[ProcHeaderIndex[\"RECEIVE-BYTES-NUM-DELTA\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttransmitBytesNumDelta, err := strconv.ParseUint(row[ProcHeaderIndex[\"TRANSMIT-BYTES-NUM-DELTA\"]], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tpc := Proc{\n\t\t\tUnixNanosecond: ts,\n\t\t\tUnixSecond: tss,\n\n\t\t\tPSEntry: PSEntry{\n\t\t\t\tProgram: row[ProcHeaderIndex[\"PROGRAM\"]],\n\t\t\t\tState: row[ProcHeaderIndex[\"STATE\"]],\n\t\t\t\tPID: pid,\n\t\t\t\tPPID: ppid,\n\t\t\t\tCPU: row[ProcHeaderIndex[\"CPU\"]],\n\t\t\t\tVMRSS: row[ProcHeaderIndex[\"VMRSS\"]],\n\t\t\t\tVMSize: row[ProcHeaderIndex[\"VMSIZE\"]],\n\t\t\t\tFD: fd,\n\t\t\t\tThreads: threads,\n\t\t\t\tVoluntaryCtxtSwitches: volCtxNum,\n\t\t\t\tNonvoluntaryCtxtSwitches: nonVolCtxNum,\n\t\t\t\tCPUNum: cpuNum,\n\t\t\t\tVMRSSNum: vmRssNum,\n\t\t\t\tVMSizeNum: vmSizeNum,\n\t\t\t},\n\n\t\t\tLoadAvg: proc.LoadAvg{\n\t\t\t\tLoadAvg1Minute: loadAvg1min,\n\t\t\t\tLoadAvg5Minute: loadAvg5min,\n\t\t\t\tLoadAvg15Minute: loadAvg15min,\n\t\t\t},\n\n\t\t\tDSEntry: DSEntry{\n\t\t\t\tDevice: row[ProcHeaderIndex[\"DEVICE\"]],\n\t\t\t\tReadsCompleted: readsCompleted,\n\t\t\t\tSectorsRead: sectorsRead,\n\t\t\t\tTimeSpentOnReading: row[ProcHeaderIndex[\"TIME(READS)\"]],\n\t\t\t\tWritesCompleted: writesCompleted,\n\t\t\t\tSectorsWritten: sectorsWritten,\n\t\t\t\tTimeSpentOnWriting: row[ProcHeaderIndex[\"TIME(WRITES)\"]],\n\t\t\t\tTimeSpentOnReadingMs: timeSpentOnReadingMs,\n\t\t\t\tTimeSpentOnWritingMs: timeSpentOnWritingMs,\n\t\t\t},\n\t\t\tReadsCompletedDelta: readsCompletedDelta,\n\t\t\tSectorsReadDelta: sectorsReadDelta,\n\t\t\tWritesCompletedDelta: writesCompletedDelta,\n\t\t\tSectorsWrittenDelta: sectorsWrittenDelta,\n\n\t\t\tReadBytesDelta: readBytesDelta,\n\t\t\tReadMegabytesDelta: readMegabytesDelta,\n\t\t\tWriteBytesDelta: writeBytesDelta,\n\t\t\tWriteMegabytesDelta: writeMegabytesDelta,\n\n\t\t\tNSEntry: NSEntry{\n\t\t\t\tInterface: row[ProcHeaderIndex[\"INTERFACE\"]],\n\t\t\t\tReceiveBytes: row[ProcHeaderIndex[\"RECEIVE-BYTES\"]],\n\t\t\t\tReceivePackets: receivePackets,\n\t\t\t\tTransmitBytes: row[ProcHeaderIndex[\"TRANSMIT-BYTES\"]],\n\t\t\t\tTransmitPackets: transmitPackets,\n\t\t\t\tReceiveBytesNum: receiveBytesNum,\n\t\t\t\tTransmitBytesNum: transmitBytesNum,\n\t\t\t},\n\t\t\tReceiveBytesDelta: row[ProcHeaderIndex[\"RECEIVE-BYTES-DELTA\"]],\n\t\t\tReceivePacketsDelta: receivePacketsDelta,\n\t\t\tTransmitBytesDelta: row[ProcHeaderIndex[\"TRANSMIT-BYTES-DELTA\"]],\n\t\t\tTransmitPacketsDelta: transmitPacketsDelta,\n\t\t\tReceiveBytesNumDelta: receiveBytesNumDelta,\n\t\t\tTransmitBytesNumDelta: transmitBytesNumDelta,\n\n\t\t\tExtra: []byte(row[ProcHeaderIndex[\"EXTRA\"]]),\n\t\t}\n\t\tc.PID = pc.PSEntry.PID\n\t\tc.DiskDevice = pc.DSEntry.Device\n\t\tc.NetworkInterface = pc.NSEntry.Interface\n\n\t\tc.Rows = append(c.Rows, pc)\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "7ebfafe06bd5ef2df5371dde0dbb60c7", "score": "0.48419788", "text": "func NewRecordFromCSV(rec []string) (*Record, error) {\n\tif len(rec) < 6 {\n\t\treturn nil, ErrInvalidRecord\n\t}\n\n\tvar tm, err = time.Parse(time.RFC3339, rec[4])\n\tif err != nil {\n\t\treturn nil, ErrInvalidRecord\n\t}\n\n\tcode, err := strconv.ParseInt(rec[6], 10, 8)\n\tif err != nil {\n\t\treturn nil, ErrInvalidRecord\n\t}\n\n\treturn &Record{\n\t\tUserID: rec[1],\n\t\tExecEnd: tm,\n\t\tExitCode: uint8(code),\n\t}, nil\n}", "title": "" }, { "docid": "ed6eec63c502f4921b9b7a9e3922e152", "score": "0.48322776", "text": "func newOrderFromCSVRow(row []string) interface{} {\n\t// type conversions from CSV file, arguments must align\n\tamount, _ := strconv.Atoi(row[2])\n\tprice, _ := strconv.ParseFloat(row[3], 64)\n\treturn newOrder(row[1], row[0], amount, price)\n}", "title": "" }, { "docid": "72d7466769c6a1a09c76b3bf65159967", "score": "0.4819979", "text": "func (d *Duration) UnmarshalCSV(s string) (err error) {\n\td.Duration, err = time.ParseDuration(s)\n\treturn err\n}", "title": "" }, { "docid": "abbc81492633b1031ff39102120ca209", "score": "0.4819044", "text": "func loadOneSiteCSVRow(csvHeadersIndex map[string]int, data []string) (bool, CSVRow) {\n\tcsvRow := reflect.New(reflect.TypeOf(CSVRow{}))\n\trowLoaded := false\n\n\tfor header, index := range csvHeadersIndex {\n\t\tvalue := strings.TrimSpace(data[index])\n\t\tcsvRow.Elem().FieldByName(header).Set(reflect.ValueOf(value))\n\t}\n\n\t// if blank data has not been passed then only need to return true\n\tif (CSVRow{}) != csvRow.Elem().Interface().(CSVRow) {\n\t\trowLoaded = true\n\t}\n\n\treturn rowLoaded, csvRow.Elem().Interface().(CSVRow)\n}", "title": "" }, { "docid": "7ea2b06127899aef24d2c81f0744ec45", "score": "0.48189268", "text": "func (i *CSVImporter) Import(db *Database, name string, r *csv.Reader) error {\n\t// Read CSV headers.\n\trecord, err := r.Read()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Create columns from headers.\n\tvar columns []*Column\n\tfor _, name := range record {\n\t\tcolumns = append(columns, &Column{Name: name})\n\t}\n\n\t// Create table in database.\n\tif err := db.CreateTable(name, columns); err != nil {\n\t\treturn err\n\t}\n\n\t// Read remaining rows into Table.Rows.\n\trows, err := r.ReadAll()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Write table rows to disk.\n\tif err := db.SetTableRows(name, rows); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "84bfda8c96d21889b131fa92e3da5c4e", "score": "0.4794842", "text": "func LoadFromCSV(csvPath string, sep rune) (*vptree.VPTree, error) {\n\treturn load(csvPath, sep, false)\n}", "title": "" }, { "docid": "1e43d1737001f657fa63b212d6aa70cd", "score": "0.47660857", "text": "func (tbl *Table) LoadFromCsvString(tableStr string) error {\n\t// TODO: validate the input and error handling\n\n\ttableStr = strings.TrimSpace(tableStr)\n\trows := strings.Split(tableStr, \"\\n\")\n\n\t// Load column names from the first row\n\ttbl.colNames = utils.SplitAndTrimSpace(rows[0], \",\")\n\n\t// Load column types from the second row\n\ttbl.loadColumnTypes(rows[1])\n\n\t// Load all data (body) rows\n\ttbl.loadBodyRows(rows[2:]...)\n\n\treturn nil\n}", "title": "" }, { "docid": "ccde58b9d964828765e05e672dac2bfa", "score": "0.47186035", "text": "func (w *WheelchairAccess) UnmarshalCSV(csv string) error {\n\td, err := strconv.Atoi(csv)\n\tn := WheelchairAccess(d)\n\tw = &n\n\treturn err\n}", "title": "" }, { "docid": "62f715fc39e6cd2d5a34db747655a94d", "score": "0.46788806", "text": "func NewPathFromCSV(filePath string) (*Path, error) {\n\tf, err := os.Open(filePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer f.Close()\n\n\tcsvReader := csv.NewReader(f)\n\trecords, err := csvReader.ReadAll()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar p Path\n\tp.points = make([]*point, len(records))\n\n\tfor i, rec := range records {\n\t\tif len(rec) != 3 {\n\t\t\treturn nil, errors.Wrap(errInvalidRecord, \"length must be exactly 3\")\n\t\t}\n\n\t\tvar (\n\t\t\tlat, lon float64\n\t\t\tt int64\n\t\t)\n\n\t\tif lat, err = strconv.ParseFloat(rec[0], 64); err != nil {\n\t\t\treturn nil, errors.Wrap(errInvalidRecord, err.Error())\n\t\t}\n\n\t\tif lon, err = strconv.ParseFloat(rec[1], 64); err != nil {\n\t\t\treturn nil, errors.Wrap(errInvalidRecord, err.Error())\n\t\t}\n\n\t\tif t, err = strconv.ParseInt(rec[2], 10, 64); err != nil {\n\t\t\treturn nil, errors.Wrap(errInvalidRecord, err.Error())\n\t\t}\n\n\t\tp.points[i] = &point{\n\t\t\tLat: lat,\n\t\t\tLon: lon,\n\t\t\tTimestamp: t,\n\t\t}\n\t}\n\treturn &p, nil\n}", "title": "" }, { "docid": "3768eea0c5d1296f07c4dfdde53ca49d", "score": "0.46722394", "text": "func FormatCSV(t *CSVData, d *dict.Dict) {\n\n format := func (lineStr *string) bool {\n\n arr := strings.Split(*lineStr, \",\")\n needReplace := false\n for idx, str := range arr {\n \n if strings.IndexFunc(str, matchF) == -1 {\n continue\n }\n \n item := d.GetItem(str)\n if item == nil {\n \n // t.NilArr[str] = 0\n continue\n }\n \n arr[idx] = item.Value\n needReplace = true\n }\n\n if needReplace {\n *lineStr = strings.Join(arr, \",\")\n }\n \n return needReplace\n }\n\n for i, l := range t._data {\n\n if !format(&l) {\n continue\n }\n\n t._data[i] = l\n }\n\n}", "title": "" }, { "docid": "a88f2b018b417007772ea6d2275e9673", "score": "0.45846277", "text": "func ParseCSV(body []byte) ([]map[string]string, error) {\n\tslice := make([]map[string]string, 0)\n\trecords, err := csv.NewReader(bytes.NewReader(body)).ReadAll()\n\n\tif err != nil {\n\t\treturn slice, err\n\t}\n\n\trows := len(records)\n\tfor i := 1; i < rows; i++ {\n\t\tm := make(map[string]string)\n\t\tcols := len(records[i])\n\t\tfor j := 0; j < cols; j++ {\n\t\t\tm[records[0][j]] = records[i][j]\n\t\t}\n\t\tslice = append(slice, m)\n\t}\n\n\treturn slice, nil\n}", "title": "" }, { "docid": "57da38ef2f2d0e99d02125ea56092bd1", "score": "0.4581636", "text": "func ImportCSVFiles(DB services.Database, folderPath string, tableName string) {\n\tlog.Printf(\"start ImportCSVFile for folderPath %s\", folderPath)\n\ttimeStampCurrent := time.Now()\n\tlog.Printf(\"time started: %v\", timeStampCurrent)\n\tfileList := fetchFilesFromFolder(folderPath)\n\tfor _, fs := range fileList {\n\t\tabsolutepath := config.Config.IngestFolderLocation + \"/\" + fs.Name()\n\t\tlog.Printf(\"importing file : %s\", absolutepath)\n\t\ttimeStampStartImportForSingleFile := time.Now()\n\t\tImportCSVFile(DB, absolutepath, tableName)\n\t\tlog.Printf(\"ImportCSVFile() took %s time\", time.Since(timeStampStartImportForSingleFile).String())\n\n\t}\n\tlog.Printf(\"finished ImportCSVFile() took %s time\", time.Since(timeStampCurrent).String())\n}", "title": "" }, { "docid": "4d0f46fe4025687fda341b9bf603f48f", "score": "0.45741102", "text": "func Split(filepath, dest string) error {\n\n\tvar (\n\t\terr error\n\t\toldTime string\n\t\trows [][]string\n\t)\n\n\tlines, err := csv.ReadAll(filepath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, line := range lines {\n\n\t\tif len(line) > 0 {\n\t\t\t// date\n\t\t\tval := line[0]\n\n\t\t\t_, err = time.Parse(\"2006-01-02\", val)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif oldTime == \"\" {\n\t\t\t\toldTime = val\n\t\t\t}\n\n\t\t\tif oldTime == val {\n\n\t\t\t\trows = append(rows, line)\n\n\t\t\t} else {\n\n\t\t\t\terr = csv.AddRows(dest+oldTime+\".csv\", rows)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\toldTime = val\n\t\t\t\trows = make([][]string, 0)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn csv.AddRows(dest+oldTime+\".csv\", rows)\n}", "title": "" }, { "docid": "769212b3339da369320aeef60ad1dce1", "score": "0.45405504", "text": "func LoadFromCsv(graph *Graph, filename string) error {\n\n\tcsvfile, err := os.Open(filename)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treader := csv.NewReader(csvfile)\n\n\tvar currAsn int = -1\n\tvar currLinks Link = make(Link, 5)\n\tvar currTypes Rel = make(Rel, 5)\n\n\tfor i := 0; ; i++ {\n\t\trow, err := reader.Read()\n\n\t\tif err == io.EOF {\n\t\t\tif currAsn != -1 {\n\t\t\t\ttempNode := ToNode(currAsn, currLinks, currTypes)\n\t\t\t\tgraph.Nodes[currAsn] = &tempNode\n\t\t\t\tgraph.Speakers[currAsn] = InitSpeaker(&tempNode)\n\t\t\t\tgraph.unstable[graph.Nodes[currAsn]] = true\n\t\t\t\tgraph.remaining++\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t\tif u.Int(row[0]) != currAsn {\n\t\t\tif currAsn != -1 {\n\t\t\t\ttempNode := ToNode(currAsn, currLinks, currTypes)\n\t\t\t\tgraph.Nodes[currAsn] = &tempNode\n\t\t\t\tgraph.Speakers[currAsn] = InitSpeaker(&tempNode)\n\t\t\t\tgraph.unstable[graph.Nodes[currAsn]] = true\n\t\t\t\tgraph.remaining++\n\t\t\t}\n\t\t\tcurrAsn = u.Int(row[0])\n\t\t\tcurrLinks = currLinks[:0]\n\t\t\tcurrLinks = append(currLinks, u.Int(row[1]))\n\t\t\tcurrTypes = currTypes[:0]\n\t\t\tcurrTypes = append(currTypes, u.Int(row[2]))\n\t\t} else {\n\t\t\tcurrLinks = append(currLinks, u.Int(row[1]))\n\t\t\tcurrTypes = append(currTypes, u.Int(row[2]))\n\t\t}\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "4b3f71c21c6e7a131f856b5bb2da7dd8", "score": "0.4533644", "text": "func (s *Service) UploadCSV() http.HandlerFunc {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\treader := csv.NewReader(r.Body)\n\n\t\tlines, err := reader.ReadAll()\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\trecords := make([]User, 0)\n\n\t\tfor i, line := range lines {\n\t\t\tfmt.Println(\"line: \", line)\n\t\t\t// skip header\n\t\t\tif i == 0 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tzipCode, err := strconv.Atoi(line[3])\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\n\t\t\trecord := User{\n\t\t\t\tEmail: line[0],\n\t\t\t\tFirstName: line[1],\n\t\t\t\tLastName: line[2],\n\t\t\t\tZipCode: zipCode,\n\t\t\t}\n\n\t\t\trecords = append(records, record)\n\t\t}\n\n\t\t// todo: dbService.InsertRecords(records)\n\t})\n}", "title": "" }, { "docid": "8969db2373a73af9a2742700f70dddca", "score": "0.45327774", "text": "func Load(path string) ([]*Entry, error) {\n\tfile, err := os.Open(path)\n\tif err != nil {\n\t\treturn nil,err\n\t}\n\tdefer file.Close()\n\n\tlines, err := csv.NewReader(file).ReadAll()\n\tif err != nil {\n\t\treturn nil,err\n\t}\n\tvar output []*Entry\n\t// Loop through lines & turn into object\n\tfor idx, line := range lines {\n\t\tif idx == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tif len (line) < 3 {\n\t\t\treturn nil, fmt.Errorf(\"malformed input error: %s\", line)\n\t\t}\n\t\tdone, err := strconv.ParseBool(line[0])\n\t\tdeadline, err := time.Parse(\"2006-01-02\",line[2])\n\t\tif err != nil {\n\t\t\treturn nil,err\n\t\t}\n\t\tvar data = Entry{\n\t\t\tDone: done,\n\t\t\tText: line[1],\n\t\t\tDeadline: deadline,\n\t\t}\n\t\toutput = append(output, &data)\n\t}\n\n\treturn output, nil\n}", "title": "" }, { "docid": "f5efeea03fd80d42823f8a02890fc779", "score": "0.45247477", "text": "func PricesFromCSV(csvFilePath string) (*DataHandler, error) {\n\tcsvFile, _ := os.Open(csvFilePath)\n\treader := csv.NewReader(bufio.NewReader(csvFile))\n\n\t//Reading first line header and validating the required columns\n\tif line, error := reader.Read(); error != nil || !isCSVHeaderValid(line) {\n\t\treturn nil, fmt.Errorf(`error reading header with columns in the csv.\n\t\t\t\tMake sure the CSV has the columns Open, High, Low, Close, Volume`)\n\t}\n\n\tvar prices []DataPoint\n\tfor {\n\t\tline, error := reader.Read()\n\t\tif error == io.EOF {\n\t\t\tbreak\n\t\t} else if error != nil {\n\t\t\tlog.Fatal(error)\n\t\t}\n\n\t\t//Checking each OHLCV value in the csv\n\t\tvar numbers [5]float64\n\t\tfor i := 0; i < 5; i++ {\n\t\t\tvalue, err := strToFloat(line[i])\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tnumbers[i] = value\n\n\t\t}\n\n\t\tprices = append(prices, DataPoint{\n\t\t\topen: numbers[0],\n\t\t\thigh: numbers[1],\n\t\t\tlow: numbers[2],\n\t\t\tclose: numbers[3],\n\t\t\tvolume: numbers[4],\n\t\t})\n\t}\n\n\treturn newDataHandler(prices), nil\n}", "title": "" }, { "docid": "08e9dfe80bc46a9b96eece0dd6fc05f6", "score": "0.45195156", "text": "func CsvToDb(filename string) {\n\n\ttimeNow := time.Now()\n\n\tf, _ := os.Open(filename)\n\t// Create a new reader.\n\tr := csv.NewReader(bufio.NewReader(f))\n\tfor {\n\t\trecord, err := r.Read()\n\t\t// Stop at EOF.\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tperiod, _ := strconv.Atoi(record[0])\n\t\trateRxVal, _ := strconv.ParseFloat(record[4], 32)\n\t\trateTxVal, _ := strconv.ParseFloat(record[5], 32)\n\t\tvolumeRxVal, _ := strconv.ParseFloat(record[6], 32)\n\t\tvolumeTxVal, _ := strconv.ParseFloat(record[7], 32)\n\t\tspeedRxVal, _ := strconv.ParseFloat(record[8], 32)\n\t\tspeedTxVal, _ := strconv.ParseFloat(record[9], 32)\n\t\tsnippet := TrafficSnippet{\n\t\t\tRop: timeNow.Add(time.Duration(period*15) * time.Minute),\n\t\t\tPool: record[1],\n\t\t\tContext: record[2],\n\t\t\tKey: record[3],\n\t\t\tTrafficKpi: TrafficKpi{\n\t\t\t\tRateRx: float32(rateRxVal),\n\t\t\t\tRateTx: float32(rateTxVal),\n\t\t\t\tVolumeRx: float32(volumeRxVal),\n\t\t\t\tVolumeTx: float32(volumeTxVal),\n\t\t\t\tSpeedRx: float32(speedRxVal),\n\t\t\t\tSpeedTx: float32(speedTxVal),\n\t\t\t},\n\t\t}\n\t\tsnippet.save()\n\n\t}\n}", "title": "" }, { "docid": "f8d8cd113d6bc09748313ce2badb2d7b", "score": "0.45087034", "text": "func Stamp(csvFilePath, originPath, timeSeriesName, event string) error {\n\tcsvFile, err := os.OpenFile(csvFilePath,\n\t\tos.O_APPEND|os.O_WRONLY|os.O_CREATE,\n\t\t0666)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer csvFile.Close()\n\n\tw := csv.NewWriter(csvFile)\n\terr = w.Write([]string{\n\t\ttime.Now().UTC().Format(\"2006-01-02 15:04:05\"), // Excel-readable time format.\n\t\toriginPath,\n\t\ttimeSeriesName,\n\t\tevent,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tw.Flush()\n\treturn w.Error()\n}", "title": "" }, { "docid": "0eaf10d3f5641797dbe0e194b9dab21a", "score": "0.4499038", "text": "func (m *ChannelModeKinds) UpdateCSV(kindstr string) (err error) {\n\tvar kinds map[rune]int\n\tkinds, err = parseChannelModeKindsCSV(kindstr)\n\tif err != nil {\n\t\treturn\n\t}\n\tm.kinds = kinds\n\treturn\n}", "title": "" }, { "docid": "3a2e552cee1b50c9bd663529d47c4956", "score": "0.44884482", "text": "func (ctx *TemplateContext) CSV(colIndex int) (string, error) {\n\tpayloadReader := strings.NewReader(ctx.Payload)\n\tcsvReader := csv.NewReader(payloadReader)\n\tseparator := ctx.subscription.CSVSeparator\n\tif separator != \"\" {\n\t\trunes := []rune(separator)\n\t\tif len(runes) != 1 {\n\t\t\treturn \"\", fmt.Errorf(\"Invalid CSV separator %q\", separator)\n\t\t}\n\t\tcsvReader.Comma = runes[0]\n\t}\n\n\trecords, err := csvReader.Read()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tmaxIndex := len(records) - 1\n\tif colIndex > maxIndex {\n\t\treturn \"\", fmt.Errorf(\"column index %v is out of range (max: %v)\",\n\t\t\tcolIndex, maxIndex)\n\t}\n\n\treturn records[colIndex], nil\n}", "title": "" }, { "docid": "4f8cf368a63214d62fc7e7a6979f17bc", "score": "0.4479999", "text": "func parseCSV(csvFilePath string) error {\n\tcsvFile, err := os.Open(csvFilePath)\n\n\tif err != nil && os.IsNotExist(err) {\n\t\treturn errors.New(csvFilePath + \" does not exist\")\n\t} else if err != nil && os.IsPermission(err) {\n\t\treturn errors.New(\"Can not open \" + csvFilePath + \" due to invalid file permissions\")\n\t}\n\n\tdefer csvFile.Close()\n\n\treader := csv.NewReader(csvFile)\n\n\tfor {\n\t\trecord, err := reader.Read()\n\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t} else if err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\taddress := strings.ToLower(strings.TrimSpace(record[1]))\n\t\tvendor := strings.TrimSpace(record[2])\n\n\t\taddressMap.Lock()\n\t\taddressMap.m[address] = vendor\n\t\taddressMap.Unlock()\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "dea45b9a336c43b34154c48559b1d4f5", "score": "0.44604674", "text": "func LoadCSV(fname string) [][]string {\n\tt := [][]string{}\n\tf, err := os.Open(fname)\n\tif nil == err {\n\t\tdefer f.Close()\n\t\treader := csv.NewReader(f)\n\t\treader.FieldsPerRecord = -1\n\t\trawCSVdata, err := reader.ReadAll()\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\tos.Exit(1)\n\t\t}\n\t\tfor _, sa := range rawCSVdata {\n\t\t\tt = append(t, sa)\n\t\t}\n\t} else {\n\t\tfmt.Printf(\"LoadCSV: could not open CSV file. err = %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n\treturn t\n}", "title": "" }, { "docid": "0a0194209946a1af6ef5e9794647e125", "score": "0.4458755", "text": "func LoadFromCSVPHash(csvPath string, sep rune) (*vptree.VPTree, error) {\n\treturn load(csvPath, sep, true)\n}", "title": "" }, { "docid": "4d2c626c3862c25912c4b4cf9afef4f3", "score": "0.44368535", "text": "func TransformCSV(\n\ttetraCfgGetter func() tetra.Config,\n\tstringCSVLoader func() string,\n\tstringCSVSaver func(string),\n) {\n\tcsv := stringCSVLoader()\n\ttetraConfig := tetraCfgGetter()\n\n\tnewCSV := tetra.TransformCSV(tetraConfig, csv)\n\n\tstringCSVSaver(newCSV)\n}", "title": "" }, { "docid": "6d759a86d1cbdd11739715767673fbfe", "score": "0.4436421", "text": "func ParseCSV(r io.Reader) ([]Entry, error) {\n\treader := csv.NewReader(r)\n\n\t// skip header\n\treader.Read()\n\n\tvar entries []Entry\n\tfor {\n\t\tline, err := reader.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t} else if err != nil {\n\t\t\treturn nil, fmt.Errorf(\"encountered error while parsing csv: %v\", err)\n\t\t}\n\n\t\tentries = append(entries, entryFor(line))\n\t}\n\n\treturn entries, nil\n}", "title": "" }, { "docid": "2c693b79b1b7ecf9fdd32e0c9bebc6c2", "score": "0.44059795", "text": "func ParseCSV(filename string) (*WhoisResults, error) {\n\tentries, err := dry.FileGetCSV(filename, time.Second*5)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tp := pool.NewLimited(10)\n\tbatch := p.Batch()\n\n\tgo func() {\n\t\tfor pos, entry := range entries {\n\t\t\tbatch.Queue(asyncWhoisRecord(pos, &WhoisRecordRequest{\n\t\t\t\tentry[0],\n\t\t\t\tentry[1],\n\t\t\t}))\n\t\t}\n\t\tbatch.QueueComplete()\n\t}()\n\treturn handleBatchResults(batch)\n}", "title": "" }, { "docid": "ac40e7077a69a77d0c4fbb7027e02485", "score": "0.43847522", "text": "func (c *CSV) Upload(a *config.AppContext, table interpreter.TableNode, appendData bool, createTable bool, dataStore services.Service) error {\n\t/*\n\t * We will first get the underlyign datastore\n\t * Then we will read the file and order the columns in that file\n\t * Then we will upload the data\n\t */\n\t//getting the underlying datastore\n\tdS, err := dataStore.Datastore()\n\tif err != nil {\n\t\t//error while getting the datastore connection\n\t\ta.Log.Error(\"error while getting the datastore connection\")\n\t\treturn err\n\t}\n\n\t//reading the file and figuring out the order\n\t//opening the file\n\tf, err := os.Open(c.Filename)\n\tif err != nil {\n\t\t//error while opening the file\n\t\treturn err\n\t}\n\n\t//reading the column names in the file\n\tr := csv.NewReader(f)\n\tcols, err := r.Read()\n\t//even if the error was EOF or aything else, we will report it as error since\n\t//we couldn't read the cols\n\tif err != nil && err != io.EOF {\n\t\treturn err\n\t}\n\tif err != nil && err == io.EOF {\n\t\treturn errors.New(\"EOF reached before able to read the columns in the file\")\n\t}\n\t//storing the columns in the columns result\n\tcolumns := map[string]int{}\n\tfor k, col := range cols {\n\t\tcolumns[col] = k\n\t}\n\tsortedCols := make([]interpreter.ColumnNode, len(columns))\n\tfor _, v := range table.Children {\n\t\tsortedCols[columns[string(v.Word)]] = v\n\t}\n\n\t//we start uploading the data\n\terr = dS.DumpCSV(c.Filename, table.Name, sortedCols, appendData, createTable, config.DoSCPFileTransfer, a.Log)\n\tif err != nil {\n\t\t//error while dumping the csv to the datastore\n\t\ta.Log.Error(\"error while dumping the csv to the datastore\")\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8e539c13ea74a99d24a17b25614e89e6", "score": "0.43769553", "text": "func LoadStringTablesCSV(ctx context.Context, fname string) []error {\n\tm := LoadRentRollCSV(ctx, fname, CreateStringList)\n\n\t// write out whatever we got\n\tif len(a.S) > 0 && len(m) == 0 {\n\t\terr := writeStringList(ctx)\n\t\tif err != nil {\n\t\t\terr := fmt.Errorf(\"error writing string list: %s\", err.Error())\n\t\t\tm = append(m, err)\n\t\t}\n\t}\n\treturn m\n}", "title": "" }, { "docid": "09df11c9700ef5f8dcd456747de38326", "score": "0.43667138", "text": "func loadAirports(db *bolt.DB, dataDir string) error {\n\tapts, err := os.Open(fmt.Sprintf(\"%s/%s\", dataDir, \"airports.csv\"))\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer apts.Close()\n\n\tr := csv.NewReader(apts)\n\t_, err = r.Read() // skip header\n\n\terr = db.Update(func(tx *bolt.Tx) error {\n\t\t_, err = tx.CreateBucketIfNotExists([]byte(\"Airports\"))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tb := tx.Bucket([]byte(\"Airports\"))\n\n\t\tfor {\n\t\t\trecord, err := r.Read()\n\t\t\tif err == io.EOF {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"airport read\")\n\t\t\t}\n\n\t\t\tlatitude, _ := strconv.ParseFloat(record[4], 64)\n\t\t\tlongitude, _ := strconv.ParseFloat(record[5], 64)\n\t\t\televation, _ := strconv.ParseInt(record[6], 10, 64)\n\t\t\tapt := Airport{record[1],\n\t\t\t\trecord[3],\n\t\t\t\tlatitude,\n\t\t\t\tlongitude,\n\t\t\t\televation,\n\t\t\t\trecord[10],\n\t\t\t\trecord[9],\n\t\t\t\trecord[8],\n\t\t\t\trecord[7],\n\t\t\t\trecord[13]}\n\n\t\t\tm, err := msgpack.Marshal(&apt)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"airport marshal\")\n\t\t\t}\n\n\t\t\terr = b.Put([]byte(record[1]), m)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"database put\")\n\t\t\t}\n\n\t\t}\n\n\t\treturn nil\n\t})\n\n\treturn err\n}", "title": "" }, { "docid": "5b72d9ba5a64bcac0d431029ea4e3d8e", "score": "0.43348706", "text": "func writeMicroFromCsvFile(\n\tdbConn *sql.DB,\n\tdbFacet db.Facet,\n\tmodelDef *db.ModelMeta,\n\trunMeta *db.RunMeta,\n\tlayout db.WriteMicroLayout,\n\tcsvDir string,\n\tcsvCvt db.CellMicroConverter,\n) error {\n\n\t// converter from csv row []string to db cell\n\tcvt, err := csvCvt.CsvToCell()\n\tif err != nil {\n\t\treturn errors.New(\"invalid converter from csv row: \" + err.Error())\n\t}\n\n\t// open csv file, convert to utf-8 and parse csv into db cells\n\t// reading from .id.csv files not supported by converters\n\tfn, err := csvCvt.CsvFileName()\n\tif err != nil {\n\t\treturn errors.New(\"invalid csv file name: \" + err.Error())\n\t}\n\tchs, err := csvCvt.CsvHeader()\n\tif err != nil {\n\t\treturn errors.New(\"Error at building csv microdata header \" + layout.Name + \": \" + err.Error())\n\t}\n\tch := strings.Join(chs, \",\")\n\n\tf, err := os.Open(filepath.Join(csvDir, fn))\n\tif err != nil {\n\t\treturn errors.New(\"csv file open error: \" + err.Error())\n\t}\n\tdefer f.Close()\n\n\tfrom, err := makeFromCsvReader(fn, f, ch, cvt)\n\tif err != nil {\n\t\treturn errors.New(\"fail to create microdata csv reader: \" + err.Error())\n\t}\n\n\t// write each csv row into microdata entity generation table\n\terr = db.WriteMicrodataFrom(dbConn, dbFacet, modelDef, runMeta, &layout, from)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b6705d39faaa78b089ae61cfe95599bd", "score": "0.43247306", "text": "func (d *Dataset) LoadCSV(filename string) bool {\n\tif data, err := godatamining.FromCSV(filename); err == nil {\n\t\ttmp := (*data)[1:]\n\t\td.Data = &tmp\n\t\td.Size = uint16(len(*data) - 1)\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "26e4a75e025c9006c647622d7216fbdc", "score": "0.43148902", "text": "func GetDataPointsFromCSV(fileName string) (regression.DataPoints, error) {\n\tfile, err := os.Open(fileName)\n\thandleError(err)\n\tdefer file.Close()\n\t//Create a new csv reader\n\treader := csv.NewReader(file)\n\theaders, err := reader.Read()\n\thandleError(err)\n\trecords, err := reader.ReadAll()\n\thandleError(err)\n\tfieldsCount := reader.FieldsPerRecord\n\tinstancesCount := len(records)\n\tlog.Printf(\"Read %d instances with %d fields\\n\", instancesCount, fieldsCount)\n\t//Check that the records' fields count is the same as the headers fields count\n\tif fieldsCount != len(headers) {\n\t\tlog.Panic(\"Fields count must be the same as the headers fields count\\n\")\n\t\treturn nil, errors.New(\n\t\t\t\"Fields count must be the same as the headers fields count\")\n\t}\n\t//Initialize the features dataset\n\tfeatures := make([][]float64, instancesCount)\n\n\t//Convert from string to float64 all the entries\n\tfor i, e := range records {\n\t\trow := make([]float64, len(e))\n\t\tfor j, v := range e {\n\t\t\t//TODO(islam): Make this tolerate whitespaces\n\t\t\trow[j], err = strconv.ParseFloat(v, 64)\n\t\t\thandleError(err)\n\t\t}\n\t\tfeatures[i] = row\n\t}\n\t//Create and return the data points\n\treturn regression.MakeDataPoints(features, fieldsCount-1), nil\n}", "title": "" }, { "docid": "4d7672bfc9a1f45954cc2cca98868bb3", "score": "0.43010223", "text": "func loadAndTrainData(symbol, companyName string, r *csv.Reader,\n\tcomputeLengths []int) error {\n\n\tvals, err := r.ReadAll()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"error reading csv\")\n\t}\n\n\tif vals == nil {\n\t\treturn errors.New(fmt.Sprintf(\"empty or invalid CSV for '%v'\", symbol))\n\t}\n\n\t// Only allow if there are enough periods for train and compute\n\tif len(vals) <= 2 {\n\t\treturn errors.New(fmt.Sprintf(\"[%v] not enough periods\", symbol))\n\t}\n\n\tvar periods model.PeriodSlice\n\tfor i, v := range vals {\n\n\t\tvar parseErrors error\n\n\t\tif i == 0 {\n\t\t\t// TODO jpirkey build header to field map index here\n\t\t\tcontinue\n\t\t}\n\n\t\trow := CsvRow{}\n\t\tif row.Date, err = convertTime(v[csvDate]); err != nil {\n\t\t\tparseErrors = multierror.Append(parseErrors, errors.Wrapf(err, \"[%v] date field\", symbol))\n\t\t}\n\t\tif row.Open, err = convertFloat(v[csvOpen]); err != nil {\n\t\t\tparseErrors = multierror.Append(parseErrors, errors.Wrapf(err, \"[%v] open field\", symbol))\n\t\t}\n\t\tif row.High, err = convertFloat(v[csvHigh]); err != nil {\n\t\t\tparseErrors = multierror.Append(parseErrors, errors.Wrapf(err, \"[%v] high field\", symbol))\n\t\t}\n\t\tif row.Low, err = convertFloat(v[csvLow]); err != nil {\n\t\t\tparseErrors = multierror.Append(parseErrors, errors.Wrapf(err, \"[%v] low field\", symbol))\n\t\t}\n\t\tif row.Close, err = convertFloat(v[csvClose]); err != nil {\n\t\t\tparseErrors = multierror.Append(parseErrors, errors.Wrapf(err, \"[%v] close field\", symbol))\n\t\t}\n\t\tif row.Volume, err = convertInt(v[csvVolume]); err != nil {\n\t\t\tparseErrors = multierror.Append(parseErrors, errors.Wrapf(err, \"[%v] volume field\", symbol))\n\t\t}\n\n\t\tif parseErrors == nil {\n\t\t\tp := model.Period{Symbol: symbol, Date: row.Date, Open: row.Open, High: row.High,\n\t\t\t\tLow: row.Low, Close: row.Close, Volume: row.Volume}\n\t\t\tperiods = append(periods, &p)\n\t\t} else {\n\t\t\tlog.Warn(parseErrors)\n\t\t}\n\t}\n\n\tif len(periods) < 2 {\n\t\treturn errors.New(fmt.Sprintf(\"[%v] not enough parsed periods\", symbol))\n\t}\n\n\tsort.Sort(periods)\n\n\ttimer := metrics.GetOrRegisterTimer(\"training-timer\", loadRegistry)\n\ttimer.Time(func() { trainDaily(periods) })\n\n\tinsertCount, err := Repos.PeriodRepo.InsertMany(periods)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"[%v] inserting periods\", symbol)\n\t}\n\tif len(periods) != insertCount {\n\t\treturn fmt.Errorf(\"[%v] periods parsed count does not match inserted count\", symbol)\n\t}\n\n\tticker := model.Ticker{Symbol: symbol, Company: companyName}\n\terr = Repos.TickerRepo.InsertOne(&ticker)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"[%v] inserting ticker\", symbol)\n\t}\n\n\tif len(computeLengths) > 0 {\n\t\tfor _, computeLength := range computeLengths {\n\t\t\tif len(periods) < computeLength+1 {\n\t\t\t\tlog.Warnf(\"[%v] not enough periods to compute %v length series\",\n\t\t\t\t\tsymbol, computeLength)\n\t\t\t} else {\n\t\t\t\ttimer := metrics.GetOrRegisterTimer(\"compute-timer\", loadRegistry)\n\t\t\t\ttimer.Time(func() { computeSeries(computeLength, symbol, periods) })\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f2dec77024a7132bd61aa86c17fdf266", "score": "0.42913622", "text": "func parsePrimeListCSV(primeChan chan int) {\n\tdefer close(primeChan)\n\t//open file logic\n\topenFile, err := os.Open(\"list/list.prime\")\n\tcheckError(\"Failed to open prime list file. \", err)\n\tdefer openFile.Close()\n\n\treader := csv.NewReader(bufio.NewReader(openFile))\n\tfor {\n\t\tstringSlice, error := reader.Read()\n\t\tif error == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tfor i := 0; i < len(stringSlice); i++ {\n\t\t\tprime, _ := strconv.Atoi(stringSlice[i])\n\t\t\tprimeChan <- prime\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d2f0fa2bc340e199b60ccb9b681cdb81", "score": "0.42812535", "text": "func NewCSVSource(s string) *CSV {\n\tc := NewCSV()\n\tc.SetSource(s)\n\treturn c\n}", "title": "" }, { "docid": "a76c4a02433a9329c2091bc057d4f975", "score": "0.4259484", "text": "func parseChannelModeKindsCSV(kindstr string) (map[rune]int, error) {\n\tif len(kindstr) == 0 {\n\t\treturn nil, fmt.Errorf(fmtErrCsvParse, kindstr)\n\t}\n\n\tkindSplits := strings.Split(kindstr, \",\")\n\tif len(kindSplits) != 4 {\n\t\treturn nil, fmt.Errorf(fmtErrCsvParse, kindstr)\n\t}\n\n\treturn parseChannelModeKinds(\n\t\t\tkindSplits[0], kindSplits[1], kindSplits[2], kindSplits[3]),\n\t\tnil\n}", "title": "" }, { "docid": "aebfbb896104c59209298295e3c919b2", "score": "0.4257372", "text": "func parseChannelModeKindsCSV(kindstr string) (map[rune]int, error) {\n\tif len(kindstr) == 0 {\n\t\treturn nil, fmt.Errorf(fmtErrCsvParse, kindstr)\n\t}\n\n\tkindSplits := strings.Split(kindstr, \",\")\n\tif len(kindSplits) != 4 {\n\t\treturn nil, fmt.Errorf(fmtErrCsvParse, kindstr)\n\t}\n\n\treturn parseChannelModeKinds(\n\t\tkindSplits[0], kindSplits[1], kindSplits[2], kindSplits[3]), nil\n}", "title": "" }, { "docid": "f9c4f1f897418579041bb545706028be", "score": "0.42426908", "text": "func readCSVFileIntoTbl(f string) (tbl [][]string) {\n\tcsvFile, err := os.Open(f)\n\tif err != nil {\n\t\tpanic(\"ReadFileIntoTbl \" + f + \" fail\\n\" + err.Error())\n\t}\n\tdefer csvFile.Close()\n\n\tcsvReader := csv.NewReader(csvFile)\n\tfor {\n\t\trow, err := csvReader.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t} else if err != nil {\n\t\t\tpanic(\"ReadFileIntoTbl \" + f + \" fail\\n\" + err.Error())\n\t\t}\n\t\ttbl = append(tbl, row)\n\t}\n\treturn tbl\n}", "title": "" }, { "docid": "aefacc4fe94d8f75f7e2890a0e542fcb", "score": "0.42350507", "text": "func parseRow(row string, rowIndex int) (dr datarow) {\n\tcols := strings.Split(row, \",\")\n\tif len(cols) == 0 { // blank lines ignored\n\t\treturn nil\n\t}\n\tdr = make(datarow, columnsPerRow)\n\t// last column is the thing the previous column features predict\n\tfor i := 0; i < lastColumnIndex; i++ {\n\t\tnc, err := strconv.ParseFloat(cols[i], 32)\n\t\tif err != nil {\n\t\t\tfmt.Println(\"row=\", rowIndex, \"col=\", i)\n\t\t\tpanic(err)\n\t\t}\n\t\tdr[i] = float32(nc)\n\t}\n\tprediction := cols[lastColumnIndex]\n\tif _, existsYet := variables[prediction]; !existsYet {\n\t\tindexedVariables = append(indexedVariables, prediction)\n\t\tnewIndex := len(indexedVariables) - 1\n\t\tvariables[prediction] = float32(newIndex)\n\t}\n\tdr[lastColumnIndex] = variables[prediction]\n\n\treturn dr\n}", "title": "" }, { "docid": "a900910caa83f050d197ee1053b191c3", "score": "0.4235007", "text": "func readCSVFromString(contents string, removeHeader bool) ([][]string, error) {\n\tlines, err := csv.NewReader(strings.NewReader(contents)).ReadAll()\n\n\tif err != nil || len(lines) == 0 {\n\t\treturn [][]string{}, err\n\t}\n\n\tif removeHeader {\n\t\tlines = lines[1:]\n\t}\n\n\treturn lines, nil\n}", "title": "" }, { "docid": "823556b7fd9aae0211c06dec811a992b", "score": "0.4224646", "text": "func WriteCsv(columns map[string][]float64, start time.Time, end time.Time, resolution int) {\n\t_, filename, _, ok := runtime.Caller(0)\n\tif !ok {\n\t\tlog.Println(\"Could not find runtime caller\")\n\t\treturn\n\t}\n\tcsvFn := path.Join(path.Dir(filename), \"csv/telemetry.csv\")\n\tfile, err := os.Create(csvFn)\n\tif err != nil {\n\t\tlog.Println(\"Could not create api/csv/telemetry.csv\")\n\t\treturn\n\t}\n\tdefer file.Close()\n\n\twriter := csv.NewWriter(file)\n\tdefer writer.Flush()\n\n\trowContents := make([]string, len(columns)+1)\n\tcolumnIndices := make(map[string]int, len(columns))\n\trowContents[0] = \"time\"\n\tcol := 1\n\tfor metric := range columns {\n\t\trowContents[col] = metric\n\t\tcolumnIndices[metric] = col\n\t\tcol++\n\t}\n\twriter.Write(rowContents)\n\n\tresolutionDur := time.Duration(resolution) * time.Millisecond\n\trow := 0\n\tfor rowTime := start; rowTime.Before(end); rowTime = rowTime.Add(resolutionDur) {\n\t\trowContents[0] = fmt.Sprintf(\"%d\", rowTime.UnixNano()/1e6)\n\t\tfor metric, column := range columns {\n\t\t\trowContents[columnIndices[metric]] = fmt.Sprintf(\"%v\", column[row])\n\t\t}\n\t\twriter.Write(rowContents)\n\t\trow++\n\t}\n}", "title": "" }, { "docid": "1addbe62b7868b165c75d8278c7907fa", "score": "0.42142546", "text": "func ProcessCSVFieldsWith(csv_file string, processor func([]string) error) error {\n\tin_fp, err := os.Open(csv_file)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to open file %s: %s.\\n\", csv_file, err)\n\t}\n\tdefer in_fp.Close()\n\n\tcsv_reader := csv.NewReader(in_fp)\n\tfor {\n\t\tfields, err := csv_reader.Read()\n\t\tif err == nil {\n\t\t\terr = processor(fields)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else if err == io.EOF {\n\t\t\tbreak\n\t\t} else {\n\t\t\tlog.Printf(\"Failed to process record: %s.\\n\", err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "98a2070b74981f655b009694d6a2e570", "score": "0.4208609", "text": "func readTrack(r *csv.Reader) (trk *telloTrackT) {\n\ttrk = newTrack()\n\tfor {\n\t\tline, err := r.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t} else if err != nil {\n\t\t\tmessageDialog(win, gtk.MESSAGE_INFO, \"Could not read CSV track file.\")\n\t\t\treturn\n\t\t}\n\t\ttmpTrackPos, err := toStruct(line)\n\t\tif err != nil {\n\t\t\tmessageDialog(win, gtk.MESSAGE_INFO, \"Could not parse track CSV track file.\")\n\t\t\treturn\n\t\t}\n\t\ttrk.positions = append(trk.positions, tmpTrackPos)\n\n\t\tif tmpTrackPos.mvoX < trk.minX {\n\t\t\ttrk.minX = tmpTrackPos.mvoX\n\t\t}\n\t\tif tmpTrackPos.mvoX > trk.maxX {\n\t\t\ttrk.maxX = tmpTrackPos.mvoX\n\t\t}\n\n\t\tif tmpTrackPos.mvoY < trk.minY {\n\t\t\ttrk.minY = tmpTrackPos.mvoY\n\t\t}\n\t\tif tmpTrackPos.mvoY > trk.maxY {\n\t\t\ttrk.maxY = tmpTrackPos.mvoY\n\t\t}\n\n\t\tif tmpTrackPos.heightDm < trk.minHeightDm {\n\t\t\ttrk.minHeightDm = tmpTrackPos.heightDm\n\t\t}\n\t\tif tmpTrackPos.heightDm > trk.maxHeightDm {\n\t\t\ttrk.maxHeightDm = tmpTrackPos.heightDm\n\t\t}\n\t}\n\t// log.Printf(\"Imported %d track positions\", len(trk.positions))\n\t// log.Printf(\"Min X: %f, Max X:, %f\", trk.minX, trk.maxX)\n\t// log.Printf(\"Min Y: %f, Max Y:, %f\", trk.minY, trk.maxY)\n\t// log.Printf(\"Derived scale is %f\", trk.deriveScale())\n\treturn trk\n}", "title": "" }, { "docid": "0e666e00079782a636e9ae7ca80e8e8a", "score": "0.4184026", "text": "func csvimport(w http.ResponseWriter, r *http.Request) *appError {\n\tc := appengine.NewContext(r)\n\tc.Debugf(\"method: \", r.Method)\n\n\tif r.Method != \"POST\" {\n\t\treturn &appError{\n\t\t\terrors.New(\"Unsupported method call to import\"),\n\t\t\t\"Imports most be POSTed\",\n\t\t\thttp.StatusMethodNotAllowed,\n\t\t}\n\t}\n\n\t//this block for check the user's credentials should eventually be broken out into a filter\n\tu := user.Current(c)\n\tif u == nil {\n\t\turl, err := user.LoginURL(c, r.URL.String())\n\t\tif err != nil {\n\t\t\treturn &appError{err, \"Could not determine LoginURL\", http.StatusInternalServerError}\n\t\t}\n\t\tw.Header().Set(\"Location\", url)\n\t\tw.WriteHeader(http.StatusFound)\n\t\treturn nil\n\t}\n\n\t//some crappy security so that only a certain person can upload things\n\t//we should probably have a users entity in datastore that we manage manually for this kinda thing\n\tif u.Email != \"ramjacvp@gmail.com\" {\n\t\treturn &appError{\n\t\t\terrors.New(\"Illegal import attempted by \" + u.Email),\n\t\t\t\"Your user is not allowed to import\",\n\t\t\thttp.StatusForbidden,\n\t\t}\n\t}\n\n\t//r.ParseMultipartForm(1 << 10)\n\n\tfile, handler, err := r.FormFile(\"uploadfile\")\n\tif err != nil {\n\t\treturn &appError{err, \"Error uploading file\", http.StatusInternalServerError}\n\t}\n\tdefer file.Close()\n\n\tlog.Println(handler.Filename)\n\n\tcr := csv.NewReader(file)\n\tvar res []*resource\n\tvar keys []*datastore.Key\n\n\t//at the moment we always insert a new item, this should be an insert or update based on OrganizationName\n\t//if we get a large enough data set we'll need to implement two loops so that we only batch a certain number of records at a time\n\tfor {\n\t\trec, err := cr.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn &appError{err, \"Error reading file\", http.StatusInternalServerError}\n\t\t}\n\n\t\t//we may want IDs in there eventually\n\t\t//_, err = strconv.ParseInt(rec[0], 2, 64)\n\t\ttmp := &resource{\n\t\t\tCategory: rec[1],\n\t\t\tOrganizationName: rec[2],\n\t\t\tAddress: rec[3],\n\t\t\tZipCode: rec[4],\n\t\t\tDays: rec[5],\n\t\t\tTimeOpen: rec[6],\n\t\t\tTimeClose: rec[7],\n\t\t\tPeopleServed: rec[8],\n\t\t\tDescription: rec[9],\n\t\t\tPhoneNumber: rec[10],\n\t\t\tLastUpdatedBy: u.Email,\n\t\t\tLastUpdatedTime: time.Now().UTC(),\n\t\t\tIsActive: true,\n\t\t\tLocation: appengine.GeoPoint{},\n\t\t}\n\n\t\tlog.Printf(\"len slice check: %x, len rec LatLng check: %x, check for comma: %x\", len(rec) > 11, len(rec[11]) > 0, strings.Index(rec[11], \",\") != -1)\n\n\t\tif len(rec) > 11 && len(rec[11]) > 0 && strings.Index(rec[11], \",\") != -1 {\n\t\t\ttmp.Location.Lng, _ = strconv.ParseFloat(strings.Split(rec[11], \",\")[0], 64)\n\t\t\ttmp.Location.Lat, _ = strconv.ParseFloat(strings.Split(rec[11], \",\")[1], 64)\n\t\t\tlog.Println(tmp.Location)\n\t\t}\n\n\t\tres = append(res, tmp)\n\n\t\tkeys = append(keys, datastore.NewIncompleteKey(c, \"Resource\", nil))\n\t}\n\n\t_, err = datastore.PutMulti(c, keys, res)\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn &appError{err, \"Error updating database\", http.StatusInternalServerError}\n\t}\n\n\t// clear the cache\n\tmemcache.Flush(c)\n\n\thttp.Redirect(w, r, \"/index.html\", http.StatusFound)\n\treturn nil\n}", "title": "" }, { "docid": "0d1d7b2dcd2b68cedced3621bd3c497a", "score": "0.41839612", "text": "func parseTileLine(layer *Layer, s string) (done bool, err error) {\n\tif nums := strings.Split(s, \",\"); len(nums) > 0 {\n\t\tfor _, s := range nums {\n\t\t\tif len(s) > 0 {\n\t\t\t\tif m, e := strconv.ParseInt(s, 10, 32); e != nil {\n\t\t\t\t\terr = e\n\t\t\t\t\tbreak\n\t\t\t\t} else {\n\t\t\t\t\tlayer.Data = append(layer.Data, uint32(m))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif err == nil {\n\t\t\tif last := s[len(s)-1] != ','; last {\n\t\t\t\tdone = true\n\t\t\t}\n\t\t}\n\t}\n\treturn done, err\n}", "title": "" }, { "docid": "03cb9f77dc04e90e51ddcaad2cba34fa", "score": "0.4172954", "text": "func EscapeCSVLine(input []string) []string {\n\tfor i := range input {\n\t\tinput[i] = strings.TrimLeft(input[i], \"\\t\\r\")\n\t\tif len(input[i]) == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tswitch []rune(input[i])[0] {\n\t\tcase '=', '+', '-', '@':\n\t\t\tinput[i] = fmt.Sprintf(\"'%s\", input[i])\n\t\t}\n\t}\n\treturn input\n}", "title": "" }, { "docid": "8e46cc2852106262bb29de2359c10b97", "score": "0.41638553", "text": "func InsertSettings(fileName string) ModelSettings {\n\n\tvar setting ModelSettings\n\tr := LoadCSVFile(fileName)\n\n\ti := 0\n\tvar header []string\n\n\tfor {\n\t\trecords, err := r.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tif i == 0 {\n\t\t\tfor j := 0; j < len(records); j++ {\n\t\t\t\theader = append(header, records[j])\n\t\t\t}\n\t\t} else {\n\t\t\tfor j := 0; j < len(records); j++ {\n\t\t\t\tv := reflect.ValueOf(&setting)\n\t\t\t\tf := v.Elem().FieldByName(header[j])\n\t\t\t\tif f.IsValid() && f.CanSet() {\n\t\t\t\t\tif f.Kind() == reflect.String {\n\t\t\t\t\t\tf.SetString(records[j])\n\t\t\t\t\t} else if f.Kind() == reflect.Int {\n\t\t\t\t\t\tq, _ := strconv.Atoi(records[j])\n\t\t\t\t\t\tf.SetInt(int64(q))\n\t\t\t\t\t} else if f.Kind() == reflect.Float64 {\n\t\t\t\t\t\tq, _ := strconv.ParseFloat(records[j], 64)\n\t\t\t\t\t\tf.SetFloat(q)\n\t\t\t\t\t} else if f.Kind() == reflect.Bool {\n\t\t\t\t\t\tq, _ := strconv.ParseBool(records[j])\n\t\t\t\t\t\tf.SetBool(q)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tlog.Fatalln(\"Was not any of the four types\")\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tlog.Fatalln(\"This key is not valid while inserting settings: \", header[j])\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\ti++\n\t}\n\treturn setting\n\n}", "title": "" }, { "docid": "8b7f1a0543be044576f8d446f148c1b3", "score": "0.41599238", "text": "func Split(s string) (dateStamp time.Time, events []string, err error) {\n\tif len(s) == 0 {\n\t\terr = fmt.Errorf(\"unable to parse empty event\")\n\t\treturn dateStamp, events, err\n\t}\n\tdateEvent := strings.SplitN(s, \" \", 2)\n\tdateTime := dateEvent[0]\n\n\tdateStamp, err = parseDate(dateTime)\n\tif err != nil {\n\t\treturn dateStamp, events, err\n\t}\n\n\tr := csv.NewReader(strings.NewReader(dateEvent[1]))\n\tr.LazyQuotes = true\n\tevents, err = r.Read()\n\n\treturn dateStamp, events, err\n}", "title": "" }, { "docid": "5664196af18296a88aa71e5cdf0684c4", "score": "0.41573292", "text": "func CSVFirstRowEquals(csvString string, testVals map[string]interface{}) error {\n\tm, err := CSVUnmarshal(csvString)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\theader := m[0]\n\tfirstRow := map[string]string{}\n\t//turn first row into a map\n\tfor k, v := range m[1] {\n\t\tfirstRow[header[k]] = v\n\t}\n\n\tfor k, v := range testVals {\n\t\tif fmt.Sprintf(\"%+v\", firstRow[k]) != fmt.Sprintf(\"%+v\", v) {\n\t\t\treturn fmt.Errorf(\"values for key %s do not match: expected '%+v' provided '%+v'\", k, v, firstRow[k])\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "97ad4a070ab87fa1d89d51fd6eac9a81", "score": "0.41529587", "text": "func generateCSVParseFunc(headers []string, fieldDelimiter rune, lazyQuotes bool) parseFunc {\n\treturn func(value interface{}) (interface{}, error) {\n\t\tcsvLine, err := valueAsString(value)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treader := csvparser.NewReader(strings.NewReader(csvLine))\n\t\treader.Comma = fieldDelimiter\n\t\treader.FieldsPerRecord = len(headers)\n\t\treader.LazyQuotes = lazyQuotes\n\n\t\t// Typically only need one\n\t\tlines := make([][]string, 0, 1)\n\t\tfor {\n\t\t\tline, err := reader.Read()\n\t\t\tif errors.Is(err, io.EOF) {\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tif err != nil && len(line) == 0 {\n\t\t\t\treturn nil, errors.New(\"failed to parse entry\")\n\t\t\t}\n\n\t\t\tlines = append(lines, line)\n\t\t}\n\n\t\t/*\n\t\t\tThis parser is parsing a single value, which came from a single log entry.\n\t\t\tTherefore, if there are multiple lines here, it should be assumed that each\n\t\t\tsubsequent line contains a continuation of the last field in the previous line.\n\n\t\t\tGiven a file w/ headers \"A,B,C,D,E\" and contents \"aa,b\\nb,cc,d\\nd,ee\",\n\t\t\texpect reader.Read() to return bodies:\n\t\t\t- [\"aa\",\"b\"]\n\t\t\t- [\"b\",\"cc\",\"d\"]\n\t\t\t- [\"d\",\"ee\"]\n\t\t*/\n\n\t\tjoinedLine := lines[0]\n\t\tfor i := 1; i < len(lines); i++ {\n\t\t\tnextLine := lines[i]\n\n\t\t\t// The first element of the next line is a continuation of the previous line's last element\n\t\t\tjoinedLine[len(joinedLine)-1] += \"\\n\" + nextLine[0]\n\n\t\t\t// The remainder are separate elements\n\t\t\tfor n := 1; n < len(nextLine); n++ {\n\t\t\t\tjoinedLine = append(joinedLine, nextLine[n])\n\t\t\t}\n\t\t}\n\n\t\treturn headersMap(headers, joinedLine)\n\t}\n}", "title": "" }, { "docid": "8bcf0c7eda965a9805172b63fb16dee2", "score": "0.41518176", "text": "func CSV(filename string, sep rune) []map[string]string {\n\tfile, err := fs.Instance.Open(filename)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\treader := csv.NewReader(file)\n\treader.Comma = sep\n\treader.LazyQuotes = true\n\n\t// Create header.\n\theader, err := reader.Read()\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\t// Read information.\n\tdata := make([]map[string]string, 0)\n\tfor {\n\t\tline, err := reader.Read()\n\t\tif err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tlog.Fatalln(err)\n\t\t}\n\n\t\tparsedLine := make(map[string]string, len(header))\n\t\tfor i, field := range header {\n\t\t\tparsedLine[field] = line[i]\n\t\t}\n\n\t\tdata = append(data, parsedLine)\n\t}\n\n\treturn data\n}", "title": "" }, { "docid": "557d3f037d364859d90267d3a65133f5", "score": "0.41513616", "text": "func (lgResu *LgResuStatus) CsvRecord(t time.Time) (csvRecord string) {\n\n\treturn t.Format(\"2006/01/02 15:04:05\") + \",\" +\n\t\tstrconv.Itoa(int(lgResu.Soc)) + \",\" +\n\t\tstrconv.FormatFloat(float64(lgResu.Voltage), 'f', 2, 32) + \",\" +\n\t\tstrconv.FormatFloat(float64(lgResu.Current), 'f', 2, 32) + \"\\n\"\n}", "title": "" }, { "docid": "c403b1f0523c645a39fa4c0ff133ca50", "score": "0.41395712", "text": "func ParseFromCSV(reader *csv.Reader) ([]Descriptor, error) {\n\tvar (\n\t\terr error\n\t\tdescriptorList []Descriptor\n\t\trecord []string\n\t\temailDoubleChecker map[string]bool\n\t)\n\n\temailDoubleChecker = map[string]bool{}\n\n\ti := 0\n\tadded := 0\n\tfor {\n\t\ti++\n\n\t\trecord, err = reader.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn descriptorList, fmt.Errorf(\"Error on line %d %s\", i, err.Error())\n\t\t}\n\n\t\tif len(record) < 3 {\n\t\t\treturn descriptorList, fmt.Errorf(\"Invalid record on line %d\", i)\n\t\t}\n\n\t\temail := strings.TrimSpace(record[1])\n\t\tif !govalidator.IsEmail(email) {\n\t\t\tlogger.Warn(fmt.Sprintf(\"Email '%s' is not an email on line %d\", email, i))\n\t\t\tcontinue\n\t\t}\n\n\t\tif emailDoubleChecker[email] {\n\t\t\tcontinue\n\t\t}\n\t\temailDoubleChecker[email] = true\n\n\t\tcompanyName := strings.TrimSpace(record[0])\n\t\tdomainName := strings.TrimSpace(record[2])\n\n\t\tdescriptorList = append(descriptorList, NewDescriptor(companyName, domainName, email))\n\t\tadded++\n\t}\n\n\tlogger.Debug(fmt.Sprintf(\"Parsed %d records out of %d\", added, i))\n\treturn descriptorList, nil\n}", "title": "" }, { "docid": "9cbc42d8a6daeb19ff479869f0d826e6", "score": "0.41390792", "text": "func parseCsv(input string) []string {\n\ttokens := strings.Split(input, \",\")\n\tresults := make([]string, 0, len(tokens))\n\tfor _, token := range tokens {\n\t\tresults = append(results, strings.TrimSpace(token))\n\t}\n\treturn results\n}", "title": "" }, { "docid": "c45c1d278d88a347b6c0e022733e614d", "score": "0.4129723", "text": "func ValidateCSVMapStr(csvStr string, m mapStrStruct) bool {\n\tif csvStr == \"\" {\n\t\t// It's ok if the value is missing\n\t\treturn true\n\t}\n\tfor _, v := range strings.Split(csvStr, \",\") {\n\t\t_, present := m[strings.ToUpper(v)]\n\t\tif !present {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "de5d9e00dfebd188f1894887c48bb3b9", "score": "0.41241297", "text": "func (client *Client) BulkImport(tableName string, infos []handlers.AnalysisInfo, columns ...string) error {\n\tlog.Println(\"-- Begin Bulk Import --\")\n\tdb := client.pgConn\n\ttxn, err := db.Begin()\n\tif err != nil {\n\t\treturn err\n\t}\n\tnotNullColumns := []string{\"created_at\", \"updated_at\"}\n\tcolumns = append(notNullColumns, columns...)\n\tstmt, err := txn.Prepare(pq.CopyIn(tableName, columns...))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, info := range infos {\n\t\ttimestamp := parseTimestamp(info.Timestamp)\n\t\t// target_hash, created_at_unixtimestamp,\n\t\tjsonDurations, _ := json.Marshal(info.Durations)\n\t\t_, err := stmt.Exec(time.Now(), time.Now(), info.TargetHash, timestamp, jsonDurations)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\t_, err = stmt.Exec()\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = stmt.Close()\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = txn.Commit()\n\tif err != nil {\n\t\treturn err\n\t}\n\tlog.Println(\"-- End Bulk Import --\")\n\treturn nil\n}", "title": "" }, { "docid": "4c83c1526c7334f289d448bdbd0547bb", "score": "0.41203913", "text": "func (m *mapperAndPusher) MapAndPush(line string) error {\n\n\tfields := strings.Split(line, \"\\t\")\n\n\t//translate idfield into Pilosa column sequential number using levelDB translator\n\tcol, err := m.translator.GetColID(fields[logFields[\"idfield\"]])\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"getting column id from subject\")\n\t}\n\n\t//parse ts field in logs that would be used to for pilosa rows\n\tts, err := time.Parse(\"2006-01-02 15:04:05\", fields[logFields[\"ts\"]])\n\tif err != nil {\n\t\tlog.Println(errors.Wrapf(err, \"could not convert time for id %s and time %s\", fields[logFields[\"idfield\"]],\n\t\t\tfields[logFields[\"ts\"]]))\n\t}\n\trowID, err := m.translator.GetRowID(\"ofield\", fields[logFields[\"ofield\"]])\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"translating ofield\")\n\t}\n\tm.index.AddColumnNumeric(\"ofield\", col, rowID, ts.UnixNano())\n\n\trowID, err = m.translator.GetRowID(\"cfield\", fields[logFields[\"cfield\"]])\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"translating cfield\")\n\t}\n\tm.index.AddColumnNumeric(\"cfield\", col, rowID, ts.UnixNano())\n\n\tstr := fields[logFields[\"sfield_list\"]]\n\tif str == \"\" { //don't process empty list\n\t\treturn nil\n\t}\n\tsfields := strings.Split(str, \",\")\n\tfor _, v := range sfields {\n\t\trowID, err = m.translator.GetRowID(\"sfield\", v)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"translating sfield\")\n\t\t}\n\t\tm.index.AddColumnNumeric(\"sfield\", col, rowID, ts.UnixNano())\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "aca0573117c2d433c26855fcfcef0973", "score": "0.412017", "text": "func CSVtoInt64Slice(csv string) ([]int64, error) {\n\tcsv = strings.TrimSpace(csv)\n\tif len(csv) == 0 {\n\t\treturn []int64(nil), nil\n\t}\n\n\titems := strings.Split(csv, \",\")\n\tints := make([]int64, len(items))\n\tfor i, item := range items {\n\t\tval, err := strconv.Atoi(strings.TrimSpace(item))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tints[i] = int64(val)\n\t}\n\n\treturn ints, nil\n}", "title": "" }, { "docid": "aca0573117c2d433c26855fcfcef0973", "score": "0.412017", "text": "func CSVtoInt64Slice(csv string) ([]int64, error) {\n\tcsv = strings.TrimSpace(csv)\n\tif len(csv) == 0 {\n\t\treturn []int64(nil), nil\n\t}\n\n\titems := strings.Split(csv, \",\")\n\tints := make([]int64, len(items))\n\tfor i, item := range items {\n\t\tval, err := strconv.Atoi(strings.TrimSpace(item))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tints[i] = int64(val)\n\t}\n\n\treturn ints, nil\n}", "title": "" }, { "docid": "f7a8f769716354dd4fd326a8efb67af7", "score": "0.41186637", "text": "func parseCsv(file string) ([][]string, error) {\n\tf, err := os.Open(file)\n\tdefer f.Close()\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlines, err := csv.NewReader(f).ReadAll()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn lines, nil\n}", "title": "" }, { "docid": "1e6051e4ae744c01ba1835124d893b41", "score": "0.41177353", "text": "func (s *BasePlSqlParserListener) EnterStart_time_column(ctx *Start_time_columnContext) {}", "title": "" }, { "docid": "4fff6a98e6772137fd3d8f32d107b321", "score": "0.41089192", "text": "func populateStationsList(stationsCSV io.Reader) (map[string]robots.Point, error) {\n\n\tstations := make(map[string]robots.Point)\n\treader := csv.NewReader(stationsCSV)\n\treader.FieldsPerRecord = 3\n\n\tfor {\n\t\tline, err := reader.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Unable to process line in tube.csv: %v\", err)\n\t\t\treturn nil, err\n\t\t}\n\n\t\tlat, err := strconv.ParseFloat(line[1], 64)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Unable to parse lat from tube.csv: %v\", err)\n\t\t\treturn nil, err\n\t\t}\n\t\tlon, err := strconv.ParseFloat(line[2], 64)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Unable to parse lon from tube.csv: %v\", err)\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfmt.Printf(\"Loaded station: %v \\t\\t Lat/Lon: %v, %v\\n\", line[0], lat, lon)\n\t\tstations[line[0]] = robots.Point{\n\t\t\tLat: lat,\n\t\t\tLon: lon,\n\t\t}\n\t}\n\n\treturn stations, nil\n}", "title": "" }, { "docid": "03d836f5aac798dc0d04c2c5d1fc8375", "score": "0.4106548", "text": "func readCSV(r io.Reader) Roadmap {\n\tvar (\n\t\tcats []Category\n\t\tc Category\n\t\tit Item\n\t\titems []Item\n\t\trm Roadmap\n\t)\n\n\tnc := -1\n\tnr := 0\n\tinput := csv.NewReader(r)\n\tfor {\n\t\tfields, csverr := input.Read()\n\t\tif csverr == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif csverr != nil {\n\t\t\tfmt.Fprintf(os.Stderr, \"%v %v\\n\", csverr, fields)\n\t\t\tcontinue\n\t\t}\n\t\tnr++\n\t\tif nr == 1 {\n\t\t\tcontinue\n\t\t}\n\t\tif len(fields) < 5 {\n\t\t\tcontinue\n\t\t}\n\t\tif len(fields[0]) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tif len(fields[0]) > 0 && len(fields[1]) == 0 && len(fields[2]) == 0 {\n\t\t\tnc++\n\t\t\tc.Name = fields[0]\n\t\t\tc.Vspace = \"45\"\n\t\t\tc.Itemheight = 40\n\t\t\tcats = append(cats, c)\n\t\t\titems = []Item{}\n\t\t\tcontinue\n\t\t}\n\t\tit.Text = fields[0]\n\t\tit.Begin = fields[1]\n\t\tit.Duration = fields[2]\n\t\titems = append(items, it)\n\t\tcats[nc].Item = items\n\t}\n\trp := strings.Split(*csvparam, \",\")\n\tif len(rp) == 3 {\n\t\trm.Title = rp[0]\n\t\trm.Begin, _ = strconv.ParseFloat(rp[1], 64)\n\t\trm.End, _ = strconv.ParseFloat(rp[2], 64)\n\t}\n\trm.Scale = 12\n\trm.Catpercent = 15\n\trm.Vspace = 45\n\trm.Itemheight = 40\n\trm.Shape = \"r\"\n\trm.Fontname = \"Calibri,sans-serif\"\n\trm.Category = cats\n\tdumprm(rm, os.Stderr)\n\treturn rm\n}", "title": "" }, { "docid": "f394418f9fc4959b8b4f022d2e45f0fd", "score": "0.4100895", "text": "func (t *TimeSeries) Read(db string) (err error) {\n\tcsvf, err := os.Open(db)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tcloseErr := csvf.Close()\n\t\tif err == nil {\n\t\t\terr = closeErr\n\t\t}\n\t}()\n\n\treader := csv.NewReader(bufio.NewReader(csvf))\n\treader.FieldsPerRecord = 2\n\tfor {\n\t\tvalues, err := reader.Read()\n\t\tif err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\treturn err\n\t\t}\n\n\t\ttimestamp, err := time.Parse(time.RFC3339, values[0])\n\t\tif err != nil {\n\t\t\ttimestamp, err = time.Parse(dateformat, values[0])\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\tdatum, err := strconv.ParseFloat(values[1], 64)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tt.records = append(t.records, &Record{\n\t\t\ttimestamp: timestamp,\n\t\t\tDatum: datum,\n\t\t})\n\t}\n\n\tt.sort()\n\treturn nil\n}", "title": "" }, { "docid": "078ea56cb483bf756a602b7b5eb9f5fa", "score": "0.41007003", "text": "func (m *CSVManager) Load(pathAndFilename string) error {\n\te := m.List.Update(pathAndFilename)\n\treturn e\n}", "title": "" }, { "docid": "176a59e56b6a683814440dea53da5091", "score": "0.40953565", "text": "func (r *CsvHandler) ImportFromCsv(c *gin.Context) {\n\tlogger := r.logger.New(\"action\", \"UpdateFromCsv\")\n\tuser := r.contextService.MustGetCurrentUser(c)\n\n\tfile, _, err := c.Request.FormFile(\"file\")\n\n\tif nil != err {\n\t\tlogger.Error(\"can't get file\", \"err\", err)\n\t\terrcodes.AddError(c, errcodes.CodeFileInvalid)\n\t\treturn\n\t}\n\n\tdefer file.Close()\n\n\tbuf := bytes.NewBuffer(nil)\n\tif _, err := io.Copy(buf, file); err != nil {\n\t\tprivateError := errors.PrivateError{Message: \"can't write file to buffer\"}\n\t\tprivateError.AddLogPair(\"error\", err)\n\t\terrors.AddErrors(c, &privateError)\n\t\treturn\n\t}\n\n\ttErrs, failed, success := r.csvService.ImportFromCsv(buf, user)\n\tdata := struct {\n\t\tSuccess uint64 `json:\"success\"`\n\t\tFailed uint64 `json:\"failed\"`\n\t}{\n\t\tSuccess: success,\n\t\tFailed: failed,\n\t}\n\n\tif len(tErrs) > 0 {\n\t\tc.Set(\"data\", data)\n\t\terrors.AddErrors(c, tErrs...)\n\t\treturn\n\t}\n\n\tres := response.NewResponse().AddMessage(\"Requests are successfully imported\")\n\tres.Data = data\n\tc.JSON(http.StatusOK, res)\n}", "title": "" }, { "docid": "44ea4fcf7a614fa62251c8480393db77", "score": "0.40936136", "text": "func processCSV(r io.Reader) ([]*Entry, error) {\n\treader := csv.NewReader(r)\n\trecords, err := reader.ReadAll()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tci := &ColumnIndexes{FirstName: -1, LastName: -1, Username: -1, Addr1: -1, Addr2: -1, Code: -1, City: -1, State: -1, CountryISO: -1, Email: -1}\n\n\tcolHeaders := records[0]\n\tfor i, colHeader := range colHeaders {\n\t\t// making comparison more permissive\n\t\tc := strings.ToLower(colHeader)\n\t\tc = strings.Replace(c, \" \", \"\", -1) // remove all spaces\n\n\t\tif c == \"prénom\" || c == \"firstname\" {\n\t\t\tci.FirstName = i\n\t\t} else if c == \"nom\" || c == \"name\" || c == \"lastname\" || c == \"shippingname\" {\n\t\t\tci.LastName = i\n\t\t} else if c == \"adresse\" || c == \"addr1\" || c == \"address1\" || c == \"address\" || c == \"shippingaddress1\" {\n\t\t\tci.Addr1 = i\n\t\t} else if c == \"complémentd'adresse\" || c == \"addr2\" || c == \"address2\" || c == \"shippingaddress2\" {\n\t\t\tci.Addr2 = i\n\t\t} else if c == \"codepostal\" || c == \"zipcode\" || c == \"postalcode\" || c == \"shippingzip\" {\n\t\t\tci.Code = i\n\t\t} else if c == \"city\" || c == \"ville\" || c == \"shippingcity\" {\n\t\t\tci.City = i\n\t\t} else if c == \"pays\" || c == \"country\" || c == \"countrycode\" || c == \"shippingcountry\" {\n\t\t\tci.CountryISO = i\n\t\t} else if c == \"state\" || c == \"shippingprovince\" {\n\t\t\tci.State = i\n\t\t} else if c == \"email\" || c == \"e-mail\" || strings.Contains(c, \"email\") {\n\t\t\tci.Email = i\n\t\t} else if c == \"username\" || c == \"nickname\" {\n\t\t\tci.Username = i\n\t\t}\n\t}\n\n\tentries := make([]*Entry, 0)\n\n\tfor i := 1; i < len(records); i++ {\n\t\trecord := records[i]\n\n\t\tentry := &Entry{}\n\n\t\tif ci.FirstName > -1 {\n\t\t\tentry.FirstName = record[ci.FirstName]\n\t\t}\n\n\t\tif ci.LastName > -1 {\n\t\t\tentry.LastName = record[ci.LastName]\n\t\t}\n\n\t\tif ci.Username > -1 {\n\t\t\tentry.Username = record[ci.Username]\n\t\t}\n\n\t\tif ci.Addr1 > -1 {\n\t\t\tentry.Addr1 = record[ci.Addr1]\n\t\t}\n\n\t\tif ci.Addr2 > -1 {\n\t\t\tentry.Addr2 = record[ci.Addr2]\n\t\t}\n\n\t\tif ci.Code > -1 {\n\t\t\tentry.Code = record[ci.Code]\n\t\t}\n\n\t\tif ci.City > -1 {\n\t\t\tentry.City = record[ci.City]\n\t\t}\n\n\t\tif ci.CountryISO > -1 {\n\t\t\tentry.CountryISO = record[ci.CountryISO]\n\t\t}\n\n\t\tif ci.State > -1 {\n\t\t\tentry.State = record[ci.State]\n\t\t}\n\n\t\tif ci.Email > -1 {\n\t\t\tentry.Email = record[ci.Email]\n\t\t}\n\n\t\tentries = append(entries, entry)\n\t}\n\n\treturn entries, nil\n}", "title": "" }, { "docid": "a53197fdbfa65f7e95943b4f7e23fd50", "score": "0.40844998", "text": "func LoadBuildingCSV(ctx context.Context, fname string) []error {\n\treturn LoadRentRollCSV(ctx, fname, CreateBuilding)\n}", "title": "" }, { "docid": "97dacf9be845beca7c05debfb26dc418", "score": "0.40812415", "text": "func NewCSV(fpath string, pid int64, diskDevice string, networkInterface string, extraPath string, tcfg *top.Config) (c *CSV, err error) {\n\tc = &CSV{\n\t\tFilePath: fpath,\n\t\tPID: pid,\n\t\tDiskDevice: diskDevice,\n\t\tNetworkInterface: networkInterface,\n\n\t\tHeader: ProcHeader,\n\t\tHeaderIndex: ProcHeaderIndex,\n\n\t\tMinUnixNanosecond: 0,\n\t\tMinUnixSecond: 0,\n\t\tMaxUnixNanosecond: 0,\n\t\tMaxUnixSecond: 0,\n\n\t\tExtraPath: extraPath,\n\t\tRows: []Proc{},\n\t}\n\tif tcfg != nil {\n\t\tc.TopStream, err = tcfg.StartStream()\n\t}\n\treturn\n}", "title": "" }, { "docid": "d03b539d9f504878867d124881e1a9d1", "score": "0.4078629", "text": "func parseCSV(csvFile multipart.File, filename string, column int) (data string, err error) {\n\tvar totalRows int = 0\n\tvar distributionMap = make(map[int]int, 9)\n\n\tr := csvd.NewReader(csvFile)\n\n\tfor {\n\t\trecord, err := r.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\t\t// Out of range error, i.e. that column is not in use.\n\t\tif len(record) <= column {\n\t\t\tbreak\n\t\t}\n\t\t// Skip over any empty records.\n\t\tif record[column] == \"\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tfirstDigit := retrieveFirstDigit(record[column])\n\t\tif firstDigit != 0 {\n\t\t\tdistributionMap[firstDigit]++\n\t\t\ttotalRows++\n\t\t}\n\t}\n\n\tsortedKeys := sortMap(distributionMap)\n\n\tpayload := &Payload{}\n\tpayload.Filename = filename\n\n\tfor _, digit := range sortedKeys {\n\t\tvar count int = distributionMap[digit]\n\t\tvar percent float64 = calculatePercent(count, totalRows)\n\n\t\tif digit != 0 {\n\t\t\tvalues := Digit{Value: digit, Count: count, Percent: percent}\n\t\t\tpayload.AddItem(values)\n\t\t}\n\t\tif digit == 1 {\n\t\t\tpayload.BenfordValidation = benfordValidator(percent)\n\t\t}\n\t}\n\n\toutput, err := json.Marshal(payload)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tdata = string(output)\n\treturn\n}", "title": "" }, { "docid": "3951bc2f19c8aadccd885c6ec8e11e67", "score": "0.40756163", "text": "func LoadDepositCSV(ctx context.Context, fname string) []error {\n\treturn LoadRentRollCSV(ctx, fname, CreateDepositsFromCSV)\n}", "title": "" }, { "docid": "0dcfc06ea9a306b96699adedc91be570", "score": "0.40714914", "text": "func splitCSV(csv string, sep rune) (fields []string) {\n\tfield, encl := \"\", false\n\tfor _, r := range csv {\n\t\tswitch {\n\t\tcase r > '\\x7e' || r != '\\x09' && r < '\\x20':\n\t\t\t// alternatively replace non-printables with a blank: field += \" \"\n\t\tcase r == '\"':\n\t\t\tencl = !encl\n\t\tcase !encl && r == sep:\n\t\t\tfields = append(fields, field)\n\t\t\tfield = \"\"\n\t\tdefault:\n\t\t\tfield += string(r)\n\t\t}\n\t}\n\treturn append(fields, field)\n}", "title": "" }, { "docid": "77c719bd3f5c77a6633e25a23b79f51f", "score": "0.40677634", "text": "func csvFields(s string) []string {\n\tfields := strings.Split(s, \",\")\n\tfor i, f := range fields {\n\t\tfields[i] = strings.TrimSpace(f)\n\t}\n\treturn fields\n}", "title": "" }, { "docid": "e60123f497bde1e00e269a00a0078090", "score": "0.40579975", "text": "func parseTime(s string) (hour, minute int64, err error) {\n\ttime := strings.Split(s, \":\")\n\thour, err = strconv.ParseInt(time[0], 10, 64)\n\tif err != nil {\n\t\treturn\n\t}\n\tminute, err = strconv.ParseInt(time[1], 10, 64)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "f6c587cd820b4576d036c9824e228f3f", "score": "0.4056236", "text": "func readCSV(csvFileName string) []Record {\n\tvar records []Record\n\n\tcsvFile, err := os.Open(csvFileName)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer csvFile.Close()\n\n\tr := csv.NewReader(bufio.NewReader(csvFile))\n\tr.Comma = ';'\n\tfor {\n\t\trecord, err := r.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\t// fmt.Printf(\"%T: %v\\n\", record, record)\n\t\tcount, err := strconv.Atoi(record[2])\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\trecords = append(records, Record{\n\t\t\tDate: record[0],\n\t\t\tTerm: record[1],\n\t\t\tCount: count,\n\t\t})\n\t}\n\n\treturn records\n}", "title": "" }, { "docid": "bfe983304bc475ea49b09f18938f9ad1", "score": "0.4052006", "text": "func NewCSVImporter() *CSVImporter {\n\treturn &CSVImporter{}\n}", "title": "" }, { "docid": "108a3ce10d5ad4a25b540e8d9f400fd8", "score": "0.4049409", "text": "func jmeterCsvGetHeader(line []string, head *JmeterCsvHeader) (err error) {\n\thead.TimeStamp = -1\n\thead.Elapsed = -1\n\thead.Label = -1\n\thead.ResponseCode = -1\n\thead.ResponseMessage = -1\n\thead.ThreadName = -1\n\thead.DataType = -1\n\thead.Success = -1\n\thead.FailureMessage = -1\n\thead.Bytes = -1\n\thead.SentBytes = -1\n\thead.GrpThreads = -1\n\thead.AllThreads = -1\n\thead.URL = -1\n\thead.Latency = -1\n\thead.IdleTime = -1\n\thead.Connect = -1\n\thead.Length = 17\n\n\tfor i := range line {\n\t\tswitch line[i] {\n\t\tcase \"timeStamp\":\n\t\t\thead.TimeStamp = int8(i)\n\t\tcase \"elapsed\":\n\t\t\thead.Elapsed = int8(i)\n\t\tcase \"label\":\n\t\t\thead.Label = int8(i)\n\t\tcase \"responseCode\":\n\t\t\thead.ResponseCode = int8(i)\n\t\tcase \"responseMessage\":\n\t\t\thead.ResponseMessage = int8(i)\n\t\tcase \"threadName\":\n\t\t\thead.ThreadName = int8(i)\n\t\tcase \"dataType\":\n\t\t\thead.DataType = int8(i)\n\t\tcase \"success\":\n\t\t\thead.Success = int8(i)\n\t\tcase \"failureMessage\":\n\t\t\thead.FailureMessage = int8(i)\n\t\tcase \"bytes\":\n\t\t\thead.Bytes = int8(i)\n\t\tcase \"sentBytes\":\n\t\t\thead.SentBytes = int8(i)\n\t\tcase \"grpThreads\":\n\t\t\thead.GrpThreads = int8(i)\n\t\tcase \"allThreads\":\n\t\t\thead.AllThreads = int8(i)\n\t\tcase \"URL\":\n\t\t\thead.URL = int8(i)\n\t\tcase \"Latency\":\n\t\t\thead.Latency = int8(i)\n\t\tcase \"IdleTime\":\n\t\t\thead.IdleTime = int8(i)\n\t\tcase \"Connect\":\n\t\t\thead.Connect = int8(i)\n\t\tdefault:\n\t\t\terr = fmt.Errorf(\"unknown field: %s\", line[i])\n\t\t\treturn\n\t\t}\n\t}\n\tif head.TimeStamp == -1 {\n\t\terr = fmt.Errorf(\"missing field: timeStamp\")\n\t\treturn\n\t}\n\tif head.Elapsed == -1 {\n\t\terr = fmt.Errorf(\"missing field: elapsed\")\n\t\treturn\n\t}\n\tif head.Label == -1 {\n\t\terr = fmt.Errorf(\"missing field: label\")\n\t\treturn\n\t}\n\tif head.ResponseCode == -1 {\n\t\terr = fmt.Errorf(\"missing field: timeStamp\")\n\t\treturn\n\t}\n\tif head.ResponseMessage == -1 {\n\t\terr = fmt.Errorf(\"missing field: responseMessage\")\n\t\treturn\n\t}\n\tif head.ThreadName == -1 {\n\t\terr = fmt.Errorf(\"missing field: threadName\")\n\t\treturn\n\t}\n\tif head.DataType == -1 {\n\t\terr = fmt.Errorf(\"missing field: dataType\")\n\t\treturn\n\t}\n\tif head.Success == -1 {\n\t\terr = fmt.Errorf(\"missing field: success\")\n\t\treturn\n\t}\n\tif head.FailureMessage == -1 {\n\t\terr = fmt.Errorf(\"missing field: failureMessage\")\n\t\treturn\n\t}\n\tif head.Bytes == -1 {\n\t\terr = fmt.Errorf(\"missing field: bytes\")\n\t\treturn\n\t}\n\tif head.SentBytes == -1 {\n\t\terr = fmt.Errorf(\"missing field: sentBytes\")\n\t\treturn\n\t}\n\tif head.GrpThreads == -1 {\n\t\terr = fmt.Errorf(\"missing field: grpThreads\")\n\t\treturn\n\t}\n\tif head.AllThreads == -1 {\n\t\terr = fmt.Errorf(\"missing field: allThreads\")\n\t\treturn\n\t}\n\tif head.URL == -1 {\n\t\terr = fmt.Errorf(\"missing field: URL\")\n\t\treturn\n\t}\n\tif head.Latency == -1 {\n\t\terr = fmt.Errorf(\"missing field: Latency\")\n\t\treturn\n\t}\n\tif head.IdleTime == -1 {\n\t\terr = fmt.Errorf(\"missing field: IdleTime\")\n\t\treturn\n\t}\n\tif head.Connect == -1 {\n\t\terr = fmt.Errorf(\"missing field: Connect\")\n\t\treturn\n\t}\n\tif len(line) != head.Length {\n\t\terr = fmt.Errorf(\"mismatch fields count in header\")\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "a3c852fc3ae91580441c483c42ef2684", "score": "0.40448165", "text": "func LoadCsvModule(db *Conn) error {\n\treturn db.CreateModule(\"csv\", csvModule{})\n}", "title": "" } ]
8fc669cb4775d5591b3c099d6fa93ed7
SetHTTPClient adds the HTTPClient to the get peers params
[ { "docid": "341b37e52b36cf71381b3b8d73f28838", "score": "0.8540632", "text": "func (o *GetPeersParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" } ]
[ { "docid": "3d17ba00785d01d632f0b098319f87be", "score": "0.7752722", "text": "func (o *EdgeGetParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "0c8b0ae829dc0c9764d9f366251f1cf1", "score": "0.7643534", "text": "func (o *GetaspecificRtcNetworkParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "e98ea1854b7d569d026f1facd82a3a0b", "score": "0.76312184", "text": "func (o *GetAllSubcriptionsUsingGETParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "5c3debc6ef82de2c40c08ac08940f2d3", "score": "0.76143306", "text": "func (o *CreateRemotePeeringConnectionParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "a0d5b4d27ede7cfbe4b3c5c2c2f897c0", "score": "0.7598516", "text": "func (o *DownloadContentUsingGETParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "2b4edf099a402618f84476d4e1ec9c64", "score": "0.7541247", "text": "func (o *ChatGetChannelsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "993836100f21d9f0d872e91eee62c868", "score": "0.75367075", "text": "func (o *ExtendedAddressSuggestionsUsingGETParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "e909b8f0a705fd5f5f8129a0c15a0f36", "score": "0.7527766", "text": "func (o *GetACartParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "91455f2b2ca70da08d84d73ad8607d85", "score": "0.7511309", "text": "func (o *QuerylockedParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "2f64c605404b1d03c306f997304c1e12", "score": "0.749116", "text": "func (o *GetMandatesParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "335549e5eda38cfe571c331b6f37fdf2", "score": "0.74791276", "text": "func (o *GetGraphsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "91e11ca4d63091550e55d28eca43e91b", "score": "0.7478129", "text": "func (o *GetSendersParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "ccd9426ce24c4d6e73782af44db05311", "score": "0.74761647", "text": "func (o *GetDatacentersConnectionParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "cc5b0b6137d97ebdd5f4ee172e5f4070", "score": "0.7471192", "text": "func (o *CandidatesParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "df018e22bec8c9b63335fd13b8d0067f", "score": "0.7466689", "text": "func (o *GetProfilesByMetroUsingGETParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "45c54fe1b717af24ef6b57bc1f2e4a1c", "score": "0.7465729", "text": "func (o *KeyManagerKeysGetParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "d18f1539cd3ecb1dc5e6159f6d02fc19", "score": "0.7458525", "text": "func (o *GetaspecificManagerSecretaryParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "834f92be073c6bf9d2a19b66759659ac", "score": "0.74531984", "text": "func (o *AddPartsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "3a600703f4951c068cd31d0b1faf857c", "score": "0.74481", "text": "func (o *GetProfileManagementRequestParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "f8200f64087b9337e3b5eb29ebb6a553", "score": "0.7429401", "text": "func (o *AnnouncementGetParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "ccef132d66438e22196ddec67518dbe1", "score": "0.742805", "text": "func (o *FindConfigRPCMinThreadsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "9937239bedbae26831811c459c05e105", "score": "0.74264354", "text": "func (o *PollersDataGetParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "bc84ff57b8390cbbc6be51126b0a0d4e", "score": "0.7425866", "text": "func (o *GetPtzChannelsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "3edfbb17a27ccd06eedafcf9d8d2cbd1", "score": "0.7425392", "text": "func (o *GetSubcriptionForMetroUsingGETParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "13eb599c63b5aefd2926a08722c2a553", "score": "0.74203867", "text": "func (o *GetPassesParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "ffe4c0aa465c5350572dd3a6888af7f4", "score": "0.74072146", "text": "func (o *GetClientsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "4e0ee9ebe8699fc49dadf7ba019c9a29", "score": "0.74021703", "text": "func (o *QueryItemsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "5ba4ac906f505c3ad8a84d7208135655", "score": "0.73914057", "text": "func (o *GetAllVariablesUsingGETParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "2a3d6d7446ef8ea25421b858a13a2269", "score": "0.73903865", "text": "func (o *SearchGeoLocationsUsingGETParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "9a0b483b295a6baa4b27264edd6878da", "score": "0.73868656", "text": "func (o *GetAdapterExtEthInterfacesMoidParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "cc6cc6d9025cd1e5e1b8a3295f99604b", "score": "0.7385766", "text": "func (o *FindConfigMurmur3PartitionerIgnoreMsbBitsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "f78a908fec22db4fd8933898ecfcbada", "score": "0.73729163", "text": "func (o *GetMetadataParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "8153cc6c3dd026cf813cb41ba52f6fb1", "score": "0.7372482", "text": "func (o *GetAllProviderAccountsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "03cc65e813dfcdbcd6f15ac50e2d6365", "score": "0.7356784", "text": "func (o *GetPolicyUsingGETParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "35767a672e8d169c7b009fb8f114abb5", "score": "0.7344091", "text": "func (o *GetNextCommandUsingPOSTParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "89244f83b0a4c4b82466e2fefa6d1856", "score": "0.73433304", "text": "func (o *GetUserTenantAssignmentUsingGETParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "7eba1816c2274efc259b60496ba3124b", "score": "0.73397774", "text": "func (o *GetVcnParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "7b85f9b6c10cba82458dcb55ec149336", "score": "0.7339027", "text": "func (o *GetAccountPublicKeyDownloadParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "0ec4dcc15290a78b274257737d866f6d", "score": "0.7337795", "text": "func (o *GetLogProofParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "5ca0c7621e69f9a240d9a1b2c12d7ab1", "score": "0.7336401", "text": "func (o *PostWalletInitParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "2421e6ed99988ad3cf5a7b30173c5cec", "score": "0.7332733", "text": "func (o *ListDhcpOptionsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "ddbf9149e0e9239b14e5c3a6db5f4407", "score": "0.7328795", "text": "func (o *GetAchievementsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "f320cd315ef8d70bef4ef1e24e1c7299", "score": "0.7328403", "text": "func (o *TestLdapConnectionUtilParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "e588967c9964761750ec6cd52dd43edc", "score": "0.7320202", "text": "func (o *URLFindListParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "8ad0e704fb6d27049ebf2eae4358f7cd", "score": "0.7318138", "text": "func (o *ListCryptokeysParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "f8f2b2e4dee7a084ebf57faa1b96a04d", "score": "0.7317565", "text": "func (o *GetLTENetworkIDSubscribersParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "dceb4da698e2c91e083edd609a5b2b1b", "score": "0.73121405", "text": "func (o *GetaspecificCallListParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "717200578ab611a7b2ca6c2c8b6bc01c", "score": "0.73111326", "text": "func (o *PluginListParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "b91f0cbe37a88a2dc72b17af2d9001a6", "score": "0.73107505", "text": "func (o *GetChangesParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "31b2bddc0697fc2b599655d5be0e6c27", "score": "0.73090714", "text": "func (o *GetProvenanceParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "683b94f55baa1834e49dde55226a241e", "score": "0.73033583", "text": "func (o *GetCurrentParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "ee5e88e50e072de855271b4968200a04", "score": "0.729408", "text": "func SetHTTPClient(client *http.Client) {\n\thttpClient = client\n}", "title": "" }, { "docid": "438876ecd5177d589944fdc8800292e8", "score": "0.7283545", "text": "func (o *GetAuthWellknownParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "7dfaef2d736d620ff9fee3c2ba5c7bd5", "score": "0.72824866", "text": "func (o *GetPrivateAddToAddressBookParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "6b2f80093526d16bb65b90f6bf4fa5f4", "score": "0.727791", "text": "func (o *GetDebugConfigParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "1c979dac6413911b9abd8188f74ec92d", "score": "0.7273303", "text": "func (o *GetPublicGetLastSettlementsByInstrumentParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "03fe949b8823ba130c287fdaa4772dc5", "score": "0.727234", "text": "func (o *AddComponentParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "69d136f87cfc09163d37258494a43067", "score": "0.7271522", "text": "func (o *UpdateIPSecConnectionParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "5b965c0526a84805d23c125f50c2a8d5", "score": "0.72667485", "text": "func (o *GetMigrateTransmittersParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "de125eb8feb350670a58f1efb42c3c37", "score": "0.7266457", "text": "func (o *PersonParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "0b137ada3626a90953f091c1c2d28bc5", "score": "0.7263144", "text": "func (o *FindParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "2b2864930f612164c80bd6821704fa9b", "score": "0.7263115", "text": "func (o *GetPdusParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "ac827e79279bc740a69d2ccd8bffb044", "score": "0.7262842", "text": "func (o *GetPrivateGetopenordersParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "be6a5ff83b5e21b623b8c2d7c3d56933", "score": "0.7256931", "text": "func (fc *FakeClient) SetHTTPClient(httpClient *http.Client) {}", "title": "" }, { "docid": "c93f7b94a56b0335f0a526cf09a47426", "score": "0.7252225", "text": "func (o *ListTicketsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "55581752f1ec4df9ca451e3847b612c7", "score": "0.72512484", "text": "func (o *GetTeamMemberParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "4f566dc22c084e6921b7d97067106fed", "score": "0.72499", "text": "func (o *GetImplementationParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "d4f7fdeda0c053774f1ce5ed14e0eaa6", "score": "0.7248692", "text": "func (o *GetFamilyParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "82e4de695d2a6607fe9adf4347f2bf8e", "score": "0.72473496", "text": "func (o *GetPrivateGetUserTradesByInstrumentAndTimeParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "a1bc178300abea825766568b062cf5d2", "score": "0.724536", "text": "func (o *AddCallerIDParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "5259983d042d06666742c13c94cce467", "score": "0.72447973", "text": "func (o *GetUsersParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "437cddd2b0fa8ece8d70d8d4fa07e5e7", "score": "0.72409296", "text": "func (o *GetUsersThisParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "1cfb4cf0c661982f775707fcaf01b256", "score": "0.7239491", "text": "func (o *UpdateNetworkBluetoothSettingsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "c8f983f9eeab56b59ab76851ac7aafe2", "score": "0.7231257", "text": "func (o *UpdateNetworkUplinkSettingsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "bafbc08d6b1c866db03f23307278554a", "score": "0.7221013", "text": "func (o *DevicesGetPropertiesParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "5f44718f619142ef8c54308d879c6c37", "score": "0.7216815", "text": "func (o *GetActivitiesTCXParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "e9ec8c14f553a062b44cc272248ae3bb", "score": "0.72139484", "text": "func (o *FilesGetParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "fb6fdc252dc440b2428b4654252f7ce2", "score": "0.72115844", "text": "func (o *GetDevicesParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "4b538cdab752aacbb8f1eae5f3936150", "score": "0.72103804", "text": "func (o *GetNdmpSessionParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "f589dc67a8f3cfdf1f05092d94a489b8", "score": "0.7210053", "text": "func (o *GetSearchArticlesParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "200d105bd79f3cfd2acf72bfaae97e85", "score": "0.71997935", "text": "func (o *GetIPAMSwitchportsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "a4fa9beed301b798ce5c4837be18d557", "score": "0.7199274", "text": "func (o *APIServiceCandidateParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "36b1e0cdea16afbab132f66be0b6d4de", "score": "0.7197011", "text": "func (o *GetSummaryProtocolParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "19ea1443013a131b828b8f65b4d32b66", "score": "0.7192087", "text": "func (o *GetDebtByAccountParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "e2267038142d3f09f9f6a8aee2f6d32f", "score": "0.7184085", "text": "func (o *PublicCloudsListGetParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "75268c195a65a58a607a78702a90a2cd", "score": "0.7182809", "text": "func (o *RobokassaCallbackParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "216e576bdad2ef03866755e774119c2c", "score": "0.7181168", "text": "func (o *ListDatacentersParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "17b649d3f2df3fd7ad0c95752412f26f", "score": "0.7179181", "text": "func (o *GetContentByIdsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "92c5e16576f684307ec78d9dcd4293c4", "score": "0.7178346", "text": "func (o *SearchProductStockByLocationUsingGETParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "3837cd541eca1d5defbd4fc9a41b996a", "score": "0.71781397", "text": "func (o *QueryByWiqlParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "0c1df8df2b592b13a46a52b1a58dd06f", "score": "0.717766", "text": "func (o *UpdateSteamIAPConfigParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "d1f59dabfacf71fb997c3ef653a0e59d", "score": "0.7176589", "text": "func (o *GetStakingRedelegationsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "b98b3334323fda8674927818102030e3", "score": "0.7176466", "text": "func (o *GetClustersParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "b70a864bced9485c0a38eb5622d7755b", "score": "0.71756727", "text": "func (o *GetContentParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "8def099ae13baf2a395a4247f3a769b0", "score": "0.7175153", "text": "func (o *BikePointSearchParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "64771171cdcc7baf26bd6fbd95df848f", "score": "0.7173734", "text": "func (o *GetChannelsChannelIDCurrencyAssignmentsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "8a3be7f384ede1f63373d501bd265290", "score": "0.71720904", "text": "func (o *AccountsGetAccountsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "0b8590cebfdd785c77c958c043bfea57", "score": "0.7171356", "text": "func (o *GetWebhookParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "13d065fdfec4f80ac1b46789d0a1c230", "score": "0.7170955", "text": "func (o *GetLolLobbyV2LobbyCustomBotsEnabledParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "93add16e67da8f58d37f034422e17e5f", "score": "0.7170173", "text": "func (o *ListClusterHostsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" } ]
767990356e753b40dcb2a7afc68ea356
IsCode returns true when this get customers customer fid emails default response a status code equal to that given
[ { "docid": "60aa700ff366a70d9d75dcc6af04a0eb", "score": "0.8226834", "text": "func (o *GetCustomersCustomerFidEmailsDefault) IsCode(code int) bool {\n\treturn o._statusCode == code\n}", "title": "" } ]
[ { "docid": "4c14d05fb39b10e3b5494abf2da4ece7", "score": "0.84448826", "text": "func (o *GetCustomersCustomerFidEmailsOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "10c4d7a48c3a2272e88c6087ade69129", "score": "0.8036491", "text": "func (o *GetCustomersCustomerFidInvoicesOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "b075d68f354609f7e196c4be04e725ff", "score": "0.7927955", "text": "func (o *GetCustomersCustomerFidInvoicesDefault) IsCode(code int) bool {\n\treturn o._statusCode == code\n}", "title": "" }, { "docid": "6f6c2045d9acaf90bc79d8faddc225d7", "score": "0.7904593", "text": "func (o *GetCustomersCustomerFidPhonesOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "2cdd4636080f5ee854cc9c898f0192b2", "score": "0.78903943", "text": "func (o *GetCustomersCustomerFidPhonesDefault) IsCode(code int) bool {\n\treturn o._statusCode == code\n}", "title": "" }, { "docid": "0c7f19eea3c2631cdaaa3a21286c348e", "score": "0.7816738", "text": "func (o *PostCustomersCustomerFidInteractionsOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "3c3e8279beaf4d9a6862b92ecb50e81e", "score": "0.7810942", "text": "func (o *GetCustomersCustomerFidEmailsOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "6741d8eddb4ebf027f02eb44aae260be", "score": "0.7785405", "text": "func (o *GetOrdersOrderFidOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "2e3f31bb5e247b810571d736b5bebb8f", "score": "0.77595985", "text": "func (o *EmsFilterGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "5070f187338a4dc5d7c27036028d4d92", "score": "0.77438176", "text": "func (o *GetIntegrationOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "a551a4a8c307e4ee34a285e1d8724ee9", "score": "0.77114713", "text": "func (o *GetInteractionsInteractionFidMessagesOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "f6392ee19e506de58678db1a47679bd0", "score": "0.77045035", "text": "func (o *ClassificationsGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "3f6f7152197a192d1ecc6aa2bc9c31f2", "score": "0.7702767", "text": "func (o *GetVersionByIDUsingGET2OK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "a90ddde15dc76bb0456896b55e82bdaa", "score": "0.76653117", "text": "func (o *PcloudTenantsGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "897ddca6f41e55b734c48d6a82727287", "score": "0.76088834", "text": "func (o *GetInvoicePaymentOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "53d594ea0fc2f382643b9dad91301066", "score": "0.76087373", "text": "func (o *PostCustomersCustomerFidInteractionsDefault) IsCode(code int) bool {\n\treturn o._statusCode == code\n}", "title": "" }, { "docid": "890c25aae2260f63483a820cac91ca2b", "score": "0.7603669", "text": "func (o *GetInvoicesForAccountOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "0d4c766f3d320d4d83b0be4f68aa4312", "score": "0.7596026", "text": "func (o *GetPaymentByExternalKeyOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "e1150fb76450f4d0a0964018f99b64ee", "score": "0.75890666", "text": "func (o *GetDecisionsUsingGET2OK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "1a98c4ab5a9e30e082867189f8af6bd8", "score": "0.7582287", "text": "func (o *GetGitWebhookByNameUsingGETInternalServerError) IsCode(code int) bool {\n\treturn code == 500\n}", "title": "" }, { "docid": "781f0dd2d979141c7d345413627dcd8b", "score": "0.7579304", "text": "func (o *PostCustomersCustomerFidSubscriptionsSubscriptionFidCancelFlowOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "29cebec31371aee7b2afdfd509c013b0", "score": "0.7574329", "text": "func (o *GetCustomersCustomerFidEmailsDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "a48a14fb47bdbc9e6fbd87f55c59ac75", "score": "0.7573534", "text": "func (o *DeleteContactsContactFidPhonesPhoneFidOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "6758679cde3c3c394736336ec9474cca", "score": "0.7566149", "text": "func (o *GetDockerRegistryWebhookNameUsingGETInternalServerError) IsCode(code int) bool {\n\treturn code == 500\n}", "title": "" }, { "docid": "832b5c84fae7e02d1daaba3a7d0942b3", "score": "0.75550205", "text": "func (o *CreateMTOShipmentOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "030a6b505e5c4a973da8e59d1062d3a6", "score": "0.7541223", "text": "func (o *GetCreditOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "59536c9381f8b2755c47ca64bfbbfd03", "score": "0.7539054", "text": "func (o *SoftwarePackagesCollectionGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "c2d6ba4f9f49630d43535ad7656bd886", "score": "0.75332284", "text": "func (o *GetOrdersOrderFidDefault) IsCode(code int) bool {\n\treturn o._statusCode == code\n}", "title": "" }, { "docid": "d2f475318eab1e111c341c650d34688f", "score": "0.7530706", "text": "func (o *CreateMTOAgentOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "d72309725370ea640238e32acd8807e1", "score": "0.75217843", "text": "func (o *PostPublishersPublisherFidCampaignsOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "d02d3ee49dc78eb0ad1bded7f9c483f2", "score": "0.75072455", "text": "func (o *GetIntelReportPDFOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "c7b126b90c22fc2ddb657e0c91196ebb", "score": "0.7501253", "text": "func (o *IscsiCredentialsGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "ec02a541d7f6cd4cd8b04ab053d2e948", "score": "0.7498878", "text": "func (o *ServiceBrokerOpenstacksServersGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "156403805f0a62213773413da9356756", "score": "0.74971485", "text": "func (o *SecurityCertificateGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "fd1c88d5d31b5cc14025592655bb775c", "score": "0.7494622", "text": "func (o *GetAzureCloudAccountOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "1a2b5b6de09f2165cf14b42dd981b121", "score": "0.7494438", "text": "func (o *GetGitWebhookByNameUsingGETUnauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "title": "" }, { "docid": "37c46045975408899add7700193ab104", "score": "0.7493612", "text": "func (o *FirmwareHistoryCollectionGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "a5e3fc2393e6796e9f494c6d33c29a69", "score": "0.74882174", "text": "func (o *GetDiscoverCloudAzureAccountOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "f25deaa696cffb756886c9a615a49235", "score": "0.74875164", "text": "func (o *FcSwitchCollectionGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "78fda02972730a3dfdcadb35746fbebe", "score": "0.74777687", "text": "func (o *QueryMitreAttacksOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "e6994fbfeab197976d6141c81f2e4a25", "score": "0.7475501", "text": "func (o *GetDockerRegistryWebhookNameUsingGETUnauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "title": "" }, { "docid": "9dda2ec2ed3762be395e3eea9ca693a9", "score": "0.74744695", "text": "func (o *FdrschemaEntitiesEventGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "9016887d3419a4059a88144dc66ed494", "score": "0.7465699", "text": "func (o *GetOrganisationOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "db365cca379f9adf5327b639ac923c7a", "score": "0.7446641", "text": "func (o *PortsetGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "dcde957be2d813c844c6e41e6ebc3fdf", "score": "0.74465495", "text": "func (o *SearchUsersOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "b172b91b78cefb2cade7ccc154a1c78b", "score": "0.74338496", "text": "func (o *GetGitWebhookByNameUsingGETNotFound) IsCode(code int) bool {\n\treturn code == 404\n}", "title": "" }, { "docid": "83be8ce00ff4af73e14b4d96cad4ef0b", "score": "0.74308884", "text": "func (o *VerifyAWSAccountAccessOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "f9a2e2e232add208564e32f92cfbb647", "score": "0.7423042", "text": "func (o *AggregateNotificationsExposedDataRecordsV1OK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "e44814b89fd7977dde242f57aa0f762e", "score": "0.742052", "text": "func (o *SnaplockLogGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "6505a3abed3ff26ec8e1e78c5250f647", "score": "0.74173343", "text": "func (o *GetVersionByIDUsingGET2NotFound) IsCode(code int) bool {\n\treturn code == 404\n}", "title": "" }, { "docid": "6ffd697b91ced4b8f0cdc2e695abd082", "score": "0.7417323", "text": "func (o *GetDockerRegistryWebhookNameUsingGETNotFound) IsCode(code int) bool {\n\treturn code == 404\n}", "title": "" }, { "docid": "6392d7e950964d7bb96e699095023f25", "score": "0.74149495", "text": "func (o *QueryCombinedFirewallPolicyMembersOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "ef15d946867fffe8c5554f583beece89", "score": "0.74087656", "text": "func (o *SecurityKeyManagerCollectionGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "d0e906aa7d51592655a093b404499f24", "score": "0.7400413", "text": "func (o *ReadRegistryEntitiesByUUIDOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "ddb83391e23169646372c5e991da6d0a", "score": "0.7399813", "text": "func (o *DeleteEndpointIDOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "9a33e706c1bfe59425c86258951bf080", "score": "0.7397902", "text": "func (o *GetVersionByIDUsingGET2Unauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "title": "" }, { "docid": "ab62e0255d69ee96891aeb848cfd4d82", "score": "0.7392414", "text": "func (o *DeleteContactsContactFidPhonesPhoneFidDefault) IsCode(code int) bool {\n\treturn o._statusCode == code\n}", "title": "" }, { "docid": "10a920dff17d24cf347e6f9bb5bb455b", "score": "0.73876554", "text": "func (o *GetRepository6OK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "9126abf4559d255410173deb70d7d4d6", "score": "0.7387459", "text": "func (o *GetDockerRegistryWebhookNameUsingGETOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "2bb465c0d13eb45c35fff47c71613caa", "score": "0.7376932", "text": "func (o *GetDiscoverCloudAzureAccountInternalServerError) IsCode(code int) bool {\n\treturn code == 500\n}", "title": "" }, { "docid": "3093d1e23839982969b87e1b6a01b014", "score": "0.73732525", "text": "func (o *GetAllMeteringPolicyAssignmentsUsingGET2OK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "101fb8cc8e5ccfdf3a6ed8cde90aeee2", "score": "0.73658776", "text": "func (o *PostOrdersOrderFidProductsOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "a38f3c8bca5a1bf686a33edb2c1aeaa2", "score": "0.73654294", "text": "func (o *GetMetaOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "7394dd8e49e543ab896ce9c9fa5c39a8", "score": "0.7364307", "text": "func (o *GetGitWebhookByNameUsingGETOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "61bede7ab9b60502d2f6a242dcd5f0dc", "score": "0.7359175", "text": "func (o *GetInteractionsInteractionFidMessagesDefault) IsCode(code int) bool {\n\treturn o._statusCode == code\n}", "title": "" }, { "docid": "44b9a1f5db94c34bdef4c464aab3b362", "score": "0.7352515", "text": "func (o *RTRAggregateSessionsOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "dfb07a8920d1b02d6da7c37af221748d", "score": "0.73522174", "text": "func (o *GetConnectionOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "4014b1b486d488c2f0b7005e3b075bad", "score": "0.73507565", "text": "func (o *PostInteractionsInteractionFidFeedbackOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "ab5903c52628bc835b9cd03093e04f4a", "score": "0.7349213", "text": "func (o *PostCustomersCustomerFidSubscriptionsSubscriptionFidCancelFlowDefault) IsCode(code int) bool {\n\treturn o._statusCode == code\n}", "title": "" }, { "docid": "6c6e29bfdfb74d68602bfb603147714b", "score": "0.7349104", "text": "func (o *GetInvoicesForAccountBadRequest) IsCode(code int) bool {\n\treturn code == 400\n}", "title": "" }, { "docid": "e8f94d4987756727db89b363eb54790f", "score": "0.73416215", "text": "func (o *ServiceBrokerOpenstacksServersGetNotFound) IsCode(code int) bool {\n\treturn code == 404\n}", "title": "" }, { "docid": "e13320a59893b64f81a51912549642b5", "score": "0.7338516", "text": "func (o *DeleteAWSAccountsOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "c51e6d3e745272cab5c204a391c45f27", "score": "0.73345274", "text": "func (o *GetCustomersCustomerFidInvoicesOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "cae519472a2c1d83b02c1da41fbbe07b", "score": "0.73342186", "text": "func (o *TrialOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "da2ac84c0c9c02d8ea89aa0bd0b66059", "score": "0.7318373", "text": "func (o *QueryResourcesOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "48456edb87f9b089b5939b3616bc93e6", "score": "0.7315653", "text": "func (o *RTRListFilesV2OK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "bc7442353006e93cdb0ba5e4773e77ee", "score": "0.73152554", "text": "func (o *UpdateAgentTokenOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "2af1b18b54089a15972a0153db0d01d5", "score": "0.73059934", "text": "func (o *GetV1EntitlementsOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "3290d270b97eb60d02dd3fbcc3a21a5a", "score": "0.7300174", "text": "func (o *UpdatevSphereFabricNetworkOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "49b293b82ff92a68a3810fce2cfac007", "score": "0.72991246", "text": "func (o *PutServiceIDOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "af5c454f8b5bd6b51ac07300ae943e13", "score": "0.7298826", "text": "func (o *PatchTokenOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "d081094027e989f499f44901578e4b26", "score": "0.72971636", "text": "func (o *CreateMTOShipmentNotFound) IsCode(code int) bool {\n\treturn code == 404\n}", "title": "" }, { "docid": "36e08587b0f3172913547e92e66f2a9f", "score": "0.7294227", "text": "func (o *PostCustomersCustomerFidSubscriptionsSubscriptionFidRetentionFlowFlowSearchOptionsOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "9badc7fcef355cf23f11314b52f0f9ae", "score": "0.7287822", "text": "func (o *PcloudTenantsGetInternalServerError) IsCode(code int) bool {\n\treturn code == 500\n}", "title": "" }, { "docid": "eb9cad379d0e3d845fd2c022be01885b", "score": "0.72864294", "text": "func (o *QueryDeploymentsOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "ffcabd6a28dfda52cf4395f3ca022c16", "score": "0.7285359", "text": "func (o *PcloudTenantsGetNotFound) IsCode(code int) bool {\n\treturn code == 404\n}", "title": "" }, { "docid": "1edffafe27ef50ba5090019e01ee2bb7", "score": "0.72820103", "text": "func (o *ConsistencyGroupGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "80a787508e5ca3a6339d2ede1ea3dc86", "score": "0.72763443", "text": "func (o *VerifyAWSAccountAccessInternalServerError) IsCode(code int) bool {\n\treturn code == 500\n}", "title": "" }, { "docid": "9cf32d08a8d8db0d274a2b3a1f188acf", "score": "0.72719663", "text": "func (o *GetDiscoverCloudAzureAccountBadRequest) IsCode(code int) bool {\n\treturn code == 400\n}", "title": "" }, { "docid": "52253a6fc2cade81c6b6e111fb6ee1a3", "score": "0.72682047", "text": "func (o *CreateTrafficFilterRulesetAssociationOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "14590ab7b58618be3f287b74f5540fb6", "score": "0.7263798", "text": "func (o *GetPaymentByExternalKeyNotFound) IsCode(code int) bool {\n\treturn code == 404\n}", "title": "" }, { "docid": "ec120d7c742f3522a1938930d374682b", "score": "0.7254216", "text": "func (o *DeprecateByIDAndVersionUsingPOSTOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "ab14e441f44dc38e4a0bb666f21bc09f", "score": "0.72491705", "text": "func (o *ShadowcopyGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "2515bdb43235b8a247b47a900a1ecceb", "score": "0.7248185", "text": "func (o *ClassificationsGetInternalServerError) IsCode(code int) bool {\n\treturn code == 500\n}", "title": "" }, { "docid": "bf2254092a2c55f97c245a117e179945", "score": "0.72471994", "text": "func (o *ResumeRunOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "a0dbb1ea001499e34d8fda1cf003b8c4", "score": "0.7246765", "text": "func (o *GetInvoicesForAccountNotFound) IsCode(code int) bool {\n\treturn code == 404\n}", "title": "" }, { "docid": "c3aabe734b502d6586bce3a7322951ed", "score": "0.7246522", "text": "func (o *GetIntegrationNotFound) IsCode(code int) bool {\n\treturn code == 404\n}", "title": "" }, { "docid": "fa802a1e86e61411c33a47790efe45a2", "score": "0.7243949", "text": "func (o *GetEntitiesEntityFidConfigSectionNameItemsItemNameOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "8c4ae298558828b837b107ea3ed02f14", "score": "0.723589", "text": "func (o *PatchTeamOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" }, { "docid": "f427491d31edd3b87d3d2ed3a3ef427e", "score": "0.72273743", "text": "func (o *UpdateTeamOK) IsCode(code int) bool {\n\treturn code == 200\n}", "title": "" } ]
00666b980777d35fed0035319f9c51c3
PutBucketOwnershipControlsWithContextCalls gets all the calls that were made to PutBucketOwnershipControlsWithContext. Check the length with: len(mockeds3Client.PutBucketOwnershipControlsWithContextCalls())
[ { "docid": "e87771598ff4c742a18a7e6cc790a52c", "score": "0.8711644", "text": "func (mock *s3ClientMock) PutBucketOwnershipControlsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketOwnershipControlsInput *s3.PutBucketOwnershipControlsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketOwnershipControlsInput *s3.PutBucketOwnershipControlsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketOwnershipControlsWithContext.RLock()\n\tcalls = mock.calls.PutBucketOwnershipControlsWithContext\n\tmock.lockPutBucketOwnershipControlsWithContext.RUnlock()\n\treturn calls\n}", "title": "" } ]
[ { "docid": "0f129748f5c9109744e5ce2e46fb9be1", "score": "0.78615934", "text": "func (mock *s3ClientMock) GetBucketOwnershipControlsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketOwnershipControlsInput *s3.GetBucketOwnershipControlsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketOwnershipControlsInput *s3.GetBucketOwnershipControlsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketOwnershipControlsWithContext.RLock()\n\tcalls = mock.calls.GetBucketOwnershipControlsWithContext\n\tmock.lockGetBucketOwnershipControlsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "1ff137792ed9b034a57e35f60cb7d813", "score": "0.732682", "text": "func (mock *s3ClientMock) PutBucketOwnershipControlsCalls() []struct {\n\tPutBucketOwnershipControlsInput *s3.PutBucketOwnershipControlsInput\n} {\n\tvar calls []struct {\n\t\tPutBucketOwnershipControlsInput *s3.PutBucketOwnershipControlsInput\n\t}\n\tmock.lockPutBucketOwnershipControls.RLock()\n\tcalls = mock.calls.PutBucketOwnershipControls\n\tmock.lockPutBucketOwnershipControls.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "4ddc2155641a60d9cfefed49378e8f50", "score": "0.7290399", "text": "func (mock *s3ClientMock) DeleteBucketOwnershipControlsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tDeleteBucketOwnershipControlsInput *s3.DeleteBucketOwnershipControlsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tDeleteBucketOwnershipControlsInput *s3.DeleteBucketOwnershipControlsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockDeleteBucketOwnershipControlsWithContext.RLock()\n\tcalls = mock.calls.DeleteBucketOwnershipControlsWithContext\n\tmock.lockDeleteBucketOwnershipControlsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "cbfafcf8fe065f4bdcbc6250be5d80d2", "score": "0.72877365", "text": "func (mock *s3ClientMock) PutBucketPolicyWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketPolicyInput *s3.PutBucketPolicyInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketPolicyInput *s3.PutBucketPolicyInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketPolicyWithContext.RLock()\n\tcalls = mock.calls.PutBucketPolicyWithContext\n\tmock.lockPutBucketPolicyWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "f5cd0e5e8de676391c954c4aa11e69b3", "score": "0.7230032", "text": "func (mock *s3ClientMock) PutBucketCorsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketCorsInput *s3.PutBucketCorsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketCorsInput *s3.PutBucketCorsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketCorsWithContext.RLock()\n\tcalls = mock.calls.PutBucketCorsWithContext\n\tmock.lockPutBucketCorsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "2b17022a6a3510386147c6bc066ecd23", "score": "0.7198793", "text": "func (mock *s3ClientMock) PutBucketReplicationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketReplicationInput *s3.PutBucketReplicationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketReplicationInput *s3.PutBucketReplicationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketReplicationWithContext.RLock()\n\tcalls = mock.calls.PutBucketReplicationWithContext\n\tmock.lockPutBucketReplicationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "a9b8758fb78e3e92e6b54516461bd0bd", "score": "0.70524395", "text": "func (mock *s3ClientMock) PutBucketLifecycleWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketLifecycleInput *s3.PutBucketLifecycleInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketLifecycleInput *s3.PutBucketLifecycleInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketLifecycleWithContext.RLock()\n\tcalls = mock.calls.PutBucketLifecycleWithContext\n\tmock.lockPutBucketLifecycleWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "8907a4634ede1f373a38eebeec544f72", "score": "0.7030066", "text": "func (mock *s3ClientMock) PutBucketEncryptionWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketEncryptionInput *s3.PutBucketEncryptionInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketEncryptionInput *s3.PutBucketEncryptionInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketEncryptionWithContext.RLock()\n\tcalls = mock.calls.PutBucketEncryptionWithContext\n\tmock.lockPutBucketEncryptionWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "b3dc6aa2c070a261077c4f912127af64", "score": "0.69552857", "text": "func (mock *s3ClientMock) PutBucketNotificationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketNotificationInput *s3.PutBucketNotificationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketNotificationInput *s3.PutBucketNotificationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketNotificationWithContext.RLock()\n\tcalls = mock.calls.PutBucketNotificationWithContext\n\tmock.lockPutBucketNotificationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "9c941873cf7143bd4550fe7627d9d724", "score": "0.69390845", "text": "func (mock *s3ClientMock) PutBucketAclWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketAclInput *s3.PutBucketAclInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketAclInput *s3.PutBucketAclInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketAclWithContext.RLock()\n\tcalls = mock.calls.PutBucketAclWithContext\n\tmock.lockPutBucketAclWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "35899d9813a22435593b2dc9e4991195", "score": "0.68766695", "text": "func (mock *s3ClientMock) PutBucketLoggingWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketLoggingInput *s3.PutBucketLoggingInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketLoggingInput *s3.PutBucketLoggingInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketLoggingWithContext.RLock()\n\tcalls = mock.calls.PutBucketLoggingWithContext\n\tmock.lockPutBucketLoggingWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "06f2e2ecda8093ff3315e90aacdc8b58", "score": "0.6817431", "text": "func (mock *s3ClientMock) PutBucketOwnershipControlsRequestCalls() []struct {\n\tPutBucketOwnershipControlsInput *s3.PutBucketOwnershipControlsInput\n} {\n\tvar calls []struct {\n\t\tPutBucketOwnershipControlsInput *s3.PutBucketOwnershipControlsInput\n\t}\n\tmock.lockPutBucketOwnershipControlsRequest.RLock()\n\tcalls = mock.calls.PutBucketOwnershipControlsRequest\n\tmock.lockPutBucketOwnershipControlsRequest.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "206d4948c3622315d37b5cd195ca71b7", "score": "0.68172115", "text": "func (mock *s3ClientMock) PutObjectWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutObjectInput *s3.PutObjectInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutObjectInput *s3.PutObjectInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutObjectWithContext.RLock()\n\tcalls = mock.calls.PutObjectWithContext\n\tmock.lockPutObjectWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "e4d37c2b7adc4428339978110a52f4a1", "score": "0.68051326", "text": "func (mock *s3ClientMock) PutObjectLegalHoldWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutObjectLegalHoldInput *s3.PutObjectLegalHoldInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutObjectLegalHoldInput *s3.PutObjectLegalHoldInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutObjectLegalHoldWithContext.RLock()\n\tcalls = mock.calls.PutObjectLegalHoldWithContext\n\tmock.lockPutObjectLegalHoldWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "9d10df96f98f6390f004e5a8076fccf5", "score": "0.679803", "text": "func (mock *s3ClientMock) PutBucketVersioningWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketVersioningInput *s3.PutBucketVersioningInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketVersioningInput *s3.PutBucketVersioningInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketVersioningWithContext.RLock()\n\tcalls = mock.calls.PutBucketVersioningWithContext\n\tmock.lockPutBucketVersioningWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "7e1abebeb83511597596807fce95e4c4", "score": "0.67955106", "text": "func (mock *s3ClientMock) PutPublicAccessBlockWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutPublicAccessBlockInput *s3.PutPublicAccessBlockInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutPublicAccessBlockInput *s3.PutPublicAccessBlockInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutPublicAccessBlockWithContext.RLock()\n\tcalls = mock.calls.PutPublicAccessBlockWithContext\n\tmock.lockPutPublicAccessBlockWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "f2c62dd79ff294b92644d5c29f1fed04", "score": "0.67913973", "text": "func (mock *s3ClientMock) PutBucketTaggingWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketTaggingInput *s3.PutBucketTaggingInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketTaggingInput *s3.PutBucketTaggingInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketTaggingWithContext.RLock()\n\tcalls = mock.calls.PutBucketTaggingWithContext\n\tmock.lockPutBucketTaggingWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "71d9a74247564deadc6a24e1b0813234", "score": "0.6746661", "text": "func (mock *s3ClientMock) PutObjectAclWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutObjectAclInput *s3.PutObjectAclInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutObjectAclInput *s3.PutObjectAclInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutObjectAclWithContext.RLock()\n\tcalls = mock.calls.PutObjectAclWithContext\n\tmock.lockPutObjectAclWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "9f3e57fe6a12ae0de43afc2e33a17c02", "score": "0.6623988", "text": "func (mock *s3ClientMock) PutObjectTaggingWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutObjectTaggingInput *s3.PutObjectTaggingInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutObjectTaggingInput *s3.PutObjectTaggingInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutObjectTaggingWithContext.RLock()\n\tcalls = mock.calls.PutObjectTaggingWithContext\n\tmock.lockPutObjectTaggingWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "edc3f1614516fcfe25ab19d389d692ed", "score": "0.65741855", "text": "func (mock *s3ClientMock) PutObjectRetentionWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutObjectRetentionInput *s3.PutObjectRetentionInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutObjectRetentionInput *s3.PutObjectRetentionInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutObjectRetentionWithContext.RLock()\n\tcalls = mock.calls.PutObjectRetentionWithContext\n\tmock.lockPutObjectRetentionWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "82e92436d0821dd120c617cc1d78998c", "score": "0.65133953", "text": "func (mock *s3ClientMock) PutBucketAccelerateConfigurationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketAccelerateConfigurationInput *s3.PutBucketAccelerateConfigurationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketAccelerateConfigurationInput *s3.PutBucketAccelerateConfigurationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketAccelerateConfigurationWithContext.RLock()\n\tcalls = mock.calls.PutBucketAccelerateConfigurationWithContext\n\tmock.lockPutBucketAccelerateConfigurationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "843ff94c39e5c6f0babcdc074a131979", "score": "0.6502496", "text": "func (mock *s3ClientMock) PutBucketRequestPaymentWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketRequestPaymentInput *s3.PutBucketRequestPaymentInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketRequestPaymentInput *s3.PutBucketRequestPaymentInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketRequestPaymentWithContext.RLock()\n\tcalls = mock.calls.PutBucketRequestPaymentWithContext\n\tmock.lockPutBucketRequestPaymentWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "d565cd017d7f85969b43ff8ef81d7044", "score": "0.6493917", "text": "func (mock *s3ClientMock) PutBucketLifecycleConfigurationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketLifecycleConfigurationInput *s3.PutBucketLifecycleConfigurationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketLifecycleConfigurationInput *s3.PutBucketLifecycleConfigurationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketLifecycleConfigurationWithContext.RLock()\n\tcalls = mock.calls.PutBucketLifecycleConfigurationWithContext\n\tmock.lockPutBucketLifecycleConfigurationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "5a403b706370e137130fe0ccf5a55604", "score": "0.6480546", "text": "func (mock *s3ClientMock) GetBucketOwnershipControlsCalls() []struct {\n\tGetBucketOwnershipControlsInput *s3.GetBucketOwnershipControlsInput\n} {\n\tvar calls []struct {\n\t\tGetBucketOwnershipControlsInput *s3.GetBucketOwnershipControlsInput\n\t}\n\tmock.lockGetBucketOwnershipControls.RLock()\n\tcalls = mock.calls.GetBucketOwnershipControls\n\tmock.lockGetBucketOwnershipControls.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "86d1cf1191c7aee9bc900b9196c27324", "score": "0.6465501", "text": "func (mock *s3ClientMock) CreateBucketWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tCreateBucketInput *s3.CreateBucketInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tCreateBucketInput *s3.CreateBucketInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockCreateBucketWithContext.RLock()\n\tcalls = mock.calls.CreateBucketWithContext\n\tmock.lockCreateBucketWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "7a6a1130bb0881e013d5682688d873b3", "score": "0.6458582", "text": "func (mock *s3ClientMock) PutObjectLockConfigurationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutObjectLockConfigurationInput *s3.PutObjectLockConfigurationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutObjectLockConfigurationInput *s3.PutObjectLockConfigurationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutObjectLockConfigurationWithContext.RLock()\n\tcalls = mock.calls.PutObjectLockConfigurationWithContext\n\tmock.lockPutObjectLockConfigurationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "c9da3937eb3070517d667bd92fd5b01f", "score": "0.64448476", "text": "func (mock *s3ClientMock) PutBucketWebsiteWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketWebsiteInput *s3.PutBucketWebsiteInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketWebsiteInput *s3.PutBucketWebsiteInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketWebsiteWithContext.RLock()\n\tcalls = mock.calls.PutBucketWebsiteWithContext\n\tmock.lockPutBucketWebsiteWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "8bba79f0fe5383d0eebe2a6c98e1a443", "score": "0.64293313", "text": "func (mock *s3ClientMock) PutBucketMetricsConfigurationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketMetricsConfigurationInput *s3.PutBucketMetricsConfigurationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketMetricsConfigurationInput *s3.PutBucketMetricsConfigurationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketMetricsConfigurationWithContext.RLock()\n\tcalls = mock.calls.PutBucketMetricsConfigurationWithContext\n\tmock.lockPutBucketMetricsConfigurationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "717455b233e097d11e4ff3881d09ad1e", "score": "0.64128876", "text": "func (mock *s3ClientMock) PutBucketNotificationConfigurationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketNotificationConfigurationInput *s3.PutBucketNotificationConfigurationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketNotificationConfigurationInput *s3.PutBucketNotificationConfigurationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketNotificationConfigurationWithContext.RLock()\n\tcalls = mock.calls.PutBucketNotificationConfigurationWithContext\n\tmock.lockPutBucketNotificationConfigurationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "d6ea08bb4efcbb7208f9a29752aaf2e9", "score": "0.64087945", "text": "func (mock *s3ClientMock) PutBucketInventoryConfigurationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketInventoryConfigurationInput *s3.PutBucketInventoryConfigurationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketInventoryConfigurationInput *s3.PutBucketInventoryConfigurationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketInventoryConfigurationWithContext.RLock()\n\tcalls = mock.calls.PutBucketInventoryConfigurationWithContext\n\tmock.lockPutBucketInventoryConfigurationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "9cb50963b8ccff79f1b338ca05bcccea", "score": "0.6347594", "text": "func (mock *s3ClientMock) PutBucketIntelligentTieringConfigurationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketIntelligentTieringConfigurationInput *s3.PutBucketIntelligentTieringConfigurationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketIntelligentTieringConfigurationInput *s3.PutBucketIntelligentTieringConfigurationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketIntelligentTieringConfigurationWithContext.RLock()\n\tcalls = mock.calls.PutBucketIntelligentTieringConfigurationWithContext\n\tmock.lockPutBucketIntelligentTieringConfigurationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "40a6144998abcae02bec08777d4ec94d", "score": "0.63050044", "text": "func (mock *s3ClientMock) UploadPartCopyWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tUploadPartCopyInput *s3.UploadPartCopyInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tUploadPartCopyInput *s3.UploadPartCopyInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockUploadPartCopyWithContext.RLock()\n\tcalls = mock.calls.UploadPartCopyWithContext\n\tmock.lockUploadPartCopyWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "050697b975d931936ac44c3f20aee0b2", "score": "0.62899524", "text": "func (mock *s3ClientMock) PutBucketAnalyticsConfigurationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tPutBucketAnalyticsConfigurationInput *s3.PutBucketAnalyticsConfigurationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tPutBucketAnalyticsConfigurationInput *s3.PutBucketAnalyticsConfigurationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockPutBucketAnalyticsConfigurationWithContext.RLock()\n\tcalls = mock.calls.PutBucketAnalyticsConfigurationWithContext\n\tmock.lockPutBucketAnalyticsConfigurationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "e8903a560d5dfd8a3c5bb3620a055d57", "score": "0.62551534", "text": "func (mock *s3ClientMock) GetBucketCorsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketCorsInput *s3.GetBucketCorsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketCorsInput *s3.GetBucketCorsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketCorsWithContext.RLock()\n\tcalls = mock.calls.GetBucketCorsWithContext\n\tmock.lockGetBucketCorsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "c510ad38453e8eba3566cf3ed9a4cd52", "score": "0.62371695", "text": "func (mock *s3ClientMock) UploadPartWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tUploadPartInput *s3.UploadPartInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tUploadPartInput *s3.UploadPartInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockUploadPartWithContext.RLock()\n\tcalls = mock.calls.UploadPartWithContext\n\tmock.lockUploadPartWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "c60b32621e839b8fd3170d9bf0e9c5cd", "score": "0.6228474", "text": "func (mock *s3ClientMock) DeleteBucketOwnershipControlsCalls() []struct {\n\tDeleteBucketOwnershipControlsInput *s3.DeleteBucketOwnershipControlsInput\n} {\n\tvar calls []struct {\n\t\tDeleteBucketOwnershipControlsInput *s3.DeleteBucketOwnershipControlsInput\n\t}\n\tmock.lockDeleteBucketOwnershipControls.RLock()\n\tcalls = mock.calls.DeleteBucketOwnershipControls\n\tmock.lockDeleteBucketOwnershipControls.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "ff768a36ce55f422e6e814c1e53def4d", "score": "0.61314976", "text": "func (mock *s3ClientMock) WriteGetObjectResponseWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tWriteGetObjectResponseInput *s3.WriteGetObjectResponseInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tWriteGetObjectResponseInput *s3.WriteGetObjectResponseInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockWriteGetObjectResponseWithContext.RLock()\n\tcalls = mock.calls.WriteGetObjectResponseWithContext\n\tmock.lockWriteGetObjectResponseWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "ef3580ac6691d3c91c2d07ada079b661", "score": "0.6031166", "text": "func (mock *s3ClientMock) GetBucketOwnershipControlsRequestCalls() []struct {\n\tGetBucketOwnershipControlsInput *s3.GetBucketOwnershipControlsInput\n} {\n\tvar calls []struct {\n\t\tGetBucketOwnershipControlsInput *s3.GetBucketOwnershipControlsInput\n\t}\n\tmock.lockGetBucketOwnershipControlsRequest.RLock()\n\tcalls = mock.calls.GetBucketOwnershipControlsRequest\n\tmock.lockGetBucketOwnershipControlsRequest.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "750f99d9f033b40c536ceff8a83156c0", "score": "0.60068226", "text": "func (mock *s3ClientMock) GetBucketPolicyWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketPolicyInput *s3.GetBucketPolicyInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketPolicyInput *s3.GetBucketPolicyInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketPolicyWithContext.RLock()\n\tcalls = mock.calls.GetBucketPolicyWithContext\n\tmock.lockGetBucketPolicyWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "e982f554b6b4666a8347342c7240fcec", "score": "0.6006022", "text": "func (mock *s3ClientMock) ListObjectsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tListObjectsInput *s3.ListObjectsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tListObjectsInput *s3.ListObjectsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockListObjectsWithContext.RLock()\n\tcalls = mock.calls.ListObjectsWithContext\n\tmock.lockListObjectsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "db325beef500ef4e61bec5c1419c0652", "score": "0.59999096", "text": "func (mock *s3ClientMock) GetBucketReplicationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketReplicationInput *s3.GetBucketReplicationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketReplicationInput *s3.GetBucketReplicationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketReplicationWithContext.RLock()\n\tcalls = mock.calls.GetBucketReplicationWithContext\n\tmock.lockGetBucketReplicationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "0c750f228db2f711602fbd64be16d8df", "score": "0.5989775", "text": "func (mock *s3ClientMock) GetBucketEncryptionWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketEncryptionInput *s3.GetBucketEncryptionInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketEncryptionInput *s3.GetBucketEncryptionInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketEncryptionWithContext.RLock()\n\tcalls = mock.calls.GetBucketEncryptionWithContext\n\tmock.lockGetBucketEncryptionWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "45c601bd2f12c39f3ca2bfc215b02fb9", "score": "0.59735674", "text": "func (mock *DynamoDBAPIMock) PutItemWithContextCalls() []struct {\n\tIn1 context.Context\n\tIn2 *dynamodb.PutItemInput\n\tIn3 []request.Option\n} {\n\tvar calls []struct {\n\t\tIn1 context.Context\n\t\tIn2 *dynamodb.PutItemInput\n\t\tIn3 []request.Option\n\t}\n\tlockDynamoDBAPIMockPutItemWithContext.RLock()\n\tcalls = mock.calls.PutItemWithContext\n\tlockDynamoDBAPIMockPutItemWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "7a0e56d86c2db9ea1823034540acfe2e", "score": "0.59099424", "text": "func (mock *DynamoDBAPIMock) UpdateContributorInsightsWithContextCalls() []struct {\n\tIn1 context.Context\n\tIn2 *dynamodb.UpdateContributorInsightsInput\n\tIn3 []request.Option\n} {\n\tvar calls []struct {\n\t\tIn1 context.Context\n\t\tIn2 *dynamodb.UpdateContributorInsightsInput\n\t\tIn3 []request.Option\n\t}\n\tlockDynamoDBAPIMockUpdateContributorInsightsWithContext.RLock()\n\tcalls = mock.calls.UpdateContributorInsightsWithContext\n\tlockDynamoDBAPIMockUpdateContributorInsightsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "f8c929f652d269a3e38c895bf6a4616e", "score": "0.58989525", "text": "func (mock *s3ClientMock) GetBucketLifecycleWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketLifecycleInput *s3.GetBucketLifecycleInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketLifecycleInput *s3.GetBucketLifecycleInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketLifecycleWithContext.RLock()\n\tcalls = mock.calls.GetBucketLifecycleWithContext\n\tmock.lockGetBucketLifecycleWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "5753b3298e80d427449e760f1b8eeef5", "score": "0.5888095", "text": "func (mock *s3ClientMock) PutBucketPolicyCalls() []struct {\n\tPutBucketPolicyInput *s3.PutBucketPolicyInput\n} {\n\tvar calls []struct {\n\t\tPutBucketPolicyInput *s3.PutBucketPolicyInput\n\t}\n\tmock.lockPutBucketPolicy.RLock()\n\tcalls = mock.calls.PutBucketPolicy\n\tmock.lockPutBucketPolicy.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "4f0f51a013f3248b1b897ffe54d4047c", "score": "0.58877283", "text": "func (mock *DynamoDBAPIMock) TransactWriteItemsWithContextCalls() []struct {\n\tIn1 context.Context\n\tIn2 *dynamodb.TransactWriteItemsInput\n\tIn3 []request.Option\n} {\n\tvar calls []struct {\n\t\tIn1 context.Context\n\t\tIn2 *dynamodb.TransactWriteItemsInput\n\t\tIn3 []request.Option\n\t}\n\tlockDynamoDBAPIMockTransactWriteItemsWithContext.RLock()\n\tcalls = mock.calls.TransactWriteItemsWithContext\n\tlockDynamoDBAPIMockTransactWriteItemsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "9bc9a64e7344bb5e6d218dbc7b484e40", "score": "0.58736247", "text": "func (mock *s3ClientMock) HeadBucketWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tHeadBucketInput *s3.HeadBucketInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tHeadBucketInput *s3.HeadBucketInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockHeadBucketWithContext.RLock()\n\tcalls = mock.calls.HeadBucketWithContext\n\tmock.lockHeadBucketWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "f92017c48598ce318cb5dced6c064744", "score": "0.5855184", "text": "func (mock *s3ClientMock) ListBucketIntelligentTieringConfigurationsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tListBucketIntelligentTieringConfigurationsInput *s3.ListBucketIntelligentTieringConfigurationsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tListBucketIntelligentTieringConfigurationsInput *s3.ListBucketIntelligentTieringConfigurationsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockListBucketIntelligentTieringConfigurationsWithContext.RLock()\n\tcalls = mock.calls.ListBucketIntelligentTieringConfigurationsWithContext\n\tmock.lockListBucketIntelligentTieringConfigurationsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "a753c0d4167df9bd9becc77f7ffdf75f", "score": "0.58520395", "text": "func (mock *s3ClientMock) GetBucketLoggingWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketLoggingInput *s3.GetBucketLoggingInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketLoggingInput *s3.GetBucketLoggingInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketLoggingWithContext.RLock()\n\tcalls = mock.calls.GetBucketLoggingWithContext\n\tmock.lockGetBucketLoggingWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "1b846b049b1601b1219dcca59b536881", "score": "0.58280295", "text": "func (mock *s3ClientMock) ListBucketsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tListBucketsInput *s3.ListBucketsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tListBucketsInput *s3.ListBucketsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockListBucketsWithContext.RLock()\n\tcalls = mock.calls.ListBucketsWithContext\n\tmock.lockListBucketsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "c3639173c53eb3741fa429951435c730", "score": "0.5824603", "text": "func (mock *s3ClientMock) DeleteBucketCorsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tDeleteBucketCorsInput *s3.DeleteBucketCorsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tDeleteBucketCorsInput *s3.DeleteBucketCorsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockDeleteBucketCorsWithContext.RLock()\n\tcalls = mock.calls.DeleteBucketCorsWithContext\n\tmock.lockDeleteBucketCorsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "280a15c6d7a2ac0fda08563d15475016", "score": "0.5821583", "text": "func (mock *s3ClientMock) GetBucketTaggingWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketTaggingInput *s3.GetBucketTaggingInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketTaggingInput *s3.GetBucketTaggingInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketTaggingWithContext.RLock()\n\tcalls = mock.calls.GetBucketTaggingWithContext\n\tmock.lockGetBucketTaggingWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "36ae2c3f903f00d06d4000ba58c07def", "score": "0.5815234", "text": "func (mock *s3ClientMock) ListBucketInventoryConfigurationsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tListBucketInventoryConfigurationsInput *s3.ListBucketInventoryConfigurationsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tListBucketInventoryConfigurationsInput *s3.ListBucketInventoryConfigurationsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockListBucketInventoryConfigurationsWithContext.RLock()\n\tcalls = mock.calls.ListBucketInventoryConfigurationsWithContext\n\tmock.lockListBucketInventoryConfigurationsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "3ea417c47b7f669fac2f4608bdb8bccc", "score": "0.58146244", "text": "func (mock *s3ClientMock) GetBucketVersioningWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketVersioningInput *s3.GetBucketVersioningInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketVersioningInput *s3.GetBucketVersioningInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketVersioningWithContext.RLock()\n\tcalls = mock.calls.GetBucketVersioningWithContext\n\tmock.lockGetBucketVersioningWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "99685a85708dbcd32f326e59e429dfe8", "score": "0.58121514", "text": "func (mock *s3ClientMock) PutBucketAclCalls() []struct {\n\tPutBucketAclInput *s3.PutBucketAclInput\n} {\n\tvar calls []struct {\n\t\tPutBucketAclInput *s3.PutBucketAclInput\n\t}\n\tmock.lockPutBucketAcl.RLock()\n\tcalls = mock.calls.PutBucketAcl\n\tmock.lockPutBucketAcl.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "90b8f3b40b84a5e2ad9f32f5fdad52c2", "score": "0.5797604", "text": "func (mock *s3ClientMock) CreateMultipartUploadWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tCreateMultipartUploadInput *s3.CreateMultipartUploadInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tCreateMultipartUploadInput *s3.CreateMultipartUploadInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockCreateMultipartUploadWithContext.RLock()\n\tcalls = mock.calls.CreateMultipartUploadWithContext\n\tmock.lockCreateMultipartUploadWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "d3bb1c2d748cb92cca17611189ff3a61", "score": "0.5789985", "text": "func (mock *s3ClientMock) PutBucketEncryptionCalls() []struct {\n\tPutBucketEncryptionInput *s3.PutBucketEncryptionInput\n} {\n\tvar calls []struct {\n\t\tPutBucketEncryptionInput *s3.PutBucketEncryptionInput\n\t}\n\tmock.lockPutBucketEncryption.RLock()\n\tcalls = mock.calls.PutBucketEncryption\n\tmock.lockPutBucketEncryption.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "41ea1a01719fa9bfee7898ba8d0bcf88", "score": "0.5777491", "text": "func (mock *s3ClientMock) DeleteBucketOwnershipControlsRequestCalls() []struct {\n\tDeleteBucketOwnershipControlsInput *s3.DeleteBucketOwnershipControlsInput\n} {\n\tvar calls []struct {\n\t\tDeleteBucketOwnershipControlsInput *s3.DeleteBucketOwnershipControlsInput\n\t}\n\tmock.lockDeleteBucketOwnershipControlsRequest.RLock()\n\tcalls = mock.calls.DeleteBucketOwnershipControlsRequest\n\tmock.lockDeleteBucketOwnershipControlsRequest.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "fcdb7815d0dd7989a45c79484325bf84", "score": "0.5752544", "text": "func (mock *s3ClientMock) GetObjectTorrentWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetObjectTorrentInput *s3.GetObjectTorrentInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetObjectTorrentInput *s3.GetObjectTorrentInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetObjectTorrentWithContext.RLock()\n\tcalls = mock.calls.GetObjectTorrentWithContext\n\tmock.lockGetObjectTorrentWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "c1c1c7b3fa1a7dc615e6b400b96aea33", "score": "0.57523906", "text": "func (mock *s3ClientMock) ListBucketMetricsConfigurationsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tListBucketMetricsConfigurationsInput *s3.ListBucketMetricsConfigurationsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tListBucketMetricsConfigurationsInput *s3.ListBucketMetricsConfigurationsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockListBucketMetricsConfigurationsWithContext.RLock()\n\tcalls = mock.calls.ListBucketMetricsConfigurationsWithContext\n\tmock.lockListBucketMetricsConfigurationsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "40577f8d2de19e66ae0aa1cd0a096b0b", "score": "0.5747455", "text": "func (mock *s3ClientMock) ListBucketAnalyticsConfigurationsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tListBucketAnalyticsConfigurationsInput *s3.ListBucketAnalyticsConfigurationsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tListBucketAnalyticsConfigurationsInput *s3.ListBucketAnalyticsConfigurationsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockListBucketAnalyticsConfigurationsWithContext.RLock()\n\tcalls = mock.calls.ListBucketAnalyticsConfigurationsWithContext\n\tmock.lockListBucketAnalyticsConfigurationsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "a68b81a6ad00722ec38228545ef6dd28", "score": "0.573378", "text": "func (mock *s3ClientMock) PutBucketLifecycleCalls() []struct {\n\tPutBucketLifecycleInput *s3.PutBucketLifecycleInput\n} {\n\tvar calls []struct {\n\t\tPutBucketLifecycleInput *s3.PutBucketLifecycleInput\n\t}\n\tmock.lockPutBucketLifecycle.RLock()\n\tcalls = mock.calls.PutBucketLifecycle\n\tmock.lockPutBucketLifecycle.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "2aae7183b03bd1abd3a3b7823294d42f", "score": "0.572965", "text": "func (mock *s3ClientMock) DeleteObjectsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tDeleteObjectsInput *s3.DeleteObjectsInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tDeleteObjectsInput *s3.DeleteObjectsInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockDeleteObjectsWithContext.RLock()\n\tcalls = mock.calls.DeleteObjectsWithContext\n\tmock.lockDeleteObjectsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "79b7849f961ec5fd4457847670ceb261", "score": "0.5727004", "text": "func (mock *s3ClientMock) CompleteMultipartUploadWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tCompleteMultipartUploadInput *s3.CompleteMultipartUploadInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tCompleteMultipartUploadInput *s3.CompleteMultipartUploadInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockCompleteMultipartUploadWithContext.RLock()\n\tcalls = mock.calls.CompleteMultipartUploadWithContext\n\tmock.lockCompleteMultipartUploadWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "0efbb005ab2486102941b825fdf73911", "score": "0.5707838", "text": "func (mock *s3ClientMock) PutBucketCorsCalls() []struct {\n\tPutBucketCorsInput *s3.PutBucketCorsInput\n} {\n\tvar calls []struct {\n\t\tPutBucketCorsInput *s3.PutBucketCorsInput\n\t}\n\tmock.lockPutBucketCors.RLock()\n\tcalls = mock.calls.PutBucketCors\n\tmock.lockPutBucketCors.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "49ef1f05e1c94c7c512c231cfee7722e", "score": "0.5707017", "text": "func (mock *s3ClientMock) PutObjectAclCalls() []struct {\n\tPutObjectAclInput *s3.PutObjectAclInput\n} {\n\tvar calls []struct {\n\t\tPutObjectAclInput *s3.PutObjectAclInput\n\t}\n\tmock.lockPutObjectAcl.RLock()\n\tcalls = mock.calls.PutObjectAcl\n\tmock.lockPutObjectAcl.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "5e951ca36084e765263cb6dfa8055f5a", "score": "0.5684427", "text": "func (mock *s3ClientMock) GetBucketNotificationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketNotificationConfigurationRequest *s3.GetBucketNotificationConfigurationRequest\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketNotificationConfigurationRequest *s3.GetBucketNotificationConfigurationRequest\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketNotificationWithContext.RLock()\n\tcalls = mock.calls.GetBucketNotificationWithContext\n\tmock.lockGetBucketNotificationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "0165f66478df1dad6c7cdfb65267d86a", "score": "0.5682623", "text": "func (mock *s3ClientMock) DeleteBucketPolicyWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tDeleteBucketPolicyInput *s3.DeleteBucketPolicyInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tDeleteBucketPolicyInput *s3.DeleteBucketPolicyInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockDeleteBucketPolicyWithContext.RLock()\n\tcalls = mock.calls.DeleteBucketPolicyWithContext\n\tmock.lockDeleteBucketPolicyWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "e77a011a861d755b1e16fcc90ef22cde", "score": "0.5673235", "text": "func (mock *s3ClientMock) DeleteBucketWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tDeleteBucketInput *s3.DeleteBucketInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tDeleteBucketInput *s3.DeleteBucketInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockDeleteBucketWithContext.RLock()\n\tcalls = mock.calls.DeleteBucketWithContext\n\tmock.lockDeleteBucketWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "ef5089c1a174dfe95071cd39d54e567d", "score": "0.5666473", "text": "func (mock *s3ClientMock) CopyObjectWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tCopyObjectInput *s3.CopyObjectInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tCopyObjectInput *s3.CopyObjectInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockCopyObjectWithContext.RLock()\n\tcalls = mock.calls.CopyObjectWithContext\n\tmock.lockCopyObjectWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "700924fe6cdf8fcda1351c2918694220", "score": "0.5653299", "text": "func (mock *DynamoDBAPIMock) BatchWriteItemWithContextCalls() []struct {\n\tIn1 context.Context\n\tIn2 *dynamodb.BatchWriteItemInput\n\tIn3 []request.Option\n} {\n\tvar calls []struct {\n\t\tIn1 context.Context\n\t\tIn2 *dynamodb.BatchWriteItemInput\n\t\tIn3 []request.Option\n\t}\n\tlockDynamoDBAPIMockBatchWriteItemWithContext.RLock()\n\tcalls = mock.calls.BatchWriteItemWithContext\n\tlockDynamoDBAPIMockBatchWriteItemWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "4bdc77e13a14e2f459444fef7ac2440d", "score": "0.56378984", "text": "func (mock *s3ClientMock) DeleteBucketEncryptionWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tDeleteBucketEncryptionInput *s3.DeleteBucketEncryptionInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tDeleteBucketEncryptionInput *s3.DeleteBucketEncryptionInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockDeleteBucketEncryptionWithContext.RLock()\n\tcalls = mock.calls.DeleteBucketEncryptionWithContext\n\tmock.lockDeleteBucketEncryptionWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "78a4078a4ef825aba53b114ca6443d6d", "score": "0.5635089", "text": "func (mock *s3ClientMock) PutBucketPolicyRequestCalls() []struct {\n\tPutBucketPolicyInput *s3.PutBucketPolicyInput\n} {\n\tvar calls []struct {\n\t\tPutBucketPolicyInput *s3.PutBucketPolicyInput\n\t}\n\tmock.lockPutBucketPolicyRequest.RLock()\n\tcalls = mock.calls.PutBucketPolicyRequest\n\tmock.lockPutBucketPolicyRequest.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "c719ead085ad4b980a02fbf2272dca5e", "score": "0.5632316", "text": "func (mock *s3ClientMock) WaitUntilBucketExistsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tHeadBucketInput *s3.HeadBucketInput\n\tWaiterOptions []request.WaiterOption\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tHeadBucketInput *s3.HeadBucketInput\n\t\tWaiterOptions []request.WaiterOption\n\t}\n\tmock.lockWaitUntilBucketExistsWithContext.RLock()\n\tcalls = mock.calls.WaitUntilBucketExistsWithContext\n\tmock.lockWaitUntilBucketExistsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "022489301241b234efa2437a9dcf6e1c", "score": "0.56293863", "text": "func (mock *s3ClientMock) GetBucketAclWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketAclInput *s3.GetBucketAclInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketAclInput *s3.GetBucketAclInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketAclWithContext.RLock()\n\tcalls = mock.calls.GetBucketAclWithContext\n\tmock.lockGetBucketAclWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "d680c2782d5e856dd0ab3092e9c73b1e", "score": "0.5624496", "text": "func (mock *s3ClientMock) DeleteBucketLifecycleWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tDeleteBucketLifecycleInput *s3.DeleteBucketLifecycleInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tDeleteBucketLifecycleInput *s3.DeleteBucketLifecycleInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockDeleteBucketLifecycleWithContext.RLock()\n\tcalls = mock.calls.DeleteBucketLifecycleWithContext\n\tmock.lockDeleteBucketLifecycleWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "52c8d4bf93425e9782d3e332882fa615", "score": "0.5583768", "text": "func (mock *s3ClientMock) PutObjectLegalHoldCalls() []struct {\n\tPutObjectLegalHoldInput *s3.PutObjectLegalHoldInput\n} {\n\tvar calls []struct {\n\t\tPutObjectLegalHoldInput *s3.PutObjectLegalHoldInput\n\t}\n\tmock.lockPutObjectLegalHold.RLock()\n\tcalls = mock.calls.PutObjectLegalHold\n\tmock.lockPutObjectLegalHold.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "a9b07ff379c1b8cd50d97d6a8b46e537", "score": "0.55721045", "text": "func (mock *s3ClientMock) DeleteBucketTaggingWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tDeleteBucketTaggingInput *s3.DeleteBucketTaggingInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tDeleteBucketTaggingInput *s3.DeleteBucketTaggingInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockDeleteBucketTaggingWithContext.RLock()\n\tcalls = mock.calls.DeleteBucketTaggingWithContext\n\tmock.lockDeleteBucketTaggingWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "f0d0652e64daa071cb6d1f40e1cd3a09", "score": "0.55694544", "text": "func (mock *s3ClientMock) GetObjectTaggingWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetObjectTaggingInput *s3.GetObjectTaggingInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetObjectTaggingInput *s3.GetObjectTaggingInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetObjectTaggingWithContext.RLock()\n\tcalls = mock.calls.GetObjectTaggingWithContext\n\tmock.lockGetObjectTaggingWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "e861bcb2f34596c8c9da27f44979911a", "score": "0.55664617", "text": "func (mock *DynamoDBAPIMock) UpdateGlobalTableSettingsWithContextCalls() []struct {\n\tIn1 context.Context\n\tIn2 *dynamodb.UpdateGlobalTableSettingsInput\n\tIn3 []request.Option\n} {\n\tvar calls []struct {\n\t\tIn1 context.Context\n\t\tIn2 *dynamodb.UpdateGlobalTableSettingsInput\n\t\tIn3 []request.Option\n\t}\n\tlockDynamoDBAPIMockUpdateGlobalTableSettingsWithContext.RLock()\n\tcalls = mock.calls.UpdateGlobalTableSettingsWithContext\n\tlockDynamoDBAPIMockUpdateGlobalTableSettingsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "f2c882cfc69f67f95a5830c4e52ea409", "score": "0.55651486", "text": "func (mock *s3ClientMock) DeleteBucketReplicationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tDeleteBucketReplicationInput *s3.DeleteBucketReplicationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tDeleteBucketReplicationInput *s3.DeleteBucketReplicationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockDeleteBucketReplicationWithContext.RLock()\n\tcalls = mock.calls.DeleteBucketReplicationWithContext\n\tmock.lockDeleteBucketReplicationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "c32a2c7f760171c0b70e288ac7be8d64", "score": "0.55589896", "text": "func (mock *s3ClientMock) ListObjectsV2WithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tListObjectsV2Input *s3.ListObjectsV2Input\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tListObjectsV2Input *s3.ListObjectsV2Input\n\t\tOptions []request.Option\n\t}\n\tmock.lockListObjectsV2WithContext.RLock()\n\tcalls = mock.calls.ListObjectsV2WithContext\n\tmock.lockListObjectsV2WithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "19c3235354e7775b01d97378f4d35a9b", "score": "0.5539022", "text": "func (mock *s3ClientMock) GetBucketPolicyStatusWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketPolicyStatusInput *s3.GetBucketPolicyStatusInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketPolicyStatusInput *s3.GetBucketPolicyStatusInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketPolicyStatusWithContext.RLock()\n\tcalls = mock.calls.GetBucketPolicyStatusWithContext\n\tmock.lockGetBucketPolicyStatusWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "1436dd30ea025abfd415b3813f7b1a81", "score": "0.5504119", "text": "func (mock *DynamoDBAPIMock) UpdateContinuousBackupsWithContextCalls() []struct {\n\tIn1 context.Context\n\tIn2 *dynamodb.UpdateContinuousBackupsInput\n\tIn3 []request.Option\n} {\n\tvar calls []struct {\n\t\tIn1 context.Context\n\t\tIn2 *dynamodb.UpdateContinuousBackupsInput\n\t\tIn3 []request.Option\n\t}\n\tlockDynamoDBAPIMockUpdateContinuousBackupsWithContext.RLock()\n\tcalls = mock.calls.UpdateContinuousBackupsWithContext\n\tlockDynamoDBAPIMockUpdateContinuousBackupsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "4735984a9fa2d609c1b8bdaa30ce23d1", "score": "0.5501644", "text": "func (mock *s3ClientMock) AbortMultipartUploadWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tAbortMultipartUploadInput *s3.AbortMultipartUploadInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tAbortMultipartUploadInput *s3.AbortMultipartUploadInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockAbortMultipartUploadWithContext.RLock()\n\tcalls = mock.calls.AbortMultipartUploadWithContext\n\tmock.lockAbortMultipartUploadWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "fb9725936936e6c79d3c8f2d410734b4", "score": "0.5498955", "text": "func (mock *DynamoDBAPIMock) UpdateTableReplicaAutoScalingWithContextCalls() []struct {\n\tIn1 context.Context\n\tIn2 *dynamodb.UpdateTableReplicaAutoScalingInput\n\tIn3 []request.Option\n} {\n\tvar calls []struct {\n\t\tIn1 context.Context\n\t\tIn2 *dynamodb.UpdateTableReplicaAutoScalingInput\n\t\tIn3 []request.Option\n\t}\n\tlockDynamoDBAPIMockUpdateTableReplicaAutoScalingWithContext.RLock()\n\tcalls = mock.calls.UpdateTableReplicaAutoScalingWithContext\n\tlockDynamoDBAPIMockUpdateTableReplicaAutoScalingWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "ffe5881a1ad67b62d34456afda958a0d", "score": "0.5496624", "text": "func (mock *s3ClientMock) GetPublicAccessBlockWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetPublicAccessBlockInput *s3.GetPublicAccessBlockInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetPublicAccessBlockInput *s3.GetPublicAccessBlockInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetPublicAccessBlockWithContext.RLock()\n\tcalls = mock.calls.GetPublicAccessBlockWithContext\n\tmock.lockGetPublicAccessBlockWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "efa1caf47e7888ef17364ff316f414d6", "score": "0.5491469", "text": "func (mock *s3ClientMock) PutBucketReplicationCalls() []struct {\n\tPutBucketReplicationInput *s3.PutBucketReplicationInput\n} {\n\tvar calls []struct {\n\t\tPutBucketReplicationInput *s3.PutBucketReplicationInput\n\t}\n\tmock.lockPutBucketReplication.RLock()\n\tcalls = mock.calls.PutBucketReplication\n\tmock.lockPutBucketReplication.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "88ee744ea7a25f7161cc885eea14a6ec", "score": "0.54781973", "text": "func (mock *s3ClientMock) GetObjectWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetObjectInput *s3.GetObjectInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetObjectInput *s3.GetObjectInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetObjectWithContext.RLock()\n\tcalls = mock.calls.GetObjectWithContext\n\tmock.lockGetObjectWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "eeac769a5adc3330d88f8a7f3faa649f", "score": "0.54682815", "text": "func (mock *s3ClientMock) PutBucketEncryptionRequestCalls() []struct {\n\tPutBucketEncryptionInput *s3.PutBucketEncryptionInput\n} {\n\tvar calls []struct {\n\t\tPutBucketEncryptionInput *s3.PutBucketEncryptionInput\n\t}\n\tmock.lockPutBucketEncryptionRequest.RLock()\n\tcalls = mock.calls.PutBucketEncryptionRequest\n\tmock.lockPutBucketEncryptionRequest.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "e285f41abee58ea968a58c13110ca46c", "score": "0.5459204", "text": "func (mock *s3ClientMock) PutBucketAccelerateConfigurationCalls() []struct {\n\tPutBucketAccelerateConfigurationInput *s3.PutBucketAccelerateConfigurationInput\n} {\n\tvar calls []struct {\n\t\tPutBucketAccelerateConfigurationInput *s3.PutBucketAccelerateConfigurationInput\n\t}\n\tmock.lockPutBucketAccelerateConfiguration.RLock()\n\tcalls = mock.calls.PutBucketAccelerateConfiguration\n\tmock.lockPutBucketAccelerateConfiguration.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "56475feaec705a49a4e3321e2dfb31e2", "score": "0.5444619", "text": "func (mr *MockBucketMockRecorder) PutCORSWithContext(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"PutCORSWithContext\", reflect.TypeOf((*MockBucket)(nil).PutCORSWithContext), arg0, arg1)\n}", "title": "" }, { "docid": "b9067e26d43b7fe7d50046123f20c21e", "score": "0.5442101", "text": "func (mock *s3ClientMock) GetBucketRequestPaymentWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketRequestPaymentInput *s3.GetBucketRequestPaymentInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketRequestPaymentInput *s3.GetBucketRequestPaymentInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketRequestPaymentWithContext.RLock()\n\tcalls = mock.calls.GetBucketRequestPaymentWithContext\n\tmock.lockGetBucketRequestPaymentWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "504635751b31111a6755cffa2148cf47", "score": "0.54395896", "text": "func (mock *s3ClientMock) WaitUntilBucketNotExistsWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tHeadBucketInput *s3.HeadBucketInput\n\tWaiterOptions []request.WaiterOption\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tHeadBucketInput *s3.HeadBucketInput\n\t\tWaiterOptions []request.WaiterOption\n\t}\n\tmock.lockWaitUntilBucketNotExistsWithContext.RLock()\n\tcalls = mock.calls.WaitUntilBucketNotExistsWithContext\n\tmock.lockWaitUntilBucketNotExistsWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "f66746c194803430d1191a9f226e0daa", "score": "0.5429222", "text": "func (mock *s3ClientMock) PutBucketCorsRequestCalls() []struct {\n\tPutBucketCorsInput *s3.PutBucketCorsInput\n} {\n\tvar calls []struct {\n\t\tPutBucketCorsInput *s3.PutBucketCorsInput\n\t}\n\tmock.lockPutBucketCorsRequest.RLock()\n\tcalls = mock.calls.PutBucketCorsRequest\n\tmock.lockPutBucketCorsRequest.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "73902e96e9823b59b193d7156c56e1fc", "score": "0.54281646", "text": "func (mock *s3ClientMock) GetBucketAccelerateConfigurationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketAccelerateConfigurationInput *s3.GetBucketAccelerateConfigurationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketAccelerateConfigurationInput *s3.GetBucketAccelerateConfigurationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketAccelerateConfigurationWithContext.RLock()\n\tcalls = mock.calls.GetBucketAccelerateConfigurationWithContext\n\tmock.lockGetBucketAccelerateConfigurationWithContext.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "8f3ecbc51e760abcb98146261de1ba04", "score": "0.5425639", "text": "func (mock *s3ClientMock) PutBucketNotificationCalls() []struct {\n\tPutBucketNotificationInput *s3.PutBucketNotificationInput\n} {\n\tvar calls []struct {\n\t\tPutBucketNotificationInput *s3.PutBucketNotificationInput\n\t}\n\tmock.lockPutBucketNotification.RLock()\n\tcalls = mock.calls.PutBucketNotification\n\tmock.lockPutBucketNotification.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "41414c9a743514ad1b5dd9b8220f3308", "score": "0.5411168", "text": "func (mock *s3ClientMock) PutBucketAclRequestCalls() []struct {\n\tPutBucketAclInput *s3.PutBucketAclInput\n} {\n\tvar calls []struct {\n\t\tPutBucketAclInput *s3.PutBucketAclInput\n\t}\n\tmock.lockPutBucketAclRequest.RLock()\n\tcalls = mock.calls.PutBucketAclRequest\n\tmock.lockPutBucketAclRequest.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "ae7fdaccb99dcc8d9094b8fd56600550", "score": "0.54028326", "text": "func (mock *s3ClientMock) GetBucketLocationWithContextCalls() []struct {\n\tContextMoqParam context.Context\n\tGetBucketLocationInput *s3.GetBucketLocationInput\n\tOptions []request.Option\n} {\n\tvar calls []struct {\n\t\tContextMoqParam context.Context\n\t\tGetBucketLocationInput *s3.GetBucketLocationInput\n\t\tOptions []request.Option\n\t}\n\tmock.lockGetBucketLocationWithContext.RLock()\n\tcalls = mock.calls.GetBucketLocationWithContext\n\tmock.lockGetBucketLocationWithContext.RUnlock()\n\treturn calls\n}", "title": "" } ]
4329f5de12b11847551f5e43eede12a7
ToPlain returns the SparseIssuesList converted to IssuesList.
[ { "docid": "0e85088c12a5bbb0f39bf94f4b38e07f", "score": "0.8401815", "text": "func (o SparseIssuesList) ToPlain() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToPlain()\n\t}\n\n\treturn out\n}", "title": "" } ]
[ { "docid": "e18abd7ad3d384b1a3eed5e077043bbd", "score": "0.7102013", "text": "func (o SparseImportsList) ToPlain() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToPlain()\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "df3d11f7db3a2eb940e1e72f2a7709bb", "score": "0.7097494", "text": "func (o *SparseIssue) ToPlain() elemental.PlainIdentifiable {\n\n\tout := NewIssue()\n\tif o.Audience != nil {\n\t\tout.Audience = *o.Audience\n\t}\n\tif o.Claims != nil {\n\t\tout.Claims = o.Claims\n\t}\n\tif o.Data != nil {\n\t\tout.Data = *o.Data\n\t}\n\tif o.Metadata != nil {\n\t\tout.Metadata = *o.Metadata\n\t}\n\tif o.Opaque != nil {\n\t\tout.Opaque = *o.Opaque\n\t}\n\tif o.Quota != nil {\n\t\tout.Quota = *o.Quota\n\t}\n\tif o.Realm != nil {\n\t\tout.Realm = *o.Realm\n\t}\n\tif o.RestrictedNamespace != nil {\n\t\tout.RestrictedNamespace = *o.RestrictedNamespace\n\t}\n\tif o.RestrictedNetworks != nil {\n\t\tout.RestrictedNetworks = *o.RestrictedNetworks\n\t}\n\tif o.RestrictedPermissions != nil {\n\t\tout.RestrictedPermissions = *o.RestrictedPermissions\n\t}\n\tif o.Token != nil {\n\t\tout.Token = *o.Token\n\t}\n\tif o.Validity != nil {\n\t\tout.Validity = *o.Validity\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "500fea4ddd3654bdbbaaacea1f2c0455", "score": "0.70872706", "text": "func (o IssuesList) ToSparse(fields ...string) elemental.Identifiables {\n\n\tout := make(SparseIssuesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToSparse(fields...).(*SparseIssue)\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "a1d8145e9afc8d3697929d20a70eba98", "score": "0.7066873", "text": "func (o SparsePingRequestsList) ToPlain() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToPlain()\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "e66d3d52256d729d0428109615bd15a6", "score": "0.7065332", "text": "func (o SparsePUTrafficActionsList) ToPlain() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToPlain()\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "e4a8aac6ecf5d16dbee6843bed9a5a6e", "score": "0.6975078", "text": "func (o SparseAWSAPIGatewaysList) ToPlain() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToPlain()\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "4adda93b5a7c448a46a2f930097472f5", "score": "0.68661094", "text": "func (o SparseCloudScheduledNetworkQueriesList) ToPlain() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToPlain()\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "2711e3c2216bb973a3b5b55f559a4f03", "score": "0.68617153", "text": "func (o SparseOIDCProvidersList) ToPlain() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToPlain()\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "4540d121d680c792a6c6a837d6e2c8bb", "score": "0.68394774", "text": "func (o SparseServiceTokensList) ToPlain() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToPlain()\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "c3826bd396afa31c7b9c769399fad944", "score": "0.6715289", "text": "func (o SparseCallsList) ToPlain() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToPlain()\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "88535ba152b0d80bd9758ae128548255", "score": "0.6634516", "text": "func (o SparsePCCProvidersList) ToPlain() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToPlain()\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "dcb560abb1d97f0d564e37ee11b7c3f4", "score": "0.601636", "text": "func (o SparseIssuesList) List() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i]\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "e51ce9ef60a0ec9e4897c27e40bfe6a2", "score": "0.5943663", "text": "func (o *SparseImport) ToPlain() elemental.PlainIdentifiable {\n\n\tout := NewImport()\n\tif o.Data != nil {\n\t\tout.Data = o.Data\n\t}\n\tif o.Mode != nil {\n\t\tout.Mode = *o.Mode\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "a005ba541b329d9b70ca2a94538b7614", "score": "0.57463974", "text": "func (o *Issue) ToSparse(fields ...string) elemental.SparseIdentifiable {\n\n\tif len(fields) == 0 {\n\t\t// nolint: goimports\n\t\treturn &SparseIssue{\n\t\t\tAudience: &o.Audience,\n\t\t\tClaims: o.Claims,\n\t\t\tData: &o.Data,\n\t\t\tMetadata: &o.Metadata,\n\t\t\tOpaque: &o.Opaque,\n\t\t\tQuota: &o.Quota,\n\t\t\tRealm: &o.Realm,\n\t\t\tRestrictedNamespace: &o.RestrictedNamespace,\n\t\t\tRestrictedNetworks: &o.RestrictedNetworks,\n\t\t\tRestrictedPermissions: &o.RestrictedPermissions,\n\t\t\tToken: &o.Token,\n\t\t\tValidity: &o.Validity,\n\t\t}\n\t}\n\n\tsp := &SparseIssue{}\n\tfor _, f := range fields {\n\t\tswitch f {\n\t\tcase \"audience\":\n\t\t\tsp.Audience = &(o.Audience)\n\t\tcase \"claims\":\n\t\t\tsp.Claims = o.Claims\n\t\tcase \"data\":\n\t\t\tsp.Data = &(o.Data)\n\t\tcase \"metadata\":\n\t\t\tsp.Metadata = &(o.Metadata)\n\t\tcase \"opaque\":\n\t\t\tsp.Opaque = &(o.Opaque)\n\t\tcase \"quota\":\n\t\t\tsp.Quota = &(o.Quota)\n\t\tcase \"realm\":\n\t\t\tsp.Realm = &(o.Realm)\n\t\tcase \"restrictedNamespace\":\n\t\t\tsp.RestrictedNamespace = &(o.RestrictedNamespace)\n\t\tcase \"restrictedNetworks\":\n\t\t\tsp.RestrictedNetworks = &(o.RestrictedNetworks)\n\t\tcase \"restrictedPermissions\":\n\t\t\tsp.RestrictedPermissions = &(o.RestrictedPermissions)\n\t\tcase \"token\":\n\t\t\tsp.Token = &(o.Token)\n\t\tcase \"validity\":\n\t\t\tsp.Validity = &(o.Validity)\n\t\t}\n\t}\n\n\treturn sp\n}", "title": "" }, { "docid": "2c91e5f14026198c581475ec557f1119", "score": "0.5666931", "text": "func (o *SparsePUTrafficAction) ToPlain() elemental.PlainIdentifiable {\n\n\tout := NewPUTrafficAction()\n\tif o.Incoming != nil {\n\t\tout.Incoming = *o.Incoming\n\t}\n\tif o.Outgoing != nil {\n\t\tout.Outgoing = *o.Outgoing\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "509acba669137ceb2e7b8b5d9407ab5f", "score": "0.5550434", "text": "func (o PUTrafficActionsList) ToSparse(fields ...string) elemental.Identifiables {\n\n\tout := make(SparsePUTrafficActionsList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToSparse(fields...).(*SparsePUTrafficAction)\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "ced8a767d7fd42323311b393eb140b89", "score": "0.54773116", "text": "func (o OIDCProvidersList) ToSparse(fields ...string) elemental.Identifiables {\n\n\tout := make(SparseOIDCProvidersList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToSparse(fields...).(*SparseOIDCProvider)\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "a2e9214e74f0ae4386f2860b166108e2", "score": "0.5466408", "text": "func (o *SparsePingRequest) ToPlain() elemental.PlainIdentifiable {\n\n\tout := NewPingRequest()\n\tif o.Iterations != nil {\n\t\tout.Iterations = *o.Iterations\n\t}\n\tif o.PingID != nil {\n\t\tout.PingID = *o.PingID\n\t}\n\tif o.RefreshID != nil {\n\t\tout.RefreshID = *o.RefreshID\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "a282a5898e83e6afe554f9483628ac94", "score": "0.5458526", "text": "func (o CallsList) ToSparse(fields ...string) elemental.Identifiables {\n\n\tout := make(SparseCallsList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToSparse(fields...).(*SparseCall)\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "7688db736dc91b691b3cfa6f0343d342", "score": "0.54449755", "text": "func (o PingRequestsList) ToSparse(fields ...string) elemental.Identifiables {\n\n\tout := make(SparsePingRequestsList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToSparse(fields...).(*SparsePingRequest)\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "d5c3da9e497e1a78a9a2ac4459ec43f7", "score": "0.53915995", "text": "func (o ImportsList) ToSparse(fields ...string) elemental.Identifiables {\n\n\tout := make(SparseImportsList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToSparse(fields...).(*SparseImport)\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "e75680233e3a7691b491cda1ed5c060f", "score": "0.5313363", "text": "func (o *SparseServiceToken) ToPlain() elemental.PlainIdentifiable {\n\n\tout := NewServiceToken()\n\tif o.Audience != nil {\n\t\tout.Audience = *o.Audience\n\t}\n\tif o.ObjectID != nil {\n\t\tout.ObjectID = *o.ObjectID\n\t}\n\tif o.SessionID != nil {\n\t\tout.SessionID = *o.SessionID\n\t}\n\tif o.Token != nil {\n\t\tout.Token = *o.Token\n\t}\n\tif o.Type != nil {\n\t\tout.Type = *o.Type\n\t}\n\tif o.Validity != nil {\n\t\tout.Validity = *o.Validity\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "3110086908693cf1629f7240f89af18b", "score": "0.53083634", "text": "func (o CloudScheduledNetworkQueriesList) ToSparse(fields ...string) elemental.Identifiables {\n\n\tout := make(SparseCloudScheduledNetworkQueriesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToSparse(fields...).(*SparseCloudScheduledNetworkQuery)\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "d97af5fa3fadef5949c43236722caad5", "score": "0.53043014", "text": "func (o *SparseCall) ToPlain() elemental.PlainIdentifiable {\n\n\tout := NewCall()\n\tif o.Payload != nil {\n\t\tout.Payload = *o.Payload\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "d4201e005fffd9520fbce4cf59e7cf49", "score": "0.52790403", "text": "func (o PCCProvidersList) ToSparse(fields ...string) elemental.Identifiables {\n\n\tout := make(SparsePCCProvidersList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToSparse(fields...).(*SparsePCCProvider)\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "58aa3d313e8c6b9c0b2f258dc4414748", "score": "0.52424", "text": "func (o ServiceTokensList) ToSparse(fields ...string) elemental.Identifiables {\n\n\tout := make(SparseServiceTokensList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToSparse(fields...).(*SparseServiceToken)\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "5f081d79973304e002086dadbd979814", "score": "0.5055575", "text": "func (o SparseIssuesList) Identity() elemental.Identity {\n\n\treturn IssueIdentity\n}", "title": "" }, { "docid": "c4041f1eb7dbe9ee1071f573609a1f0c", "score": "0.5050969", "text": "func (o SparseIssuesList) Append(objects ...elemental.Identifiable) elemental.Identifiables {\n\n\tout := append(SparseIssuesList{}, o...)\n\tfor _, obj := range objects {\n\t\tout = append(out, obj.(*SparseIssue))\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "410ee45b89955dbd9cee962881a34373", "score": "0.49738336", "text": "func (o *SparseCloudScheduledNetworkQuery) ToPlain() elemental.PlainIdentifiable {\n\n\tout := NewCloudScheduledNetworkQuery()\n\tif o.ID != nil {\n\t\tout.ID = *o.ID\n\t}\n\tif o.CloudGraphResult != nil {\n\t\tout.CloudGraphResult = o.CloudGraphResult\n\t}\n\tif o.CloudNetworkQuery != nil {\n\t\tout.CloudNetworkQuery = o.CloudNetworkQuery\n\t}\n\tif o.CreateTime != nil {\n\t\tout.CreateTime = *o.CreateTime\n\t}\n\tif o.Disabled != nil {\n\t\tout.Disabled = *o.Disabled\n\t}\n\tif o.LastExecutionTimestamp != nil {\n\t\tout.LastExecutionTimestamp = *o.LastExecutionTimestamp\n\t}\n\tif o.MigrationsLog != nil {\n\t\tout.MigrationsLog = *o.MigrationsLog\n\t}\n\tif o.Namespace != nil {\n\t\tout.Namespace = *o.Namespace\n\t}\n\tif o.PrismaCloudAlertRuleID != nil {\n\t\tout.PrismaCloudAlertRuleID = *o.PrismaCloudAlertRuleID\n\t}\n\tif o.PrismaCloudPolicyID != nil {\n\t\tout.PrismaCloudPolicyID = *o.PrismaCloudPolicyID\n\t}\n\tif o.TenantPrismaID != nil {\n\t\tout.TenantPrismaID = *o.TenantPrismaID\n\t}\n\tif o.UpdateTime != nil {\n\t\tout.UpdateTime = *o.UpdateTime\n\t}\n\tif o.ZHash != nil {\n\t\tout.ZHash = *o.ZHash\n\t}\n\tif o.Zone != nil {\n\t\tout.Zone = *o.Zone\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "f58691afc6474e18917805506aba94a8", "score": "0.49003327", "text": "func (o *SparseOIDCProvider) ToPlain() elemental.PlainIdentifiable {\n\n\tout := NewOIDCProvider()\n\tif o.ID != nil {\n\t\tout.ID = *o.ID\n\t}\n\tif o.Annotations != nil {\n\t\tout.Annotations = *o.Annotations\n\t}\n\tif o.AssociatedTags != nil {\n\t\tout.AssociatedTags = *o.AssociatedTags\n\t}\n\tif o.CertificateAuthority != nil {\n\t\tout.CertificateAuthority = *o.CertificateAuthority\n\t}\n\tif o.ClientID != nil {\n\t\tout.ClientID = *o.ClientID\n\t}\n\tif o.ClientSecret != nil {\n\t\tout.ClientSecret = *o.ClientSecret\n\t}\n\tif o.CreateIdempotencyKey != nil {\n\t\tout.CreateIdempotencyKey = *o.CreateIdempotencyKey\n\t}\n\tif o.CreateTime != nil {\n\t\tout.CreateTime = *o.CreateTime\n\t}\n\tif o.Default != nil {\n\t\tout.Default = *o.Default\n\t}\n\tif o.Description != nil {\n\t\tout.Description = *o.Description\n\t}\n\tif o.Endpoint != nil {\n\t\tout.Endpoint = *o.Endpoint\n\t}\n\tif o.MigrationsLog != nil {\n\t\tout.MigrationsLog = *o.MigrationsLog\n\t}\n\tif o.Name != nil {\n\t\tout.Name = *o.Name\n\t}\n\tif o.Namespace != nil {\n\t\tout.Namespace = *o.Namespace\n\t}\n\tif o.NormalizedTags != nil {\n\t\tout.NormalizedTags = *o.NormalizedTags\n\t}\n\tif o.ParentID != nil {\n\t\tout.ParentID = *o.ParentID\n\t}\n\tif o.ParentName != nil {\n\t\tout.ParentName = *o.ParentName\n\t}\n\tif o.Protected != nil {\n\t\tout.Protected = *o.Protected\n\t}\n\tif o.Scopes != nil {\n\t\tout.Scopes = *o.Scopes\n\t}\n\tif o.Subjects != nil {\n\t\tout.Subjects = *o.Subjects\n\t}\n\tif o.UpdateIdempotencyKey != nil {\n\t\tout.UpdateIdempotencyKey = *o.UpdateIdempotencyKey\n\t}\n\tif o.UpdateTime != nil {\n\t\tout.UpdateTime = *o.UpdateTime\n\t}\n\tif o.ZHash != nil {\n\t\tout.ZHash = *o.ZHash\n\t}\n\tif o.Zone != nil {\n\t\tout.Zone = *o.Zone\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "d7d731e6091c184ed5f077701141a7e8", "score": "0.48199356", "text": "func (o SparseIssuesList) Copy() elemental.Identifiables {\n\n\tcopy := append(SparseIssuesList{}, o...)\n\treturn &copy\n}", "title": "" }, { "docid": "cbb4c4d2c493be745331b17d5e397190", "score": "0.47723237", "text": "func (o *SparseIssue) DeepCopy() *SparseIssue {\n\n\tif o == nil {\n\t\treturn nil\n\t}\n\n\tout := &SparseIssue{}\n\to.DeepCopyInto(out)\n\n\treturn out\n}", "title": "" }, { "docid": "ab536ac88d8898546d911a8cdafea9b5", "score": "0.47329506", "text": "func (o AWSAPIGatewaysList) ToSparse(fields ...string) elemental.Identifiables {\n\n\tout := make(SparseAWSAPIGatewaysList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i].ToSparse(fields...).(*SparseAWSAPIGateway)\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "c7753d454ce112499118410d3e890b10", "score": "0.46545288", "text": "func (o *SparsePCCProvider) ToPlain() elemental.PlainIdentifiable {\n\n\tout := NewPCCProvider()\n\tif o.ID != nil {\n\t\tout.ID = *o.ID\n\t}\n\tif o.Annotations != nil {\n\t\tout.Annotations = *o.Annotations\n\t}\n\tif o.AssociatedTags != nil {\n\t\tout.AssociatedTags = *o.AssociatedTags\n\t}\n\tif o.CertificateAuthority != nil {\n\t\tout.CertificateAuthority = *o.CertificateAuthority\n\t}\n\tif o.CreateIdempotencyKey != nil {\n\t\tout.CreateIdempotencyKey = *o.CreateIdempotencyKey\n\t}\n\tif o.CreateTime != nil {\n\t\tout.CreateTime = *o.CreateTime\n\t}\n\tif o.Default != nil {\n\t\tout.Default = *o.Default\n\t}\n\tif o.Endpoint != nil {\n\t\tout.Endpoint = *o.Endpoint\n\t}\n\tif o.MigrationsLog != nil {\n\t\tout.MigrationsLog = *o.MigrationsLog\n\t}\n\tif o.Name != nil {\n\t\tout.Name = *o.Name\n\t}\n\tif o.Namespace != nil {\n\t\tout.Namespace = *o.Namespace\n\t}\n\tif o.NormalizedTags != nil {\n\t\tout.NormalizedTags = *o.NormalizedTags\n\t}\n\tif o.Protected != nil {\n\t\tout.Protected = *o.Protected\n\t}\n\tif o.UpdateIdempotencyKey != nil {\n\t\tout.UpdateIdempotencyKey = *o.UpdateIdempotencyKey\n\t}\n\tif o.UpdateTime != nil {\n\t\tout.UpdateTime = *o.UpdateTime\n\t}\n\tif o.ZHash != nil {\n\t\tout.ZHash = *o.ZHash\n\t}\n\tif o.Zone != nil {\n\t\tout.Zone = *o.Zone\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "dbf8e79a65c470149a6e2d2f6c95370a", "score": "0.45532122", "text": "func (o *PUTrafficAction) ToSparse(fields ...string) elemental.SparseIdentifiable {\n\n\tif len(fields) == 0 {\n\t\t// nolint: goimports\n\t\treturn &SparsePUTrafficAction{\n\t\t\tIncoming: &o.Incoming,\n\t\t\tOutgoing: &o.Outgoing,\n\t\t}\n\t}\n\n\tsp := &SparsePUTrafficAction{}\n\tfor _, f := range fields {\n\t\tswitch f {\n\t\tcase \"Incoming\":\n\t\t\tsp.Incoming = &(o.Incoming)\n\t\tcase \"Outgoing\":\n\t\t\tsp.Outgoing = &(o.Outgoing)\n\t\t}\n\t}\n\n\treturn sp\n}", "title": "" }, { "docid": "82d8f2f120d768ad2f4e979ef77df997", "score": "0.4546944", "text": "func NewSparseIssue() *SparseIssue {\n\treturn &SparseIssue{}\n}", "title": "" }, { "docid": "8404cc36448bc817b80ae20946d33f2b", "score": "0.45391634", "text": "func (o IssuesList) List() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i]\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "8568d36931ab386d2eec8bf9bb04b392", "score": "0.4529513", "text": "func (o *OIDCProvider) ToSparse(fields ...string) elemental.SparseIdentifiable {\n\n\tif len(fields) == 0 {\n\t\t// nolint: goimports\n\t\treturn &SparseOIDCProvider{\n\t\t\tID: &o.ID,\n\t\t\tAnnotations: &o.Annotations,\n\t\t\tAssociatedTags: &o.AssociatedTags,\n\t\t\tCertificateAuthority: &o.CertificateAuthority,\n\t\t\tClientID: &o.ClientID,\n\t\t\tClientSecret: &o.ClientSecret,\n\t\t\tCreateIdempotencyKey: &o.CreateIdempotencyKey,\n\t\t\tCreateTime: &o.CreateTime,\n\t\t\tDefault: &o.Default,\n\t\t\tDescription: &o.Description,\n\t\t\tEndpoint: &o.Endpoint,\n\t\t\tMigrationsLog: &o.MigrationsLog,\n\t\t\tName: &o.Name,\n\t\t\tNamespace: &o.Namespace,\n\t\t\tNormalizedTags: &o.NormalizedTags,\n\t\t\tParentID: &o.ParentID,\n\t\t\tParentName: &o.ParentName,\n\t\t\tProtected: &o.Protected,\n\t\t\tScopes: &o.Scopes,\n\t\t\tSubjects: &o.Subjects,\n\t\t\tUpdateIdempotencyKey: &o.UpdateIdempotencyKey,\n\t\t\tUpdateTime: &o.UpdateTime,\n\t\t\tZHash: &o.ZHash,\n\t\t\tZone: &o.Zone,\n\t\t}\n\t}\n\n\tsp := &SparseOIDCProvider{}\n\tfor _, f := range fields {\n\t\tswitch f {\n\t\tcase \"ID\":\n\t\t\tsp.ID = &(o.ID)\n\t\tcase \"annotations\":\n\t\t\tsp.Annotations = &(o.Annotations)\n\t\tcase \"associatedTags\":\n\t\t\tsp.AssociatedTags = &(o.AssociatedTags)\n\t\tcase \"certificateAuthority\":\n\t\t\tsp.CertificateAuthority = &(o.CertificateAuthority)\n\t\tcase \"clientID\":\n\t\t\tsp.ClientID = &(o.ClientID)\n\t\tcase \"clientSecret\":\n\t\t\tsp.ClientSecret = &(o.ClientSecret)\n\t\tcase \"createIdempotencyKey\":\n\t\t\tsp.CreateIdempotencyKey = &(o.CreateIdempotencyKey)\n\t\tcase \"createTime\":\n\t\t\tsp.CreateTime = &(o.CreateTime)\n\t\tcase \"default\":\n\t\t\tsp.Default = &(o.Default)\n\t\tcase \"description\":\n\t\t\tsp.Description = &(o.Description)\n\t\tcase \"endpoint\":\n\t\t\tsp.Endpoint = &(o.Endpoint)\n\t\tcase \"migrationsLog\":\n\t\t\tsp.MigrationsLog = &(o.MigrationsLog)\n\t\tcase \"name\":\n\t\t\tsp.Name = &(o.Name)\n\t\tcase \"namespace\":\n\t\t\tsp.Namespace = &(o.Namespace)\n\t\tcase \"normalizedTags\":\n\t\t\tsp.NormalizedTags = &(o.NormalizedTags)\n\t\tcase \"parentID\":\n\t\t\tsp.ParentID = &(o.ParentID)\n\t\tcase \"parentName\":\n\t\t\tsp.ParentName = &(o.ParentName)\n\t\tcase \"protected\":\n\t\t\tsp.Protected = &(o.Protected)\n\t\tcase \"scopes\":\n\t\t\tsp.Scopes = &(o.Scopes)\n\t\tcase \"subjects\":\n\t\t\tsp.Subjects = &(o.Subjects)\n\t\tcase \"updateIdempotencyKey\":\n\t\t\tsp.UpdateIdempotencyKey = &(o.UpdateIdempotencyKey)\n\t\tcase \"updateTime\":\n\t\t\tsp.UpdateTime = &(o.UpdateTime)\n\t\tcase \"zHash\":\n\t\t\tsp.ZHash = &(o.ZHash)\n\t\tcase \"zone\":\n\t\t\tsp.Zone = &(o.Zone)\n\t\t}\n\t}\n\n\treturn sp\n}", "title": "" }, { "docid": "87c14fdcbd60bb56ec9ae53e1d218ca3", "score": "0.45168942", "text": "func (o *Call) ToSparse(fields ...string) elemental.SparseIdentifiable {\n\n\tif len(fields) == 0 {\n\t\t// nolint: goimports\n\t\treturn &SparseCall{\n\t\t\tPayload: &o.Payload,\n\t\t}\n\t}\n\n\tsp := &SparseCall{}\n\tfor _, f := range fields {\n\t\tswitch f {\n\t\tcase \"payload\":\n\t\t\tsp.Payload = &(o.Payload)\n\t\t}\n\t}\n\n\treturn sp\n}", "title": "" }, { "docid": "36dea08eddd983c208471027153ce797", "score": "0.44669873", "text": "func (o *Import) ToSparse(fields ...string) elemental.SparseIdentifiable {\n\n\tif len(fields) == 0 {\n\t\t// nolint: goimports\n\t\treturn &SparseImport{\n\t\t\tData: o.Data,\n\t\t\tMode: &o.Mode,\n\t\t}\n\t}\n\n\tsp := &SparseImport{}\n\tfor _, f := range fields {\n\t\tswitch f {\n\t\tcase \"data\":\n\t\t\tsp.Data = o.Data\n\t\tcase \"mode\":\n\t\t\tsp.Mode = &(o.Mode)\n\t\t}\n\t}\n\n\treturn sp\n}", "title": "" }, { "docid": "d941a034439e51670c5ce35e2465314c", "score": "0.44436064", "text": "func (o *PingRequest) ToSparse(fields ...string) elemental.SparseIdentifiable {\n\n\tif len(fields) == 0 {\n\t\t// nolint: goimports\n\t\treturn &SparsePingRequest{\n\t\t\tIterations: &o.Iterations,\n\t\t\tPingID: &o.PingID,\n\t\t\tRefreshID: &o.RefreshID,\n\t\t}\n\t}\n\n\tsp := &SparsePingRequest{}\n\tfor _, f := range fields {\n\t\tswitch f {\n\t\tcase \"iterations\":\n\t\t\tsp.Iterations = &(o.Iterations)\n\t\tcase \"pingID\":\n\t\t\tsp.PingID = &(o.PingID)\n\t\tcase \"refreshID\":\n\t\t\tsp.RefreshID = &(o.RefreshID)\n\t\t}\n\t}\n\n\treturn sp\n}", "title": "" }, { "docid": "f3d9e18c2c34dbbedde3d13a42289c2e", "score": "0.43462998", "text": "func (o SparseImportsList) List() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i]\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "76bde6010fdf7f069d066bc8c97bcc4e", "score": "0.43336886", "text": "func (o *Issue) Patch(sparse elemental.SparseIdentifiable) {\n\tif !sparse.Identity().IsEqual(o.Identity()) {\n\t\tpanic(\"cannot patch from a parse with different identity\")\n\t}\n\n\tso := sparse.(*SparseIssue)\n\tif so.Audience != nil {\n\t\to.Audience = *so.Audience\n\t}\n\tif so.Claims != nil {\n\t\to.Claims = so.Claims\n\t}\n\tif so.Data != nil {\n\t\to.Data = *so.Data\n\t}\n\tif so.Metadata != nil {\n\t\to.Metadata = *so.Metadata\n\t}\n\tif so.Opaque != nil {\n\t\to.Opaque = *so.Opaque\n\t}\n\tif so.Quota != nil {\n\t\to.Quota = *so.Quota\n\t}\n\tif so.Realm != nil {\n\t\to.Realm = *so.Realm\n\t}\n\tif so.RestrictedNamespace != nil {\n\t\to.RestrictedNamespace = *so.RestrictedNamespace\n\t}\n\tif so.RestrictedNetworks != nil {\n\t\to.RestrictedNetworks = *so.RestrictedNetworks\n\t}\n\tif so.RestrictedPermissions != nil {\n\t\to.RestrictedPermissions = *so.RestrictedPermissions\n\t}\n\tif so.Token != nil {\n\t\to.Token = *so.Token\n\t}\n\tif so.Validity != nil {\n\t\to.Validity = *so.Validity\n\t}\n}", "title": "" }, { "docid": "f7bb4e7eb5eb897584ee13904929ed77", "score": "0.4331249", "text": "func (o *ServiceToken) ToSparse(fields ...string) elemental.SparseIdentifiable {\n\n\tif len(fields) == 0 {\n\t\t// nolint: goimports\n\t\treturn &SparseServiceToken{\n\t\t\tAudience: &o.Audience,\n\t\t\tObjectID: &o.ObjectID,\n\t\t\tSessionID: &o.SessionID,\n\t\t\tToken: &o.Token,\n\t\t\tType: &o.Type,\n\t\t\tValidity: &o.Validity,\n\t\t}\n\t}\n\n\tsp := &SparseServiceToken{}\n\tfor _, f := range fields {\n\t\tswitch f {\n\t\tcase \"audience\":\n\t\t\tsp.Audience = &(o.Audience)\n\t\tcase \"objectID\":\n\t\t\tsp.ObjectID = &(o.ObjectID)\n\t\tcase \"sessionID\":\n\t\t\tsp.SessionID = &(o.SessionID)\n\t\tcase \"token\":\n\t\t\tsp.Token = &(o.Token)\n\t\tcase \"type\":\n\t\t\tsp.Type = &(o.Type)\n\t\tcase \"validity\":\n\t\t\tsp.Validity = &(o.Validity)\n\t\t}\n\t}\n\n\treturn sp\n}", "title": "" }, { "docid": "19ce1ea964daabc0e5038b155b61f6d5", "score": "0.4304248", "text": "func sanitizeNotes(notes []*gitlab.Note) []*gitlab.Note {\n\tres := make([]*gitlab.Note, 0, len(notes))\n\tfor _, note := range notes {\n\t\tif note.Resolvable {\n\t\t\tres = append(res, note)\n\t\t}\n\t}\n\treturn res\n}", "title": "" }, { "docid": "bc33de19151b880c40add0eda546997e", "score": "0.43000022", "text": "func (o *CloudScheduledNetworkQuery) ToSparse(fields ...string) elemental.SparseIdentifiable {\n\n\tif len(fields) == 0 {\n\t\t// nolint: goimports\n\t\treturn &SparseCloudScheduledNetworkQuery{\n\t\t\tID: &o.ID,\n\t\t\tCloudGraphResult: o.CloudGraphResult,\n\t\t\tCloudNetworkQuery: o.CloudNetworkQuery,\n\t\t\tCreateTime: &o.CreateTime,\n\t\t\tDisabled: &o.Disabled,\n\t\t\tLastExecutionTimestamp: &o.LastExecutionTimestamp,\n\t\t\tMigrationsLog: &o.MigrationsLog,\n\t\t\tNamespace: &o.Namespace,\n\t\t\tPrismaCloudAlertRuleID: &o.PrismaCloudAlertRuleID,\n\t\t\tPrismaCloudPolicyID: &o.PrismaCloudPolicyID,\n\t\t\tTenantPrismaID: &o.TenantPrismaID,\n\t\t\tUpdateTime: &o.UpdateTime,\n\t\t\tZHash: &o.ZHash,\n\t\t\tZone: &o.Zone,\n\t\t}\n\t}\n\n\tsp := &SparseCloudScheduledNetworkQuery{}\n\tfor _, f := range fields {\n\t\tswitch f {\n\t\tcase \"ID\":\n\t\t\tsp.ID = &(o.ID)\n\t\tcase \"cloudGraphResult\":\n\t\t\tsp.CloudGraphResult = o.CloudGraphResult\n\t\tcase \"cloudNetworkQuery\":\n\t\t\tsp.CloudNetworkQuery = o.CloudNetworkQuery\n\t\tcase \"createTime\":\n\t\t\tsp.CreateTime = &(o.CreateTime)\n\t\tcase \"disabled\":\n\t\t\tsp.Disabled = &(o.Disabled)\n\t\tcase \"lastExecutionTimestamp\":\n\t\t\tsp.LastExecutionTimestamp = &(o.LastExecutionTimestamp)\n\t\tcase \"migrationsLog\":\n\t\t\tsp.MigrationsLog = &(o.MigrationsLog)\n\t\tcase \"namespace\":\n\t\t\tsp.Namespace = &(o.Namespace)\n\t\tcase \"prismaCloudAlertRuleID\":\n\t\t\tsp.PrismaCloudAlertRuleID = &(o.PrismaCloudAlertRuleID)\n\t\tcase \"prismaCloudPolicyID\":\n\t\t\tsp.PrismaCloudPolicyID = &(o.PrismaCloudPolicyID)\n\t\tcase \"tenantPrismaID\":\n\t\t\tsp.TenantPrismaID = &(o.TenantPrismaID)\n\t\tcase \"updateTime\":\n\t\t\tsp.UpdateTime = &(o.UpdateTime)\n\t\tcase \"zHash\":\n\t\t\tsp.ZHash = &(o.ZHash)\n\t\tcase \"zone\":\n\t\t\tsp.Zone = &(o.Zone)\n\t\t}\n\t}\n\n\treturn sp\n}", "title": "" }, { "docid": "aaa02f8fe918bdd85d1da648bf03ff9f", "score": "0.42889327", "text": "func FromSparseGrid(vals []int, score uint32) *Grid {\n\tg := NewGrid()\n\tg.Score = score\n\tfor i := 0; i < len(vals); i += 3 {\n\t\tg.Tiles[vals[i]][vals[i+1]] = GridNum(vals[i+2])\n\t}\n\treturn g\n}", "title": "" }, { "docid": "3fe90ccd9f018fdc0b6a4504576b3781", "score": "0.42748672", "text": "func (o SparsePingRequestsList) List() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i]\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "4e2ffc7bb029e8356bba1f2764b34641", "score": "0.4215242", "text": "func (o SparsePUTrafficActionsList) List() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i]\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "c8422fc86319854db381d6f9ab4cc0c4", "score": "0.42064396", "text": "func (o *PCCProvider) ToSparse(fields ...string) elemental.SparseIdentifiable {\n\n\tif len(fields) == 0 {\n\t\t// nolint: goimports\n\t\treturn &SparsePCCProvider{\n\t\t\tID: &o.ID,\n\t\t\tAnnotations: &o.Annotations,\n\t\t\tAssociatedTags: &o.AssociatedTags,\n\t\t\tCertificateAuthority: &o.CertificateAuthority,\n\t\t\tCreateIdempotencyKey: &o.CreateIdempotencyKey,\n\t\t\tCreateTime: &o.CreateTime,\n\t\t\tDefault: &o.Default,\n\t\t\tEndpoint: &o.Endpoint,\n\t\t\tMigrationsLog: &o.MigrationsLog,\n\t\t\tName: &o.Name,\n\t\t\tNamespace: &o.Namespace,\n\t\t\tNormalizedTags: &o.NormalizedTags,\n\t\t\tProtected: &o.Protected,\n\t\t\tUpdateIdempotencyKey: &o.UpdateIdempotencyKey,\n\t\t\tUpdateTime: &o.UpdateTime,\n\t\t\tZHash: &o.ZHash,\n\t\t\tZone: &o.Zone,\n\t\t}\n\t}\n\n\tsp := &SparsePCCProvider{}\n\tfor _, f := range fields {\n\t\tswitch f {\n\t\tcase \"ID\":\n\t\t\tsp.ID = &(o.ID)\n\t\tcase \"annotations\":\n\t\t\tsp.Annotations = &(o.Annotations)\n\t\tcase \"associatedTags\":\n\t\t\tsp.AssociatedTags = &(o.AssociatedTags)\n\t\tcase \"certificateAuthority\":\n\t\t\tsp.CertificateAuthority = &(o.CertificateAuthority)\n\t\tcase \"createIdempotencyKey\":\n\t\t\tsp.CreateIdempotencyKey = &(o.CreateIdempotencyKey)\n\t\tcase \"createTime\":\n\t\t\tsp.CreateTime = &(o.CreateTime)\n\t\tcase \"default\":\n\t\t\tsp.Default = &(o.Default)\n\t\tcase \"endpoint\":\n\t\t\tsp.Endpoint = &(o.Endpoint)\n\t\tcase \"migrationsLog\":\n\t\t\tsp.MigrationsLog = &(o.MigrationsLog)\n\t\tcase \"name\":\n\t\t\tsp.Name = &(o.Name)\n\t\tcase \"namespace\":\n\t\t\tsp.Namespace = &(o.Namespace)\n\t\tcase \"normalizedTags\":\n\t\t\tsp.NormalizedTags = &(o.NormalizedTags)\n\t\tcase \"protected\":\n\t\t\tsp.Protected = &(o.Protected)\n\t\tcase \"updateIdempotencyKey\":\n\t\t\tsp.UpdateIdempotencyKey = &(o.UpdateIdempotencyKey)\n\t\tcase \"updateTime\":\n\t\t\tsp.UpdateTime = &(o.UpdateTime)\n\t\tcase \"zHash\":\n\t\t\tsp.ZHash = &(o.ZHash)\n\t\tcase \"zone\":\n\t\t\tsp.Zone = &(o.Zone)\n\t\t}\n\t}\n\n\treturn sp\n}", "title": "" }, { "docid": "e72cdee0a15c2ac8aa6cf60f303c7ba0", "score": "0.41547772", "text": "func (o SparseOIDCProvidersList) List() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i]\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "37accad519f3c236a51cc6f0937e3a97", "score": "0.41547388", "text": "func (o SparseServiceTokensList) List() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i]\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "59df298e5b844aa8e02ba2606abb7e33", "score": "0.41456902", "text": "func (o SparseIssuesList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "title": "" }, { "docid": "98b154cb1d02e6b9f8d903b799f747d4", "score": "0.41328785", "text": "func (t *Tagger) SparseTostr(str string) string {\n\ts := C.CString(str)\n\tt.memorize.Cache(\"SparseTostr\", s)\n\t// defer C.free(unsafe.Pointer(s))\n\treturn (C.GoString)(C.mecab_sparse_tostr(t.toMecabT(), s))\n}", "title": "" }, { "docid": "3b677235cc229814ec467c2234b6ee6e", "score": "0.41229373", "text": "func (o SparseIssuesList) Version() int {\n\n\treturn 1\n}", "title": "" }, { "docid": "69f27dd8ab92a6d8058d17ac3e1ad0e3", "score": "0.40857512", "text": "func (src *AzureClusterList) ConvertTo(dstRaw conversion.Hub) error { // nolint\n\tdst := dstRaw.(*infrav1alpha3.AzureClusterList)\n\treturn Convert_v1alpha2_AzureClusterList_To_v1alpha3_AzureClusterList(src, dst, nil)\n}", "title": "" }, { "docid": "5e71f1e677ea546eed700454a64ac82a", "score": "0.4029785", "text": "func (ml *MsgList) ToModel() []*models.TimestampedString {\n\treturn ml.tssList\n}", "title": "" }, { "docid": "9f7b9608e955f1d63468ddb11fa653d7", "score": "0.40086716", "text": "func WarningListToString(list []*ent.Warning) string {\n\tvar sb strings.Builder\n\tfor _, warning := range list {\n\t\tsb.WriteString(fmt.Sprintf(\"- %s\", warning.Reason))\n\t\tsb.WriteString(fmt.Sprintf(\" - Issued %s\", timeago.English.Format(warning.Date)))\n\t\tsb.WriteString(fmt.Sprintf(\" - Issued by <@%d>\\n\", warning.QueryIssuedBy().FirstX(context.Background()).ID))\n\t}\n\treturn sb.String()\n}", "title": "" }, { "docid": "2b8852afdf9ac54330dbe6e4d26ed992", "score": "0.40055448", "text": "func (s *Sparse) String() string {\n\tvar buf bytes.Buffer\n\tbuf.WriteByte('{')\n\ts.forEach(func(x int) {\n\t\tif buf.Len() > 1 {\n\t\t\tbuf.WriteByte(' ')\n\t\t}\n\t\tfmt.Fprintf(&buf, \"%d\", x)\n\t})\n\tbuf.WriteByte('}')\n\treturn buf.String()\n}", "title": "" }, { "docid": "5e9dcaa40fc6aa60e2a23c7b195eae93", "score": "0.40036348", "text": "func (o SparseAWSAPIGatewaysList) List() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i]\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "04b7a191cfa21e53ae86af5588b9236e", "score": "0.4000542", "text": "func (t *Tagger) SparseTostr2(str string, l C.size_t) string {\n\ts := C.CString(str)\n\tt.memorize.Cache(\"SparseTostr2\", s)\n\t// defer C.free(unsafe.Pointer(s))\n\treturn (C.GoString)(C.mecab_sparse_tostr2(t.toMecabT(), s, l))\n}", "title": "" }, { "docid": "4210c483f7efaecd533d562784dac43c", "score": "0.39919084", "text": "func (s *HLL) SparsePrecision() uint8 {\n\treturn s.sparsePrecision\n}", "title": "" }, { "docid": "2d3a62be8d343a1c368987df14c39905", "score": "0.39911476", "text": "func GetIssuesSprint(sprintID int) []Issue {\n\tissues, _, err := JIRACLIENT.Sprint.GetIssuesForSprint(sprintID)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tvar myIssues []Issue\n\n\tfor _, issue := range issues {\n\t\t//customFields, _, err := JIRACLIENT.Issue.GetCustomFields(issue.ID)\n\t\tif err != nil {\n\t\t\tfmt.Println(err.Error())\n\t\t}\n\n\t\tvar iss Issue\n\n\t\tiss.Key = issue.Key\n\t\tiss.Summary = issue.Fields.Summary\n\t\tif issue.Fields.Epic != nil {\n\t\t\tiss.EpicKey = issue.Fields.Epic.Key\n\t\t\tiss.EpicName = issue.Fields.Epic.Name\n\t\t}\n\t\tmyIssues = append(myIssues, iss)\n\t}\n\n\treturn myIssues\n}", "title": "" }, { "docid": "1fe1c6767e5aaeeeb7e9ff249fe15d49", "score": "0.399061", "text": "func (o SparseCloudScheduledNetworkQueriesList) List() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i]\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "b2536f4845bcbde1928083bf970c770a", "score": "0.39877173", "text": "func List(cmd *cobra.Command, _ []string) {\n\tserver := viper.GetString(\"server\")\n\tproject := viper.GetString(\"project\")\n\n\tdebug, err := cmd.Flags().GetBool(\"debug\")\n\tcmdutil.ExitIfError(err)\n\n\tissues, total := func() ([]*jira.Issue, int) {\n\t\ts := cmdutil.Info(\"Fetching issues...\")\n\t\tdefer s.Stop()\n\n\t\tq, err := query.NewIssue(project, cmd.Flags())\n\t\tcmdutil.ExitIfError(err)\n\n\t\tresp, err := api.ProxySearch(api.Client(jira.Config{Debug: debug}), q.Get(), q.Params().Limit)\n\t\tcmdutil.ExitIfError(err)\n\n\t\treturn resp.Issues, resp.Total\n\t}()\n\tif total == 0 {\n\t\tfmt.Println()\n\t\tcmdutil.Failed(\"No result found for given query in project \\\"%s\\\"\", project)\n\t\treturn\n\t}\n\n\tplain, err := cmd.Flags().GetBool(\"plain\")\n\tcmdutil.ExitIfError(err)\n\n\tnoHeaders, err := cmd.Flags().GetBool(\"no-headers\")\n\tcmdutil.ExitIfError(err)\n\n\tnoTruncate, err := cmd.Flags().GetBool(\"no-truncate\")\n\tcmdutil.ExitIfError(err)\n\n\tcolumns, err := cmd.Flags().GetString(\"columns\")\n\tcmdutil.ExitIfError(err)\n\n\tv := view.IssueList{\n\t\tProject: project,\n\t\tServer: server,\n\t\tTotal: total,\n\t\tData: issues,\n\t\tDisplay: view.DisplayFormat{\n\t\t\tPlain: plain,\n\t\t\tNoHeaders: noHeaders,\n\t\t\tNoTruncate: noTruncate,\n\t\t\tColumns: func() []string {\n\t\t\t\tif columns != \"\" {\n\t\t\t\t\treturn strings.Split(columns, \",\")\n\t\t\t\t}\n\t\t\t\treturn []string{}\n\t\t\t}(),\n\t\t},\n\t}\n\n\tcmdutil.ExitIfError(v.Render())\n}", "title": "" }, { "docid": "3dccfcc4a4cb5aa17275c24734cc3a5b", "score": "0.3980393", "text": "func (r *AWSClusterControllerIdentityList) ConvertTo(dstRaw conversion.Hub) error {\n\tdst := dstRaw.(*v1alpha4.AWSClusterControllerIdentityList)\n\n\treturn Convert_v1alpha3_AWSClusterControllerIdentityList_To_v1alpha4_AWSClusterControllerIdentityList(r, dst, nil)\n}", "title": "" }, { "docid": "69fef54f9f2b4f049a49969a39af7db0", "score": "0.3973842", "text": "func NewPlain() Plain {\n\treturn Plain{\n\t\tHoles: []Hole{},\n\t\tCircles: []Circle{},\n\t\tRectangles: []Rectangle{},\n\t\tPolygons: []Polygon{},\n\t\tTexts: []Text{},\n\t\tWires: []Wire{},\n\t}\n}", "title": "" }, { "docid": "fd6f887ff71b1fb092fe9945badc0e97", "score": "0.39686283", "text": "func (o SparsePCCProvidersList) List() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i]\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "c575480dff25d724458b3409377882e9", "score": "0.39505306", "text": "func (h *handler) webListIssues(w http.ResponseWriter, r *http.Request) {\n\tdb, err := sql.FromOpts(&h.opts.SQL)\n\tif err != nil {\n\t\t_ = render.Render(w, r, ErrRender(err))\n\t\treturn\n\t}\n\n\tissues, err := sql.LoadAllIssues(db)\n\tif err != nil {\n\t\t_ = render.Render(w, r, ErrRender(err))\n\t\treturn\n\t}\n\n\tif err != nil {\n\t\t_ = render.Render(w, r, ErrRender(err))\n\t\treturn\n\t}\n\n\tlist := []render.Renderer{}\n\tfor _, issue := range issues {\n\t\tif issue.IsHidden {\n\t\t\tcontinue\n\t\t}\n\t\tlist = append(list, issue)\n\t}\n\n\tif err := render.RenderList(w, r, list); err != nil {\n\t\t_ = render.Render(w, r, ErrRender(err))\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "c4a1e5bd757077de69c65a95c10f3461", "score": "0.39478686", "text": "func (r *AWSClusterList) ConvertTo(dstRaw conversion.Hub) error {\n\tdst := dstRaw.(*v1alpha4.AWSClusterList)\n\n\treturn Convert_v1alpha3_AWSClusterList_To_v1alpha4_AWSClusterList(r, dst, nil)\n}", "title": "" }, { "docid": "0c5684bf8ef7aa2dad93ca0d0ab6a065", "score": "0.3936442", "text": "func NewSparseSequence() SparseSequence {\n\treturn SparseSequence{\n\t\tlock: &sync.RWMutex{},\n\t\tcontent: map[uint32]uint32{},\n\t\tmax_dropped: 0}\n}", "title": "" }, { "docid": "9e0b86b44dd961782d3605790549bd6c", "score": "0.39321157", "text": "func (o IssuesList) Identity() elemental.Identity {\n\n\treturn IssueIdentity\n}", "title": "" }, { "docid": "6f651e970a02f3b1d918bb2d81385915", "score": "0.39231715", "text": "func WarningListToEmbedList(list []*ent.Warning) types.EmbedList {\n\treturn types.EmbedList{\n\t\tItemTypeName: \"Warning\",\n\t\tEmbeds: func() (ret []discord.Embed) {\n\t\t\tfor _, warning := range list {\n\t\t\t\tret = append(ret, discord.Embed{\n\t\t\t\t\tTitle: \"Warning\",\n\t\t\t\t\tFields: []discord.EmbedField{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"Reason\",\n\t\t\t\t\t\t\tValue: warning.Reason,\n\t\t\t\t\t\t\tInline: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"Issued By\",\n\t\t\t\t\t\t\tValue: fmt.Sprintf(\"<@%d>\", warning.QueryIssuedBy().FirstX(context.Background()).ID),\n\t\t\t\t\t\t\tInline: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"Issued\",\n\t\t\t\t\t\t\tValue: timeago.English.Format(warning.Date),\n\t\t\t\t\t\t\tInline: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tColor: types.NeutralBlue,\n\t\t\t\t})\n\t\t\t}\n\t\t\treturn\n\t\t}(),\n\t}\n}", "title": "" }, { "docid": "c84afccc5b7c0b191a1a72cc25e4335b", "score": "0.3898887", "text": "func PrintIssuesList(dN *DocNoc, cN, cID string, issues []*Issue) {\n\tcIDO.Println(\" 🐳 \" + cID)\n\tfor _, issue := range issues {\n\t\tPrintIssue(issue.Message)\n\t\tslackWebhook := dN.DocNocConfig.SlackWebhook\n\t\tif slackWebhook != \"\" && !issue.Processed {\n\t\t\tslack.PostWebhook(slackWebhook, &slack.WebhookMessage{\n\t\t\t\tUsername: Username,\n\t\t\t\tIconEmoji: IconEmoji,\n\t\t\t\tAttachments: []slack.Attachment{\n\t\t\t\t\tslack.Attachment{\n\t\t\t\t\t\tTitle: fmt.Sprintf(\":package: Container %s\", cN),\n\t\t\t\t\t\tText: fmt.Sprintf(\"Container `%s` experienced the following issue: %s\", cN, issue.Message),\n\t\t\t\t\t\tFooter: cID,\n\t\t\t\t\t\tColor: \"danger\",\n\t\t\t\t\t\tMarkdownIn: []string{\"text\"},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t})\n\t\t}\n\t\t// We don't want to send the same slack message more than once!\n\t\tissue.Processed = true\n\t}\n}", "title": "" }, { "docid": "ba944636e4d14db52c3416f4ac3ed1ad", "score": "0.3875527", "text": "func (src *AWSClusterList) ConvertTo(dstRaw conversion.Hub) error {\n\tdst := dstRaw.(*infrav1.AWSClusterList)\n\n\treturn Convert_v1alpha4_AWSClusterList_To_v1beta1_AWSClusterList(src, dst, nil)\n}", "title": "" }, { "docid": "200faba6470f645ff7ecc5f40cc13ab9", "score": "0.38689318", "text": "func (api *Staytus) GetIssues() ([]Issue, error) {\n\tdata, err := api.post(\"api/v1/issues/all\", nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar issues []Issue\n\tif err := json.Unmarshal(data, &issues); err != nil {\n\t\treturn nil, err\n\t}\n\treturn issues, nil\n}", "title": "" }, { "docid": "b8b33dcf16ce9de19bbb6e69d9448048", "score": "0.38598168", "text": "func (o SparseCallsList) List() elemental.IdentifiablesList {\n\n\tout := make(elemental.IdentifiablesList, len(o))\n\tfor i := 0; i < len(o); i++ {\n\t\tout[i] = o[i]\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "cc9bf1d505bcd1dac1cbd9da0d0e4aff", "score": "0.38568392", "text": "func NewPlainScanResultsFormatter() *plainScanResultsFormatter {\n\treturn &plainScanResultsFormatter{}\n}", "title": "" }, { "docid": "05158d564f901243beb40190ad937950", "score": "0.3850784", "text": "func (o *SparseIssue) Identity() elemental.Identity {\n\n\treturn IssueIdentity\n}", "title": "" }, { "docid": "edb147c12377b938ad037231bb15775d", "score": "0.3850323", "text": "func s2l(nums []int) (l *ListNode) {\n\tif len(nums) == 0 {\n\t\treturn\n\t}\n\n\tl = &ListNode{\n\t\tValue: nums[0],\n\t}\n\ttemp := l\n\tfor i := 1; i < len(nums); i++ {\n\t\ttemp.Next = &ListNode{\n\t\t\tValue: nums[i],\n\t\t}\n\t\ttemp = temp.Next\n\t}\n\treturn\n}", "title": "" }, { "docid": "a4446a76c3b9c145d394bf4970183a39", "score": "0.38394797", "text": "func (r *AWSClusterControllerIdentityList) ConvertFrom(srcRaw conversion.Hub) error {\n\tsrc := srcRaw.(*v1alpha4.AWSClusterControllerIdentityList)\n\n\treturn Convert_v1alpha4_AWSClusterControllerIdentityList_To_v1alpha3_AWSClusterControllerIdentityList(src, r, nil)\n}", "title": "" }, { "docid": "69d6f0deb60c07095f454b5ffdef88be", "score": "0.3824891", "text": "func MakeSparseVector() SparseVector {\n\treturn SparseVector{\n\t\tIndices: make([]int, 0),\n\t\tValues: make([]float64, 0),\n\t}\n}", "title": "" }, { "docid": "8b1c7a15ad103d8da060185d658407d9", "score": "0.3820158", "text": "func MakeSparseIdSet() SparseIdSet {\n\treturn SparseIdSet{\n\t\tDenseIds: make(map[int]int),\n\t\tSparseIds: make([]int, 0),\n\t}\n}", "title": "" }, { "docid": "a802e53395601b8b495231558ac10cc9", "score": "0.3819669", "text": "func (dst *AzureClusterList) ConvertFrom(srcRaw conversion.Hub) error { // nolint\n\tsrc := srcRaw.(*infrav1alpha3.AzureClusterList)\n\treturn Convert_v1alpha3_AzureClusterList_To_v1alpha2_AzureClusterList(src, dst, nil)\n}", "title": "" }, { "docid": "6c687a597312d2927886b6cff0c047c3", "score": "0.38126904", "text": "func (t *Tagger) SparseTostr3(str string, l C.size_t, ostr string, olen C.size_t) string {\n\ts := C.CString(str)\n\tt.memorize.Cache(\"SparseTostr3a\", s)\n\t// defer C.free(unsafe.Pointer(s))\n\to := C.CString(ostr)\n\tt.memorize.Cache(\"SparseTostr3b\", o)\n\t//defer C.free(unsafe.Pointer(o))\n\treturn (C.GoString)(C.mecab_sparse_tostr3(t.toMecabT(), s, l, o, olen))\n}", "title": "" }, { "docid": "28f637b3f88992bf889df60f0dbb3f9c", "score": "0.38085324", "text": "func WarningsConvert(ws v1.Warnings) storage.Warnings {\n\tw := make(storage.Warnings, len(ws))\n\tfor i, item := range ws {\n\t\tw[i] = errors.New(item)\n\t}\n\treturn w\n}", "title": "" }, { "docid": "eb0da9c10b5ef692d9a9a8b44c0d9b59", "score": "0.3805902", "text": "func DisplayIssues(c *cli.Context, v interface{}, notrunc bool) {\n\tw := newTabwriter()\n\tfmt.Fprintf(w, \"NUMBER\\tLAST UPDATED\\tASSIGNEE\\tMILESTONE\\nTITLE\")\n\tif c.Int(\"votes\") > 0 {\n\t\tfmt.Fprintf(w, \"\\tVOTES\")\n\t}\n\tfmt.Fprintf(w, \"\\n\")\n\n\tswitch issues := v.(type) {\n\tcase []*gh.Issue:\n\t\tfor _, p := range issues {\n\t\t\tprintIssue(c, w, p.Number, p.UpdatedAt, p.Assignee.Login, p.Milestone.Title, p.Title, p.Comments)\n\t\t}\n\tcase []*gh.SearchItem:\n\t\tfor _, p := range issues {\n\t\t\tprintIssue(c, w, p.Number, p.UpdatedAt, p.Assignee.Login, p.Milestone.Title, p.Title, p.Comments)\n\t\t}\n\t}\n\tif err := w.Flush(); err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"%s\", err)\n\t}\n}", "title": "" }, { "docid": "8208b62912a3d3b27b8a0a2e339467ac", "score": "0.37927103", "text": "func (s *IssueService) List(params *IssueListParams) ([]Issue, *http.Response, error) {\n\tissues := new([]Issue)\n\tgithubError := new(GithubError)\n\tresp, err := s.sling.New().Path(\"issues\").QueryStruct(params).Receive(issues, githubError)\n\tif err == nil {\n\t\terr = githubError\n\t}\n\treturn *issues, resp, err\n}", "title": "" }, { "docid": "b45432022ca6266b4c7488892a6c9592", "score": "0.37863895", "text": "func (s *SudokuBoard) ToString() string {\n\n\tnumCharacters := int(math.Floor(math.Log10(float64(s.Size)))) + 1\n\tnumHyphen := numCharacters*s.smallSize + s.smallSize + 1\n\thLine := strings.Repeat(\"-\", numHyphen) + \"+\"\n\thLine = \"+\" + strings.Repeat(hLine, s.smallSize) + \"\\n\"\n\tblank := strings.Repeat(\".\", numCharacters)\n\n\tvar b bytes.Buffer\n\tb.WriteString(hLine)\n\tfor i := 0; i < s.Size; i++ {\n\t\tb.WriteString(\"| \")\n\t\tfor j := 0; j < s.Size; j++ {\n\t\t\tif s.FormatedCell[i][j] == 0 {\n\t\t\t\tb.WriteString(blank)\n\t\t\t} else {\n\t\t\t\tb.WriteString(fmt.Sprintf(\"%\"+strconv.Itoa(numCharacters)+\"v\", strconv.Itoa(s.FormatedCell[i][j])))\n\t\t\t}\n\t\t\tb.WriteString(\" \")\n\t\t\tif j%s.smallSize == s.smallSize-1 {\n\t\t\t\tb.WriteString(\"| \")\n\t\t\t}\n\t\t}\n\t\tb.WriteString(\"\\n\")\n\t\tif i%s.smallSize == s.smallSize-1 {\n\t\t\tb.WriteString(hLine)\n\t\t}\n\t}\n\n\treturn b.String()\n}", "title": "" }, { "docid": "d0ccf662bccdf6bf596328558cb7a776", "score": "0.3769851", "text": "func IssueList() error {\n\tcfg, err := client.NewConfig()\n\tif err != nil {\n\t\terr = fmt.Errorf(\"configuration error, %s\", err)\n\t\treturn err\n\t}\n\t\n\tissue := client.NewIssue(cfg.Space, cfg.APIKey)\n\tfor issue.HasNext() {\n\t\tr, err := issue.List()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tissue.PrintCSV(r)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bde036bc6f386fd294d9890320d5ccb3", "score": "0.37633967", "text": "func (l Int8List) String() string {\n\tvar buf []byte\n\tbuf = append(buf, '[')\n\tfor i := 0; i < l.Len(); i++ {\n\t\tif i > 0 {\n\t\t\tbuf = append(buf, \", \"...)\n\t\t}\n\t\tbuf = strconv.AppendInt(buf, int64(l.At(i)), 10)\n\t}\n\tbuf = append(buf, ']')\n\treturn string(buf)\n}", "title": "" }, { "docid": "920fa2904097d1a122746fefd6843c8d", "score": "0.37446943", "text": "func ListText(s string) string {\n\ts = strings.TrimSpace(s)\n\n\tfor _, v := range listMarkers() {\n\t\ts = strings.Replace(s, fmt.Sprintf(\"%s \", v), \"\", 1)\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "4042ae07260b5e0e1bd9dba4206f32f7", "score": "0.37446317", "text": "func (v StringList) String() string {\n\tx := ([]string)(v)\n\n\treturn fmt.Sprint(x)\n}", "title": "" }, { "docid": "fc9da2bb472de3f54bbfb82a907a0e73", "score": "0.37393916", "text": "func (o IssuesList) Copy() elemental.Identifiables {\n\n\tcopy := append(IssuesList{}, o...)\n\treturn &copy\n}", "title": "" }, { "docid": "17d302c9ff418f089ba744b5f91cb7f5", "score": "0.37322214", "text": "func toList(in [][]byte) ([]byte, error) {\n\titems := []map[string]interface{}{}\n\tfor _, item := range in {\n\t\tdata := make(map[string]interface{})\n\t\terr := goyaml.Unmarshal(item, data)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"Failed to unmarshal\")\n\t\t}\n\t\titems = append(items, data)\n\t}\n\treturn goyaml.Marshal(&UnstructList{\n\t\tAPIVersion: \"v1\",\n\t\tKind: \"List\",\n\t\tItems: items,\n\t})\n}", "title": "" }, { "docid": "2871710f745e8d5d79e75ed189bc8ec3", "score": "0.37265256", "text": "func NewPlain(config *Config) (Plain, error) {\n\treturn Plain{config}, nil\n}", "title": "" }, { "docid": "cc39b4a38314cbc5dcf13cd6339b9cb3", "score": "0.3708174", "text": "func convertIssue(from *issue) *scm.Issue {\n\treturn &scm.Issue{\n\t\tNumber: from.Number,\n\t\tTitle: from.Title,\n\t\tBody: from.Body,\n\t\tLink: \"\", // TODO construct the link to the issue.\n\t\tClosed: from.State == \"closed\",\n\t\tLabels: convertLabels(from),\n\t\tAuthor: *convertUser(&from.User),\n\t\tAssignees: convertUsers(from.Assignees),\n\t\tCreated: from.Created,\n\t\tUpdated: from.Updated,\n\t}\n}", "title": "" }, { "docid": "dd3eae8724123187e5f42f3feca7d650", "score": "0.3708016", "text": "func (r *AWSClusterStaticIdentityList) ConvertTo(dstRaw conversion.Hub) error {\n\tdst := dstRaw.(*v1alpha4.AWSClusterStaticIdentityList)\n\n\treturn Convert_v1alpha3_AWSClusterStaticIdentityList_To_v1alpha4_AWSClusterStaticIdentityList(r, dst, nil)\n}", "title": "" }, { "docid": "e2f703d47ded581d33b143976704f7cb", "score": "0.36977068", "text": "func convertMatrixToText(matrix Matrix) string {\n\tvar ascii string\n\tfor _, row := range matrix {\n\t\tfor _, px := range row {\n\t\t\tif px == 1 {\n\t\t\t\tascii += \"#\"\n\t\t\t} else {\n\t\t\t\tascii += \".\"\n\t\t\t}\n\t\t}\n\t\tascii += \"\\n\"\n\t}\n\treturn ascii\n}", "title": "" }, { "docid": "a654ef1614fe785a29f6a4a13dee2783", "score": "0.3687263", "text": "func (l TextList) String() string {\n\tvar buf []byte\n\tbuf = append(buf, '[')\n\tfor i := 0; i < l.Len(); i++ {\n\t\tif i > 0 {\n\t\t\tbuf = append(buf, \", \"...)\n\t\t}\n\t\ts, err := l.BytesAt(i)\n\t\tif err != nil {\n\t\t\tbuf = append(buf, \"<error>\"...)\n\t\t\tcontinue\n\t\t}\n\t\tbuf = strquote.Append(buf, s)\n\t}\n\tbuf = append(buf, ']')\n\treturn string(buf)\n}", "title": "" } ]
802355a8e52ee473422624e9ad60f515
Decode by FFMPEG by default
[ { "docid": "0387b8a1c28fa84157740ad00c97e288", "score": "0.76292294", "text": "func ffmpegDecode(videoFileNameWithExt string, title string) (string, error) {\n\tmp3FileName := makeFileName(title, \"mp3\")\n\tdeleteFile(mp3FileName) //remove target file if exists\n\tfmt.Printf(\"Start FFMPEG decoding %s\\n\", videoFileNameWithExt)\n\tcmd := exec.Command(\"ffmpeg\", \"-i\", videoFileNameWithExt, mp3FileName)\n\tvar out bytes.Buffer\n\tcmd.Stdout = &out\n\terr := cmd.Run()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\toutputText := strings.TrimSpace(out.String()) // normally, returns empty string if everything OK\n\tif len(outputText) != 0 {\n\t\treturn \"\", errors.New(\"FFMPEG returned non-empty string: \" + outputText)\n\t}\n\tfmt.Printf(\"FFMPEG decoded normally: %s\\n\", videoFileNameWithExt)\n\treturn mp3FileName, err\n}", "title": "" } ]
[ { "docid": "642146fa80966dcbb8a3e220cd7a1f61", "score": "0.644728", "text": "func aconvertDecode(videoFileNameWithExt string, title string) (string, error) {\n\tmp3FileName := makeFileName(title, \"mp3\")\n\tdeleteFile(mp3FileName) //remove target file if exists\n\tfluMp3File := flu.File(mp3FileName)\n\tif aconvertAPI == nil { //init aconvertAPI once\n\t\taconvertAPI = ac.NewClient(nil, nil, nil)\n\t}\n\n\tfmt.Printf(\"Start AConvert decoding %s\\n\", videoFileNameWithExt)\n\tr, err := aconvertAPI.Convert(context.Background(), flu.File(videoFileNameWithExt), make(ac.Opts).TargetFormat(\"mp3\"))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\terr = aconvertAPI.GET(r.URL()).Execute().DecodeBodyTo(fluMp3File).Error\n\treturn mp3FileName, err\n}", "title": "" }, { "docid": "d9d4b49f0c3deef807ee1cdd8f8646a9", "score": "0.61492497", "text": "func Ffmpeg(f string) (Exif, error) {\n\te, err := getFFMetaData(f)\n\tif err != nil {\n\t\treturn e, err\n\t}\n\tif e.Created.IsZero() {\n\t\te.Created, err = getMovieCreationTime(f)\n\t}\n\treturn e, err\n}", "title": "" }, { "docid": "e8b497212422ef2cb0708a704316a015", "score": "0.6024134", "text": "func ffmpeg(ctx context.Context, wg *sync.WaitGroup, uuid uuid.UUID, status chan<-*StreamStatus, error chan <- error, args []string) {\n\tdefer wg.Done()\n\n\tlog.Println(\"Booting ffmpeg process\")\n\tch := make(chan string)\n\tdefer close(ch)\n\tstreamStatus := &StreamStatus{}\n\tstreamStatus.Uuid = uuid\n\tgo run(ctx, ch, error,\"ffmpeg\", args)\n\tfor {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\tlog.Println(\"Shutting down ffmepg process, waiting for result\")\n\t\t\treturn\n\t\tcase line := <-ch:\n\t\t\t//We are only interested on the transcoding status information\n\t\t\tif strings.HasPrefix(line, \"frame\") {\n\t\t\t\tparseLine(line, streamStatus)\n\t\t\t\tstatus <- streamStatus\n\t\t\t}\n\t\t}\n\n\t}\n}", "title": "" }, { "docid": "fa6e442dcc48194dd6260d963c0888de", "score": "0.5977539", "text": "func Decode(src []byte, mode Mode) (inst Inst, err error)", "title": "" }, { "docid": "05b66a148c2d1ca0b11da32a4d2471ae", "score": "0.58963853", "text": "func (t *Track) extractVideoCodec() {\n\tt.codec = \"avc1.\" + strings.ToUpper(hex.EncodeToString(t.extradata[1:2]) + hex.EncodeToString(t.extradata[2:3]) + hex.EncodeToString(t.extradata[3:4]))\n}", "title": "" }, { "docid": "65afad6aa8061b2d94060cb961e39c1b", "score": "0.58591807", "text": "func decode(in string, out string) {\n\tfile, err := os.Open(in)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer file.Close()\n\n\tif _, err = file.Seek(0, 0); err != nil {\n\t\tpanic(err)\n\t}\n\n\timg, err := png.Decode(file)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tdecoder := decoder.NewDecoder(img)\n\tdecoder.Decode()\n\n\terr = decoder.Out(out)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "94a52469467e025535b84542fdce4ba0", "score": "0.5791628", "text": "func rawDecoder(f *os.File) (AudioStream, error) {\n\treturn &file{File: f}, nil\n}", "title": "" }, { "docid": "30227809da9b8a07f4dcd6f06b5820b4", "score": "0.5726177", "text": "func downloadFFMPEG(url string, postUrl string, filename string, m3u8Chan chan VideoResultDownload){\n\n\t// \tDOWNLOAD VIDEO\n\t//\tSyntax: ffmpeg -headers \"Referer: <URL_Post>\" -i “<url>” -c copy -bsf:a aac_adtstoasc <output_file_name>\n\t// -y: overide file\n\t_, err := exec.Command(\"ffmpeg\", \"-y\",\"-headers\", \"Referer: \"+ postUrl , \"-i\" ,url, \"-c\", \"copy\", \"-bsf:a\", \"aac_adtstoasc\",VIDEO_OUTPUT_DIR + filename).CombinedOutput()\n\n\t//\tDOWNLOAD THUMBNAIL\n\t// \tSyntax: ffmpeg -i \"$f\" -ss 00:00:03 -vframes 1 -s 480x320 \"${f%.mp4}.jpg\"\n\tthumbFileName := filename[:strings.Index(filename, \".mp4\")] + \".jpg\"\n\t_, errThumb := exec.Command(\"ffmpeg\", \"-i\", VIDEO_OUTPUT_DIR + filename, \"-ss\", VIDEO_THUMB_TIME ,\"-vframes\", \"1\", \"-s\", VIDEO_THUMB_SIZE, VIDEO_OUTPUT_DIR + thumbFileName).CombinedOutput()\n\n\t//\tPUSH VideoResultDownload TO CHANNELS\n\tif err != nil{\n\t\tfmt.Printf(\"%s\", err)\n\t\tm3u8Chan <- VideoResultDownload{url, filename, nil , \"Failed\", errThumb,\"None\"}\n\t} else{\n\t\tif errThumb != nil{\n\t\t\tm3u8Chan <- VideoResultDownload{url, filename, err, \"Successul\", errThumb,\"Failed\"}\n\t\t}else{\n\t\t\tm3u8Chan <- VideoResultDownload{url, filename, err, \"Successul\", errThumb,\"Successul\"}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "9983a0b857ddd409ece93e210dfcd4fc", "score": "0.5699569", "text": "func opusDecoder(f *os.File) (AudioStream, error) {\n\treturn opus.NewStream(f)\n}", "title": "" }, { "docid": "2d6625bb059581bdabbcc92230143db2", "score": "0.56506056", "text": "func Decode(filepath string) (*Decoder, error) {\n\tsrc, err := file.Open(filepath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\thandler, hasHandler := extHandlers[file.Ext(filepath)]\n\tif !hasHandler {\n\t\tsrc.Close()\n\t\treturn nil, errors.New(\"unsupported audio file extention\")\n\t}\n\n\tdecoder, err := handler(src)\n\tif err != nil {\n\t\tsrc.Close()\n\t\treturn nil, err\n\t}\n\n\treturn decoder, nil\n}", "title": "" }, { "docid": "37b9c2d9cfe596ebc1bd354e6f2526fe", "score": "0.56379604", "text": "func execmWordDecoderDecode(_ int, p *gop.Context) {\n\targs := p.GetArgs(2)\n\tret, ret1 := args[0].(*mime.WordDecoder).Decode(args[1].(string))\n\tp.Ret(2, ret, ret1)\n}", "title": "" }, { "docid": "8773e24d24c93204d41113757b33e1b4", "score": "0.5573379", "text": "func execDecode(_ int, p *gop.Context) {\n\targs := p.GetArgs(1)\n\tret, ret1 := png.Decode(args[0].(io.Reader))\n\tp.Ret(1, ret, ret1)\n}", "title": "" }, { "docid": "1ca79ec094061821caaeb54056366d74", "score": "0.5570667", "text": "func Decode(reader io.Reader) (*SimpleMediaPlaylist, error) {\n\tmp := SimpleMediaPlaylist{\n\t\tSegments: make([]FullSegment, 0),\n\t}\n\tvar err error\n\tcurrentFullSegment := newFullSegment()\n\n\tscanner := bufio.NewScanner(reader)\n\tfor scanner.Scan() {\n\t\tline := scanner.Text()\n\t\tswitch {\n\t\tcase line == \"#EXTM3U\":\n\t\tcase strings.HasPrefix(line, \"#EXT-X-TARGETDURATION:\"):\n\t\t\tstringVal := strings.Split(line, \":\")[1]\n\t\t\tmp.TargetDuration, err = time.ParseDuration(stringVal + \"s\")\n\t\tcase strings.HasPrefix(line, \"#EXT-X-VERSION:\"):\n\t\t\tstringVal := strings.Split(line, \":\")[1]\n\t\t\tmp.Version, err = strconv.ParseUint(stringVal, 0, 64)\n\t\tcase strings.HasPrefix(line, \"#EXT-X-PART-INF:\"):\n\t\t\tstringVal := strings.Split(line, \"=\")[1]\n\t\t\tmp.PartTargetDuration, err = time.ParseDuration(stringVal + \"s\")\n\t\tcase strings.HasPrefix(line, \"#EXT-X-MEDIA-SEQUENCE:\"):\n\t\t\tstringVal := strings.Split(line, \":\")[1]\n\t\t\tmp.MediaSequenceNumber, err = strconv.ParseUint(stringVal, 0, 64)\n\t\t\tmp.NextMSNIndex = mp.MediaSequenceNumber\n\t\tcase strings.HasPrefix(line, \"#EXTINF:\"):\n\t\t\tstringVal := strings.Split(line, \":\")[1]\n\t\t\tstringVal = strings.Split(stringVal, \",\")[0]\n\t\t\tcurrentFullSegment.Self.Duration, err = strconv.ParseFloat(stringVal, 64)\n\t\tcase line != \"\" && !strings.HasPrefix(line, \"#\"):\n\t\t\t// The URI line is the last line for the segment, add it to the playlist and create a new empty one\n\t\t\tcurrentFullSegment.Self.URI = line\n\t\t\tmp.Segments = append(mp.Segments, currentFullSegment)\n\t\t\tmp.NextMSNIndex++\n\t\t\tmp.NextPartIndex = 0\n\t\t\tcurrentFullSegment = newFullSegment()\n\t\tcase strings.HasPrefix(line, \"#EXT-X-PART:\"):\n\t\t\t// Parts get added to a the full.Parts array\n\t\t\tvar part SimpleSegment\n\t\t\tparams := strings.Split(line[12:], \",\")\n\t\t\tfor _, param := range params {\n\t\t\t\tparts := strings.SplitN(param, \"=\", 2)\n\t\t\t\tkey := parts[0]\n\t\t\t\tvalue := parts[1]\n\t\t\t\tswitch key {\n\t\t\t\tcase \"DURATION\":\n\t\t\t\t\tpart.Duration, err = strconv.ParseFloat(value, 64)\n\t\t\t\tcase \"URI\":\n\t\t\t\t\tpart.URI = strings.ReplaceAll(value, \"\\\"\", \"\")\n\t\t\t\tcase \"INDEPENDENT\":\n\t\t\t\t\tif value == \"YES\" {\n\t\t\t\t\t\tpart.Independent = true\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tcurrentFullSegment.Parts = append(currentFullSegment.Parts, part)\n\t\t\tmp.NextPartIndex++\n\t\t\tif mp.MaxPartIndex < mp.NextPartIndex {\n\t\t\t\tmp.MaxPartIndex = mp.NextPartIndex\n\t\t\t}\n\t\tcase strings.HasPrefix(line, \"#EXT-X-PRELOAD-HINT:\"):\n\t\t\tmp.PreloadHints = make(map[string]string)\n\t\t\tparams := strings.Split(line[20:], \",\")\n\t\t\thintType := \"\"\n\t\t\thintURI := \"\"\n\t\t\tfor _, param := range params {\n\t\t\t\tparts := strings.SplitN(param, \"=\", 2)\n\t\t\t\tkey := parts[0]\n\t\t\t\tvalue := parts[1]\n\t\t\t\tswitch key {\n\t\t\t\tcase \"TYPE\":\n\t\t\t\t\thintType = value\n\t\t\t\tcase \"URI\":\n\t\t\t\t\thintURI = strings.ReplaceAll(value, \"\\\"\", \"\")\n\t\t\t\t}\n\t\t\t}\n\t\t\tmp.PreloadHints[hintType] = hintURI\n\t\tdefault: // Only fulls get ExtraLines - don't touch them, just add them\n\t\t\tcurrentFullSegment.Self.ExtraLines = append(currentFullSegment.Self.ExtraLines, line)\n\n\t\t}\n\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Error parsing -%s- :%s \", line, err)\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tif currentFullSegment.Self.URI == \"\" {\n\t\t// Need to add the last parts, so add the last current. It has URI=\"\" so it's Self will be ignored\n\t\tmp.Segments = append(mp.Segments, currentFullSegment)\n\t}\n\treturn &mp, nil\n}", "title": "" }, { "docid": "c7ea5d260f1d4ed3c8f08f96ef791f1b", "score": "0.5549478", "text": "func DecodeFile(path string) (*Pattern, error) {\n\n\t// Create a struct to hold the pattern\n\tp := &Pattern{}\n\t// open the binary file\n\tfile, err := os.Open(path)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(-1)\n\t}\n\tdefer file.Close()\n\n\tfInfo, err := os.Stat(path)\n\t// read some binary data\n\tbuffer := make([]byte, fInfo.Size())\n\t_, err = file.Read(buffer)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(-1)\n\t}\n\n\t// try to just read the magic string\n\tr := bytes.NewReader(buffer)\n\tMagicString := make([]byte, 13)\n\t_, err = io.ReadAtLeast(r, MagicString, 13)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// try to read the version\n\tVersion := make([]byte, 33)\n\t_, err = io.ReadAtLeast(r, Version, 33)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// try to read the tempo\n\ttmp := make([]byte, 4)\n\t_, err = io.ReadAtLeast(r, tmp, 4)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar tempo Tempo\n\ttempoReader := bytes.NewReader(tmp)\n\tbinary.Read(tempoReader, binary.LittleEndian, &tempo)\n\n\tvar id TrackId\n\ttracks := make([]Track, 0)\n\tdone := false\n\tfor !done {\n\t\t// try to read the first track id\n\t\t_, err = io.ReadAtLeast(r, tmp, 4)\n\t\tif err != nil {\n\t\t\tdone = true\n\t\t\t//return nil, err\n\t\t}\n\t\tidReader := bytes.NewReader(tmp)\n\t\tbinary.Read(idReader, binary.LittleEndian, &id)\n\n\t\t// try to read the first track name\n\t\t// first we need to get the length (this should be at byte 54)\n\t\tlenReader := make([]byte, 1)\n\t\t_, err = io.ReadAtLeast(r, lenReader, 1)\n\t\tif err != nil {\n\t\t\tdone = true\n\t\t\t//return nil, err\n\t\t}\n\t\tvar nameLength uint8\n\t\tnameLengthReader := bytes.NewReader(lenReader)\n\t\tbinary.Read(nameLengthReader, binary.LittleEndian, &nameLength)\n\n\t\tname := make([]byte, nameLength)\n\t\t_, err = io.ReadAtLeast(r, name, int(nameLength))\n\t\tif err != nil {\n\t\t\tdone = true\n\t\t\t//return nil, err\n\t\t}\n\t\t// try to read the first track data\n\t\tdata := make([]byte, 16)\n\t\t_, err = io.ReadAtLeast(r, data, 16)\n\t\tif err != nil {\n\t\t\tdone = true\n\t\t\tbreak\n\t\t}\n\t\tvar t Track\n\t\tt.Id = id\n\t\tt.Name = name\n\t\tt.Data = data\n\t\ttracks = append(tracks, t)\n\t}\n\n\tp.MagicString = MagicString\n\tp.Version = bytes.Trim(Version, \"\\x00\")\n\tp.Version = bytes.TrimLeft(p.Version, \"\\xc5\")\n\tp.Version = bytes.TrimLeft(p.Version, \"W\")\n\tp.Tempo = tempo\n\tp.Tracks = tracks\n\treturn p, nil\n}", "title": "" }, { "docid": "73542ff1136ca7db7bf60f6b5684933f", "score": "0.55447805", "text": "func Decode(filename string, directory string) error {\n\t// open a jpeg\n\tf, err := os.Open(filename)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\thidden, revealErr := jsteg.Reveal(f)\n\tif revealErr != nil {\n\t\treturn revealErr\n\t}\n\tstr := string(hidden)\n\tfirstIndex := strings.Index(str, \":\")\n\t// if current headers aren't available, just return all hidden data\n\tif firstIndex == -1 {\n\t\tfmt.Println(str)\n\t\treturn nil\n\t}\n\tsecondIndex := strings.Index(str, \"/\")\n\tdataLength, err := strconv.ParseUint(str[0:firstIndex], 10, 64)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// if message or filetype wasn't hidden, return only a message\n\tif secondIndex == -1 {\n\t\tdata := str[firstIndex+1 : uint64(firstIndex)+dataLength+1]\n\t\tfmt.Println(data)\n\t\treturn nil\n\t}\n\tmessageType := str[firstIndex+1 : secondIndex]\n\t// if the messageType is a text message, print it to the console\n\tif messageType == \"m\" {\n\t\tdata := str[secondIndex+1 : uint64(secondIndex)+1+dataLength]\n\t\tfmt.Println(data)\n\t\treturn nil\n\t}\n\tos.Mkdir(directory, os.ModePerm)\n\tnewf, err := os.Create(directory + \"/\" + messageType)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Println(\"Decoded file saved in \" + directory + \"/\" + messageType)\n\tdata := []byte(str[secondIndex+1 : uint64(secondIndex)+1+dataLength])\n\t_, err = newf.Write(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "af1109ec1106a410e2ec18257cfcac8f", "score": "0.5517032", "text": "func (eng *Engine) Transcode(\n\tvideo string,\n\tstart, end float64,\n\twidth, height int,\n\tfps float64,\n) (string, error) {\n\tif err := eng.init(); err != nil {\n\t\treturn \"\", fmt.Errorf(\"initializing engine: %w\", err)\n\t}\n\tvar (\n\t\tduration = end - start\n\t\tfilters string\n\t\tpalettegen string\n\t\tpalette = eng.path(\"palette.png\")\n\t\toutput = eng.path(fmt.Sprintf(\"%s.gif\", strings.Split(filepath.Base(video), \".\")[0]))\n\t)\n\tif height < -2 {\n\t\theight = -2\n\t}\n\tif width < -2 {\n\t\twidth = -2\n\t}\n\tif fps > 0.0 {\n\t\tfilters += fmt.Sprintf(\"fps=%2f\", fps)\n\t}\n\tif width > 0.0 || height > 0.0 {\n\t\tif filters != \"\" {\n\t\t\tfilters += \",\"\n\t\t}\n\t\tfilters += fmt.Sprintf(\"scale=%d:%d:flags=lanczos\", width, height)\n\t}\n\tif len(filters) > 0 {\n\t\tpalettegen = fmt.Sprintf(\"%s,palettegen\", filters)\n\t} else {\n\t\tpalettegen = \"palettegen\"\n\t}\n\tdefer func() {\n\t\teng.Junk = append(eng.Junk, palette, output)\n\t}()\n\t// TODO(jfm): make these structured, with omission as a field.\n\tgenPalette := eng.command(\n\t\teng.FFmpeg,\n\t\t\"-ss\", fmt.Sprintf(\"%2f;omitempty\", start),\n\t\t\"-t\", fmt.Sprintf(\"%2f;omitempty\", duration),\n\t\t\"-i\", video,\n\t\t\"-vf\", palettegen,\n\t\t\"-y\", palette,\n\t)\n\tif out, err := genPalette.CombinedOutput(); err != nil {\n\t\treturn \"\", errors.Wrapf(err, \"generating palette: %s\", string(out))\n\t}\n\tmakeGif := eng.command(\n\t\teng.FFmpeg,\n\t\t\"-ss\", fmt.Sprintf(\"%2f;omitempty\", start),\n\t\t\"-t\", fmt.Sprintf(\"%2f;omitempty\", duration),\n\t\t\"-i\", video, \"-i\", palette,\n\t\t\"-lavfi\", fmt.Sprintf(\"%s [x]; [x][1:v] paletteuse\", filters),\n\t\t\"-y\", output,\n\t)\n\tif out, err := makeGif.CombinedOutput(); err != nil {\n\t\treturn \"\", errors.Wrapf(err, \"making gif: %s\", string(out))\n\t}\n\treturn output, nil\n}", "title": "" }, { "docid": "98baaa93e061d6d495ebd16f0d7547b6", "score": "0.5498946", "text": "func (t *Track) extractCodec() {\n\tif t.isAudio {\n\t\tt.extractAudioCodec()\n\t} else {\n\t\tt.extractVideoCodec()\n\t}\n}", "title": "" }, { "docid": "5b61eee9534a4cf4a075f3749072d813", "score": "0.5495794", "text": "func init() {\n\timage.RegisterFormat(\"pbm\", \"P4\", decodePBM, decodeConfigPBM)\n\timage.RegisterFormat(\"pbm\", \"P1\", decodePBMPlain, decodeConfigPBM)\n}", "title": "" }, { "docid": "cbbe8395c8e56255f0ee39c9870b8db7", "score": "0.5450812", "text": "func buildFfmpegArgs(fileName string, delay int) []string {\n\tif strings.HasSuffix(fileName, \".m3u8\") {\n\t\treturn []string{\n\t\t\t//\t\"-thread_queue_size\", \"50\",\n\t\t\t\"-f\", \"v4l2\",\n\t\t\t\"-i\", \"/dev/video0\",\n\t\t\t\"-f\", \"alsa\",\n\t\t\t\"-i\", \"hw:0\",\n\t\t\t\"-preset\", \"ultrafast\",\n\t\t\t\"-tune\", \"zerolatency\",\n\t\t\t\"-vcodec\", \"libx264\",\n\t\t\t\"-r\", \"30\",\n\t\t\t\"-b:v\", \"512k\",\n\t\t\t\"-acodec\", \"aac\",\n\t\t\t\"-strict\", \"-2\",\n\t\t\t\"-ac\", \"2\",\n\t\t\t\"-hls_time\", strconv.Itoa(delay),\n\n\t\t\tfileName, //*.m3u8\n\t\t}\n\t}\n\n\treturn []string{\n\t\t//\"-thread_queue_size\", \"10\",\n\t\t\"-f\", \"v4l2\",\n\t\t\"-i\", \"/dev/video0\",\n\t\t\"-f\", \"alsa\",\n\t\t\"-i\", \"hw:0\",\n\t\t\"-preset\", \"ultrafast\",\n\t\t\"-tune\", \"zerolatency\",\n\t\t\"-vcodec\", \"libx264\",\n\t\t\"-r\", \"30\",\n\t\t\"-b:v\", \"512k\",\n\t\t\"-acodec\", \"aac\",\n\t\t\"-strict\", \"-2\",\n\t\t\"-ac\", \"2\",\n\t\t\"-ab\", \"32k\",\n\t\t\"-ar\", \"44100\",\n\t\t\"-map\", \"0\",\n\t\t\"-map\", \"1\",\n\t\t\"-f\", \"segment\",\n\t\t\"-segment_time\", strconv.Itoa(delay),\n\n\t\tfileName,\n\t}\n}", "title": "" }, { "docid": "ac6b1cd7bc870955a8ccf64232c0bc50", "score": "0.5400781", "text": "func DecodeFile(path string) (*Pattern, error) {\n file, err := ioutil.ReadFile(path)\n if err != nil {\n fmt.Println(err)\n return nil, err\n }\n\n reader := &patternReader{bytes.NewReader(file)}\n\n ph := &patternHeader{}\n err = binary.Read(reader, binary.LittleEndian, ph)\n if err != nil {\n fmt.Println(\"reading header failed\", err)\n }\n\n var tracks []track\n for reader.hasMorePotentialTracks() {\n track, err := reader.readNextTrack()\n if err == nil {\n tracks = append(tracks, *track)\n }\n }\n\n return &Pattern{Header: *ph, Tracks: tracks}, nil\n}", "title": "" }, { "docid": "524a28c9542032fc8f98db415087023e", "score": "0.5360185", "text": "func (f DecoderFunc) Decode(v interface{}) error { return f(v) }", "title": "" }, { "docid": "60b89ee68b665ba267a6abef9bfd0ea4", "score": "0.53433686", "text": "func Decode(src []byte, mode int) (inst Inst, err error) {\n\treturn decode1(src, mode, false)\n}", "title": "" }, { "docid": "8ea3a74f77d0fec86af77dcbab1a43a0", "score": "0.5342488", "text": "func decode(f *os.File, ext string) (image.Image, error) {\n\tswitch ext {\n\tcase \".jpg\", \".jpeg\":\n\t\treturn jpeg.Decode(f)\n\n\tcase \".png\":\n\t\treturn png.Decode(f)\n\n\tcase \".gif\":\n\t\treturn gif.Decode(f)\n\n\tcase \".bmp\":\n\t\treturn bmp.Decode(f)\n\n\tcase \".tiff\":\n\t\treturn tiff.Decode(f)\n\n\t\t// case \".webp\":\n\t\t// \treturn webp.Decode(f)\n\t}\n\treturn nil, errors.New(\"File not support\")\n}", "title": "" }, { "docid": "5be7361e9b1da359552b4e6a61c38059", "score": "0.5335151", "text": "func (t *Track) extractAudioCodec() {\n\tt.codec = \"mp4a.40.2\"\n}", "title": "" }, { "docid": "15fdfc648ec3f235dc28666e7e804bd7", "score": "0.5273627", "text": "func TSFirstImage(tsb []byte) *image.YCbCr {\n\t// file, err := avutil.Open(\"hls/v108063.ts\")\n\t// fmt.Printf(\"%T\\n\", file)\n\tfile := ts.NewDemuxer(bytes.NewBuffer(tsb))\n\tfile.NumStreamsToFind = 1\n\t/*\n\t\thd := file.(*avutil.HandlerDemuxer)\n\t\tfmt.Printf(\"%T\\n\", hd.Demuxer)\n\t\tif err != nil {\n\t\t\t// panic(err)\n\t\t\treturn nil\n\t\t}\n\t*/\n\tvar err error\n\tvar streams []av.CodecData\n\tvar videoidx int\n\tif streams, err = file.Streams(); err != nil {\n\t\tglog.Infof(\"Error parsing segment %v\", err)\n\t\treturn nil\n\t}\n\tvar vcd av.VideoCodecData\n\tfor i, st := range streams {\n\t\tif st == nil {\n\t\t\tcontinue\n\t\t}\n\t\tif st.Type().IsVideo() {\n\t\t\tvideoidx = i\n\t\t}\n\t\tif vc, ok := st.(av.VideoCodecData); ok {\n\t\t\tglog.Infof(\"w: %d, h: %d\\n\", vc.Width(), vc.Height())\n\t\t\tvcd = vc\n\t\t}\n\t\tif st.Type() == av.H264 {\n\t\t\t// vdec, err = ffmpeg.NewVideoDecoder(st)\n\t\t\t// if err != nil {\n\t\t\t// \tpanic(err)\n\t\t\t// }\n\t\t}\n\t}\n\thcd, ok := vcd.(h264parser.CodecData)\n\tif !ok {\n\t\treturn nil\n\t}\n\tdec, err := NewH264Decoder(hcd.Record)\n\tif err != nil {\n\t\treturn nil\n\t}\n\tfor {\n\t\tpkt, err := file.ReadPacket()\n\t\tif err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tglog.Infof(\"Error reading packet %v\", err)\n\t\t\treturn nil\n\t\t}\n\t\tif pkt.Idx == int8(videoidx) {\n\t\t\timg, err := dec.Decode(pkt.Data)\n\t\t\tif err != nil {\n\t\t\t\tglog.Info(err)\n\t\t\t} else {\n\t\t\t\treturn img\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "aca50922a2fc399468e6ea8cfe3708e4", "score": "0.52443683", "text": "func NewDecoder(o DecoderOptions, eh *astiencoder.EventHandler, c *astikit.Closer) (d *Decoder, err error) {\n\t// Extend node metadata\n\tcount := atomic.AddUint64(&countDecoder, uint64(1))\n\to.Node.Metadata = o.Node.Metadata.Extend(fmt.Sprintf(\"decoder_%d\", count), fmt.Sprintf(\"Decoder #%d\", count), \"Decodes\", \"decoder\")\n\n\t// Create decoder\n\td = &Decoder{\n\t\tc: astikit.NewChan(astikit.ChanOptions{\n\t\t\tAddStrategy: astikit.ChanAddStrategyBlockWhenStarted,\n\t\t\tProcessAll: true,\n\t\t}),\n\t\teh: eh,\n\t\toutputCtx: o.OutputCtx,\n\t\tstatIncomingRate: astikit.NewCounterRateStat(),\n\t\tstatWorkRatio: astikit.NewDurationPercentageStat(),\n\t}\n\td.BaseNode = astiencoder.NewBaseNode(o.Node, astiencoder.NewEventGeneratorNode(d), eh)\n\td.d = newFrameDispatcher(d, eh, c)\n\td.addStats()\n\n\t// Find decoder\n\tvar cdc *avcodec.Codec\n\tif cdc = avcodec.AvcodecFindDecoder(o.CodecParams.CodecId()); cdc == nil {\n\t\terr = fmt.Errorf(\"astilibav: no decoder found for codec id %+v\", o.CodecParams.CodecId())\n\t\treturn\n\t}\n\n\t// Alloc context\n\tif d.ctxCodec = cdc.AvcodecAllocContext3(); d.ctxCodec == nil {\n\t\terr = fmt.Errorf(\"astilibav: no context allocated for codec %+v\", cdc)\n\t\treturn\n\t}\n\n\t// Copy codec parameters\n\tif ret := avcodec.AvcodecParametersToContext(d.ctxCodec, o.CodecParams); ret < 0 {\n\t\terr = fmt.Errorf(\"astilibav: avcodec.AvcodecParametersToContext failed: %w\", NewAvError(ret))\n\t\treturn\n\t}\n\n\t// Open codec\n\tif ret := d.ctxCodec.AvcodecOpen2(cdc, nil); ret < 0 {\n\t\terr = fmt.Errorf(\"astilibav: d.ctxCodec.AvcodecOpen2 failed: %w\", NewAvError(ret))\n\t\treturn\n\t}\n\n\t// Make sure the codec is closed\n\tc.Add(func() error {\n\t\tif ret := d.ctxCodec.AvcodecClose(); ret < 0 {\n\t\t\temitAvError(nil, eh, ret, \"d.ctxCodec.AvcodecClose failed\")\n\t\t}\n\t\treturn nil\n\t})\n\treturn\n}", "title": "" }, { "docid": "b4b614604cc24be20d33a674f64b8b58", "score": "0.5235609", "text": "func decodePBM(r io.Reader) (image.Image, error) {\n\timg, _, err := decodePBMWithComments(r)\n\treturn img, err\n}", "title": "" }, { "docid": "c701598c2d05621bbeab885e9d6e8467", "score": "0.52270633", "text": "func execmWordDecoderDecodeHeader(_ int, p *gop.Context) {\n\targs := p.GetArgs(2)\n\tret, ret1 := args[0].(*mime.WordDecoder).DecodeHeader(args[1].(string))\n\tp.Ret(2, ret, ret1)\n}", "title": "" }, { "docid": "0ce1d7d4b298243a8c9391ce416d059c", "score": "0.5208497", "text": "func Decode(r io.ReadSeeker) (audio.Decoded, error) {\n\tb := bufiox.NewReader(r)\n\tdec, err := mp3.NewDecoder(b)\n\treturn &decoded{Decoder: *dec}, err\n}", "title": "" }, { "docid": "5791087ffa97a50b41a0221de4a47ccc", "score": "0.5197855", "text": "func Decode(src []byte, options ...DecoderOption) ([]byte, error) {\n\td := NewDecoder(options...)\n\treturn d.Decode(src)\n}", "title": "" }, { "docid": "176b4bccd9a64a21ed6e754f6e30b1c4", "score": "0.5181269", "text": "func (c Converter) Decode(r io.ReadSeeker) (interface{}, error) {\n\treturn nil, errors.New(\"decoding dhall files is not implemented yet\")\n}", "title": "" }, { "docid": "03f8d2f2973c556c249b04aab02ebb4c", "score": "0.51745975", "text": "func (dec *Decoder) Decode() (p *Pattern, err error) {\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif _, ok := r.(runtime.Error); ok {\n\t\t\t\tpanic(r)\n\t\t\t}\n\t\t\terr = r.(error)\n\t\t\tif err == io.EOF {\n\t\t\t\terr = io.ErrUnexpectedEOF\n\t\t\t}\n\t\t}\n\t}()\n\n\ttSize, ver, tempo := dec.decodeHeader()\n\tvar tracks []*Track\n\tfor tSize > 0 {\n\t\ttrack := dec.decodeTrack()\n\t\ttracks = append(tracks, track)\n\t\ttSize -= binary.Size(track.ID) + 16 + 1 + len(track.Name)\n\t}\n\t// TODO: fail if bLen == 0 or no EOF?\n\treturn &Pattern{\n\t\tVersion: ver,\n\t\tTempo: tempo,\n\t\tTracks: tracks,\n\t}, nil\n}", "title": "" }, { "docid": "2322c3ba9f8d9b1750956f3e58f9b44d", "score": "0.5164819", "text": "func decode(buf *bytes.Buffer, strict bool, customDecoders []CustomDecoder) (Playlist, ListType, error) {\n\tvar eof bool\n\tvar line string\n\tvar master *MasterPlaylist\n\tvar media *MediaPlaylist\n\tvar listType ListType\n\tvar err error\n\n\tstate := new(decodingState)\n\twv := new(WV)\n\n\tmaster = NewMasterPlaylist()\n\tmedia, err = NewMediaPlaylist(8, 1024) // Winsize for VoD will become 0, capacity auto extends\n\tif err != nil {\n\t\treturn nil, 0, fmt.Errorf(\"Create media playlist failed: %s\", err)\n\t}\n\n\t// If we have custom tags to parse\n\tif customDecoders != nil {\n\t\tmedia = media.WithCustomDecoders(customDecoders).(*MediaPlaylist)\n\t\tmaster = master.WithCustomDecoders(customDecoders).(*MasterPlaylist)\n\t\tstate.custom = make(map[string]CustomTag)\n\t}\n\n\tfor !eof {\n\t\tif line, err = buf.ReadString('\\n'); err == io.EOF {\n\t\t\teof = true\n\t\t} else if err != nil {\n\t\t\tbreak\n\t\t}\n\n\t\t// fixes the issues https://github.com/grafov/m3u8/issues/25\n\t\t// TODO: the same should be done in decode functions of both Master- and MediaPlaylists\n\t\t// so some DRYing would be needed.\n\t\tif len(line) < 1 || line == \"\\r\" {\n\t\t\tcontinue\n\t\t}\n\n\t\terr = decodeLineOfMasterPlaylist(master, state, line, strict)\n\t\tif strict && err != nil {\n\t\t\treturn master, state.listType, err\n\t\t}\n\n\t\terr = decodeLineOfMediaPlaylist(media, wv, state, line, strict)\n\t\tif strict && err != nil {\n\t\t\treturn media, state.listType, err\n\t\t}\n\n\t}\n\tif state.listType == MEDIA && state.tagWV {\n\t\tmedia.WV = wv\n\t}\n\n\tif strict && !state.m3u {\n\t\treturn nil, listType, errors.New(\"#EXTM3U absent\")\n\t}\n\n\tswitch state.listType {\n\tcase MASTER:\n\t\treturn master, MASTER, nil\n\tcase MEDIA:\n\t\tif media.Closed || media.MediaType == EVENT {\n\t\t\t// VoD and Event's should show the entire playlist\n\t\t\tmedia.SetWinSize(0)\n\t\t}\n\t\treturn media, MEDIA, nil\n\t}\n\treturn nil, state.listType, errors.New(\"Can't detect playlist type\")\n}", "title": "" }, { "docid": "86a0644cd5d0b69ccbbc67318b2f23f6", "score": "0.5159438", "text": "func decode(id *ID, src []byte) {\n\tencoder.Decode(id[:], src)\n}", "title": "" }, { "docid": "e1953d92c05f132ab1d41a36dc54a7f4", "score": "0.51591295", "text": "func ConvertToMP4(videoSrcPath, videoDestDir string) error {\n\toutMP4Path := path.Join(videoDestDir, \"out.mp4\")\n\targs := []string{\n\t\t// \"-noautorotate\", // not supported for version smaller 2.7\n\t\t\"-i\", videoSrcPath,\n\t\t\"-codec:v\", \"libx264\",\n\t\t\"-profile\", \"high\",\n\t\t\"-threads\", \"0\",\n\t\t\"-codec:a\", \"libfdk_aac\",\n\t\t\"-b:a\", \"128k\",\n\t\toutMP4Path,\n\t}\n\n\terr := runCmd(FFMPEG, \"\", args...)\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "186c6d75f579dd67307bb93bf5bc288d", "score": "0.5133654", "text": "func Decode(r io.Reader) (image.Image, error) {}", "title": "" }, { "docid": "fded0e5fa28575a8f5f1449749fea3ef", "score": "0.512847", "text": "func Decode(b []byte) (*Flash, error) {\n\tf := New()\n\tif len(b) == 0 {\n\t\treturn f, nil\n\t}\n\n\terr := gob.NewDecoder(bytes.NewReader(b)).Decode(&f.v)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn f, nil\n}", "title": "" }, { "docid": "4b8cd96f052e2296c3500bdfb851c739", "score": "0.5099176", "text": "func (p *MasterPlaylist) decode(buf *bytes.Buffer, strict bool) error {\n\tvar eof bool\n\n\tstate := new(decodingState)\n\n\tfor !eof {\n\t\tline, err := buf.ReadString('\\n')\n\t\tif err == io.EOF {\n\t\t\teof = true\n\t\t} else if err != nil {\n\t\t\tbreak\n\t\t}\n\t\terr = decodeLineOfMasterPlaylist(p, state, line, strict)\n\t\tif strict && err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif strict && !state.m3u {\n\t\treturn errors.New(\"#EXTM3U absent\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5cfa1751644c5fb83cc13da10df7c181", "score": "0.5098071", "text": "func (d *Decoder) Decode() error {\n\tvar err error\n\tvar code [4]byte\n\n\tif err := binary.Read(d.r, binary.BigEndian, &code); err != nil {\n\t\treturn err\n\t}\n\tif code != headerChunkID {\n\t\treturn fmt.Errorf(\"%s - %v\", ErrFmtNotSupported, code)\n\t}\n\tvar headerSize uint32\n\tif err := binary.Read(d.r, binary.BigEndian, &headerSize); err != nil {\n\t\treturn err\n\t}\n\n\tif headerSize != 6 {\n\t\treturn fmt.Errorf(\"%s - expected header size to be 6, was %d\", ErrFmtNotSupported, headerSize)\n\t}\n\n\tif err := binary.Read(d.r, binary.BigEndian, &d.Format); err != nil {\n\t\treturn err\n\t}\n\n\tif err := binary.Read(d.r, binary.BigEndian, &d.NumTracks); err != nil {\n\t\treturn err\n\t}\n\n\tvar division uint16\n\tif err := binary.Read(d.r, binary.BigEndian, &division); err != nil {\n\t\treturn err\n\t}\n\n\t// If bit 15 of <division> is zero, the bits 14 thru 0 represent the number\n\t// of delta time \"ticks\" which make up a quarter-note. For instance, if\n\t// division is 96, then a time interval of an eighth-note between two\n\t// events in the file would be 48.\n\tif (division & 0x8000) == 0 {\n\t\td.TicksPerQuarterNote = division & 0x7FFF\n\t\td.TimeFormat = MetricalTF\n\t} else {\n\t\t/*\n\t\t\tIf bit 15 of <division> is a one, delta times in a file correspond\n\t\t\tto subdivisions of a second, in a way consistent with SMPTE and MIDI\n\t\t\tTime Code. Bits 14 thru 8 contain one of the four values -24, -25, -29,\n\t\t\tor -30, corresponding to the four standard SMPTE and MIDI Time Code\n\t\t\tformats (-29 corresponds to 30 drop frome), and represents the\n\t\t\tnumber of frames per second. These negative numbers are stored in\n\t\t\ttwo's compliment form. The second byte (stored positive) is the\n\t\t\tresolution within a frame: typical values may be 4 (MIDI Time Code\n\t\t\tresolution), 8, 10, 80 (bit resolution), or 100. This stream allows\n\t\t\texact specifications of time-code-based tracks, but also allows\n\t\t\tmilisecond-based tracks by specifying 25|frames/sec and a\n\t\t\tresolution of 40 units per frame. If the events in a file are stored\n\t\t\twith a bit resolution of thirty-frames time code, the division word\n\t\t\twould be E250 hex.\n\t\t*/\n\t\td.TimeFormat = TimeCodeTF\n\t}\n\n\t_, nextChunk, err := d.parseTrack()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor err != io.EOF {\n\t\tswitch nextChunk {\n\t\tcase eventChunk:\n\t\t\tnextChunk, err = d.parseEvent()\n\t\tcase trackChunk:\n\t\t\t_, nextChunk, err = d.parseTrack()\n\t\t}\n\n\t\tif err != nil && err != io.EOF {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// All done\n\treturn nil\n}", "title": "" }, { "docid": "26fbe39f9a0621b467efde0b2f9673ed", "score": "0.50759894", "text": "func convertToOpusFrames(videoBuf *bytes.Buffer, start string, duration string) ([][]byte, error) {\n\trun := exec.Command(\"ffmpeg\", \"-i\", \"pipe:0\", \"-f\", \"s16le\", \"-ar\", strconv.Itoa(frameRate), \"-ac\", strconv.Itoa(channels), \"-ss\", start, \"-t\", duration, \"pipe:1\")\n\tffmpegOut, _ := run.StdoutPipe()\n\tffmpegIn, _ := run.StdinPipe()\n\n\tgo func() {\n\t\tdefer ffmpegIn.Close()\n\t\tffmpegIn.Write(videoBuf.Bytes())\n\t}()\n\n\tffmpegbuf := bufio.NewReader(ffmpegOut)\n\n\terr := run.Start()\n\tif err != nil {\n\t\treturn nil, errors.New(\"Error converting video\")\n\t}\n\n\topusEncoder, _ := gopus.NewEncoder(frameRate, channels, gopus.Audio)\n\topusFrames := make([][]byte, 0)\n\tfor {\n\t\t// CDF: This represents the bytes of a single frame. 20ms * 48 samples/ms * 2 channels * 2 bytes per sample\n\t\tframeBytes := make([]byte, frameSize*channels*2)\n\t\t_, err := io.ReadFull(ffmpegbuf, frameBytes)\n\t\t// If EOF or UnexpectedEOF is received, return all opusFrames because either all of the audio data was converted\n\t\t// into opusFrames or we have some audio data (<20ms) that won't fit into a valid opus frame so throw it away for now\n\t\tif err != nil {\n\t\t\treturn opusFrames, nil\n\t\t}\n\n\t\tbytesReader := bytes.NewReader(frameBytes)\n\t\tframeBuf := make([]int16, frameSize*channels)\n\t\terr = binary.Read(bytesReader, binary.LittleEndian, &frameBuf)\n\t\tif err != nil {\n\t\t\t// This branch should almost never be ran. The only time it could be is if the video data\n\t\t\t// fit perfectly into 20ms opus frames with no remaining data.\n\t\t\tfmt.Println(\"binary.Read EOF reached\")\n\t\t\treturn opusFrames, nil\n\t\t}\n\n\t\topusFrame, err := opusEncoder.Encode(frameBuf, frameSize, maxBytes)\n\t\tif err != nil {\n\t\t\treturn nil, errors.New(\"Error encoding audio\")\n\t\t}\n\t\topusFrames = append(opusFrames, opusFrame)\n\t}\n}", "title": "" }, { "docid": "7e104d3f0bb7a64e909ad96d232d6c80", "score": "0.5071796", "text": "func encodeDecodeFilterPipeline(t *testing.T, fileName string, fpl []string) {\n\tt.Helper()\n\n\tf0, err := os.Open(fileName)\n\tif err != nil {\n\t\tt.Errorf(\"%s: %v\", fileName, err)\n\t\treturn\n\t}\n\tdefer f0.Close()\n\n\tr := io.Reader(f0)\n\n\tfor i := len(fpl) - 1; i >= 0; i-- {\n\t\tr = encode(t, r, fpl[i])\n\t}\n\n\tfor _, f := range fpl {\n\t\tr = decode(t, r, f)\n\t}\n\n\t// Compare decoded bytes with original bytes.\n\tgolden, err := os.Open(fileName)\n\tif err != nil {\n\t\tt.Errorf(\"%s: %v\", fileName, err)\n\t\treturn\n\t}\n\tdefer golden.Close()\n\n\tg, err := io.ReadAll(golden)\n\tif err != nil {\n\t\tt.Errorf(\"%s: %v\", fileName, err)\n\t\treturn\n\t}\n\n\td, err := io.ReadAll(r)\n\tif err != nil {\n\t\tt.Errorf(\"%s: %v\", fileName, err)\n\t\treturn\n\t}\n\n\tif len(d) != len(g) {\n\t\tt.Errorf(\"%s: length mismatch %d != %d\", fileName, len(d), len(g))\n\t\treturn\n\t}\n\n\tfor i := 0; i < len(d); i++ {\n\t\tif d[i] != g[i] {\n\t\t\tt.Errorf(\"%s: mismatch at %d, 0x%02x != 0x%02x\\n\", fileName, i, d[i], g[i])\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f1352cc7f140d1374ae49762148faa60", "score": "0.5068168", "text": "func toMIMECodec(codec videotype.Codec) string {\n\tswitch codec {\n\tcase videotype.H264:\n\t\t// H.264 Baseline Level 3.1.\n\t\treturn \"avc1.42001F\"\n\tcase videotype.VP8:\n\t\treturn \"vp8\"\n\tcase videotype.VP9:\n\t\t// VP9 profile 0 level 1.0 8-bit depth.\n\t\treturn \"vp09.00.10.08\"\n\tcase videotype.AV1:\n\t\t// AV1 profile Main level 3.1 8-bit depth.\n\t\t// \"level 3.1\" means 1280x720@30fps, as per [1], is that intended,\n\t\t// i.e. to specify the resolution and framerate at configuration\n\t\t// time (and not just encode anything that is fed into the encoder).\n\t\t// [1] https://aomedia.org/av1/specification/annex-a/\n\t\treturn \"av01.0.05M.08\"\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "b343f348a56092716cf58f09f8fd9449", "score": "0.5065833", "text": "func flac2wav(in os.File, n Namer) (os.File, error) {\n\tout := n(in)\n\tcmd := exec.Command(\"flac\",\n\t\t\"-f\", // overwrite any existing file\n\t\t\"--silent\",\t// output is useless because we are multiplexing goroutines\n\t\t\"-d\", in.Name(), // decode file (input)\n\t\t\"-o\", out.Name()) // output file\n\tcmd.Stderr = os.Stderr\n\tcmd.Stdout = os.Stdout\n\terr := cmd.Run()\n\treturn out, err\n}", "title": "" }, { "docid": "5d8bcd9d3bccf61fbe505ab34768bf1d", "score": "0.5050605", "text": "func Decode(r io.Reader) (Archive, string, error) {\n\tb, _ := ioutil.ReadAll(r)\n\tf := sniff(bytes.NewReader(b))\n\tif f.decode == nil {\n\t\treturn nil, \"\", ErrFormat\n\t}\n\tm := f.decode(bytes.NewReader(b))\n\treturn m, f.name, nil\n}", "title": "" }, { "docid": "a934ff3b84ca4a3e786acd5270f8f7dc", "score": "0.50400066", "text": "func decode(s string) string {\n\tr := s\n\tfor _, tr := range codecValues {\n\t\tif strings.Index(r, tr.encoded) >= 0 {\n\t\t\tr = strings.Replace(r, tr.encoded, tr.decoded, -1)\n\t\t}\n\t}\n\treturn r\n}", "title": "" }, { "docid": "ed9be109102b0cadc7a4d1a3106525a5", "score": "0.50284624", "text": "func DecodeFromFile(r io.Reader, directory string) (message string, filename string, err error) {\n\thidden, err := jsteg.Reveal(r)\n\tif err != nil {\n\t\treturn\n\t}\n\tstr := string(hidden)\n\tfirstIndex := strings.Index(str, \":\")\n\tdataLength, err := strconv.ParseUint(str[0:firstIndex], 10, 64)\n\tif firstIndex == -1 || err != nil {\n\t\treturn str, \"\", nil\n\t}\n\tsecondIndex := strings.Index(str, \"/\")\n\tmessageType := str[firstIndex+1 : secondIndex]\n\tif messageType == \"m\" {\n\t\tmessage = str[secondIndex+1 : uint64(secondIndex)+1+dataLength]\n\t\treturn\n\t}\n\tos.Mkdir(directory, os.ModePerm)\n\tnewf, err := os.Create(directory + \"/\" + messageType)\n\tif err != nil {\n\t\treturn \"\", \"\", err\n\t}\n\tfmt.Println(\"New file saved in \" + directory + \"/\" + messageType)\n\tdata := []byte(str[secondIndex+1 : uint64(secondIndex)+1+dataLength])\n\t_, err = newf.Write(data)\n\tif err != nil {\n\t\treturn\n\t}\n\tfilename = messageType\n\tstr = str[uint64(secondIndex)+1+dataLength:]\n\t// the following code block is mostly reused and should probably be moved to a function\n\tfirstIndex = strings.Index(str, \":\")\n\tdataLength, err = strconv.ParseUint(str[0:firstIndex], 10, 64)\n\tif firstIndex == -1 || err != nil {\n\t\terr = nil\n\t\treturn\n\t}\n\tsecondIndex = strings.Index(str, \"/\")\n\tmessageType = str[firstIndex+1 : secondIndex]\n\tif messageType == \"m\" {\n\t\tmessage = str[secondIndex+1 : uint64(secondIndex)+1+dataLength]\n\t\treturn\n\t}\n\t/////// end of reused code block\n\treturn\n}", "title": "" }, { "docid": "7a03b430c3749482685a742e5b4c7cd6", "score": "0.50277334", "text": "func (f *linkFrame) Decode(r io.Reader) (err error) {\n var m map[string]interface{}\n m, err = BencodeReadMap(r)\n if err == nil {\n v, ok := m[\"m\"]\n if ok {\n switch v.(type) {\n case int64:\n f.method = v.(int64)\n break\n default:\n err = errors.New(\"bad method type\")\n return\n }\n } else {\n // no method?\n err = errors.New(\"no method specified\")\n return\n }\n v, ok = m[\"r\"]\n if ok {\n switch v.(type) {\n case int64:\n f.response = v.(int64)\n break\n default:\n err = errors.New(\"bad response type\")\n return\n }\n }\n v, ok = m[\"p\"]\n if ok {\n switch v.(type) {\n case map[string]interface{}:\n f.param = v.(map[string]interface{})\n break\n default:\n err = errors.New(\"Bad parameters type\")\n return\n }\n } else {\n // no parameters?\n err = errors.New(\"no parameters\")\n return\n }\n }\n return\n}", "title": "" }, { "docid": "ca441dfa1590b922629497e4193d9501", "score": "0.5021945", "text": "func Decode(data []byte) (*Decoded, error) {\n\tdec := &Decoded{}\n\tif len(data) < 2 {\n\t\treturn dec, errors.New(\"invalid decode input\")\n\t}\n\trows := strings.Split(string(data), \"\\n\")\n\tif strings.Split(rows[0], \" \")[0] != \"begin\" {\n\t\treturn dec, errors.New(\"invalid format\")\n\t}\n\n\tif strings.Split(rows[0], \" \")[1] == \" \" || strings.Split(rows[0], \" \")[1] == \"\" {\n\t\treturn dec, errors.New(\"invalid file permissions\")\n\t}\n\tdec.Mode = strings.Split(rows[0], \" \")[1]\n\n\tif strings.Split(rows[0], \" \")[2] == \" \" || strings.Split(rows[0], \" \")[2] == \"\" {\n\t\treturn dec, errors.New(\"invalid filename\")\n\t}\n\tdec.Filename = strings.Split(rows[0], \" \")[2]\n\n\tif rows[len(rows)-2] != \"end\" {\n\t\treturn dec, errors.New(\"invalid format: no 'end' marker found\")\n\t}\n\tif rows[len(rows)-3] != \"`\" && rows[len(rows)-3] != \" \" {\n\t\treturn dec, errors.New(\"invalid ending format\")\n\t}\n\n\trows = rows[1 : len(rows)-3]\n\n\tvar err error\n\tdec.Data, err = DecodeBlock(rows)\n\treturn dec, err\n}", "title": "" }, { "docid": "a5fe1783f1868fbdad75bd96a7caf778", "score": "0.5020658", "text": "func NewFFmpeg(song *data.Song, options Options) *FFmpeg {\n\treturn &FFmpeg{\n\t\toptions: options,\n\t\tsong: song,\n\t\tstarted: false,\n\t}\n}", "title": "" }, { "docid": "65b628c1c6f21be94b243d6621bfcf8b", "score": "0.5006429", "text": "func DecodeAvro(conProdID int, messageID int, message []byte) (structs.MyInfo, int64){\n\tvar output structs.MyInfo\n\tb := bytes.NewBuffer(message)\n\t\n\t// decode this shit to verify\n\tocfr, err := goavro.NewOCFReader(b)\n\tif err != nil{\n\t\tpanic(err)\n\t}\n\n\tvar decoded interface{}\n\t// println(ocfr.Scan()) //--> if true, messages available\n\tstartTime := time.Now().UnixNano()\n\n\tfor ocfr.Scan(){\n\t\t\tdecoded, err = ocfr.Read()\n\t\t\tif err != nil {\n\t\t\t\tfmt.Fprintf(os.Stderr, \"%s\\n\", err)\n\t\t\t}\n\t\t\t// fmt.Println(decoded)\n\t\t\t// fmt.Printf(\"Test mit Printf: %v \\n\", decoded)\n\t}\n\n\tjsontest, err := json.Marshal(decoded)\n\tif err != nil{\n\t\tlog.Fatal(err)\n\t}\n\t// println(string(jsontest))\n\tjson.Unmarshal(jsontest, &output)\n\n\t// endTime := time.Now().UnixNano()\n\t// duration:= endTime - startTime\n\n\t// fmt.Printf(\"Myinfo1: %s \\n\", output)\n\t// fmt.Printf(\"Time: %s \\n\", output.TheTime)\n\t// fmt.Printf(\"ScareMe: %s \\n\", output.ScareMe)\n\t// fmt.Printf(\"Binary: %s \\n\", output.Binaryfile)\n\n\treturn output, startTime\n}", "title": "" }, { "docid": "f6901d01d0711217af033b78b155a962", "score": "0.5006339", "text": "func (this *Codec) decode(shortUrl string) string {\n return this.decodeMap[shortUrl]\n}", "title": "" }, { "docid": "a9ebdca84fe5ce435e90d12bac800827", "score": "0.49941808", "text": "func execDecodeConfig(_ int, p *gop.Context) {\n\targs := p.GetArgs(1)\n\tret, ret1 := png.DecodeConfig(args[0].(io.Reader))\n\tp.Ret(1, ret, ret1)\n}", "title": "" }, { "docid": "a7d4ee544cdd7d406b8aa29febae6ee8", "score": "0.49884224", "text": "func decodePBMPlain(r io.Reader) (image.Image, error) {\n\timg, _, err := decodePBMPlainWithComments(r)\n\treturn img, err\n}", "title": "" }, { "docid": "5d1353a8885d78a342cc3da6a5ba7ffb", "score": "0.49752018", "text": "func Decode(r io.Reader) (image.Image, error)", "title": "" }, { "docid": "5d1353a8885d78a342cc3da6a5ba7ffb", "score": "0.49752018", "text": "func Decode(r io.Reader) (image.Image, error)", "title": "" }, { "docid": "1162695529ec41426709f12776e12cd9", "score": "0.49568474", "text": "func ParseM3u8Content(m3u8Content string, playbackURL string, playbackURLData string) map[string]map[string]string {\n\n\tvar m3u8Info map[string]string\n\tvar urlFormats = make(map[string]map[string]string)\n\tvar isLeastResolution = true\n\tfor _, line := range strings.Split(m3u8Content, \"\\n\") {\n\n\t\tif strings.HasPrefix(line, \"#EXT-X-STREAM-INF:\") {\n\n\t\t\tif m3u8Info == nil {\n\t\t\t\tm3u8Info = make(map[string]string)\n\t\t\t}\n\n\t\t\tm3u8InfoCsv := strings.Replace(line, \"#EXT-X-STREAM-INF:\", \"\", -1)\n\t\t\tm3u8InfoRegex := regexp.MustCompile(`([\\w\\-]+)\\=([\\w\\-]+|\"[^\"]*\")`)\n\n\t\t\tfor _, info := range m3u8InfoRegex.FindAllStringSubmatch(m3u8InfoCsv, -1) {\n\t\t\t\tm3u8Info[info[1]] = info[2]\n\t\t\t}\n\t\t} else if strings.Contains(line, \".m3u8\") {\n\n\t\t\tif m3u8Info != nil {\n\n\t\t\t\taverageBandwidthOrBandwidth := func() int {\n\t\t\t\t\tvar bw string\n\t\t\t\t\tif m3u8Info[\"AVERAGE-BANDWIDTH\"] != \"\" {\n\t\t\t\t\t\tbw = m3u8Info[\"AVERAGE-BANDWIDTH\"]\n\t\t\t\t\t} else {\n\t\t\t\t\t\tbw = m3u8Info[\"BANDWIDTH\"]\n\t\t\t\t\t}\n\t\t\t\t\tvar bwInt, _ = strconv.Atoi(bw)\n\t\t\t\t\treturn bwInt\n\t\t\t\t}()\n\n\t\t\t\tkFactor := averageBandwidthOrBandwidth / 1000\n\t\t\t\tkForm := fmt.Sprintf(\"%dk\", kFactor)\n\n\t\t\t\tm3u8Info[\"K-FORM\"] = kForm\n\t\t\t\tif strings.Compare(m3u8Info[\"RESOLUTION\"], \"640x360\") == 0 {\n\t\t\t\t\tm3u8Info[\"BEST_RESOLUTION\"] = \"true\"\n\t\t\t\t} else {\n\t\t\t\t\tm3u8Info[\"BEST_RESOLUTION\"] = \"false\"\n\t\t\t\t}\n\n\t\t\t\tif isLeastResolution {\n\t\t\t\t\tm3u8Info[\"LEAST_RESOLUTION\"] = \"true\"\n\t\t\t\t\tisLeastResolution = false\n\t\t\t\t} else {\n\t\t\t\t\tm3u8Info[\"LEAST_RESOLUTION\"] = \"false\"\n\t\t\t\t}\n\n\t\t\t\tstreamURL := line\n\n\t\t\t\tif !strings.HasPrefix(line, \"http\") {\n\t\t\t\t\tstreamURL = strings.Replace(playbackURL, \"master.m3u8\", line, -1)\n\t\t\t\t}\n\n\t\t\t\tif !strings.Contains(streamURL, \"~acl=/*~hmac\") {\n\t\t\t\t\tif !strings.Contains(streamURL, \"?\") {\n\t\t\t\t\t\tstreamURL += \"?\"\n\t\t\t\t\t}\n\t\t\t\t\tstreamURL += (\"&\" + playbackURLData)\n\t\t\t\t}\n\n\t\t\t\tre := regexp.MustCompile(`\\r`)\n\t\t\t\tstreamURL = re.ReplaceAllString(streamURL, \"\")\n\n\t\t\t\tm3u8Info[\"STREAM-URL\"] = streamURL\n\n\t\t\t\turlFormats[fmt.Sprintf(\"hls-%d\", kFactor)] = CopyMap(m3u8Info)\n\n\t\t\t\t//Reset m3u8InfoArray for next layer\n\t\t\t\tm3u8Info = nil\n\t\t\t}\n\n\t\t} else {\n\t\t\t//do nothing\n\t\t}\n\t}\n\n\treturn urlFormats\n}", "title": "" }, { "docid": "9fd70e28e09b84f9ec88c97982a754e9", "score": "0.49494377", "text": "func Decode(f Frame, buf []byte) error {\n\treturn f.Decode(buf)\n}", "title": "" }, { "docid": "f5d115515d8fa193251a972499e8e25b", "score": "0.49479988", "text": "func decode(filename string) (image.Image, error) {\n\tf, err := os.Open(filename)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer f.Close()\n\tm, _, err := image.Decode(f)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not decode %s: %v\", filename, err)\n\t}\n\treturn m, nil\n}", "title": "" }, { "docid": "fc2a804c7d79236bfe53af406f7d9723", "score": "0.4946444", "text": "func decodeDecoder(s *Stream, val reflect.Value) error {\n\tif val.Kind() == reflect.Ptr && val.IsNil() {\n\t\t// set the value to the pointer pointed to the 0 represented by the data type\n\t\tval.Set(reflect.New(val.Type().Elem()))\n\t}\n\t// transfer the reflect type back to Decoder interface type, and call DecodeRLP method\n\treturn val.Interface().(Decoder).DecodeRLP(s)\n}", "title": "" }, { "docid": "8914fa2a37ce28a2c2c120dfeb257d78", "score": "0.4943941", "text": "func (d *textDecoder) Decode(v *dto.MetricFamily) error {\n\tif d.err == nil {\n\t\t// Read all metrics in one shot.\n\t\tvar p TextParser\n\t\td.fams, d.err = p.TextToMetricFamilies(d.r)\n\t\t// If we don't get an error, store io.EOF for the end.\n\t\tif d.err == nil {\n\t\t\td.err = io.EOF\n\t\t}\n\t}\n\t// Pick off one MetricFamily per Decode until there's nothing left.\n\tfor key, fam := range d.fams {\n\t\tv.Name = fam.Name\n\t\tv.Help = fam.Help\n\t\tv.Type = fam.Type\n\t\tv.Metric = fam.Metric\n\t\tdelete(d.fams, key)\n\t\treturn nil\n\t}\n\treturn d.err\n}", "title": "" }, { "docid": "00755709678934bc29b5b3f1afbb64e7", "score": "0.4923469", "text": "func ConvertVideo(sourcePath, destinationPath string, width, height int) (string, string, error) {\n\tlog.Printf(\"converting video %v to %vx%v at %v\", sourcePath, width, height, destinationPath)\n\n\targuments := make([]string, 0)\n\n\t//if runtime.GOOS != \"darwin\" {\n\t//\targuments = append(arguments, \"-f\")\n\t//}\n\n\t//arguments = append(\n\t//\targuments,\n\t//\t[]string{\n\t//\t\t\"-l\",\n\t//\t\t\"75\",\n\t//\t\t\"--\",\n\t//\t\t\"ffmpeg\",\n\t//\t\t\"-hwaccel\",\n\t//\t\t\"cuda\",\n\t//\t\t\"-c:v\",\n\t//\t\t\"h264_cuvid\",\n\t//\t\t\"-y\",\n\t//\t\t\"-i\",\n\t//\t\tsourcePath,\n\t//\t\t\"-s\",\n\t//\t\tfmt.Sprintf(\"%vx%v\", width, height),\n\t//\t\tdestinationPath,\n\t//\t}...,\n\t//)\n\n\targuments = []string{\n\t\t\"-hwaccel\",\n\t\t\"cuda\",\n\t\t\"-c:v\",\n\t\t\"h264_cuvid\",\n\t\t\"-y\",\n\t\t\"-i\",\n\t\tsourcePath,\n\t\t\"-s\",\n\t\tfmt.Sprintf(\"%vx%v\", width, height),\n\t\t\"-c:v\",\n\t\t\"h264_nvenc\",\n\t\tdestinationPath,\n\t}\n\n\t//return common.RunCommand(\n\t//\t\"cpulimit\",\n\t//\targuments...,\n\t//)\n\n\treturn common.RunCommand(\n\t\t\"ffmpeg\",\n\t\targuments...,\n\t)\n}", "title": "" }, { "docid": "66ab295479c023e746f43a61cb89ea46", "score": "0.4918712", "text": "func Decode(src []byte) (dst [10]byte)", "title": "" }, { "docid": "31729064f147e7dec7c9ecd2a0cff489", "score": "0.49126738", "text": "func Decode(filepath string) (*Decoder, error) {\n\n\t// Opens file\n\tf, err := os.Open(filepath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer f.Close()\n\n\treturn DecodeReader(f)\n}", "title": "" }, { "docid": "c8c20c8379933157eb1e9a34b631f6e0", "score": "0.48911977", "text": "func DecodeConfig(data []byte) (image.Config, error) {\n\tctx := C.avformat_alloc_context()\n\tr := bytes.NewReader(data)\n\tavioCtx, err := newAVIOContext(ctx, &avIOHandlers{ReadPacket: r.Read, Seek: r.Seek})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tctx.pb = avioCtx.avAVIOContext\n\tif ctx = C.create_context(ctx); ctx == nil {\n\t\tavioCtx.Free()\n\t\treturn image.Config{}, errors.New(\"Failed to initialize AVFormatContext\")\n\t}\n\tf := C.extract_video(ctx)\n\tif f == nil {\n\t\treturn image.Config{}, errors.New(\"Failed to decode\")\n\t}\n\tif strings.Contains(C.GoString(C.av_get_pix_fmt_name(int32(f.pix_fmt))), \"yuv\") {\n\t\treturn image.Config{ColorModel: color.YCbCrModel,\n\t\t\tWidth: int(f.width),\n\t\t\tHeight: int(f.height)}, nil\n\t} else {\n\t\treturn image.Config{ColorModel: color.RGBAModel,\n\t\t\tWidth: int(f.width),\n\t\t\tHeight: int(f.height)}, nil\n\t}\n}", "title": "" }, { "docid": "6eff3eca9ebf08c4e2cc62597b407684", "score": "0.4890197", "text": "func (d *Decoder) DecodeInterface() (interface{}, error) {\n\tc, err := d.readCode()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif msgpcode.IsFixedNum(c) {\n\t\treturn int8(c), nil\n\t}\n\tif msgpcode.IsFixedMap(c) {\n\t\terr = d.s.UnreadByte()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn d.decodeMapDefault()\n\t}\n\tif msgpcode.IsFixedArray(c) {\n\t\treturn d.decodeSlice(c)\n\t}\n\tif msgpcode.IsFixedString(c) {\n\t\treturn d.string(c)\n\t}\n\n\tswitch c {\n\tcase msgpcode.Nil:\n\t\treturn nil, nil\n\tcase msgpcode.False, msgpcode.True:\n\t\treturn d.bool(c)\n\tcase msgpcode.Float:\n\t\treturn d.float32(c)\n\tcase msgpcode.Double:\n\t\treturn d.float64(c)\n\tcase msgpcode.Uint8:\n\t\treturn d.uint8()\n\tcase msgpcode.Uint16:\n\t\treturn d.uint16()\n\tcase msgpcode.Uint32:\n\t\treturn d.uint32()\n\tcase msgpcode.Uint64:\n\t\treturn d.uint64()\n\tcase msgpcode.Int8:\n\t\treturn d.int8()\n\tcase msgpcode.Int16:\n\t\treturn d.int16()\n\tcase msgpcode.Int32:\n\t\treturn d.int32()\n\tcase msgpcode.Int64:\n\t\treturn d.int64()\n\tcase msgpcode.Bin8, msgpcode.Bin16, msgpcode.Bin32:\n\t\treturn d.bytes(c, nil)\n\tcase msgpcode.Str8, msgpcode.Str16, msgpcode.Str32:\n\t\treturn d.string(c)\n\tcase msgpcode.Array16, msgpcode.Array32:\n\t\treturn d.decodeSlice(c)\n\tcase msgpcode.Map16, msgpcode.Map32:\n\t\terr = d.s.UnreadByte()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn d.decodeMapDefault()\n\tcase msgpcode.FixExt1, msgpcode.FixExt2, msgpcode.FixExt4, msgpcode.FixExt8, msgpcode.FixExt16,\n\t\tmsgpcode.Ext8, msgpcode.Ext16, msgpcode.Ext32:\n\t\treturn d.decodeInterfaceExt(c)\n\t}\n\n\treturn 0, fmt.Errorf(\"msgpack: unknown code %x decoding interface{}\", c)\n}", "title": "" }, { "docid": "6e963c9ee98fd9c5ba2336d580c862ff", "score": "0.48876458", "text": "func (d *Decoder) Decode(v interface{}) error {\n\treturn nil\n}", "title": "" }, { "docid": "e6b227f4178bee0cc4f6fad71e05aeea", "score": "0.4875", "text": "func (self *StreamDecoder) Decode(val interface{}) (err error) {\n if self.err != nil {\n return self.err\n }\n\n var buf = self.buf[self.scanp:]\n var p = 0\n var recycle bool\n if cap(buf) == 0 {\n buf = bufPool.Get().([]byte)\n recycle = true\n }\n \n var first = true\n var repeat = true\nread_more:\n for {\n l := len(buf)\n realloc(&buf)\n n, err := self.r.Read(buf[l:cap(buf)])\n buf = buf[:l+n]\n if err != nil {\n repeat = false\n if err == io.EOF {\n if len(buf) == 0 {\n return err\n }\n break\n }\n self.err = err\n return err\n }\n if n > 0 || first {\n break\n }\n }\n first = false\n\n l := len(buf)\n if l > 0 {\n self.Decoder.Reset(string(buf))\n err = self.Decoder.Decode(val)\n if err != nil {\n if repeat && self.repeatable(err) {\n goto read_more\n }\n self.err = err\n }\n\n p = self.Decoder.Pos()\n self.scanned += int64(p)\n self.scanp = 0\n }\n \n if l > p {\n // remain undecoded bytes, so copy them into self.buf\n self.buf = append(self.buf[:0], buf[p:]...)\n } else {\n self.buf = nil\n recycle = true\n }\n\n if recycle {\n buf = buf[:0]\n bufPool.Put(buf)\n }\n return err\n}", "title": "" }, { "docid": "2acb3d5fd60c4fc9736ddc4dc02f1a60", "score": "0.48713326", "text": "func (dec *Decoder) decode(_ Code, _ reflect.Value) {\n\tdefer catchError(&dec.err)\n}", "title": "" }, { "docid": "cddd503153131d92f11325af5350813e", "score": "0.4868859", "text": "func DecodeFile(path string) (*Pattern, error) {\n\td, err := ioutil.ReadFile(path)\n\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn nil, nil\n\t}\n\tvar p Pattern\n\tbuf := bytes.NewReader(d)\n\terr = binary.Read(buf, binary.BigEndian, &p)\n\tif err != nil {\n\t\tfmt.Println(\"binary.Read failed:\", err)\n\t}\n\t/*p := &Pattern{content: `Saved with HW Version: 0.808-alpha\n\tTempo: 120\n\t(0) kick\t|x---|x---|x---|x---|\n\t(1) snare\t|----|x---|----|x---|\n\t(2) clap\t|----|x-x-|----|----|\n\t(3) hh-open\t|--x-|--x-|x-x-|--x-|\n\t(4) hh-close\t|x---|x---|----|x--x|\n\t(5) cowbell\t|----|----|--x-|----|\n\t`, data: d}*/\n\treturn &p, nil\n}", "title": "" }, { "docid": "4d33a5fdad6f4e3a6edd0da60e711632", "score": "0.48673573", "text": "func decodeLineOfMediaPlaylist(p *MediaPlaylist, wv *WV, state *decodingState, line string, strict bool) error {\n\tvar err error\n\n\tline = strings.TrimSpace(line)\n\n\t// check for custom tags first to allow custom parsing of existing tags\n\tif p.Custom != nil {\n\t\tfor _, v := range p.customDecoders {\n\t\t\tif strings.HasPrefix(line, v.TagName()) {\n\t\t\t\tt, err := v.Decode(line)\n\n\t\t\t\tif strict && err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\tif v.SegmentTag() {\n\t\t\t\t\tstate.tagCustom = true\n\t\t\t\t\tstate.custom[v.TagName()] = t\n\t\t\t\t} else {\n\t\t\t\t\tp.Custom[v.TagName()] = t\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tswitch {\n\tcase !state.tagInf && strings.HasPrefix(line, \"#EXTINF:\"):\n\t\tstate.tagInf = true\n\t\tstate.listType = MEDIA\n\t\tsepIndex := strings.Index(line, \",\")\n\t\tif sepIndex == -1 {\n\t\t\tif strict {\n\t\t\t\treturn fmt.Errorf(\"could not parse: %q\", line)\n\t\t\t}\n\t\t\tsepIndex = len(line)\n\t\t}\n\t\tduration := line[8:sepIndex]\n\t\tif len(duration) > 0 {\n\t\t\tif state.duration, err = strconv.ParseFloat(duration, 64); strict && err != nil {\n\t\t\t\treturn fmt.Errorf(\"Duration parsing error: %s\", err)\n\t\t\t}\n\t\t}\n\t\tif len(line) > sepIndex {\n\t\t\tstate.title = line[sepIndex+1:]\n\t\t}\n\tcase !strings.HasPrefix(line, \"#\"):\n\t\tif state.tagInf {\n\t\t\terr := p.Append(line, state.duration, state.title)\n\t\t\tif err == ErrPlaylistFull {\n\t\t\t\t// Extend playlist by doubling size, reset internal state, try again.\n\t\t\t\t// If the second Append fails, the if err block will handle it.\n\t\t\t\t// Retrying instead of being recursive was chosen as the state maybe\n\t\t\t\t// modified non-idempotently.\n\t\t\t\tp.Segments = append(p.Segments, make([]*MediaSegment, p.Count())...)\n\t\t\t\tp.capacity = uint(len(p.Segments))\n\t\t\t\tp.tail = p.count\n\t\t\t\terr = p.Append(line, state.duration, state.title)\n\t\t\t}\n\t\t\t// Check err for first or subsequent Append()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tstate.tagInf = false\n\t\t}\n\t\tif state.tagRange {\n\t\t\tif err = p.SetRange(state.limit, state.offset); strict && err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tstate.tagRange = false\n\t\t}\n\t\tif state.tagSCTE35 {\n\t\t\tstate.tagSCTE35 = false\n\t\t\tif err = p.SetSCTE35(state.scte); strict && err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\tif state.tagDiscontinuity {\n\t\t\tstate.tagDiscontinuity = false\n\t\t\tif err = p.SetDiscontinuity(); strict && err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\tif state.tagProgramDateTime && p.Count() > 0 {\n\t\t\tstate.tagProgramDateTime = false\n\t\t\tif err = p.SetProgramDateTime(state.programDateTime); strict && err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\t// If EXT-X-KEY appeared before reference to segment (EXTINF) then it linked to this segment\n\t\tif state.tagKey {\n\t\t\tp.Segments[p.last()].Key = &Key{state.xkey.Method, state.xkey.URI, state.xkey.IV, state.xkey.Keyformat, state.xkey.Keyformatversions}\n\t\t\t// First EXT-X-KEY may appeared in the header of the playlist and linked to first segment\n\t\t\t// but for convenient playlist generation it also linked as default playlist key\n\t\t\tif p.Key == nil {\n\t\t\t\tp.Key = state.xkey\n\t\t\t}\n\t\t\tstate.tagKey = false\n\t\t}\n\t\t// If EXT-X-MAP appeared before reference to segment (EXTINF) then it linked to this segment\n\t\tif state.tagMap {\n\t\t\tp.Segments[p.last()].Map = &Map{state.xmap.URI, state.xmap.Limit, state.xmap.Offset}\n\t\t\t// First EXT-X-MAP may appeared in the header of the playlist and linked to first segment\n\t\t\t// but for convenient playlist generation it also linked as default playlist map\n\t\t\tif p.Map == nil {\n\t\t\t\tp.Map = state.xmap\n\t\t\t}\n\t\t\tstate.tagMap = false\n\t\t}\n\n\t\t// if segment custom tag appeared before EXTINF then it links to this segment\n\t\tif state.tagCustom {\n\t\t\tp.Segments[p.last()].Custom = state.custom\n\t\t\tstate.custom = make(map[string]CustomTag)\n\t\t\tstate.tagCustom = false\n\t\t}\n\t// start tag first\n\tcase line == \"#EXTM3U\":\n\t\tstate.m3u = true\n\tcase line == \"#EXT-X-ENDLIST\":\n\t\tstate.listType = MEDIA\n\t\tp.Closed = true\n\tcase strings.HasPrefix(line, \"#EXT-X-VERSION:\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#EXT-X-VERSION:%d\", &p.ver); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\tcase strings.HasPrefix(line, \"#EXT-X-TARGETDURATION:\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#EXT-X-TARGETDURATION:%f\", &p.TargetDuration); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\tcase strings.HasPrefix(line, \"#EXT-X-MEDIA-SEQUENCE:\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#EXT-X-MEDIA-SEQUENCE:%d\", &p.SeqNo); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\tcase strings.HasPrefix(line, \"#EXT-X-PLAYLIST-TYPE:\"):\n\t\tstate.listType = MEDIA\n\t\tvar playlistType string\n\t\t_, err = fmt.Sscanf(line, \"#EXT-X-PLAYLIST-TYPE:%s\", &playlistType)\n\t\tif err != nil {\n\t\t\tif strict {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tswitch playlistType {\n\t\t\tcase \"EVENT\":\n\t\t\t\tp.MediaType = EVENT\n\t\t\tcase \"VOD\":\n\t\t\t\tp.MediaType = VOD\n\t\t\t}\n\t\t}\n\tcase strings.HasPrefix(line, \"#EXT-X-DISCONTINUITY-SEQUENCE:\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#EXT-X-DISCONTINUITY-SEQUENCE:%d\", &p.DiscontinuitySeq); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\tcase strings.HasPrefix(line, \"#EXT-X-START:\"):\n\t\tstate.listType = MEDIA\n\t\tfor k, v := range decodeParamsLine(line[13:]) {\n\t\t\tswitch k {\n\t\t\tcase \"TIME-OFFSET\":\n\t\t\t\tst, err := strconv.ParseFloat(v, 64)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"Invalid TIME-OFFSET: %s: %v\", v, err)\n\t\t\t\t}\n\t\t\t\tp.StartTime = st\n\t\t\tcase \"PRECISE\":\n\t\t\t\tp.StartTimePrecise = v == \"YES\"\n\t\t\t}\n\t\t}\n\tcase strings.HasPrefix(line, \"#EXT-X-KEY:\"):\n\t\tstate.listType = MEDIA\n\t\tstate.xkey = new(Key)\n\t\tfor k, v := range decodeParamsLine(line[11:]) {\n\t\t\tswitch k {\n\t\t\tcase \"METHOD\":\n\t\t\t\tstate.xkey.Method = v\n\t\t\tcase \"URI\":\n\t\t\t\tstate.xkey.URI = v\n\t\t\tcase \"IV\":\n\t\t\t\tstate.xkey.IV = v\n\t\t\tcase \"KEYFORMAT\":\n\t\t\t\tstate.xkey.Keyformat = v\n\t\t\tcase \"KEYFORMATVERSIONS\":\n\t\t\t\tstate.xkey.Keyformatversions = v\n\t\t\t}\n\t\t}\n\t\tstate.tagKey = true\n\tcase strings.HasPrefix(line, \"#EXT-X-MAP:\"):\n\t\tstate.listType = MEDIA\n\t\tstate.xmap = new(Map)\n\t\tfor k, v := range decodeParamsLine(line[11:]) {\n\t\t\tswitch k {\n\t\t\tcase \"URI\":\n\t\t\t\tstate.xmap.URI = v\n\t\t\tcase \"BYTERANGE\":\n\t\t\t\tif _, err = fmt.Sscanf(v, \"%d@%d\", &state.xmap.Limit, &state.xmap.Offset); strict && err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"Byterange sub-range length value parsing error: %s\", err)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tstate.tagMap = true\n\tcase !state.tagProgramDateTime && strings.HasPrefix(line, \"#EXT-X-PROGRAM-DATE-TIME:\"):\n\t\tstate.tagProgramDateTime = true\n\t\tstate.listType = MEDIA\n\t\tif state.programDateTime, err = TimeParse(line[25:]); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\tcase !state.tagRange && strings.HasPrefix(line, \"#EXT-X-BYTERANGE:\"):\n\t\tstate.tagRange = true\n\t\tstate.listType = MEDIA\n\t\tstate.offset = 0\n\t\tparams := strings.SplitN(line[17:], \"@\", 2)\n\t\tif state.limit, err = strconv.ParseInt(params[0], 10, 64); strict && err != nil {\n\t\t\treturn fmt.Errorf(\"Byterange sub-range length value parsing error: %s\", err)\n\t\t}\n\t\tif len(params) > 1 {\n\t\t\tif state.offset, err = strconv.ParseInt(params[1], 10, 64); strict && err != nil {\n\t\t\t\treturn fmt.Errorf(\"Byterange sub-range offset value parsing error: %s\", err)\n\t\t\t}\n\t\t}\n\tcase !state.tagSCTE35 && strings.HasPrefix(line, \"#EXT-SCTE35:\"):\n\t\tstate.tagSCTE35 = true\n\t\tstate.listType = MEDIA\n\t\tstate.scte = new(SCTE)\n\t\tstate.scte.Syntax = SCTE35_67_2014\n\t\tfor attribute, value := range decodeParamsLine(line[12:]) {\n\t\t\tswitch attribute {\n\t\t\tcase \"CUE\":\n\t\t\t\tstate.scte.Cue = value\n\t\t\tcase \"ID\":\n\t\t\t\tstate.scte.ID = value\n\t\t\tcase \"TIME\":\n\t\t\t\tstate.scte.Time, _ = strconv.ParseFloat(value, 64)\n\t\t\t}\n\t\t}\n\tcase !state.tagSCTE35 && strings.HasPrefix(line, \"#EXT-OATCLS-SCTE35:\"):\n\t\t// EXT-OATCLS-SCTE35 contains the SCTE35 tag, EXT-X-CUE-OUT contains duration\n\t\tstate.tagSCTE35 = true\n\t\tstate.scte = new(SCTE)\n\t\tstate.scte.Syntax = SCTE35_OATCLS\n\t\tstate.scte.Cue = line[19:]\n\tcase state.tagSCTE35 && state.scte.Syntax == SCTE35_OATCLS && strings.HasPrefix(line, \"#EXT-X-CUE-OUT:\"):\n\t\t// EXT-OATCLS-SCTE35 contains the SCTE35 tag, EXT-X-CUE-OUT contains duration\n\t\tstate.scte.Time, _ = strconv.ParseFloat(line[15:], 64)\n\t\tstate.scte.CueType = SCTE35Cue_Start\n\tcase !state.tagSCTE35 && strings.HasPrefix(line, \"#EXT-X-CUE-OUT-CONT:\"):\n\t\tstate.tagSCTE35 = true\n\t\tstate.scte = new(SCTE)\n\t\tstate.scte.Syntax = SCTE35_OATCLS\n\t\tstate.scte.CueType = SCTE35Cue_Mid\n\t\tfor attribute, value := range decodeParamsLine(line[20:]) {\n\t\t\tswitch attribute {\n\t\t\tcase \"SCTE35\":\n\t\t\t\tstate.scte.Cue = value\n\t\t\tcase \"Duration\":\n\t\t\t\tstate.scte.Time, _ = strconv.ParseFloat(value, 64)\n\t\t\tcase \"ElapsedTime\":\n\t\t\t\tstate.scte.Elapsed, _ = strconv.ParseFloat(value, 64)\n\t\t\t}\n\t\t}\n\tcase !state.tagSCTE35 && line == \"#EXT-X-CUE-IN\":\n\t\tstate.tagSCTE35 = true\n\t\tstate.scte = new(SCTE)\n\t\tstate.scte.Syntax = SCTE35_OATCLS\n\t\tstate.scte.CueType = SCTE35Cue_End\n\tcase !state.tagDiscontinuity && strings.HasPrefix(line, \"#EXT-X-DISCONTINUITY\"):\n\t\tstate.tagDiscontinuity = true\n\t\tstate.listType = MEDIA\n\tcase strings.HasPrefix(line, \"#EXT-X-I-FRAMES-ONLY\"):\n\t\tstate.listType = MEDIA\n\t\tp.Iframe = true\n\tcase strings.HasPrefix(line, \"#WV-AUDIO-CHANNELS\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#WV-AUDIO-CHANNELS %d\", &wv.AudioChannels); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err == nil {\n\t\t\tstate.tagWV = true\n\t\t}\n\tcase strings.HasPrefix(line, \"#WV-AUDIO-FORMAT\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#WV-AUDIO-FORMAT %d\", &wv.AudioFormat); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err == nil {\n\t\t\tstate.tagWV = true\n\t\t}\n\tcase strings.HasPrefix(line, \"#WV-AUDIO-PROFILE-IDC\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#WV-AUDIO-PROFILE-IDC %d\", &wv.AudioProfileIDC); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err == nil {\n\t\t\tstate.tagWV = true\n\t\t}\n\tcase strings.HasPrefix(line, \"#WV-AUDIO-SAMPLE-SIZE\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#WV-AUDIO-SAMPLE-SIZE %d\", &wv.AudioSampleSize); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err == nil {\n\t\t\tstate.tagWV = true\n\t\t}\n\tcase strings.HasPrefix(line, \"#WV-AUDIO-SAMPLING-FREQUENCY\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#WV-AUDIO-SAMPLING-FREQUENCY %d\", &wv.AudioSamplingFrequency); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err == nil {\n\t\t\tstate.tagWV = true\n\t\t}\n\tcase strings.HasPrefix(line, \"#WV-CYPHER-VERSION\"):\n\t\tstate.listType = MEDIA\n\t\twv.CypherVersion = line[19:]\n\t\tstate.tagWV = true\n\tcase strings.HasPrefix(line, \"#WV-ECM\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#WV-ECM %s\", &wv.ECM); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err == nil {\n\t\t\tstate.tagWV = true\n\t\t}\n\tcase strings.HasPrefix(line, \"#WV-VIDEO-FORMAT\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#WV-VIDEO-FORMAT %d\", &wv.VideoFormat); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err == nil {\n\t\t\tstate.tagWV = true\n\t\t}\n\tcase strings.HasPrefix(line, \"#WV-VIDEO-FRAME-RATE\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#WV-VIDEO-FRAME-RATE %d\", &wv.VideoFrameRate); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err == nil {\n\t\t\tstate.tagWV = true\n\t\t}\n\tcase strings.HasPrefix(line, \"#WV-VIDEO-LEVEL-IDC\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#WV-VIDEO-LEVEL-IDC %d\", &wv.VideoLevelIDC); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err == nil {\n\t\t\tstate.tagWV = true\n\t\t}\n\tcase strings.HasPrefix(line, \"#WV-VIDEO-PROFILE-IDC\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#WV-VIDEO-PROFILE-IDC %d\", &wv.VideoProfileIDC); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err == nil {\n\t\t\tstate.tagWV = true\n\t\t}\n\tcase strings.HasPrefix(line, \"#WV-VIDEO-RESOLUTION\"):\n\t\tstate.listType = MEDIA\n\t\twv.VideoResolution = line[21:]\n\t\tstate.tagWV = true\n\tcase strings.HasPrefix(line, \"#WV-VIDEO-SAR\"):\n\t\tstate.listType = MEDIA\n\t\tif _, err = fmt.Sscanf(line, \"#WV-VIDEO-SAR %s\", &wv.VideoSAR); strict && err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err == nil {\n\t\t\tstate.tagWV = true\n\t\t}\n\tcase strings.HasPrefix(line, \"#\"):\n\t\t// comments are ignored\n\t}\n\treturn err\n}", "title": "" }, { "docid": "ca2936ea3f0c12785ea899b510521ce6", "score": "0.48653397", "text": "func (d *Decoder) Decode(r io.Reader) io.Reader {\n\tdec := newVideoDecryptor(r)\n\treturn &dec\n}", "title": "" }, { "docid": "834c54e2fda98cc8e396aed16f1b501a", "score": "0.4862487", "text": "func (fn DecoderFunc) Decode(i interface{}) error {\n\treturn fn(i)\n}", "title": "" }, { "docid": "ff0f6eef3d3ade14e136613197df0d96", "score": "0.48582056", "text": "func ffmpegConcatSeqs(dirIn, f1, f2, f3, f4, dirOut, f5 string) {\n\tf1 = dirIn + \"/\" + f1\n\tf2 = dirIn + \"/\" + f2\n\tf3 = dirIn + \"/\" + f3\n\tf4 = dirIn + \"/\" + f4\n\tf5 = dirOut + \"/\" + f5\n\tcmd := exec.Command(\"ffmpeg\", \"-i\", f1, \"-i\", f2, \"-i\", f3, \"-i\", f4, \"-filter_complex\", \"[0:0][1:0][2:0][3:0]concat=n=4:v=0:a=1[out]\", \"-map\", \"[out]\", f5)\n\tcmd.Stdout = os.Stdout\n\tcmd.Stderr = os.Stderr\n\terr := cmd.Run()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "fd68adff19d4242dbe3a240b2d4ee09f", "score": "0.48431522", "text": "func DecodeFile(path string) (*Pattern, error) {\n\tfile, err := os.Open(path)\n\tdefer file.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbpr := newBinaryReader(file)\n\n\t// Read binary pattern\n\tvar bp binaryPattern\n\tbpr.Read(binary.BigEndian, &bp.splice)\n\tbpr.Read(binary.LittleEndian, &bp.flags)\n\tbpr.Read(binary.BigEndian, &bp.remaining_bytes)\n\tbpr.Read(binary.BigEndian, &bp.version_string)\n\tbpr.Read(binary.LittleEndian, &bp.tempo)\n\tvar bytes_left = bp.remaining_bytes - TRACKS_OFFSET\n\n\tbp.tracks = make([]binaryTrack, 0)\n\n\t// Read tracks\n\tfor bytes_left > 0 {\n\t\tvar bt binaryTrack\n\t\tbpr.Read(binary.LittleEndian, &bt.id)\n\t\tbpr.Read(binary.BigEndian, &bt.strlen)\n\t\tbt.name = make([]byte, int(bt.strlen), int(bt.strlen))\n\t\tbpr.Read(binary.BigEndian, &bt.name)\n\t\tbpr.Read(binary.BigEndian, &bt.steps)\n\t\tbt.byte_size = MIN_TRACK_SIZE + uint32(bt.strlen)\n\n\t\tbp.tracks = append(bp.tracks, bt)\n\n\t\tbytes_left -= bt.byte_size\n\t}\n\n\t// Error handling\n\tif bpr.err != nil {\n\t\treturn nil, err\n\t}\n\n\tif ok, err := bp.isValid(); !ok {\n\t\treturn nil, err\n\t}\n\n\tp := bp.toPattern()\n\treturn p, nil\n}", "title": "" }, { "docid": "414c3cc15991b7eb3c7944174f8a801f", "score": "0.4842492", "text": "func (f *FFmpeg) Start() error {\n\t// Generate the ffmpeg instance\n\tf.ffmpeg = exec.Command(FFmpegPath, f.Arguments()...)\n\n\t// Generate the output stream\n\tstream, err := f.ffmpeg.StdoutPipe()\n\tif err != nil {\n\t\treturn err\n\t}\n\tf.stream = stream\n\n\t// Invoke the process\n\tif err := f.ffmpeg.Start(); err != nil {\n\t\treturn err\n\t}\n\n\t// Mark ffmpeg started\n\tf.started = true\n\treturn nil\n}", "title": "" }, { "docid": "705159c993875062cd4421afe96d7b8a", "score": "0.4842124", "text": "func (v *Muxer) sampleToFlvTag(s *SrsMp4Sample) (tagType uint8, time uint32, data []byte) {\n data = []byte{}\n\n time = s.dts\n if s.handlerType == SrsMp4HandlerTypeSOUN {\n tagType = SRS_RTMP_TYPE_AUDIO\n\n // E.4.2.1 AUDIODATA, flv_v10_1.pdf, page 3\n tmp := uint8(s.codec << 4) | uint8(s.sampleRate << 2) | uint8(s.soundBits << 1) | s.channels\n data = append(data, tmp)\n if s.codec == SrsAudioCodecIdAAC {\n if s.frameTrait == SrsAudioAacFrameTraitSequenceHeader {\n data = append(data, uint8(0))\n } else {\n data = append(data, 1)\n }\n }\n data = append(data, s.sample...)\n return\n }\n\n // E.4.3.1 VIDEODATA, flv_v10_1.pdf, page 5\n tmp := uint8(s.frameType << 4 | s.codec)\n data = append(data, tmp)\n if s.codec == SrsVideoCodecIdAVC {\n tagType = SRS_RTMP_TYPE_VIDEO\n if s.frameTrait == SrsVideoAvcFrameTraitSequenceHeader {\n data = append(data, uint8(0))\n } else {\n data = append(data, uint8(1))\n }\n // cts = pts - dts, where dts = flvheader->timestamp.\n cts := s.pts - s.dts // TODO: may be cts = (s.pts - s.dts) /90;\n data = append(data, to3Bytes(cts)...)\n }\n\n data = append(data, s.sample...)\n\n return\n}", "title": "" }, { "docid": "b463d793af78d8388454b9a311cb06eb", "score": "0.48261452", "text": "func Decode(dst, src []byte) ([]byte, error) {\n\treturn s2.Decode(dst, src)\n}", "title": "" }, { "docid": "3918087174f782f730ddca799ca48efb", "score": "0.4822581", "text": "func (r *record) decode(reader io.Reader) error {\n\tduration, err := getVaruint(reader)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tmessage, err := getBytes(reader)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tr.duration = time.Duration(duration)\n\tr.message = message\n\treturn nil\n}", "title": "" }, { "docid": "f4e58c33f6f5764fe0e1a4cfa4002704", "score": "0.48218206", "text": "func (*Movie) Descriptor() ([]byte, []int) {\n\treturn file_movie_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "d92a0016dba7af2b81364cab3e033977", "score": "0.48198617", "text": "func Decode(b []byte) (*Pattern, error) {\n\tbuf := bufferHelper{Buffer: bytes.NewBuffer(b), Error: nil}\n\n\t// confirm SPLICE header [0-12], 13 bytes\n\tif !bytes.Equal(buf.Next(13), patternHeader) {\n\t\treturn nil, errors.New(\"Invalid file header\")\n\t}\n\n\tp := &Pattern{}\n\n\t// [13] file content length, 1 byte\n\tremainingBytes := buf.Next1AsInt(\"content length\", nil)\n\n\t// [14-46] HWVersion, 32 bytes\n\tp.HWVersion = buf.NextXAsString(\"HWVersion\", 32, &remainingBytes)\n\n\t// [47-50] Tempo, 4 bytes float32 LittleEndian\n\tp.Tempo = buf.Next4AsFloat(\"tempo\", &remainingBytes)\n\n\tif buf.Error != nil {\n\t\treturn nil, buf.Error\n\t}\n\n\t// [51+] Repeating tracks\n\t/////////////\n\tfor remainingBytes > 0 {\n\t\tt := Track{}\n\n\t\t// [0-3] track ID 4 bytes\n\t\tt.ID = buf.Next4AsUInt32(\"track ID\", &remainingBytes)\n\n\t\t// [4] len of track name 1 byte\n\t\ttrackNameLen := buf.Next1AsInt(\"track name length\", &remainingBytes)\n\n\t\t// [5-X] track name, var bytes\n\t\tt.Name = buf.NextXAsString(\"track name\", trackNameLen, &remainingBytes)\n\n\t\t// 16 bytes, 1 per 1/4 note, 0x00 is off, 0x01 is on\n\t\tt.Steps = buf.NextX(\"track\", 16, &remainingBytes)\n\n\t\tif buf.Error != nil {\n\t\t\treturn nil, buf.Error\n\t\t}\n\n\t\tp.Tracks = append(p.Tracks, t)\n\t}\n\n\treturn p, nil\n}", "title": "" }, { "docid": "d2b16581c424935926bcf6bcbc5f9a69", "score": "0.48163816", "text": "func (*DecodeRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_videoservice_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "3547f0130b944b5691d01587b97131af", "score": "0.48154363", "text": "func Decode(data []byte) (image.Image, error) {\n\tctx := C.avformat_alloc_context()\n\tr := bytes.NewReader(data)\n\tavioCtx, err := newAVIOContext(ctx, &avIOHandlers{ReadPacket: r.Read, Seek: r.Seek})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tctx.pb = avioCtx.avAVIOContext\n\tif ctx = C.create_context(ctx); ctx == nil {\n\t\tavioCtx.Free()\n\t\treturn nil, errors.New(\"Failed to initialize AVFormatContext\")\n\t}\n\tf := C.extract_video_image(ctx)\n\tif f == nil {\n\t\treturn nil, errors.New(\"Failed to Get AVCodecContext\")\n\t}\n\n\tif C.GoString(C.av_get_pix_fmt_name(int32(f.format))) != \"yuv420p\" {\n\t\treturn nil, errors.New(\"Didn't get format: \" + image.YCbCrSubsampleRatio420.String() + \"instead got: \" + C.GoString(C.av_get_pix_fmt_name(int32(f.format))))\n\t}\n\ty := C.GoBytes(unsafe.Pointer(f.data[0]), f.linesize[0]*f.height)\n\tu := C.GoBytes(unsafe.Pointer(f.data[1]), f.linesize[0]*f.height/4)\n\tv := C.GoBytes(unsafe.Pointer(f.data[2]), f.linesize[0]*f.height/4)\n\n\treturn &image.YCbCr{Y: y,\n\t\tCb: u,\n\t\tCr: v,\n\t\tYStride: int(f.linesize[0]),\n\t\tCStride: int(f.linesize[0]) / 2,\n\t\tSubsampleRatio: image.YCbCrSubsampleRatio420,\n\t\tRect: image.Rectangle{Min: image.Point{X: 0, Y: 0}, Max: image.Point{X: int(f.width), Y: int(f.height) / 2 * 2}}}, nil\n}", "title": "" }, { "docid": "ce45a00e734846da742dd784e51cd473", "score": "0.48028913", "text": "func MP3ToMP4(mp3File, mp4File string) error {\n\targs := []string{\n\t\t\"-i\", mp3File,\n\t\t\"-vn\", mp4File,\n\t}\n\treturn runCmd(FFMPEG, \"\", args...)\n}", "title": "" }, { "docid": "13ffe13aa7563278efe245d2c15138f1", "score": "0.48022872", "text": "func (this *Codec) decode(shortUrl string) string {\n\treturn this.m[shortUrl]\n}", "title": "" }, { "docid": "f7b4460ac73df1ffd77ae2262f2e9f21", "score": "0.48014447", "text": "func (muxer *Muxer) Mux(video io.ReadCloser) error {\n\targs := []string{\n\t\t\"-i\", \"pipe:0\",\n\t\t\"-codec\", \"copy\",\n\t\t\"-f\", \"dash\",\n\t\t\"-an\",\n\t\t\"-dash_segment_type\", \"mp4\",\n\t\t\"-media_seg_name\", \"raspilive-$Number$.m4s\",\n\t\t\"-init_seg_name\", \"init.m4s\",\n\t}\n\n\tif muxer.Options.Fps != 0 {\n\t\targs = append(args, \"-r\", strconv.Itoa(muxer.Options.Fps))\n\t}\n\n\tif muxer.Options.SegmentTime != 0 {\n\t\targs = append(args, \"-seg_duration\", strconv.Itoa(muxer.Options.SegmentTime))\n\t}\n\n\tif muxer.Options.PlaylistSize != 0 {\n\t\targs = append(args, \"-window_size\", strconv.Itoa(muxer.Options.PlaylistSize))\n\t}\n\n\tif muxer.Options.StorageSize != 0 {\n\t\targs = append(args, \"-extra_window_size\", strconv.Itoa(muxer.Options.StorageSize))\n\t}\n\n\targs = append(args, path.Join(muxer.Directory, \"livestream.mpd\"))\n\n\tmuxer.cmd = execCommand(\"ffmpeg\", args...)\n\tmuxer.cmd.Stdin = video\n\n\treturn muxer.cmd.Start()\n}", "title": "" }, { "docid": "54fb50f032cecb059e1fb716a023d497", "score": "0.47999984", "text": "func reportVideoCodec(value interface{}) (float64, error) {\n\tdescription, ok := value.(string)\n\tif !ok {\n\t\treturn 0, errors.Errorf(\"%v is not of type string\", value)\n\t}\n\n\tif strings.HasPrefix(description, \"VP8\") {\n\t\treturn float64(vp8), nil\n\t}\n\tif strings.HasPrefix(description, \"VP9\") {\n\t\treturn float64(vp9), nil\n\t}\n\treturn 0, errors.Errorf(\"unrecognized video stream codec: %q\", description)\n}", "title": "" }, { "docid": "b5a0051d6019d309cf1684b38e30aaed", "score": "0.47918612", "text": "func TestDecode(t *testing.T) {\n\traw, err := ioutil.ReadFile(\"xpacket.input\")\n\tif err == nil {\n\t\tofile, err := os.Open(\"xpacket.output\")\n\t\tif err == nil {\n\t\t\tout, err := Decode(ofile)\n\t\t\txassert.IsNil(t, err)\n\t\t\txassert.Equal(t, bytes.Compare(out, raw), 0)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c741297ad06243eb92f72fbe4acc73e4", "score": "0.47856513", "text": "func Pass1(ctx context.Context, fi FileInfo, cropArg string, ch chan<- progress.Report) {\n\tdefer close(ch)\n\tch <- progress.Report{Completed: 0.0}\n\targs := []string{\n\t\t\"-i\", fi.Filename,\n\t\t// Process all streams.\n\t\t\"-map\", \"0\",\n\t\t// Copy streams by default, eg subtitles.\n\t\t\"-c\", \"copy\",\n\t\t// Increase buffer.\n\t\t\"-max_muxing_queue_size\", \"400\",\n\t}\n\tvideoQualityArgs(&args, &fi, cropArg, 1)\n\tfor _, s := range fi.Streams {\n\t\tif s.ShouldSkip() {\n\t\t\targs = append(args, \"-map\", \"-0:\"+s.Id)\n\t\t}\n\t}\n\tif *darFlag != \"\" {\n\t\targs = append(args, \"-vf\", \"setdar=dar=\"+*darFlag)\n\t}\n\targs = append(args, \"-passlogfile\", fi.passlogfile(), \"-pass\", \"1\", \"-f\", \"matroska\", \"-y\", \"/dev/null\")\n\tif *showCmdFlag {\n\t\tfmt.Printf(\"$ ffmpeg '%s'\\n\", strings.Join(args, \"' '\"))\n\t}\n\tcmd := exec.CommandContext(ctx, \"ffmpeg\", args...)\n\toutput, err := start(cmd)\n\tif err != nil {\n\t\tch <- progress.Report{Err: err}\n\t\treturn\n\t}\n\treadConversionProgress(output, fi, ch)\n\tif err = cmd.Wait(); err != nil {\n\t\tch <- progress.Report{Err: err}\n\t}\n}", "title": "" }, { "docid": "72f46beea8929686c2894834487ecd4d", "score": "0.47813782", "text": "func ffmpegConcatTris(dirIn, f1, f2, f3, dirOut, f4 string) {\n\tf1 = dirIn + \"/\" + f1\n\tf2 = dirIn + \"/\" + f2\n\tf3 = dirIn + \"/\" + f3\n\tf4 = dirOut + \"/\" + f4\n\tcmd := exec.Command(\"ffmpeg\", \"-i\", f1, \"-i\", f2, \"-i\", f3, \"-filter_complex\", \"[0:0][1:0][2:0]concat=n=3:v=0:a=1[out]\", \"-map\", \"[out]\", f4)\n\tcmd.Stdout = os.Stdout\n\tcmd.Stderr = os.Stderr\n\terr := cmd.Run()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "2dfc227fb78e3595cb319e2fcf823fd2", "score": "0.4774825", "text": "func (d *Decoder) DecodeChunk(data string) error {\n\tif d.IsCompleted() {\n\t\treturn nil\n\t}\n\tif !d.lastChunk.IsZero() {\n\t\td.readInterval = time.Now().Sub(d.lastChunk)\n\t}\n\td.lastChunk = time.Now()\n\n\tif data == \"\" || len(data) < 4 {\n\t\treturn fmt.Errorf(\"invalid frame: \\\"%s\\\"\", data)\n\t}\n\n\tidx := strings.IndexByte(data, '|')\n\tif idx == -1 {\n\t\treturn fmt.Errorf(\"invalid frame: \\\"%s\\\"\", data)\n\t}\n\n\tif d.start.IsZero() {\n\t\td.start = time.Now()\n\t}\n\n\theader := data[:idx]\n\t// continuous QR reading often sends the same chunk in a row, skip it\n\tif d.isCached(header) {\n\t\treturn nil\n\t}\n\n\tvar offset, total int\n\t_, err := fmt.Sscanf(header, \"%d/%d\", &offset, &total)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"invalid header: %v (%s)\", err, header)\n\t}\n\n\t// allocate enough memory at first total read\n\tif d.total == 0 {\n\t\td.buffer = make([]byte, total)\n\t\td.total = total\n\t}\n\n\tif total > d.total {\n\t\treturn fmt.Errorf(\"total changed during sequence, aborting\")\n\t}\n\n\tpayload := data[idx+1:]\n\tsize := len(payload)\n\t// TODO(divan): optmize memory allocation\n\td.frames = append(d.frames, frameInfo{offset: offset, size: size})\n\n\tcopy(d.buffer[offset:offset+size], payload)\n\n\td.updateProgress()\n\n\treturn nil\n}", "title": "" }, { "docid": "e12de99458d79e1c1cec76dd2d9b02b5", "score": "0.47735828", "text": "func (*DecodeReply) Descriptor() ([]byte, []int) {\n\treturn file_proto_videoservice_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "f1b78ed8277b88d1e9cd015ac06104f9", "score": "0.4773511", "text": "func Decode(v *discordgo.VoiceConnection, c chan *discordgo.Packet) {\n\tif c == nil {\n\t\treturn\n\t}\n\n\tfor {\n\n\t\tif v.Ready == false || v.OpusRecv == nil {\n\t\t\tOnError(fmt.Sprintf(\"Discordgo not to receive opus packets. %+v : %+v\", v.Ready, v.OpusSend), nil)\n\t\t\treturn\n\t\t}\n\t\t\n\t\tp, ok := <-v.OpusRecv\n\t\tif !ok {\n\t\t\treturn\n\t\t}\n\n\t\tif speakers == nil {\n\t\t\tspeakers = make(map[uint32]*gopus.Decoder)\n\t\t}\n\n\t\t_, ok = speakers[p.SSRC]\n\t\tif !ok {\n\t\t\tspeakers[p.SSRC], err = gopus.NewDecoder(sampleRate, channels)\n\t\t\tif err != nil {\n\t\t\t\tOnError(\"error creating opus decoder\", err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tp.PCM, err = speakers[p.SSRC].Decode(p.Opus, sampleSize, false)\n\t\tif err != nil {\n\t\t\tOnError(\"Error decoding opus data\", err)\n\t\t\tcontinue\n\t\t}\n\n\t\tc <- p\n\t}\n}", "title": "" }, { "docid": "197792030350c60d3dc06fb8494729ee", "score": "0.4768978", "text": "func Decode(src []byte) (dst []byte, err error) {\n\tsize := coder.DecodedLen(len(src))\n\tbuf := make([]byte, size)\n\t_, err = coder.Decode(buf, src)\n\tdst = buf[:size-1]\n\treturn\n}", "title": "" }, { "docid": "6d73e539f6b467cbfcbfeec9165b175a", "score": "0.47682464", "text": "func decodeTrack(r *bytes.Buffer) (*Track, error) {\n\tt := &Track{}\n\n\t// Read track header\n\tth := trackHeader{}\n\terr := binary.Read(r, binary.BigEndian, &th)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tt.Instrument.ID = th.ID\n\terr = t.Instrument.decodeName(r, int(th.NameLen))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Read beats\n\tt.Steps = make([]Step, SpliceTrackLength)\n\tfor i := range t.Steps {\n\t\tc, err := r.ReadByte()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tt.Steps[i] = Step(c)\n\t}\n\treturn t, nil\n}", "title": "" }, { "docid": "e97218a4eeb19b926b9103d700e99941", "score": "0.4748031", "text": "func (pi *PeerInfo) CodecDecodeSelf(dec *ucodec.Decoder) {\n\tb := &primitives.Block{}\n\tdec.MustDecode(b)\n\tpi.FromBlock(b)\n}", "title": "" }, { "docid": "87f373a670c13c6d500be994bae883b8", "score": "0.4745532", "text": "func decode(ctx context.Context, padding int, in <-chan Asset, out chan<- *assetDecodeResult) {\n\tpublishResult := func(spr *sprite, err error) {\n\t\tselect {\n\t\tcase out <- &assetDecodeResult{spr, err}:\n\t\tcase <-ctx.Done():\n\t\t}\n\t}\n\n\tfor asset := range in {\n\t\tassetPath := asset.Asset()\n\t\tassetReader, err := asset.Reader()\n\t\tif err != nil {\n\t\t\tpublishResult(nil, fmt.Errorf(\"Failed to read asset '%s': %s\", assetPath, err))\n\t\t\tcontinue\n\t\t}\n\t\tdefer assetReader.Close()\n\n\t\tcfg, _, err := image.DecodeConfig(assetReader)\n\t\tif err != nil {\n\t\t\tpublishResult(nil, fmt.Errorf(\"Failed to read asset metadata '%s': %s\", assetPath, err))\n\t\t\tcontinue\n\t\t}\n\n\t\tspr := &sprite{\n\t\t\tAsset: asset,\n\t\t\tpath: assetPath,\n\t\t\tw: cfg.Width,\n\t\t\th: cfg.Height,\n\t\t\tpadding: padding,\n\t\t}\n\n\t\tpublishResult(spr, nil)\n\t}\n}", "title": "" }, { "docid": "3d014064fcf88f664dd464a38f8dcbaa", "score": "0.47376034", "text": "func decode(codex map[uint64]*goavro.Codec, buf []byte) error {\n\t// Perform a sanity check on the buffer, then return the Rabin fingerprint\n\t// of the schema used to encode the data.\n\tfingerprint, newBuf, err := goavro.FingerprintFromSOE(buf)\n\tif err != nil {\n\t\tpanic(err)\n\t\treturn err\n\t}\n\n\t// Get a previously stored Codec from the codex map.\n\tcodec, ok := codex[fingerprint]\n\tif !ok {\n\t\treturn fmt.Errorf(\"unknown codec: %#x\", fingerprint)\n\t}\n\n\t// Use the fetched Codec to decode the buffer as a SOE.\n\tvar datum interface{}\n\n\t// Both of the following branches work, but provided to illustrate two\n\t// use-cases.\n\tif true {\n\t\t// Faster because SOE magic prefix and schema fingerprint already\n\t\t// checked and used to fetch the Codec. Just need to decode the binary\n\t\t// bytes remaining after the prefix were removed.\n\t\tdatum, _, err = codec.NativeFromBinary(newBuf)\n\t} else {\n\t\t// This way re-checks the SOE magic prefix and Codec fingerprint, doing\n\t\t// repetitive work, but provided as an example for cases when there is\n\t\t// only a single schema, a single Codec, and you do not use\n\t\t// the FingerprintFromSOE function above.\n\t\tdatum, _, err = codec.NativeFromSingle(buf)\n\t}\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t_, err = fmt.Println(datum)\n\treturn err\n}", "title": "" }, { "docid": "ed9c1b54cff89bdf6fc78f0501bfb81a", "score": "0.47286642", "text": "func TestPayloadDecodert(t *testing.T) {\n\t// s := `42:420[\"chat message with ack\",{\"msg\":\"111\"}]`\n\ts := `43:421[\"chat message with ack\",{\"msg\":\"ää\"}]`\n\t// s := `43:421[\"chat message with ack\",{\"msg\":\"kälä\"}]`\n\n\t// fmt.Println(len([]byte(`21[\"chat message with ack\",{\"msg\":\"ää\"}`)))\n\t// fmt.Println(\"actual length\", len([]byte(`21[\"chat message with ack\",{\"msg\":\"kälä\"}]`)))\n\n\tbuf := bytes.NewBuffer([]byte(s))\n\n\tpayloadDecoder := parser.NewPayloadDecoder(buf)\n\n\tpkgDec, err := payloadDecoder.Next()\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\n\tdefer pkgDec.Close()\n\n\tdecoded := make([]byte, 1024)\n\tn, err := pkgDec.Read(decoded)\n\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\n\tfmt.Println(\"decoded\", n, string(decoded)[0:n])\n\n\tsaver := &FrameSaver{}\n\n\tsaver.data = []FrameData{\n\t\t{\n\t\t\tBuffer: bytes.NewBuffer(decoded),\n\t\t\tType: engineio.MessageText,\n\t\t},\n\t}\n\n\tdecoder := newDecoder(saver)\n\n\tdecodeData := &[]interface{}{&jsonMsg{}}\n\tpacket := packet{Data: decodeData}\n\n\tif err := decoder.Decode(&packet); err != nil {\n\t\tlog.Println(\"socket Decode error\", err)\n\t\tt.Error(err)\n\t}\n\n\terr = decoder.DecodeData(&packet)\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\n\tmsg, err := debugJsonMsgData(&packet)\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\n\tfmt.Println(\"jsonMsg.Msg\", msg.Msg)\n\n\tif msg.Msg != \"ää\" {\n\t\tt.Error(\"Bad msg\", msg.Msg)\n\t}\n\n\t// ret, err := s.socketHandler.onPacket(decoder, &p)\n\n}", "title": "" }, { "docid": "05e2638702e89bc4390eac96274d22b0", "score": "0.47264582", "text": "func (f *FEC) Decode(encoded []uint8, outputLen int) []uint8 {\n\tout := make([]uint8, outputLen)\n\tC.fec_decode(f.fec, C.uint(outputLen), (*C.uchar)(&encoded[0]), (*C.uchar)(&out[0]))\n\treturn out\n}", "title": "" }, { "docid": "42fb12da88c7dff4adb97727718708d0", "score": "0.47261965", "text": "func (pp *Pubrec) Decode(src []byte) (int, error) {\n\tn, pid, err := identifiedDecode(src, PUBREC)\n\tpp.ID = pid\n\treturn n, err\n}", "title": "" } ]
f6a0e16c48058f452ce105b507f0d61d
IsSame returns true if there are no differences. (i.e., all diff frequencies are zero.)
[ { "docid": "7e5d462f09acecf0dc69c4ff8f7c985a", "score": "0.8362999", "text": "func (bdiff BOWDiff) IsSame() bool {\n\tfor _, dfreq := range bdiff.Freqs {\n\t\tif dfreq != 0 {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" } ]
[ { "docid": "6caa6acb1835cc7750d642dc95dc545b", "score": "0.65377516", "text": "func diffEqual(x, y interface{}) bool {\n\treturn len(pretty.Diff(x, y)) == 0\n}", "title": "" }, { "docid": "1a4a597bdfee125f2e84afe79dec90b7", "score": "0.6491792", "text": "func (this *FileHash) MayBeSame(cmp *FileHash) bool {\n\treturn this.Size == cmp.Size && this.FastChecksum == cmp.FastChecksum\n}", "title": "" }, { "docid": "2a8edd375e7cb52682df226511ca93a7", "score": "0.6456184", "text": "func (d *InstanceDiff) Same(d2 *InstanceDiff) (bool, string) {\n\t// we can safely compare the pointers without a lock\n\tswitch {\n\tcase d == nil && d2 == nil:\n\t\treturn true, \"\"\n\tcase d == nil || d2 == nil:\n\t\treturn false, \"one nil\"\n\tcase d == d2:\n\t\treturn true, \"\"\n\t}\n\n\td.mu.Lock()\n\tdefer d.mu.Unlock()\n\n\t// If we're going from requiring new to NOT requiring new, then we have\n\t// to see if all required news were computed. If so, it is allowed since\n\t// computed may also mean \"same value and therefore not new\".\n\toldNew := d.requiresNew()\n\tnewNew := d2.RequiresNew()\n\tif oldNew && !newNew {\n\t\toldNew = false\n\n\t\t// This section builds a list of ignorable attributes for requiresNew\n\t\t// by removing off any elements of collections going to zero elements.\n\t\t// For collections going to zero, they may not exist at all in the\n\t\t// new diff (and hence RequiresNew == false).\n\t\tignoreAttrs := make(map[string]struct{})\n\t\tfor k, diffOld := range d.Attributes {\n\t\t\tif !strings.HasSuffix(k, \".%\") && !strings.HasSuffix(k, \".#\") {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// This case is in here as a protection measure. The bug that this\n\t\t\t// code originally fixed (GH-11349) didn't have to deal with computed\n\t\t\t// so I'm not 100% sure what the correct behavior is. Best to leave\n\t\t\t// the old behavior.\n\t\t\tif diffOld.NewComputed {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// We're looking for the case a map goes to exactly 0.\n\t\t\tif diffOld.New != \"0\" {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// Found it! Ignore all of these. The prefix here is stripping\n\t\t\t// off the \"%\" so it is just \"k.\"\n\t\t\tprefix := k[:len(k)-1]\n\t\t\tfor k2 := range d.Attributes {\n\t\t\t\tif strings.HasPrefix(k2, prefix) {\n\t\t\t\t\tignoreAttrs[k2] = struct{}{}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tfor k, rd := range d.Attributes {\n\t\t\tif _, ok := ignoreAttrs[k]; ok {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// If the field is requires new and NOT computed, then what\n\t\t\t// we have is a diff mismatch for sure. We set that the old\n\t\t\t// diff does REQUIRE a ForceNew.\n\t\t\tif rd != nil && rd.RequiresNew && !rd.NewComputed {\n\t\t\t\toldNew = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\tif oldNew != newNew {\n\t\treturn false, fmt.Sprintf(\n\t\t\t\"diff RequiresNew; old: %t, new: %t\", oldNew, newNew)\n\t}\n\n\t// Verify that destroy matches. The second boolean here allows us to\n\t// have mismatching Destroy if we're moving from RequiresNew true\n\t// to false above. Therefore, the second boolean will only pass if\n\t// we're moving from Destroy: true to false as well.\n\tif d.Destroy != d2.GetDestroy() && d.requiresNew() == oldNew {\n\t\treturn false, fmt.Sprintf(\n\t\t\t\"diff: Destroy; old: %t, new: %t\", d.Destroy, d2.GetDestroy())\n\t}\n\n\t// Go through the old diff and make sure the new diff has all the\n\t// same attributes. To start, build up the check map to be all the keys.\n\tcheckOld := make(map[string]struct{})\n\tcheckNew := make(map[string]struct{})\n\tfor k := range d.Attributes {\n\t\tcheckOld[k] = struct{}{}\n\t}\n\tfor k := range d2.CopyAttributes() {\n\t\tcheckNew[k] = struct{}{}\n\t}\n\n\t// Make an ordered list so we are sure the approximated hashes are left\n\t// to process at the end of the loop\n\tkeys := make([]string, 0, len(d.Attributes))\n\tfor k := range d.Attributes {\n\t\tkeys = append(keys, k)\n\t}\n\tsort.StringSlice(keys).Sort()\n\n\tfor _, k := range keys {\n\t\tdiffOld := d.Attributes[k]\n\n\t\tif _, ok := checkOld[k]; !ok {\n\t\t\t// We're not checking this key for whatever reason (see where\n\t\t\t// check is modified).\n\t\t\tcontinue\n\t\t}\n\n\t\t// Remove this key since we'll never hit it again\n\t\tdelete(checkOld, k)\n\t\tdelete(checkNew, k)\n\n\t\t_, ok := d2.GetAttribute(k)\n\t\tif !ok {\n\t\t\t// If there's no new attribute, and the old diff expected the attribute\n\t\t\t// to be removed, that's just fine.\n\t\t\tif diffOld.NewRemoved {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// If the last diff was a computed value then the absense of\n\t\t\t// that value is allowed since it may mean the value ended up\n\t\t\t// being the same.\n\t\t\tif diffOld.NewComputed {\n\t\t\t\tok = true\n\t\t\t}\n\n\t\t\t// No exact match, but maybe this is a set containing computed\n\t\t\t// values. So check if there is an approximate hash in the key\n\t\t\t// and if so, try to match the key.\n\t\t\tif strings.Contains(k, \"~\") {\n\t\t\t\tparts := strings.Split(k, \".\")\n\t\t\t\tparts2 := append([]string(nil), parts...)\n\n\t\t\t\tre := regexp.MustCompile(`^~\\d+$`)\n\t\t\t\tfor i, part := range parts {\n\t\t\t\t\tif re.MatchString(part) {\n\t\t\t\t\t\t// we're going to consider this the base of a\n\t\t\t\t\t\t// computed hash, and remove all longer matching fields\n\t\t\t\t\t\tok = true\n\n\t\t\t\t\t\tparts2[i] = `\\d+`\n\t\t\t\t\t\tparts2 = parts2[:i+1]\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tre, err := regexp.Compile(\"^\" + strings.Join(parts2, `\\.`))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn false, fmt.Sprintf(\"regexp failed to compile; err: %#v\", err)\n\t\t\t\t}\n\n\t\t\t\tfor k2 := range checkNew {\n\t\t\t\t\tif re.MatchString(k2) {\n\t\t\t\t\t\tdelete(checkNew, k2)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// This is a little tricky, but when a diff contains a computed\n\t\t\t// list, set, or map that can only be interpolated after the apply\n\t\t\t// command has created the dependent resources, it could turn out\n\t\t\t// that the result is actually the same as the existing state which\n\t\t\t// would remove the key from the diff.\n\t\t\tif diffOld.NewComputed && (strings.HasSuffix(k, \".#\") || strings.HasSuffix(k, \".%\")) {\n\t\t\t\tok = true\n\t\t\t}\n\n\t\t\t// Similarly, in a RequiresNew scenario, a list that shows up in the plan\n\t\t\t// diff can disappear from the apply diff, which is calculated from an\n\t\t\t// empty state.\n\t\t\tif d.requiresNew() && (strings.HasSuffix(k, \".#\") || strings.HasSuffix(k, \".%\")) {\n\t\t\t\tok = true\n\t\t\t}\n\n\t\t\tif !ok {\n\t\t\t\treturn false, fmt.Sprintf(\"attribute mismatch: %s\", k)\n\t\t\t}\n\t\t}\n\n\t\t// search for the suffix of the base of a [computed] map, list or set.\n\t\tmatch := multiVal.FindStringSubmatch(k)\n\n\t\tif diffOld.NewComputed && len(match) == 2 {\n\t\t\tmatchLen := len(match[1])\n\n\t\t\t// This is a computed list, set, or map, so remove any keys with\n\t\t\t// this prefix from the check list.\n\t\t\tkprefix := k[:len(k)-matchLen]\n\t\t\tfor k2 := range checkOld {\n\t\t\t\tif strings.HasPrefix(k2, kprefix) {\n\t\t\t\t\tdelete(checkOld, k2)\n\t\t\t\t}\n\t\t\t}\n\t\t\tfor k2 := range checkNew {\n\t\t\t\tif strings.HasPrefix(k2, kprefix) {\n\t\t\t\t\tdelete(checkNew, k2)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// We don't compare the values because we can't currently actually\n\t\t// guarantee to generate the same value two two diffs created from\n\t\t// the same state+config: we have some pesky interpolation functions\n\t\t// that do not behave as pure functions (uuid, timestamp) and so they\n\t\t// can be different each time a diff is produced.\n\t\t// FIXME: Re-organize our config handling so that we don't re-evaluate\n\t\t// expressions when we produce a second comparison diff during\n\t\t// apply (for EvalCompareDiff).\n\t}\n\n\t// Check for leftover attributes\n\tif len(checkNew) > 0 {\n\t\textras := make([]string, 0, len(checkNew))\n\t\tfor attr := range checkNew {\n\t\t\textras = append(extras, attr)\n\t\t}\n\t\treturn false,\n\t\t\tfmt.Sprintf(\"extra attributes: %s\", strings.Join(extras, \", \"))\n\t}\n\n\treturn true, \"\"\n}", "title": "" }, { "docid": "a305a6ebf1a6ce4916be8b43049e4ca5", "score": "0.64459425", "text": "func same(states []api.Test_State) bool {\n\tfor i := 1; i < len(states); i++ {\n\t\tif states[i] != states[0] {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "d8fcbf3edd8672e1093cc78955ea98be", "score": "0.6418463", "text": "func (p *Matcher) Same() bool {\n\treturn p.a == p.b\n}", "title": "" }, { "docid": "d103000039558ad40dcbfe59b21daa72", "score": "0.6329522", "text": "func Same(t1, t2 *tree.Tree) bool {\n\treturn false\n}", "title": "" }, { "docid": "d610cd29bb0d8d9a99cdf32a862817e1", "score": "0.63289547", "text": "func AreSame(arr1, arr2 []Schedule) bool {\n\tif len(arr1) != len(arr2) {\n\t\treturn false\n\t}\n\tcounter := make(map[string]int)\n\tfor _, s := range arr1 {\n\t\tcounter[s.ID()]++\n\t}\n\tfor _, s := range arr2 {\n\t\tif _, found := counter[s.ID()]; !found {\n\t\t\treturn false\n\t\t}\n\t\tcounter[s.ID()]--\n\t\tif counter[s.ID()] == 0 {\n\t\t\tdelete(counter, s.ID())\n\t\t}\n\t}\n\treturn len(counter) == 0\n}", "title": "" }, { "docid": "db3fd3463cba573ee5eb55f1b125a3d2", "score": "0.6302479", "text": "func (v ValuePair) HasSameValues() bool {\n\treturn reflect.DeepEqual(v.Old, v.New)\n}", "title": "" }, { "docid": "8781405e09a96df699ec8226086be433", "score": "0.62793875", "text": "func same(arr1 []float64, arr2 []float64) bool {\n\t//Check if arrays are the same length. If they are not return false\n\tif len(arr1) != len(arr2) {\n\t\tfmt.Println(\"false, arrays are not of the same length\")\n\t\treturn false\n\t}\n\t//loop through arrays and see if array 2 contains a value equal to the squared value of the first array\n\tfirstArrayMap := make(map[float64]float64)\n\tsecondArrayMap := make(map[float64]float64)\n\tfor _, num := range arr1 {\n\t\tif firstArrayMap[num] > 0 {\n\t\t\tfirstArrayMap[num] += 1\n\t\t} else {\n\t\t\tfirstArrayMap[num] = 1\n\t\t}\n\t}\n\tfor _, num := range arr2 {\n\t\tif secondArrayMap[num] > 0 {\n\t\t\tsecondArrayMap[num] += 1\n\t\t} else {\n\t\t\tsecondArrayMap[num] = 1\n\t\t}\n\t}\n //iterate through first map\n\tfor key, _ := range firstArrayMap {\n //Checking to see if second map contains a value thats squared the first map's key\n\t\t_, ok := secondArrayMap[key*key]\n //if does not contain the correlating squared element return false\n\t\tif !ok {\n\t\t\tfmt.Println(\"false, arrays do not contain correlating squared elements\")\n\t\t\treturn false\n\t\t}\n //Check to see if both maps are of the same frequency if not return false\n\t\tif secondArrayMap[key*key] != firstArrayMap[key] {\n fmt.Println(\"false, arrays do not have the same frequency\")\n\t\t\treturn false\n\t\t}\n\t}\n\t//return true\n\tfmt.Println(\"true\")\n\treturn true\n}", "title": "" }, { "docid": "06e04349942f1dc5b154fdb2ae54ede2", "score": "0.6098141", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tc1 := make(chan int)\n\tc2 := make(chan int)\n\tsum1 := 0\n\tsum2 := 0\n\n\tgo Walk(t1, c1)\n\tgo Walk(t2, c2)\n\n\tfor value := range c1 {\n\t\tsum1 += value\n\t}\n\n\tfor value := range c2 {\n\t\tsum2 += value\n\t}\n\n\treturn (sum1 == sum2)\n}", "title": "" }, { "docid": "0b1350b297e20903bc77f041853cc7e2", "score": "0.6028705", "text": "func (ss Float64s) AreUnique() bool {\n\treturn ss.Unique().Len() == ss.Len()\n}", "title": "" }, { "docid": "6048248cf41d87f6c4ae133a9d2a624e", "score": "0.601831", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tt1d, t2d := make(map[string]int), make(map[string]int)\n\tch1, ch2 := make(chan int), make(chan int)\n\tgo Walk(t1, ch1)\n\tgo Walk(t2, ch2)\n\tchan2map := func(ch chan int, d map[string]int){\n\t\tfor i := range ch {\n\t\t\tkey := i\n\t\t\tif _, ok := d[string(key)]; ok {\n\t\t\t\td[string(key)] += 1\t\n\t\t\t} else {\n\t\t\t\td[string(key)] = 1\t\n\t\t\t}\n\t\t}\n\t}\n\tchan2map(ch1, t1d)\n\tchan2map(ch2, t2d)\n\treturn reflect.DeepEqual(t1d, t2d)\n}", "title": "" }, { "docid": "0f2cb5b680153c26cc1dea570ef34f7a", "score": "0.6000163", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1, ch2, quit := make(chan int), make(chan int), make(chan int)\n\n\tgo Walk(t1, t1, ch1, quit)\n\tgo Walk(t2, t2, ch2, quit)\n\n\tresult := true\n\tfor {\n\t\tv1, ok1 := <-ch1\n\t\tv2, ok2 := <-ch2\n\n\t\tif v1 != v2 || ok1 != ok2 {\n\t\t\tresult = false\n\t\t\tbreak\n\t\t}\n\n\t\tif !ok1 || !ok2 {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tclose(quit)\n\n\treturn result\n}", "title": "" }, { "docid": "662cab40fb9c134f78bd5f3ea8a35969", "score": "0.5998721", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch := make(chan int)\n\n\tvar valuesT1 []int\n\tvar valuesT2 []int\n\n\tgo Walk(t1, ch)\n\n\tfor i := 0; i < 10; i++ {\n\t\tvaluesT1 = append(valuesT1, <-ch)\n\t}\n\n\tgo Walk(t2, ch)\n\n\tfor i := 0; i < 10; i++ {\n\t\tvaluesT2 = append(valuesT2, <-ch)\n\t}\n\n\tsort.Ints(valuesT1)\n\tsort.Ints(valuesT2)\n\n\tvar t1Arr [10]int\n\tvar t2Arr [10]int\n\n\tcopy(t1Arr[:], valuesT1)\n\tcopy(t2Arr[:], valuesT2)\n\n\treturn t1Arr == t2Arr\n}", "title": "" }, { "docid": "bb3ae0b2b5ed3705ca5e85681ab1f553", "score": "0.59757155", "text": "func sameApprox(a, b, tol float32) bool {\n\treturn scalar.Same(float64(a), float64(b)) || scalar.EqualWithinAbsOrRel(float64(a), float64(b), float64(tol), float64(tol))\n}", "title": "" }, { "docid": "0f8ec2fdaeeb8d87f6ff4abd36385e16", "score": "0.5970538", "text": "func (v *View) same(other *View) bool {\n\tif v == other {\n\t\treturn true\n\t}\n\tif v == nil {\n\t\treturn false\n\t}\n\treturn reflect.DeepEqual(v.Aggregation, other.Aggregation) &&\n\t\tv.Measure.Name() == other.Measure.Name()\n}", "title": "" }, { "docid": "c4d5c54a8467eb6aaaf7347ddcf76a19", "score": "0.59671986", "text": "func (s *NFSStoreSpec) Differs(expected metav1.Object, observed metav1.Object) bool {\n\treturn differs(expected, observed)\n}", "title": "" }, { "docid": "649d67be5109025b64181dbf0325d31c", "score": "0.5920421", "text": "func Same(t1, t2 *tree.Tree) bool {\n\n\tbool := true\n\tch1 := make(chan int)\n\tch2 := make(chan int)\n\tgo Walk(t1, ch1)\n\tgo Walk(t2, ch2)\n\tfor v := range ch1 {\n\n\t\tif v != <-ch2 {\n\n\t\t\tbool = false\n\t\t}\n\t}\n\treturn bool\n}", "title": "" }, { "docid": "1f809040c6462ab6be67577b9e448346", "score": "0.59197253", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1 := make(chan int, 10)\n\tch2 := make(chan int, 10)\n\tgo Walk(t1, ch1)\n\tgo Walk(t2, ch2)\n\tvar v1, v2 int\n\tvar ok1, ok2 bool\n\tfor {\n\t\tv1, ok1 = <-ch1\n\t\tv2, ok2 = <-ch2\n\t\tfmt.Printf(\"%d \", v1)\n\t\tfmt.Printf(\"%d \", v2)\n\t\tfmt.Printf(\"%t \", ok1)\n\t\tfmt.Printf(\"%t \", ok2)\n\t\tif v1 != v2 || !ok1 || !ok2 {\n\t\t\treturn false\n\t\t}\n\t\tfmt.Println()\n\t}\n\treturn true\n}", "title": "" }, { "docid": "2be1b066a11e205a0b7426c7c5686a4b", "score": "0.5918379", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tcht1 := make(chan int)\n\tcht2 := make(chan int)\n\n\tgo Walk(t1, cht1)\n\tgo Walk(t2, cht2)\n\n\tfor v := range cht1 {\n\t\tif v != <-cht2 {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "a0e751cc4c08b3e8fc1fb0080c2b7e03", "score": "0.5894025", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1 := make(chan int)\n\tch2 := make(chan int)\n\n\tgo Walk(t1, ch1)\n\tgo Walk(t2, ch2)\n\n\t// Compare all values in tree until one doesn't match\n\tfor v1 := range ch1 {\n\t\tv2 := <-ch2\n\n\t\tif v1 != v2 {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "825a21e97df1b062687cb3fa2f03a1b2", "score": "0.5887013", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tvar n1, n2 int\n\tcountTreeNodes(t1, &n1)\n\tcountTreeNodes(t2, &n2)\n\tif n1 != n2 {\n\t\treturn false\n\t}\n\tch1 := make(chan int)\n\tch2 := make(chan int)\n\tgo Walk(t1, ch1)\n\tgo Walk(t2, ch2)\n\tfor i := 0; i< n1; i++ {\n\t\tif <-ch1 != <-ch2 {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n\n}", "title": "" }, { "docid": "d99d52a07aee895b938a7e31097e9309", "score": "0.5883128", "text": "func alike(x, y *Float) bool {\n\treturn x.Cmp(y) == 0 && x.Signbit() == y.Signbit()\n}", "title": "" }, { "docid": "0b39697e21ac79ffe2cc1a049ea9d258", "score": "0.58709073", "text": "func Same(t1, t2 *tree.Tree) bool{\n\t//var x, y int\n\tch1 := make(chan int)\n\tch2 := make(chan int)\n\tgo Walk(t1, ch1)\n\tgo Walk(t2, ch2)\n\tresult := true\n\tfor {\n\t\tv1, ok1 := <-ch1\n\t\tv2, ok2 := <-ch2\n\t\tif !ok1 || !ok2{\n\t\t\tbreak\n\t\t}\n\t\tresult = result && v1==v2\n\t}\n\treturn result\n}", "title": "" }, { "docid": "a06df07c8d67152676d9b0fcb02569e6", "score": "0.58562005", "text": "func setsDiffer(first, second mapset.Set) bool {\n\treturn first.Difference(second).Cardinality() != 0\n}", "title": "" }, { "docid": "b537d40f11cd87c9de492b8824c75e34", "score": "0.58551764", "text": "func notEqual(f1, f2 float64) bool {\n\tif math.Abs(f1-f2) > 0.000001 {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "0ba2ae723587b75ac3c38e394684019f", "score": "0.58540934", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tc1 := make(chan int)\n\tc2 := make(chan int)\n\tgo Walk(t1, c1, 0)\n\tgo Walk(t2, c2, 0)\n\tfor v1 := range c1 {\n\t\tv2, c2_open := <-c2\n\t\tif !c2_open || (v1 != v2) {\n\t\t\treturn false\n\t\t}\n\t}\n\t// Check that c2 is also closed:\n\t_, c2_open := <-c2\n\treturn true && !c2_open\n}", "title": "" }, { "docid": "e0c8a2fca0e601083d08e66b7578e9b2", "score": "0.5849666", "text": "func isIsosceles(a, b, c float64) bool {\n\treturn a == b || b == c || a == c\n}", "title": "" }, { "docid": "2a5fab0fdba08741c7a230f4a4396d73", "score": "0.5846881", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1 := make(chan int)\n\tgo Walk(t1, ch1)\n\n\tch2 := make(chan int)\n\tgo Walk(t2, ch2)\n\tfor {\n\t\tv1, ok1 := <-ch1\n\t\tv2, ok2 := <-ch2\n\t\tfmt.Printf(\"%d %v %d %v\\n\", v1, ok1, v2, ok2)\n\t\tif ok1 && ok2 {\n\t\t\tif v1 != v2 {\n\t\t\t\treturn false\n\t\t\t}\n\t\t} else if !ok1 && !ok2 {\n\t\t\treturn true\n\t\t} else {\n\t\t\treturn false\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d43eeba815043eddef37aa1010ae7c48", "score": "0.58318424", "text": "func (mh MinhashComparator) Same(document1, document2 string) bool {\n\treturn mh.Threshold < mh.Similarity(document1, document2)\n}", "title": "" }, { "docid": "d752a349144b1c20c053f559d108ea9f", "score": "0.582836", "text": "func Same(t1, t2 *tree.Tree) bool {\n\n\tc1 := make(chan int)\n\tc2 := make(chan int)\n\tgo Walk(t1, c1)\n\tgo Walk(t2, c2)\n\n\tfor {\n\t\tv1, o1 := <-c1\n\t\tv2, o2 := <-c2\n\t\tfmt.Printf(\"%d : %d\\n\", v1, v2)\n\t\tif !(v1 == v2 && o1 == o2) {\n\t\t\treturn false\n\t\t} else if !o1 {\n\t\t\treturn true\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "3427022dd327176219b7d89ba6b8a3c6", "score": "0.5828087", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tct1 := make(chan int)\n\tct2 := make(chan int)\n\n\tgo Walker(t1, ct1)\n\tgo Walker(t2, ct2)\n\n\tfor {\n\t\tv1, ok1 := <-ct1\n\t\tv2, ok2 := <-ct2\n\n\t\tif ok1 && ok2 {\n\t\t\tif v1 != v2 {\n\t\t\t\treturn false\n\t\t\t}\n\t\t} else if !ok1 && !ok2 {\n\t\t\treturn true\n\t\t} else {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "42e6076ae0f429bd30d17251a7c78825", "score": "0.5807627", "text": "func (n *Number) SameType(other *Number) bool {\n\t// Within `n` and `other`, at least one of `Int` or `Float` must be set to zero.\n\t// Therefore, this verifies that there is at least one shared zero between the two.\n\treturn n.Float == other.Float || n.Int == other.Int\n}", "title": "" }, { "docid": "1e83bcef4eb164585d5e843619f99e33", "score": "0.5804683", "text": "func Same(t1, t2 *tree.Tree) bool{\n\tt1_ch := make(chan int)\n\tt2_ch := make(chan int)\n\t\n\tgo Walk(t1, t1_ch)\n\tgo Walk(t2, t2_ch)\n\t\n\tt1_val := make([]int, 10)\n\tt2_val := make([]int, 10)\n\t\n\tfor i := 0; i < 10; i++{\n\t\tt1_val[i] = <- t1_ch\n\t\tt2_val[i] = <- t2_ch\n\t}\n\t\n\tans := true\n\tsort.Slice(t1_val, func(i, j int) bool { return t1_val[i] <= t1_val[j]; })\n\tsort.Slice(t2_val, func(i, j int) bool { return t2_val[i] <= t2_val[j]; })\n\tfor i := range t1_val{\n\t\tif t1_val[i] != t2_val[i]{\n\t\t\tans = false\n\t\t\tbreak\n\t\t}\n\t}\n\t\n\treturn ans\n}", "title": "" }, { "docid": "f35cad32fa28a72ed76d7140dc8fab45", "score": "0.5794776", "text": "func Same(t1, t2 *Tree) bool {\n\tc1 := make(chan int, 10)\n\tgo Walk(t1, c1)\n\n\tc2 := make(chan int, 10)\n\tgo Walk(t2, c2)\n\n\tfor {\n\t\tv1, ok1 := <-c1\n\t\tv2, ok2 := <-c2\n\n\t\t// fmt.Printf(\"v1:%d, ok1:%v, v2:%d, ok2:%v\\n\", v1, ok1, v2, ok2)\n\t\t// all read normally\n\t\tif ok1 && ok2 {\n\t\t\tif v1 != v2 {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\t// all closed\n\t\tif !ok1 && !ok2 {\n\t\t\treturn true\n\t\t}\n\n\t\t// anyone closed first\n\t\tif (ok1 && !ok2) || (!ok1 && ok2) {\n\t\t\treturn false\n\t\t}\n\t}\n}", "title": "" }, { "docid": "faeae6c83f255b79b38d046abf89cd10", "score": "0.5784669", "text": "func Same(t1, t2 *tree.Tree) bool{\n\tch1 := make(chan int, 1)\n\tch2 := make(chan int, 1)\n\tgo Walk(t1, ch1)\n\tgo Walk(t2, ch2)\n\tfor i := range ch1{\n\t\tif i != <-ch2{\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "7248b50fb5262bb30df398bb5ab755c9", "score": "0.5782062", "text": "func (z Fp) IsEqual(x *Fp) int { return ctUint64Eq(z.i[:], x.i[:]) }", "title": "" }, { "docid": "60f16f5f2d788c0478171c0e9d393b69", "score": "0.5772828", "text": "func areSameFloat32Array(a, b []float32) bool {\n\tif len(a) != len(b) {\n\t\treturn false\n\t}\n\tfor i := 0; i < len(a); i++ {\n\t\tif a[i] != b[i] {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "7ba5aded0b7cbdb2c457336e8afdd387", "score": "0.57711357", "text": "func (v Version) Same(other Version) bool {\n\treturn (v.Major == other.Major &&\n\t\tv.Minor == other.Minor &&\n\t\tv.Patch == other.Patch &&\n\t\tv.Prerelease == other.Prerelease)\n}", "title": "" }, { "docid": "6beba059f65e15be78ace63a234ab9f5", "score": "0.5764095", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tc1 := make(chan int)\n\tc2 := make(chan int)\n\tgo Walk(t1, c1)\n\tgo Walk(t2, c2)\n\tfor {\n\t\tv1, c1ok := <-c1\n\t\tv2, c2ok := <-c2\n\t\tif v1 != v2 {\n\t\t\treturn false\n\t\t}\n\t\tif !c1ok || !c2ok {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "7060eb9f09c66c656be625e34772e794", "score": "0.5756183", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1 := make(chan int)\n\tch2 := make(chan int)\n\tgo Walk(t1, ch1)\n\tgo Walk(t2, ch2)\n\tfor v1 := range ch1 {\n\t\tif v1 != <-ch2 {\n\t\t\treturn false\n\t\t}\n\t}\n\tif _, ok := <-ch2; ok {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "49bda38194df14537d73262af1681202", "score": "0.57415515", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1, ch2 := make(chan int), make(chan int)\n\t\n\tgo Walk(t1, ch1)\n\tgo Walk(t2, ch2)\t\t\t\n\t\t\n\tfor i := range ch1 {\n\t\tselect {\n\t\t\tcase v := <-ch2: \n\t\t\t\tif (i == v) {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\t\t\n\t\t\tdefault:\n\t\t\t\tbreak\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "ac6dc4ee806605992898c053ac4ae722", "score": "0.57337713", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1 := make(chan int, 1)\n\tch2 := make(chan int, 1)\n\tgo Walk(t1, ch1)\n\tgo Walk(t2, ch2)\n\n\tfor x := 0; x < 10; x++ {\n\t\telem_t1 := <-ch1\n\t\telem_t2 := <-ch2\n\t\tfmt.Println(elem_t1, elem_t2)\n\t\tif elem_t1 != elem_t2 {\n\t\t\treturn false\n\t\t}\n\t}\n\tclose(ch1)\n\tclose(ch2)\n\treturn true\n}", "title": "" }, { "docid": "707701953ba13507caa0120148f361d6", "score": "0.5733105", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1 := make(chan int)\n\tgo Walk(t1, ch1)\n\n\tch2 := make(chan int)\n\tgo Walk(t2, ch2)\n\t\n\tfor {\n\t\tx, ch1ok := <-ch1\n\t\ty, ch2ok := <-ch2\n\t\tif (!ch1ok && ch2ok) || (ch1ok && !ch2ok) {\n\t\t\treturn false\n\t\t}\n\t\tif x != y {\n\t\t\treturn false\n\t\t}\n\t\treturn true\n\t}\n}", "title": "" }, { "docid": "0b26efeb171dcb17fffb2dbd5739fbe5", "score": "0.57308644", "text": "func (s *FlowerSpec) Differs(expected metav1.Object, observed metav1.Object) bool {\n\treturn differs(expected, observed)\n}", "title": "" }, { "docid": "bbc151c681e2b2a52962a99868375895", "score": "0.57253826", "text": "func diffByOne(x []rune, y []rune) bool {\n\tvar diffs int\n\n\tif len(x) != len(y) {\n\t\treturn false\n\t}\n\tfor idx, c := range x {\n\t\tif c != y[idx] {\n\t\t\tdiffs++\n\t\t}\n\t}\n\treturn diffs == 1\n}", "title": "" }, { "docid": "ec6c94027dc30313ac633b6bc672c491", "score": "0.5719342", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1 := make(chan int)\n\tch2 := make(chan int)\n\n\t// walk through both trees\n\tgo WalkWrapper(t1, ch1)\n\tgo WalkWrapper(t2, ch2)\n\n\t// compare channels\n\tfor {\n\t\tv1, open1 := <-ch1\n\t\tv2, open2 := <-ch2\n\n\t\t// check value\n\t\tif v1 != v2 || open1 != open2 {\n\t\t\treturn false\n\t\t}\n\n\t\tif !open1 && !open2 {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "d1566cedaaf0c1fe0b2f15ed5a2b607e", "score": "0.57134145", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tvar ch1 = make(chan int)\n\tvar ch2 = make(chan int)\n\n\tstartWalk(t1, ch1)\n\tstartWalk(t2, ch2)\n\n\tfor {\n\t\tv1, ok1 := <-ch1\n\t\tv2, ok2 := <-ch2\n\n\t\tif ok1 && ok2 {\n\t\t\tif v1 == v2 {\n\t\t\t\tcontinue\n\t\t\t} else {\n\t\t\t\tdrainChannel(ch1)\n\t\t\t\tdrainChannel(ch2)\n\t\t\t\treturn false\n\t\t\t}\n\t\t} else if ok1 && !ok2 {\n\t\t\tdrainChannel(ch1)\n\t\t\treturn false\n\t\t} else if !ok1 && ok2 {\n\t\t\tdrainChannel(ch2)\n\t\t\treturn false\n\t\t} else {\n\t\t\treturn true\n\t\t}\n\n\t}\n\n}", "title": "" }, { "docid": "697be6c1010be02de19798597bd6ff63", "score": "0.57126325", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1 := make(chan int, 10)\n\tgo Walk(t1, ch1)\n\tch2 := make(chan int, 10)\n\tgo Walk(t2, ch2)\n\n\tfor e1 := range ch1 {\n\t\te2 := <-ch2\n\t\tif e1 != e2 {\n\t\t\treturn false\n\t\t}\n\t}\n\n\t_, ok := <-ch2\n\treturn !ok\n}", "title": "" }, { "docid": "3f2e0c47388c7ad2501a02145801cc04", "score": "0.5709361", "text": "func (el *element) Same(other gt.Element) bool {\n\treturn el.same(other)\n}", "title": "" }, { "docid": "c1a480762f0e4b3c76555ae65436454f", "score": "0.5706019", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tchannel1, channel2 := make(chan int), make(chan int)\n\tgo Walk(t1, channel1)\n\tgo Walk(t2, channel2)\n\t\n\tfor {\n\t\tresult1, status1 := <- channel1\n\t\tresult2, status2 := <- channel2\n\t\tif result1 != result2 || status1 != status2 {\n\t\t\treturn false\n\t\t}\n\n\t\tif !status1 {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "79bb2c2c72a1a137a9434738ffd72608", "score": "0.5704418", "text": "func Same(t1, t2 *tree.Tree) bool {\n\t// Create two channels for the two trees\n\tch1, ch2 := make(chan int), make(chan int)\n\n\t// Have to goroutines that walk the\n\t// trees t1 and t2, give them two different\n\t// channels to receive the node values\n\tgo Walk(t1, ch1)\n\tgo Walk(t2, ch2)\n\n\t// For every value received in ch1,\n\t// compare it to value received in ch2\n\t// to see if the tree values are the same.\n\tfor i := range ch1 {\n\t\tif i != <-ch2 {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "d63ab0589d2fe831727f58b2a4938dd0", "score": "0.5702575", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1 := make(chan int)\n\tch2 := make(chan int)\n\tgo Walk(t1, ch1)\n\tgo Walk(t2, ch2)\n\tfor x := range ch1 {\n\t\tif x != <-ch2 {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "d19bf0190cebf515b5e78354e574c2f5", "score": "0.56739235", "text": "func compare(box1 string, box2 string) (oneDiff bool) {\n\tfor i := 0; i < len(box1); i++ {\n\t\tif box1[i] != box2[i] {\n\t\t\tif oneDiff {\n\t\t\t\t// we've already seen one diff, so another eliminates this pair\n\t\t\t\treturn false\n\t\t\t}\n\t\t\toneDiff = true\n\t\t}\n\t}\n\treturn oneDiff\n}", "title": "" }, { "docid": "02abe006e6c3de97229893037be15fb1", "score": "0.5659611", "text": "func Adiff_same(zf_args_t []float64) ([]float64, []float64) {\n\tzf_args := make([]float64, len(zf_args_t))\n\tcopy(zf_args, zf_args_t)\n\tif len(zf_args) == 0 {\n\t\treturn zf_args, zf_args\n\t}\n\tAsort_float(zf_args)\n\n\tzsame := make([]float64, 0)\n\tzdiff := make([]float64, 0)\n\tvar ze float64 = 0\n\tzchange_flag := false\n\tfor zi, zv := range zf_args {\n\t\tif ze != zv || (zi == 0) {\n\t\t\tze = zv\n\n\t\t\tzdiff = append(zdiff, ze)\n\n\t\t\tzchange_flag = true\n\t\t} else {\n\t\t\tif zchange_flag {\n\t\t\t\tzchange_flag = false\n\t\t\t\tzsame = append(zsame, ze)\n\t\t\t\tzchange_flag = false\n\t\t\t}\n\t\t}\n\n\t}\n\treturn zdiff, zsame\n}", "title": "" }, { "docid": "53291d33175cb647377258cac06fd700", "score": "0.56545395", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1 := make(chan int)\n\tgo Walk(t1, ch1)\n\tch2 := make(chan int)\n\tgo Walk(t2, ch2)\n\tfor {\n\t\tc1, ok1 := <-ch1\n\t\tc2, ok2 := <-ch2\n\t\tif c1 != c2 {\n\t\t\treturn false\n\t\t}\n\t\tif !ok1 && !ok2 {\n\t\t\treturn true\n\t\t} else if !ok1 || !ok2 {\n\t\t\treturn false\n\t\t}\n\t}\n}", "title": "" }, { "docid": "8c273103a5b0cf1b60c28ec7b6c5c1c4", "score": "0.5646367", "text": "func (fd *FileDep) IsSame(filedep *FileDep) bool {\n\tif filedep == nil {\n\t\treturn false\n\t}\n\n\tif fd == filedep {\n\t\treturn true\n\t}\n\n\tif fd.FilePath == filedep.FilePath && fd.ProtoFile.PackageName == filedep.ProtoFile.PackageName {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "0bac2db04a25388618be93aa46474d83", "score": "0.56457746", "text": "func Same(t1, t2 *tree.Tree) bool {\n ch1 := make(chan int)\n vals1 := []int {}\n ch2 := make(chan int)\n vals2 := []int {}\n\n go Walk(t1, ch1)\n go Walk(t2, ch2)\n\n for v := range ch1 {\n vals1 = append(vals1, v)\n }\n for v := range ch2 {\n vals2 = append(vals2, v)\n }\n\n return reflect.DeepEqual(vals1, vals2)\n}", "title": "" }, { "docid": "a1ecffd4b934cbb8da77b7098106367e", "score": "0.5645033", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tc1 := make(chan int)\n\tc2 := make(chan int)\n\tgo func() {\n\t\tWalk(t1, c1)\n\t\tclose(c1)\n\t}()\n\tgo func() {\n\t\tWalk(t2, c2)\n\t\tclose(c2)\n\t}()\n\tfor {\n\t\tv1, e1 := <-c1\n\t\tv2, e2 := <-c2\n\t\tif v1 != v2 || e1 != e2 {\n\t\t\tfor range c1 {\n\t\t\t}\n\t\t\tfor range c2 {\n\t\t\t}\n\t\t\treturn false\n\t\t} else if !e1 || !e2 {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "0fa099f480b15a3dad57a4d680a90054", "score": "0.5644833", "text": "func DeltaCompare(a, b float64) bool {\n // Delta used for comparisons\n DELTA := 0.0001\n // Do comparison and return results\n return math.Abs(a - b) < DELTA\n}", "title": "" }, { "docid": "8bafba8ca4ed5f9d4fdf7eabd6e9a053", "score": "0.5628398", "text": "func (f *File) IsDifferent() (bool, error) {\n\tnstat, err := f.Stat()\n\tif err != nil {\n\t\treturn true, err\n\t}\n\tostat, err := os.Stat(f.oname)\n\tif err != nil {\n\t\treturn true, err\n\t}\n\tif nstat.Size() != ostat.Size() {\n\t\treturn true, nil\n\t}\n\n\tof, err := os.Open(f.oname)\n\tif err != nil {\n\t\treturn true, err\n\t}\n\tdefer of.Close()\n\n\tvar off int64\n\tb1store := make([]byte, chunckSize)\n\tb2store := make([]byte, chunckSize)\n\tfor {\n\t\tn1, err1 := f.ReadAt(b1store, off)\n\t\toff += int64(n1)\n\t\tif n1 > 0 && err1 == io.EOF {\n\t\t\terr1 = nil\n\t\t}\n\n\t\tn2, err2 := of.Read(b2store)\n\n\t\tif err1 != nil || err2 != nil {\n\n\t\t\tif err1 == io.EOF && err2 == io.EOF {\n\t\t\t\treturn false, nil\n\t\t\t} else if err1 == io.EOF {\n\t\t\t\treturn true, nil\n\t\t\t} else if err2 == io.EOF {\n\t\t\t\treturn true, nil\n\t\t\t} else {\n\t\t\t\terr := err1\n\t\t\t\tif err != nil {\n\t\t\t\t\terr = err2\n\t\t\t\t}\n\t\t\t\treturn true, err\n\t\t\t}\n\t\t}\n\n\t\tb1 := b1store[:n1]\n\t\tb2 := b2store[:n2]\n\t\tif n1 != n2 { // Bad ?\n\t\t\treturn false, nil\n\t\t}\n\t\tif !bytes.Equal(b1[:n1], b2[:n1]) {\n\n\t\t\treturn true, nil\n\t\t}\n\t}\n}", "title": "" }, { "docid": "37b94c48ca440116761f5bd6165cc320", "score": "0.5621687", "text": "func (s *AirflowUISpec) Differs(expected metav1.Object, observed metav1.Object) bool {\n\treturn differs(expected, observed)\n}", "title": "" }, { "docid": "2fc253a6d0e7d6885234bb0fe59d42e2", "score": "0.562", "text": "func IsSameFloat64(data ...[]float64) bool {\n\t// check arguments\n\tcount := len(data)\n\tif count < 2 {\n\t\treturn false\n\t}\n\t// check length\n\tlength := len(data[0])\n\tfor i := 1; i < count; i++ {\n\t\tif len(data[i]) != length {\n\t\t\treturn false\n\t\t}\n\t}\n\t// check items\n\tfor i := 0; i < length; i++ {\n\t\tfirst := data[0][i]\n\t\tfor j := 1; j < count; j++ {\n\t\t\tif first != data[j][i] {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "99e50c54576b7a226a39526bee150f4d", "score": "0.56124115", "text": "func (s *RedisSpec) Differs(expected metav1.Object, observed metav1.Object) bool {\n\treturn differs(expected, observed)\n}", "title": "" }, { "docid": "789e3c86e972fb6a72264477a4e9323e", "score": "0.56086993", "text": "func identical(start1 []byte, end1 []byte, start2 []byte, end2 []byte) bool{\n\ty.AssertTruef(y.ComparePureKeys(start1,end1) <= 0 && y.ComparePureKeys(start2,end2) <= 0, \"start must be higher than or equal to end\")\n\treturn (y.ComparePureKeys(end1,end2) == 0 && y.ComparePureKeys(start1,start2) == 0)\n}", "title": "" }, { "docid": "2b3da52e7084ecaa43fea20ed70d19ce", "score": "0.5606994", "text": "func (m *Metaphone) SoundTheSame() bool {\n\tt := tokenizer.NewTokenizer(`([a-zA-ZА-Яа-я])\\w+`)\n\ttokensA := t.Tokenize(m.textA)\n\ttokensB := t.Tokenize(m.textB)\n\treturn distance.Compare(m.textA, m.textB) > 0.9 && len(tokensA) == len(tokensB)\n}", "title": "" }, { "docid": "57daf47757df962d4c65b1f84ae5b074", "score": "0.56054205", "text": "func (border *ViewBorders) AllTheSame() bool {\n\treturn border.Top.Style == border.Right.Style &&\n\t\tborder.Top.Style == border.Left.Style &&\n\t\tborder.Top.Style == border.Bottom.Style &&\n\t\tborder.Top.Color == border.Right.Color &&\n\t\tborder.Top.Color == border.Left.Color &&\n\t\tborder.Top.Color == border.Bottom.Color &&\n\t\tborder.Top.Width.Equal(border.Right.Width) &&\n\t\tborder.Top.Width.Equal(border.Left.Width) &&\n\t\tborder.Top.Width.Equal(border.Bottom.Width)\n}", "title": "" }, { "docid": "2c7b5f78a9208355dac050751af2e3fd", "score": "0.559923", "text": "func sameShape(a, b []int) bool {\n\tif len(a) == 0 {\n\t\ta = scalarShape\n\t}\n\tif len(b) == 0 {\n\t\tb = scalarShape\n\t}\n\tif len(a) != len(b) {\n\t\treturn false\n\t}\n\tfor i, av := range a {\n\t\tif av != b[i] {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "82a1469724563e0bbeb5c67a1f2a32dc", "score": "0.55931735", "text": "func (p *Path) Same(otherPath *Path) bool {\n\n\tif p == nil || otherPath == nil || len(p.Cells) != len(otherPath.Cells) {\n\t\treturn false\n\t}\n\n\tfor i := range p.Cells {\n\t\tif len(otherPath.Cells) <= i || p.Cells[i] != otherPath.Cells[i] {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n\n}", "title": "" }, { "docid": "ccf5f49ad72bc91dd8469e8fd7309157", "score": "0.558499", "text": "func (df *Diff) Equal() (equal bool, err error) {\n\tequal = true\n\ttbls1, err := getTables(df.db1)\n\tif err != nil {\n\t\terr = errors.Trace(err)\n\t\treturn\n\t}\n\n\ttbls2, err := getTables(df.db2)\n\tif err != nil {\n\t\terr = errors.Trace(err)\n\t\treturn\n\t}\n\n\teq := equalStrings(tbls1, tbls2)\n\tif !eq {\n\t\tlog.Infof(\"show tables get different table. [source db tables] %v [target db tables] %v\", tbls1, tbls2)\n\t\tequal = false\n\t}\n\n\tcheckTables := make([]string, 0, len(tbls1))\n\tif len(df.tables) == 0 {\n\t\tcheckTables = tbls1\n\t} else {\n\t\tcheckTables = df.tables\n\t}\n\n\tfor _, tblName := range checkTables {\n\t\teq, err = df.EqualIndex(tblName)\n\t\tif err != nil {\n\t\t\terr = errors.Trace(err)\n\t\t\treturn\n\t\t}\n\t\tif !eq {\n\t\t\tlog.Infof(\"table have different index: %s\\n\", tblName)\n\t\t\tequal = false\n\t\t}\n\n\t\teq, err = df.EqualTable(tblName)\n\t\tif err != nil || !eq {\n\t\t\terr = errors.Trace(err)\n\t\t\tequal = false\n\t\t\treturn\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "95b497d465f30f1ce471a26b51b72e2d", "score": "0.5563521", "text": "func Same(t1, t2 *tree.Tree) bool {\r\n\tw1, w2 := make(chan int), make(chan int)\r\n\tquit := make(chan int)\r\n\t// 当 v1 != v2 这类条件结束 Same 函数时, close quit channel (解除 <- quit 的阻塞)\r\n\t// 使 goroutine 正常退出, 防止泄漏\r\n\tdefer close(quit)\r\n\r\n\tgo Walk(t1, w1, quit)\r\n\tgo Walk(t2, w2, quit)\r\n\r\n\t// 循环读取 w1 w2 channel 的输出\r\n\tfor {\r\n\t\tv1, ok1 := <- w1\r\n\t\tv2, ok2 := <- w2\r\n\r\n\t\t// 如果 channel 读完, 返回成功结果\r\n\t\tif ! ok1 || ! ok2 {\r\n\t\t\treturn ok1 == ok2\r\n\t\t}\r\n\t\t// 如果不相等, 返回错误结果\r\n\t\tif v1 != v2 {\r\n\t\t\treturn false\r\n\t\t}\r\n\t}\r\n\r\n}", "title": "" }, { "docid": "5995524dd678cc9cd364772e5c910080", "score": "0.5552676", "text": "func Same(t1, t2 *tree.Tree) bool {\n\t\n\tch := make(chan int)\n\tgo consume(ch)\n\t\n\tWalk(t1, ch)\n\tWalk(t2, ch)\n\t\n\n\tfor k, _ := range elemMap {\n\t\tfmt.Printf(\"map %v\\n\", k)\n\t}\n\treturn len(elemMap) == 0\n}", "title": "" }, { "docid": "dccad5a226b779b7463a8b60ae7f68a4", "score": "0.5530711", "text": "func TestSymmetry(t *testing.T) {\n\tmatch := 0\n\tcount := 0\n\tfor v := uint64(0); v < 1<<14; v++ {\n\t\tf64 := FromF14(v)\n\t\tf14 := ToF14(f64)\n\t\t//fmt.Printf(\"%5v\\n\",f14)\n\t\tif v == f14 {\n\t\t\tmatch++\n\t\t} else {\n\t\t\tt.Errorf(\"asymmetric pair: %5d (0x%04x) => %v => %v (0x%04x)\", v, v, f64, f14, f14)\n\t\t}\n\t\tcount++\n\t}\n\t//fmt.Printf(\"count = %d\\n\",count)\n\n\tif match != count {\n\t\tt.Errorf(\"total: %d/%d (%.4f%%) match, should be 100%% \", match, count, 100.0*float64(match)/float64(count))\n\t}\n}", "title": "" }, { "docid": "8a5b422ab7ad1bc8335cbacee5e44123", "score": "0.551577", "text": "func (a *Assertions) NotSame(expected interface{}, actual interface{}, msgAndArgs ...interface{}) bool {\n\tif h, ok := a.t.(tHelper); ok {\n\t\th.Helper()\n\t}\n\treturn NotSame(a.t, expected, actual, msgAndArgs...)\n}", "title": "" }, { "docid": "82410a29899bb303f844a46d2516a65a", "score": "0.5499463", "text": "func (s *NFSStoreSpec) Differs(expected resource.Item, observed resource.Item) bool {\n\treturn differs(expected, observed)\n}", "title": "" }, { "docid": "977ce5cb7c2511f837a54b2dafe5f194", "score": "0.54960376", "text": "func (r *AirflowCluster) Differs(expected metav1.Object, observed metav1.Object) bool {\n\treturn true\n}", "title": "" }, { "docid": "047fbb00ff4d7be2a976080040efc0df", "score": "0.5494731", "text": "func compareSeries(seriesGenerated []int, expectedSeries []int) bool{\n\tfor count:=0; count< len(seriesGenerated); count++ {\n\t\t if seriesGenerated[count] != expectedSeries[count] {\n\t\t return false\n\t\t }\n\t}\n\treturn true\n}", "title": "" }, { "docid": "aa21e05ee440d5f398f648bde0da9a52", "score": "0.54849696", "text": "func Difference(s1, s2 Set) Set {\n\tif s1.IsEmpty() {\n\t\treturn s1\n\t}\n\ts3 := New()\n\tfor m := range s1 {\n\t\tif s2[m] == false {\n\t\t\ts3[m] = true\n\t\t}\n\t}\n\t/*\n\tfor m := range s2 {\n\t\tif s1[m] == false {\n\t\t\ts3[m] = true\n\t\t}\n\t}\n\t*/\n\treturn s3\n}", "title": "" }, { "docid": "e0f62e62117491c2b418d777ddd3c072", "score": "0.5483618", "text": "func TestSignatureIsEqual(t *testing.T) {\n\tsig1 := &Signature{\n\t\tr: *new(ModNScalar).SetHex(\"82235e21a2300022738dabb8e1bbd9d19cfb1e7ab8c30a23b0afbb8d178abcf3\"),\n\t\ts: *new(ModNScalar).SetHex(\"24bf68e256c534ddfaf966bf908deb944305596f7bdcc38d69acad7f9c868724\"),\n\t}\n\tsig1Copy := &Signature{\n\t\tr: *new(ModNScalar).SetHex(\"82235e21a2300022738dabb8e1bbd9d19cfb1e7ab8c30a23b0afbb8d178abcf3\"),\n\t\ts: *new(ModNScalar).SetHex(\"24bf68e256c534ddfaf966bf908deb944305596f7bdcc38d69acad7f9c868724\"),\n\t}\n\tsig2 := &Signature{\n\t\tr: *new(ModNScalar).SetHex(\"4e45e16932b8af514961a1d3a1a25fdf3f4f7732e9d624c6c61548ab5fb8cd41\"),\n\t\ts: *new(ModNScalar).SetHex(\"181522ec8eca07de4860a4acdd12909d831cc56cbbac4622082221a8768d1d09\"),\n\t}\n\n\tif !sig1.IsEqual(sig1) {\n\t\tt.Fatalf(\"bad self signature equality check: %v == %v\", sig1, sig1Copy)\n\t}\n\tif !sig1.IsEqual(sig1Copy) {\n\t\tt.Fatalf(\"bad signature equality check: %v == %v\", sig1, sig1Copy)\n\t}\n\n\tif sig1.IsEqual(sig2) {\n\t\tt.Fatalf(\"bad signature equality check: %v != %v\", sig1, sig2)\n\t}\n}", "title": "" }, { "docid": "b1719a75132b847c6129c700c21d5224", "score": "0.5482576", "text": "func TestHand_Compare_Same(t *testing.T) {\n\tours := &Hand{}\n\ttheirs := &Hand{}\n\n\tours.Hit(NewCard(Eight, Spades))\n\tours.Hit(NewCard(Ten, Spades))\n\n\ttheirs.Hit(NewCard(Eight, Diamonds))\n\ttheirs.Hit(NewCard(Ten, Diamonds))\n\n\tassert.Equal(t, big.NewFloat(1), ours.WinFactor(theirs))\n\tassert.Equal(t, big.NewFloat(1), theirs.WinFactor(ours))\n}", "title": "" }, { "docid": "a7371510de12a7b72731fd1dd91ddc89", "score": "0.5478722", "text": "func (c OngoingNotification) IsSame(other OngoingNotification) bool {\n\treturn capnp.Client(c).IsSame(capnp.Client(other))\n}", "title": "" }, { "docid": "dc0e427834daf16218bd51f9924afd62", "score": "0.5478546", "text": "func (f *Flattened) sameTransaction(o *Flattened) bool {\n\tif f.SrcFile != o.SrcFile {\n\t\treturn false\n\t}\n\tif f.BegLine != o.BegLine {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "e788531378c2c5d70f0e982705a07d46", "score": "0.54762894", "text": "func SameFile(f1, f2 os.FileInfo) bool {\n\t// We assume that if a file changes modtime then the contents have\n\t// changed, even though they might not have. A more complete check\n\t// would actually look at the contents if the files have the same\n\t// size but different mod times. This would require keeping a hash\n\t// of every file we know about.\n\treturn f1.Size() == f2.Size() && f1.ModTime() == f2.ModTime()\n}", "title": "" }, { "docid": "cf50869ca0d53783fa9eb85ac4fe5351", "score": "0.5466725", "text": "func (a *Assertions) Same(expected interface{}, actual interface{}, msgAndArgs ...interface{}) bool {\n\tif h, ok := a.t.(tHelper); ok {\n\t\th.Helper()\n\t}\n\treturn Same(a.t, expected, actual, msgAndArgs...)\n}", "title": "" }, { "docid": "1c7b22446f5973a7075e52ed393fdd85", "score": "0.5464155", "text": "func (c Conmon) IsSame(other Conmon) bool {\n\treturn capnp.Client(c).IsSame(capnp.Client(other))\n}", "title": "" }, { "docid": "3fce6858dda2a875438343cf7d3f2b12", "score": "0.5454846", "text": "func different(c1, c2 [32]uint8) int {\n\tn := 0\n\tfor i := range c1 {\n\t\tfor b := c1[i] ^ c2[i]; b != 0; b &= (b - 1) {\n\t\t\tn++\n\t\t}\n\t}\n\treturn n\n}", "title": "" }, { "docid": "0311dd044499f3faccecf81cea688aec", "score": "0.5451796", "text": "func (s *FileStat) sameFile(other *FileStat) bool {\n\treturn s.Sys.Dev == other.Sys.Dev && s.Sys.Ino == other.Sys.Ino\n}", "title": "" }, { "docid": "6d52aceb1b8dda7e07a16bee94a736da", "score": "0.54444414", "text": "func HasSameSignature(a []ValueType, b []ValueType) bool {\n\tif len(a) != len(b) {\n\t\treturn false\n\t}\n\n\tfor i := range a {\n\t\tif a[i] != b[i] {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "820c75a1a713bbef876b88303627134c", "score": "0.54439944", "text": "func (r *AirflowBase) Differs(expected metav1.Object, observed metav1.Object) bool {\n\treturn true\n}", "title": "" }, { "docid": "2efbbc5436d04af556073a7e4d6b4932", "score": "0.5443958", "text": "func Same(t1, t2 *Tree) bool{\n\tt1ch :=make(chan int)\n\tt2ch :=make(chan int)\n\tgo Walk(t1,t1ch)\n\tgo Walk(t2,t2ch)\n\tfor i:=0; i<10;i++{\n\t\ta,o1 := <-t1ch\n\t\tb,o2 := <-t2ch\n\t\tif (o1 == true && o2 == false ) || (o1== false && o2 == true){\n\t\t\tfmt.Printf(\"one tree finished \\n\")\n\t\t\treturn false\n\t\t}\n\t\tfmt.Printf(\"numbers are %v -- %v \\n\", a,b)\n\t\tif a != b{\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "7a3a4f9102e58467817864cf5ecf68ce", "score": "0.54412526", "text": "func Same(t1, t2 *tree.Tree) bool {\n\n\tch1 := make(chan uint32)\n\twg.Add(1)\n\n\tgo walk(t1, &ch1, 0, \"ROOT\")\n\n\tgo func(wg *sync.WaitGroup, c chan uint32) {\n\t\twg.Wait()\n\t\tclose(c)\n\t}(&wg, ch1)\n\n\tvar treeHash1 uint32 = 0\n\n\tfor i := range ch1 {\n\t\ttreeHash1 += i\n\t}\n\n\tch2 := make(chan uint32)\n\twg.Add(1)\n\tgo walk(t2, &ch2, 0, \"ROOT\")\n\n\tgo func(wg *sync.WaitGroup, c chan uint32) {\n\t\twg.Wait()\n\t\tclose(c)\n\t}(&wg, ch2)\n\n\tvar treeHash2 uint32 = 0\n\tfor i := range ch2 {\n\t\ttreeHash2 += i\n\t}\n\n\tif treeHash1 != treeHash2 {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "d02b8e9bae089fab5054f0db49fd4a11", "score": "0.54375213", "text": "func isDegenerate(a, b, c float64) bool {\n\treturn a+b == c || a+c == b || b+c == a\n}", "title": "" }, { "docid": "809a43135e76228f49e4806ff79fe779", "score": "0.5434353", "text": "func isSameLength(arr1 []int, arr2 []int) bool {\n\tif len(arr1) == len(arr2) {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "37e85620131810e10afdc5dcb064d452", "score": "0.54197216", "text": "func (this Float64) Equals(other Float64) bool {\n\treturn (this.IsNull && other.IsNull) ||\n\t\t(this.IsNull == other.IsNull && this.Value == other.Value)\n}", "title": "" }, { "docid": "872075fc2eb4ee064783e1dd3f6a2e28", "score": "0.54184204", "text": "func (row Row) SameAs(row2 Row) bool {\n\tif len(row) != len(row2) {\n\t\treturn false\n\t}\n\tfor i := range row {\n\t\tif (row[i].Off == 0) != (row2[i].Off == 0) {\n\t\t\treturn false\n\t\t}\n\t\tif row[i].Off == 0 {\n\t\t\tif row[i].Record != row2[i].Record {\n\t\t\t\treturn false\n\t\t\t}\n\t\t} else {\n\t\t\tif row[i].Off != row2[i].Off {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "372f71a29fba1c911c56ce84ebad06c3", "score": "0.54172176", "text": "func SameInfinity(a, b float64) bool {\n\treturn (math.IsInf(a, 1) && math.IsInf(b, 1)) || (math.IsInf(a, -1) && math.IsInf(b, -1))\n}", "title": "" }, { "docid": "89e7f2ca53db672e6fb120d6d89f3307", "score": "0.54138917", "text": "func ShouldHaveSameElementsDiff(actual interface{}, expected ...interface{}) (message string) {\n\tif message = need(1, expected); message != success {\n\t\treturn\n\t}\n\treturn ShouldHaveSameElementsFunc(actual, expected[0], diffEqual)\n}", "title": "" }, { "docid": "7666636b65a4e558c65aa2c5724ef05d", "score": "0.540489", "text": "func Equals(a, b float64) bool {\n\treturn BothNaN(a, b) || SameInfinity(a, b) || ((a-b) < Epsilon && (b-a) < Epsilon)\n}", "title": "" }, { "docid": "4ad531a65da0a002301e09d325ceb5b9", "score": "0.539886", "text": "func (self *ActionModule) SameBits(am *ActionModule) bool {\n if (self == am) { return true }\n for i := 0; i < 4; i++ {\n if (self.bits[i] != am.bits[i]) {\n return false\n }\n }\n return true\n}", "title": "" }, { "docid": "c70388c44df0afc3529968888669d96f", "score": "0.5375963", "text": "func Same(t1, t2 *tree.Tree) bool {\n\tch1 := make(chan int)\nch2 := make(chan int)\ngo Walk(t1, ch1)\ngo Walk(t2, ch2)\n for {\n\tv1,ok1 := <-ch1\nv2,ok2 := <-ch2\n if !ok1 && !ok2 {\n break // no more nodes in trees\n}\nif ok1 != ok2 {\n\t // trees with different sizes\n\t return false\n}\nif v2 != v1 {\n return false\n}\n}\nreturn true\n}", "title": "" } ]
ccf3224018143d65489d955b81a64def
Allows this construct to emit artifacts into the cloud assembly during synthesis. This method is usually implemented by frameworklevel constructs such as `Stack` and `Asset` as they participate in synthesizing the cloud assembly. Experimental.
[ { "docid": "584e8614d2f221846233d29d26cc1b39", "score": "0.0", "text": "func (c *jsiiProxy_CfnVpcLink) Synthesize(session awscdk.ISynthesisSession) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"synthesize\",\n\t\t[]interface{}{session},\n\t)\n}", "title": "" } ]
[ { "docid": "ef136b73f00ecf5c61b3b4af224d180b", "score": "0.5889965", "text": "func (md *ManufacturingDirector) Construct() {\n\tmd.builder.SetWheels().SetSeats().SetStructure()\n}", "title": "" }, { "docid": "92d7e38272827ab689280c70f420bacc", "score": "0.58114433", "text": "func (f *ManufacturingDirector) Construct() {\n\tf.builder.SetSeats().SetStructure().SetWheels()\n}", "title": "" }, { "docid": "73ac2d9c499b4bc1b3ea42836a47305c", "score": "0.5744092", "text": "func (f *ManufactiringDirector) Construct() {\n\tf.builder.SetSeats().SetStructure().SetWheels()\n}", "title": "" }, { "docid": "fd743e260bb0d808dce3ce0b8d1d32d2", "score": "0.50671625", "text": "func (a *Assembler) Assemble(packet gopacket.Packet, src string) {\n\t//go func() { a.input <- packet }() // TODO: evaluate if this (go...) is a good idea or if it should block\n\ta.input <- packetWithSrc{packet, src}\n}", "title": "" }, { "docid": "fa9ba9df5a127925c77e5a0921cbc734", "score": "0.49247873", "text": "func (p PushMessageContentAudio) construct() PushMessageContentClass { return &p }", "title": "" }, { "docid": "57c658dd848c7c0cb7bd43f60f5e933f", "score": "0.49076706", "text": "func (t *TargetGen) Output(outputFormat int) {\r\n utils.DEBUG(\"TargetGen.Output\")\r\n\r\n fileEnding := \".asm\"\r\n outputVgm := false\r\n if outputFormat == OUTPUT_VGM {\r\n fileEnding = \".vgm\"\r\n outputVgm = true\r\n } else if outputFormat == OUTPUT_VGZ {\r\n fileEnding = \".vgz\"\r\n outputVgm = true\r\n }\r\n\r\n if outputVgm {\r\n // ToDo: output VGM/VGZ\r\n return\r\n }\r\n \r\n outFile, err := os.Create(t.CompilerItf.GetShortFileName() + fileEnding)\r\n if err != nil {\r\n utils.ERROR(\"Unable to open file: \" + t.CompilerItf.GetShortFileName() + fileEnding)\r\n }\r\n\r\n now := time.Now()\r\n outFile.WriteString(\"; Written by XPMC on \" + now.Format(time.RFC1123) + \"\\n\\n\")\r\n \r\n // Convert ADSR envelopes to the format used by the YM2612\r\n envelopes := make([][]interface{}, len(effects.ADSRs.GetKeys()))\r\n for i, key := range effects.ADSRs.GetKeys() {\r\n envelopes[i] = packADSR(effects.ADSRs.GetData(key).MainPart, specs.CHIP_YM2612)\r\n effects.ADSRs.GetData(key).MainPart = make([]interface{}, len(envelopes[i]))\r\n copy(effects.ADSRs.GetData(key).MainPart, envelopes[i])\r\n }\r\n\r\n // Convert modulation parameters to the format used by the YM2612\r\n mods := make([][]interface{}, len(effects.MODs.GetKeys()))\r\n for i, key := range effects.MODs.GetKeys() {\r\n mods[i] = packMOD(effects.MODs.GetData(key).MainPart, specs.CHIP_YM2612)\r\n effects.MODs.GetData(key).MainPart = make([]interface{}, len(mods[i]))\r\n copy(effects.MODs.GetData(key).MainPart, mods[i])\r\n } \r\n \r\n \r\n /* ToDo: translate\r\n for i = 1 to length(feedbackMacros[1]) do\r\n feedbackMacros[ASSOC_DATA][i][LIST_MAIN] = (feedbackMacros[ASSOC_DATA][i][LIST_MAIN])*8\r\n feedbackMacros[ASSOC_DATA][i][LIST_LOOP] = (feedbackMacros[ASSOC_DATA][i][LIST_LOOP])*8\r\n end for*/\r\n \r\n /*numSongs = 0\r\n for i = 1 to length(songs) do\r\n if sequence(songs[i]) then\r\n numSongs += 1\r\n end if\r\n end for*/\r\n \r\n if timing.UpdateFreq == 50 {\r\n outFile.WriteString(\".equ XPMP_50_HZ, 1\\n\")\r\n t.MachineSpeed = 3546893\r\n } else {\r\n t.MachineSpeed = 3579545\r\n }\r\n\r\n tableSize := t.outputStandardEffects(outFile)\r\n tableSize += t.outputTable(outFile, \"xpmp_FB_mac\", effects.FeedbackMacros, true, 1, 0x80)\r\n tableSize += t.outputTable(outFile, \"xpmp_ADSR\", effects.ADSRs, false, 1, 0) \r\n tableSize += t.outputTable(outFile, \"xpmp_MOD\", effects.MODs, false, 1, 0) \r\n \r\n /*tableSize += output_m68kas_table(\"xpmp_VS_mac\", volumeSlides, 1, 1, 0) \r\n tableSize += output_m68kas_table(\"xpmp_FB_mac\", feedbackMacros,1, 1, 0)\r\n tableSize += output_m68kas_table(\"xpmp_ADSR\", adsrs, 0, 1, 0)\r\n tableSize += output_m68kas_table(\"xpmp_MOD\", mods, 0, 1, 0)*/\r\n\r\n cbSize := 0\r\n \r\n utils.INFO(\"Size of effect tables: %d bytes\\n\", tableSize)\r\n\r\n patSize := t.outputPatterns(outFile)\r\n utils.INFO(\"Size of patterns table: %d bytes\\n\", patSize)\r\n \r\n songSize := t.outputChannelData(outFile) \r\n\r\n utils.INFO(\"Total size of song(s): %d bytes\\n\", songSize + patSize + tableSize + cbSize)\r\n\r\n outFile.Close()\r\n}", "title": "" }, { "docid": "0869f76beaa98565b699fd32f7c02e92", "score": "0.48805332", "text": "func (g *Generator) Execute(output kio.Writer) error {\n\tscenario, err := application.GetScenario(&g.Application, g.Scenario)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tobjective, err := application.GetObjective(&g.Application, g.Objective)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Compute the effective scenario, objective, and experiment names\n\tscenarioName, objectiveName, experimentName := \"\", \"\", g.ExperimentName\n\tif scenario != nil {\n\t\tscenarioName = scenario.Name\n\t}\n\tif objective != nil {\n\t\tobjectiveName = objective.Name\n\t}\n\tif experimentName == \"\" {\n\t\texperimentName = application.ExperimentName(&g.Application, scenarioName, objectiveName)\n\t}\n\n\treturn kio.Pipeline{\n\t\tContinueOnEmptyResult: true,\n\t\tInputs: []kio.Reader{\n\t\t\t// Read the resource from the application\n\t\t\tg.Application.Resources,\n\t\t},\n\t\tFilters: []kio.Filter{\n\t\t\t// Expand resource references using Konjure\n\t\t\tg.FilterOptions.NewFilter(application.WorkingDirectory(&g.Application)),\n\n\t\t\t// Scan the resources and transform them into an experiment (and it's supporting resources)\n\t\t\t&scan.Scanner{\n\t\t\t\tTransformer: &generation.Transformer{\n\t\t\t\t\tIncludeApplicationResources: g.IncludeApplicationResources,\n\t\t\t\t},\n\t\t\t\tSelectors: append(g.selectors(),\n\t\t\t\t\t&generation.ApplicationSelector{\n\t\t\t\t\t\tApplication: &g.Application,\n\t\t\t\t\t\tScenario: scenario,\n\t\t\t\t\t\tObjective: objective,\n\t\t\t\t\t}),\n\t\t\t},\n\n\t\t\t// Label the generated resources\n\t\t\tkio.FilterAll(yaml.SetLabel(redskyappsv1alpha1.LabelApplication, g.Application.Name)),\n\t\t\tkio.FilterAll(generation.SetNamespace(g.Application.Namespace)),\n\t\t\tkio.FilterAll(generation.SetExperimentName(experimentName)),\n\t\t\tkio.FilterAll(generation.SetExperimentLabel(redskyappsv1alpha1.LabelApplication, g.Application.Name)),\n\t\t\tkio.FilterAll(generation.SetExperimentLabel(redskyappsv1alpha1.LabelScenario, scenarioName)),\n\t\t\tkio.FilterAll(generation.SetExperimentLabel(redskyappsv1alpha1.LabelObjective, objectiveName)),\n\n\t\t\t// Apply Kubernetes formatting conventions and clean up the objects\n\t\t\t&filters.FormatFilter{UseSchema: true},\n\t\t\tkio.FilterAll(yaml.ClearAnnotation(filters.FmtAnnotation)),\n\t\t\tkio.FilterAll(yaml.Clear(\"status\")),\n\t\t},\n\t\tOutputs: []kio.Writer{\n\t\t\t// Validate the resulting resources before sending them to the supplier writer\n\t\t\tkio.WriterFunc(g.validate),\n\t\t\toutput,\n\t\t},\n\t}.Execute()\n}", "title": "" }, { "docid": "da12a7c3784531ee96d2f11b76f97a61", "score": "0.4786363", "text": "func (b *Builder) Build(ctx context.Context, out io.Writer, artifact *latest.Artifact) build.ArtifactBuilder {\n\tinstrumentation.AddAttributesToCurrentSpanFromContext(ctx, map[string]string{\n\t\t\"BuildType\": \"gcb\",\n\t\t\"Context\": instrumentation.PII(artifact.Workspace),\n\t})\n\tbuilder := build.WithLogFile(b.buildArtifactWithCloudBuild, b.muted)\n\treturn builder\n}", "title": "" }, { "docid": "9b8071abe0484170f53f03ec784eb21e", "score": "0.4781748", "text": "func (p PushMessageContentAnimation) construct() PushMessageContentClass { return &p }", "title": "" }, { "docid": "063816e93a02f9af102496dc4d0405c4", "score": "0.46887437", "text": "func (vm *VM) Initialize(\n\tctx *snow.Context,\n\tdb database.Database,\n\tgenesisBytes []byte,\n\ttoEngine chan<- common.Message,\n\tfxs []*common.Fx,\n) error {\n\tvm.ctx = ctx\n\tvm.toEngine = toEngine\n\tvm.baseDB = db\n\tvm.db = versiondb.New(db)\n\tvm.typeToFxIndex = map[reflect.Type]int{}\n\tvm.Aliaser.Initialize()\n\n\tvm.pubsub = cjson.NewPubSubServer(ctx)\n\tc := codec.NewDefault()\n\n\terrs := wrappers.Errs{}\n\terrs.Add(\n\t\tvm.metrics.Initialize(ctx.Namespace, ctx.Metrics),\n\n\t\tvm.pubsub.Register(\"accepted\"),\n\t\tvm.pubsub.Register(\"rejected\"),\n\t\tvm.pubsub.Register(\"verified\"),\n\n\t\tc.RegisterType(&BaseTx{}),\n\t\tc.RegisterType(&CreateAssetTx{}),\n\t\tc.RegisterType(&OperationTx{}),\n\t\tc.RegisterType(&ImportTx{}),\n\t\tc.RegisterType(&ExportTx{}),\n\t)\n\tif errs.Errored() {\n\t\treturn errs.Err\n\t}\n\n\tvm.fxs = make([]*parsedFx, len(fxs))\n\tfor i, fxContainer := range fxs {\n\t\tif fxContainer == nil {\n\t\t\treturn errIncompatibleFx\n\t\t}\n\t\tfx, ok := fxContainer.Fx.(Fx)\n\t\tif !ok {\n\t\t\treturn errIncompatibleFx\n\t\t}\n\t\tvm.fxs[i] = &parsedFx{\n\t\t\tID: fxContainer.ID,\n\t\t\tFx: fx,\n\t\t}\n\t\tvm.codec = &codecRegistry{\n\t\t\tCodec: c,\n\t\t\tindex: i,\n\t\t\ttypeToFxIndex: vm.typeToFxIndex,\n\t\t}\n\t\tif err := fx.Initialize(vm); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tvm.codec = c\n\n\tvm.state = &prefixedState{\n\t\tstate: &state{State: avax.State{\n\t\t\tCache: &cache.LRU{Size: stateCacheSize},\n\t\t\tDB: vm.db,\n\t\t\tCodec: vm.codec,\n\t\t}},\n\n\t\ttx: &cache.LRU{Size: idCacheSize},\n\t\tutxo: &cache.LRU{Size: idCacheSize},\n\t\ttxStatus: &cache.LRU{Size: idCacheSize},\n\n\t\tuniqueTx: &cache.EvictableLRU{Size: txCacheSize},\n\t}\n\n\tif err := vm.initAliases(genesisBytes); err != nil {\n\t\treturn err\n\t}\n\n\tif dbStatus, err := vm.state.DBInitialized(); err != nil || dbStatus == choices.Unknown {\n\t\tif err := vm.initState(genesisBytes); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tvm.timer = timer.NewTimer(func() {\n\t\tctx.Lock.Lock()\n\t\tdefer ctx.Lock.Unlock()\n\n\t\tvm.FlushTxs()\n\t})\n\tgo ctx.Log.RecoverAndPanic(vm.timer.Dispatch)\n\tvm.batchTimeout = batchTimeout\n\n\treturn vm.db.Commit()\n}", "title": "" }, { "docid": "23776f7939497a44e04073bed94bec25", "score": "0.46685708", "text": "func (builder *Layered) Build(config *api.Config) (*api.Result, error) {\n\tbuildResult := &api.Result{}\n\n\tif config.HasOnBuild && config.BlockOnBuild {\n\t\tbuildResult.BuildInfo.FailureReason = utilstatus.NewFailureReason(utilstatus.ReasonOnBuildForbidden, utilstatus.ReasonMessageOnBuildForbidden)\n\t\treturn buildResult, fmt.Errorf(\"builder image uses ONBUILD instructions but ONBUILD is not allowed\")\n\t}\n\n\tif config.BuilderImage == \"\" {\n\t\tbuildResult.BuildInfo.FailureReason = utilstatus.NewFailureReason(utilstatus.ReasonGenericS2IBuildFailed, utilstatus.ReasonMessageGenericS2iBuildFailed)\n\t\treturn buildResult, fmt.Errorf(\"builder image name cannot be empty\")\n\t}\n\n\tif err := builder.CreateDockerfile(config); err != nil {\n\t\tbuildResult.BuildInfo.FailureReason = utilstatus.NewFailureReason(utilstatus.ReasonDockerfileCreateFailed, utilstatus.ReasonMessageDockerfileCreateFailed)\n\t\treturn buildResult, err\n\t}\n\n\tglog.V(2).Info(\"Creating application source code image\")\n\ttarStream, err := builder.SourceTar(config)\n\tif err != nil {\n\t\tbuildResult.BuildInfo.FailureReason = utilstatus.NewFailureReason(utilstatus.ReasonTarSourceFailed, utilstatus.ReasonMessageTarSourceFailed)\n\t\treturn buildResult, err\n\t}\n\tdefer tarStream.Close()\n\n\tnewBuilderImage := fmt.Sprintf(\"s2i-layered-temp-image-%d\", time.Now().UnixNano())\n\n\toutReader, outWriter := io.Pipe()\n\tdefer outReader.Close()\n\tdefer outWriter.Close()\n\topts := docker.BuildImageOptions{\n\t\tName: newBuilderImage,\n\t\tStdin: tarStream,\n\t\tStdout: outWriter,\n\t\tCGroupLimits: config.CGroupLimits,\n\t}\n\t// goroutine to stream container's output\n\tgo func(reader io.Reader) {\n\t\tscanner := bufio.NewReader(reader)\n\t\tfor {\n\t\t\ttext, err := scanner.ReadString('\\n')\n\t\t\tif err != nil {\n\t\t\t\t// we're ignoring ErrClosedPipe, as this is information\n\t\t\t\t// the docker container ended streaming logs\n\t\t\t\tif glog.Is(2) && err != io.ErrClosedPipe && err != io.EOF {\n\t\t\t\t\tglog.Errorf(\"Error reading docker stdout, %v\", err)\n\t\t\t\t}\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tglog.V(2).Info(text)\n\t\t}\n\t}(outReader)\n\n\tglog.V(2).Infof(\"Building new image %s with scripts and sources already inside\", newBuilderImage)\n\tif err = builder.docker.BuildImage(opts); err != nil {\n\t\tbuildResult.BuildInfo.FailureReason = utilstatus.NewFailureReason(utilstatus.ReasonDockerImageBuildFailed, utilstatus.ReasonMessageDockerImageBuildFailed)\n\t\treturn buildResult, err\n\t}\n\n\t// upon successful build we need to modify current config\n\tbuilder.config.LayeredBuild = true\n\t// new image name\n\tbuilder.config.BuilderImage = newBuilderImage\n\t// see CreateDockerfile, conditional copy, location of scripts\n\tscriptsIncluded := checkValidDirWithContents(path.Join(config.WorkingDir, api.UploadScripts))\n\tglog.V(2).Infof(\"Scripts dir has contents %v\", scriptsIncluded)\n\tif scriptsIncluded {\n\t\tbuilder.config.ScriptsURL = \"image://\" + path.Join(getDestination(config), \"scripts\")\n\t} else {\n\t\tbuilder.config.ScriptsURL, err = builder.docker.GetScriptsURL(newBuilderImage)\n\t\tif err != nil {\n\t\t\tbuildResult.BuildInfo.FailureReason = utilstatus.NewFailureReason(utilstatus.ReasonGenericS2IBuildFailed, utilstatus.ReasonMessageGenericS2iBuildFailed)\n\t\t\treturn buildResult, err\n\t\t}\n\t}\n\n\tglog.V(2).Infof(\"Building %s using sti-enabled image\", builder.config.Tag)\n\tif err := builder.scripts.Execute(api.Assemble, config.AssembleUser, builder.config); err != nil {\n\t\tbuildResult.BuildInfo.FailureReason = utilstatus.NewFailureReason(utilstatus.ReasonAssembleFailed, utilstatus.ReasonMessageAssembleFailed)\n\t\tswitch e := err.(type) {\n\t\tcase errors.ContainerError:\n\t\t\treturn buildResult, errors.NewAssembleError(builder.config.Tag, e.Output, e)\n\t\tdefault:\n\t\t\treturn buildResult, err\n\t\t}\n\t}\n\tbuildResult.Success = true\n\n\treturn buildResult, nil\n}", "title": "" }, { "docid": "8a89243bf27be81bf5b21a30d1356878", "score": "0.4657004", "text": "func (i InputMediaGeoLive) construct() InputMediaClass { return &i }", "title": "" }, { "docid": "ac03ee5b6e6c365f688241bc107e430a", "score": "0.46558803", "text": "func (rb *ResourceBuilder) Emit() pcommon.Resource {\n\tr := rb.res\n\trb.res = pcommon.NewResource()\n\treturn r\n}", "title": "" }, { "docid": "bfa0476b40e7af1317684903e0725798", "score": "0.46368265", "text": "func Construct(i Invariable) {\n\ti.Invariant(assertInvariantConstruct)\n}", "title": "" }, { "docid": "82c6638108deab2713bc83b38f558a4c", "score": "0.4618056", "text": "func Artifact(es *job.ExecutorSession) {\n\tes.AddCoreFactory(v1alpha1.SignalTypeArtifact, &factory{})\n}", "title": "" }, { "docid": "1ffe59362395c569f7ad48d47b650ea5", "score": "0.4609331", "text": "func (reg *Registry) Define(xpubs []chainkd.XPub, quorum int, definition map[string]interface{}, limitHeight int64, alias string, issuanceProgram chainjson.HexBytes) (*Asset, error) {\n\tvar err error\n\tvar assetSigner *signers.Signer\n\n\talias = strings.ToUpper(strings.TrimSpace(alias))\n\tif alias == \"\" {\n\t\treturn nil, errors.Wrap(ErrNullAlias)\n\t}\n\n\tif alias == consensus.BTMAlias {\n\t\treturn nil, ErrInternalAsset\n\t}\n\n\trawDefinition, err := serializeAssetDef(definition)\n\tif err != nil {\n\t\treturn nil, ErrSerializing\n\t}\n\n\tvmver := uint64(1)\n\tif len(issuanceProgram) == 0 {\n\t\tif len(xpubs) == 0 {\n\t\t\treturn nil, errors.Wrap(signers.ErrNoXPubs)\n\t\t}\n\n\t\tnextAssetIndex := reg.getNextAssetIndex()\n\t\tassetSigner, err = signers.Create(\"asset\", xpubs, quorum, nextAssetIndex, signers.BIP0032)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tpath := signers.GetBip0032Path(assetSigner, signers.AssetKeySpace)\n\t\tderivedXPubs := chainkd.DeriveXPubs(assetSigner.XPubs, path)\n\t\tderivedPKs := chainkd.XPubKeys(derivedXPubs)\n\t\tissuanceProgram, vmver, err = multisigIssuanceProgram(derivedPKs, assetSigner.Quorum, limitHeight)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tdefHash := bc.NewHash(sha3.Sum256(rawDefinition))\n\ta := &Asset{\n\t\tDefinitionMap: definition,\n\t\tRawDefinitionByte: rawDefinition,\n\t\tVMVersion: vmver,\n\t\tIssuanceProgram: issuanceProgram,\n\t\tAssetID: bc.ComputeAssetID(issuanceProgram, vmver, &defHash),\n\t\tSigner: assetSigner,\n\t\tAlias: &alias,\n\t}\n\treturn a, reg.SaveAsset(a, alias)\n}", "title": "" }, { "docid": "240292d2db357872bcd8d2e730f195e2", "score": "0.46032628", "text": "func (c *Container) Compile() {\n\t// provide extractor\n\tc.Provide(ProvideParams{\n\t\tProvider: func() Extractor {\n\t\t\treturn c\n\t\t},\n\t})\n\tc.Provide(ProvideParams{\n\t\tProvider: func() *Graph {\n\t\t\treturn &Graph{graph: c.graph.DOTGraph()}\n\t\t},\n\t})\n\tfor _, p := range c.all() {\n\t\tc.registerProviderParameters(p)\n\t}\n\t_, err := c.graph.DFSSort()\n\tif err != nil {\n\t\tswitch err {\n\t\tcase dag.ErrCyclicGraph:\n\t\t\tpanicf(\"Cycle detected\") // todo: add nodes to message\n\t\tdefault:\n\t\t\tpanic(err.Error())\n\t\t}\n\t}\n\tc.compiled = true\n}", "title": "" }, { "docid": "7b63c781fc40e174f076e773c87f13bb", "score": "0.45752743", "text": "func (i InputMediaDocumentExternal) construct() InputMediaClass { return &i }", "title": "" }, { "docid": "3910354e05e334d07e30436b0e1a0787", "score": "0.4558222", "text": "func (b *BuilderMux) Build(ctx context.Context, out io.Writer, tags tag.ImageTags, resolver platform.Resolver, artifacts []*latest.Artifact) ([]graph.Artifact, error) {\n\tm := make(map[PipelineBuilder]bool)\n\tfor _, a := range artifacts {\n\t\tm[b.byImageName[a.ImageName]] = true\n\t}\n\n\tfor builder := range m {\n\t\tif err := builder.PreBuild(ctx, out); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tbuilderF := func(ctx context.Context, out io.Writer, artifact *latest.Artifact, tag string, platforms platform.Matcher) (string, error) {\n\t\tp := b.byImageName[artifact.ImageName]\n\t\tpl, err := filterBuildEnvSupportedPlatforms(p.SupportedPlatforms(), platforms)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tplatforms = pl\n\n\t\tartifactBuilder := p.Build(ctx, out, artifact)\n\t\thooksOpts, err := hooks.NewBuildEnvOpts(artifact, tag, p.PushImages())\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tr := hooks.BuildRunner(artifact.LifecycleHooks, hooksOpts)\n\t\tif err = r.RunPreHooks(ctx, out); err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tvar built string\n\n\t\tif platforms.IsMultiPlatform() && !SupportsMultiPlatformBuild(*artifact) {\n\t\t\tbuilt, err = CreateMultiPlatformImage(ctx, out, artifact, tag, platforms, artifactBuilder)\n\t\t} else {\n\t\t\tbuilt, err = artifactBuilder(ctx, out, artifact, tag, platforms)\n\t\t}\n\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\n\t\tif err := b.cache.AddArtifact(ctx, graph.Artifact{\n\t\t\tImageName: artifact.ImageName,\n\t\t\tTag: built,\n\t\t\tRuntimeType: artifact.RuntimeType,\n\t\t}); err != nil {\n\t\t\tlog.Entry(ctx).Warnf(\"error adding artifact to cache; caching may not work as expected: %v\", err)\n\t\t}\n\n\t\tif err = r.RunPostHooks(ctx, out); err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\n\t\treturn built, nil\n\t}\n\n\terr := checkMultiplatformHaveRegistry(b, artifacts, resolver)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"%w\", err) // TODO: remove error wrapping after fixing #7790\n\t}\n\n\tar, err := InOrder(ctx, out, tags, resolver, artifacts, builderF, b.concurrency, b.store)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor builder := range m {\n\t\tif errB := builder.PostBuild(ctx, out); errB != nil {\n\t\t\treturn nil, errB\n\t\t}\n\t}\n\n\treturn ar, nil\n}", "title": "" }, { "docid": "644aa744ee26e2fc01ee7a1dae6b9ae5", "score": "0.4552588", "text": "func (i InputMediaContact) construct() InputMediaClass { return &i }", "title": "" }, { "docid": "772315c980305391353a2a1344003364", "score": "0.45499924", "text": "func (i InputMediaDocument) construct() InputMediaClass { return &i }", "title": "" }, { "docid": "1ea8df8e0cf2177aaedb49c9325f885c", "score": "0.45425686", "text": "func Execute(ctx context.Context, p *beam.Pipeline) (beam.PipelineResult, error) {\n\tif !beam.Initialized() {\n\t\tpanic(\"Beam has not been initialized. Call beam.Init() before pipeline construction.\")\n\t}\n\n\tedges, nodes, err := p.Build()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tstreaming := !graph.Bounded(nodes)\n\n\tbeam.PipelineOptions.LoadOptionsFromFlags(flagFilter)\n\topts, err := getJobOptions(ctx, streaming)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// (1) Build and submit\n\t// NOTE(herohde) 10/8/2018: the last segment of the names must be \"worker\".\n\tid := fmt.Sprintf(\"go-%v-%v\", atomic.AddInt32(&unique, 1), time.Now().UnixNano())\n\n\tmodelURL := gcsx.Join(*stagingLocation, id, \"model\")\n\tworkerURL := gcsx.Join(*stagingLocation, id, \"worker\")\n\txlangURL := gcsx.Join(*stagingLocation, id, \"xlang\")\n\n\tartifactURLs, err := dataflowlib.ResolveXLangArtifacts(ctx, edges, opts.Project, xlangURL)\n\tif err != nil {\n\t\treturn nil, errors.WithContext(err, \"resolving cross-language artifacts\")\n\t}\n\topts.ArtifactURLs = artifactURLs\n\tenvironment, err := graphx.CreateEnvironment(ctx, jobopts.GetEnvironmentUrn(ctx), getContainerImage)\n\tif err != nil {\n\t\treturn nil, errors.WithContext(err, \"creating environment for model pipeline\")\n\t}\n\tmodel, err := graphx.Marshal(edges, &graphx.Options{\n\t\tEnvironment: environment,\n\t\tPipelineResourceHints: jobopts.GetPipelineResourceHints(),\n\t})\n\tif err != nil {\n\t\treturn nil, errors.WithContext(err, \"generating model pipeline\")\n\t}\n\terr = pipelinex.ApplySdkImageOverrides(model, jobopts.GetSdkImageOverrides())\n\tif err != nil {\n\t\treturn nil, errors.WithContext(err, \"applying container image overrides\")\n\t}\n\n\tif *dryRun {\n\t\tlog.Info(ctx, \"Dry-run: not submitting job!\")\n\n\t\tlog.Info(ctx, proto.MarshalTextString(model))\n\t\tjob, err := dataflowlib.Translate(ctx, model, opts, workerURL, modelURL)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdataflowlib.PrintJob(ctx, job)\n\t\treturn nil, nil\n\t}\n\n\treturn dataflowlib.Execute(ctx, model, opts, workerURL, modelURL, *endpoint, *jobopts.Async)\n}", "title": "" }, { "docid": "ad9f1588e1dc2a9ecf8125f85e5319e2", "score": "0.45390868", "text": "func (sc *myScene) Setup(world *ecs.World) {\n\n\t// Input needs to be registered\n\t// engo.Input.RegisterButton(\"AddAnt\", engo.F1)\n\n\tcommon.SetBackground(color.Black)\n\n\t//seconds each round lasts in AntMover\n\tseconds, _ := strconv.ParseFloat(os.Args[4], 32)\n\n\t//Initialize ACO script\n\tacoInstance := aco.AntColonyOptimization{}\n\tantNum, _ := strconv.Atoi(os.Args[1])\n\tmapSize, _ := strconv.Atoi(os.Args[2])\n\titerNum, _ := strconv.Atoi(os.Args[3])\n\n\tfmt.Println(\"STARTING WITH ANTS:\", antNum, \" MAP:\", mapSize, \" ITER:\", iterNum)\n\n\tacoInstance.Init(antNum, mapSize, iterNum)\n\t//cellMap, mapToMap := acoInstance.ExportMap()\n\tcellMap, mapToMap := acoInstance.ExportMap()\n\n\tacoInstance.Run()\n\tantRoutes := acoInstance.ExportRoutes()\n\n\tfor _, ant := range antRoutes {\n\t\tfor iteration := range ant {\n\n\t\t\tant[iteration] = append([]int{0}, ant[iteration]...)\n\t\t\tant[iteration] = append(ant[iteration], reverseArray(ant[iteration])[1:]...)\n\t\t}\n\t}\n\t// Systems need to be added to the world\n\tworld.AddSystem(&common.RenderSystem{})\n\tworld.AddSystem(&common.MouseSystem{})\n\n\t// Initialize custom systems last to make sure their\n\t// depencies are already initialized\n\t// world.AddSystem(&systems.AntCreatorSystem{})\n\tworld.AddSystem(&systems.PainterSystem{})\n\tworld.AddSystem(&systems.AntMoverSystem{Routes: antRoutes, IDtoMap: mapToMap, SecondsPerRound: float32(seconds)})\n\tworld.AddSystem(&systems.MapCreatorSystem{CellMap: cellMap})\n\n}", "title": "" }, { "docid": "46329d5507c1b715933ffda2b738f580", "score": "0.4522533", "text": "func (s *AssemblySpot) Assemble() (*vehicle.Car, error) {\n\tif s.vehicle == nil {\n\t\treturn nil, errors.New(\"no vehicle set to start assembling\")\n\t}\n\n\tvar wg sync.WaitGroup\n\tdefer wg.Wait()\n\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\ts.assembleChassis()\n\t}()\n\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\ts.assembleTires()\n\t}()\n\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\ts.assembleEngine()\n\t}()\n\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\ts.assembleElectronics()\n\t}()\n\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\ts.assembleDash()\n\t}()\n\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\ts.assembleSeats()\n\t}()\n\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\ts.assembleWindows()\n\t}()\n\n\treturn s.vehicle, nil\n}", "title": "" }, { "docid": "b9637bd7850d9bb5dd6ca1ffac535b8f", "score": "0.45071056", "text": "func (sg *sgtag) Create(eng vu.Engine) {\n\tsg.scene = eng.AddScene(vu.VP)\n\tsg.scene.SetPerspective(60, float64(800)/float64(600), 0.1, 50)\n\tsg.scene.SetLightLocation(0, 10, 0)\n\tsg.scene.SetLightColour(0.4, 0.7, 0.9)\n\tsg.scene.SetViewLocation(0, 0, 6)\n\tsg.scene.Set2D()\n\n\t// load the floor model.\n\tfloor := sg.scene.AddPart()\n\tfloor.SetLocation(0, 0, 0)\n\tfloor.SetFacade(\"floor\", \"gouraud\").SetMaterial(\"floor\")\n\n\t// load the trooper\n\tsg.tr = newTrooper(sg.eng, sg.scene, 1)\n\n\t// initialize the reactions\n\tsg.reacts = map[string]vu.Reaction{\n\t\t\"W\": vu.NewReaction(\"Forward\", func() { sg.forward() }),\n\t\t\"A\": vu.NewReaction(\"Left\", func() { sg.left() }),\n\t\t\"S\": vu.NewReaction(\"Back\", func() { sg.back() }),\n\t\t\"D\": vu.NewReaction(\"Right\", func() { sg.right() }),\n\t\t\"KP+\": vu.NewReaction(\"Attach\", func() { sg.tr.attach() }),\n\t\t\"KP-\": vu.NewReaction(\"Detach\", func() { sg.tr.detach() }),\n\t\t\"0\": vu.NewReactOnce(\"SL0\", func() { sg.setTr(0) }),\n\t\t\"1\": vu.NewReactOnce(\"SL1\", func() { sg.setTr(1) }),\n\t\t\"2\": vu.NewReactOnce(\"SL2\", func() { sg.setTr(2) }),\n\t\t\"3\": vu.NewReactOnce(\"SL3\", func() { sg.setTr(3) }),\n\t\t\"4\": vu.NewReactOnce(\"SL4\", func() { sg.setTr(4) }),\n\t\t\"5\": vu.NewReactOnce(\"SL5\", func() { sg.setTr(5) }),\n\t\t\"P\": vu.NewReactOnce(\"Stats\", func() { sg.stats() }),\n\t}\n\n\t// set some constant state.\n\tsg.eng.Enable(vu.BLEND, true)\n\tsg.eng.Enable(vu.CULL, true)\n\tsg.eng.Color(0.1, 0.1, 0.1, 1.0)\n}", "title": "" }, { "docid": "042a91489cd6c42bc9c6947705b1d406", "score": "0.44973218", "text": "func (cm *cmtag) Create(eng vu.Engine) {\n\tcm.holdoff, _ = time.ParseDuration(\"1000ms\")\n\tcm.last = time.Now()\n\tcm.scene = eng.AddScene(vu.VF)\n\tcm.scene.SetPerspective(60, float64(800)/float64(600), 0.1, 50)\n\tcm.scene.SetLightLocation(0, 5, 0)\n\tcm.scene.SetLightColour(0.4, 0.7, 0.9)\n\tcm.scene.SetViewLocation(0, 10, 25)\n\n\t// add a base for the other physics bodies to rest on.\n\tslab := cm.scene.AddPart()\n\tslab.SetLocation(0, 1, 0)\n\tslab.SetFacade(\"cube\", \"gouraud\").SetMaterial(\"floor\")\n\tslab.SetScale(100, 50, 100)\n\tslab.SetBody(vu.Box(50, 25, 50), 0, 0.4)\n\tslab.SetLocation(0, -25, 0)\n\n\t// create a fixed part.\n\tbox := cm.scene.AddPart()\n\tbox.SetLocation(0, 1, 0)\n\tbox.SetFacade(\"cube\", \"gouraud\").SetMaterial(\"cube\")\n\tbox.SetScale(5, 5, 5)\n\tbox.SetBody(vu.Box(2.5, 2.5, 2.5), 0, 0) // sized to match scaling.\n\n\t// create a physics body that can be associated with a camera,\n\tcm.bod = cm.scene.AddPart()\n\tcm.bod.SetFacade(\"sphere\", \"gouraud\").SetMaterial(\"sphere\")\n\tcm.bod.SetBody(vu.Sphere(1), 1, 0)\n\tcm.bod.SetLocation(-6, 2, -2)\n\n\t// set some constant state.\n\tcm.eng.Enable(vu.BLEND, true)\n\tcm.eng.Enable(vu.CULL, true)\n\tcm.eng.Enable(vu.DEPTH, true)\n\tcm.eng.Color(0.1, 0.1, 0.1, 1.0)\n\treturn\n}", "title": "" }, { "docid": "107bd8ca802e2c4c10c019afdd45c11b", "score": "0.44825712", "text": "func (s *Statement) Emit(out io.Writer) {\n\tdockerfile.EmitInstruction(out, \"PROVIDES\", s.List)\n}", "title": "" }, { "docid": "74b3a3a681937ab1c288f236c6028256", "score": "0.44785196", "text": "func (l *LXCImage) Build(compression string) error {\n\terr := l.createMetadata()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to create metadata: %w\", err)\n\t}\n\n\terr = l.packMetadata()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to pack metadata: %w\", err)\n\t}\n\n\t_, err = shared.Pack(l.ctx, filepath.Join(l.targetDir, \"rootfs.tar\"), compression, l.sourceDir, \".\")\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to pack %q: %w\", filepath.Join(l.targetDir, \"rootfs.tar\"), err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "2fd0d9dfaaa5929bd3893bc4ae2768cf", "score": "0.44756275", "text": "func (n *SwarmAutoscaleNode) Build(s *pipeline.SwarmAutoscaleNode) (ast.Node, error) {\n\tn.Pipe(\"swarmAutoscale\").\n\t\tDot(\"cluster\", s.Cluster).\n\t\tDot(\"serviceName\", s.ServiceNameTag).\n\t\tDot(\"serviceNameTag\", s.ServiceNameTag).\n\t\tDot(\"outputServiceNameTag\", s.OutputServiceNameTag).\n\t\tDot(\"currentField\", s.CurrentField).\n\t\tDot(\"max\", s.Max).\n\t\tDot(\"min\", s.Min).\n\t\tDot(\"replicas\", s.Replicas).\n\t\tDot(\"increaseCooldown\", s.IncreaseCooldown).\n\t\tDot(\"decreaseCooldown\", s.DecreaseCooldown)\n\n\treturn n.prev, n.err\n}", "title": "" }, { "docid": "4be878cff654a45fee48f47f396e9533", "score": "0.44568247", "text": "func (ef *execFactory) ConstructOpaque(metadata opt.OpaqueMetadata) (exec.Node, error) {\n\treturn constructOpaque(metadata)\n}", "title": "" }, { "docid": "db2bc0c03b2aca10accba365b79f732a", "score": "0.44535336", "text": "func (i InputMediaUploadedDocument) construct() InputMediaClass { return &i }", "title": "" }, { "docid": "a0244be653160fc05a517d3def0f9ca3", "score": "0.44467402", "text": "func (c GoogleCloudOutputConfig) Build(bc operator.BuildContext) ([]operator.Operator, error) {\n\toutputOperator, err := c.OutputConfig.Build(bc)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tnewBuffer, err := c.BufferConfig.Build(bc, c.ID())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tnewFlusher := c.FlusherConfig.Build(bc.Logger.SugaredLogger)\n\tctx, cancel := context.WithCancel(context.Background())\n\n\tgoogleCloudOutput := &GoogleCloudOutput{\n\t\tOutputOperator: outputOperator,\n\t\tcredentials: c.Credentials,\n\t\tcredentialsFile: c.CredentialsFile,\n\t\tprojectID: c.ProjectID,\n\t\tbuffer: newBuffer,\n\t\tflusher: newFlusher,\n\t\tlogNameField: c.LogNameField,\n\t\ttraceField: c.TraceField,\n\t\tspanIDField: c.SpanIDField,\n\t\ttimeout: c.Timeout.Raw(),\n\t\tuseCompression: c.UseCompression,\n\t\tctx: ctx,\n\t\tcancel: cancel,\n\t}\n\n\treturn []operator.Operator{googleCloudOutput}, nil\n}", "title": "" }, { "docid": "1c6eb509afac2690c6cab108a305974a", "score": "0.444224", "text": "func (b *Builder) Build(name string) *ComputeUnit {\n\tb.name = name\n\tcu := NewComputeUnit(name, b.engine)\n\tcu.Freq = b.freq\n\tcu.Decoder = insts.NewDisassembler()\n\tcu.WfDispatcher = NewWfDispatcher(cu)\n\tcu.InFlightVectorMemAccessLimit = 512\n\n\tb.alu = emu.NewALU(nil)\n\tb.scratchpadPreparer = NewScratchpadPreparerImpl(cu)\n\n\tfor i := 0; i < 4; i++ {\n\t\tcu.WfPools = append(cu.WfPools, NewWavefrontPool(10))\n\t}\n\n\tb.equipScheduler(cu)\n\tb.equipScalarUnits(cu)\n\tb.equipSIMDUnits(cu)\n\tb.equipLDSUnit(cu)\n\tb.equipVectorMemoryUnit(cu)\n\tb.equipRegisterFiles(cu)\n\n\treturn cu\n}", "title": "" }, { "docid": "50c6fb5acf51ad48642f14b46ec0b5b6", "score": "0.44297996", "text": "func (i InputMediaInvoice) construct() InputMediaClass { return &i }", "title": "" }, { "docid": "b7eba14c4dad5bb42bcad99da9fe0876", "score": "0.440985", "text": "func compile(sources []Source) (*CompiledBundle, error) {\n\tcmd := exec.Command(\"solc\", \"--standard-json\")\n\tin, err := cmd.StdinPipe()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tout, err := cmd.StdoutPipe()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcmd.Stderr = os.Stderr\n\terr = cmd.Start()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tblob := sourceblob{\n\t\tLanguage: \"Solidity\",\n\t}\n\tblob.Sources = make(map[string]sourcefile, len(sources))\n\tfor i := range sources {\n\t\tblob.Sources[sources[i].Filename] = sourcefile{Content: sources[i].Body}\n\t}\n\tblob.Settings.Optimizer.Enabled = true\n\tblob.Settings.Optimizer.Runs = 200\n\tblob.Settings.OutputSelection = defaultOutput\n\terr = json.NewEncoder(in).Encode(&blob)\n\tif err != nil {\n\t\tin.Close()\n\t\tcmd.Wait()\n\t\treturn nil, err\n\t}\n\tin.Close()\n\tvar jsout solcout\n\terr = json.NewDecoder(out).Decode(&jsout)\n\tif err != nil {\n\t\tcmd.Wait()\n\t\treturn nil, fmt.Errorf(\"reading solc output: %s\", err)\n\t}\n\tif err := cmd.Wait(); err != nil {\n\t\treturn nil, fmt.Errorf(\"solc: %s\", err)\n\t}\n\tif err := compileError(jsout.Errors); err != nil {\n\t\treturn nil, fmt.Errorf(\"solc compilation error: %s\", err)\n\t}\n\tb := jsout.toBundle()\n\tfor i := range jsout.Errors {\n\t\tif jsout.Errors[i].Type == \"Warning\" {\n\t\t\tb.Warnings = append(b.Warnings, jsout.Errors[i].FormattedMessage)\n\t\t}\n\t}\n\tfor i := range b.Sources {\n\t\tb.Sources[i] = sources[i].Body\n\t}\n\treturn b, nil\n}", "title": "" }, { "docid": "31eba3f4567d37e5263abca0ce527f9e", "score": "0.44072047", "text": "func (b *Builder) Build() ([][]byte, string, bool) {\n\tresult := make([][]byte, 0)\n\t// writes a task\n\ttask := b.newTask()\n\tresult = append(result, ToYaml(task, \"Task\"))\n\t// write secrets with credentials\n\tsecrets := b.newCredentialsSecret()\n\tif secrets != nil {\n\t\tresult = append(result, ToYaml(secrets, \"Secret\"))\n\t}\n\t// write secrets with files\n\tfilesSecret := b.newFileSecrets()\n\tif filesSecret != nil {\n\t\tresult = append(result, ToYaml(filesSecret, \"Files Secret\"))\n\t}\n\t// write pipeline\n\tpipeline := b.newPipeline()\n\tresult = append(result, ToYaml(pipeline, \"Pipeline\"))\n\n\tpipelineRun := b.newPipelineRun()\n\n\t// if source code repository is required by the pipeline\n\tif b.flow.RequiresGitSource() {\n\t\t// need to add git repo in resources of pipeline run\n\t\tpipelineRun.Spec.Resources = []*Resources{\n\t\t\t{\n\t\t\t\tName: b.codeRepoResourceName(b.flow.Name),\n\t\t\t\tResourceRef: &ResourceRef{\n\t\t\t\t\tName: b.codeRepoResourceName(b.flow.Name),\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t\t// add the following resources:\n\t\t// tekton pipeline resource\n\t\tpipelineResource := b.newPipelineResource()\n\t\tresult = append(result, ToYaml(pipelineResource, \"PipelineResource\"))\n\t}\n\tresult = append(result, ToYaml(pipelineRun, \"Pipeline Run\"))\n\treturn result, pipelineRun.Metadata.Name, b.flow.RequiresGitSource()\n}", "title": "" }, { "docid": "9de02285dc2010a1edee71d778e3caba", "score": "0.44015774", "text": "func (m DeployerMux) TrackBuildArtifacts(_, _ []graph.Artifact) {}", "title": "" }, { "docid": "9c3b52b738249075382bb19795d443ca", "score": "0.4400119", "text": "func (p PushMessageContentSticker) construct() PushMessageContentClass { return &p }", "title": "" }, { "docid": "4543f64580201f12911665781045b4a1", "score": "0.43987378", "text": "func (c *Container) Build(\n\tsecrets []string,\n\tauthConfigs map[string]types.AuthConfig,\n\taddressAuthToken map[string]string,\n) error {\n\tbuilder := NewImageBuilder()\n\terr := builder.Build(\n\t\tc.writer,\n\t\tsecrets,\n\t\tc.build.Context,\n\t\tc.build.Dockerfile,\n\t\t[]string{GetImageName(c.name)},\n\t\tauthConfigs,\n\t)\n\tif err != nil {\n\t\tlogging.GetLogger().Error(\"could not build image\", zap.String(\"err\", err.Error()))\n\t\treturn err\n\t}\n\tc.image = GetImageName(c.name)\n\tc.containerConfig.Image = GetImageName(c.name)\n\treturn nil\n}", "title": "" }, { "docid": "d415948c2904e801cde41660e3460386", "score": "0.43922493", "text": "func (c *AudioPlayerComponent) Setup(w ecs.BaseWorld, f ecs.Flag, key [4]byte) {\n if c.initialized {\n panic(\"AudioPlayerComponent called Setup() more than once\")\n }\n c.flag = f\n c.world = w\n c.wkey = key\n c.data = make([]drawerAudioPlayerComponent, 0, 256)\n c.initialized = true\n \n}", "title": "" }, { "docid": "e2f61e89d6577599757687bed7a4434f", "score": "0.4366082", "text": "func (u UpdateSavedAnimations) construct() UpdateClass { return &u }", "title": "" }, { "docid": "f9167eae7bf660c3116ecaa5670fb0c7", "score": "0.43642244", "text": "func (t *Transaction) Assemble() {}", "title": "" }, { "docid": "ec9234267ecbcb6c9f61790c49a9652c", "score": "0.43626332", "text": "func (c *jsiiProxy_CloudFormationProduct) Synthesize(session awscdk.ISynthesisSession) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"synthesize\",\n\t\t[]interface{}{session},\n\t)\n}", "title": "" }, { "docid": "fd0089cbee0608a47dcd2c24727bc555", "score": "0.43577883", "text": "func New() *Three { return &Three{ctx: js.Global.Get(\"THREE\")} }", "title": "" }, { "docid": "f1d001d122c60cefd60b9ccb76c801fe", "score": "0.4356385", "text": "func (c *jsiiProxy_CfnCloudFormationProduct) Synthesize(session awscdk.ISynthesisSession) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"synthesize\",\n\t\t[]interface{}{session},\n\t)\n}", "title": "" }, { "docid": "2e367439e30b0c3913535996b611ed3e", "score": "0.4348572", "text": "func (i InputMediaGame) construct() InputMediaClass { return &i }", "title": "" }, { "docid": "89a15c0dfe9bd9acb3ea9e4987014a82", "score": "0.43469548", "text": "func (wd *aeWork) producing() {\n\twd.produce.Add(1)\n}", "title": "" }, { "docid": "700ac86536125c6c38d8499c2e586a2c", "score": "0.43462306", "text": "func main() {\n\tconst scale = shrink * sdf.MillimetresPerInch\n\n\tcp, err := cylinderPattern(true, true)\n\tif err != nil {\n\t\tlog.Fatalf(\"error: %s\", err)\n\t}\n\trender.ToSTL(sdf.ScaleUniform3D(cp, scale), \"cylinder_pattern.stl\", render.NewMarchingCubesOctree(330))\n\n\tccfp, err := ccFrontPattern()\n\tif err != nil {\n\t\tlog.Fatalf(\"error: %s\", err)\n\t}\n\trender.ToSTL(sdf.ScaleUniform3D(ccfp, scale), \"crankcase_front.stl\", render.NewMarchingCubesOctree(300))\n\n\t//render.ToSTL(sdf.ScaleUniform3D(cylinderCoreBox(), shrink), \"cylinder_corebox.stl\", render.NewMarchingCubesOctree(330))\n}", "title": "" }, { "docid": "d706e229b44ed4f3178d7bfa19e1f82e", "score": "0.43425745", "text": "func (i InputMediaGeoPoint) construct() InputMediaClass { return &i }", "title": "" }, { "docid": "a379ddf18623e2ad5547de9d3c0bd6dd", "score": "0.43400234", "text": "func (p *Plugin) Build(fn *function.Function, zip *archive.Zip) error {\n\tif !strings.HasPrefix(fn.Runtime, \"clojure\") {\n\t\treturn nil\n\t}\n\n\tjar := filepath.Join(fn.Path, \"target\", jarFile)\n\tif _, err := os.Stat(jar); err != nil {\n\t\treturn errors.Errorf(\"missing jar file %q\", jar)\n\t}\n\n\tfn.Log.Debug(\"appending compiled files\")\n\treader, err := azip.OpenReader(jar)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"opening zip\")\n\t}\n\tdefer reader.Close()\n\n\tfor _, file := range reader.File {\n\t\tparts := strings.Split(file.Name, \".\")\n\t\text := parts[len(parts)-1]\n\n\t\tif ext == \"clj\" || ext == \"cljx\" || ext == \"cljc\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tr, err := file.Open()\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"opening file\")\n\t\t}\n\n\t\tb, err := ioutil.ReadAll(r)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"reading file\")\n\t\t}\n\t\tr.Close()\n\n\t\tzip.AddBytes(file.Name, b)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "be8ba79661cea43cee388a119af64cce", "score": "0.4336694", "text": "func (bb *bbtag) Create(eng vu.Eng, s *vu.State) {\n\ttop := eng.Root().NewPov()\n\tbb.cam = top.NewCam()\n\tbb.cam.SetLocation(0.5, 2, 2.5)\n\tsun := top.NewPov().SetLocation(0, 3, -3)\n\tsun.NewLight().SetColor(0.4, 0.7, 0.9)\n\n\t// Load the floor model.\n\tfloor := top.NewPov()\n\tfloor.NewModel(\"gouraud\").LoadMesh(\"floor\").LoadMat(\"gray\")\n\n\t// Create a single image from multiple textures using a shader.\n\tc4 := top.NewPov().SetLocation(0.5, 2, -1).SetScale(0.25, 0.25, 0.25)\n\tmodel := c4.NewModel(\"spinball\").LoadMesh(\"billboard\")\n\tmodel.AddTex(\"core\").AddTex(\"core\").AddTex(\"halo\").AddTex(\"halo\")\n\tmodel.SetAlpha(0.4)\n\n\t// Try banner text with the 3D scene perspective camera.\n\tfont := \"lucidiaSu22\"\n\tbanner := top.NewPov().SetScale(0.1, 0.1, 0.1).SetLocation(-10, 3, -15)\n\tbanner.NewModel(\"uv\").AddTex(font + \"White\").LoadFont(font).SetPhrase(\"Floating Text\")\n\n\t// Try billboard banner text with the 3D scene perspective camera.\n\tbanner = top.NewPov().SetScale(0.025, 0.025, 0.025).SetLocation(-10, 2, -15)\n\tbanner.NewModel(\"bb\").AddTex(font + \"White\").LoadFont(font).SetPhrase(\"Billboard Text\")\n\n\t// Banner text with an ortho overlay.\n\tv2D := eng.Root().NewPov()\n\tbb.ui = v2D.NewCam()\n\tbb.ui.SetUI()\n\n\t// 2D static location.\n\tbanner = v2D.NewPov().SetLocation(100, 100, 0)\n\tbanner.NewModel(\"uv\").AddTex(font + \"White\").LoadFont(font).SetPhrase(\"Overlay Text\")\n\n\t// 3D world to 2D screen location.\n\tbb.screenText = v2D.NewPov()\n\tbb.screenText.NewModel(\"uv\").AddTex(font + \"White\").LoadFont(font).SetPhrase(\"Screen Text\")\n\tbb.resize(s.W, s.H)\n}", "title": "" }, { "docid": "960e693da4615434d41336abfea5512c", "score": "0.43365812", "text": "func (m MessageEntityItalic) construct() MessageEntityClass { return &m }", "title": "" }, { "docid": "13e53805fcf83363f1beede7ad6c3e97", "score": "0.4335263", "text": "func createToneStack() Unit {\n\n\t/*\n\t * Create effects unit.\n\t */\n\tu := toneStack{\n\t\tunitStruct: unitStruct{\n\t\t\tunitType: UNIT_TONESTACK,\n\t\t\tparams: []Parameter{\n\t\t\t\tParameter{\n\t\t\t\t\tName: \"low\",\n\t\t\t\t\tType: PARAMETER_TYPE_NUMERIC,\n\t\t\t\t\tPhysicalUnit: \"dB\",\n\t\t\t\t\tMinimum: -30,\n\t\t\t\t\tMaximum: 0,\n\t\t\t\t\tNumericValue: 0,\n\t\t\t\t\tDiscreteValueIndex: -1,\n\t\t\t\t\tDiscreteValues: nil,\n\t\t\t\t},\n\t\t\t\tParameter{\n\t\t\t\t\tName: \"middle\",\n\t\t\t\t\tType: PARAMETER_TYPE_NUMERIC,\n\t\t\t\t\tPhysicalUnit: \"dB\",\n\t\t\t\t\tMinimum: -30,\n\t\t\t\t\tMaximum: 0,\n\t\t\t\t\tNumericValue: -2,\n\t\t\t\t\tDiscreteValueIndex: -1,\n\t\t\t\t\tDiscreteValues: nil,\n\t\t\t\t},\n\t\t\t\tParameter{\n\t\t\t\t\tName: \"presence\",\n\t\t\t\t\tType: PARAMETER_TYPE_NUMERIC,\n\t\t\t\t\tPhysicalUnit: \"dB\",\n\t\t\t\t\tMinimum: -30,\n\t\t\t\t\tMaximum: 0,\n\t\t\t\t\tNumericValue: -5,\n\t\t\t\t\tDiscreteValueIndex: -1,\n\t\t\t\t\tDiscreteValues: nil,\n\t\t\t\t},\n\t\t\t\tParameter{\n\t\t\t\t\tName: \"high\",\n\t\t\t\t\tType: PARAMETER_TYPE_NUMERIC,\n\t\t\t\t\tPhysicalUnit: \"dB\",\n\t\t\t\t\tMinimum: -30,\n\t\t\t\t\tMaximum: 0,\n\t\t\t\t\tNumericValue: -5,\n\t\t\t\t\tDiscreteValueIndex: -1,\n\t\t\t\t\tDiscreteValues: nil,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\treturn &u\n}", "title": "" }, { "docid": "9db938ffea4c226843514cef458ee5bf", "score": "0.43242714", "text": "func (p PushMessageContentStory) construct() PushMessageContentClass { return &p }", "title": "" }, { "docid": "844e95c6096b76ce8f039f6b54bf0018", "score": "0.4317473", "text": "func (t *TargetGen) Init() {\r\n t.Target.Init()\r\n t.Target.SetOutputSyntax(SYNTAX_GAS_68K)\r\n\r\n utils.DefineSymbol(\"GEN\", 1)\r\n utils.DefineSymbol(\"SMD\", 1)\r\n \r\n specs.SetChannelSpecs(&t.ChannelSpecs, 0, 0, specs.SpecsSN76489) // A..D\r\n specs.SetChannelSpecs(&t.ChannelSpecs, 0, 4, specs.SpecsYM2612) // E..J\r\n\r\n t.ID = TARGET_SMD\r\n t.MaxTempo = 300\r\n t.MinVolume = 0\r\n t.SupportsPanning = 1\r\n t.MaxLoopDepth = 2\r\n t.SupportsPal = true\r\n t.AdsrLen = 5\r\n t.AdsrMax = 63\r\n t.MinWavLength = 1\r\n t.MaxWavLength = 2097152 // 2MB\r\n t.MinWavSample = 0\r\n t.MaxWavSample = 255\r\n t.MachineSpeed = 3579545\r\n}", "title": "" }, { "docid": "63bc3a416bdbe8cbaa6620eb8e2257b1", "score": "0.43146423", "text": "func (ef *execFactory) ConstructRender(\n\tn exec.Node,\n\tcolumns colinfo.ResultColumns,\n\texprs tree.TypedExprs,\n\treqOrdering exec.OutputOrdering,\n) (exec.Node, error) {\n\tvar rb renderBuilder\n\trb.init(n, reqOrdering)\n\tfor i, expr := range exprs {\n\t\texprs[i] = rb.r.ivarHelper.Rebind(expr)\n\t}\n\trb.setOutput(exprs, columns)\n\treturn rb.res, nil\n}", "title": "" }, { "docid": "17975992f69d825ae2f21f625cf5f231", "score": "0.43129015", "text": "func codeGeneration(ast *AST, flags *Flags) {\n\t// Initialise Code Generation\n\tarmFile := bufio.NewWriter(os.Stdout)\n\n\t// Put the assembly code in a file, if assembly flag missing\n\tif !flags.printAssembly {\n\t\tarmFileHandle, err := os.Create(flags.assemblyfile)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tdefer armFileHandle.Close()\n\n\t\tarmFile = bufio.NewWriter(armFileHandle)\n\t}\n\n\t// If the noassembly flag is not set\n\t// Take all the instructions in the channel and push them to the defined\n\t// IO Writer\n\tif !flags.noassembly {\n\t\tfor instr := range ast.CodeGen() {\n\t\t\tfInstr := fmt.Sprintf(\"%v\\n\", instr)\n\t\t\tfmt.Fprint(armFile, fInstr)\n\t\t}\n\t}\n\n\t// Flush the buffered writer\n\tarmFile.Flush()\n}", "title": "" }, { "docid": "7a80a0607b903759622292c9f620883e", "score": "0.43118072", "text": "func (c *jsiiProxy_CloudFormationProduct) OnSynthesize(session constructs.ISynthesisSession) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"onSynthesize\",\n\t\t[]interface{}{session},\n\t)\n}", "title": "" }, { "docid": "ce45b95c4654d59375cc6f4c9490a8b9", "score": "0.4309159", "text": "func (c *jsiiProxy_CfnCloudFormationProduct) OnSynthesize(session constructs.ISynthesisSession) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"onSynthesize\",\n\t\t[]interface{}{session},\n\t)\n}", "title": "" }, { "docid": "2c3d35525fcfb6d717541c205f64ad78", "score": "0.42938843", "text": "func (s *SegmentGit) Compile() {\n\tcurrentBranch := getCurrentBranch()\n\ts.Data = []byte(currentBranch)\n}", "title": "" }, { "docid": "906eb896fe3dac9bc2de9af49dc61f5f", "score": "0.42924604", "text": "func NewAssembler() *Assembler {\n\tasm := Assembler{}\n\tasm.input = make(chan packetWithSrc, 10000) // should be big enough\n\tasm.output = make(chan Stream, 1000) // should be big enough\n\tasm.table = make(map[string]internalStream, 1000000) // map will be huge... avoid resizing\n\tctx, cancel := context.WithCancel(context.Background())\n\tasm.ctx = ctx\n\tasm.ctxCancel = cancel\n\tasm.flushTime = time.Duration(10 * time.Minute)\n\tasm.stats = Stats{}\n\n\treturn &asm\n}", "title": "" }, { "docid": "8b9a58c41d8543f2c3278cfedcf71d35", "score": "0.42901424", "text": "func (p PushMessageContentGame) construct() PushMessageContentClass { return &p }", "title": "" }, { "docid": "f54976cd37a0ceef42fa9cd4b99f5586", "score": "0.4283573", "text": "func (p *CLIPlanner) Build(renderRoot string, assets []api.Asset, configGroups []libyaml.ConfigGroup, meta api.ReleaseMetadata, templateContext map[string]interface{}) (Plan, error) {\n\tdefer p.Status.ClearProgress()\n\tdebug := level.Debug(log.With(p.Logger, \"step.type\", \"render\", \"phase\", \"plan\"))\n\n\tdebug.Log(\"renderRoot\", renderRoot)\n\trootFs := root.NewRootFS(p.Fs, renderRoot)\n\n\tbuilder, err := p.BuilderBuilder.FullBuilder(meta, configGroups, templateContext)\n\tif err != nil {\n\t\treturn Plan{}, errors.Wrap(err, \"init builder\")\n\t}\n\n\tvar plan Plan\n\tfor i, asset := range assets {\n\t\tprogress := buildProgress{\n\t\t\tStepNumber: i,\n\t\t\tTotalSteps: len(assets),\n\t\t}\n\t\tp.Status.SetProgress(daemontypes.JSONProgress(\"build\", progress))\n\n\t\tif asset.Inline != nil {\n\t\t\tevaluatedWhen, err := p.evalAssetWhen(debug, *builder, asset, asset.Inline.AssetShared.When)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tp.logAssetResolve(debug, evaluatedWhen, \"inline\")\n\t\t\tif evaluatedWhen {\n\t\t\t\tplan = append(plan, p.inlineStep(rootFs, *asset.Inline, configGroups, meta, templateContext))\n\t\t\t}\n\t\t} else if asset.Docker != nil {\n\t\t\tevaluatedWhen, err := p.evalAssetWhen(debug, *builder, asset, asset.Docker.AssetShared.When)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tp.logAssetResolve(debug, evaluatedWhen, \"docker\")\n\t\t\tif evaluatedWhen {\n\t\t\t\tplan = append(plan, p.dockerStep(rootFs, *asset.Docker, meta, templateContext, configGroups))\n\t\t\t}\n\t\t} else if asset.Helm != nil {\n\t\t\tevaluatedWhen, err := p.evalAssetWhen(debug, *builder, asset, asset.Helm.AssetShared.When)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tp.logAssetResolve(debug, evaluatedWhen, \"helm\")\n\t\t\tif evaluatedWhen {\n\t\t\t\tplan = append(plan, p.helmStep(rootFs, *asset.Helm, meta, templateContext, configGroups))\n\t\t\t}\n\t\t} else if asset.Local != nil {\n\t\t\tevaluatedWhen, err := p.evalAssetWhen(debug, *builder, asset, asset.Local.AssetShared.When)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tp.logAssetResolve(debug, evaluatedWhen, \"local\")\n\t\t\tif evaluatedWhen {\n\t\t\t\tplan = append(plan, p.localStep(*asset.Local, meta, templateContext, configGroups))\n\t\t\t}\n\t\t} else if asset.DockerLayer != nil {\n\t\t\tevaluatedWhen, err := p.evalAssetWhen(debug, *builder, asset, asset.DockerLayer.AssetShared.When)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tp.logAssetResolve(debug, evaluatedWhen, \"dockerlayer\")\n\t\t\tif evaluatedWhen {\n\t\t\t\tplan = append(plan, p.dockerLayerStep(rootFs, *asset.DockerLayer, meta, templateContext, configGroups))\n\t\t\t}\n\t\t} else if asset.Web != nil {\n\t\t\tevaluatedWhen, err := p.evalAssetWhen(debug, *builder, asset, asset.Web.AssetShared.When)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tp.logAssetResolve(debug, evaluatedWhen, \"web\")\n\t\t\tif evaluatedWhen {\n\t\t\t\tplan = append(plan, p.webStep(rootFs, *asset.Web, meta, configGroups, templateContext))\n\t\t\t}\n\t\t} else if asset.GitHub != nil {\n\t\t\tevaluatedWhen, err := p.evalAssetWhen(debug, *builder, asset, asset.GitHub.AssetShared.When)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tp.logAssetResolve(debug, evaluatedWhen, \"github\")\n\t\t\tif evaluatedWhen {\n\t\t\t\tplan = append(plan, p.githubStep(rootFs, *asset.GitHub, configGroups, renderRoot, meta, templateContext))\n\t\t\t}\n\t\t} else if asset.Terraform != nil {\n\t\t\tevaluatedWhen, err := p.evalAssetWhen(debug, *builder, asset, asset.Terraform.AssetShared.When)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tp.logAssetResolve(debug, evaluatedWhen, \"terraform\")\n\t\t\tif evaluatedWhen {\n\t\t\t\tplan = append(plan, p.terraformStep(rootFs, *asset.Terraform, meta, templateContext, configGroups))\n\t\t\t}\n\t\t} else if asset.AmazonEKS != nil {\n\t\t\tevaluatedWhen, err := p.evalAssetWhen(debug, *builder, asset, asset.AmazonEKS.AssetShared.When)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tp.logAssetResolve(debug, evaluatedWhen, \"amazon kubernetes cluster\")\n\t\t\tif evaluatedWhen {\n\t\t\t\tplan = append(plan, p.amazonEKSStep(rootFs, *asset.AmazonEKS, meta, templateContext, configGroups))\n\t\t\t}\n\t\t} else if asset.GoogleGKE != nil {\n\t\t\tevaluatedWhen, err := p.evalAssetWhen(debug, *builder, asset, asset.GoogleGKE.AssetShared.When)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tp.logAssetResolve(debug, evaluatedWhen, \"google kubernetes cluster\")\n\t\t\tif evaluatedWhen {\n\t\t\t\tplan = append(plan, p.googleGKEStep(rootFs, *asset.GoogleGKE, meta, templateContext, configGroups))\n\t\t\t}\n\t\t} else if asset.AzureAKS != nil {\n\t\t\tevaluatedWhen, err := p.evalAssetWhen(debug, *builder, asset, asset.AzureAKS.AssetShared.When)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tp.logAssetResolve(debug, evaluatedWhen, \"azure kubernetes cluster\")\n\t\t\tif evaluatedWhen {\n\t\t\t\tplan = append(plan, p.azureAKSStep(rootFs, *asset.AzureAKS, meta, templateContext, configGroups))\n\t\t\t}\n\t\t} else {\n\t\t\tdebug.Log(\"event\", \"asset.resolve.fail\", \"asset\", fmt.Sprintf(\"%#v\", asset))\n\t\t\treturn nil, errors.New(\n\t\t\t\t\"Unknown asset: type is not one of \" +\n\t\t\t\t\t\"[inline docker helm dockerlayer github terraform amazon_eks google_gke azure_aks]\",\n\t\t\t)\n\t\t}\n\t}\n\treturn plan, nil\n}", "title": "" }, { "docid": "95a67028f73b679e0cef94bcf5df4c29", "score": "0.4281565", "text": "func newEffect(m *model, source Effect, maxParticles int) *effect {\n\tif m.msh == nil {\n\t\tm.NewMesh(\"cpu\")\n\t\tm.msh.loaded = true // mesh data will be set on update.\n\t}\n\tfloatsPerVertex, floatsPerData := 3, 2\n\tm.InitMesh(0, uint32(floatsPerVertex), render.DYNAMIC, false)\n\tm.InitMesh(1, uint32(floatsPerData), render.DYNAMIC, false)\n\n\t// Allocate the maximum number of particles.\n\tparticles := []*EffectParticle{}\n\tfor cnt := 0; cnt < maxParticles; cnt++ {\n\t\tparticles = append(particles, &EffectParticle{})\n\t}\n\treturn &effect{source: source, particles: particles}\n}", "title": "" }, { "docid": "f9cbed29018045f19e5e8146b2c583d6", "score": "0.4278846", "text": "func (r *gravityExecutor) Execute(ctx context.Context) (err error) {\n\tr.progress.NextStep(\"Creating user-supplied cluster resources\")\n\tcluster, err := r.operator.GetLocalSite(ctx)\n\tif err != nil {\n\t\treturn trace.Wrap(err)\n\t}\n\tfor _, resource := range r.resources {\n\t\tr.Infof(\"Creating resource %q\", resource.Kind)\n\t\terr := r.factory.Create(ctx, resources.CreateRequest{\n\t\t\tSiteKey: cluster.Key(),\n\t\t\tResource: teleservices.UnknownResource{\n\t\t\t\tResourceHeader: resource.ResourceHeader,\n\t\t\t\tRaw: resource.Raw,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn trace.Wrap(err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f9835c59ff0883d1d54da9e65d5ca573", "score": "0.42760807", "text": "func (c *jsiiProxy_CfnCloudFormationProvisionedProduct) Synthesize(session awscdk.ISynthesisSession) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"synthesize\",\n\t\t[]interface{}{session},\n\t)\n}", "title": "" }, { "docid": "727d2db24bd8ee9513e9b11340aa3471", "score": "0.4268894", "text": "func (i InputMediaDice) construct() InputMediaClass { return &i }", "title": "" }, { "docid": "c7b18014c40034468f5a28182547c6b8", "score": "0.42656973", "text": "func (i InputMediaVenue) construct() InputMediaClass { return &i }", "title": "" }, { "docid": "fa0980add6068298f34e9192d91e9f63", "score": "0.4265258", "text": "func (*StaticService) BuildGenesis(_ *http.Request, args *BuildGenesisArgs, reply *BuildGenesisReply) error {\n\tparser, err := txs.NewParser([]fxs.Fx{\n\t\t&secp256k1fx.Fx{},\n\t\t&nftfx.Fx{},\n\t\t&propertyfx.Fx{},\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tg := Genesis{}\n\tgenesisCodec := parser.GenesisCodec()\n\tfor assetAlias, assetDefinition := range args.GenesisData {\n\t\tassetMemo, err := formatting.Decode(args.Encoding, assetDefinition.Memo)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"problem formatting asset definition memo due to: %w\", err)\n\t\t}\n\t\tasset := GenesisAsset{\n\t\t\tAlias: assetAlias,\n\t\t\tCreateAssetTx: txs.CreateAssetTx{\n\t\t\t\tBaseTx: txs.BaseTx{BaseTx: avax.BaseTx{\n\t\t\t\t\tNetworkID: uint32(args.NetworkID),\n\t\t\t\t\tBlockchainID: ids.Empty,\n\t\t\t\t\tMemo: assetMemo,\n\t\t\t\t}},\n\t\t\t\tName: assetDefinition.Name,\n\t\t\t\tSymbol: assetDefinition.Symbol,\n\t\t\t\tDenomination: byte(assetDefinition.Denomination),\n\t\t\t},\n\t\t}\n\t\tif len(assetDefinition.InitialState) > 0 {\n\t\t\tinitialState := &txs.InitialState{\n\t\t\t\tFxIndex: 0, // TODO: Should lookup secp256k1fx FxID\n\t\t\t}\n\t\t\tfor assetType, initialStates := range assetDefinition.InitialState {\n\t\t\t\tswitch assetType {\n\t\t\t\tcase \"fixedCap\":\n\t\t\t\t\tfor _, state := range initialStates {\n\t\t\t\t\t\tb, err := stdjson.Marshal(state)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn fmt.Errorf(\"problem marshaling state: %w\", err)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tholder := Holder{}\n\t\t\t\t\t\tif err := stdjson.Unmarshal(b, &holder); err != nil {\n\t\t\t\t\t\t\treturn fmt.Errorf(\"problem unmarshaling holder: %w\", err)\n\t\t\t\t\t\t}\n\t\t\t\t\t\t_, addrbuff, err := address.ParseBech32(holder.Address)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn fmt.Errorf(\"problem parsing holder address: %w\", err)\n\t\t\t\t\t\t}\n\t\t\t\t\t\taddr, err := ids.ToShortID(addrbuff)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn fmt.Errorf(\"problem parsing holder address: %w\", err)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tinitialState.Outs = append(initialState.Outs, &secp256k1fx.TransferOutput{\n\t\t\t\t\t\t\tAmt: uint64(holder.Amount),\n\t\t\t\t\t\t\tOutputOwners: secp256k1fx.OutputOwners{\n\t\t\t\t\t\t\t\tThreshold: 1,\n\t\t\t\t\t\t\t\tAddrs: []ids.ShortID{addr},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t})\n\t\t\t\t\t}\n\t\t\t\tcase \"variableCap\":\n\t\t\t\t\tfor _, state := range initialStates {\n\t\t\t\t\t\tb, err := stdjson.Marshal(state)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn fmt.Errorf(\"problem marshaling state: %w\", err)\n\t\t\t\t\t\t}\n\t\t\t\t\t\towners := Owners{}\n\t\t\t\t\t\tif err := stdjson.Unmarshal(b, &owners); err != nil {\n\t\t\t\t\t\t\treturn fmt.Errorf(\"problem unmarshaling Owners: %w\", err)\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tout := &secp256k1fx.MintOutput{\n\t\t\t\t\t\t\tOutputOwners: secp256k1fx.OutputOwners{\n\t\t\t\t\t\t\t\tThreshold: 1,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t}\n\t\t\t\t\t\tfor _, addrStr := range owners.Minters {\n\t\t\t\t\t\t\t_, addrBytes, err := address.ParseBech32(addrStr)\n\t\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\t\treturn fmt.Errorf(\"problem parsing minters address: %w\", err)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\taddr, err := ids.ToShortID(addrBytes)\n\t\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\t\treturn fmt.Errorf(\"problem parsing minters address: %w\", err)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tout.Addrs = append(out.Addrs, addr)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tout.Sort()\n\n\t\t\t\t\t\tinitialState.Outs = append(initialState.Outs, out)\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\treturn errUnknownAssetType\n\t\t\t\t}\n\t\t\t}\n\t\t\tinitialState.Sort(genesisCodec)\n\t\t\tasset.States = append(asset.States, initialState)\n\t\t}\n\t\tutils.Sort(asset.States)\n\t\tg.Txs = append(g.Txs, &asset)\n\t}\n\tutils.Sort(g.Txs)\n\n\tb, err := genesisCodec.Marshal(txs.CodecVersion, &g)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"problem marshaling genesis: %w\", err)\n\t}\n\n\treply.Bytes, err = formatting.Encode(args.Encoding, b)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"couldn't encode genesis as string: %w\", err)\n\t}\n\treply.Encoding = args.Encoding\n\treturn nil\n}", "title": "" }, { "docid": "f3d8e4aa0e21e204cf26b1cd600cb85e", "score": "0.42631245", "text": "func (i *index) Construct() {\n\tfound, err := i.minioClient.BucketExists(context.Background(),\"information-retrieval\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tif !found {\n\t\tlog.Fatal(\"information-retrieval bucket not found\")\n\t}\n\n\tctx, cancel := context.WithCancel(context.Background())\n\n\tdefer cancel()\n\n\tobjectCh := i.minioClient.ListObjects(ctx, \"information-retrieval\", minio.ListObjectsOptions{})\n\tfor object := range objectCh {\n\t\tif object.Err != nil {\n\t\t\tlog.Fatal(object.Err)\n\t\t}\n\t\tfmt.Println(object.Size)\n\t}\n\n\n\t//docs, err := ioutil.ReadDir(i.minioClient)\n\t//if err != nil {\n\t//\tlog.Fatal(err)\n\t//}\n\t//\n\t//for _, d := range docs {\n\t//\ti.construct(d.Name())\n\t//}\n\t//\n\t//return i.sortAlgorithm.Merge()\n}", "title": "" }, { "docid": "064d172496cdb98aee6f61006e26ff11", "score": "0.42629117", "text": "func Synthesize(w *Writer) error {\n\timgFns := []string{\n\t\t\"mnist/\",\n\t\t\"mnist/training/\",\n\t\t\"mnist/training/0/\",\n\t\t\"mnist/training/0/first.png\",\n\t\t\"mnist/training/0/second.png\",\n\t\t\"mnist/training/1/\",\n\t\t\"mnist/training/1/first.png\",\n\t\t\"mnist/training/1/second.png\",\n\t\t\"mnist/testing/\",\n\t\t\"mnist/testing/0/\",\n\t\t\"mnist/testing/0/first.png\",\n\t}\n\n\tvar buf bytes.Buffer\n\timg := vision.SynthesizeImage(2, 2, color.RGBA{0, 0, 255, 255})\n\tif e := png.Encode(&buf, img); e != nil {\n\t\treturn fmt.Errorf(\"Failed encoding PNG file: %v\", e)\n\t}\n\n\tfor _, fn := range imgFns {\n\t\tif strings.HasSuffix(fn, \"/\") { // A directory\n\t\t\thdr := &tar.Header{\n\t\t\t\tTypeflag: tar.TypeDir,\n\t\t\t\tName: fn,\n\t\t\t\tMode: 0600,\n\t\t\t}\n\n\t\t\tif e := w.WriteHeader(hdr); e != nil {\n\t\t\t\treturn fmt.Errorf(\"Failed writing header: %v\", e)\n\t\t\t}\n\t\t} else { // Regular file\n\t\t\thdr := &tar.Header{\n\t\t\t\tName: fn,\n\t\t\t\tMode: 0600,\n\t\t\t\tSize: int64(buf.Len()),\n\t\t\t}\n\n\t\t\tif e := w.WriteHeader(hdr); e != nil {\n\t\t\t\treturn fmt.Errorf(\"Failed writing header: %v\", e)\n\t\t\t}\n\t\t\tif _, e := w.Write([]byte(buf.Bytes())); e != nil {\n\t\t\t\treturn fmt.Errorf(\"Failed writing PNG encoding: %v\", e)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "dfc47c35818f09b440f68b03b6eccd3e", "score": "0.42562142", "text": "func (c *Source) Flow() {\n if c.output != nil {\n c.output.AddQuantity(c.power)\n }\n}", "title": "" }, { "docid": "63771b053a0d07c5539e3918d975ea47", "score": "0.42529964", "text": "func (ctm *ContractMgr) Construct(opts *bind.CallOpts, contractName string) (string, error) {\n\tret0 := new(string)\n\terr := ctm.Contract.Call(opts, ret0, contractName) // constructors have same name as contrct itself\n\treturn *ret0, err\n}", "title": "" }, { "docid": "662bafbc760da278e7fd223ee613ef82", "score": "0.42522585", "text": "func (t *TranslateFilter) Build(world api.IWorld) {\n\tt.Node.Build(world)\n}", "title": "" }, { "docid": "eb5caf703f61d72aa54a59fc03744ae7", "score": "0.4251786", "text": "func (s BuildService) Build(ctx context.Context, data []byte) (*Result, error) {\n\taid, err := storage.GetArtifactID(data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresult := &Result{FileName: aid.Ext(storage.ExtWasm)}\n\tisCached, err := s.storage.HasItem(aid)\n\tif err != nil {\n\t\ts.log.Errorw(\"failed to check cache\", \"artifact\", aid.String(), \"err\", err)\n\t\treturn nil, err\n\t}\n\n\tif isCached {\n\t\t// Just return precompiled result if data is cached already\n\t\ts.log.Debugw(\"build cached, returning cached file\", \"artifact\", aid.String())\n\t\treturn result, nil\n\t}\n\n\terr = s.storage.CreateLocationAndDo(aid, data, func(wasmLocation, sourceLocation string) error {\n\t\treturn s.buildSource(ctx, wasmLocation, sourceLocation)\n\t})\n\n\treturn result, err\n}", "title": "" }, { "docid": "5980fd62f7ea33df9b3d87c51d166c23", "score": "0.42488235", "text": "func (command S3ArtifactPublisherResource) Create(ctx context.Context, awsConfig awsv2.Config,\n\tevent *CloudFormationLambdaEvent,\n\tlogger *zerolog.Logger) (map[string]interface{}, error) {\n\n\ts3ArtifactPublisherRequest := S3ArtifactPublisherResourceRequest{}\n\tunmarshalErr := json.Unmarshal(event.ResourceProperties, &s3ArtifactPublisherRequest)\n\tif unmarshalErr != nil {\n\t\treturn nil, unmarshalErr\n\t}\n\tmapData, mapDataErr := json.Marshal(s3ArtifactPublisherRequest.Body)\n\tif mapDataErr != nil {\n\t\treturn nil, mapDataErr\n\t}\n\titemInput := bytes.NewReader(mapData)\n\ts3PutObjectParams := &awsv2S3.PutObjectInput{\n\t\tBody: itemInput,\n\t\tBucket: awsv2.String(s3ArtifactPublisherRequest.Bucket),\n\t\tKey: awsv2.String(s3ArtifactPublisherRequest.Key),\n\t}\n\ts3Svc := awsv2S3.NewFromConfig(awsConfig)\n\ts3Response, s3ResponseErr := s3Svc.PutObject(context.Background(), s3PutObjectParams)\n\tif s3ResponseErr != nil {\n\t\treturn nil, s3ResponseErr\n\t}\n\treturn map[string]interface{}{\n\t\t\"ObjectVersion\": s3Response.VersionId,\n\t}, nil\n}", "title": "" }, { "docid": "52c0dc6493070455cfd1c417ed93723d", "score": "0.42486385", "text": "func createAsset() {\n\tifn := flag.Args()[0]\n\tfmt.Printf(\"Processing %s --> %s\\n\", ifn, ifn+suffix)\n\tb, err := ioutil.ReadFile(ifn)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tif len(suffix) == 0 {\n\t\tpanic(\"Attempting to override the provided file - Suffix cannot be empty !\")\n\t}\n\tf, err := os.Create(ifn + suffix)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer f.Close()\n\tfmt.Fprintf(f,\n\t\t\"//Package %s contains autogenerated data\\n//Do not edit this file - automatically generated\\n//Source file : %s\\n//Generated on %v\",\n\t\tpackName,\n\t\tifn,\n\t\ttime.Now())\n\tfmt.Fprintf(f, \"\\npackage %s\\n//%s is the []byte slice\\nvar %s []byte\\nfunc init() {\",\n\t\tpackName,\n\t\tvarName,\n\t\tvarName)\n\tfmt.Fprintf(f, \"\\n%s = []byte{\", varName)\n\n\tfor i, a := range b {\n\t\tif i%20 == 0 {\n\t\t\tfmt.Fprintf(f, \"\\n\")\n\t\t}\n\t\tfmt.Fprintf(f, \"%d,\", a)\n\t}\n\tfmt.Fprintf(f, \"}}\\n\")\n}", "title": "" }, { "docid": "44a6fba4450dac9cd704337362127163", "score": "0.4246608", "text": "func Create(cfg Config, log logr.Logger) (result error) {\n\treader, err := cfg.Input()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to open input: %v\", err)\n\t}\n\n\tif closer, ok := reader.(io.Closer); ok {\n\t\tdefer closer.Close()\n\t}\n\n\tformats, err := cfg.Formats()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to setup output formatting: %v\", err)\n\t}\n\n\tfactory := format.NewFactory(formats, cfg.Encrypt(), log)\n\tdefer func() {\n\t\tif err := factory.Close(); err != nil && result == nil {\n\t\t\tresult = err\n\t\t}\n\t}()\n\n\twriter, err := shamir.NewWriter(cfg.Parts(), cfg.Threshold(), factory.Create)\n\tif nil != err {\n\t\treturn fmt.Errorf(\"failed to create processing pipeline: %v\", err)\n\t}\n\n\tif hashW, ok := cfg.InputInfo().(io.Writer); ok {\n\t\twriter = io.MultiWriter(hashW, writer)\n\t}\n\n\tif hashC, ok := cfg.InputInfo().(io.Closer); ok {\n\t\tdefer func() {\n\t\t\tif err := hashC.Close(); err != nil && result == nil {\n\t\t\t\tresult = err\n\t\t\t}\n\t\t}()\n\t}\n\n\tif _, err := io.Copy(writer, reader); nil != err {\n\t\tresult = fmt.Errorf(\"failed to process data: %v\", err)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "f145a1d85702d35794cafefc18bf8935", "score": "0.42383552", "text": "func (c MesosContainer) Build() *aurora.Container {\n\treturn &aurora.Container{Mesos: c.container}\n}", "title": "" }, { "docid": "54b90f1ed81ca83501d1e6efff480182", "score": "0.4236036", "text": "func (p PushMessageContentDocument) construct() PushMessageContentClass { return &p }", "title": "" }, { "docid": "8d15bea66046b9f3bedaf1dd86a52663", "score": "0.4234542", "text": "func (p *Plugin) Build(fn *function.Function, zip *archive.Archive) error {\n\tif fn.Runtime != RuntimeCanonical {\n\t\treturn nil\n\t}\n\n\tif fn.Environment != nil {\n\t\tfn.Log.Debug(\"creating properties file\")\n\t\tif err := p.generatePropertiesFile(fn); err != nil {\n\t\t\treturn errors.New(\"Can't generate properties file: \" + err.Error())\n\t\t}\n\t}\n\n\tfn.Log.Debug(\"creating jar\")\n\tmvnCmd := exec.Command(\"mvn\", \"package\", \"-Djar.finalName=\"+targetJarFile)\n\tmvnCmd.Dir = fn.Path\n\tif err := mvnCmd.Run(); err != nil {\n\t\treturn err\n\t}\n\n\texpectedJarPath := filepath.Join(fn.Path, \"target\", targetJarFile+\".jar\")\n\tif _, err := os.Stat(expectedJarPath); err != nil {\n\t\treturn errors.New(\"Expected jar file not found\")\n\t}\n\n\tfn.Log.Debug(\"appending compiled files\")\n\treader, err := azip.OpenReader(expectedJarPath)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer reader.Close()\n\n\tfor _, file := range reader.File {\n\t\tr, err := file.Open()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tb, err := ioutil.ReadAll(r)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tr.Close()\n\n\t\tzip.AddBytes(file.Name, b)\n\t}\n\n\tif err := p.cleanProperties(fn); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3c4eedea20f597e530bd81332d08960f", "score": "0.42298824", "text": "func (builder *OnBuild) Build(config *api.Config) (*api.Result, error) {\n\tbuildResult := &api.Result{}\n\n\tif config.BlockOnBuild {\n\t\tbuildResult.BuildInfo.FailureReason = utilstatus.NewFailureReason(\n\t\t\tutilstatus.ReasonOnBuildForbidden,\n\t\t\tutilstatus.ReasonMessageOnBuildForbidden,\n\t\t)\n\t\treturn buildResult, fmt.Errorf(\"builder image uses ONBUILD instructions but ONBUILD is not allowed\")\n\t}\n\tglog.V(2).Info(\"Preparing the source code for build\")\n\t// Change the installation directory for this config to store scripts inside\n\t// the application root directory.\n\tif err := builder.source.Prepare(config); err != nil {\n\t\treturn buildResult, err\n\t}\n\n\t// If necessary, copy the STI scripts into application root directory\n\tbuilder.copySTIScripts(config)\n\n\tglog.V(2).Info(\"Creating application Dockerfile\")\n\tif err := builder.CreateDockerfile(config); err != nil {\n\t\tbuildResult.BuildInfo.FailureReason = utilstatus.NewFailureReason(\n\t\t\tutilstatus.ReasonDockerfileCreateFailed,\n\t\t\tutilstatus.ReasonMessageDockerfileCreateFailed,\n\t\t)\n\t\treturn buildResult, err\n\t}\n\n\tglog.V(2).Info(\"Creating application source code image\")\n\ttarStream := builder.tar.CreateTarStreamReader(filepath.Join(config.WorkingDir, \"upload\", \"src\"), false)\n\tdefer tarStream.Close()\n\n\toutReader, outWriter := io.Pipe()\n\tgo io.Copy(os.Stdout, outReader)\n\n\topts := docker.BuildImageOptions{\n\t\tName: config.Tag,\n\t\tStdin: tarStream,\n\t\tStdout: outWriter,\n\t\tCGroupLimits: config.CGroupLimits,\n\t}\n\n\tglog.V(2).Info(\"Building the application source\")\n\tif err := builder.docker.BuildImage(opts); err != nil {\n\t\tbuildResult.BuildInfo.FailureReason = utilstatus.NewFailureReason(\n\t\t\tutilstatus.ReasonDockerImageBuildFailed,\n\t\t\tutilstatus.ReasonMessageDockerImageBuildFailed,\n\t\t)\n\t\treturn buildResult, err\n\t}\n\n\tglog.V(2).Info(\"Cleaning up temporary containers\")\n\tbuilder.garbage.Cleanup(config)\n\n\tvar imageID string\n\tvar err error\n\tif len(opts.Name) > 0 {\n\t\tif imageID, err = builder.docker.GetImageID(opts.Name); err != nil {\n\t\t\tbuildResult.BuildInfo.FailureReason = utilstatus.NewFailureReason(\n\t\t\t\tutilstatus.ReasonGenericS2IBuildFailed,\n\t\t\t\tutilstatus.ReasonMessageGenericS2iBuildFailed,\n\t\t\t)\n\t\t\treturn buildResult, err\n\t\t}\n\t}\n\n\treturn &api.Result{\n\t\tSuccess: true,\n\t\tWorkingDir: config.WorkingDir,\n\t\tResultInfo: api.OutputResultInfo{ImageID: imageID},\n\t}, nil\n}", "title": "" }, { "docid": "eb47ba57278294965b86bd7d38461422", "score": "0.42292544", "text": "func (v *Maker) Create(name string, param interface{}) (interface{}, error) {\n\tv.rw.RLock()\n\tmv, ok := v.makers[name]\n\tv.rw.RUnlock()\n\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"%s not found\", name)\n\t}\n\n\tvs, err := mv.Build(param)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvss := v.transform.Transform(vs)\n\n\treturn vss, nil\n}", "title": "" }, { "docid": "ae0eb1e5de4d8916c15085424eafd11a", "score": "0.4228773", "text": "func (ca *Cloud) Add(a Asset) Asset {\n\t// Cloud + Cloud = Cloud\n\tif that, ok := a.(*Cloud); ok {\n\t\tthis := ca.Clone().(*Cloud)\n\t\tthis.add(that)\n\t\treturn this\n\t}\n\n\tprops := ca.Properties.Merge(a.GetProperties())\n\tlabels := ca.Labels.Merge(a.GetLabels())\n\n\tstart := ca.Start\n\tif a.GetStart().Before(start) {\n\t\tstart = a.GetStart()\n\t}\n\tend := ca.End\n\tif a.GetEnd().After(end) {\n\t\tend = a.GetEnd()\n\t}\n\twindow := ca.Window.Expand(a.GetWindow())\n\n\t// Cloud + !Cloud = Any\n\tany := NewAsset(start, end, window)\n\tany.SetProperties(props)\n\tany.SetLabels(labels)\n\tany.Adjustment = ca.Adjustment + a.GetAdjustment()\n\tany.Cost = (ca.TotalCost() - ca.Adjustment) + (a.TotalCost() - a.GetAdjustment())\n\n\treturn any\n}", "title": "" }, { "docid": "9a51b4cb905f6eedaddeebb676184f8f", "score": "0.42284873", "text": "func (corSelf *CorDef[T]) New(effect func()) *CorDef[interface{}] {\n\treturn CorNewGenerics[interface{}](effect)\n}", "title": "" }, { "docid": "a239fe1abe216d93c1213f44f7f661f7", "score": "0.4227931", "text": "func (mesh Mesh) Build(shaderProgramHandle uint32) {\n\tmesh.vao.BuildBuffers(shaderProgramHandle)\n}", "title": "" }, { "docid": "7668c5aa041dfc6700eff0270d6dcd9d", "score": "0.42264327", "text": "func (p PushMessageContentMessageForwards) construct() PushMessageContentClass { return &p }", "title": "" }, { "docid": "6d2fb805e1b99c4d43fdcde4cc5d6bd5", "score": "0.42212394", "text": "func (a *AgentImage) Generate(dependencies asset.Parents) error {\n\tignition := &Ignition{}\n\tdependencies.Get(ignition)\n\n\tbaseImage := &BaseIso{}\n\tdependencies.Get(baseImage)\n\n\tignitionByte, err := json.Marshal(ignition.Config)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tignitionContent := &isoeditor.IgnitionContent{Config: ignitionByte}\n\tcustom, err := isoeditor.NewRHCOSStreamReader(baseImage.File.Filename, ignitionContent, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ta.imageReader = custom\n\ta.cpuArch = ignition.CPUArch\n\ta.rendezvousIP = ignition.RendezvousIP\n\n\treturn nil\n}", "title": "" }, { "docid": "ce596f53014a08cb80b86f0f69e093d6", "score": "0.4219886", "text": "func (wasm *Wasm) Perform(input models.RunResult, _ *store.Store) models.RunResult {\n\treturn input.WithError(fmt.Errorf(\"Wasm is not supported without SGX\"))\n}", "title": "" }, { "docid": "5c432b81408bc2b2d7681dce0b17f15f", "score": "0.4216106", "text": "func (s *Source) Assemble() (*asm.Object, *parser.ErrList) {\n\tret, errs := asm.Assemble(s.File, s.Reader)\n\tif errs != nil {\n\t\treturn nil, errs\n\t}\n\n\treturn ret, nil\n}", "title": "" }, { "docid": "79505b5cc7e6b5edb273eb6a769a78d2", "score": "0.42077863", "text": "func (c *jsiiProxy_CfnCloudFormationProvisionedProduct) OnSynthesize(session constructs.ISynthesisSession) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"onSynthesize\",\n\t\t[]interface{}{session},\n\t)\n}", "title": "" }, { "docid": "9c0505e4971a6f3209a8e2a9c9f43503", "score": "0.42053828", "text": "func (i InputMediaPhotoExternal) construct() InputMediaClass { return &i }", "title": "" }, { "docid": "62bba091a888291af3010e3e84025546", "score": "0.41885412", "text": "func Build() {\n\n\tcontainer.Set(\"config_yaml_file_writer\", func() interface{} {\n\t\tservice := domain.NewFileWriter(\n\t\t\t\"config\",\n\t\t\t\"services.yaml\",\n\t\t)\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"code_formatter\", func() interface{} {\n\t\tservice := &domain.CodeFormatter{}\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"yaml_file_reader\", func() interface{} {\n\t\tservice := parsers.NewYamlFileReader(\n\t\t\tmake(map[string]interface{}),\n\t\t)\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"autoload_file_writer\", func() interface{} {\n\t\tservice := domain.NewFileWriter(\n\t\t\t\"kernel/autoload\",\n\t\t\t\"autoload.go\",\n\t\t)\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"service_parser\", func() interface{} {\n\t\tservice := &parsers.Service{}\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"service_file_writer\", func() interface{} {\n\t\tservice := domain.NewFileWriter(\n\t\t\t\"kernel/services\",\n\t\t\t\"services.go\",\n\t\t)\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"container_file_writer\", func() interface{} {\n\t\tservice := domain.NewFileWriter(\n\t\t\t\"kernel/container\",\n\t\t\t\"container.go\",\n\t\t)\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"dispatcher_file_writer\", func() interface{} {\n\t\tservice := domain.NewFileWriter(\n\t\t\t\"kernel/event\",\n\t\t\t\"dispatcher.go\",\n\t\t)\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"container_builder\", func() interface{} {\n\t\tservice := builder.NewContainerBuilder(\n\t\t\tcontainer.Get(\"yaml_file_reader\").(*parsers.YamlFileReader),\n\t\t\tcontainer.Get(\"reference_parser\").(*parsers.Reference),\n\t\t\tcontainer.Get(\"service_parser\").(*parsers.Service),\n\t\t\tcontainer.Get(\"listener_generator\").(*generators.Listener),\n\t\t\tcontainer.Get(\"service_generator\").(*generators.Service),\n\t\t\tcontainer.Get(\"service_file_writer\").(*domain.FileWriter),\n\t\t\tcontainer.Get(\"code_formatter\").(*domain.CodeFormatter),\n\t\t)\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"service_generator\", func() interface{} {\n\t\tservice := &generators.Service{}\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"listener_generator\", func() interface{} {\n\t\tservice := &generators.Listener{}\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"reference_parser\", func() interface{} {\n\t\tservice := parsers.NewReference(\n\t\t\tmake(map[string]interface{}),\n\t\t\tcontainer.Get(\"yaml_file_reader\").(*parsers.YamlFileReader),\n\t\t)\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"test.my_listener\", func() interface{} {\n\t\tservice := &test.MyListener{}\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"project_starter_builder\", func() interface{} {\n\t\tservice := builder.NewProjectStarter(\n\t\t\tcontainer.Get(\"config_yaml_file_writer\").(*domain.FileWriter),\n\t\t\tcontainer.Get(\"service_file_writer\").(*domain.FileWriter),\n\t\t\tcontainer.Get(\"container_file_writer\").(*domain.FileWriter),\n\t\t\tcontainer.Get(\"dispatcher_file_writer\").(*domain.FileWriter),\n\t\t\tcontainer.Get(\"autoload_file_writer\").(*domain.FileWriter),\n\t\t\tcontainer.Get(\"code_formatter\").(*domain.CodeFormatter),\n\t\t)\n\n\t\treturn service\n\t})\n\n\tcontainer.Set(\"test.example_listener\", func() interface{} {\n\t\tservice := &test.ExampleListener{}\n\n\t\treturn service\n\t})\n\n\tevent.Add(\"show_info\", func(d *event.Data) {\n\t\tcontainer.Get(\"test.example_listener\").(*test.ExampleListener).ShowInfo(d)\n\t})\n\n\tevent.Add(\"show_info2\", func(d *event.Data) {\n\t\tcontainer.Get(\"test.my_listener\").(*test.MyListener).Show(d)\n\t})\n\n}", "title": "" }, { "docid": "10cfc88ca29a7d25141bdd6ed61f48d5", "score": "0.41863164", "text": "func (s *Solidifier) Setup() {\n\ts.tangle.Storage.Events.MessageStored.Attach(events.NewClosure(s.Solidify))\n}", "title": "" }, { "docid": "3a56914a5a451d4d163565d6593ff935", "score": "0.41862524", "text": "func (m MessageEntityStrike) construct() MessageEntityClass { return &m }", "title": "" }, { "docid": "3d479156cbe3e6a92480c0865210f49d", "score": "0.4186056", "text": "func (x *Format) Build(ctx context.Context, log elog.View, w io.WriteSeeker, b *vimg.Builder, cfg *vcfg.VCFG) error {\n\n\tp := log.NewProgress(fmt.Sprintf(\"Initializing %s image file\", x), \"\", 0)\n\tdefer p.Finish(false)\n\n\tw, err := buildFuncs[*x](w, b, cfg)\n\tif err != nil {\n\t\treturn err\n\t}\n\tcloser, ok := w.(io.Closer)\n\tif ok {\n\t\tdefer closer.Close()\n\t}\n\n\tp.Finish(true)\n\n\terr = b.Build(ctx, w)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "7d7771897655ebb415f9cd7747982c31", "score": "0.41742513", "text": "func (g *Generator) Generate() error {\n\tg.generated = &PluginData{\n\t\tPackage: g.Pack,\n\t}\n\n\tg.finalImports = make(map[string]Import)\n\n\t// Add references\n\tfor _, action := range g.found {\n\t\t// Get the receiver.\n\t\tif action.fn.Recv == nil || action.fn.Recv.NumFields() < 1 {\n\t\t\tcontinue\n\t\t}\n\n\t\tvar rcvTargetName string\n\n\t\tswitch v := action.fn.Recv.List[0].Type.(type) {\n\t\tcase *ast.Ident:\n\t\t\trcvTargetName = v.Name\n\t\tcase *ast.StarExpr:\n\t\t\trcvTargetName = v.X.(*ast.Ident).Name\n\t\tdefault:\n\t\t\treturn checkpoint.From(errors.New(\"receiver type not supported\"))\n\t\t}\n\n\t\timportPath := filepath.ToSlash(filepath.Join(g.Module, action.path))\n\t\tfakeName, err := g.addImport(importPath, []Import{\n\t\t\t{\n\t\t\t\tFakeName: \"\",\n\t\t\t\tName: action.pack.Name,\n\t\t\t\tPath: importPath,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn checkpoint.From(err)\n\t\t}\n\n\t\trefName := strings.ToUpper(string(fakeName[0])) + fakeName[1:] + rcvTargetName + \"Ref\"\n\t\trefType := fakeName + \".\" + rcvTargetName\n\n\t\tfound := false\n\t\tfor _, ref := range g.generated.References {\n\t\t\tif ref.Name == refName {\n\t\t\t\tfound = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif !found {\n\t\t\tg.generated.References = append(g.generated.References, Reference{\n\t\t\t\tName: refName,\n\t\t\t\tType: refType,\n\t\t\t})\n\t\t}\n\n\t\t// Generate actions.\n\t\tactionData := Action{\n\t\t\tName: action.fn.Name.Name,\n\t\t\tComment: action.comment,\n\t\t\tRef: refName,\n\t\t}\n\n\t\t// Add parameters.\n\t\tfor _, param := range action.fn.Type.Params.List {\n\t\t\tparamType, err := g.mapParamType(param.Type, action, fakeName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tactionData.Request = append(actionData.Request, Param{\n\t\t\t\tName: param.Names[0].Name,\n\t\t\t\tNamePublic: strings.ToUpper(string(param.Names[0].Name[0])) + param.Names[0].Name[1:],\n\t\t\t\tType: paramType,\n\t\t\t})\n\n\t\t}\n\n\t\t// Add response.\n\t\tfor i, res := range action.fn.Type.Results.List {\n\t\t\tif i == len(action.fn.Type.Results.List)-1 {\n\t\t\t\t// As the last return type has to be an error and that\n\t\t\t\t// is handled separately, ignore it.\n\t\t\t\t// TODO: Add check if the last is really an error\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tresType, err := g.mapParamType(res.Type, action, fakeName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tname := \"\"\n\t\t\tif len(res.Names) >= 1 {\n\t\t\t\tname = res.Names[0].Name\n\t\t\t} else {\n\t\t\t\tname = \"res\" + strconv.Itoa(i)\n\t\t\t}\n\n\t\t\tactionData.Response = append(actionData.Response, Param{\n\t\t\t\tName: name,\n\t\t\t\tNamePublic: strings.ToUpper(string(name[0])) + name[1:],\n\t\t\t\tType: resType,\n\t\t\t})\n\t\t}\n\n\t\tg.generated.Actions = append(g.generated.Actions, actionData)\n\t}\n\n\tfor _, imp := range g.finalImports {\n\t\tg.generated.Imports = append(g.generated.Imports, imp)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "162f6231384d534f8ba0eab32b766916", "score": "0.4172709", "text": "func Constructor() MyStack {\n\tqa, qb := NewQueue(), NewQueue()\n\treturn MyStack{queueA: qa, queueB: qb}\n}", "title": "" }, { "docid": "ddd714f696ed3c6de3f1ac0e43475f7b", "score": "0.41701868", "text": "func (b *Builder) Build() (string, error) {\n\tvar (\n\t\texecuteTimer = b.cliLog.StartTimer(\"\\nTotal\")\n\t\terr error\n\t\timageID string\n\t)\n\n\t// 6. defer cleanup\n\tdefer func() {\n\t\tb.cleanup()\n\t}()\n\n\t// 1. parseFiles\n\tif err = b.parseFiles(); err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// 2. pre-handle Playbook\n\tif err = b.newStageBuilders(); err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// 3. loop StageBuilders for building\n\tfor _, stage := range b.stageBuilders {\n\t\tstageTimer := b.cliLog.StartTimer(fmt.Sprintf(\"Stage %d\", stage.position))\n\t\t// update FROM from name to imageID if it is based on previous stage\n\t\tif idx := stage.fromStageIdx; idx != -1 {\n\t\t\tstage.fromImage = b.stageBuilders[idx].imageID\n\t\t}\n\n\t\timageID, err = stage.stageBuild(b.ctx)\n\t\tb.cliLog.StopTimer(stageTimer)\n\t\tb.Logger().Debugln(b.cliLog.GetCmdTime(stageTimer))\n\t\tif err != nil {\n\t\t\tb.Logger().Errorf(\"Builder[%s] build for stage[%s] failed for: %v\", b.buildID, stage.name, err)\n\t\t\treturn \"\", errors.Wrapf(err, \"building image for stage[%s] failed\", stage.name)\n\t\t}\n\t}\n\n\t// 4. export images\n\tif err = b.export(imageID); err != nil {\n\t\treturn \"\", errors.Wrapf(err, \"exporting images failed\")\n\t}\n\n\t// 5. output imageID\n\tif err = b.writeImageID(imageID); err != nil {\n\t\treturn \"\", errors.Wrapf(err, \"writing image ID failed\")\n\t}\n\n\tb.cliLog.StopTimer(executeTimer)\n\tb.Logger().Debugf(\"Time Cost:\\n%s\", b.cliLog.Summary())\n\treturn imageID, nil\n}", "title": "" }, { "docid": "19b76183c9d278ff558c9e9055e16e69", "score": "0.4169188", "text": "func Constructor() MyStack {\n\tstack := MyStack{&Queue{}, &Queue{}}\n\treturn stack\n}", "title": "" }, { "docid": "e5057a7047e19cf23df3adaf3ee9ad6d", "score": "0.41674805", "text": "func (pack *Ark) New() (ret Experimenter, err error) {\r\n\treturn pack.NewUniverse()\r\n}", "title": "" } ]
39413c17ed8d9710d3528885f4718daf
loggerHandler logs the HTTP requests
[ { "docid": "f4017175427edabc224f4834a935f097", "score": "0.71091276", "text": "func loggerHandler(inner http.Handler, name string) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\n\t\tsw := statusWriter{ResponseWriter: w}\n\t\tinner.ServeHTTP(&sw, r)\n\n\t\tlog.Infof(\"%s %s %s %s => %d %d bytes\",\n\t\t\tr.Method,\n\t\t\tr.RequestURI,\n\t\t\tname,\n\t\t\ttime.Since(start),\n\t\t\tsw.status,\n\t\t\tsw.length,\n\t\t)\n\t})\n}", "title": "" } ]
[ { "docid": "f31ca2aa8fbf8921662f882ede37ca06", "score": "0.7935703", "text": "func (s Server) logger(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\trw := newAppResponseWriter(w)\n\n\t\tstart := time.Now()\n\t\tdefer func() {\n\t\t\ti := log.Info()\n\n\t\t\thost, _, err := net.SplitHostPort(r.RemoteAddr)\n\t\t\tif err != nil {\n\t\t\t\ti.Err(err)\n\t\t\t}\n\n\t\t\ti.Str(\"ip\", host).\n\t\t\t\tStr(\"startAt\", start.String()).\n\t\t\t\tStr(\"method\", r.Method).\n\t\t\t\tStr(\"path\", r.URL.Path).\n\t\t\t\tStr(\"proto\", r.Proto).\n\t\t\t\tInt(\"status\", rw.statusCode).\n\t\t\t\tTimeDiff(\"latency\", time.Now(), start)\n\n\t\t\tif len(r.UserAgent()) > 0 {\n\t\t\t\ti.Str(\"userAgent\", r.UserAgent())\n\t\t\t}\n\n\t\t\ti.Msg(\"http-request\")\n\t\t}()\n\n\t\thandler.ServeHTTP(rw, r)\n\t})\n}", "title": "" }, { "docid": "1b8fe0f79a5081738c5c5bb41782d3be", "score": "0.77880025", "text": "func RequestLoggingHandler(w http.ResponseWriter, r *http.Request, next http.HandlerFunc) {\n\tres := w.(negroni.ResponseWriter)\n\tnext(w, r)\n\tlogrus.Info(fmt.Sprintf(\"%s %s %d\", r.Method, r.RequestURI, res.Status()))\n}", "title": "" }, { "docid": "f84d4a34a607560533c08d2b4bf43481", "score": "0.7775722", "text": "func logger(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Println(\"request: \" + r.RequestURI)\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "566c8cd1c3add500164e65fc435babfd", "score": "0.7750031", "text": "func httpLogger(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"%s %s %s\", r.RemoteAddr, r.Method, r.URL)\n\t\thandler.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "101418ff2fa178255be77d1d88c6e940", "score": "0.76655114", "text": "func (h Handlers) LoggingHandler(next http.Handler) http.Handler {\r\n\tfn := func(w http.ResponseWriter, r *http.Request) {\r\n\t\tvar t1, t2 time.Time\r\n\t\tif h.debugmode {\r\n\t\t\tlog.Println(\"############ SERVING REQUEST: \" + r.Method + \" \" + r.URL.String())\r\n\t\t\tlog.Println(\"FULL REQUEST: \")\r\n\t\t\t// Save a copy of this request for debugging.\r\n\t\t\trequestDump, err := httputil.DumpRequest(r, false)\r\n\t\t\tif err != nil {\r\n\t\t\t\tlog.Println(err)\r\n\t\t\t}\r\n\t\t\tlog.Println(string(requestDump))\r\n\t\t\tt1 = time.Now()\r\n\t\t}\r\n\t\tnext.ServeHTTP(w, r)\r\n\t\tif h.debugmode {\r\n\t\t\tt2 = time.Now()\r\n\t\t\tlog.Printf(\"############ DONE SERVING [%s] %q in %v\\n\", r.Method, r.URL.String(), t2.Sub(t1))\r\n\t\t}\r\n\t}\r\n\treturn http.HandlerFunc(fn)\r\n}", "title": "" }, { "docid": "e33874ea3eee2f16c13382e3aecbd9bd", "score": "0.7619411", "text": "func LoggingHandler(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tfields := map[string]interface{}{\n\t\t\t\"remote_ip\": r.RemoteAddr,\n\t\t\t\"http_uri\": r.URL.Path,\n\t\t\t\"http_referer\": r.Referer(),\n\t\t\t\"http_user_agent\": r.UserAgent(),\n\t\t\t\"http_method\": r.Method,\n\t\t\t\"http_proto\": r.Proto,\n\t\t}\n\t\taccessLogger := log.GetLoggerWithFields(\"api\", fields)\n\t\taccessLogger.Info(\"Incoming request\")\n\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "40e29c80057109f3ad6f5b7be7b24ec3", "score": "0.7592918", "text": "func LogHandler(res http.ResponseWriter, req *http.Request) {\n requestURI := req.RequestURI\n log.Printf(\"RequestURI is %s\\n\", requestURI)\n result := strconv.QuoteToASCII(requestURI)\n\n var log_endpoint string\n var err error\n if log_endpoint, err = GetLogEndpoint(); err != nil {\n log.Fatal(err)\n }\n url := \"http://\" + log_endpoint + \"/\" + result\n log.Printf(\"URL is %v\\n\", url)\n\n req, err = http.NewRequest(\"GET\", url, nil)\n\n cli := &http.Client{}\n response, err := cli.Do(req)\n defer response.Body.Close()\n if err != nil {\n log.Fatal(err)\n }\n\n\tif response.StatusCode != 200 {\n\t\tlog.Printf(\"Got Error response: %s\\n\", response.Status)\n\t\terrorMsg := ErrorResponse{Error: response.Status}\n\t\tif err := json.NewEncoder(res).Encode(errorMsg); err != nil {\n\t\t\tlog.Panic(err)\n\t\t}\n\t} else {\n\t\tcontents, err := ioutil.ReadAll(response.Body)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tlog.Printf(\"Got Successful response: %s\\n\", string(contents))\n\t\tres.Write(contents)\n\t}\n}", "title": "" }, { "docid": "84aedc05fbd8992a6effef2cac60a807", "score": "0.75588465", "text": "func Logger(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(res http.ResponseWriter, req *http.Request) {\n\t\tfmt.Printf(\"[ %s ] :: %s :: %v\\n\", req.Method, req.URL, time.Now())\n\t\tnext.ServeHTTP(res, req)\n\t})\n}", "title": "" }, { "docid": "366097e184b027c21d4d3f772bacfada", "score": "0.7546016", "text": "func Logger(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"%s \\\"%s %s %s\\\" %d\\n\", r.RemoteAddr, r.Method, r.RequestURI, r.Proto, r.ContentLength)\n\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "200a80fb67d520cb8a6321d56c40bc84", "score": "0.74988574", "text": "func logger(next http.HandlerFunc) http.HandlerFunc {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\twi := &interceptor{delegate: w}\n\t\tdefer func() {\n\t\t\tlog.Println(r.RemoteAddr, \" \", r.Method, \" \", r.RequestURI, \" \", r.Proto, \" \", wi.Status, \" \", wi.Bytes)\n\t\t}()\n\t\tnext.ServeHTTP(wi, r)\n\t})\n}", "title": "" }, { "docid": "5532aa7b56cc4428ea610fd2eaaa2a91", "score": "0.749231", "text": "func (h *HomeHandlers) Logger(next http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tstartTime := time.Now()\n\t\tdefer h.logger.Printf(\"request processed in %d ms \\n\", time.Now().Sub(startTime))\n\t\tnext(w, r)\n\t}\n}", "title": "" }, { "docid": "c63a777f217793ccbddc716ce3c49bdd", "score": "0.7481771", "text": "func Logger(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\t\tww := middleware.NewWrapResponseWriter(w, r.ProtoMajor)\n\t\thost, port, _ := net.SplitHostPort(r.RemoteAddr)\n\t\tdefer func() {\n\t\t\tvar event *zerolog.Event\n\t\t\tif ww.Status() < 500 {\n\t\t\t\tevent = log.Info()\n\t\t\t} else {\n\t\t\t\tevent = log.Error()\n\t\t\t}\n\t\t\tevent.\n\t\t\t\tFields(map[string]interface{}{\n\t\t\t\t\t\"host\": host,\n\t\t\t\t\t\"port\": port,\n\t\t\t\t\t\"method\": r.Method,\n\t\t\t\t\t\"status\": ww.Status(),\n\t\t\t\t\t\"took\": float64(time.Since(start)) / 1e6,\n\t\t\t\t\t\"bytes_in\": r.Header.Get(\"Content-Length\"),\n\t\t\t\t\t\"bytes_out\": ww.BytesWritten(),\n\t\t\t\t}).\n\t\t\t\tTimestamp().\n\t\t\t\tMsg(r.URL.Path)\n\t\t}()\n\t\tnext.ServeHTTP(ww, r)\n\t})\n}", "title": "" }, { "docid": "0665595d6d10766bc05fed56a35334fa", "score": "0.74767673", "text": "func logHandler(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\t\twriter := &responseWriter{w, 0, 0}\n\t\thandler.ServeHTTP(writer, r)\n\t\tend := time.Now()\n\t\tlatency := end.Sub(start)\n\t\tlog.Printf(\"%s [%v] \\\"%s %s %s\\\" %d %d \\\"%s\\\" %v\\n\",\n\t\t\tr.RemoteAddr, end.Format(time.RFC1123Z),\n\t\t\tr.Method, r.URL.Path, r.Proto,\n\t\t\twriter.status, writer.size, r.Header.Get(\"User-Agent\"), latency)\n\t})\n}", "title": "" }, { "docid": "06c28cc446f9608aed1658a49a5aa69d", "score": "0.74737203", "text": "func loggingHandler(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tp := r.URL.Path\n\t\tnext.ServeHTTP(w, r)\n\t\tlog.Printf(\"%s %s\", r.Method, p)\n\t})\n}", "title": "" }, { "docid": "9f88dfba823b55185d108d624b9ec12f", "score": "0.74696743", "text": "func responseLogger(handler http.HandlerFunc) http.HandlerFunc {\n\treturn func (w http.ResponseWriter, r *http.Request){\n\t\tlog.Printf(\"\\n%s %s%s %s\",r.Method, r.Host, r.RequestURI, r.Proto )\n\t\thandler(w,r)\n\t}\n}", "title": "" }, { "docid": "fdb89648afe507dd99c2aca9a2abe40a", "score": "0.7462313", "text": "func logger(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tformat := \"[%s] User agent => %s Remote addr => %s\"\n\t\tlog.Printf(format, r.Method, r.UserAgent(), r.RemoteAddr)\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "a4596c1d7ea1e90188a3883c184c0d91", "score": "0.7447197", "text": "func log(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request){\n\t\tfmt.Printf(\"Handler called: %T\\n\", h)\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "211c97c54bddd0464c74cffd0abed181", "score": "0.74352574", "text": "func Log(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(res http.ResponseWriter, req *http.Request) {\n\t\tfmt.Println(req)\n\t\thandler.ServeHTTP(res, req)\n\t})\n}", "title": "" }, { "docid": "573943f824b14d00865909250052cfde", "score": "0.74317735", "text": "func Logger(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"[%s] [%s] %s\", r.RemoteAddr, r.Method, r.URL.String())\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "8b9588f8ad24c81fc791dfaf480544a1", "score": "0.7404505", "text": "func Logging(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"[%v] : %v\\n\", r.Method, r.URL.Path)\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "4e5226ec0887231a74fe929f11502c93", "score": "0.7396602", "text": "func loggingHandler(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tt1 := time.Now()\n\t\tnext.ServeHTTP(w, r)\n\t\tt2 := time.Now()\n\t\tip := getIPAddress(r)\n\t\tlog.Printf(\"[%s] %s %q %v\\n\", ip, r.Method, r.RequestURI, t2.Sub(t1))\n\t}\n\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "ee37dba43bee6c44de1bac8d80a497cf", "score": "0.73891413", "text": "func Logging(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlogrus.WithField(\"path\", r.RequestURI).\n\t\t\tWithField(\"method\", r.Method).\n\t\t\tWithField(\"request_id\", GetRequestID(r.Context())).\n\t\t\tDebug(\"Request arrived\")\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "de22d60d99212e3331cf214f4c081e31", "score": "0.738682", "text": "func Logger(router *chi.Mux) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tfmt.Println(time.Now(), r.Method, r.URL) //example: 2020-07-06 09:32:44.634333 +0200 CEST m=+22.456178180 GET /posts\n\t\trouter.ServeHTTP(w, r) // dispatch the request, we are dispatching the request to the router, which is who has the handlers to serve the request\n\t})\n}", "title": "" }, { "docid": "24ac4688243e20a76adfb0ac2b205b72", "score": "0.7386357", "text": "func RequestLogger(h http.Handler) http.Handler {\n\tf := func(w http.ResponseWriter, r *http.Request) {\n\t\trw := &responseWriter{w, 0}\n\t\th.ServeHTTP(rw, r)\n\t\tlog.EntryFromContext(r.Context()).WithFields(logrus.Fields{\n\t\t\t\"http-status\": fmtResponseCode(rw.statusCode),\n\t\t}).Infof(\"incoming request\")\n\t}\n\treturn http.HandlerFunc(f)\n}", "title": "" }, { "docid": "4dc36d6b4d63df24b2ee510d4093771d", "score": "0.7383617", "text": "func httpLogger(r *http.Request, created time.Time, status, bytes int) {\n\t//fmt.Println(httpxtra.ApacheCommonLog(r, created, status, bytes))\n\n\tlog.Printf(\"%s %d %s %q (%s) :: %d bytes in %s%s\",\n\t\tlogProto(r),\n\t\tstatus,\n\t\tr.Method,\n\t\tr.URL.Path,\n\t\tremoteIP(r),\n\t\tbytes,\n\t\ttime.Since(created),\n\t\tlogMsg(r),\n\t)\n}", "title": "" }, { "docid": "a326f91fcc0ec6ce3f76bb7c9375ea82", "score": "0.73814875", "text": "func logger(inner http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t// Mark time at which request was received.\n\t\tvar start = time.Now()\n\t\t// Handle request.\n\t\tinner.ServeHTTP(w, r)\n\t\t// Log request with time elapsed.\n\t\tlog.Printf(\"%s\\t%s\\t%s\", r.Method, r.RequestURI, time.Since(start))\n\t})\n}", "title": "" }, { "docid": "92dfd077b67c9b6b6e3e44432196d418", "score": "0.7380184", "text": "func loggingHandler(writer io.Writer, next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\n\t\t// Create a response wrapper:\n\n\t\t// switch out response writer for a recorder\n\t\t// for all subsequent handlers\n\t\tc := httptest.NewRecorder()\n\n\t\tnext.ServeHTTP(c, req)\n\t\t// log\n\t\tresp := c.Result()\n\t\tbody, _ := ioutil.ReadAll(resp.Body)\n\n\t\t// copy everything from response recorder\n\t\t// to actual response writer\n\t\tfor k, v := range c.HeaderMap {\n\t\t\tw.Header()[k] = v\n\t\t}\n\t\tw.WriteHeader(c.Code)\n\t\tc.Body.WriteTo(w)\n\n\t\t// write log information\n\t\thost, _, err := net.SplitHostPort(req.RemoteAddr)\n\t\tif err != nil {\n\t\t\thost = req.RemoteAddr\n\t\t}\n\t\tusername := \"-\"\n\t\tif url.User != nil {\n\t\t\tif name := req.URL.User.Username(); name != \"\" {\n\t\t\t\tusername = name\n\t\t\t}\n\t\t}\n\n\t\tfmt.Fprintf(writer, \"%s - %s [%v] \\\"%s %s %s\\\" %d %d\\n\", host, username, time.Now().Format(timeFMT), req.Method, req.RequestURI, req.Proto, resp.StatusCode, len(body))\n\t})\n}", "title": "" }, { "docid": "152e8e3bae553c401d5e7bb350ab0a1a", "score": "0.73748714", "text": "func logRequest(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"%s %s %s\\n\", r.RemoteAddr, r.Method, r.URL)\n\t\thandler.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "50a5327ee3b12a3ff5051ea8ff8698c7", "score": "0.7369549", "text": "func (app *application) logRequest(next http.Handler) http.Handler {\r\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\r\n\t\tapp.infoLog.Printf(\"%s - %s %s %s\", r.RemoteAddr, r.Proto, r.Method, r.URL.RequestURI())\r\n\r\n\t\tnext.ServeHTTP(w, r)\r\n\t})\r\n}", "title": "" }, { "docid": "3e4dc8a21b0e9290ee226acda7439291", "score": "0.7368642", "text": "func LogHandler(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\ttIni := time.Now()\n\t\trw := &responseWriter{w: w}\n\t\tnext.ServeHTTP(rw, r)\n\t\ttEnd := time.Now()\n\t\tlog.Printf(\"%v [%s] %q %v %v %v\\n\", r.RemoteAddr, r.Method, r.URL.String(), rw.Size(), rw.Status(), tEnd.Sub(tIni))\n\t}\n\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "2a5baf4bdfb2ea9c8ed05355d0b6ee9b", "score": "0.73523104", "text": "func Log(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tcclog.Info.Printf(\"%s %s %s\", r.RemoteAddr, r.Method, r.URL)\n\t\thandler.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "c6bbb03ec727fc97ba89434d86850cc6", "score": "0.7338537", "text": "func Logger(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Infof(\"logging: request middleware\")\n\t\tnext.ServeHTTP(w, r)\n\t\tlog.Infof(\"logging: response middleware\")\n\t})\n}", "title": "" }, { "docid": "9e17b6e9339d406525d571bc40dec16d", "score": "0.7320236", "text": "func Log(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"%s %s %s\", r.RemoteAddr, r.Method, r.URL)\n\t\thandler.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "201ddcbc0006f04b277850076182c339", "score": "0.7314512", "text": "func (h *Handlers) Logger(next http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tstartTime := time.Now()\n\t\tnext(w, r)\n\t\th.logger.Printf(\"request processed in %vs\\n\", time.Now().Sub(startTime))\n\t}\n}", "title": "" }, { "docid": "239fcc450a18ccdb1157551edd06733f", "score": "0.73093206", "text": "func Logger(nextFunc http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\" %s %s %s\", r.Method, r.RequestURI, r.Host)\n\n\t\tnextFunc(w, r)\n\t}\n}", "title": "" }, { "docid": "0c1c3544a739b403616360b5f5c74c3d", "score": "0.72953236", "text": "func LoggingHandler(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\twriter := statusWriter{w, 0, 0}\n\t\traddr, _, err := net.SplitHostPort(r.RemoteAddr)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t\treturn\n\t\t}\n\t\th.ServeHTTP(&writer, r)\n\t\tlog.Println(fmt.Sprintf(\n\t\t\t\"%s %d %d \\\"%s %s %s\\\" %s\",\n\t\t\traddr, writer.status, writer.length,\n\t\t\tr.Method, r.URL.String(), r.Proto, r.UserAgent()))\n\t})\n}", "title": "" }, { "docid": "6b80ae56828705c02a99601db5839444", "score": "0.7288597", "text": "func logHandler(wrapped fetchbot.Handler) fetchbot.Handler {\n\treturn fetchbot.HandlerFunc(func(ctx *fetchbot.Context, res *http.Response, err error) {\n\t\tif err == nil {\n\t\t\tlogger.Info.Printf(\"%s [%d] %s - %s\", ctx.Cmd.Method(), res.StatusCode, ctx.Cmd.URL(), res.Header.Get(\"Content-Type\"))\n\t\t}\n\t\twrapped.Handle(ctx, res, err)\n\t})\n}", "title": "" }, { "docid": "7a0e6e7da16d26e1fe2d61b96b20e73f", "score": "0.728772", "text": "func (srv *WebServer) logRequest(next http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tfmt.Printf(\"%s %s\\n\", r.Method, r.RequestURI)\n\t\tnext(w, r)\n\t}\n}", "title": "" }, { "docid": "0df28631df781ecfbb9428282fe8da0b", "score": "0.7277961", "text": "func (m Middleware) LoggingHandler(rw http.ResponseWriter, r *http.Request, next http.HandlerFunc) {\n\t//FIXME: broken\n\tt1 := time.Now()\n\tnext.ServeHTTP(rw, r)\n\tt2 := time.Now()\n\tlog.Printf(\"[%s] %q %v\", r.Method, r.URL.String(), t2.Sub(t1))\n\tnext(rw, r)\n}", "title": "" }, { "docid": "cb8ce57f5357c38c0a555a9941aa0df5", "score": "0.7260412", "text": "func Logger(next http.Handler) http.HandlerFunc {\n\tstdlogger := log.New(os.Stdout, \"\", 0)\n\t//errlogger := log.New(os.Stderr, \"\", 0)\n\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\t// Start timer\n\t\tstart := time.Now()\n\n\t\t// Process request\n\t\twriter := statusWriter{w, 0}\n\t\tnext.ServeHTTP(&writer, r)\n\n\t\t// Stop timer\n\t\tend := time.Now()\n\t\tlatency := end.Sub(start)\n\n\t\tclientIP := r.RemoteAddr\n\t\tmethod := r.Method\n\t\tstatusCode := writer.status\n\t\tstatusColor := colorForStatus(statusCode)\n\t\tmethodColor := colorForMethod(method)\n\n\t\tstdlogger.Printf(\"[HTTP] %v |%s %3d %s| %12v | %s |%s %s %-7s %s\\n\",\n\t\t\tend.Format(\"2006/01/02 - 15:04:05\"),\n\t\t\tstatusColor, statusCode, reset,\n\t\t\tlatency,\n\t\t\tclientIP,\n\t\t\tmethodColor, reset, method,\n\t\t\tr.URL.Path,\n\t\t)\n\t}\n}", "title": "" }, { "docid": "fadafc53ba26569b361eb60e0a379fb9", "score": "0.7254764", "text": "func logRequests(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tvar source string\n\t\tif isExternal(r) {\n\t\t\tsource = \"external\"\n\t\t} else {\n\t\t\tsource = \"internal\"\n\t\t}\n\t\tlog.Println(source, r.Method, r.RequestURI)\n\t\t// Call the next handler, which can be another middleware in the chain, or the final handler.\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "a351f486189eae3054e2f09887ff3e5f", "score": "0.72526526", "text": "func Logger(next http.Handler, name string) http.Handler {\n\t// returns handler function\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t// start time\n\t\tstart := time.Now()\n\n\t\t// run the handler\n\t\tnext.ServeHTTP(w, r)\n\n\t\t// log the request details\n\t\tlog.Printf(\n\t\t\t\"%s\\t%s\\t%s\\t%s\",\n\t\t\tr.Method,\n\t\t\tr.RequestURI,\n\t\t\tname,\n\t\t\ttime.Since(start),\n\t\t)\n\t})\n}", "title": "" }, { "docid": "3f59ab0749fb2188c48d565936d6b8ee", "score": "0.72512627", "text": "func Logger(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\t\t//wrap the response writer to get the status code\n\t\t//cant access status code from http.ResponseWriter\n\t\tnrw := NewResponseWriter(w)\n\t\t//call the next handler\n\t\tnext.ServeHTTP(nrw, r)\n\t\t//response := w.(ResponseWriter)\n\n\t\tls := &loggerStruct{\n\t\t\tStartTime: start.Format(time.RFC3339),\n\t\t\tStatus: nrw.Status(),\n\t\t\tDuration: time.Since(start),\n\t\t\tHostName: r.Host,\n\t\t\tMethod: r.Method,\n\t\t\tPath: r.URL.Path,\n\t\t}\n\n\t\tt := template.New(\"logger_template\")\n\t\ttem := template.Must(t.Parse(loggerTemplate))\n\n\t\tbuf := &bytes.Buffer{}\n\t\ttem.Execute(buf, ls)\n\n\t\tlog.Println(html.UnescapeString(buf.String()))\n\t})\n}", "title": "" }, { "docid": "89ca23e2f02593aebdca46f02e73316a", "score": "0.7250674", "text": "func logHandler(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\thost, _, err := net.SplitHostPort(r.RemoteAddr)\n\t\tif err != nil {\n\t\t\thost = r.RemoteAddr\n\t\t}\n\t\tlog.Printf(\"%s %s %s\\n\", host, r.Method, r.URL.RequestURI())\n\t\thandler.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "c202bf150cbb29fe40cf1669254defbc", "score": "0.7249504", "text": "func loggingHandler(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tt1 := time.Now()\n\t\tnext.ServeHTTP(w, r)\n\t\tt2 := time.Now()\n\t\tlog.Printf(\"[%s] %q %v\\n\", r.Method, r.URL.String(), t2.Sub(t1))\n\t}\n\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "ed25d1a30f1601ba1a76f498e6816345", "score": "0.7246144", "text": "func (handler *Handler) RequestLogger(targetMux http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\n\t\ttargetMux.ServeHTTP(w, r)\n\n\t\t// log request by who(IP address)\n\t\trequesterIP := r.RemoteAddr\n\n\t\tlog.Printf(\n\t\t\t\"%s\\t%s\\t%s\\t%v\",\n\t\t\tr.Method,\n\t\t\tr.RequestURI,\n\t\t\trequesterIP,\n\t\t\ttime.Since(start),\n\t\t)\n\t})\n}", "title": "" }, { "docid": "6b1fb596d5ee1daa09b721fac8e4cec9", "score": "0.72439903", "text": "func Logging(h http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tfmt.Printf(\"Received request: %v %v\\n\", r.Method, r.URL)\n\t\th.ServeHTTP(w, r)\n\t}\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "4cc23dc33889bb9370cd43e5be83e62d", "score": "0.72180635", "text": "func RequestLogger() wago.MiddleWareHandler {\n\treturn func(c *wago.Context) {\n\t\tlogger.WithFields(logger.Fields{\n\t\t\twago.REQUEST_ID: c.GetString(wago.REQUEST_ID),\n\t\t\t\"path\": c.Request.URL.Path,\n\t\t\t\"host\": c.Request.Host,\n\t\t\t\"header\": c.Request.Header,\n\t\t}).Debug(\"before-handle\")\n\n\t\tc.Next()\n\n\t\tlogger.WithFields(logger.Fields{\n\t\t\twago.REQUEST_ID: c.GetString(wago.REQUEST_ID),\n\t\t\t\"path\": c.Request.URL.Path,\n\t\t\t\"host\": c.Request.Host,\n\t\t\t\"header\": c.Request.Header,\n\t\t}).Debug(\"after-handle\")\n\t}\n}", "title": "" }, { "docid": "c7bb8f509cae883310877f18bacb181d", "score": "0.7216144", "text": "func LogHandler(next http.Handler) http.Handler {\n\tblue := color.New(color.FgBlue).SprintFunc()\n\tcyan := color.New(color.FgCyan).SprintFunc()\n\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Println(blue(r.Method) + \" :: \" + cyan(r.RequestURI))\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "4997efb388df13f11be45122c1f49b3d", "score": "0.72054756", "text": "func Logging(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"%s%s %s\", r.Host, r.RequestURI, r.UserAgent())\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "1708d1574c84ef1aa274c1f6ca14337f", "score": "0.72019285", "text": "func logRequest(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"requested %s\", r.URL.Path)\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "f5727a67c41fa38e3b9cc72bb8c61598", "score": "0.71995264", "text": "func RequestLogger(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\t\tctx := r.Context()\n\t\t// Parse request information\n\t\trequestURIparts := append(strings.SplitN(r.RequestURI, \"?\", 2), \"\")\n\n\t\t// Instantiate verbose logger\n\t\tlogger := logrus.\n\t\t\tWithField(\"request\", uuid.New().String()).\n\t\t\tWithField(\"route\", r.Method+\" \"+requestURIparts[0]).\n\t\t\tWithField(\"query\", requestURIparts[1]).\n\t\t\tWithField(\"instance\", instanceID).\n\t\t\tWithField(\"ip\", r.RemoteAddr).\n\t\t\tWithField(\"referer\", r.Referer()).\n\t\t\tWithField(\"agent\", r.UserAgent())\n\n\t\tctx = loglib.SetLogger(ctx, logger.Logger)\n\t\tlogger.Infof(\"START\")\n\n\t\tr = r.WithContext(ctx)\n\t\tnext.ServeHTTP(w, r)\n\n\t\tlogger.\n\t\t\tWithField(\"duration\", time.Since(start)).\n\t\t\tInfof(\"END\")\n\n\t}\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "ea04242c6df13a92f793e484ddb4ead9", "score": "0.7187775", "text": "func Logger(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\t\twrw := middleware.NewWrapResponseWriter(w, r.ProtoMajor)\n\t\tnext.ServeHTTP(wrw, r)\n\n\t\tscheme := \"http\"\n\t\tif r.TLS != nil {\n\t\t\tscheme = \"https\"\n\t\t}\n\n\t\tfields := []zapcore.Field{\n\t\t\tzap.String(\"requestScheme\", scheme),\n\t\t\tzap.String(\"requestProto\", r.Proto),\n\t\t\tzap.String(\"requestMethod\", r.Method),\n\t\t\tzap.String(\"requestAddr\", r.RemoteAddr),\n\t\t\tzap.String(\"requestUserAgent\", r.UserAgent()),\n\t\t\tzap.String(\"requestURI\", fmt.Sprintf(\"%s://%s%s\", scheme, r.Host, r.RequestURI)),\n\t\t\tzap.Int(\"responseStatus\", wrw.Status()),\n\t\t\tzap.Int(\"responseBytes\", wrw.BytesWritten()),\n\t\t\tzap.Float64(\"requestLatency\", float64(time.Since(start).Nanoseconds())/1000000),\n\t\t}\n\n\t\tlog.Info(r.Context(), \"Request completed\", fields...)\n\t}\n\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "60df95c50805abee1a52279e450a90a4", "score": "0.71664745", "text": "func logRequest(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"%s %s %s\\n\", requestGetRemoteAddress(r), r.Method, r.URL)\n\t\thandler.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "0e02f5fb5c1c8a5fa06862b23ec97519", "score": "0.71646994", "text": "func LoggingHandler(next http.Handler) http.Handler {\n\t// Define the logging code\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tt1 := time.Now()\n\t\tnext.ServeHTTP(w, r)\n\t\tt2 := time.Now()\n\t\tlog.Printf(\"RQST: [%s] %q %v\\n\", r.Method, r.URL.String(), t2.Sub(t1))\n\t}\n\n\t// Return a handler function that wraps the logging code and the core handler function\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "b8ce23c19ecbcae3a2ec20539358524e", "score": "0.7161748", "text": "func HTTPLogger(inner http.Handler, name string) http.Handler {\n return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n start := time.Now()\n\n inner.ServeHTTP(w, r)\n\n Logs.Infof(\n \"%s\\t%s\\t%s\\t%s\",\n r.Method,\n r.RequestURI,\n name,\n time.Since(start),\n )\n })\n}", "title": "" }, { "docid": "5bc94927964aa4434a4e5e9e5bae9cbe", "score": "0.71485704", "text": "func LogRequests(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\n\t\tnext.ServeHTTP(w, r)\n\n\t\tlog.Printf(\n\t\t\t\"[%s]\\t%s\\t%s\",\n\t\t\tr.Method,\n\t\t\tr.URL.String(),\n\t\t\ttime.Since(start),\n\t\t)\n\t})\n}", "title": "" }, { "docid": "a70d695d4c920960913851724f94c802", "score": "0.71401876", "text": "func logger(fn http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tdefer log.Printf(\"%s - %s\", r.Method, r.URL)\n\t\tfn(w, r)\n\t}\n}", "title": "" }, { "docid": "602f917f8f628166505438af2066d9d2", "score": "0.71382517", "text": "func logHandler(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t// don't need context in standalone server\n\t\tlogf(nil, \"%s %s\", r.Method, r.URL.Path)\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "ec05a171153892c54b0820812ffe4a24", "score": "0.7136512", "text": "func logRequest(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Println(r.RequestURI)\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "a3e3bc842363b76f7dc529927ae4b9d3", "score": "0.7133544", "text": "func ReqLogger(rw *http.ResponseWriter, responseStatus *int, URL *url.URL, Method string, start *time.Time) {\n\tif *responseStatus != 200 && *responseStatus != 308 {\n\t\t(*rw).WriteHeader(*responseStatus)\n\t}\n\tlog.Printf(\"%s %s %d %s\\n\", Method, URL, *responseStatus, time.Since(*start))\n}", "title": "" }, { "docid": "87811b2edbbc10d2cff74f3a62e4ee1b", "score": "0.71272343", "text": "func LogRequest(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"%s %s %s\\n\", r.RemoteAddr, r.Method, r.URL)\n\t\thandler.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "6dba119563a1a6ae1614db49d0d073b6", "score": "0.7122211", "text": "func RequestLogger(targetMux http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\n\t\ttargetMux.ServeHTTP(w, r)\n\n\t\t//log request by who(IP address)\n\t\trequesterIP := r.RemoteAddr\n\n\t\tlogger.Infow(\"Loaded page\",\n\t\t\t\"Method\", r.Method,\n\t\t\t\"RequestURI\", r.RequestURI,\n\t\t\t\"RequesterIP\", requesterIP,\n\t\t\t\"Time\", time.Since(start),\n\t\t)\n\t})\n}", "title": "" }, { "docid": "9da6d0e1d3df1cc60373924a9a5466d3", "score": "0.71187043", "text": "func Logger(next http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\trec := statusRecorder{w, 200, time.Now()}\n\t\tnext(&rec, r)\n\t\tlogger.HTTPLogs(logger.PaintStatus(rec.status), fmt.Sprint(time.Since(rec.elapsed)), r.Host, logger.PaintMethod(r.Method), r.URL.Path)\n\t}\n}", "title": "" }, { "docid": "a124fa5204b67293c7a9b23dad2f196b", "score": "0.711522", "text": "func (l *Logger) HandlerLog(w http.ResponseWriter, r *http.Request) {\r\n\tl.timeReset()\r\n\tdefer l.traceInternal(4, fmt.Sprintf(\"%s %s %v\", r.Method, r.RequestURI, l.timeElapsed(l.timer)))\r\n}", "title": "" }, { "docid": "6e462bcb6e46577b40d8a1859ac7ae2f", "score": "0.7102603", "text": "func logger(fn http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Println(r.URL.Path, r.Method)\n\t\tfn(w, r)\n\t}\n}", "title": "" }, { "docid": "6e462bcb6e46577b40d8a1859ac7ae2f", "score": "0.7102603", "text": "func logger(fn http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Println(r.URL.Path, r.Method)\n\t\tfn(w, r)\n\t}\n}", "title": "" }, { "docid": "e1f5db2d091108cbeafc3e7d1347a2f6", "score": "0.7087465", "text": "func Logging(rw http.ResponseWriter, req *http.Request, next http.HandlerFunc) {\n\tcurrent := time.Now()\n\n\ttempQueryStr, err := json.Marshal(req.URL.Query())\n\tqueryStr := cleanRequestStr(tempQueryStr, err)\n\n\tbody, err := ioutil.ReadAll(req.Body)\n\tbodyStr := cleanRequestStr(body, err)\n\n\tnext(rw, req)\n\n\tres := rw.(negroni.ResponseWriter)\n\n\tfinished := time.Since(current)\n\n\tlog.Printf(\"{ \\\"User-Agent\\\": \\\"%s\\\", \\\"Url\\\": \\\"%s\\\", \\\"Host\\\": \\\"%s\\\", \\\"Uri\\\": \\\"%s\\\", \\\"Method\\\": \\\"%s\\\", \\\"Status Code\\\": %d, \\\"Query\\\": \\\"%s\\\", \\\"Body\\\": \\\"%s\\\", \\\"Response Time\\\": \\\"%s\\\" \\\"Content-Type\\\": \\\"%s\\\", \\\"Content-Length\\\": %d }\",\n\t\treq.Header.Get(\"User-Agent\"), req.Host+req.RequestURI, req.Host, req.RequestURI, req.Method, res.Status(), queryStr, bodyStr, finished, req.Header.Get(\"Content-Type\"), req.ContentLength)\n\n}", "title": "" }, { "docid": "1c728a45c8edf048ec826ead1310c49e", "score": "0.708363", "text": "func log(h http.HandlerFunc)http.HandlerFunc{\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tlogg.Println(\"http handler: \",runtime.FuncForPC(reflect.ValueOf(h).Pointer()).Name())\n\t\th(w,r)\n\t}\n}", "title": "" }, { "docid": "07e6a4aad0ccd7c894afe8e33880576d", "score": "0.7050802", "text": "func LogReq(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tnext.ServeHTTP(w, r)\n\t\turi := r.URL.String()\n\t\tmethod := r.Method\n\t\tlog.Println(\"^^\", method, uri)\n\t})\n}", "title": "" }, { "docid": "0529286729dd155d41fe2190f72d4d8d", "score": "0.70437086", "text": "func Logger(log *logger.Logger, h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\trespMetrics := httpsnoop.CaptureMetricsFn(w, func(ww http.ResponseWriter) {\n\t\t\th.ServeHTTP(ww, r)\n\t\t})\n\n\t\tctx := r.Context()\n\t\ttraceID, spanID := tracing.TraceInfo(ctx)\n\n\t\tlogFields := []interface{}{\n\t\t\t\"trace-id\", traceID,\n\t\t\t\"span-id\", spanID,\n\t\t\t\"http-method\", r.Method,\n\t\t\t\"remote-addr\", r.RemoteAddr,\n\t\t\t\"user-agent\", r.UserAgent(),\n\t\t\t\"uri\", r.URL.String(),\n\t\t\t\"status-code\", respMetrics.Code,\n\t\t\t\"elapsed\", fmt.Sprintf(\"%.9fs\", respMetrics.Duration.Seconds()),\n\t\t}\n\n\t\tswitch {\n\t\tcase respMetrics.Code >= 500:\n\t\t\tlog.Errorw(\"Request completed\", logFields...)\n\t\tdefault:\n\t\t\tlog.Debugw(\"Request completed\", logFields...)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "dce8e0fd8cbd2062fee614e7437c6b6f", "score": "0.7036966", "text": "func Log(h httprouter.Handle) httprouter.Handle {\n\treturn func(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"host\": r.Host,\n\t\t\t\"address\": r.RemoteAddr,\n\t\t\t\"method\": r.Method,\n\t\t\t\"requestURI\": r.RequestURI,\n\t\t\t\"proto\": r.Proto,\n\t\t\t\"useragent\": r.UserAgent(),\n\t\t\t\"x-request-id\": r.Header.Get(\"X-Request-ID\"),\n\t\t}).Info(\"HTTP request\")\n\n\t\th(w, r, ps)\n\t}\n}", "title": "" }, { "docid": "c754157b22ae8bb74f71010d0dc172b8", "score": "0.70324445", "text": "func Logger(route routing.Route) Adapter {\n\treturn func(h http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tstart := time.Now()\n\n\t\t\t// server http\n\t\t\th.ServeHTTP(w, r)\n\n\t\t\t// by doing this the log happen after all http request\n\t\t\tlog.Printf(\n\t\t\t\t\"%s\\t%s\\t%s\\t%s\",\n\t\t\t\troute.Method,\n\t\t\t\troute.Pattern,\n\t\t\t\troute.Name,\n\t\t\t\ttime.Since(start),\n\t\t\t)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "50749f651ffdbb0d9a652ded7ebba309", "score": "0.70273876", "text": "func Logging(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tm := httpsnoop.CaptureMetrics(next, w, r)\n\t\tlog.Info().\n\t\t\tStr(\"method\", r.Method).\n\t\t\tStr(\"url\", r.URL.String()).\n\t\t\tInt(\"code\", m.Code).\n\t\t\tDur(\"duration\", m.Duration).\n\t\t\tSend()\n\t})\n}", "title": "" }, { "docid": "edbfacf42b10922c812d0f105c542f09", "score": "0.70153666", "text": "func RequestLoggerMiddleware(next http.Handler) http.Handler {\r\n\treturn http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\r\n\t\tstart := time.Now()\r\n\r\n\t\tif config.LogLevel == \"error\" {\r\n\t\t\tlog.Printf(\r\n\t\t\t\t\"%s\\t%#v\\t%s\\t%s\",\r\n\t\t\t\treq.Method,\r\n\t\t\t\treq.RequestURI,\r\n\t\t\t\ttime.Since(start),\r\n\t\t\t)\r\n\t\t}\r\n\t\tif config.LogLevel == \"debug\" {\r\n\t\t\tlog.Printf(\r\n\t\t\t\t\"%s\\t%#v\\t%s\\t%dB\\t%s\\tHeaders: %s\\tPayload: %s\",\r\n\t\t\t\treq.Method,\r\n\t\t\t\treq.RequestURI,\r\n\t\t\t\ttime.Since(start),\r\n\t\t\t\treq.ContentLength,\r\n\t\t\t\treq.TransferEncoding,\r\n\t\t\t\treq.Header,\r\n\t\t\t\treq.Body,\r\n\t\t\t)\r\n\t\t}\r\n\t\tnext.ServeHTTP(w, req)\r\n\t})\r\n}", "title": "" }, { "docid": "da5c3e568a62d191d3499f88e719a9e1", "score": "0.6990173", "text": "func loggerMiddleware(next http.Handler) http.Handler {\n\n\tlevel := Level()\n\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tctx := r.Context()\n\t\tt1 := time.Now()\n\t\treqId := middleware.GetReqID(ctx)\n\t\tpreReqContent := log.Fields{\n\t\t\t\"time\": t1,\n\t\t\t\"requestId\": reqId,\n\t\t\t\"method\": r.Method,\n\t\t\t\"endpoint\": r.RequestURI,\n\t\t\t\"protocol\": r.Proto,\n\t\t}\n\n\t\tif r.RemoteAddr != \"\" {\n\t\t\tpreReqContent[\"ip\"] = r.RemoteAddr\n\t\t}\n\n\t\ttid := r.Header.Get(\"X-TID\")\n\t\tif tid != \"\" {\n\t\t\tpreReqContent[\"tid\"] = tid\n\t\t}\n\n\t\tlogger := log.FromContext(ctx).WithFields(preReqContent)\n\t\tctx = logger.ToContext(ctx)\n\t\tr = r.WithContext(ctx)\n\t\tlogger.Info(\"request started\")\n\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n\t\t\t\tlog.WithFields(\n\t\t\t\t\tlog.Fields{\n\t\t\t\t\t\t\"requestId\": reqId,\n\t\t\t\t\t\t\"duration\": time.Since(t1),\n\t\t\t\t\t\t\"status\": 500,\n\t\t\t\t\t\t\"stacktrace\": string(debug.Stack()),\n\t\t\t\t\t},\n\t\t\t\t).Error(\"request finished with panic\")\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t}()\n\n\t\tww := middleware.NewWrapResponseWriter(w, r.ProtoMajor)\n\t\tnext.ServeHTTP(ww, r)\n\n\t\tstatus := ww.Status()\n\t\tpostReqContent := log.Fields{\n\t\t\t\"requestId\": reqId,\n\t\t\t\"duration\": time.Since(t1),\n\t\t\t\"contentLength\": ww.BytesWritten(),\n\t\t\t\"status\": status,\n\t\t}\n\n\t\tif cache := ww.Header().Get(\"x-cache\"); cache != \"\" {\n\t\t\tpostReqContent[\"cache\"] = cache\n\t\t}\n\n\t\tlogger = log.FromContext(ctx).WithFields(postReqContent)\n\t\tif status >= 100 && status < 500 {\n\n\t\t\tvar method func(format string, args ...interface{})\n\n\t\t\tswitch level {\n\t\t\tcase \"TRACE\":\n\t\t\t\tmethod = logger.Tracef\n\t\t\tcase \"DEBUG\":\n\t\t\t\tmethod = logger.Debugf\n\t\t\tdefault:\n\t\t\t\tmethod = logger.Infof\n\t\t\t}\n\n\t\t\tmethod(\"request finished\")\n\t\t} else if status == 500 {\n\t\t\tlogger.WithField(\"stacktrace\",\n\t\t\t\tstring(debug.Stack())).Error(\"internal error during request\")\n\t\t} else {\n\t\t\tmessage := \"request finished\"\n\n\t\t\t// FIX: For some reason, the 'context.deadlineExceededError{}' isn't getting into here, we\n\t\t\t// did a quick fix checking the status code and returing the same message as the error., but\n\t\t\t// something is wrong and we need fix it.\n\t\t\tif status == 504 {\n\t\t\t\tmessage += \": context deadline exceeded\"\n\t\t\t} else {\n\t\t\t\tif err := ctx.Err(); err != nil {\n\t\t\t\t\tmessage += fmt.Sprintf(\": %s\", err.Error())\n\t\t\t\t}\n\t\t\t}\n\t\t\tlogger.Error(message)\n\t\t}\n\t}\n\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "db482497dd9a48f09ad30618c1e866b8", "score": "0.6984675", "text": "func logAllRequestsMiddleware(next http.Handler) http.Handler {\r\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\r\n\t\tlogger.Info(\"%s %s\", r.Method, r.URL.Path)\r\n\r\n\t\tnext.ServeHTTP(w, r)\r\n\t})\r\n}", "title": "" }, { "docid": "17d431f301e9e1edb73a7ea14d361049", "score": "0.69801897", "text": "func (l loggingHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {\n\tlrw := &loggingResponseWriter{ResponseWriter: w}\n\tl.handler.ServeHTTP(lrw, r)\n\tlog.Printf(\"%s - %3d %6db %4s %s\\n\", r.RemoteAddr, lrw.status, lrw.length, r.Method, r.RequestURI)\n}", "title": "" }, { "docid": "ec65f19d0285a3bce055961aebfbb198", "score": "0.6926266", "text": "func RequestLogger(f LogFormatter) func(next http.Handler) http.Handler {\n\treturn func(next http.Handler) http.Handler {\n\t\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\t\tentry := f.NewLogEntry(r)\n\t\t\tww := NewWrapResponseWriter(w, r.ProtoMajor)\n\n\t\t\tt1 := time.Now()\n\t\t\tdefer func() {\n\t\t\t\tentry.Write(ww.Status(), ww.BytesWritten(), ww.Header(), time.Since(t1), nil)\n\t\t\t}()\n\n\t\t\tnext.ServeHTTP(ww, WithLogEntry(r, entry))\n\t\t}\n\t\treturn http.HandlerFunc(fn)\n\t}\n}", "title": "" }, { "docid": "30f7bf8ca63a0b9ecb8611e83d1ebc59", "score": "0.6923029", "text": "func Logger(inner http.Handler, name string) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\n\t\tlog.Printf(\n\t\t\t\"START %s\\t%s\\t%s\\n%s\\n\\n\",\n\t\t\tr.Method,\n\t\t\tr.RequestURI,\n\t\t\tname,\n\t\t\tdumpRequest(r),\n\t\t)\n\n\t\tinner.ServeHTTP(w, r)\n\n\t\tlog.Printf(\n\t\t\t\"STOP %s\\t%s\\t%s\\t%s\\n\",\n\t\t\tr.Method,\n\t\t\tr.RequestURI,\n\t\t\tname,\n\t\t\ttime.Since(start),\n\t\t)\n\t})\n}", "title": "" }, { "docid": "6322bc558b39a32c9d7bdbcf3edacbcd", "score": "0.691705", "text": "func Logger(r *http.Request, statusCode int, size int) {\n\tif statusCode == http.StatusOK {\n\t\tlogrus.WithFields(logrus.Fields{\n\t\t\t\"proto\": r.Proto,\n\t\t\t\"remote\": r.RemoteAddr,\n\t\t\t\"reqlen\": r.ContentLength,\n\t\t\t\"size\": size,\n\t\t\t\"status\": statusCode,\n\t\t}).Info(r.Method, \" \", r.RequestURI)\n\t} else {\n\t\tlogrus.WithFields(logrus.Fields{\n\t\t\t\"proto\": r.Proto,\n\t\t\t\"remote\": r.RemoteAddr,\n\t\t\t\"reqlen\": r.ContentLength,\n\t\t\t\"size\": size,\n\t\t\t\"status\": statusCode,\n\t\t}).Warn(r.Method, \" \", r.RequestURI)\n\t}\n}", "title": "" }, { "docid": "4a29647dfa1c6c3addc34d9bb4845a49", "score": "0.69157743", "text": "func Logger(inner http.Handler, name string) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\n\t\tinner.ServeHTTP(w, r)\n\n\t\tlog.Printf(\n\t\t\t\"%s\\t%s\\t%s\\t%s\",\n\t\t\tr.Method,\n\t\t\tr.RequestURI,\n\t\t\tname,\n\t\t\ttime.Since(start),\n\t\t)\n\t})\n}", "title": "" }, { "docid": "b11f0d1ec60b83ad76de9c401e5ab898", "score": "0.6915048", "text": "func Logger() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tstart := time.Now()\n\t\tpath := c.Request.URL.Path\n\t\trequestID := GetRequestID(c)\n\t\trequestLog.Info(fmt.Sprintf(\"Incomming request: %s %s\", c.Request.Method, path), zap.String(\"requestId\", requestID))\n\n\t\tc.Next()\n\n\t\tend := time.Now()\n\t\tlatency := end.Sub(start)\n\n\t\trequestLog.Info(fmt.Sprintf(\"Outgoing request: %s %s\", c.Request.Method, path),\n\t\t\tzap.Int(\"status\", c.Writer.Status()),\n\t\t\tzap.String(\"requestId\", requestID),\n\t\t\tzap.Duration(\"latency\", latency))\n\t}\n}", "title": "" }, { "docid": "7db501bebd9ccd61ee8e4660f9a37a03", "score": "0.69137156", "text": "func RequestLogging(n janice.HandlerFunc) janice.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) error {\n\t\tp := r.URL.String()\n\n\t\tvar err error\n\t\tm := httpsnoop.CaptureMetricsFn(w, func(ww http.ResponseWriter) {\n\t\t\terr = n(ww, r)\n\t\t})\n\n\t\tle := Logger.WithFields(logrus.Fields{\n\t\t\t\"type\": \"request\",\n\t\t\t\"host\": r.Host,\n\t\t\t\"method\": r.Method,\n\t\t\t\"path\": p,\n\t\t\t\"code\": m.Code,\n\t\t\t\"duration\": m.Duration.String(),\n\t\t\t\"written\": m.Written,\n\t\t})\n\n\t\tif rid, ok := GetRequestID(r); ok {\n\t\t\tle = le.WithField(\"request\", rid)\n\t\t}\n\n\t\tle.Info()\n\n\t\treturn err\n\t}\n}", "title": "" }, { "docid": "42e4d2ae59dc75108607a45770ac4b7f", "score": "0.6912169", "text": "func Logger(inner http.HandlerFunc, name string) http.HandlerFunc {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\n\t\tinner.ServeHTTP(w, r)\n\n\t\tlog.Printf(\n\t\t\t\"%s\\t%s\\t%s\\t%s\",\n\t\t\tr.Method,\n\t\t\tr.RequestURI,\n\t\t\tname,\n\t\t\ttime.Since(start),\n\t\t)\n\t})\n}", "title": "" }, { "docid": "81af22f06975aea5dbdf518a9dd17b46", "score": "0.69108474", "text": "func Logger(w http.ResponseWriter, r *http.Request, next func()) {\n\tstart := time.Now()\n\tnext()\n\tlog.Printf(\"\\x1b[34m%s \\x1b[32m%s \\x1b[0m%v\", r.Method, r.URL.Path, time.Since(start))\n}", "title": "" }, { "docid": "ab52bf80fcf62397bd45e5106b1012da", "score": "0.6898212", "text": "func LoggingHandlerFunc(next http.Handler) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tlw := loggingWriter{w, 200}\n\t\tif next != nil {\n\t\t\tnext.ServeHTTP(lw, r)\n\t\t}\n\t\tlog.\n\t\t\tWithField(\"type\", \"access\").\n\t\t\tWithField(\"path\", r.URL.Path).\n\t\t\tWithField(\"host\", r.Host).\n\t\t\tWithField(\"remote\", r.RemoteAddr).\n\t\t\tWithField(\"response_code\", lw.statusCode).\n\t\t\tInfoln(\"Received a request\")\n\t}\n}", "title": "" }, { "docid": "f3e294341e8aebbd616c0015441de36e", "score": "0.68921447", "text": "func loggerMiddleware(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\n\t\tnext.ServeHTTP(w, r)\n\n\t\tlog.Printf(\"[%s]\\t%s\\t%s\", r.Method, r.URL.String(), time.Since(start))\n\t})\n}", "title": "" }, { "docid": "ffde356b2f29631d1de524f73c5f2a3d", "score": "0.68849754", "text": "func LoggingMw(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlogger.Logger.Infow(\"incoming request\", \"method\", r.Method, \"path\", r.URL.Path)\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "6a7c10c8afa215de9a17348cf207ea53", "score": "0.68688303", "text": "func Handler(next http.Handler, l ...*log.Logger) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tpw := makePipeWriter(w)\n\t\tt1 := time.Now()\n\t\tnext.ServeHTTP(&pw, r)\n\t\tt2 := time.Now()\n\t\tif len(l) > 0 {\n\t\t\tl[0].Printf(\"%s %q %d %d %v\\n\",\n\t\t\t\tr.Method, r.URL.String(), pw.Status(), pw.Bytes(), t2.Sub(t1))\n\t\t} else {\n\t\t\tlog.Printf(\"%s %q %d %d %v\\n\",\n\t\t\t\tr.Method, r.URL.String(), pw.Status(), pw.Bytes(), t2.Sub(t1))\n\t\t}\n\t}\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "7aa98b0abdd912899287ce37690c7aa3", "score": "0.68652755", "text": "func RequestLogger(f httprouter.Handle) httprouter.Handle {\n\treturn httprouter.Handle(func(w http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\t\tt := time.Now()\n\t\tf(w, r, p)\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"method\": r.Method,\n\t\t\t\"resource\": r.URL.Path,\n\t\t\t\"took\": fmt.Sprintf(\"%d%s\", time.Since(t).Nanoseconds()/1000000, \"ms\"),\n\t\t}).Info(fmt.Sprintf(\"%s %s\", r.Method, r.URL.Path))\n\t})\n}", "title": "" }, { "docid": "1e7d54f0e557faf78f2daa4313d917dc", "score": "0.6855063", "text": "func APILogHandler(c echo.Context, req, res []byte) {\n\tc.Response().Header().Set(\"X-mobileloket-ResponseTime\", time.Now().Format(time.RFC3339))\n\treqTime, err := time.Parse(time.RFC3339, c.Request().Header.Get(\"X-mobileloket-RequestTime\"))\n\tvar elapstime time.Duration\n\tif err == nil {\n\t\telapstime = time.Since(reqTime)\n\t}\n\n\tvar handler string\n\tr := c.Echo().Routes()\n\tcpath := strings.Replace(c.Path(), \"/\", \"\", -1)\n\tfor _, v := range r {\n\t\tvpath := strings.Replace(v.Path, \"/\", \"\", -1)\n\t\tif vpath == cpath && v.Method == c.Request().Method {\n\t\t\thandler = v.Name\n\t\t\t// Handler for wrong route.\n\t\t\tif strings.Contains(handler, \"func1\") {\n\t\t\t\thandler = \"UndefinedRoute\"\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// Get Handler Name\n\tdir, file := path.Split(handler)\n\tfileStrings := strings.Split(file, \".\")\n\tpackHandler := dir + fileStrings[0]\n\tfuncHandler := strings.Replace(handler, packHandler+\".\", \"\", -1)\n\n\trespHeader, _ := json.Marshal(c.Response().Header())\n\treqHeader := httpdump.DumpRequest(c.Request())\n\n\tInfo().\n\t\tStr(\"Identifier\", viper.GetString(\"log_identifier\")+\"_http\").\n\t\tStr(\"package\", packHandler).\n\t\tInt64(\"elapsed_time\", elapstime.Nanoseconds()/int64(time.Millisecond)).\n\t\tStr(\"handler\", funcHandler).\n\t\tStr(\"ip\", c.RealIP()).\n\t\tStr(\"host\", c.Request().Host).\n\t\tStr(\"method\", c.Request().Method).\n\t\tStr(\"url\", c.Request().RequestURI).\n\t\tStr(\"request_time\", c.Request().Header.Get(\"X-mobileloket-RequestTime\")).\n\t\tStr(\"request_header\", reqHeader).\n\t\tStr(\"request\", string(req)).\n\t\tInt(\"httpcode\", c.Response().Status).\n\t\tStr(\"response_time\", c.Response().Header().Get(\"X-mobileloket-ResponseTime\")).\n\t\tStr(\"response_header\", string(respHeader)).\n\t\tStr(\"response\", string(res)).\n\t\tMsg(\"\")\n}", "title": "" }, { "docid": "82786ac0ac652ccfd3476614aa990494", "score": "0.68415284", "text": "func Logger(log *log.Logger) func(next http.Handler) http.Handler {\n\treturn func(next http.Handler) http.Handler {\n\t\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\t\tsw := statusWriter{ResponseWriter: w}\n\n\t\t\tdefer func() {\n\t\t\t\tlog.Println(r.Method, r.URL.Path, sw.status, r.RemoteAddr, r.UserAgent())\n\t\t\t}()\n\t\t\tnext.ServeHTTP(&sw, r)\n\t\t}\n\t\treturn http.HandlerFunc(fn)\n\t}\n}", "title": "" }, { "docid": "562f2dade04a9bd7ef572a87217a7e37", "score": "0.6824633", "text": "func Logger(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tinfo := newLogInfo(r)\n\t\tww := middleware.NewWrapResponseWriter(w, r.ProtoMajor)\n\t\tt1 := time.Now()\n\n\t\tdefer func() {\n\t\t\tinfo.Write(ww.Status(), ww.BytesWritten(), time.Since(t1))\n\t\t}()\n\n\t\tnext.ServeHTTP(ww, withLogInfo(r, info))\n\t})\n}", "title": "" }, { "docid": "a99f0586c6dc07b2b312a8f98af72260", "score": "0.681838", "text": "func (h *httpLoggingHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {\n\tlrw := &logResponseWriter{ResponseWriter: w}\n\tt := time.Now()\n\th.h.ServeHTTP(lrw, r)\n\tduration := time.Since(t).String()\n\tif lrw.RespCode == 0 {\n\t\tlrw.RespCode = 200\n\t}\n\tif h.logfunc != nil {\n\t\th.logfunc(fmt.Sprintf(\"%s \\\"%s %s %s\\\" %d %d (%s)\", r.RemoteAddr, r.Method, r.RequestURI, r.Proto, lrw.RespCode, lrw.Size, duration))\n\t}\n}", "title": "" }, { "docid": "421cceb85de960840bc462e465e42ada", "score": "0.6812591", "text": "func loggingHandler(h http.Handler) http.Handler {\n\treturn loggingHandlerFunc(h.ServeHTTP)\n}", "title": "" }, { "docid": "8f76a18ee698d4eee3ef494a4317410a", "score": "0.6810772", "text": "func ServerRequestLogger(inner http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\n\t\tinner.ServeHTTP(w, r)\n\n\t\tlog.Printf(\n\t\t\t\"%s\\t\\t%s\\t\\t%s\\t\\t%s\",\n\t\t\tr.Method,\n\t\t\tr.RequestURI,\n\t\t\tr.RemoteAddr,\n\t\t\ttime.Since(start),\n\t\t)\n\t})\n}", "title": "" }, { "docid": "162b23cbd342e23c5cd0d7615feda66d", "score": "0.68081087", "text": "func LogRequest(r *http.Request) {\n\tL.Printf(\"%s %s\\n\", r.Method, r.URL)\n}", "title": "" }, { "docid": "19fc33af58e00085baad9798dc9f2764", "score": "0.679685", "text": "func Logger(l log.Logger) gin.HandlerFunc {\n return func(c *gin.Context) {\n // Start timer\n start := time.Now()\n path := c.Request.URL.Path\n\n // Process request\n c.Next()\n\n // Stop timer\n end := time.Now()\n latency := end.Sub(start)\n\n // clientIP := c.ClientIP()\n method := c.Request.Method\n statusCode := c.Writer.Status()\n comment := c.Errors.ByType(gin.ErrorTypePrivate).String()\n\n l.Info(\"Request\", \"method\", method, \"status\", statusCode, \"latency\", latency, \"path\", path, \"comment\", comment)\n }\n}", "title": "" }, { "docid": "26528fbb6ace02dbc0d37f2cd8d12016", "score": "0.67954564", "text": "func (h transactionAwareRequestLoggingHandler) writeRequestLog(req *http.Request, responseTime time.Duration, status, size int) {\n\ttransactionID := req.Header.Get(transactionidutils.TransactionIDHeader)\n\turl := *req.URL\n\tusername := \"\"\n\tif url.User != nil {\n\t\tif name := url.User.Username(); name != \"\" {\n\t\t\tusername = name\n\t\t}\n\t}\n\n\thost, _, err := net.SplitHostPort(req.RemoteAddr)\n\n\tif err != nil {\n\t\thost = req.RemoteAddr\n\t}\n\n\turi := req.RequestURI\n\n\t// Requests using the CONNECT method over HTTP/2.0 must use\n\t// the authority field (aka r.Host) to identify the target.\n\t// Refer: https://httpwg.github.io/specs/rfc7540.html#CONNECT\n\tif req.ProtoMajor == 2 && req.Method == \"CONNECT\" {\n\t\turi = req.Host\n\t}\n\tif uri == \"\" {\n\t\turi = url.RequestURI()\n\t}\n\n\tentry := h.logger.WithFields(map[string]interface{}{\n\t\t\"responsetime\": int64(responseTime.Seconds() * 1000),\n\t\t\"host\": host,\n\t\t\"username\": username,\n\t\t\"method\": req.Method,\n\t\t\"transaction_id\": transactionID,\n\t\t\"uri\": uri,\n\t\t\"protocol\": req.Proto,\n\t\t\"status\": status,\n\t\t\"size\": size,\n\t\t\"referer\": req.Referer(),\n\t\t\"userAgent\": req.UserAgent(),\n\t})\n\n\theaders := getRequestHeaders(req, h.filterHeadersFn)\n\tif len(headers) != 0 {\n\t\tentry = entry.WithField(\"headers\", headers)\n\t}\n\n\tuuids := getUUIDsFromURI(uri)\n\tif len(uuids) > 0 {\n\t\tentry = entry.WithUUID(strings.Join(uuids, \",\"))\n\t}\n\n\t// log the final result\n\tentry.Info(\"\")\n}", "title": "" } ]
b49160e6f57578e517551ff6c1f86581
GetRandomName returns random name
[ { "docid": "6c18262226733fb98f7660b43112f878", "score": "0.8053203", "text": "func GetRandomName() string {\n\treturn gconfig.Nicks[random(0, len(gconfig.Nicks))]\n}", "title": "" } ]
[ { "docid": "b69b9f235a60d0bbeecb1e3cb2f076c1", "score": "0.8697433", "text": "func RandomName() string {\n\treturn RandomString(6)\n}", "title": "" }, { "docid": "b0a533c3ba18abbfe05b4adc2c50a259", "score": "0.8596637", "text": "func RandomName() string {\n\treturn gofakeit.Name()\n}", "title": "" }, { "docid": "14178c1613b3f146be70c8343cf1fe4e", "score": "0.83368206", "text": "func randomName() string {\n\tb := make([]byte, 16)\n\trand.Read(b)\n\treturn common.Bytes2Hex(b)\n}", "title": "" }, { "docid": "38a6ae32473557e57753a558f005613d", "score": "0.82702136", "text": "func RandomName() string {\n\tmin := 10\n\tmax := 15\n\tvar length = rand.Intn(max-min+1) + min\n\tvar letters = []rune(\"abcdefghijklmnopqrstuvwxyz\")\n\n\treturn RandomString(length, letters)\n}", "title": "" }, { "docid": "c4333536fe75760930cd9c126384a304", "score": "0.8269495", "text": "func randomName() string {\n\traw := make([]byte, 6)\n\n\t_, err := rand.Read(raw)\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"read from rand failed\")\n\t\tpanic(err)\n\t}\n\n\tenc := hex.EncodeToString(raw)\n\n\treturn fmt.Sprintf(\"test_%s\", enc)\n}", "title": "" }, { "docid": "99e87be5ee46abc4f13b20cc45ff5512", "score": "0.82009304", "text": "func randomName() string {\n\trand.Seed(int64(getTimeStamp()))\n\treturn listName1[rand.Intn(len(listName1))]\n}", "title": "" }, { "docid": "5a61f12d1aa689679aca27f9632c788f", "score": "0.8118825", "text": "func GetRandomName(options ...func(*RandomName) error) string {\n\trn := NewRandomName()\n\n\tfor _, option := range options {\n\t\toption(rn)\n\t}\n\n\tname := fmt.Sprintf(\"%s_%s\", rn.leftName(), rn.rightName())\n\treturn name\n}", "title": "" }, { "docid": "679e75a331a43a41a4a6ddf7e4b7dad8", "score": "0.7916373", "text": "func randomName() string {\n\tconst chars = \"abcdefghijklmnopqrstuvwxyz0123456789\"\n\n\tresult := make([]byte, 16)\n\tfor i := range result {\n\t\tresult[i] = chars[rand.Intn(len(chars))]\n\t}\n\treturn \"zkwatchtest_\" + string(result)\n}", "title": "" }, { "docid": "1592dc8b75f64afcb78b1409d13ad0fc", "score": "0.78289187", "text": "func RandomizeName(name string, ext string) (randName string) {\n\trandName = name\n\n\t// add \"Copy of \" in front of the name\n\tif TossCoin() {\n\t\trandName = \"Copy of \" + randName\n\t}\n\n\t// add Random date from last year\n\tif TossCoin() {\n\t\trandName = randName + \" \" + GetRandomDateString(3)\n\t}\n\n\t// add \" ({RandDigit})\" to end?\n\tif TossCoin() {\n\t\trandNumber := rand.Intn(5)\n\t\trandName = randName + fmt.Sprintf(\" (%d)\", randNumber+1)\n\t}\n\n\t// if ext is \"\" don't add a .\n\tif ext == \"\" {\n\t\treturn randName\n\t}\n\treturn randName + \".\" + ext\n}", "title": "" }, { "docid": "0f3e6c4031bd23cdda28fe889dc89306", "score": "0.77943385", "text": "func GenerateRandomName() string {\n\tr := rand.New(rand.NewSource(time.Now().UnixNano()))\n\treturn \"spdr\" + strconv.Itoa(r.Intn(999999))\n}", "title": "" }, { "docid": "b3ac909ea66990fbc701266f5511a9fd", "score": "0.7733179", "text": "func Name() string {\n\treturn namesgenerator.GetRandomName(0)\n}", "title": "" }, { "docid": "1bd4593d1d7ac3bd8f57d40f23d9b289", "score": "0.7707354", "text": "func randomName(n int) string {\n\tb := make([]rune, n)\n\tfor i := range b {\n\t\tb[i] = sequentialLetters[rand.Intn(len(sequentialLetters))]\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "d13f105aedec761e6659fc697c71c3f2", "score": "0.7706632", "text": "func RandomName() string {\n\tvar (\n\t\tadj = adjectives[rand.Intn(countAdjectives)]\n\t\tnoun = nouns[rand.Intn(countNoun)]\n\t\tverb = verbs[rand.Intn(countVerb)]\n\t\tadv = adverbs[rand.Intn(countAdverb)]\n\t)\n\treturn adj + noun + verb + adv\n}", "title": "" }, { "docid": "71961f083488fe39fc3475b4d4811196", "score": "0.77023333", "text": "func GenerateRandomName(n int) string {\n\tvar letters = []rune(\"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789\")\n\n\ts := make([]rune, n)\n\tfor i := range s {\n\t\ts[i] = letters[rand.Intn(len(letters))]\n\t}\n\treturn string(s)\n}", "title": "" }, { "docid": "c5e1c402870c38a83422499a426ef570", "score": "0.76493615", "text": "func randName(s string) string {\n\th := sha1.New()\n\th.Write([]byte(s))\n\treturn hex.EncodeToString(h.Sum(nil))\n}", "title": "" }, { "docid": "0efa56b766ff61d75ecbdbb27f854f6f", "score": "0.76198286", "text": "func RandomName(prefix string) string {\n\treturn fmt.Sprintf(\"%s-%06d\", prefix, rand.Int31n(1000000))\n}", "title": "" }, { "docid": "9058e3d438dc9545073c66a72fd2c844", "score": "0.7485231", "text": "func RandomName(prefix ...string) string {\n\trand.Seed(time.Now().UnixNano())\n\trandLen := 12\n\tb := make([]byte, randLen)\n\tfor i := range b {\n\t\tb[i] = fullCharset[rand.Intn(randLen)]\n\t}\n\tif len(prefix) > 0 {\n\t\treturn fmt.Sprintf(\"%s%s\", strings.Join(prefix, \"\"), b)\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "89eb50edf708b49b35a4f1c7d12aac64", "score": "0.7483173", "text": "func RandomUsername() string {\n\treturn gofakeit.Username()\n}", "title": "" }, { "docid": "ab45c3ec283750e15fe34781dcad3901", "score": "0.74700755", "text": "func RandomUsername() string {\n\treturn RandomString(8)\n}", "title": "" }, { "docid": "b095d01ea451c4c3d084111184ee50cd", "score": "0.74390376", "text": "func GenerateName() string {\n //make the generated names array the first time function is run\n if generatedNames == nil{\n generatedNames = make([]string, 0)\n }\n //generate a new random seed and random pieces of the username\n r := rand.New(rand.NewSource(time.Now().UnixNano()))\n randomAdj := adjectiveList[r.Intn(len(adjectiveList))]\n randomAnimal := animalList[r.Intn(len(animalList))]\n randomNum := strconv.Itoa(r.Intn(99))\n randomName := randomAdj+randomAnimal+randomNum\n //check if the name is unique and if not then generate a new one\n for isUnique(randomName) == false {\n r = rand.New(rand.NewSource(time.Now().UnixNano()))\n randomAdj = adjectiveList[r.Intn(len(adjectiveList))]\n randomAnimal = animalList[r.Intn(len(animalList))]\n randomNum = strconv.Itoa(r.Intn(99))\n randomName = randomAdj+randomAnimal+randomNum\n }\n\n generatedNames = append(generatedNames, randomName); //append the new unique name to the list of used names\n return randomName;\n}", "title": "" }, { "docid": "2d76170b5e8a5f3cb72087a3e62b0b21", "score": "0.743064", "text": "func getRandomObjectName() string {\n\treturn randString(16)\n\n}", "title": "" }, { "docid": "5a47c2a8c4860d8baa343d511ae52a6e", "score": "0.7403276", "text": "func (r Robot) generateName() string {\n\tsource := rand.NewSource(time.Now().UnixNano())\n\trandom := rand.New(source)\n\n\trunes := make([]rune, 2)\n\trunes[0] = letters[rand.Intn(len(letters))]\n\trunes[1] = letters[rand.Intn(len(letters))]\n\n\ttemp := string(runes)\n\n\treturn fmt.Sprintf(\"%s%03d\", temp, random.Intn(999))\n}", "title": "" }, { "docid": "69277fe5f233fe7334e6b85001985841", "score": "0.7388589", "text": "func RandomOwnerName() string {\n\treturn RandomString(6)\n}", "title": "" }, { "docid": "ecb68a357ca1cfa4a764188e6c1fe004", "score": "0.7352668", "text": "func GetChannelnameRandom() string {\n\tvar b [12]byte\n\tfor i := range b {\n\t\tb[i] = channelLetters[rand.Int63()%int64(len(channelLetters))]\n\t}\n\treturn string(b[:])\n}", "title": "" }, { "docid": "07ea017340c79eb90966380528252d4d", "score": "0.7329341", "text": "func RandomProfileName() string {\n\tconst letters = \"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789\"\n\n\ts := make([]byte, 8)\n\tfor i := range s {\n\t\ts[i] = letters[rand.Intn(len(letters))]\n\t}\n\treturn \"passpoint\" + string(s)\n}", "title": "" }, { "docid": "503a38475c8d2ef0dea091580e7d309d", "score": "0.73126143", "text": "func randName() string {\n\trand.Seed(time.Now().UTC().UnixNano())\n\n\tname := bytes.NewBuffer([]byte{})\n\t// Generating First two numbers\n\tname.WriteByte(byte(UcLetASCII[0] + rand.Intn(UcLetASCII[1]-UcLetASCII[0])))\n\tname.WriteByte(byte(UcLetASCII[0] + rand.Intn(UcLetASCII[1]-UcLetASCII[0])))\n\n\trecords, ok := storage[name.String()]\n\tif ok == true {\n\t\tif records == 999 {\n\t\t\treturn randName()\n\t\t}\n\t\tstorage[name.String()]++\n\t} else {\n\t\tstorage[name.String()] = 0\n\t}\n\n\treturn fmt.Sprintf(\"%s%.3d\", name.String(), storage[name.String()])\n}", "title": "" }, { "docid": "bac090a931cfb45efabc17487030fecb", "score": "0.7309736", "text": "func GenerateRandomName(prefix string, size int) (string, error) {\n\tid := make([]byte, 32)\n\tif _, err := io.ReadFull(rand.Reader, id); err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn prefix + hex.EncodeToString(id)[:size], nil\n}", "title": "" }, { "docid": "fd7b237ccbcfa1734cae8175e13774d2", "score": "0.72604144", "text": "func (h *HTTPHandler) GetRandomFileName(prefix, filename string) (string, error) {\n\trandBytes := make([]byte, 16)\n\t_, err := rand.Read(randBytes)\n\tif err != nil {\n\t\treturn \"\", utils.ErrorsWrap(err, \"can't create rand\")\n\t}\n\textension := filepath.Ext(filename)\n\tcurentTime := time.Now().Unix()\n\tname := hex.EncodeToString(randBytes) + strconv.FormatInt(curentTime, 10)\n\treturn prefix + name + extension, nil\n}", "title": "" }, { "docid": "0d57971584ce99744b73a2df33f2d1c9", "score": "0.72513807", "text": "func generateRandomName(prefix string, size int) (string, error) {\n\tid := make([]byte, 32)\n\tif _, err := io.ReadFull(rand.Reader, id); err != nil {\n\t\treturn \"\", err\n\t}\n\treturn prefix + hex.EncodeToString(id)[:size], nil\n}", "title": "" }, { "docid": "b3dc8b2e52ce196f74fe5e44e3bd0d0a", "score": "0.7111496", "text": "func GenerateName() string {\n\tname := fmt.Sprintf(nameFormat,\n\t\tgetRandomAdjective(),\n\t\tgetRandomAdjective(),\n\t\tgetRandomNoun())\n\n\treturn name\n}", "title": "" }, { "docid": "65c618e7a16efb47450bfcf61107cf0c", "score": "0.7110658", "text": "func Name() string {\n\treturn getRandValue([]string{\"name\", \"first\"}) + \" \" + getRandValue([]string{\"name\", \"last\"})\n}", "title": "" }, { "docid": "5cff463c50101413099e02c131cf080e", "score": "0.70864433", "text": "func RandomTitle() string {\n\treturn createRandomTitle(5)\n}", "title": "" }, { "docid": "368dad6a00dd61b010fda1d4a9c27a48", "score": "0.70463693", "text": "func randUsername(rng *rand.Rand) string {\n\treturn randAString(rng, 18, 20)\n}", "title": "" }, { "docid": "1b28f28d713ba9925c1b27f5bc663de6", "score": "0.6974168", "text": "func randomUsername() string {\n\tconst letters = \"abcdefghijklmnopqrstuvwxyz0123456789\"\n\n\tret := make([]byte, 20)\n\tfor i := range ret {\n\t\tret[i] = letters[rand.Intn(len(letters))]\n\t}\n\n\treturn string(ret)\n}", "title": "" }, { "docid": "1b91f4e5e7427ac062195d900a64a7b1", "score": "0.69626445", "text": "func RandomAppName(nameLen int) (string, error) {\n\tvar rstr strings.Builder\n\trmapper := RandMapper()\n\tfor _, g := range []string{\"adj\", \"plural\", \"verb\", \"adv\"} {\n\t\tgrammSlice := rmapper[g]()\n\t\tbidx, err := rand.Int(rand.Reader, big.NewInt(int64(len(grammSlice))))\n\t\tif err != nil {\n\t\t\treturn \"\", errors.Errorf(\"error in generating secure random number %s\", err)\n\t\t}\n\t\trstr.WriteString(grammSlice[bidx.Int64()])\n\t}\n\treturn strings.ToLower(Trunc(rstr.String(), nameLen)), nil\n}", "title": "" }, { "docid": "ebc472d08cae5888d37c87c503b214fe", "score": "0.6929138", "text": "func RandomSuffix() string {\n\trandBytes := make([]byte, 20)\n\trand.Read(randBytes)\n\tstr := base32.StdEncoding.EncodeToString(randBytes)\n\treturn str[:20]\n}", "title": "" }, { "docid": "05a7d5b577b3783608345ef610306927", "score": "0.6903534", "text": "func (r *Robot) Name() (string, error) {\n\tallCombinations := 26 * 26 * 10 * 10 * 10\n\tif len(usedNames) == allCombinations {\n\t\treturn \"\", errors.New(\"all combinations for robot names have been exhausted\")\n\t}\n\tif r.name != \"\" {\n\t\treturn r.name, nil\n\t}\n\tname := make([]byte, 5)\n\tfor {\n\t\tname[0] = 'A' + byte(rand.Intn(26))\n\t\tname[1] = 'A' + byte(rand.Intn(26))\n\t\tname[2] = '0' + byte(rand.Intn(10))\n\t\tname[3] = '0' + byte(rand.Intn(10))\n\t\tname[4] = '0' + byte(rand.Intn(10))\n\t\tif !usedNames[string(name)] {\n\t\t\tbreak\n\t\t}\n\t}\n\tusedNames[string(name)] = true\n\tr.name = string(name)\n\n\treturn r.name, nil\n}", "title": "" }, { "docid": "dbb9ae1f46e8d4cefc85eec5de32791a", "score": "0.68813396", "text": "func RandTunName() string {\n\tb := make([]byte, 4)\n\tfor i := range b {\n\t\tb[i] = \"abcdefghijklmnopqrstuvwxyz\"[rand.Intn(len(\"abcdefghijklmnopqrstuvwxyz\"))]\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "1c4a7f1bf468d184407265ed9b5ac25d", "score": "0.6873772", "text": "func generateUniqueName() string {\n\tnewName := generateRandomName()\n\tfor used[newName] {\n\t\tnewName = generateRandomName()\n\t}\n\tused[newName] = true\n\treturn newName\n}", "title": "" }, { "docid": "438546c3fffc5ad520dcc6cffc695964", "score": "0.68389374", "text": "func getRandomBucketName() string {\n\treturn randString(60)\n\n}", "title": "" }, { "docid": "947ee455b2a149f77e04a6547c0c1b1a", "score": "0.67979604", "text": "func CreateRandomValidTestName(name string) string {\n\trandomName := name + uuid.NewV4().String()\n\tif len(randomName) > 62 {\n\t\treturn randomName[:61]\n\t}\n\treturn randomName\n}", "title": "" }, { "docid": "cc0cbac6d71b08f4baba1a5b48a6e512", "score": "0.67430335", "text": "func randomString() string {\n\trand.Seed(time.Now().UnixNano())\n\tsuffix := make([]byte, randSuffixLen)\n\tfor i := range suffix {\n\t\tsuffix[i] = letterBytes[rand.Intn(len(letterBytes))]\n\t}\n\treturn string(suffix)\n}", "title": "" }, { "docid": "b76f11c1604b6a0de70eb225a90ebbb3", "score": "0.67414385", "text": "func Rand() string {\n\treturn fmt.Sprintf(\"%s_%d\", basenames[rand.Int()%lbase], rand.Int()%1000)\n}", "title": "" }, { "docid": "e1ceef154dafe9bdc6b4b43bff1f11f1", "score": "0.6713681", "text": "func CreateRandomFileName(length int) string {\n\tif length <= 0 {\n\t\treturn \"\"\n\t}\n\n\treturn string([]rune(charset)[rand.Intn(len(charset))]) + CreateRandomFileName(length-1)\n}", "title": "" }, { "docid": "616a65d54b6831c3a96c077e4cc4b1cd", "score": "0.67032933", "text": "func UniqueName() string {\n\tid := make([]byte, 16)\n\tif _, err := io.ReadFull(rand.Reader, id); err != nil {\n\t\tpanic(\"failed to read 16 bytes from rand.Reader\")\n\t}\n\n\treturn strings.ToLower(base32.StdEncoding.WithPadding(base32.NoPadding).EncodeToString(id))\n}", "title": "" }, { "docid": "4b8c9ca2d29275c7b6643d8d70e88dd9", "score": "0.6702801", "text": "func randomString() string {\n\tconst letterBytes = \"abcdefghijklmnopqrstuvwxyz\"\n\tsuffix := make([]byte, 8)\n\n\tfor i := range suffix {\n\t\tsuffix[i] = letterBytes[rand.Intn(len(letterBytes))]\n\t}\n\treturn string(suffix)\n}", "title": "" }, { "docid": "5df74d1ee8bcddaf785b36b46cd2f193", "score": "0.66930133", "text": "func GenerateName(region string) string {\n\tt := time.Now()\n\trand.Seed(time.Now().UnixNano())\n\tret := fmt.Sprintf(\"bc-%s-%d-%d%d%d\",\n\t\tregion, rand.Int(), t.Hour(), t.Minute(), t.Second())\n\n\treturn ret[:18]\n}", "title": "" }, { "docid": "fc5d044c065644439ebda9ae2a77becb", "score": "0.6654895", "text": "func GenerateRoverName() string {\n\n\t// Try and load the rover words file\n\tif len(roverWords) == 0 {\n\t\t// Try and load the words file\n\t\tif file, err := os.Open(wordsFile); err != nil {\n\t\t\tlog.Printf(\"Couldn't read words file [%s], running without words: %s\\n\", wordsFile, err)\n\t\t} else {\n\t\t\tdefer file.Close()\n\t\t\tscanner := bufio.NewScanner(file)\n\t\t\tfor scanner.Scan() {\n\t\t\t\troverWords = append(roverWords, scanner.Text())\n\t\t\t}\n\t\t\tif scanner.Err() != nil {\n\t\t\t\tlog.Printf(\"Failure during word file scan: %s\\n\", scanner.Err())\n\t\t\t}\n\t\t}\n\t}\n\n\t// Assign a random name if we have words\n\tif len(roverWords) > 0 {\n\t\t// Loop until we find a unique name\n\t\treturn fmt.Sprintf(\"%s-%s\", roverWords[rand.Intn(len(roverWords))], roverWords[rand.Intn(len(roverWords))])\n\t}\n\n\t// Default to a unique string\n\treturn uuid.New().String()\n}", "title": "" }, { "docid": "961f35d0f2f01a2e6d5fca1838312038", "score": "0.6651679", "text": "func (h *HTTPHandler) GetRandomTempFileName(prefix, filename string) (string, error) {\n\trandBytes := make([]byte, 16)\n\t_, err := rand.Read(randBytes)\n\tif err != nil {\n\t\treturn \"\", utils.ErrorsWrap(err, \"can't create rand\")\n\t}\n\textension := filepath.Ext(filename)\n\treturn filepath.Join(os.TempDir(), prefix+hex.EncodeToString(randBytes)+extension), nil\n}", "title": "" }, { "docid": "76571c1e3504f16f236ae87e573b7f60", "score": "0.665163", "text": "func randomFilename() (s string, err error) {\n\tb := make([]byte, 8)\n\t_, err = rand.Read(b)\n\tif err != nil {\n\t\treturn\n\t}\n\ts = fmt.Sprintf(\"%x\", b)\n\treturn\n}", "title": "" }, { "docid": "c41046d2e2aae82b007e071e4cbd99d1", "score": "0.6646961", "text": "func getLetterRandom() string {\n\tvar r = random.Intn(60)\n\tvar b = make([]byte, 1)\n\tif r < 10 {\n\t\tb[0] = byte(r + 48)\n\t} else if r < 35 {\n\t\tb[0] = byte(r + 55)\n\n\t} else {\n\t\tb[0] = byte(r + 62)\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "7697af994bec87ecfa7c0620212389bc", "score": "0.6634935", "text": "func RandomSuffix() string {\n\tr := rand.New(rand.NewSource(time.Now().UnixNano()))\n\treturn strconv.Itoa(r.Int() % 10000)\n}", "title": "" }, { "docid": "9883be06a7ad84b45bfc7384d0b81a8c", "score": "0.6622296", "text": "func getRandString(n int) string {\n\trand.Seed(time.Now().UTC().UnixNano())\n\trandBytes := make([]byte, n)\n\tfor i := range randBytes {\n\t\trandBytes[i] = letterBytes[rand.Intn(len(letterBytes))]\n\t}\n\treturn string(randBytes)\n}", "title": "" }, { "docid": "ff72f29c1fb3f936d281d3e2cbc81013", "score": "0.6606692", "text": "func RandomOwner() string {\n\treturn RandomString(6)\n}", "title": "" }, { "docid": "ff72f29c1fb3f936d281d3e2cbc81013", "score": "0.6606692", "text": "func RandomOwner() string {\n\treturn RandomString(6)\n}", "title": "" }, { "docid": "ff72f29c1fb3f936d281d3e2cbc81013", "score": "0.6606692", "text": "func RandomOwner() string {\n\treturn RandomString(6)\n}", "title": "" }, { "docid": "7edfe6a94d0d53a9410f276c72b2f807", "score": "0.6595532", "text": "func TestSimpleRandomName(t *testing.T) {\n\tresult := rgInstance.value(\"foobar\")\n\tassert.Contains(t, result, \"foobar-\")\n\tassert.Len(t, result, 14) // foobar = 6 + '-' = 1 + seven digits\n}", "title": "" }, { "docid": "89693c3eba7c664c3d034ffdf16776d0", "score": "0.65853846", "text": "func randomEnvName(t *testing.T) string {\n\traw := make([]byte, 5)\n\t_, err := rand.Read(raw)\n\trequire.NoError(t, err)\n\treturn t.Name() + \"_\" + hex.EncodeToString(raw)\n}", "title": "" }, { "docid": "de2b532e5c4a3542ecd61fb574633143", "score": "0.65773505", "text": "func Random() string {\n\tadj := adjectives[random.Intn(len(adjectives))]\n\tnoun := nouns[random.Intn(len(nouns))]\n\tnum := random.Intn(100)\n\treturn fmt.Sprintf(\"%s-%s-%d\", adj, noun, num)\n}", "title": "" }, { "docid": "0d5f6ec74bd93687f27b9a11aeb9dbc6", "score": "0.65728307", "text": "func RandomString() string { return MakeRandomString(16) }", "title": "" }, { "docid": "8e8d2d330f940a19d322d33efd3a5635", "score": "0.6542603", "text": "func (r *Robot) Name() string {\n\tif registry[r] {\n\t\treturn string(*r)\n\t}\n\trand.Seed(time.Now().UnixNano())\n\t*r = Robot(randomLetter() + randomLetter() + randomNumber())\n\tregistry[r] = true\n\treturn string(*r)\n}", "title": "" }, { "docid": "ac7a495176e96766a78ca92b48f0d95c", "score": "0.6542067", "text": "func (r *Robot) Name() string {\n\tif r.name == \"\" {\n\t\tfor {\n\t\t\tnewName := randomName()\n\t\t\tif contains(names, newName) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tr.name = newName\n\t\t\tbreak\n\t\t}\n\t\tnames = append(names, r.name)\n\t}\n\treturn r.name\n}", "title": "" }, { "docid": "ff158a8f472c8c0ebc485396ea5dc92a", "score": "0.6541533", "text": "func GenerateUserName() string {\n\treturn \"user_\" + generateUUID()\n}", "title": "" }, { "docid": "c51e96148c0fea173199644c59c1c71c", "score": "0.65287447", "text": "func randomLetter() string {\n\tvar letters = []byte(\"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz\")\n\treturn string(letters[rand.Intn(len(letters))])\n}", "title": "" }, { "docid": "523f6da99e88154452cab9c863a77ce2", "score": "0.65175164", "text": "func Random() string {\n\trand.Seed(time.Now().Unix())\n\treturn fmt.Sprintf(\"%s %s %s\", cw[rand.Intn(len(cw))], rw[rand.Intn(len(rw))], dw[rand.Intn(len(dw))])\n}", "title": "" }, { "docid": "001dd3cecb773e355b40fede13a4329c", "score": "0.6506173", "text": "func Random() string {\n\treturn pick(AnsiMap)\n}", "title": "" }, { "docid": "001dd3cecb773e355b40fede13a4329c", "score": "0.6506173", "text": "func Random() string {\n\treturn pick(AnsiMap)\n}", "title": "" }, { "docid": "2bb6f4bff00fc223e1e141c726134101", "score": "0.6500268", "text": "func generateSlotName() string {\n\t// list of random words\n\tstrs := []string{\n\t\t\"gigantic\",\n\t\t\"scold\",\n\t\t\"greasy\",\n\t\t\"shaggy\",\n\t\t\"wasteful\",\n\t\t\"few\",\n\t\t\"face\",\n\t\t\"pet\",\n\t\t\"ablaze\",\n\t\t\"mundane\",\n\t}\n\n\trand.Seed(time.Now().Unix())\n\n\t// generate name such as delta_gigantic20\n\tname := fmt.Sprintf(\"delta_%s%d\", strs[rand.Intn(len(strs))], rand.Intn(100))\n\n\treturn name\n}", "title": "" }, { "docid": "ab87cbfabdd0ced12d4cdaf141a2585c", "score": "0.6491665", "text": "func RandomLabel() string {\n\tnumbers := []rune(\"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ\")\n\tb := make([]rune, 5)\n\tfor i := range b {\n\t\tb[i] = numbers[rand.Intn(len(numbers))]\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "091ac4c2440f1e7a7afad6c88673fa20", "score": "0.64810395", "text": "func GenerateImgName(fname string) string {\n\ti := rand.Intn(9999)\n\ttimestamp := time.Now().Unix()\n\text := path.Ext(fname)\n\tfileName := strings.TrimSuffix(fname, ext)\n\tfileName = GetMd5String(fmt.Sprintf(\"%s-%d-%d\", fname, timestamp, i))\n\n\treturn fileName + ext\n}", "title": "" }, { "docid": "1ca94aa7cb0ac3eb66021bddb727face", "score": "0.646798", "text": "func RandomNick() string {\n\tsuffixLen := 3\n\n\trand.Seed(time.Now().UTC().UnixNano())\n\tconst chars = \"0123456789\"\n\tresult := make([]byte, suffixLen)\n\tfor i := 0; i < suffixLen; i++ {\n\t\tresult[i] = chars[rand.Intn(len(chars))]\n\t}\n\treturn \"anonymus_\" + string(result)\n}", "title": "" }, { "docid": "0a454163d21abe5269a4b12049be4558", "score": "0.64644355", "text": "func RandomSuffix() (string, error) {\n\tsource := []rune(\"abcdefghijklmnopqrstuvwxyz\")\n\tres := make([]rune, 4)\n\tfor i := range res {\n\t\tbi := new(big.Int)\n\t\tr, err := rand.Int(rand.Reader, bi.SetInt64(int64(len(source))))\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tres[i] = source[r.Int64()]\n\t}\n\treturn string(res), nil\n}", "title": "" }, { "docid": "0fe8b272018a14de11f9dc7a1a7e49e9", "score": "0.64614296", "text": "func genMeasurementName() []byte {\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "title": "" }, { "docid": "abb8f30b5091f3520025e0fb0b9f89fd", "score": "0.6452918", "text": "func RandomString(n int) string {\r\n\treturn string(Random(n))\r\n}", "title": "" }, { "docid": "8898a2e873ac2dc5af12b885b01990d3", "score": "0.64501745", "text": "func GetName(filename string) string {\n\n\tfiletype := filepath.Ext(filename)\n\trand.Seed(time.Now().UnixNano())\n\tnum := rand.Int()\n\n\tpath := shared.PhotosDir + \"\\\\\" + strconv.Itoa(num) + filetype\n\n\treturn path\n}", "title": "" }, { "docid": "c84f797f89c02217f4049d729e1dca44", "score": "0.6441582", "text": "func (ns *NameScript) OpRand() string {\n\tswitch ns.op {\n\tcase OP_NAME_FIRSTUPDATE:\n\t\treturn ns.args[1]\n\tdefault:\n\t\tpanic(\"called OpRand() on non-FirstUpdate name script\")\n\t}\n}", "title": "" }, { "docid": "fafcc782741dc5933f1c5e41077a9c9d", "score": "0.6432887", "text": "func GetRandString(n int) string {\n\tb := make([]byte, n)\n\tfor i := range b {\n\t\tb[i] = letterBytes[rand.Intn(len(letterBytes))]\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "fafcc782741dc5933f1c5e41077a9c9d", "score": "0.6432887", "text": "func GetRandString(n int) string {\n\tb := make([]byte, n)\n\tfor i := range b {\n\t\tb[i] = letterBytes[rand.Intn(len(letterBytes))]\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "b9a6528c82fa15da5cd5c21cf40bdde0", "score": "0.642", "text": "func RandomRemoteName(remoteName string) (string, string, error) {\n\tvar err error\n\tvar leafName string\n\n\t// Make a directory if remote name is null\n\tif remoteName == \"\" {\n\t\tremoteName, err = LocalRemote()\n\t\tif err != nil {\n\t\t\treturn \"\", \"\", err\n\t\t}\n\t} else {\n\t\tif !strings.HasSuffix(remoteName, \":\") {\n\t\t\tremoteName += \"/\"\n\t\t}\n\t\tleafName = \"rclone-test-\" + random.String(24)\n\t\tif !MatchTestRemote.MatchString(leafName) {\n\t\t\tlog.Fatalf(\"%q didn't match the test remote name regexp\", leafName)\n\t\t}\n\t\tremoteName += leafName\n\t}\n\treturn remoteName, leafName, nil\n}", "title": "" }, { "docid": "5be8c1ab06d4cba8a7dbc471109787dc", "score": "0.6417703", "text": "func (r *random) String() string { return \"random\" }", "title": "" }, { "docid": "3b452f5dee063405abc269095f05a69a", "score": "0.641064", "text": "func GiveRandom() (creature string) {\n\ti := randomness.GiveRandNum(len(creatures))\n\tcreature = creatures[i]\n\treturn\n}", "title": "" }, { "docid": "e0ab36cac4665b2c7e472ddbbdc868e6", "score": "0.64105606", "text": "func RandomTitle() string {\n\treturn fmt.Sprintf(\"{} {} {}\", RandomString(6), RandomString(10), RandomString(4))\n}", "title": "" }, { "docid": "f1d8231d3efec028fc83e4645baaef9a", "score": "0.640943", "text": "func NewUniqueName(randomSeed []byte, prefix string, randlen, maxlen int, charset []rune) (string, error) {\n\tif randlen <= 0 {\n\t\trandlen = 8\n\t}\n\tif maxlen > 0 && len(prefix)+randlen > maxlen {\n\t\treturn \"\", fmt.Errorf(\n\t\t\t\"name '%s' plus %d random chars is longer than maximum length %d\", prefix, randlen, maxlen)\n\t}\n\n\tif charset == nil {\n\t\tcharset = []rune(\"0123456789abcdef\")\n\t}\n\n\tvar random *frand.RNG\n\tif len(randomSeed) == 0 {\n\t\trandom = frand.New()\n\t} else {\n\t\t// frand.NewCustom needs a 32 byte seed. Take the SHA256 hash of whatever bytes we've been given as a\n\t\t// seed and pass the 32 byte result of that to frand.\n\t\thash := crypto.SHA256.New()\n\t\thash.Write(randomSeed)\n\t\tseed := hash.Sum(nil)\n\t\tbufsize := 1024 // Same bufsize as used by frand.New.\n\t\trounds := 12 // Same rounds as used by frand.New.\n\t\trandom = frand.NewCustom(seed, bufsize, rounds)\n\t}\n\n\trandomSuffix := make([]rune, randlen)\n\tfor i := range randomSuffix {\n\t\trandomSuffix[i] = charset[random.Intn(len(charset))]\n\t}\n\n\treturn prefix + string(randomSuffix), nil\n}", "title": "" }, { "docid": "c371fc14e20c93b2f432f18b55ee7bf8", "score": "0.64027584", "text": "func RandomString(n int) string {\n\treturn string(Random(n))\n}", "title": "" }, { "docid": "a7628dab5ff3132c4548503f0ce8ff1d", "score": "0.6394189", "text": "func randString() string {\n\tletterBytes := \"abcdefghijklmnopqrstuvwxyz\" // must be valid DNS\n\tb := make([]byte, 20)\n\tfor i := range b {\n\t\tb[i] = letterBytes[rand.Intn(len(letterBytes))]\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "bdb889c17494e9a65ff1109545458851", "score": "0.63872564", "text": "func (s *Skill) GenerateName() {\n\n\tvar n string\n\n\tif s.UserString != \"\" {\n\t\tn = fmt.Sprintf(\"%s (%s)\", s.CoreString, s.UserString)\n\t} else {\n\t\tn = s.CoreString\n\t}\n\ts.Name = n\n}", "title": "" }, { "docid": "d580c8baedbc8a227ae7881c1d0a4bdf", "score": "0.6371009", "text": "func (w *Words) GivenName() string {\n\treturn w.withBackup(func(w *Words) string { return chooseRandomString(w.listFromKey(\"given_names\")) })\n}", "title": "" }, { "docid": "119a8a93acd506f264150b58573653d8", "score": "0.6366666", "text": "func generateRandomInstanceName(dependencyMetaData *image.CellImageMetaData) (string, error) {\n\tu := make([]byte, 4)\n\t_, err := rand.Read(u)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tuuid := fmt.Sprintf(\"%x\", u)\n\n\t// Generating random instance name\n\treturn dependencyMetaData.Name + \"-\" + strings.Replace(dependencyMetaData.Version, \".\", \"-\", -1) + \"-\" + uuid, nil\n}", "title": "" }, { "docid": "efecba369bde998ea73e63592a7e2cc9", "score": "0.6357884", "text": "func tempFileName() string {\n\tbuffer := make([]byte, 16)\n\t_, _ = rand.Read(buffer)\n\tfor i := range buffer {\n\t\tbuffer[i] = (buffer[i] % 25) + 97 // a–z\n\t}\n\treturn string(buffer)\n}", "title": "" }, { "docid": "efecba369bde998ea73e63592a7e2cc9", "score": "0.6357884", "text": "func tempFileName() string {\n\tbuffer := make([]byte, 16)\n\t_, _ = rand.Read(buffer)\n\tfor i := range buffer {\n\t\tbuffer[i] = (buffer[i] % 25) + 97 // a–z\n\t}\n\treturn string(buffer)\n}", "title": "" }, { "docid": "cade8e45d5a559279cc0f153c08bed50", "score": "0.63532704", "text": "func RandomWithPrefix(name string) string {\n\treturn fmt.Sprintf(\"%s-%d\", name, rand.New(rand.NewSource(time.Now().UnixNano())).Int())\n}", "title": "" }, { "docid": "30e89c8f99c01c7f6b44aa34f6b6c9ab", "score": "0.63484436", "text": "func randFilename(prefix string, ext string) string {\n\tnow := strconv.FormatInt(time.Now().UTC().UnixNano(), 10)\n\treturn fmt.Sprintf(\"%s_%s_%d.%s\", prefix, now, rand.Uint32(), ext)\n}", "title": "" }, { "docid": "60c070a7088485ecff68f18555544e13", "score": "0.6344145", "text": "func GenerateDriverName() string {\n\treturn \"test-driver-\" + strconv.Itoa(rand.Intn(1000))\n}", "title": "" }, { "docid": "9753ec34db69f65cbc842285ff8cb828", "score": "0.6340198", "text": "func RandomString() string {\n\tnewUUID, err := uuid.NewV4()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn newUUID.String()\n}", "title": "" }, { "docid": "ea1e473bfd85a73e5f0e3b679427c1e7", "score": "0.63347834", "text": "func GenerateName(rss *unifflev1alpha1.RemoteShuffleService) string {\n\treturn utils.GenerateShuffleServerName(rss)\n}", "title": "" }, { "docid": "02ba0eef31e86272d1bac122dbe3ddf0", "score": "0.6328699", "text": "func RandomLetters(length int) string {\n\treturn RandomRunes(Letters, length)\n}", "title": "" }, { "docid": "f10a9ac8ac381fb18be87c3b1df7f01f", "score": "0.6320938", "text": "func RandomScaleName() string {\n\tif rand.Float64() > 0.5 {\n\t\treturn \"major\"\n\t}\n\treturn \"minor\"\n}", "title": "" }, { "docid": "282a0ee82106fa744706fb3f2904cf09", "score": "0.6320058", "text": "func GenerateName(pusher, data string) string {\n\tmac := hmac.New(md5.New, []byte(pusher))\n\tmac.Write([]byte(data))\n\tsum := mac.Sum(nil)\n\n\treturn pusher + \"_\" + hex.EncodeToString(sum)\n}", "title": "" }, { "docid": "b5dd0b032558bcf7567be8414596163c", "score": "0.6317793", "text": "func (r *Room) genUniqueName() (string) {\n return (*r).Name\n}", "title": "" }, { "docid": "554cc32c137fdaf61f45a2347c21c6e2", "score": "0.6314689", "text": "func randomNamePair() (string, string) {\n\tvar i1, i2 int\n\tfor i1 == i2 {\n\t\ti1 = rand.Intn(len(names))\n\t\ti2 = rand.Intn(len(names))\n\t}\n\treturn names[i1], names[i2]\n}", "title": "" } ]
2e2911b6fd023c54fb5679dccf0a6710
Return more than one value
[ { "docid": "3dfcbf5c8cb9aa5f64b0fa763e89e5b6", "score": "0.0", "text": "func swap(x, y string) (string, string) {\n\treturn y, x\n}", "title": "" } ]
[ { "docid": "4d4d702a6eb05a6f2e9c187488a44c45", "score": "0.6997864", "text": "func multiReturns() (value1 string, value2 string) {\n value1 = \"return string value 1\"\n value2 = \"return string value 2\"\n return\n}", "title": "" }, { "docid": "5e833069bc51d9819050170f7dd6d439", "score": "0.6901197", "text": "func returnMulti() (int, string) {\n\treturn 42, \"foobar\"\n\t}", "title": "" }, { "docid": "de9231c20d1bb1c7fb5bebc46009f1c1", "score": "0.66227627", "text": "func multipleReturn() (int, int) {\n\tvar c = 20\n\tvar a, b int = 1, c\n\treturn a, b\n}", "title": "" }, { "docid": "13151faf202211219f7c9d212f084f24", "score": "0.65693545", "text": "func MultipleReturnValues() {\n\t// use multiple assignment with the return values from the function\n\ta, b := vals()\n\tfmt.Println(a)\n\tfmt.Println(b)\n\n\t// Use the blank identifier if you only want a subset of the return values\n\t_, c := vals()\n\tfmt.Println(c)\n}", "title": "" }, { "docid": "061634f923fc09e65ee02b8dd8d985e1", "score": "0.6490926", "text": "func returnMulti2() (n int, s string) {\n\tn = 42\n\ts = \"foobar\"\n\t// n and s will be returned\n\treturn\n\t}", "title": "" }, { "docid": "d93ce83ee838aac289aa199402f22d43", "score": "0.6389357", "text": "func MultipleReturn(){\n\tage := 24 \n\tname:= \"juliar\" \n\tpekerjaan := \"Programmer\"\n\tnamaDanPekerjaan,umur := getBiography(age,name,pekerjaan)\n\tfmt.Println(namaDanPekerjaan)\n\tfmt.Println(\"umur saya =\", umur)\n\taddress, number := alamatSaya(10,\"trans sulawesi\")\n\tfmt.Println(\"jalan \"+ address)\n\tfmt.Println(\"nomor =\", number)\n\n}", "title": "" }, { "docid": "9ae0f53bcee6c721bf3905b980c6e13e", "score": "0.6337467", "text": "func helloMultipleVals() (string, string) {\n\treturn \"Hello\", \"Sir\"\n}", "title": "" }, { "docid": "515821b5933a7a7bb16b5e5c6ab9cc78", "score": "0.6118119", "text": "func multi() (int, int) {\n\treturn 5, 4\n}", "title": "" }, { "docid": "1adc6c56ed3a878527c9841e6c67c413", "score": "0.61130756", "text": "func (this *Iter_Testservice1_UnaryExample2) One() *Row_Testservice1_UnaryExample2 {\n\tfirst, hasFirst := this.Next()\n\tdefer this.rows.Close()\n\tif first != nil && first.err != nil && first.err != io.EOF {\n\t\treturn &Row_Testservice1_UnaryExample2{err: first.err}\n\t}\n\t_, hasSecond := this.Next()\n\tif !hasFirst || hasSecond {\n\t\tamount := \"none\"\n\t\tif hasSecond {\n\t\t\tamount = \"multiple\"\n\t\t}\n\t\treturn &Row_Testservice1_UnaryExample2{err: persist.NotFound{Msg: fmt.Sprintf(\"expected exactly 1 result from query 'UnaryExample2' found %s\", amount)}}\n\t}\n\treturn first\n}", "title": "" }, { "docid": "3e9e470c31882c8221a2bbbf5de0e3bd", "score": "0.61008215", "text": "func vals() (int, int) {\n return 3, 7\n}", "title": "" }, { "docid": "f4902cf01830268f90fbd78b2ac19da6", "score": "0.6090472", "text": "func multipleReturns(par1 int, par2 string) (int, string) {\n\tfmt.Println(\"the par2 has this value: \", par2)\n\treturn par1 * 2, par2 + \"-return\"\n}", "title": "" }, { "docid": "8ee6ba1ead1c038e0a00cf6cea0d61fc", "score": "0.6075071", "text": "func multipleReturnExample(f, s int) (int, bool) {\n\tisGreater := false\n\tif f > s {\n\t\tisGreater = true\n\t}\n\treturn f + s, isGreater\n}", "title": "" }, { "docid": "104f591ca91a81cb3a28d76a7951bc56", "score": "0.60230565", "text": "func vals() (int, int) {\n\treturn 2, 3\n}", "title": "" }, { "docid": "a1c43c44d52101f359c89dd9c2535e6b", "score": "0.5972655", "text": "func multiple(a,b string) (string,string) {\n return a,b\n}", "title": "" }, { "docid": "083008d50d21dbbb4dba749ce28fa442", "score": "0.58839655", "text": "func (u ValuesUnwrapper) One() ValueUnwrapper {\n\tif len(u.values) != 1 {\n\t\tu.error(\"a single value\", \"%d values\", len(u.values))\n\t}\n\treturn ValueUnwrapper{u.unwrapper}\n}", "title": "" }, { "docid": "57604bb1c5c15ecb07fd93cc39d59dd6", "score": "0.5817917", "text": "func f() (a int, b int) {\n\treturn 1, 2\n}", "title": "" }, { "docid": "8b004805494f50debe29bbedbda41c25", "score": "0.57834876", "text": "func (this *Iter_Testservice1_UnaryExample1) One() *Row_Testservice1_UnaryExample1 {\n\tfirst, hasFirst := this.Next()\n\tdefer this.rows.Close()\n\tif first != nil && first.err != nil && first.err != io.EOF {\n\t\treturn &Row_Testservice1_UnaryExample1{err: first.err}\n\t}\n\t_, hasSecond := this.Next()\n\tif !hasFirst || hasSecond {\n\t\tamount := \"none\"\n\t\tif hasSecond {\n\t\t\tamount = \"multiple\"\n\t\t}\n\t\treturn &Row_Testservice1_UnaryExample1{err: persist.NotFound{Msg: fmt.Sprintf(\"expected exactly 1 result from query 'UnaryExample1' found %s\", amount)}}\n\t}\n\treturn first\n}", "title": "" }, { "docid": "ebb247470212909a32ea00cc25476009", "score": "0.57442635", "text": "func (i Iop) Do(vs ...Value) (Value, error) { return vs[0], nil }", "title": "" }, { "docid": "84d6d53c28d0184fc7dc02129704207d", "score": "0.5723583", "text": "func doubleReturn(number int)(int,int){\n\treturn number*2,number*4\n}", "title": "" }, { "docid": "32f087ef6bc441e194310ab872e961c3", "score": "0.57038575", "text": "func twoReturnValues(x, y float64) (float64, float64) {\n\treturn x, y\n}", "title": "" }, { "docid": "d6aa56fb0db2bd7491f5275a79d6cb53", "score": "0.5659378", "text": "func addSingleReturn(terms ...int) int {\n\tresult := 0\n\tfor _, term := range terms {\n\t\tresult += term\n\t}\n\treturn result\n}", "title": "" }, { "docid": "b65c877cf359427d6ad8a524e2b842fc", "score": "0.5635124", "text": "func multiple(a, b string) (string, string) {\n\treturn a, b\n}", "title": "" }, { "docid": "2af937a9c99d743ecbae1244f803a0f8", "score": "0.560722", "text": "func vals() (int, int) {\n\treturn 3, 7\n}", "title": "" }, { "docid": "2af937a9c99d743ecbae1244f803a0f8", "score": "0.560722", "text": "func vals() (int, int) {\n\treturn 3, 7\n}", "title": "" }, { "docid": "2af937a9c99d743ecbae1244f803a0f8", "score": "0.560722", "text": "func vals() (int, int) {\n\treturn 3, 7\n}", "title": "" }, { "docid": "49a9a858625e8aeb8a7da9c42d8e0d7a", "score": "0.5593153", "text": "func Return1[A any](a A, _ ...any) A {\n\treturn a\n}", "title": "" }, { "docid": "cdbb5c4c0b74de9bf8ea1096d52e2385", "score": "0.5573038", "text": "func multipleNamedReturns(par1 int, par2 string) (val int, name string) {\n\tfmt.Println(\"the par2 has this value: \", par2)\n\tval = par1 * 2\n\tname = par2 + \"-test\"\n\treturn\n}", "title": "" }, { "docid": "e748d4e806640e74fe93d8516fea8aa4", "score": "0.5546653", "text": "func HelloWorldMultiReturn(fstName string, sndName string) (string, string) {\n\tvar fstGreet = \"Hello \" + fstName\n\tvar sndGreet = \"Bye \" + sndName\n\treturn fstGreet, sndGreet\n}", "title": "" }, { "docid": "c8b60eaf96fe871464e9357802f633ad", "score": "0.5546596", "text": "func ret() (string, int, bool, func()) {\n\treturn \"human\", 43, true, func() { fmt.Println(\"i am returned\") }\n}", "title": "" }, { "docid": "9dcfcade6b16f51c6d8d87232aa99c41", "score": "0.54927224", "text": "func SingleLineFuncCompositeReturn() SingleLineType", "title": "" }, { "docid": "acc791f473059e5c3594a7264971841b", "score": "0.54593444", "text": "func (this *Iter_ExtraServ_ExtraGetAllUsers) One() *Row_ExtraServ_ExtraGetAllUsers {\n\tfirst, hasFirst := this.Next()\n\tdefer func() {\n\t\tif this.rows != nil {\n\t\t\tthis.rows.Close()\n\t\t}\n\t}()\n\tif first != nil && first.err != nil && first.err != io.EOF {\n\t\treturn &Row_ExtraServ_ExtraGetAllUsers{err: first.err}\n\t}\n\t_, hasSecond := this.Next()\n\tif !hasFirst || hasSecond {\n\t\tamount := \"none\"\n\t\tif hasSecond {\n\t\t\tamount = \"multiple\"\n\t\t}\n\t\treturn &Row_ExtraServ_ExtraGetAllUsers{err: persist.NotFound{Msg: fmt.Sprintf(\"expected exactly 1 result from query 'ExtraGetAllUsers' found %s\", amount)}}\n\t}\n\treturn first\n}", "title": "" }, { "docid": "becc90c69c711fa045e81ff75b2e8e21", "score": "0.54589903", "text": "func twoRets(x int) (a int, b string) {\n\treturn 42 * x, \"forty-two\"\n}", "title": "" }, { "docid": "58e26ace29c59f1c61a1f0b2de616bf8", "score": "0.5423962", "text": "func retThree(x int) (int, int, int) { return 2 * x, x * x, -x\n}", "title": "" }, { "docid": "aed277ea4687d7538f981e8a4b5f7a10", "score": "0.54118025", "text": "func multiplyValueTypes(value int) (int, int, string) {\n return value, value * 10, \"calculated\"\n}", "title": "" }, { "docid": "3ede2024bc290b5f5b1a39bc41492430", "score": "0.53754336", "text": "func (i NopInstrumentation) SelectReturned(int) {}", "title": "" }, { "docid": "d88cbf6d235c5ab0d5eb1fccd42ffa9b", "score": "0.5361525", "text": "func functionReturnMultipleValues(text string) (string, string) {\n\tmay := strings.ToUpper(text)\n\tmin := strings.ToLower(text)\n\treturn min, may\n}", "title": "" }, { "docid": "917eb0288a351f5d9c10591386625376", "score": "0.53572327", "text": "func namedReturnValues(x, y string) (a,b string) {\n\tb = x\n\ta = y\n\treturn\n}", "title": "" }, { "docid": "cf9d8f37f42548a4a148175bde962419", "score": "0.53516257", "text": "func (v *customObject) GetMultiple(value ...string) ([]interface{}, error) {\n\tvar array []interface{}\n\n\tfor _, key := range value {\n\t\tval, err := v.Get(key)\n\t\tif err == nil {\n\t\t\tarray = append(array, val)\n\t\t} else {\n\t\t\treturn array, throw(\"current value \\\"\" + key + \"\\\" is not found\")\n\t\t}\n\t}\n\n\treturn array, nil\n}", "title": "" }, { "docid": "814a3fe2c29d0d14bbba5f7355098847", "score": "0.5336182", "text": "func (this *Iter_Testservice1_ServerStreamSelect) One() *Row_Testservice1_ServerStreamSelect {\n\tfirst, hasFirst := this.Next()\n\tdefer this.rows.Close()\n\tif first != nil && first.err != nil && first.err != io.EOF {\n\t\treturn &Row_Testservice1_ServerStreamSelect{err: first.err}\n\t}\n\t_, hasSecond := this.Next()\n\tif !hasFirst || hasSecond {\n\t\tamount := \"none\"\n\t\tif hasSecond {\n\t\t\tamount = \"multiple\"\n\t\t}\n\t\treturn &Row_Testservice1_ServerStreamSelect{err: persist.NotFound{Msg: fmt.Sprintf(\"expected exactly 1 result from query 'ServerStreamSelect' found %s\", amount)}}\n\t}\n\treturn first\n}", "title": "" }, { "docid": "bccde56aaac3d4bfb90d162c197e9324", "score": "0.5325811", "text": "func togo() (int, int, int) {\n\treturn 1, 2, 3\n}", "title": "" }, { "docid": "bbdd4954ccf8dea69b585e37e606caae", "score": "0.53256124", "text": "func (v *Value) get(params ...interface{}) (interface{}, error) {\n\tif len(params) == 0 {\n\t\treturn (*v)[len(*v)-1], nil\n\t}\n\n\tidx, ok := params[0].(int)\n\tif !ok {\n\t\treturn nil, newParamTypeErr(params[0], idx)\n\t}\n\n\tif idx < 0 || idx >= len(*v) {\n\t\treturn nil, newIndexErr(idx, len(*v))\n\t}\n\n\treturn (*v)[idx], nil\n}", "title": "" }, { "docid": "66b5b012a152f6b813bae168d53d0e11", "score": "0.5319763", "text": "func (u MyUnion) GetOne() (result MyUnionOne, ok bool) {\n armName, _ := u.ArmForSwitch(int32(u.Type))\n\n if armName == \"One\" {\n result = *u.One\n ok = true\n }\n\n return\n}", "title": "" }, { "docid": "6e89ced463afbf97adef6a694213da69", "score": "0.5318034", "text": "func (es ErrSet) ReturnValue() error {\n\trv := ErrSet{}\n\tfor _, err := range es {\n\t\tif err != nil {\n\t\t\trv = append(rv, err)\n\t\t}\n\t}\n\tif len(rv) == 0 {\n\t\treturn nil\n\t}\n\treturn rv\n}", "title": "" }, { "docid": "6e53ce2524c1309fbd8bc494b698e985", "score": "0.5316611", "text": "func ReturnOne(entity Entity, sql string, args ...interface{}) error {\n\n\trow, err := RunSQL(sql, args...)\n\tif err != nil {\n\t\tlogger.Error(\"SQL Execution\", err)\n\t\treturn err\n\t}\n\n\treturn Map(entity, row)\n}", "title": "" }, { "docid": "9f6c5c053150586e475bc36ebb38fd04", "score": "0.52861094", "text": "func (c Get) GetOne(getArg1 string) {\n\tfmt.Printf(`getArg1 %q\n `, getArg1)\n}", "title": "" }, { "docid": "850a641e42770aad793e8418e0cb495b", "score": "0.52783185", "text": "func (u MyUnion) GetTwo() (result MyUnionTwo, ok bool) {\n armName, _ := u.ArmForSwitch(int32(u.Type))\n\n if armName == \"Two\" {\n result = *u.Two\n ok = true\n }\n\n return\n}", "title": "" }, { "docid": "8a47cbb8501538e5c16ec6e85884529d", "score": "0.52660894", "text": "func (b bckt) getOne(key string) (dbVal,bool){\n\tvals := b.getAll()\n\tfor i:=0;i<len(vals);i++{\n\t\tif string(vals[i].k) == key{\n\t\t\treturn vals[i], true\n\t\t}\n\t}\n\treturn dbVal{}, false\n}", "title": "" }, { "docid": "e69bd6023466a14aa3a7daee72d95e1e", "score": "0.52601147", "text": "func (g *Goon) GetMulti(dst interface{}) error {\n\treturn g.getMulti(dst, true)\n}", "title": "" }, { "docid": "a61ae112284ecb811d520952cef2a607", "score": "0.5245036", "text": "func hitungPersegi(s int) (int, int){\n luas := s * s\n keliling := 4 * s\n\n return luas, keliling\n}", "title": "" }, { "docid": "62f829feedf896ae4c8b1674b04b2388", "score": "0.5230769", "text": "func (c *Core) GetValue(ctx context.Context, sql string, args ...interface{}) (Value, error) {\n\tone, err := c.db.GetOne(ctx, sql, args...)\n\tif err != nil {\n\t\treturn gvar.New(nil), err\n\t}\n\tfor _, v := range one {\n\t\treturn v, nil\n\t}\n\treturn gvar.New(nil), nil\n}", "title": "" }, { "docid": "977015d6285e8c5d86f8b30d6097b7f3", "score": "0.52253795", "text": "func (this *Iter_ExtraServ_ExtraSelectUserById) One() *Row_ExtraServ_ExtraSelectUserById {\n\tfirst, hasFirst := this.Next()\n\tdefer func() {\n\t\tif this.rows != nil {\n\t\t\tthis.rows.Close()\n\t\t}\n\t}()\n\tif first != nil && first.err != nil && first.err != io.EOF {\n\t\treturn &Row_ExtraServ_ExtraSelectUserById{err: first.err}\n\t}\n\t_, hasSecond := this.Next()\n\tif !hasFirst || hasSecond {\n\t\tamount := \"none\"\n\t\tif hasSecond {\n\t\t\tamount = \"multiple\"\n\t\t}\n\t\treturn &Row_ExtraServ_ExtraSelectUserById{err: persist.NotFound{Msg: fmt.Sprintf(\"expected exactly 1 result from query 'ExtraSelectUserById' found %s\", amount)}}\n\t}\n\treturn first\n}", "title": "" }, { "docid": "cf10524593c2c525b28ccfaf6e690d3d", "score": "0.520726", "text": "func ExecuteMultiRet() {\n\tfmt.Println(\"Inside funcExpression.ExecuteMutliRet\")\n\tdefer fmt.Println(\"Completed funcExpression.ExecuteMutliRet\")\n\n\tfor i := 1; i <= 10; i++ {\n\t\th, e := getHalfAndEven(i)\n\t\tfmt.Printf(\"Input = %d, half = %d, Even = %t\\n\", i, h, e)\n\t}\n}", "title": "" }, { "docid": "60c8fd6198753a57298b449467df9e08", "score": "0.5200369", "text": "func (us *UnionScanExec) getOneRow(ctx context.Context) ([]types.Datum, error) {\n\tsnapshotRow, err := us.getSnapshotRow(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\taddedRow, err := us.getAddedRow()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar row []types.Datum\n\tvar isSnapshotRow bool\n\tif addedRow == nil {\n\t\trow = snapshotRow\n\t\tisSnapshotRow = true\n\t} else if snapshotRow == nil {\n\t\trow = addedRow\n\t} else {\n\t\tisSnapshotRowInt, err := us.compare(us.Ctx().GetSessionVars().StmtCtx, snapshotRow, addedRow)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tisSnapshotRow = isSnapshotRowInt < 0\n\t\tif isSnapshotRow {\n\t\t\trow = snapshotRow\n\t\t} else {\n\t\t\trow = addedRow\n\t\t}\n\t}\n\tif row == nil {\n\t\treturn nil, nil\n\t}\n\n\tif isSnapshotRow {\n\t\tus.cursor4SnapshotRows++\n\t} else {\n\t\tus.cursor4AddRows = nil\n\t}\n\treturn row, nil\n}", "title": "" }, { "docid": "d7bdb346919d2e176d2735283fbf97e6", "score": "0.5183245", "text": "func (this *Iter_Testservice1_ClientStreamingExample) One() *Row_Testservice1_ClientStreamingExample {\n\tfirst, hasFirst := this.Next()\n\tdefer this.rows.Close()\n\tif first != nil && first.err != nil && first.err != io.EOF {\n\t\treturn &Row_Testservice1_ClientStreamingExample{err: first.err}\n\t}\n\t_, hasSecond := this.Next()\n\tif !hasFirst || hasSecond {\n\t\tamount := \"none\"\n\t\tif hasSecond {\n\t\t\tamount = \"multiple\"\n\t\t}\n\t\treturn &Row_Testservice1_ClientStreamingExample{err: persist.NotFound{Msg: fmt.Sprintf(\"expected exactly 1 result from query 'ClientStreamingExample' found %s\", amount)}}\n\t}\n\treturn first\n}", "title": "" }, { "docid": "c4484b81826cd36c37141074e5f0384f", "score": "0.5173318", "text": "func (v *ValueT) Get() (string, interface{}) {\n\treturn v.id, v.value\n}", "title": "" }, { "docid": "fa5a8cdd9fd0916926cfbb68c3846fc4", "score": "0.5169937", "text": "func Return2[A any](_ any, a A, _ ...any) A {\n\treturn a\n}", "title": "" }, { "docid": "1502bec15e3539af07c0fabb11087c13", "score": "0.5156165", "text": "func addMultiReturns(terms ...int) (int, int) {\n\tresult := 0\n\tfor _, term := range terms {\n\t\tresult += term\n\t}\n\treturn len(terms), result\n}", "title": "" }, { "docid": "0846520fd8b4e26d06b2c8ed8db26e6e", "score": "0.5154361", "text": "func getValue(a Argument, r0 int, r1 int, r2 int, mem []int) int {\n\tif a == R0 {\n\t\treturn r0\n\t} else if a == R1 {\n\t\treturn r1\n\t} else if a == R2 {\n\t\treturn r2\n\t} else if mem != nil && a < ARRAY_SIZE && a >= 0 {\n\t\treturn mem[a]\n\t}\n\tif DEBUG {\n\t\tassert(false, \"Invalid argument: \"+a.Pretty())\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "48c3c1dacac44387ce0e61a7d15b436c", "score": "0.5153293", "text": "func returnValue(msg string, numbers ...int) int {\n\tresult := 0\n\tfor _, v := range numbers {\n\t\tresult += v\n\t}\n\treturn result\n}", "title": "" }, { "docid": "df5933bde3e724030dffb239d109db25", "score": "0.51348704", "text": "func (l *BatchLimiter) get(r *Result) (bool, interface{}, error) {\n\tr.mu.Lock()\n\tdefer r.mu.Unlock()\n\treturn r.done, r.value, r.err\n}", "title": "" }, { "docid": "9c39c40e9345ef11460bdd77306cd73e", "score": "0.510918", "text": "func (self *RandomDataGenerator) Pick(ary []interface{}) interface{}{\n return self.Object.Call(\"pick\", ary)\n}", "title": "" }, { "docid": "56be38bd267315273a4be70dfe2b20b7", "score": "0.50936437", "text": "func multival(x int) (square, cube int) { // HL\n square = x * x // HL\n cube = x * x * x // HL\n return\n}", "title": "" }, { "docid": "1f712002d10b975e11dbc86c2a9b0c98", "score": "0.5083508", "text": "func getValue() int {\n\treturn 1;\n}", "title": "" }, { "docid": "29acc2ca756c85f75c5417b34be8f8ed", "score": "0.50699306", "text": "func (c Get) GetMany(getArg1, getArg2 string) {\n\tfmt.Printf(`getArg1 %q\n `, getArg1)\n\tfmt.Printf(`getArg2 %q\n `, getArg2)\n}", "title": "" }, { "docid": "6c7a8483f23043183b8ac992fdee01ef", "score": "0.5055761", "text": "func nameReturn(values ...int) (result int) {\n\tfor _, v := range values {\n\t\tresult += v\n\t}\n\treturn\n}", "title": "" }, { "docid": "e5fe25bc1771d9e715fa45c826251acf", "score": "0.5054818", "text": "func (h hand) getOnePair() int {\n\tmax := 0\n\tfor k, v := range h.getMap(0, 4) {\n\t\tif len(v) == 2 && k > max {\n\t\t\tmax = k\n\t\t}\n\t}\n\treturn max\n}", "title": "" }, { "docid": "7589b393498b49d2effb672aaff545a5", "score": "0.5043257", "text": "func Single[T ListOptioner, R any](opts T, list ListFunc[T, R]) (R, error) {\n\tmatches, _, err := list(opts)\n\tif err != nil {\n\t\treturn *new(R), err\n\t}\n\tif len(matches) != 1 {\n\t\treturn *new(R), ErrExactlyOneResultNotReturned\n\t}\n\treturn matches[0], nil\n}", "title": "" }, { "docid": "8a2dc83621c272c9707f385de09d59eb", "score": "0.504086", "text": "func (p Porm) One() map[string]string {\n\tqS := p.q.prepare()\n\treturn p.GetDb().QueryRow(qS)\n}", "title": "" }, { "docid": "dc120b6f42bcb120ba337f118b2a6e32", "score": "0.5030807", "text": "func (this *Iter_ExtraServ_ExtraUpdateUserName) One() *Row_ExtraServ_ExtraUpdateUserName {\n\tfirst, hasFirst := this.Next()\n\tdefer func() {\n\t\tif this.rows != nil {\n\t\t\tthis.rows.Close()\n\t\t}\n\t}()\n\tif first != nil && first.err != nil && first.err != io.EOF {\n\t\treturn &Row_ExtraServ_ExtraUpdateUserName{err: first.err}\n\t}\n\t_, hasSecond := this.Next()\n\tif !hasFirst || hasSecond {\n\t\tamount := \"none\"\n\t\tif hasSecond {\n\t\t\tamount = \"multiple\"\n\t\t}\n\t\treturn &Row_ExtraServ_ExtraUpdateUserName{err: persist.NotFound{Msg: fmt.Sprintf(\"expected exactly 1 result from query 'ExtraUpdateUserName' found %s\", amount)}}\n\t}\n\treturn first\n}", "title": "" }, { "docid": "89a813ba8256a0fe2fd1df12277ffde8", "score": "0.50303286", "text": "func (m *BookingStaffMemberBaseCollectionResponse) GetValue()([]BookingStaffMemberBaseable) {\n return m.value\n}", "title": "" }, { "docid": "18c14262aaef6b15a738944ec42f3680", "score": "0.502528", "text": "func (c *Context) Pop2() (*Value, *Value, error) {\n // B is first as it's the top value\n b, err := c.Pop()\n if err != nil {\n return nil, nil, err\n }\n\n // Now a\n a, err := c.Pop()\n if err != nil {\n return nil, nil, err\n }\n\n // a, b in the order you would expect\n return a, b, nil\n}", "title": "" }, { "docid": "c781d2a64bcfd4ad5b8ec7c7f48e7437", "score": "0.5014788", "text": "func (c UserStoreGetByIDFuncCall) Results() []interface{} {\n\treturn []interface{}{c.Result0, c.Result1}\n}", "title": "" }, { "docid": "b30648398f355ba54923c1bd5e89ce64", "score": "0.50081617", "text": "func input() (int,int,int) {\n \n var a,b,c int\n \n fmt.Println(\"Please input the first integer: \")\n fmt.Scan(&a)\n fmt.Println(\"Please input the second integer: \")\n fmt.Scan(&b)\n fmt.Println(\"Please input the maximum range for all multiples: \")\n fmt.Scan(&c)\n \n return a, b, c\n}", "title": "" }, { "docid": "52f167ad5489912c4a05c02a1b4df80f", "score": "0.5004028", "text": "func multiplyValue(value int) (valuePassed int, multiplyValue int) {\n valuePassed = value\n multiplyValue = value * 10\n return\n}", "title": "" }, { "docid": "7078262f98741ece568965aa2dc462c3", "score": "0.49884057", "text": "func GetAny(errors ...error) error {\n\tfor _, err := range errors {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0e36f9ff27681172d625e7b059c0801e", "score": "0.49741843", "text": "func (px *Paxos) Status(seq int) (bool, interface{}) {\n //fmt.Println(\"Status\")\n // if seq < px.GetMin() {\n // return false, nil\n // }\n px.mu.Lock()\n decided, _ := px.decidedInst[seq]\n val, _ := px.decidedValues[seq]\n px.mu.Unlock()\n return decided, val\n}", "title": "" }, { "docid": "64cdfc40de1176bce534e6bb43808201", "score": "0.49735683", "text": "func (mysql *MySQL) Multiple(ctx context.Context, query string, rdr ReaderFunc, args ...interface{}) ([]interface{}, error) {\n\terr := mysql.ensureConnected()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tstmt, err := mysql.db.PrepareContext(ctx, query)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer stmt.Close()\n\n\trows, err := stmt.QueryContext(ctx, args...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tvar items []interface{}\n\n\tfor rows.Next() {\n\t\titem, err := rdr(rows.Scan)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, item)\n\t}\n\n\t// Understanding that an error can be returned from here,\n\t// I can't seem to find or create a case where an error\n\t// would be returned.\n\t// err = rows.Err()\n\t// if err != nil {\n\t// \treturn nil, err\n\t// }\n\n\treturn items, nil\n}", "title": "" }, { "docid": "4816e7d5407a32cd2aaea81c8a3bb217", "score": "0.49728537", "text": "func (s MgoSet) GetOne(res interface{}, where ...string) (err error) {\n\treturn s.getPrep(where...).One(res)\n}", "title": "" }, { "docid": "a3d8172535475c7de6144b69c8e09ade", "score": "0.4969427", "text": "func r(l1,l2 int) (val1, val2 int) { //(val1 int, val2 int) \n\t val1 = l1*2\n\t val2 = l2*5\n\treturn\t// val1, val2\n}", "title": "" }, { "docid": "71e37c6d709f39a1350a0e022b15711d", "score": "0.49563423", "text": "func Return3[A any](_, _ any, a A, _ ...any) A {\n\treturn a\n}", "title": "" }, { "docid": "cb669fe2ebc9f2e556d940c09aa75e2a", "score": "0.49306792", "text": "func (p *Point) Values() (int, int) {\n\treturn p.X, p.Y\n}", "title": "" }, { "docid": "9e1c5cc8b81088969a6cc2cd140cec8e", "score": "0.49290574", "text": "func passAndReturn(x string, y int) (string, int) {\n\treturn x, y\n}", "title": "" }, { "docid": "90f4b531df7f71f1660f5f25b87e87e2", "score": "0.49275663", "text": "func TestNamedReturn(val1, val2 int) (sum int, multiply int) {\n\tsum = val1 + val2\n\tmultiply = val1 * val2\n\treturn sum, multiply\n}", "title": "" }, { "docid": "0c5143dfc9b8226d3ae156e3f46a51ff", "score": "0.49190268", "text": "func (el *Element) Value() []*ring.Poly {\n\treturn el.value\n}", "title": "" }, { "docid": "02657e73ded7c320f9bb8ff56eb20b4a", "score": "0.4909227", "text": "func TestMultipleValues(t *testing.T) {\n\tresult1 := \"Hello\"\n\tresult2 := \"World\"\n\n\terr := cupaloy.Snapshot(result1, result2)\n\tif err != nil {\n\t\tt.Errorf(\"You can snapshot multiple values in the same call to Snapshot %s\", err)\n\t}\n}", "title": "" }, { "docid": "bf684f392d893d24a2555dbf012ad927", "score": "0.49046797", "text": "func GetValue(key string) (string, bool) { return dc.GetValue(key) }", "title": "" }, { "docid": "edaefe43342c55b4d07e350ce8e10de8", "score": "0.490414", "text": "func OneValue(b Board) <-chan Board {\r\n\tcountGoroutines++\r\n\r\n\tc := make(chan Board)\r\n\tgo func() {\r\n\t\tdefer close(c)\r\n\r\n\t\tc <- b\r\n\t}()\r\n\r\n\treturn c\r\n}", "title": "" }, { "docid": "e260662b59afa5fbd4fdb8a23e6235e1", "score": "0.4903641", "text": "func myfirst() (Response, error){\r\n\t\r\n\trecord, err := getItem(2211)\r\n if err != nil {\r\n return Response {Message:\"Error\"}, err\r\n }\r\n\treturn Response {\r\n\t\t\tMessage: fmt.Sprintf(\"Employee %f : %s!\", record.ID, record.Value )}, nil\r\n\t\t\r\n}", "title": "" }, { "docid": "87cf53f737480e7aaf52a44debe9f1bb", "score": "0.48964718", "text": "func (q retroQuery) One(exec boil.Executor) (*Retro, error) {\n\to := &Retro{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(nil, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for retros\")\n\t}\n\n\tif err := o.doAfterSelectHooks(exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "410f442df28d455260b512f09edbdae1", "score": "0.4889336", "text": "func calc(x, y int) (int, int) { // fun function name(varibles)return values datatypes\n\tvar out1 = x + y\n\tvar out2 = x - y\n\treturn out1, out2 // return what you want to return (It can also return 2 values glang special feauture)\n\n}", "title": "" }, { "docid": "56929f519b43fce72f60c5d42ef7ae14", "score": "0.48800766", "text": "func foo(a int, b string) (string, int) {\n\treturn b + \"2\", a + 2\n}", "title": "" }, { "docid": "3db2d91697db23880760525b59ac76be", "score": "0.48746994", "text": "func (this *Iter_ExtraServ_ExtraCreateUsersTable) One() *Row_ExtraServ_ExtraCreateUsersTable {\n\tfirst, hasFirst := this.Next()\n\tdefer func() {\n\t\tif this.rows != nil {\n\t\t\tthis.rows.Close()\n\t\t}\n\t}()\n\tif first != nil && first.err != nil && first.err != io.EOF {\n\t\treturn &Row_ExtraServ_ExtraCreateUsersTable{err: first.err}\n\t}\n\t_, hasSecond := this.Next()\n\tif !hasFirst || hasSecond {\n\t\tamount := \"none\"\n\t\tif hasSecond {\n\t\t\tamount = \"multiple\"\n\t\t}\n\t\treturn &Row_ExtraServ_ExtraCreateUsersTable{err: persist.NotFound{Msg: fmt.Sprintf(\"expected exactly 1 result from query 'ExtraCreateUsersTable' found %s\", amount)}}\n\t}\n\treturn first\n}", "title": "" }, { "docid": "bed00ec003ba3e1cae0f5a2e2146e8a6", "score": "0.48675206", "text": "func (m *RelationCollectionResponse) GetValue()([]Relationable) {\n return m.value\n}", "title": "" }, { "docid": "5f731dd9b4be973fb191e0dea01ff4be", "score": "0.48573023", "text": "func (c Get) GetAll2(getValues map[string]string) {\n\tfmt.Printf(`getValues %q\n `, getValues)\n}", "title": "" }, { "docid": "812c0fd091c4cd33562b3bf8a41170f2", "score": "0.48527253", "text": "func (b *Bounds) Get() (*algebra.Vector, *algebra.Vector) {\n\treturn b.minimum, b.maximum\n}", "title": "" }, { "docid": "0a28dec4259dc910dbf5aaf320d1bc10", "score": "0.4848573", "text": "func (page ListResultPage) Values() []GenericResourceExpanded {\n\tif page.lr.IsEmpty() {\n\t\treturn nil\n\t}\n\treturn *page.lr.Value\n}", "title": "" }, { "docid": "b9ca9d9ab0e5c1c327078956b4c56b81", "score": "0.4839225", "text": "func (row *MibIfRow2) get() (ret error) {\n\treturn getIfEntry2(row)\n}", "title": "" }, { "docid": "c9e12e78b4ff7cb4bd846003da1044fc", "score": "0.483442", "text": "func (self *ArraySet) First() interface{}{\n return self.Object.Get(\"first\")\n}", "title": "" }, { "docid": "f879b9ed4e018995c9b7402c22f9c4a8", "score": "0.4822181", "text": "func (r *Result) Values() int {\n\treturn r.nValues\n}", "title": "" }, { "docid": "0e44ce7f4041f88352463632d3229999", "score": "0.4814925", "text": "func GetMulti(id string, collection string, row int, param int) (Models.PaginationResponseAyat, error) {\n\tvar res Models.PaginationResponseAyat\n\tnewId, _ := strconv.Atoi(id)\n\tvar parameterPage int = row * (param - 1)\n\ttotalData := countDataAyatBySurah(collection, newId)\n\n\tmeta := Helpers.GenerateMeta(param, row, totalData)\n\n\tif err := collections(collection).Find(bson.M{\"sura_id\": newId}).Limit(row).Skip(parameterPage).All(&res.Data); err != nil {\n\t\tres.Err = true\n\t\tres.Status = 500\n\t\tres.Message = \"internal server error\"\n\t\treturn res, nil\n\t}\n\n\tres.Err = false\n\tres.Status = 200\n\tres.Message = \"success get all data ayat \"\n\tres.Meta = meta\n\n\treturn res, nil\n}", "title": "" }, { "docid": "b66fb9ccac8f3e0c9a78a164d2203f5c", "score": "0.48085755", "text": "func plus(a int, b int) (c int, d int) {\n c = a + b \n d = a * b\n return c, d\n}", "title": "" } ]
8d70f8a6e3c9be01c3190c12ec3596e9
UpdateAuthor func will update author's data and returns that auhtor's data in JSON format
[ { "docid": "598f46fd8b0c1c7a9e43974b10c896d4", "score": "0.8210127", "text": "func UpdateAuthor(w http.ResponseWriter, r *http.Request) {\n\tparams := mux.Vars(r)\n\tid, err := strconv.Atoi(params[\"id\"])\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\tauhtor, err := repository.GetAuthor(id) //get current author data\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\tif auhtor.ID == 0 {\n\t\thttp.Error(w, \"Author not found by this ID\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tvar authorUpdates entity.Author //get author updates\n\t_ = json.NewDecoder(r.Body).Decode(&authorUpdates)\n\n\tif authorUpdates.Firstname != \"\" {\n\t\tauhtor.Firstname = authorUpdates.Firstname\n\t}\n\tif authorUpdates.Lastname != \"\" {\n\t\tauhtor.Lastname = authorUpdates.Lastname\n\t}\n\n\terr = repository.UpdateAuthor(auhtor)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(auhtor)\n}", "title": "" } ]
[ { "docid": "d2e0f3c1e100dd4e4e377cd8afe693d8", "score": "0.7090379", "text": "func PatchAuthor(httpResponse http.ResponseWriter, httpRequest *http.Request) {\n\n\t//\tfetch request variables\n\tvars := mux.Vars(httpRequest)\n\tid := model.NewID(vars[\"id\"])\n\n\tif !id.IsValid() {\n\t\thttpResponse.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t//\tfetch request payload\n\tvar requestData authorRequest\n\n\terr := json.NewDecoder(httpRequest.Body).Decode(&requestData)\n\tif nil != err {\n\t\thttpResponse.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif len(requestData.ID) > 0 && requestData.ID != string(*id) {\n\t\thttpResponse.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tauthor := model.NewAuthor(requestData.Name)\n\tif !author.IsValid() {\n\t\thttpResponse.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t//\tupdate the author by Id in the database\n\terr = store.UpdateAuthor(id, author)\n\tif err != nil {\n\t\thttpResponse.WriteHeader(http.StatusNotFound)\n\t\treturn\n\t}\n\n\t//\tfill response payload\n\tvar responseData = authorResponse{}\n\n\tresponseData.ID = string(*id)\n\tresponseData.Name = author.Name\n\n\thttpResponse.Header().Add(\"Content-Type\", \"application/json\")\n\thttpResponse.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(httpResponse).Encode(responseData)\n}", "title": "" }, { "docid": "4490d9cf8840b001f89fca4b20c18455", "score": "0.6310144", "text": "func GetAuthor(w http.ResponseWriter, r *http.Request) {\n\tparams := mux.Vars(r) // Get params\n\tid, err := strconv.Atoi(params[\"id\"])\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tauthor, err := repository.GetAuthor(id)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\tif author.ID == 0 {\n\t\thttp.Error(w, \"Author not found by this ID\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(author)\n}", "title": "" }, { "docid": "aece22fa442f3f24e4066ff44755c848", "score": "0.62936467", "text": "func (a *Author) Update() *AuthorUpdateOne {\n\treturn (&AuthorClient{config: a.config}).UpdateOne(a)\n}", "title": "" }, { "docid": "2c7d573f668e8da9edafda32be93dee3", "score": "0.6263115", "text": "func CreateUpdateAuthor(c *web.AppContext) {\n\tc.Event = model.EventAuthorAddUpdate\n\tdbObject, err := service.CreateUpdateAuthor(c)\n\tdoRespond(c, dbObject, err)\n\tc.SD.Client.Inc(\"Create_Update_Author\", 1, 1.0)\n}", "title": "" }, { "docid": "b222a0b0f9b02ad99c94f357c793adf8", "score": "0.6211447", "text": "func (c *AuthorClient) Update() *AuthorUpdate {\n\tmutation := newAuthorMutation(c.config, OpUpdate)\n\treturn &AuthorUpdate{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "title": "" }, { "docid": "b222a0b0f9b02ad99c94f357c793adf8", "score": "0.6211447", "text": "func (c *AuthorClient) Update() *AuthorUpdate {\n\tmutation := newAuthorMutation(c.config, OpUpdate)\n\treturn &AuthorUpdate{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "title": "" }, { "docid": "92f2443152744a85099166161349ca0f", "score": "0.6202091", "text": "func DeleteAuthor(w http.ResponseWriter, r *http.Request) {\n\tparams := mux.Vars(r)\n\tid, err := strconv.Atoi(params[\"id\"])\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\terr = repository.DeleteAuthor(id)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tauthors, err := repository.GetAllAuthors()\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(authors)\n}", "title": "" }, { "docid": "d2d186d5b2c36974b024a13e27cb5d39", "score": "0.6168286", "text": "func (client *PdfToPdfClient) SetAuthor(author string) *PdfToPdfClient {\n client.fields[\"author\"] = author\n return client\n}", "title": "" }, { "docid": "19d55d7e07c2272957f5def727c0516b", "score": "0.6134536", "text": "func (client *ImageToPdfClient) SetAuthor(author string) *ImageToPdfClient {\n client.fields[\"author\"] = author\n return client\n}", "title": "" }, { "docid": "28df431cf6114c534a9ef091e92420e6", "score": "0.60825586", "text": "func GetAuthor(httpResponse http.ResponseWriter, httpRequest *http.Request) {\n\n\t//\tfetch request variables\n\tvars := mux.Vars(httpRequest)\n\tid := model.NewID(vars[\"id\"])\n\n\tif !id.IsValid() {\n\t\thttpResponse.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t//\tget the author by Id from database\n\tvar author *model.Author\n\n\tauthor, err := store.GetAuthorByID(id)\n\tif err != nil {\n\t\thttpResponse.WriteHeader(http.StatusNotFound)\n\t\treturn\n\t}\n\n\t//\tfill response payload\n\tvar responseData = authorResponse{}\n\n\tresponseData.ID = author.Id\n\tresponseData.Name = author.Name\n\n\thttpResponse.Header().Add(\"Content-Type\", \"application/json\")\n\thttpResponse.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(httpResponse).Encode(responseData)\n}", "title": "" }, { "docid": "fb121d43b28a6737d231d1965174ea25", "score": "0.6077484", "text": "func authorsHandler(w http.ResponseWriter, r *http.Request, dbUtils *DatabaseUtils) *apiError {\n\t// get the rows\n\tvar authors []Author\n\tauthorsRows, err := dbUtils.StatementAuthors.Query()\n\tif err != nil {\n\t\treturn &apiError{\n\t\t\t\"authorsHandler.authorsRows.Err\",\n\t\t\terr,\n\t\t\t\"OOOOOPPPSSSS! error happen. don't panic! we will be back soon :)\",\n\t\t\thttp.StatusInternalServerError,\n\t\t}\n\t}\n\tdefer authorsRows.Close()\n\tfor authorsRows.Next() {\n\t\tvar author Author\n\t\tvar author_id int\n\t\tvar avatar_url, name, company_name, twitter_username sql.NullString\n\t\tif err := authorsRows.Scan(&author_id, &avatar_url, &name, &company_name, &twitter_username); err != nil {\n\t\t\treturn &apiError{\n\t\t\t\t\"authorsHandler.authorsRows.Scan.Err\",\n\t\t\t\terr,\n\t\t\t\t\"OOOOOPPPSSSS! error happen. don't panic! we will be back soon :)\",\n\t\t\t\thttp.StatusInternalServerError,\n\t\t\t}\n\t\t}\n\t\tauthor.Id = author_id\n\t\tauthor.Name = name.String\n\t\tif avatar_url.Valid {\n\t\t\tauthor.AvatarUrl = avatar_url.String\n\t\t} else {\n\t\t\tauthor.AvatarUrl = \"\"\n\t\t}\n\t\tif company_name.Valid {\n\t\t\tauthor.Company = company_name.String\n\t\t} else {\n\t\t\tauthor.Company = \"\"\n\t\t}\n\t\tif twitter_username.Valid {\n\t\t\tauthor.Twitter = twitter_username.String\n\t\t} else {\n\t\t\tauthor.Twitter = \"\"\n\t\t}\n\t\tauthors = append(authors, author)\n\t}\n\n\t// JSONP response\n\tquery := r.URL.Query()\n\tjsonp := query.Get(\"jsonp\")\n\tcallback := query.Get(\"callback\")\n\tif callback != \"\" || jsonp != \"\" {\n\t\tjsonResult, err := json.Marshal(authors)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\tif callback != \"\" {\n\t\t\tfmt.Fprintf(w, \"%s(%s)\", callback, jsonResult)\n\t\t\treturn nil\n\t\t}\n\n\t\tif jsonp != \"\" {\n\t\t\tfmt.Fprintf(w, \"%s(%s)\", jsonp, jsonResult)\n\t\t\treturn nil\n\t\t}\n\t}\n\n\t// response json\n\tauthorsResp := json.NewEncoder(w)\n\terr = authorsResp.Encode(authors)\n\tif err != nil {\n\t\treturn &apiError{\n\t\t\t\"authorsHandler.authorsResp.Err\",\n\t\t\terr,\n\t\t\t\"OOOOOPPPSSSS! error happen. don't panic! we will be back soon :)\",\n\t\t\thttp.StatusInternalServerError,\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "00f35b02bdf435572e6134ce9cb1747b", "score": "0.6053322", "text": "func (client *HtmlToPdfClient) SetAuthor(author string) *HtmlToPdfClient {\n client.fields[\"author\"] = author\n return client\n}", "title": "" }, { "docid": "084f300d635fc584a16aec8e6ae2534f", "score": "0.6028468", "text": "func createAuthor(w http.ResponseWriter, r *http.Request){\n\n\tw.Header().Set(\"Content-Type\",\"application/json\")\n\tvar author Author\n\t_ = json.NewDecoder(r.Body).Decode(&author)\n\tinsert, err := a.DB.Prepare(\"insert into AUTHORS(firstName,lastName) values(?,?);\")\n\tif err != nil {\n\t\tfmt.Print(err.Error())\n\t}\n\t_, err = insert.Exec(author.Firstname,author.Lastname)\n\tif err != nil {\n\t\tfmt.Print(err.Error())\n\t}\n\tjson.NewEncoder(w).Encode(author)\n\n}", "title": "" }, { "docid": "0ca39c63766496dc14d6c699eff28d81", "score": "0.60217446", "text": "func (iuo *ItemUpdateOne) SetAuthor(s string) *ItemUpdateOne {\n\tiuo.mutation.SetAuthor(s)\n\treturn iuo\n}", "title": "" }, { "docid": "8e3515117f27b94ca4ca87d55f73eea8", "score": "0.6014359", "text": "func (client *PdfToHtmlClient) SetAuthor(author string) *PdfToHtmlClient {\n client.fields[\"author\"] = author\n return client\n}", "title": "" }, { "docid": "c5d55505990ae56517f7465096d9854d", "score": "0.60074687", "text": "func (a *alchemy) Author(flavor string, data string, options ...url.Values) (result, error) {\n\treturn a.analyze(\"author\", flavor, data, options...)\n}", "title": "" }, { "docid": "b2083c8b8b4b7bbc605861427661c1e0", "score": "0.5997539", "text": "func UpdateAuthor(Id *model.ID, author *model.Author) error {\n\n\tobjectId, err := primitive.ObjectIDFromHex(string(*Id))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar replaceAuthor Author\n\n\treplaceAuthor.Id = objectId\n\treplaceAuthor.Name = author.Name\n\n\t//\tupdate the author in the collection\n\tctx, _ := context.WithTimeout(context.Background(), 10*time.Second)\n\t_, err = authorCollection.ReplaceOne(ctx, bson.M{\"_id\": objectId}, replaceAuthor)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "53572509aed4044a24732009e4da71cc", "score": "0.59586895", "text": "func (iu *ItemUpdate) SetAuthor(s string) *ItemUpdate {\n\tiu.mutation.SetAuthor(s)\n\treturn iu\n}", "title": "" }, { "docid": "e53d281fb40bb9b39688df59e26f0c2c", "score": "0.5948624", "text": "func Author() string {\n\treturn authorParsed\n}", "title": "" }, { "docid": "df42f8f396ebd3a249dc60b42b364ff5", "score": "0.58925277", "text": "func (a Author) String() string {\n\tja, _ := json.Marshal(a)\n\treturn string(ja)\n}", "title": "" }, { "docid": "9a8d8848a717df7797d5ff0f272e5250", "score": "0.5867502", "text": "func CreateAuthor(w http.ResponseWriter, r *http.Request) {\n\tvar author entity.Author\n\t_ = json.NewDecoder(r.Body).Decode(&author)\n\tid, err := repository.CreateAuthor(author)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\tauthor.ID = id\n\tw.WriteHeader(http.StatusCreated)\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(author)\n}", "title": "" }, { "docid": "0ad03ce269bc76dc7e110b1fae85d7b4", "score": "0.5853631", "text": "func (buo *BookUpdateOne) SetAuthor(s string) *BookUpdateOne {\n\tbuo.mutation.SetAuthor(s)\n\treturn buo\n}", "title": "" }, { "docid": "4281c76a8a638868a8c9572b9492f440", "score": "0.5845746", "text": "func (eb *Builder) Author(name, url, icon string) *Builder {\n\teb.embed.Author = &discordgo.MessageEmbedAuthor{Name: name, URL: url, IconURL: icon}\n\treturn eb\n}", "title": "" }, { "docid": "1ab8d7f2243efdfe8d2eb18eb245f49c", "score": "0.5822805", "text": "func (ci *ChangeItem) Author() string {\n\tif ci.AuthorRaw != nil {\n\t\treturn *ci.AuthorRaw\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "97a7994b2cb44c439bc896a5b6f80d73", "score": "0.57997465", "text": "func (c *Client) Author(ctx context.Context, token string) (string, error) {\n\t// Setup request\n\tcmds := []pdv2.PluginCmd{\n\t\t{\n\t\t\tToken: token,\n\t\t\tID: usermd.PluginID,\n\t\t\tCommand: usermd.CmdAuthor,\n\t\t\tPayload: \"\",\n\t\t},\n\t}\n\n\t// Send request\n\treplies, err := c.PluginReads(ctx, cmds)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tif len(replies) == 0 {\n\t\treturn \"\", fmt.Errorf(\"no replies found\")\n\t}\n\tpcr := replies[0]\n\terr = extractPluginCmdError(pcr)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Decode reply\n\tvar ar usermd.AuthorReply\n\terr = json.Unmarshal([]byte(pcr.Payload), &ar)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn ar.UserID, nil\n}", "title": "" }, { "docid": "87a06d040e6a313402ab400b6385ec0c", "score": "0.5793708", "text": "func (s *Service) UpdateAuthorCache(c context.Context, mid int64) (err error) {\n\terr = s.dao.DelCacheAuthor(c, mid)\n\tdao.PromInfo(\"author:更新作者状态\")\n\treturn\n}", "title": "" }, { "docid": "0992dc0a603de4fc7d1a9231a69de50d", "score": "0.5757869", "text": "func (bu *BookUpdate) SetAuthor(s string) *BookUpdate {\n\tbu.mutation.SetAuthor(s)\n\treturn bu\n}", "title": "" }, { "docid": "84bd67e5fef30d87e590b9e28610ae7b", "score": "0.57349706", "text": "func (gp *Fpdf) SetAuthor(authorStr string) {\n\tgp.GetInfo().Author = authorStr\n}", "title": "" }, { "docid": "75369555224bac6d38acc1eaf0c70964", "score": "0.57214296", "text": "func (o *DashboardListItem) SetAuthor(v Creator) {\n\to.Author = &v\n}", "title": "" }, { "docid": "75369555224bac6d38acc1eaf0c70964", "score": "0.57214296", "text": "func (o *DashboardListItem) SetAuthor(v Creator) {\n\to.Author = &v\n}", "title": "" }, { "docid": "95041040d29b7dd4b40cb89dd3a30cd4", "score": "0.5697606", "text": "func DeleteAuthor(httpResponse http.ResponseWriter, httpRequest *http.Request) {\n\n\t//\tfetch request variables\n\tvars := mux.Vars(httpRequest)\n\tid := model.NewID(vars[\"id\"])\n\n\tif !id.IsValid() {\n\t\thttpResponse.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t//\tdelete the author by Id from database\n\terr := store.DeleteAuthor(id)\n\tif err != nil {\n\t\thttpResponse.WriteHeader(http.StatusNotFound)\n\t\treturn\n\t}\n\n\t//\tfill response payload\n\thttpResponse.Header().Add(\"Content-Type\", \"application/json\")\n\thttpResponse.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "2e31e016608f5fb64a301b65edbc9a92", "score": "0.56935924", "text": "func (c *AuthorClient) UpdateOne(a *Author) *AuthorUpdateOne {\n\tmutation := newAuthorMutation(c.config, OpUpdateOne, withAuthor(a))\n\treturn &AuthorUpdateOne{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "title": "" }, { "docid": "2e31e016608f5fb64a301b65edbc9a92", "score": "0.56935924", "text": "func (c *AuthorClient) UpdateOne(a *Author) *AuthorUpdateOne {\n\tmutation := newAuthorMutation(c.config, OpUpdateOne, withAuthor(a))\n\treturn &AuthorUpdateOne{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "title": "" }, { "docid": "143238d6753421027c613cba6041098a", "score": "0.5649391", "text": "func (v versionModel) GetAuthor() string {\n\treturn fmt.Sprintf(\"by %s (source : %s)\", v.versionAuthor, v.versionSource)\n}", "title": "" }, { "docid": "c7a9d65ac5b20fff0b35153c140d99b1", "score": "0.5617983", "text": "func (n *noteStore) SetAuthor(id int64, author string) error {\n\t_, err := n.db.Exec(`update notes set author=? where id=?`, author, id)\n\treturn err\n}", "title": "" }, { "docid": "9f986f8a9f114e348ac040e0170620c0", "score": "0.56165284", "text": "func AddAuthor(author models.Author) (models.Author, error) {\n\tfullName := author.FullName\n\tif fullName == \"\" {\n\t\tfullName = \"Автор Неизвестен\"\n\t}\n\t_, err := db.Model(&author).\n\t\tWhere(\"full_name = ?\", fullName).\n\t\tSelectOrInsert()\n\tif err != nil {\n\t\treturn models.Author{}, err\n\t}\n\treturn author, nil\n}", "title": "" }, { "docid": "af434fa980f11e0e8d806711d8bd9c46", "score": "0.56134474", "text": "func (c BookController) UpdateBook(db *sql.DB) http.HandlerFunc {\n\n\treturn func (w http.ResponseWriter, r *http.Request){\n\t\tparams := mux.Vars(r)\n\t\n\t\tvar bookToUpdate models.Book\n\t\tjson.NewDecoder(r.Body).Decode(&bookToUpdate)\n\t\n\t\tresult, err := db.Exec(\"Update books set title=$1, author=$2, year=$3 where id=$4 returning id\", bookToUpdate.Title, bookToUpdate.Author, bookToUpdate.Year, params[\"id\"])\n\t\thelpers.LogFatal(err)\n\t\n\t\n\t\trowsUpdated, err := result.RowsAffected()\n\t\thelpers.LogFatal(err)\n\t\tjson.NewEncoder(w).Encode(rowsUpdated)\n\t}\n}", "title": "" }, { "docid": "2c3b97984578024c43500f7f29641bf7", "score": "0.5595943", "text": "func (t *LinkURL) Author(userID uint64) string {\n\treturn fmt.Sprintf(\"%s/users/%s\", t.BaseURL, strconv.FormatUint(userID, 10))\n}", "title": "" }, { "docid": "b667a9c31fdf7cfe7a2a4991e0a9c460", "score": "0.55810064", "text": "func (ic *ItemCreate) SetAuthor(s string) *ItemCreate {\n\tic.mutation.SetAuthor(s)\n\treturn ic\n}", "title": "" }, { "docid": "fc3e9a06fc178b9a0ed7f32e01b11550", "score": "0.5580721", "text": "func (m *MockModeler) UpdateAuthor(id int, name string) error {\n\tret := m.ctrl.Call(m, \"UpdateAuthor\", id, name)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "fb589733e66ac77eebbd016c721f9427", "score": "0.55805486", "text": "func GetAuthor(e ld.Entity) interface{} { return e.Get(Prop_Author.ID) }", "title": "" }, { "docid": "9d17e6ad5dc97755c7a493fe09b02255", "score": "0.557987", "text": "func UpdateEpisodeAuthor(db *sql.DB, episodeID, authorID int64) (err error) {\n\t_, err = db.Exec(\"UPDATE episodes SET author_id = $1 WHERE id = $2\", authorID, episodeID)\n\treturn\n}", "title": "" }, { "docid": "a4fb6e5a1ca6902f310440284ebc2d28", "score": "0.5572083", "text": "func (o *ResourceOwner) GetAuthorId() string {\n\tif o == nil || o.AuthorId == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.AuthorId\n}", "title": "" }, { "docid": "459d7af547f137b5307458c7e292a440", "score": "0.5566248", "text": "func setRepositoryAuthor(path, userName, userEmail string) error {\n\tif len(userName) > 0 {\n\t\tif err := SetUserName(path, userName); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif len(userEmail) > 0 {\n\t\tif err := SetUserEmail(path, userEmail); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7d360adf419172b56130130d1f14b513", "score": "0.55630964", "text": "func (a *Author) String() string {\n\tvar builder strings.Builder\n\tbuilder.WriteString(\"Author(\")\n\tbuilder.WriteString(fmt.Sprintf(\"id=%v\", a.ID))\n\tbuilder.WriteString(\", status=\")\n\tbuilder.WriteString(fmt.Sprintf(\"%v\", a.Status))\n\tbuilder.WriteString(\", created_at=\")\n\tbuilder.WriteString(a.CreatedAt.Format(time.ANSIC))\n\tbuilder.WriteString(\", updated_at=\")\n\tbuilder.WriteString(a.UpdatedAt.Format(time.ANSIC))\n\tbuilder.WriteString(\", fullName=\")\n\tbuilder.WriteString(a.FullName)\n\tbuilder.WriteString(\", age=\")\n\tbuilder.WriteString(fmt.Sprintf(\"%v\", a.Age))\n\tbuilder.WriteByte(')')\n\treturn builder.String()\n}", "title": "" }, { "docid": "d688a8c78793c0868fa6d85f7eb97677", "score": "0.55517346", "text": "func (auo *AuthorUpdateOne) Save(ctx context.Context) (*Author, error) {\n\tif _, ok := auo.mutation.UpdatedAt(); !ok {\n\t\tv := author.UpdateDefaultUpdatedAt()\n\t\tauo.mutation.SetUpdatedAt(v)\n\t}\n\n\tvar (\n\t\terr error\n\t\tnode *Author\n\t)\n\tif len(auo.hooks) == 0 {\n\t\tnode, err = auo.sqlSave(ctx)\n\t} else {\n\t\tvar mut Mutator = MutateFunc(func(ctx context.Context, m Mutation) (Value, error) {\n\t\t\tmutation, ok := m.(*AuthorMutation)\n\t\t\tif !ok {\n\t\t\t\treturn nil, fmt.Errorf(\"unexpected mutation type %T\", m)\n\t\t\t}\n\t\t\tauo.mutation = mutation\n\t\t\tnode, err = auo.sqlSave(ctx)\n\t\t\tmutation.done = true\n\t\t\treturn node, err\n\t\t})\n\t\tfor i := len(auo.hooks) - 1; i >= 0; i-- {\n\t\t\tmut = auo.hooks[i](mut)\n\t\t}\n\t\tif _, err := mut.Mutate(ctx, auo.mutation); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn node, err\n}", "title": "" }, { "docid": "8f992684326f53748b4086b5cccb7ff9", "score": "0.55447716", "text": "func (o *Pullrequest) SetAuthor(v Account) {\n\to.Author = &v\n}", "title": "" }, { "docid": "024163560b6f5f01758c21bde1af229b", "score": "0.5535781", "text": "func Author(set string) Option {\n\treturn func(req *request) {\n\t\treq.author = set\n\t}\n}", "title": "" }, { "docid": "0fe9fb34b0fdc3c713ac7ad3a3a7250d", "score": "0.5533294", "text": "func (a *Author) String() string {\n\ts := fmt.Sprintf(\"{FirstName => %v; LastName => %v; Age => %v; Height => %v, birthday => %v, luckyNumbers => %v(%v), attributes => %v[%v], likes => %v(%v), registrationDates => %v(%v) }\",\n\t\ta.FirstName, a.LastName, a.Age,\n\t\ta.Height, a.Birthday, a.LuckyNumbers, len(a.LuckyNumbers),\n\t\ta.Attributes64, len(a.Attributes64),\n\t\ta.Likes, len(a.Likes),\n\t\ta.RegistrationDates, len(a.RegistrationDates) )\n\n\treturn s\n}", "title": "" }, { "docid": "d4c7b13cf9fb149bd92640490305b12e", "score": "0.5501356", "text": "func (c *Client) DecodeAuthor(resp *http.Response) (*Author, error) {\n\tvar decoded Author\n\terr := c.Decoder.Decode(&decoded, resp.Body, resp.Header.Get(\"Content-Type\"))\n\treturn &decoded, err\n}", "title": "" }, { "docid": "f3949a18c45e33e57e834e44be0351bd", "score": "0.5492455", "text": "func (h *Handler) Authors(c echo.Context) error {\n\n authors, err := h.authorStore.Authors()\n if err != nil {\n fmt.Println(\"Authors error:\", err)\n return c.JSON(http.StatusInternalServerError, err)\n }\n\n\treturn c.JSON(http.StatusOK, authors)\n}", "title": "" }, { "docid": "0890e33a19ee54f5629df211852a7e6e", "score": "0.54902256", "text": "func (h *Handler) GetAuthor(c echo.Context) error {\n\n s := c.Param(\"id\")\n\n id, err := strconv.ParseUint(s, 10, 64)\n if err != nil {\n fmt.Println(\"GetAuthor error:\", err)\n return c.JSON(http.StatusBadRequest, err)\n }\n\n author, err2 := h.authorStore.GetAuthor(id)\n if err2 != nil {\n fmt.Println(\"GetAuthor error:\", err2)\n return c.JSON(http.StatusInternalServerError, err2)\n }\n\n return c.JSON(http.StatusOK, author)\n}", "title": "" }, { "docid": "0aa6d6c5263af254bed36bc983eecc7b", "score": "0.5489682", "text": "func Author() string {\n\treturn \"[Li Kexian](https://www.likexian.com/) & [fengjijiao](https://www.fjj.us/)\"\n}", "title": "" }, { "docid": "98d2e452a87935776516d9a1b126faa4", "score": "0.5473306", "text": "func (sb *PluginBuilder) Author(author, email string) *PluginBuilder {\n\tsb.value.Author = author\n\tsb.value.Email = email\n\treturn sb\n}", "title": "" }, { "docid": "6b055fc267c2a9e3461b26dcdc25ba93", "score": "0.54626095", "text": "func (ci *ChangeItem) AuthorURL() string {\n\tif ci.AuthorURLRaw != nil {\n\t\treturn *ci.AuthorURLRaw\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "df0217018a9449dedba1f920c9a4ce5b", "score": "0.5455268", "text": "func GetAuthor(filter models.AuthorRequest) (models.Author, error) {\n\tvar author models.Author\n\terr := db.Model(&author).Where(\"id = ?\", filter.ID).Select()\n\tif err != nil {\n\t\treturn models.Author{}, err\n\t}\n\treturn author, nil\n}", "title": "" }, { "docid": "d6e961e69463b4d8d059cdf9267135eb", "score": "0.54520124", "text": "func updateBook(w http.ResponseWriter, r *http.Request){\n\n\tvar books []Book\n\tvar book Book\n\tw.Header().Set(\"Content-Type\",\"application/json\")\n\tparams := mux.Vars(r)\n\t_ = json.NewDecoder(r.Body).Decode(&book)\n\tquery := \"update Books set bookTitle='\" + book.Title + \"', bookISBN='\" + book.Isbn + \"', idAuthor='\" + book.IDAuthor + \"', idBook='\" + params[\"id\"] + \"' where idBook=\" + params[\"id\"] + \";\"\n\tfmt.Println(query)\n\tupdate, err:= a.DB.Query(query)\n\tif err != nil {\n\t\tfmt.Print(err.Error())\n\t}\n\tupdate.Close()\n\tquery1 := \"select bookTitle, bookISBN, idAuthor from Books where idBook=\" + params[\"id\"]\n\trows, err := a.DB.Query(query1)\n\tif err != nil {\n\t\tfmt.Print(err.Error())\n\t}\n\tfor rows.Next() {\n\t\terr = rows.Scan(&book.Title, &book.Isbn, &book.IDAuthor)\n\t\tbooks = append(books, book)\n\t\tif err != nil {\n\t\t\tfmt.Print(err.Error())\n\t\t}\n\t}\n\tdefer rows.Close()\n\n\tjson.NewEncoder(w).Encode(books)\n\n}", "title": "" }, { "docid": "7198f31620eb862fb97441e979a11f6d", "score": "0.5444853", "text": "func (p *examplePackage) GetAuthor() string {\n\treturn \"lavrahq\"\n}", "title": "" }, { "docid": "a565b8fecca8dc0e2b1bb5dfb58cb906", "score": "0.54372627", "text": "func (b *Book) Author(db XODB) (*Author, error) {\n\treturn AuthorByAuthorID(db, b.AuthorID)\n}", "title": "" }, { "docid": "bf5da485291010f57de282f9b057fa78", "score": "0.5435419", "text": "func Author(v string) predicate.Book {\n\treturn predicate.Book(sql.FieldEQ(FieldAuthor, v))\n}", "title": "" }, { "docid": "3eb84009dbbca26daca94652a6d62f07", "score": "0.54351294", "text": "func AuthorURL() *u.URL {\n\treturn authorURLParsed\n}", "title": "" }, { "docid": "a24ad920b80f8559bf456f96732d3f77", "score": "0.5426511", "text": "func UpdatePublication(w http.ResponseWriter, r *http.Request) {\n\n\tuserId, error := security.ExtractUserId(r)\n\tif error != nil {\n\t\tresponses.ErrorResponse(w, http.StatusUnauthorized, error)\n\t\treturn\n\t}\n\n\tpathParameters := mux.Vars(r)\n\tid, error := strconv.ParseUint(pathParameters[\"id\"], 10, 64)\n\tif error != nil {\n\t\tresponses.ErrorResponse(w, http.StatusBadRequest, error)\n\t\treturn\n\t}\n\n\tdb, error := database.Connect()\n\tif error != nil {\n\t\tresponses.ErrorResponse(w, http.StatusInternalServerError, error)\n\t\treturn\n\t}\n\tdefer db.Close()\n\n\trepository := persistence.NewPublicationRepository(db)\n\tstoredPublication, error := repository.GetPublicationById(id)\n\tif error != nil {\n\t\tresponses.ErrorResponse(w, http.StatusInternalServerError, error)\n\t\treturn\n\t}\n\n\tif storedPublication.AuthorId != userId {\n\t\tresponses.ErrorResponse(w, http.StatusUnauthorized,\n\t\t\terrors.New(\"A user can edit its own publications, only\"))\n\t\treturn\n\t}\n\n\trequestBody, error := ioutil.ReadAll(r.Body)\n\tif error != nil {\n\t\tresponses.ErrorResponse(w, http.StatusUnprocessableEntity, error)\n\t\treturn\n\t}\n\n\tvar publication models.Publication\n\tif error = json.Unmarshal(requestBody, &publication); error != nil {\n\t\tresponses.ErrorResponse(w, http.StatusBadRequest, error)\n\t\treturn\n\t}\n\n\tpublication.AuthorId = userId\n\n\tif error = publication.Prepare(); error != nil {\n\t\tresponses.ErrorResponse(w, http.StatusBadRequest, error)\n\t\treturn\n\t}\n\n\terror = repository.UpdatePublication(id, publication)\n\tif error != nil {\n\t\tresponses.ErrorResponse(w, http.StatusInternalServerError, error)\n\t\treturn\n\t}\n\n\tresponses.JsonResponse(w, http.StatusNoContent, nil)\n}", "title": "" }, { "docid": "13dc3a666ebd54404f6853f9dda893a8", "score": "0.54174304", "text": "func authorHeader() string {\n\treturn \"# Authors\\n\\n\"\n}", "title": "" }, { "docid": "4d0861b61a5454c843561d9826771239", "score": "0.54011124", "text": "func Author() string {\n\treturn \"[Li Kexian](https://www.likexian.com/)\"\n}", "title": "" }, { "docid": "4d0861b61a5454c843561d9826771239", "score": "0.54011124", "text": "func Author() string {\n\treturn \"[Li Kexian](https://www.likexian.com/)\"\n}", "title": "" }, { "docid": "4d0861b61a5454c843561d9826771239", "score": "0.54011124", "text": "func Author() string {\n\treturn \"[Li Kexian](https://www.likexian.com/)\"\n}", "title": "" }, { "docid": "4d0861b61a5454c843561d9826771239", "score": "0.54011124", "text": "func Author() string {\n\treturn \"[Li Kexian](https://www.likexian.com/)\"\n}", "title": "" }, { "docid": "4d0861b61a5454c843561d9826771239", "score": "0.54011124", "text": "func Author() string {\n\treturn \"[Li Kexian](https://www.likexian.com/)\"\n}", "title": "" }, { "docid": "4d0861b61a5454c843561d9826771239", "score": "0.54011124", "text": "func Author() string {\n\treturn \"[Li Kexian](https://www.likexian.com/)\"\n}", "title": "" }, { "docid": "4d0861b61a5454c843561d9826771239", "score": "0.54011124", "text": "func Author() string {\n\treturn \"[Li Kexian](https://www.likexian.com/)\"\n}", "title": "" }, { "docid": "4d0861b61a5454c843561d9826771239", "score": "0.54011124", "text": "func Author() string {\n\treturn \"[Li Kexian](https://www.likexian.com/)\"\n}", "title": "" }, { "docid": "4d0861b61a5454c843561d9826771239", "score": "0.54011124", "text": "func Author() string {\n\treturn \"[Li Kexian](https://www.likexian.com/)\"\n}", "title": "" }, { "docid": "2d8d4c1e310f8a2713563e6f961b3c24", "score": "0.5365945", "text": "func (s *Service) AddAuthor(c context.Context, mid int64) (err error) {\n\tif len(s.activities) == 0 {\n\t\terr = ecode.ArtNoActivity\n\t\treturn\n\t}\n\tres, forbid, _ := s.IsAuthor(c, mid)\n\tif res {\n\t\treturn\n\t}\n\tif forbid {\n\t\terr = ecode.ArtUserDisabled\n\t\treturn\n\t}\n\tauthor, err := s.dao.RawAuthor(c, mid)\n\tif err != nil {\n\t\treturn\n\t}\n\tif author != nil {\n\t\tif (author.State == model.AuthorStateReject) || (author.State == model.AuthorStateClose) {\n\t\t\terr = ecode.ArtAuthorReject\n\t\t\treturn\n\t\t}\n\t}\n\terr = s.dao.AddAuthor(c, mid)\n\tif err == nil {\n\t\ts.dao.DelCacheAuthor(c, mid)\n\t}\n\treturn\n}", "title": "" }, { "docid": "9b0443514db8f6bce85f8801667ecd58", "score": "0.5358764", "text": "func (a Authoring) FeedAuthor() *gofeed.Person {\n\tif a.entry != nil {\n\t\treturn a.entry.Meta.Source.Feed.Author\n\t}\n\treturn &gofeed.Person{}\n}", "title": "" }, { "docid": "3779125666b04a20e9d65499ad6bf91b", "score": "0.5356148", "text": "func Update(w http.ResponseWriter, r *http.Request) {\n\n\tif !sessions.IsLoggedIn(r) {\n\t\thttp.Redirect(w, r, \"/login\", http.StatusSeeOther)\n\t\treturn\n\t}\n\tif r.Method != \"GET\" {\n\t\thttp.Error(w, http.StatusText(405), http.StatusMethodNotAllowed)\n\t\treturn\n\t}\n\n\tbk, err := models.GetBook(r)\n\tswitch {\n\tcase err == sql.ErrNoRows:\n\t\thttp.NotFound(w, r)\n\t\treturn\n\tcase err != nil:\n\t\thttp.Error(w, http.StatusText(500), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tbk.ConvertToJSON(w)\n\n}", "title": "" }, { "docid": "2570e5a768d66e5cd0d308ca25580cd2", "score": "0.53450656", "text": "func replaceYearAuthor(s, author string) string {\n\treturn fmt.Sprintf(s, time.Now().Year(), author)\n}", "title": "" }, { "docid": "0459fe9b53d988082abf5b7b4ada75b6", "score": "0.534239", "text": "func (is *IntermediateSchema) SortableAuthor() string {\n\tvar buf bytes.Buffer\n\tfor _, author := range is.Authors {\n\t\tbuf.WriteString(strings.ToLower(NonAlphaNumeric.ReplaceAllString(author.String(), \"\")))\n\t}\n\tbuf.WriteString(is.SortableTitle())\n\treturn buf.String()\n}", "title": "" }, { "docid": "3e17b52fb5597c423c05f16e7c1dd7f4", "score": "0.53377384", "text": "func (pdf *PDF) SetAuthor(author string) {\n\tpdf.author = author\n}", "title": "" }, { "docid": "46e6c7cdff16d1385187b96600821736", "score": "0.53287005", "text": "func (s *UpdateBookInput) SetAuthor(v string) *UpdateBookInput {\n\ts.Author = &v\n\treturn s\n}", "title": "" }, { "docid": "040a4d9ee819000affb4be6dc3a7bad3", "score": "0.5327583", "text": "func (e *EPub) AddAuthor(author string) {\n\te.authors = append(e.authors, author)\n\te.AddCreator(author, \"aut\")\n}", "title": "" }, { "docid": "4bc39ca75ad117d2341d54f7bd293108", "score": "0.53273433", "text": "func (b *ProtoBlock) Author() uint64 {\n\treturn b.Header.Author\n}", "title": "" }, { "docid": "ba90d9f18e87dacfc70110889e815e2a", "score": "0.5318238", "text": "func Authors(db *sql.DB, c *fiber.Ctx) error {\n\trows, err := db.Query(`SELECT id, email, name, last_name, created_at, updated_at FROM authors;`)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn fiber.NewError(400, \"Something went wrong, please try again soon.\")\n\t}\n\tdefer rows.Close()\n\tauthors := make([]author, 0)\n\tfor rows.Next() {\n\t\tauth := author{}\n\t\terr := rows.Scan(&auth.ID, &auth.Email, &auth.Name, &auth.LastName, &auth.CreatedAt, &auth.UpdatedAt)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn fiber.NewError(400, \"Something went wrong.\")\n\t\t}\n\t\tauthors = append(authors, auth)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\tfmt.Println(err)\n\t\treturn fiber.NewError(400, \"Something went wrong.\")\n\t}\n\treturn c.JSON(authors)\n}", "title": "" }, { "docid": "98879871625b8a1de569ef6d4fb944d0", "score": "0.53137606", "text": "func (kyc *KYCChaincode) updatePerson(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n err := kyc.checkArguments(args);\n if err != nil {\n return nil, err;\n }\n\n person := Person{};\n personAsJSON := args[0];\n personAsBytes := []byte(personAsJSON);\n unmarshalingError := json.Unmarshal(personAsBytes, &person);\n if unmarshalingError != nil {\n return nil, unmarshalingError;\n }\n\n updateErr := stub.PutState(person.Id, personAsBytes);\n if updateErr != nil {\n return nil, updateErr;\n }\n\n return nil, nil;\n}", "title": "" }, { "docid": "8c959e156dc1436b21513d894f85e686", "score": "0.53115684", "text": "func (r *GitUserResolver) UpdateUserFromPRAuthor(author *jenkinsv1.User, pullRequest *gits.GitPullRequest,\n\tcommits []*gits.GitCommit) (*jenkinsv1.User, error) {\n\n\tif pullRequest != nil {\n\t\tupdated := false\n\t\tif author != nil {\n\t\t\tgitLogin := r.GitUserLogin(author)\n\t\t\tif gitLogin == \"\" {\n\t\t\t\tgitLogin = author.Spec.Login\n\t\t\t}\n\t\t\tfor _, commit := range commits {\n\t\t\t\tif commit.Author != nil && gitLogin == commit.Author.Login {\n\t\t\t\t\tlog.Logger().Info(\"Found commit author match for: \" + author.\n\t\t\t\t\t\tSpec.Login + \" with email address: \" + commit.Author.Email + \"\\n\")\n\t\t\t\t\tauthor.Spec.Email = commit.Author.Email\n\t\t\t\t\tupdated = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif updated {\n\t\t\treturn r.JXClient.JenkinsV1().Users(r.Namespace).PatchUpdate(author)\n\t\t}\n\t}\n\treturn author, nil\n}", "title": "" }, { "docid": "8a0ff54ab38e5e4be209455bf9bf8c4e", "score": "0.53059465", "text": "func GetAuthorProfile(username string, c chan SlugsResponse) {\n\tr := SlugsResponse{\n\t\tAuthor: username,\n\t\tSlugs: []string{},\n\t\terr: false,\n\t}\n\n\turl := constructMediumAuthorURL(username)\n\tresp, err := http.Get(url)\n\tif err != nil {\n\t\tr.err = true\n\t\tc <- r\n\t\treturn\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != http.StatusOK {\n\t\tr.err = true\n\t\tc <- r\n\t\treturn\n\t}\n\n\tbodyBytes, err := ioutil.ReadAll(resp.Body)\n\tbodyString := string(bodyBytes)[16:]\n\n\tsuccess := gjson.Get(bodyString, \"success\").Bool()\n\n\tif success != true {\n\t\tr.err = true\n\t\tc <- r\n\t\treturn\n\t}\n\n\t// user := gjson.GetMany(bodyString, \"payload.user.username\")\n\tposts := gjson.Get(bodyString, \"payload.references.Post\").Map()\n\n\tfor _, p := range posts {\n\t\ts := gjson.Get(p.String(), \"uniqueSlug\").String()\n\t\tr.Slugs = append(r.Slugs, s)\n\t}\n\n\tc <- r\n}", "title": "" }, { "docid": "c99d054bedc643e6dd2f9ec9dfa49073", "score": "0.5301101", "text": "func (b *Books) ByAuthor(_ context.Context, last string) ([]Book, error) {\n\t<<!!YOUR_CODE!!>> - returns all books from a given author last name\n}", "title": "" }, { "docid": "b66cb1008d882f2138301889772c42e0", "score": "0.5284625", "text": "func authorName(a present.Author) string {\n\tel := a.TextElem()\n\n\tif len(el) == 0 {\n\t\treturn \"\"\n\t}\n\n\ttext, ok := el[0].(present.Text)\n\n\tif !ok || len(text.Lines) == 0 {\n\t\treturn \"\"\n\t}\n\n\treturn text.Lines[0]\n}", "title": "" }, { "docid": "72d8ad24bff3765303695507305467fd", "score": "0.52727777", "text": "func (b *EmbedBuilder) WithAuthor(name, url, iconUrl, proxyIconUrl string) *EmbedBuilder {\r\n\tb.emb.Author = &discordgo.MessageEmbedAuthor{\r\n\t\tURL: url,\r\n\t\tName: name,\r\n\t\tIconURL: iconUrl,\r\n\t\tProxyIconURL: proxyIconUrl,\r\n\t}\r\n\treturn b\r\n}", "title": "" }, { "docid": "1f710c011d90b059077b6fd2488c3d7f", "score": "0.52695245", "text": "func (o *Pullrequest) GetAuthor() Account {\n\tif o == nil || o.Author == nil {\n\t\tvar ret Account\n\t\treturn ret\n\t}\n\treturn *o.Author\n}", "title": "" }, { "docid": "5c16603805b2f4a618debcc2d958e5ab", "score": "0.52689236", "text": "func (d *DemoTOMLConfig) setAuthor(p map[string]string) (bool, error) {\n\treturn d.set(\"Author\", p)\n\n\t// casting (due to the design constraints, golang doesn't provide such feature on reflection casting...)\n\t/*\n\ttype ABC struct {\n\t\tNAme string\n\t}\n\tvar x1 ABC = ABC{ \"fuck\" }\n\tvar x2 interface{} = x1\n\tvar x3 reflect.Value = reflect.ValueOf(x2)\n\t\tfmt.Println(x3, reflect.TypeOf(x3)) // if x3 is not reflect.Value, all works\n\tv1 := reflect.ValueOf(x3)\n\ty1 := v1.Interface().(ABC) // y will have type float64.\n\tfmt.Println(y1, \"type?\", reflect.TypeOf(y1))\n\n\n\t//authorStruct := objVal.Interface().(Author)\n\t//fmt.Println(\"checkpoint\", authorStruct)\n\t//d.Author = authorStruct\n\t*/\n}", "title": "" }, { "docid": "38b529dd0c3f36ccfaab3df730247883", "score": "0.5263205", "text": "func (s *Story) RewriteAuthors(rewriter func(string) string) {\n\ts.Creator = rewriter(s.Creator)\n\ts.NextAuthor = rewriter(s.NextAuthor)\n\tfor i, part := range s.Parts {\n\t\tpart.Author = rewriter(part.Author)\n\t\ts.Parts[i] = part\n\t}\n}", "title": "" }, { "docid": "1d8a882dc6d39db725b31b22716d6e7f", "score": "0.525399", "text": "func (up *UnsavedPost) QueryAuthor() *AdminQuery {\n\treturn (&UnsavedPostClient{config: up.config}).QueryAuthor(up)\n}", "title": "" }, { "docid": "9f197b47fb94fbe516bb505bbcc7fc83", "score": "0.52534014", "text": "func (module *Tracker) Author() string {\n\treturn Author\n}", "title": "" }, { "docid": "724f97f65aef571734ab5babd87ab41c", "score": "0.5248768", "text": "func (s *IssuesService) Authors(opt *IssuesAuthorsOption) (v *IssuesAuthorsObject, resp *http.Response, err error) {\n\terr = s.ValidateAuthorsOpt(opt)\n\tif err != nil {\n\t\treturn\n\t}\n\treq, err := s.client.NewRequest(\"GET\", \"issues/authors\", opt)\n\tif err != nil {\n\t\treturn\n\t}\n\tv = new(IssuesAuthorsObject)\n\tresp, err = s.client.Do(req, v)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\treturn\n}", "title": "" }, { "docid": "d301353eb73f2c779e48f8b10f702056", "score": "0.5244921", "text": "func update(c *gin.Context) {\n\t// return specific user by Teacher ID\n\tdb, errdb := model.GetDB()\n\tif errdb != nil {\n\t\tfmt.Println(errdb)\n\t}\n\ttid := c.Param(\"id\")\n\tvar teacher model.Teacher\n\tvar newTeacher model.Teacher\n\tc.BindJSON(&newTeacher)\n\t// Get first matched record\n\tdb.Where(&model.Teacher{TID: tid}).First(&teacher)\n\tteacher.FirstName = newTeacher.FirstName\n\tteacher.LastName = newTeacher.LastName\n\tteacher.Password = newTeacher.Password\n\tdb.Save(&teacher)\n\tc.JSON(http.StatusOK, teacher)\n\n}", "title": "" }, { "docid": "b03db5734b338462b878ff7efd215df9", "score": "0.5243507", "text": "func (a Authors) String() string {\n\tja, _ := json.Marshal(a)\n\treturn string(ja)\n}", "title": "" }, { "docid": "27cb7b76f7f9c2f0540a9b8738b7b8c2", "score": "0.52342534", "text": "func (module *Telegram) Author() string {\n\treturn Author\n}", "title": "" }, { "docid": "dc5d2aa41f3b724daebcefd5c5f7f2eb", "score": "0.5233102", "text": "func Update(w http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\tvar (\n\t\tauthID string\n\t\terr error\n\t)\n\tif authID, err = authenticate(r); err != nil {\n\t\tresponseJSON(w, http.StatusUnauthorized, ResponseError{\n\t\t\tMessage: \"Authentication Faild\", // Faild -> failed (wrong test case)\n\t\t})\n\t\treturn\n\t}\n\tuserID := p.ByName(\"user_id\")\n\tif userID != authID {\n\t\tresponseJSON(w, http.StatusForbidden, ResponseError{\n\t\t\tMessage: \"No Permission for Update\",\n\t\t})\n\t\treturn\n\t}\n\tuser, err := userByID(userID)\n\tif err != nil {\n\t\tresponseJSON(w, http.StatusNotFound, ResponseError{\n\t\t\tMessage: \"No User found\",\n\t\t})\n\t\treturn\n\t}\n\trb := RequestBody{}\n\tif err := json.NewDecoder(r.Body).Decode(&rb); err != nil {\n\t\tresponseJSON(w, http.StatusBadRequest, ResponseError{\n\t\t\tMessage: \"User updation failed\",\n\t\t\tCause: \"JSON is expected\",\n\t\t})\n\t\treturn\n\t}\n\tif err := rb.validateUpdate(); err != nil {\n\t\tresponseJSON(w, http.StatusBadRequest, ResponseError{\n\t\t\tMessage: \"User updation failed\",\n\t\t\tCause: err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tuser.Nickname = rb.Nickname\n\tuser.Comment = rb.Comment\n\tif err := user.update(); err != nil {\n\t\tresponseJSON(w, http.StatusBadRequest, ResponseError{\n\t\t\tMessage: \"User updation failed\",\n\t\t\tCause: err.Error(),\n\t\t})\n\t\treturn\n\t}\n\trecipe := []User{\n\t\t{\n\t\t\tNickname: user.Nickname,\n\t\t\tComment: user.Comment,\n\t\t},\n\t}\n\tresponseJSON(w, http.StatusOK, ResponseUpdate{\n\t\tMessage: \"User successfully updated\",\n\t\tRecipe: recipe,\n\t})\n\treturn\n}", "title": "" }, { "docid": "590eeb8ff13563269b9842760f88b024", "score": "0.5230625", "text": "func (s *PdfMaroto) SetAuthor(author string, isUTF8 bool) {\n\ts.Pdf.SetAuthor(author, isUTF8)\n}", "title": "" }, { "docid": "bd1fefb4beefbfb29e14be1fe76950b2", "score": "0.52298665", "text": "func (mt *Author) Validate() (err error) {\n\n\tif mt.AuthorName == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"author_name\"))\n\t}\n\tif mt.Href == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"href\"))\n\t}\n\tif mt.AuthorID < 1 {\n\t\terr = goa.MergeErrors(err, goa.InvalidRangeError(`response.author_id`, mt.AuthorID, 1, true))\n\t}\n\tif utf8.RuneCountInString(mt.AuthorName) < 1 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`response.author_name`, mt.AuthorName, utf8.RuneCountInString(mt.AuthorName), 1, true))\n\t}\n\tif utf8.RuneCountInString(mt.AuthorName) > 128 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`response.author_name`, mt.AuthorName, utf8.RuneCountInString(mt.AuthorName), 128, false))\n\t}\n\treturn\n}", "title": "" } ]
2486edd3c9d41dd2d5b47f6e599f3e96
EnterExpr is called when production expr is entered.
[ { "docid": "d46847382a12667c74c2092f1dcf9645", "score": "0.8366254", "text": "func (s *BaseXPath31Listener) EnterExpr(ctx *ExprContext) {}", "title": "" } ]
[ { "docid": "b71f0887ae8f46e87c113894b83a4cf6", "score": "0.85054284", "text": "func (s *BasetinycListener) EnterExpr(ctx *ExprContext) {}", "title": "" }, { "docid": "360b1bf84830f733ee07be949f0d2608", "score": "0.8470503", "text": "func (s *BaseBSLListener) EnterExpr(ctx *ExprContext) {}", "title": "" }, { "docid": "e9a8bee61bbfa4feafa41d7150bcefc7", "score": "0.8441195", "text": "func (s *BaseAim8Listener) EnterExpr(ctx *ExprContext) {}", "title": "" }, { "docid": "a3204998c4b5ba0d5831aa3f2be0e026", "score": "0.84316313", "text": "func (s *BaseinfosapientListener) EnterExpr(ctx *ExprContext) {}", "title": "" }, { "docid": "f354e5ac788540625ef9f28e078e9635", "score": "0.8227573", "text": "func (s *BasePainlessParserListener) EnterExpr(ctx *ExprContext) {}", "title": "" }, { "docid": "9ca55f81cd81599c13336e58e42feea6", "score": "0.7870631", "text": "func (s *BaseExprParserListener) EnterExpression(ctx *ExpressionContext) {}", "title": "" }, { "docid": "895ed90b399649b8a682a536f989e2f5", "score": "0.76867616", "text": "func (s *BaseFaultParserListener) EnterExpr(ctx *ExprContext) {}", "title": "" }, { "docid": "601394ef5180de6de019da66edb15c9d", "score": "0.7652969", "text": "func (s *BasePROV_NListener) EnterExpression(ctx *ExpressionContext) {}", "title": "" }, { "docid": "a2fa70efab37e7aefe3ad072c551b090", "score": "0.7645278", "text": "func (s *BaseFqlParserListener) EnterExpression(ctx *ExpressionContext) {}", "title": "" }, { "docid": "c1b61e5020b63736db7c405909a56a7e", "score": "0.75616366", "text": "func (s *BasegengineListener) EnterExpression(ctx *ExpressionContext) {}", "title": "" }, { "docid": "6befc2b5ec2857353b6d32a5cbb09cc3", "score": "0.7466555", "text": "func (s *BaseDart2Listener) EnterExpression(ctx *ExpressionContext) {}", "title": "" }, { "docid": "369342632d379940b0e1ee69f52a556a", "score": "0.7444652", "text": "func (s *BaseGoParserListener) EnterExpression(ctx *ExpressionContext) {}", "title": "" }, { "docid": "51f0536ac57dfd6e27f46a94deaf755a", "score": "0.7443418", "text": "func (s *BaseromannumeralsListener) EnterExpression(ctx *ExpressionContext) {}", "title": "" }, { "docid": "3aae695d06ec9ed0423b8144dbbf700e", "score": "0.73856497", "text": "func (s *MyListener) EnterExpression(ctx *ExpressionContext) {\r\n\tlog.Print(\"EnterExpression\")\r\n}", "title": "" }, { "docid": "e479f309e3c9a0b839020fa1e7dd0b4d", "score": "0.73551273", "text": "func (s *BaseExprParserListener) EnterExpressions(ctx *ExpressionsContext) {}", "title": "" }, { "docid": "75fbc4dc3042059d33a1973f707fa80b", "score": "0.73541486", "text": "func (s *BaseDart2Listener) EnterExpressionStatement(ctx *ExpressionStatementContext) {}", "title": "" }, { "docid": "20411d1baa19d87ad5b567cc2a1b2401", "score": "0.7313061", "text": "func (s *BaseGoParserListener) EnterExpressionStmt(ctx *ExpressionStmtContext) {}", "title": "" }, { "docid": "aa3f743e681468530dd7a6627bb3b536", "score": "0.73047686", "text": "func (s *BasegengineListener) EnterExpressionAtom(ctx *ExpressionAtomContext) {}", "title": "" }, { "docid": "c272c543598185af70f3330f101faf61", "score": "0.72667044", "text": "func (s *BaseAim8Listener) EnterSexpr(ctx *SexprContext) {}", "title": "" }, { "docid": "f70655a205f6451099de6e436e61bae4", "score": "0.71693915", "text": "func (s *BaseFqlParserListener) EnterFunctionCallExpression(ctx *FunctionCallExpressionContext) {}", "title": "" }, { "docid": "356d8b8eeb81baf9635ede0bf1d29336", "score": "0.7109522", "text": "func (s *BaseFqlParserListener) EnterExpressionAtom(ctx *ExpressionAtomContext) {}", "title": "" }, { "docid": "b5fdafeb8da00ec2953746464b401fc5", "score": "0.70818055", "text": "func (s *BaseExprListener) EnterClosure(ctx *ClosureContext) {}", "title": "" }, { "docid": "96a2bcc01f154062241b43800865afd7", "score": "0.7053642", "text": "func (s *BaseXPath31Listener) EnterExprsingle(ctx *ExprsingleContext) {}", "title": "" }, { "docid": "2154e781460ab47ee8273746e0effdbe", "score": "0.7045869", "text": "func (s *BaseAim8Listener) EnterMexpr(ctx *MexprContext) {}", "title": "" }, { "docid": "9552256480618c075d36edeef09ee2e7", "score": "0.7028697", "text": "func (s *MyListener) EnterExpressionStatement(ctx *ExpressionStatementContext) {\r\n\tlog.Print(\"EnterExpressionStatement\")\r\n}", "title": "" }, { "docid": "6b0dd0cd7503b19a934e50ff423847c9", "score": "0.69801205", "text": "func (s *BaseJavaScriptParserListener) EnterExpressionStatement(ctx *ExpressionStatementContext) {}", "title": "" }, { "docid": "798b8840cefb41aa46dadb82a32e930f", "score": "0.69496113", "text": "func (s *BaseExprParserListener) EnterPrimaryExpr(ctx *PrimaryExprContext) {}", "title": "" }, { "docid": "e069a36a5cd9a22a73efb5e0987a661d", "score": "0.69468987", "text": "func (l *listener) EnterSelectExpr(ctx *grammar.SelectExprContext) {\n\tif l.stmt != nil {\n\t\tl.stmt.resetExprStack()\n\t}\n}", "title": "" }, { "docid": "320c7939af9d9d0aae85499a93a5d014", "score": "0.6937195", "text": "func (s *BaseXPath31Listener) EnterValueexpr(ctx *ValueexprContext) {}", "title": "" }, { "docid": "cac618fbf668d1333375b01f6bdd9714", "score": "0.6931547", "text": "func (s *BaseGoParserListener) EnterUnaryExpr(ctx *UnaryExprContext) {}", "title": "" }, { "docid": "b5e7cf2e7f059c2f665d95d0ccdee6c7", "score": "0.69293857", "text": "func (s *BaseXPath31Listener) EnterLetexpr(ctx *LetexprContext) {}", "title": "" }, { "docid": "94b2e0f45ab3195ea8ceadac0c6ea85d", "score": "0.69164836", "text": "func (s *BasePROV_NListener) EnterEndExpression(ctx *EndExpressionContext) {}", "title": "" }, { "docid": "0c5aa8a390fe0401c5547cd36227113a", "score": "0.6906333", "text": "func (s *BaseGoParserListener) EnterPrimaryExpr(ctx *PrimaryExprContext) {}", "title": "" }, { "docid": "f146bd5661150ba2d23b154ae4814f6b", "score": "0.68846244", "text": "func (s *BaseJavaScriptParserListener) EnterNewExpression(ctx *NewExpressionContext) {}", "title": "" }, { "docid": "447a46f7e3d7c0bb30af080f8d27b8d6", "score": "0.688131", "text": "func (s *BasePROV_NListener) EnterAgentExpression(ctx *AgentExpressionContext) {}", "title": "" }, { "docid": "e741dc4d443e02727e0b0cfdeb4b86a1", "score": "0.6876065", "text": "func (s *BaseXPath31Listener) EnterPostfixexpr(ctx *PostfixexprContext) {}", "title": "" }, { "docid": "18d10f78dc606b2d2995c48bad64cf3c", "score": "0.68314785", "text": "func (s *BasePROV_NListener) EnterStartExpression(ctx *StartExpressionContext) {}", "title": "" }, { "docid": "bf2bf104f65dce5536127c7dd9de1872", "score": "0.6816342", "text": "func (s *BaseExprListener) EnterStart(ctx *StartContext) {}", "title": "" }, { "docid": "bf2bf104f65dce5536127c7dd9de1872", "score": "0.6816342", "text": "func (s *BaseExprListener) EnterStart(ctx *StartContext) {}", "title": "" }, { "docid": "34d52a81c6fd28b1c05bf9d510722b6d", "score": "0.6786862", "text": "func (s *BaseExprParserListener) EnterVar_(ctx *Var_Context) {}", "title": "" }, { "docid": "72ac2d058cdaaaca3bc0d29cb7e3bba9", "score": "0.6781765", "text": "func (s *BaseExprParserListener) EnterOperand(ctx *OperandContext) {}", "title": "" }, { "docid": "c2465b193a1255fcd3331b69fb4aec2b", "score": "0.6779946", "text": "func (s *BaseExprParserListener) EnterExpressionList(ctx *ExpressionListContext) {}", "title": "" }, { "docid": "e71d0c095c759f5d20a3964a2d74cdb5", "score": "0.6729573", "text": "func (s *BaseGoParserListener) EnterExprCaseClause(ctx *ExprCaseClauseContext) {}", "title": "" }, { "docid": "1b3690706f2bb4da0149a7ba08c886fb", "score": "0.6725671", "text": "func (l *listener) EnterExprAtom(ctx *grammar.ExprAtomContext) {\n\tif l.stmt != nil {\n\t\tl.stmt.visitExprAtom(ctx)\n\t}\n}", "title": "" }, { "docid": "39b9d38a1399afc845d52cb1a698a46f", "score": "0.67034847", "text": "func (l *listener) EnterFieldExpr(ctx *grammar.FieldExprContext) {\n\tif l.stmt != nil {\n\t\tl.stmt.visitFieldExpr(ctx)\n\t}\n}", "title": "" }, { "docid": "252f0fdad7ddef0660c705596f291c68", "score": "0.66978014", "text": "func (s *BasePROV_NListener) EnterInvalidationExpression(ctx *InvalidationExpressionContext) {}", "title": "" }, { "docid": "3360147f1f47a25987974b1388041b7c", "score": "0.6683201", "text": "func (s *BaseExprParserListener) EnterLiteral(ctx *LiteralContext) {}", "title": "" }, { "docid": "3ba7ad08786e2f0b9f7a5ae62e8cee39", "score": "0.668263", "text": "func (s *BaseExprListener) EnterCall(ctx *CallContext) {}", "title": "" }, { "docid": "c43a6094d2dacd20f565d9e2b1bddcaf", "score": "0.66791403", "text": "func (s *BaseFqlParserListener) EnterForExpressionSource(ctx *ForExpressionSourceContext) {}", "title": "" }, { "docid": "a7eae3f24cb7f7b181f9b2cc3bc99afa", "score": "0.6677664", "text": "func (s *BaseXPath31Listener) EnterInlinefunctionexpr(ctx *InlinefunctionexprContext) {}", "title": "" }, { "docid": "c67fa1ccf9a7df2ae3aaad8157bdc0bb", "score": "0.6677568", "text": "func (s *BaseGoParserListener) EnterExprSwitchStmt(ctx *ExprSwitchStmtContext) {}", "title": "" }, { "docid": "17091cad61c01eb2ce545a6fec2dd1ea", "score": "0.6672099", "text": "func (s *BaseCobol85Listener) EnterEvaluateStatement(ctx *EvaluateStatementContext) {}", "title": "" }, { "docid": "d7427542a5f7af4e4eee34e8287c110b", "score": "0.6671025", "text": "func (s *BaseJavaScriptParserListener) EnterFunctionExpression(ctx *FunctionExpressionContext) {}", "title": "" }, { "docid": "2f149f64f539c2ad1fef315241c0d7c8", "score": "0.6665495", "text": "func (s *BaseExprParserListener) EnterCall(ctx *CallContext) {}", "title": "" }, { "docid": "ba2c24b064ff202332817e658dc8759e", "score": "0.66526634", "text": "func (s *BaseExprListener) EnterParenthesis(ctx *ParenthesisContext) {}", "title": "" }, { "docid": "6556ed246de0782d0b4be559defcdaaa", "score": "0.6645649", "text": "func (s *MyListener) EnterPostfixExpression(ctx *PostfixExpressionContext) {\r\n\tlog.Print(\"EnterPostfixExpression\")\r\n}", "title": "" }, { "docid": "98825b795b96cbf72e5205f15345f04a", "score": "0.6624307", "text": "func (s *BaseBSLListener) EnterDefOrExpr(ctx *DefOrExprContext) {}", "title": "" }, { "docid": "45db50c1c06d9614bf60a29c17f92554", "score": "0.6624201", "text": "func (s *BaseXPath31Listener) EnterAdditiveexpr(ctx *AdditiveexprContext) {}", "title": "" }, { "docid": "2d3ae70b89607f5ac0ba2b8c0a3bf736", "score": "0.6621361", "text": "func (pl *PMMPostParseListener) EnterExprgroup(ctx *grammar.ExprgroupContext) {\n\tgroupscope, _ := corelang.Begingroup(pl.rt, \"expr-group\")\n\tpl.annotate(ctx, groupscope, \"\") // Annotate the AST node with this scope\n}", "title": "" }, { "docid": "ef604b8d22bf321e60bead6956ba8d16", "score": "0.661942", "text": "func (s *MyListener) EnterShiftExpression(ctx *ShiftExpressionContext) {\r\n\tlog.Print(\"EnterShiftExpression\")\r\n}", "title": "" }, { "docid": "1d8c2a50312ba381284764102722f173", "score": "0.6617754", "text": "func (s *BasePROV_NListener) EnterEntityExpression(ctx *EntityExpressionContext) {}", "title": "" }, { "docid": "eb01829a9cc5318e24fb027e21ae7b8f", "score": "0.66153866", "text": "func (s *BaseDart2Listener) EnterNayaExpression(ctx *NayaExpressionContext) {}", "title": "" }, { "docid": "13add1c9832d1b96ac47d0a51c546e6c", "score": "0.66120535", "text": "func (s *BaseJavaScriptParserListener) EnterInExpression(ctx *InExpressionContext) {}", "title": "" }, { "docid": "1840288f728ecc484f4a3c51bce24540", "score": "0.66074365", "text": "func (s *BaseDart2Listener) EnterFunctionExpression(ctx *FunctionExpressionContext) {}", "title": "" }, { "docid": "e411bc44385cd8f1c120a615c97c3ca1", "score": "0.6606847", "text": "func (s *BaseXPath31Listener) EnterStepexpr(ctx *StepexprContext) {}", "title": "" }, { "docid": "9ea520ee2dc210ac659ed03640be09ff", "score": "0.6603225", "text": "func (s *BaseXPath31Listener) EnterRangeexpr(ctx *RangeexprContext) {}", "title": "" }, { "docid": "a52baf5072569f0c41ec033c0b419953", "score": "0.6589823", "text": "func (s *BasetinycListener) EnterParen_expr(ctx *Paren_exprContext) {}", "title": "" }, { "docid": "2b01533e5614fb8d46487850acf80821", "score": "0.6584519", "text": "func (s *BaseFqlParserListener) EnterBodyExpression(ctx *BodyExpressionContext) {}", "title": "" }, { "docid": "9d7fb8279703d9ca696f43dae0bcaf93", "score": "0.65714526", "text": "func (s *BaseFqlParserListener) EnterForExpressionBody(ctx *ForExpressionBodyContext) {}", "title": "" }, { "docid": "b2463f7afc243a33085ef2515f86f2bc", "score": "0.65584064", "text": "func (s *MyListener) EnterAdditiveExpression(ctx *AdditiveExpressionContext) {\r\n\tlog.Print(\"EnterAdditiveExpression\")\r\n}", "title": "" }, { "docid": "5583aa9b3bdc4b06f5395113572a8595", "score": "0.6538575", "text": "func (s *BaseDart2Listener) EnterExpressionList(ctx *ExpressionListContext) {}", "title": "" }, { "docid": "427e1afd46c5c7378ed5c2d872fc103a", "score": "0.6538068", "text": "func (s *BaseJaclListener) EnterSingleExpression(ctx *SingleExpressionContext) {}", "title": "" }, { "docid": "aa32e6faae39ff532318e9395f90cd32", "score": "0.6532921", "text": "func (s *BasePROV_NListener) EnterGenerationExpression(ctx *GenerationExpressionContext) {}", "title": "" }, { "docid": "e0435572acd9a5b1921112e82469c1dc", "score": "0.652651", "text": "func (s *BaseFaultParserListener) EnterLrExpr(ctx *LrExprContext) {}", "title": "" }, { "docid": "19ee3e62759792f6f5e344fadc030bc4", "score": "0.6525238", "text": "func (s *BaseJavaScriptParserListener) EnterPowerExpression(ctx *PowerExpressionContext) {}", "title": "" }, { "docid": "b232062a013eb64ca3ecc25bc8e75195", "score": "0.65238124", "text": "func (s *BaseDart2Listener) EnterPostfixExpression(ctx *PostfixExpressionContext) {}", "title": "" }, { "docid": "478e75441b77e884c62b7dcf1b609e27", "score": "0.651856", "text": "func (s *BaseCalcListener) EnterParens(ctx *ParensContext) {}", "title": "" }, { "docid": "8c08374af9b2d6bc0bfb097874d965dc", "score": "0.6512341", "text": "func (s *BaseFqlParserListener) EnterUseExpression(ctx *UseExpressionContext) {}", "title": "" }, { "docid": "bc9a856e87a99ff830ec54c70d1db34a", "score": "0.6511521", "text": "func (s *MyListener) EnterRelationalExpression(ctx *RelationalExpressionContext) {\r\n\tlog.Print(\"EnterRelationalExpression\")\r\n}", "title": "" }, { "docid": "081119236bba284ea836dde06a28a639", "score": "0.65014267", "text": "func (s *BaseGoParserListener) EnterExpressionList(ctx *ExpressionListContext) {}", "title": "" }, { "docid": "54a0282edae1403adab8dff6c08007a8", "score": "0.650038", "text": "func (s *BaseCobol85Listener) EnterArithmeticExpression(ctx *ArithmeticExpressionContext) {}", "title": "" }, { "docid": "c45798c83a14e21e44cc521240562d28", "score": "0.64936745", "text": "func (s *BaseXPath31Listener) EnterOrexpr(ctx *OrexprContext) {}", "title": "" }, { "docid": "2bb22a158e69235347625a6643597f57", "score": "0.6489115", "text": "func (s *BaseFqlParserListener) EnterFunctionCall(ctx *FunctionCallContext) {}", "title": "" }, { "docid": "2edb2489f1b86475321648bd9bbd1e5a", "score": "0.64852834", "text": "func (s *MyListener) EnterUnaryExpression(ctx *UnaryExpressionContext) {\r\n\tlog.Print(\"EnterUnaryExpression\")\r\n}", "title": "" }, { "docid": "410773880e1bd9f596b46c264f066aaa", "score": "0.6469982", "text": "func (s *BaseJavaScriptParserListener) EnterLiteralExpression(ctx *LiteralExpressionContext) {}", "title": "" }, { "docid": "ff15c234ecf0f536357f7de873b89f14", "score": "0.64400464", "text": "func (s *BasegengineListener) EnterMathExpression(ctx *MathExpressionContext) {}", "title": "" }, { "docid": "96eba899d299a3f47ae2e4ba57fdd968", "score": "0.6427265", "text": "func (s *BaseXPath31Listener) EnterTreatexpr(ctx *TreatexprContext) {}", "title": "" }, { "docid": "d3d4c0c24c61a7f17e71c36aa6a694b8", "score": "0.6410283", "text": "func (s *BasePROV_NListener) EnterInfluenceExpression(ctx *InfluenceExpressionContext) {}", "title": "" }, { "docid": "0e3b1cccf092818d9f9fac808f2d8ad2", "score": "0.6409131", "text": "func (s *BaseXPath31Listener) EnterPrimaryexpr(ctx *PrimaryexprContext) {}", "title": "" }, { "docid": "7e51ba3237dbd120c5e6a25d3bd99050", "score": "0.64036155", "text": "func (s *BaseJavaScriptParserListener) EnterAdditiveExpression(ctx *AdditiveExpressionContext) {}", "title": "" }, { "docid": "d8ee1bb8767721d8d87641c22bfb50e0", "score": "0.6402105", "text": "func (s *MyListener) EnterAssignmentExpression(ctx *AssignmentExpressionContext) {\r\n\tlog.Print(\"EnterAssignmentExpression\")\r\n}", "title": "" }, { "docid": "ad608035c7a0582a21d9d2d95111c6a5", "score": "0.63895035", "text": "func (s *BaseDart2Listener) EnterAdditiveExpression(ctx *AdditiveExpressionContext) {}", "title": "" }, { "docid": "70b1ebc0bf021fde1a11d14c8de30a7e", "score": "0.6367291", "text": "func (s *MyListener) EnterEqualityExpression(ctx *EqualityExpressionContext) {\r\n\tlog.Print(\"EnterEqualityExpression\")\r\n}", "title": "" }, { "docid": "7dd52408b378b8e7c1c2599b2316a09d", "score": "0.6367103", "text": "func (s *BaseDart2Listener) EnterRelationalExpression(ctx *RelationalExpressionContext) {}", "title": "" }, { "docid": "5c2c2222cf2aabb5cb2b26fdeedad171", "score": "0.63626873", "text": "func (s *BaseExprListener) EnterIdentifier(ctx *IdentifierContext) {}", "title": "" }, { "docid": "69e4887208b65cfc93fc5c561f3bd0f5", "score": "0.6355192", "text": "func (s *BaseFqlParserListener) EnterForExpression(ctx *ForExpressionContext) {}", "title": "" }, { "docid": "fab8ca64cd236c794a5deeec9762aa63", "score": "0.6346379", "text": "func (s *BaseXPath31Listener) EnterUnaryexpr(ctx *UnaryexprContext) {}", "title": "" }, { "docid": "4516cf3ba13d2c8fbd79fa595300b52d", "score": "0.63436204", "text": "func (s *MyListener) EnterForExpression(ctx *ForExpressionContext) {\r\n\tlog.Print(\"EnterForExpression\")\r\n}", "title": "" }, { "docid": "2ebea4d9993b401b124320b83957a329", "score": "0.63397604", "text": "func (s *BaseExprListener) EnterBinary(ctx *BinaryContext) {}", "title": "" }, { "docid": "08c8f65789e6743a0f88f3e2b379a32a", "score": "0.63358134", "text": "func (s *BaseSHARCParserListener) EnterInitExpression(ctx *InitExpressionContext) {}", "title": "" } ]
fb35070eaf45ddae2c3e7406a156f127
dirPath returns a string describing the path to the sypgp home folder
[ { "docid": "7e963678d4c46c230ea66358dbd6c34d", "score": "0.7939204", "text": "func dirPath() string {\n\tsypgpDir := os.Getenv(\"SINGULARITY_SYPGPDIR\")\n\tif sypgpDir == \"\" {\n\t\treturn filepath.Join(syfs.ConfigDir(), \"sypgp\")\n\t}\n\treturn sypgpDir\n}", "title": "" } ]
[ { "docid": "4588283baae4105c86319b28fc2d7dfb", "score": "0.6845259", "text": "func homeDir() string {\n\thome, err := com.HomeDir()\n\tif err != nil {\n\t\treturn \"/\"\n\t}\n\treturn home\n}", "title": "" }, { "docid": "e5c33ed85be634618732a1bf046a73d7", "score": "0.678492", "text": "func homeDir() string {\n\tu, err := user.Current()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn u.HomeDir\n}", "title": "" }, { "docid": "68da310c28b88c3631d8f7c17622fead", "score": "0.67430377", "text": "func homeDir() (string, error) {\n\tusr, err := user.Current()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn usr.HomeDir, nil\n}", "title": "" }, { "docid": "8cace44c28869928347430ea2b7cd683", "score": "0.6723526", "text": "func homeDirPath() (string, error) {\n\thomeDir, err := os.UserHomeDir()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tpath := homeDir + \"/\" + FileName\n\tif !fileExists(path) {\n\t\treturn \"\", fmt.Errorf(\"Configuration file %s not found\", path)\n\t}\n\n\treturn path, nil\n}", "title": "" }, { "docid": "47ef365eef1150d93d50993e69038e00", "score": "0.668373", "text": "func (d *Distro) HomeDir() string {\n\tif d.User == \"root\" {\n\t\treturn filepath.Join(\"/\", d.User)\n\t}\n\tif d.Arch == evergreen.ArchDarwinAmd64 || d.Arch == evergreen.ArchDarwinArm64 {\n\t\treturn filepath.Join(\"/Users\", d.User)\n\t}\n\treturn filepath.Join(\"/home\", d.User)\n}", "title": "" }, { "docid": "80969b5f69b7c00db1560cd3031615af", "score": "0.66433585", "text": "func homeDir() string {\n\tusr, _ := user.Current()\n\treturn usr.HomeDir\n}", "title": "" }, { "docid": "c80dba376bc9f34f104f238ca67ff19c", "score": "0.66130793", "text": "func homeDir() (string, error) {\n\tusr, err := user.Current()\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"Cannot determine current user: %w\", err)\n\t}\n\treturn usr.HomeDir, nil\n}", "title": "" }, { "docid": "c00ee90406afb631192d872f88193878", "score": "0.6563593", "text": "func (server ServerInternal) HomeDir() string {\n\tswitch server.Username {\n\tcase \"root\":\n\t\treturn \"/root\"\n\tdefault:\n\t\treturn fmt.Sprintf(\"/home/%s\", server.Username)\n\t}\n}", "title": "" }, { "docid": "467b77dc5a4d0ecf3f177e8ff00519fa", "score": "0.65468013", "text": "func HomeDir() string {\n\tpath, err := homedir.Dir()\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not determine users home dir, try again -- err: %v\", err)\n\t}\n\n\treturn path\n}", "title": "" }, { "docid": "b27f910da9c0082c79e05a04061611db", "score": "0.653253", "text": "func homeDir() string {\n\tif home := os.Getenv(\"HOME\"); home != \"\" {\n\t\treturn home\n\t}\n\tif usr, err := user.Current(); err == nil {\n\t\treturn usr.HomeDir\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "474371260dd07859866afbd60342075d", "score": "0.64903975", "text": "func PuppetLabsDir() (string, error) {\n\tdir, err := windows.KnownFolderPath(windows.FOLDERID_ProgramData, windows.KF_FLAG_DEFAULT)\n\tif err != nil {\n\t\treturn dir, err\n\t}\n\n\treturn filepath.Join(dir, \"PuppetLabs\"), nil\n}", "title": "" }, { "docid": "e295bb0980961890171f90847e0b5c5a", "score": "0.6460982", "text": "func HomeDirPath() (string, error) {\n\tif user, err := user.Current(); err != nil {\n\t\treturn \"\", err\n\t} else if stat, err := os.Stat(user.HomeDir); os.IsNotExist(err) {\n\t\treturn \"\", err\n\t} else if stat.IsDir() == false {\n\t\treturn \"\", fmt.Errorf(\"Invalid home directory\")\n\t} else {\n\t\treturn filepath.Clean(user.HomeDir), nil\n\t}\n}", "title": "" }, { "docid": "c1c95850d06505e4438c0bcaf4d925df", "score": "0.6413651", "text": "func (l List) HomeDir() string {\n\treturn string(l)\n}", "title": "" }, { "docid": "e53cdcee0db4df01dc9d8d1a7ffa2bb8", "score": "0.6380342", "text": "func getHomeDir() (string, error) {\n\tu, err := user.Current()\n\tif err != nil {\n\t\treturn \"\", errors.Trace(err)\n\t}\n\treturn u.HomeDir, nil\n}", "title": "" }, { "docid": "0e2d2daa20d812de114dd7c94e6fa517", "score": "0.6374201", "text": "func GetHomeDir() string {\n\tc := C.g_get_home_dir()\n\treturn C.GoString((*C.char)(c))\n}", "title": "" }, { "docid": "ec965ec773621ec9e45c1085b774f4ac", "score": "0.63691527", "text": "func RenderHomeRootedDir(path string) string {\n\tuserDir, err := os.UserHomeDir()\n\tutil.CheckErr(err)\n\tresult := strings.Replace(path, userDir, \"~\", 1)\n\tresult = strings.Replace(result, \"\\\\\", \"/\", -1)\n\treturn result\n}", "title": "" }, { "docid": "73e3da22bedb24dfcf5798632ad94d5d", "score": "0.63672465", "text": "func Path(relatedPath string) string {\n\treturn filepath.Join(homeDir, relatedPath)\n}", "title": "" }, { "docid": "1cee5b34e7ab9fbd99f7d70a032ce916", "score": "0.6351555", "text": "func RenderHomeRootedDir(path string) string {\n\tuserDir, err := gohomedir.Dir()\n\tutil.CheckErr(err)\n\tresult := strings.Replace(path, userDir, \"~\", 1)\n\tresult = strings.Replace(result, \"\\\\\", \"/\", -1)\n\treturn result\n}", "title": "" }, { "docid": "a13394709e305b99c3dbf20cee33ff2d", "score": "0.63427895", "text": "func (r *FileSystem) HomeDir() (string, error) {\n\treturn os.UserHomeDir()\n}", "title": "" }, { "docid": "0cad2a2e83dbaf6c26704ca9444b9f0f", "score": "0.632374", "text": "func Path(dbFile string) (string, error) {\n\tif dbFile != \"\" {\n\t\treturn dbFile, nil\n\t}\n\tconfigs, err := os.UserConfigDir()\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"no user config directory\")\n\t}\n\n\tdir := filepath.Join(configs, \"envy\")\n\tif err := os.MkdirAll(dir, 0700); err != nil {\n\t\treturn \"\", errors.Wrap(err, \"unable to not create config directory\")\n\t}\n\n\treturn filepath.Join(dir, filename), nil\n}", "title": "" }, { "docid": "62718df412300c1924a3863a4d865060", "score": "0.6307861", "text": "func getPath(path string) string {\n\tconst storeDir = \".counts/data\"\n\tusr, _ := user.Current()\n\tdataPath := filepath.Join(usr.HomeDir, storeDir)\n\treturn dataPath\n}", "title": "" }, { "docid": "27c2173fd4cf16e5f158ef94be38d3c4", "score": "0.6278116", "text": "func Dir() (string, error) {\n\tif !DisableCache {\n\t\tcacheLock.RLock()\n\t\tcached := homedirCache\n\t\tcacheLock.RUnlock()\n\t\tif cached != \"\" {\n\t\t\treturn cached, nil\n\t\t}\n\t}\n\n\tcacheLock.Lock()\n\tdefer cacheLock.Unlock()\n\n\t// Determine OS speific current homedir.\n\tresult, err := dir()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Cache for future lookups.\n\thomedirCache = result\n\treturn result, nil\n}", "title": "" }, { "docid": "b09da8ff29ebd0c5c43ca62bbfe3fb69", "score": "0.62510014", "text": "func configDir() string {\n\tif customConfigDir != \"\" {\n\t\treturn customConfigDir\n\t} else {\n\t\tusr, err := user.Current()\n\t\tif err != nil {\n\t\t\tdie(fmt.Sprintf(\"Could not get home directory: %s\", err.Error()))\n\t\t}\n\t\treturn filepath.Join(usr.HomeDir, configDirName)\n\t}\n}", "title": "" }, { "docid": "f796405a48d28ea418c58b98f4993841", "score": "0.6226735", "text": "func homeDir() string {\n\tif h := os.Getenv(\"HOME\"); h != \"\" {\n\t\treturn h\n\t}\n\treturn os.Getenv(\"USERPROFILE\") // windows\n}", "title": "" }, { "docid": "f796405a48d28ea418c58b98f4993841", "score": "0.6226735", "text": "func homeDir() string {\n\tif h := os.Getenv(\"HOME\"); h != \"\" {\n\t\treturn h\n\t}\n\treturn os.Getenv(\"USERPROFILE\") // windows\n}", "title": "" }, { "docid": "f796405a48d28ea418c58b98f4993841", "score": "0.6226735", "text": "func homeDir() string {\n\tif h := os.Getenv(\"HOME\"); h != \"\" {\n\t\treturn h\n\t}\n\treturn os.Getenv(\"USERPROFILE\") // windows\n}", "title": "" }, { "docid": "f796405a48d28ea418c58b98f4993841", "score": "0.6226735", "text": "func homeDir() string {\n\tif h := os.Getenv(\"HOME\"); h != \"\" {\n\t\treturn h\n\t}\n\treturn os.Getenv(\"USERPROFILE\") // windows\n}", "title": "" }, { "docid": "51b0a25210d65e931e33da45b42f05c2", "score": "0.6217725", "text": "func registriesDirPathWithHomeDir(sys *types.SystemContext, homeDir string) string {\n\tif sys != nil && sys.RegistriesDirPath != \"\" {\n\t\treturn sys.RegistriesDirPath\n\t}\n\tuserRegistriesDirPath := filepath.Join(homeDir, userRegistriesDir)\n\tif _, err := os.Stat(userRegistriesDirPath); err == nil {\n\t\treturn userRegistriesDirPath\n\t}\n\tif sys != nil && sys.RootForImplicitAbsolutePaths != \"\" {\n\t\treturn filepath.Join(sys.RootForImplicitAbsolutePaths, systemRegistriesDirPath)\n\t}\n\n\treturn systemRegistriesDirPath\n}", "title": "" }, { "docid": "91abbc5151ad450cff02d2934b6c189d", "score": "0.6184891", "text": "func GetConfigDir() string {\n\tcurrUser, err := user.Current()\n\tutls.QuitOnError(err)\n\t_, user := filepath.Split(currUser.Username)\n\tresult := \"C:/Users/\" + user + \"/AppData/Roaming/img_viewer\"\n\treturn result\n}", "title": "" }, { "docid": "d2647ec72e816ce9a5d62f159f066891", "score": "0.6167333", "text": "func QmsHomeDir() string {\n\tonce.Do(initDir)\n\treturn homeDir\n}", "title": "" }, { "docid": "6a6442dfc0619478f04cff442dda62c0", "score": "0.6153668", "text": "func PathRoot() (string, error) {\n\tdir := os.Getenv(EnvDir)\n\tvar err error\n\tif len(dir) == 0 {\n\t\tdir, err = homedir.Expand(KeysPathRoot)\n\t}\n\treturn dir, err\n}", "title": "" }, { "docid": "8bb74c49c663e66409f0ac378ff50671", "score": "0.61410356", "text": "func DataDir() string {\n\tvar path string\n\tif a := os.Getenv(xdgDataHome); a != \"\" {\n\t\tpath = filepath.Join(a, \"trellis\")\n\t} else if b := os.Getenv(localAppData); runtime.GOOS == \"windows\" && b != \"\" {\n\t\tpath = filepath.Join(b, \"Trellis CLI\")\n\t} else {\n\t\tc, _ := os.UserHomeDir()\n\t\tpath = filepath.Join(c, \".local\", \"share\", \"trellis\")\n\t}\n\treturn path\n}", "title": "" }, { "docid": "b440e3abdc40d675c29af9581ca62536", "score": "0.61379457", "text": "func BaseDir() (string, error) {\n\thogPen := os.Getenv(\"HOG_PEN\")\n\tif len(hogPen) == 0 {\n\t\treturn getHomeDir()\n\t}\n\n\tif !utils.IsPathExist(hogPen) {\n\t\treturn \"\", fmt.Errorf(\"HOG_PEN '%s' do not exist ❌\", hogPen)\n\t}\n\n\tisFile, err := utils.IsPathAFile(hogPen)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif isFile {\n\t\treturn \"\", fmt.Errorf(\"HOG_PEN '%s' must be a directory 📁\", hogPen)\n\t}\n\n\treturn hogPen, nil\n}", "title": "" }, { "docid": "18f9935d8eb16282d4b5e9cf6e52f289", "score": "0.61348313", "text": "func HomeDir() (homeDir string) {\n\tu, err := user.Current() // ignore error handler.\n\n\tif u != nil && err == nil {\n\t\thomeDir = u.HomeDir\n\t}\n\n\tif homeDir == \"\" {\n\t\thomeDir = os.Getenv(\"HOME\")\n\t}\n\n\tif homeDir == \"\" {\n\t\tif runtime.GOOS == \"plan9\" {\n\t\t\thomeDir = os.Getenv(\"home\")\n\t\t} else if runtime.GOOS == \"windows\" {\n\t\t\thomeDir = os.Getenv(\"HOMEDRIVE\") + os.Getenv(\"HOMEPATH\")\n\t\t\tif homeDir == \"\" {\n\t\t\t\thomeDir = os.Getenv(\"USERPROFILE\")\n\t\t\t}\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "65a0774e71900193ea4a54108276eeb5", "score": "0.6134286", "text": "func Homedir() string {\n\tif runtime.GOOS == \"windows\" {\n\t\treturn os.Getenv(\"APPDATA\")\n\t}\n\treturn os.Getenv(\"HOME\")\n}", "title": "" }, { "docid": "ddeb5c02b3a02222468d14dd6a69b0ab", "score": "0.61145055", "text": "func gooPath() string {\n\tusr, err := user.Current()\n\tif err != nil {\n\t\twriteLn(err)\n\t\tos.Exit(1)\n\t}\n\treturn filepath.Join(usr.HomeDir, gooDir)\n}", "title": "" }, { "docid": "3a3f9771f2d7711f68c5e4ca6f01dd18", "score": "0.6107158", "text": "func HomeDir() string {\n\tif runtime.GOOS == \"windows\" {\n\t\thome := os.Getenv(\"HOMEDRIVE\") + os.Getenv(\"HOMEPATH\")\n\t\tif home == \"\" {\n\t\t\thome = os.Getenv(\"USERPROFILE\")\n\t\t}\n\t\treturn home\n\t}\n\treturn os.Getenv(\"HOME\")\n}", "title": "" }, { "docid": "982b9d4df56cd7c981d98e05d1b918fe", "score": "0.610495", "text": "func (d *Driver) dir(id string) string {\n\treturn filepath.Join(d.info.HomeDir, filepath.Base(id))\n}", "title": "" }, { "docid": "6c08d68899b6d82da42abf963734552e", "score": "0.6091946", "text": "func (u *User) ConfigDir() string {\n\tif sd := os.Getenv(\"SOUS_CONFIG_DIR\"); sd != \"\" {\n\t\treturn sd\n\t}\n\txdgConfig := os.Getenv(\"XDG_CONFIG\")\n\tif xdgConfig == \"\" {\n\t\txdgConfig = filepath.Join(u.HomeDir, xdgConfigDefault)\n\t}\n\treturn filepath.Join(xdgConfig, defaultConfigDir)\n}", "title": "" }, { "docid": "a4f4461cc0dabfda4f02b84bab727dfb", "score": "0.6085672", "text": "func DirPath(baseDir string) string {\n\treturn filepath.Join(baseDir, \"gratka\")\n}", "title": "" }, { "docid": "687888d196978d4e6f7ee66bd4e992e9", "score": "0.6084517", "text": "func HomeDir() string {\n\tif h := os.Getenv(\"HOME\"); h != \"\" {\n\t\treturn h\n\t}\n\treturn os.Getenv(\"USERPROFILE\") // windows\n}", "title": "" }, { "docid": "687888d196978d4e6f7ee66bd4e992e9", "score": "0.6084517", "text": "func HomeDir() string {\n\tif h := os.Getenv(\"HOME\"); h != \"\" {\n\t\treturn h\n\t}\n\treturn os.Getenv(\"USERPROFILE\") // windows\n}", "title": "" }, { "docid": "687888d196978d4e6f7ee66bd4e992e9", "score": "0.6084517", "text": "func HomeDir() string {\n\tif h := os.Getenv(\"HOME\"); h != \"\" {\n\t\treturn h\n\t}\n\treturn os.Getenv(\"USERPROFILE\") // windows\n}", "title": "" }, { "docid": "d41ad7d8c8880a5cbf018c084e9d0256", "score": "0.6030217", "text": "func homeDirGetter() (string, error) {\n\tusr, err := user.Current()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn usr.HomeDir, nil\n}", "title": "" }, { "docid": "7dd855377764d0700817c014234eb977", "score": "0.6015398", "text": "func secretPath() string {\n\thome, _ := homedir.Dir()\n\treturn filepath.Join(home, \".secrets\")\n}", "title": "" }, { "docid": "0800866e829d2cac2f7fdbd3f8602316", "score": "0.60144967", "text": "func DotNucollPath() (string, error) {\n\tif usr, err := user.Current(); err == nil {\n\t\treturn usr.HomeDir, nil\n\t}\n\tif home := os.Getenv(\"HOME\"); home != \"\" {\n\t\treturn home, nil\n\t}\n\tex, err := os.Executable()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn filepath.Dir(ex), nil\n}", "title": "" }, { "docid": "b74502d8deaffe4e8f188e27c5eebf13", "score": "0.60103744", "text": "func getHomePath() string {\n\t// Windows\n\tif runtime.GOOS == \"windows\" {\n\t\treturn os.Getenv(\"USERPROFILE\")\n\t}\n\t// *nix\n\treturn os.Getenv(\"HOME\")\n}", "title": "" }, { "docid": "245f1b6bda3523a89615dcd6bb464a84", "score": "0.5997094", "text": "func ExpandHomeDir(path string) string {\n\treturn strings.Replace(path, \"~\", System.User.HomeDir, -1)\n}", "title": "" }, { "docid": "43267df2fb5d9be399d7146318db8cd7", "score": "0.59891903", "text": "func profilePath() string {\n\tdir, err := os.Getwd()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn dir + \"/.lunchy\"\n}", "title": "" }, { "docid": "533b99ea02c5dd817afcb54cba9ece1a", "score": "0.59823096", "text": "func ConfigDir() string {\n\tvar path string\n\n\tif a := os.Getenv(trellisConfigDir); a != \"\" {\n\t\tpath = a\n\t} else if b := os.Getenv(xdgConfigHome); b != \"\" {\n\t\tpath = filepath.Join(b, \"trellis\")\n\t} else if c := os.Getenv(appData); runtime.GOOS == \"windows\" && c != \"\" {\n\t\tpath = filepath.Join(c, \"Trellis CLI\")\n\t} else {\n\t\td, _ := os.UserHomeDir()\n\t\tpath = filepath.Join(d, \".config\", \"trellis\")\n\t}\n\n\treturn path\n}", "title": "" }, { "docid": "1bf50311cf0e5c2fd0ab78b6e81293bc", "score": "0.59791464", "text": "func GetHomeDir() (dir string, err error) {\n\tdir, err = homedir.Dir()\n\treturn dir, err\n}", "title": "" }, { "docid": "6c340c793a8c08b2f6bff61a4a96a8fe", "score": "0.59769344", "text": "func GetDirectory() string {\n\tres := os.Getenv(\"MAILBOX_HOME\")\n\tif res == \"\" {\n\t\tif runtime.GOOS == \"windows\" {\n\t\t\treturn filepath.Join(os.Getenv(\"USERPROFILE\"), \"AppData\", \"Roaming\", \"mailbox\")\n\t\t} else {\n\t\t\tcfgHome := os.Getenv(\"XDG_CONFIG_HOME\")\n\t\t\tif cfgHome == \"\" {\n\t\t\t\tcfgHome = filepath.Join(os.Getenv(\"HOME\"), \".config\")\n\t\t\t}\n\t\t\treturn filepath.Join(cfgHome, \"mailbox\")\n\t\t}\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "21aee7d7e7f8dfbd9b878e4eeb200462", "score": "0.5969711", "text": "func UserDir() (string, error) {\n\tuser, userError := user.Current()\n\tif userError != nil {\n\t\treturn \"\", userError\n\t}\n\n\treturn user.HomeDir, nil\n}", "title": "" }, { "docid": "8186fc500f56efacf2f3a6313b4da105", "score": "0.59691584", "text": "func (s *PubkeyStore) Dir() (dir string) {\n\treturn s.store.getDir()\n}", "title": "" }, { "docid": "77d6325cf47a3cf8651acbcda1bd02bb", "score": "0.5958716", "text": "func getTrueDirectory(path string) string {\n\treturn strings.Replace(path, \"/app/host\", os.Getenv(\"HOME\"), 1)\n}", "title": "" }, { "docid": "21c3149aa359ade4b67e2209723d0b80", "score": "0.59426653", "text": "func Homedir() (string, error) {\n\tu, err := osuser.Current()\n\t// user.Current may return an error, but we should only handle it if it\n\t// returns a nil user. This is because os/user is wonky without cgo,\n\t// but it should work well enough for our purposes.\n\tif u == nil {\n\t\te := errors.Str(\"lookup of current user failed\")\n\t\tif err != nil {\n\t\t\te = errors.Errorf(\"%v: %v\", e, err)\n\t\t}\n\t\treturn \"\", e\n\t}\n\th := u.HomeDir\n\tif h == \"\" {\n\t\treturn \"\", errors.E(errors.NotExist, \"user home directory not found\")\n\t}\n\tif err := isDir(h); err != nil {\n\t\treturn \"\", err\n\t}\n\treturn h, nil\n}", "title": "" }, { "docid": "4361ab6dd53af705328ee4c371ee707f", "score": "0.5941545", "text": "func GetDBPath(pa string) string {\n\t// using the function\n\tmydir, err := os.Getwd()\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tmydir = path.Join(mydir, pa)\n\treturn mydir\n}", "title": "" }, { "docid": "5a97586b244e8411724de6c12bc51137", "score": "0.59362435", "text": "func ConfigDir() string {\n\tglabDir := os.Getenv(\"GLAB_CONFIG_DIR\")\n\tif glabDir != \"\" {\n\t\treturn glabDir\n\t}\n\tusrConfigHome := os.Getenv(\"XDG_CONFIG_HOME\")\n\tif usrConfigHome == \"\" {\n\t\tusrConfigHome = os.Getenv(\"HOME\")\n\t\tif usrConfigHome == \"\" {\n\t\t\tusrConfigHome, _ = homedir.Expand(\"~/.config\")\n\t\t} else {\n\t\t\tusrConfigHome = filepath.Join(usrConfigHome, \".config\")\n\t\t}\n\t}\n\treturn filepath.Join(usrConfigHome, \"glab-cli\")\n}", "title": "" }, { "docid": "e95e5722a456657749e7c42848f0acb4", "score": "0.59301335", "text": "func gpgHome(ctx context.Context) string {\n\tif gh := os.Getenv(\"GNUPGHOME\"); gh != \"\" {\n\t\treturn gh\n\t}\n\thd, err := homedir.Dir()\n\tif err != nil {\n\t\tout.Debug(ctx, \"Failed to get homedir: %s\", err)\n\t\treturn \"\"\n\t}\n\treturn filepath.Join(hd, \".gnupg\")\n}", "title": "" }, { "docid": "06381fbb2f9a2d76f4b67ce03215bd92", "score": "0.59295034", "text": "func GetHomeDir() (string, error) {\n\tif homeDir, err := os.UserConfigDir(); err != nil {\n\t\treturn \"\", err\n\t}\n\treturn homeDir, nil\n}", "title": "" }, { "docid": "9faa206b8c61d9f4ac15a4576ecd25ee", "score": "0.5925206", "text": "func UserHomeDir() string {\n\thome := os.Getenv(\"HOME\")\n\tif len(home) == 0 {\n\t\thome = os.Getenv(\"USERPROFILE\")\n\t\tif len(home) == 0 {\n\t\t\thome = os.Getenv(\"HOMEDRIVE\") + os.Getenv(\"HOMEPATH\")\n\t\t}\n\t}\n\treturn unixpath(home)\n}", "title": "" }, { "docid": "f9fa011eb5a60f737f2b263a87ae357d", "score": "0.5923973", "text": "func (f *Fs) dirPath(file string) string {\n\treturn path.Join(f.diskRoot, file) + \"/\"\n}", "title": "" }, { "docid": "4a03fe876e5f657585f61bccbd52cc3d", "score": "0.592173", "text": "func (ss *ServerSet) directoryPath() string {\n\treturn BaseZnodePath(ss.role, ss.environment, ss.service)\n}", "title": "" }, { "docid": "170864708ca0c05c522ade3710b9ef9d", "score": "0.59179926", "text": "func HomeDir() (home string, err error) {\r\n\tif runtime.GOOS == \"windows\" {\r\n\t\thome = os.Getenv(\"HOMEDRIVE\") + os.Getenv(\"HOMEPATH\")\r\n\t\tif home == \"\" {\r\n\t\t\thome = os.Getenv(\"USERPROFILE\")\r\n\t\t}\r\n\t} else {\r\n\t\thome = os.Getenv(\"HOME\")\r\n\t}\r\n\r\n\tif len(home) == 0 {\r\n\t\treturn \"\", errors.New(\"Cannot specify home directory because it's empty\")\r\n\t}\r\n\r\n\treturn home, nil\r\n}", "title": "" }, { "docid": "469ff75b12c71a8e58a7ee6a41c3e006", "score": "0.5900047", "text": "func GetHomeDir(app string) (string, error) {\n\thome, err := os.UserHomeDir()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn path.Join(home, \".\"+app), nil\n}", "title": "" }, { "docid": "9343adb0c81bc14adbcff05c0406d146", "score": "0.58948195", "text": "func HomeDir() string {\n\thdir := os.Getenv(\"HOME\") // try to find a HOME environment variable\n\tif hdir == \"\" { // then try USERPROFILE for Windows\n\t\thdir = os.Getenv(\"USERPROFILE\")\n\t\tif hdir == \"\" {\n\t\t\tfmt.Printf(\"Unable to determine home directory, history file disabled\\n\")\n\t\t}\n\t}\n\treturn hdir\n}", "title": "" }, { "docid": "4cc6bb52d32bd813146b02ddebc0962d", "score": "0.58690435", "text": "func DefaultSiaDir() string {\n\tswitch runtime.GOOS {\n\tcase \"windows\":\n\t\treturn filepath.Join(os.Getenv(\"LOCALAPPDATA\"), \"Hyperspace\")\n\tcase \"darwin\":\n\t\treturn filepath.Join(os.Getenv(\"HOME\"), \"Library\", \"Application Support\", \"Hyperspace\")\n\tdefault:\n\t\treturn filepath.Join(os.Getenv(\"HOME\"), \".hyperspace\")\n\t}\n}", "title": "" }, { "docid": "a9b5e60d398be8abc437c7dabf123357", "score": "0.58562934", "text": "func userHomeDir() (string, error) {\n\tenv, enverr := \"HOME\", \"$HOME\"\n\tswitch runtime.GOOS {\n\tcase \"windows\":\n\t\tenv, enverr = \"USERPROFILE\", \"%userprofile%\"\n\tcase \"plan9\":\n\t\tenv, enverr = \"home\", \"$home\"\n\tcase \"nacl\", \"android\":\n\t\treturn \"/\", nil\n\tcase \"darwin\":\n\t\tif runtime.GOARCH == \"arm\" || runtime.GOARCH == \"arm64\" {\n\t\t\treturn \"/\", nil\n\t\t}\n\t}\n\tif v := os.Getenv(env); v != \"\" {\n\t\treturn v, nil\n\t}\n\treturn \"\", errors.New(enverr + \" is not defined\")\n}", "title": "" }, { "docid": "590559537db681a9591cb218e5f4b530", "score": "0.5851501", "text": "func (p *Eks) Path() string {\n\treturn \"\"\n}", "title": "" }, { "docid": "00d55084cf1d6c563aa0d7e70ee319de", "score": "0.58496237", "text": "func (u osUserConfiger) ConfigDir() string {\n\treturn filepath.Join(u.HomeDir, \".materialscommons\")\n}", "title": "" }, { "docid": "c64071848f37c082425e17644a76ff60", "score": "0.58455867", "text": "func GetUserConfigDir() string {\n\tc := C.g_get_user_config_dir()\n\treturn C.GoString((*C.char)(c))\n}", "title": "" }, { "docid": "664baf8bcaba1cbd68bef0913903d18a", "score": "0.58251727", "text": "func GetHomeDir() string {\n\tif runtime.GOOS == \"windows\" {\n\t\thome := os.Getenv(\"HOMEDRIVE\") + os.Getenv(\"HOMEPATH\")\n\t\tif home == \"\" {\n\t\t\thome = os.Getenv(\"USERPROFILE\")\n\t\t}\n\t\treturn home\n\t}\n\treturn os.Getenv(\"HOME\")\n}", "title": "" }, { "docid": "27aa3cecbfc91be297e588d6184919d6", "score": "0.5825003", "text": "func SnippetDir() (string, error) {\n\tcurrentUser, err := user.Current()\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tdir := path.Join(currentUser.HomeDir, \".snip\")\n\n\treturn dir, nil\n}", "title": "" }, { "docid": "e5a8136eb5ded37c2bfc620d377d6022", "score": "0.58219004", "text": "func GetUserHomeDir() string {\n\t// notest\n\n\tusr, err := user.Current()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn usr.HomeDir\n}", "title": "" }, { "docid": "8f933f5cb2206db94daa736dfc9b8463", "score": "0.5817745", "text": "func GetRootlessConfigHomeDir() (string, error) {\n\treturn \"\", errors.New(\"this function is not implemented for windows\")\n}", "title": "" }, { "docid": "2474d484c17ffffb5b8f17957db00b63", "score": "0.57927346", "text": "func (r Resource) DirPath() string {\n\treturn r.dirPath\n}", "title": "" }, { "docid": "92a5feff55c85ec2ce19ada0c47f76bf", "score": "0.5783421", "text": "func (t *TekuValidatorClient) HomeDir() string {\n\treturn TekuHomeDir\n}", "title": "" }, { "docid": "e9fcca346ddbd7d89c76a45d1218b17c", "score": "0.5781554", "text": "func GetHomeDir() (home string) {\n\tif home = os.Getenv(\"home\"); home == \"\" {\n\t\thome, _ = os.UserHomeDir()\n\t}\n\treturn\n}", "title": "" }, { "docid": "4c8ff68e6bf49a46239a0228a106a783", "score": "0.57814556", "text": "func subsPath(tmpPath string) string {\n\treturn strings.Replace(tmpPath, \"~\", os.Getenv(\"HOME\"), 1)\n}", "title": "" }, { "docid": "f58cbd8e97ef49b89bee672a402be05c", "score": "0.5780616", "text": "func SubstituteHomeDir(path string) string {\n\tu, err := user.Current()\n\tif err != nil {\n\t\tlog.Fatal(\"Unable to rerieve the current user's information.\")\n\t}\n\thomeDir := u.HomeDir\n\tif homeDir == \"\" {\n\t\tlog.Fatal(\"Unable to find the home directory of the current user.\")\n\t}\n\tif path[:2] == \"~/\" {\n\t\t//path = strings.Replace(path, \"~/\", \"\", 1)\n\t\tpath = filepath.Join(homeDir, path[2:])\n\t}\n\treturn filepath.Clean(path)\n}", "title": "" }, { "docid": "334ff84006554930d317f3d1333366c8", "score": "0.5778364", "text": "func Path() string {\n\treturn fmt.Sprintf(\"%s/%s\", ConfigDir, configFileName)\n}", "title": "" }, { "docid": "2c3d86db226d256a61525d6145256690", "score": "0.577795", "text": "func Dir() string {\n\treturn configDir\n}", "title": "" }, { "docid": "b4ce8e6b84ac10a8b6d02650ccf2d493", "score": "0.5764698", "text": "func GetQuiltPath() string {\n\tif quiltPath := os.Getenv(QuiltPathKey); quiltPath != \"\" {\n\t\treturn quiltPath\n\t}\n\n\tdir, err := homedir.Dir()\n\tif err != nil {\n\t\tlog.WithError(err).Fatalf(\"Failed to get user's homedir for \"+\n\t\t\t\"%s generation\", QuiltPathKey)\n\t}\n\n\treturn filepath.Join(dir, \".quilt\")\n}", "title": "" }, { "docid": "665c3f463c9256c459c2a16065c53c29", "score": "0.57560617", "text": "func UserHomeDir() string {\n\tenv := \"HOME\"\n\tif runtime.GOOS == \"windows\" {\n\t\tenv = \"USERPROFILE\"\n\t} else if runtime.GOOS == \"plan9\" {\n\t\tenv = \"home\"\n\t}\n\treturn os.Getenv(env)\n}", "title": "" }, { "docid": "665c3f463c9256c459c2a16065c53c29", "score": "0.57560617", "text": "func UserHomeDir() string {\n\tenv := \"HOME\"\n\tif runtime.GOOS == \"windows\" {\n\t\tenv = \"USERPROFILE\"\n\t} else if runtime.GOOS == \"plan9\" {\n\t\tenv = \"home\"\n\t}\n\treturn os.Getenv(env)\n}", "title": "" }, { "docid": "bf445d654ac16de2962ecf69f8972763", "score": "0.5753659", "text": "func HomeDir() string { \n return os.Getenv(\"HOME\")\n}", "title": "" }, { "docid": "baba2640a3a4934795bae53e7080e5bc", "score": "0.5751623", "text": "func registriesDirPath(sys *types.SystemContext) string {\n\treturn registriesDirPathWithHomeDir(sys, homedir.Get())\n}", "title": "" }, { "docid": "072fd7bf23364fec2e6a84c1429f9b1a", "score": "0.5742778", "text": "func rootDir(path string) string {\n\tif runtime.GOOS == \"windows\" {\n\t\treturn filepath.Join(`c:\\`, path)\n\t}\n\treturn filepath.Join(\"/\", path)\n}", "title": "" }, { "docid": "1d7b08f53b5e9d3ea41654f234d35265", "score": "0.57387406", "text": "func DirPath(path string) string {\n\treturn filepath.Dir(path)\n}", "title": "" }, { "docid": "b641fa1557bfdfccf694d50b1367a70d", "score": "0.57382095", "text": "func GetDir() string {\n\tif os.Getenv(\"SIGNCTRL_CONFIG_DIR\") == \"\" {\n\t\tos.Setenv(\"SIGNCTRL_CONFIG_DIR\", os.Getenv(\"HOME\")+\"/.signctrl\")\n\t}\n\n\treturn os.Getenv(\"SIGNCTRL_CONFIG_DIR\")\n}", "title": "" }, { "docid": "7b58a425bdf84eb6f812aeb19c5ebb6d", "score": "0.5736525", "text": "func oldPodHomeDir() string {\n\t// Search for Windows APPDATA first. This won't exist on POSIX OSes\n\tappData := os.Getenv(\"APPDATA\")\n\tif appData != \"\" {\n\t\treturn filepath.Join(appData, \"pod\")\n\t}\n\t// Fall back to standard HOME directory that works for most POSIX OSes\n\thome := os.Getenv(\"HOME\")\n\tif home != \"\" {\n\t\treturn filepath.Join(home, \".pod\")\n\t}\n\t// In the worst case, use the current directory\n\treturn \".\"\n}", "title": "" }, { "docid": "f8943dca681a009143f08f9f50544db4", "score": "0.57341164", "text": "func getHostDir(cont *Container) string {\n\tusername := cont.command.UserName\n\tprojectname := cont.command.ProjectName\n\tvar path string\n\tif cont.command.Type == \"tty\" {\n\t\tpath = filepath.Join(\"/home\", username, \"go/src/github.com\", projectname)\n\t} else if cont.command.Type == \"debug\" {\n\t\tpath = filepath.Join(\"/home\", username, \"cpp\", projectname)\n\t}\n\treturn path\n}", "title": "" }, { "docid": "236ec10253663880eeec5d1d1b2acead", "score": "0.5730808", "text": "func Dir(dir string, isd addr.ISD) string {\n\treturn filepath.Join(pkicmn.GetIsdPath(dir, isd), pkicmn.TRCsDir)\n}", "title": "" }, { "docid": "5cf8cc8f6c08335f1fb8e4ddd442a83f", "score": "0.5727529", "text": "func getExeDirectory() {\n\tdir, _ := os.Getwd()\n\tfmt.Println(\"Plain exe path: \", dir)\n\tfmt.Println(strings.Replace(dir, \" \", \"\\\\ \", -1))\n}", "title": "" }, { "docid": "12bafbddb9e0e4b3d9e04986363428d9", "score": "0.5722912", "text": "func GetUserHomeDir() (string, error) {\n\tvar usr, err = user.Current()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn usr.HomeDir, nil\n}", "title": "" }, { "docid": "59f08159f7e07a8f86c0bd24317d618e", "score": "0.57201827", "text": "func oldConfigPath() string {\n\thome := os.Getenv(\"HOME\")\n\n\t// If home is not set, there is nothing we can do.\n\tif home == \"\" {\n\t\treturn \"\"\n\t}\n\n\treturn path.Join(home, \".repoctl.conf\")\n}", "title": "" }, { "docid": "fa582e92918b6f0c8015e04686e4262b", "score": "0.57157636", "text": "func (env *Env) Dir() string {\n\treturn env.dir.String()\n}", "title": "" }, { "docid": "f6d257d916a2d7d15158ce897817f882", "score": "0.570745", "text": "func (pkg *Package) Path() string { return pkg.path }", "title": "" }, { "docid": "c5ffd03c232863b9f7056341d046f5f8", "score": "0.5702022", "text": "func GetHelmPath(organizationName string) string {\n\treturn filepath.Join(Config.Helm.Home, organizationName)\n}", "title": "" }, { "docid": "729a70645acc1de1530a0fe1567ed5d9", "score": "0.56991583", "text": "func (c *Config) Dir() string {\n\treturn filepath.Dir(c.store.Path())\n}", "title": "" } ]
62168f7a97c71d7d38cd9bd9b62c3fd8
This blows up the ship
[ { "docid": "aa596f0881894c5ce851f94b4d4f6ce0", "score": "0.69319075", "text": "func (g *Game) blowship(x int, y int) {\n\t// sound_blowship()\n\tg.explode_object(&g.objects[0], x, y, 64, 0x100, 0x7F, 0x1FF)\n\tg.explosion(&g.objects[0], x, y, 64, 0x80, 0x1F, -1, 0x1FF)\n\tg.objects[0].typ = 0\n}", "title": "" } ]
[ { "docid": "22d098b2ba8dff1b538070b2529cc5fa", "score": "0.62130886", "text": "func abandon(v int) {\n\tvar (\n\t\tq *quadrant\n\t\ti int\n\t\te *event\n\t)\n\n\tif ship.ship == QUEENE {\n\t\tfmt.Printf(\"You may not abandon yet Faire Queene\\n\")\n\t\treturn\n\t}\n\n\tif ship.cond != DOCKED {\n\t\tif damaged(SHUTTLE) {\n\t\t\tout(SHUTTLE)\n\t\t\treturn\n\t\t}\n\t\tfmt.Printf(\"Officers escape in shuttlecraft\\n\")\n\t\t/* decide on fate of crew */\n\t\tq = &quad[ship.quadx][ship.quady]\n\t\tif q.qsystemname == 0 || damaged(XPORTER) {\n\t\t\tfmt.Printf(\"Entire crew of %d left to die in outer space\\n\", ship.crew)\n\t\t\tgame.deaths += ship.crew\n\t\t} else {\n\t\t\tfmt.Printf(\"Crew beams down to planet %s\\n\", systemname(q))\n\t\t}\n\t}\n\t/* see if you can be exchanged */\n\tif now.bases == 0 || game.captives < 20*game.skill {\n\t\tlose(L_CAPTURED)\n\t}\n\t/* re-outfit new ship */\n\tfmt.Printf(\"You are hereby put in charge of an antiquated but still\\n\")\n\tfmt.Printf(\" functional ship, the Fairie Queene.\\n\")\n\tship.ship = QUEENE\n\tship.shipname = \"Fairie Queene\"\n\tparam.energy = 3000\n\tship.energy = 3000\n\tparam.torped = 6\n\tship.torped = 6\n\tparam.shield = 1250\n\tship.shield = 1250\n\tship.shldup = false\n\tship.cloaked = false\n\tship.warp = 5.0\n\tship.warp2 = 25.0\n\tship.warp3 = 125.0\n\tship.cond = GREEN\n\t/* clear out damages on old ship */\n\tfor i := 0; i < MAXEVENTS; i++ {\n\t\te = &eventList[i]\n\t\tif e.evcode != E_FIXDV {\n\t\t\tcontinue\n\t\t}\n\t\tunschedule(e)\n\t}\n\t/* get rid of some devices and redistribute probabilities */\n\ti = int(param.damprob[SHUTTLE] + param.damprob[CLOAK])\n\tparam.damprob[SHUTTLE] = 0\n\tparam.damprob[CLOAK] = 0\n\tfor i > 0 {\n\t\tfor j := 0; j < len(devices); j++ {\n\t\t\tif param.damprob[j] != 0 {\n\t\t\t\tparam.damprob[j] += 1\n\t\t\t\ti--\n\t\t\t\tif i <= 0 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\t/* pick a starbase to restart at */\n\ti = ranf(now.bases)\n\tship.quadx = now.base[i].x\n\tship.quady = now.base[i].y\n\t/* setup that quadrant */\n\tfor {\n\t\tinitquad(1)\n\t\tsect[ship.sectx][ship.secty] = EMPTY\n\t\tfor i := 0; i < 5; i++ {\n\t\t\tship.sectx = etc.starbase.x + ranf(3) - 1\n\t\t\tif ship.sectx < 0 || ship.sectx >= NSECTS {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tship.secty = etc.starbase.y + ranf(3) - 1\n\t\t\tif ship.secty < 0 || ship.secty >= NSECTS {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif sect[ship.sectx][ship.secty] == EMPTY {\n\t\t\t\tsect[ship.sectx][ship.secty] = QUEENE\n\t\t\t\tdock(0)\n\t\t\t\tcompkldist(false)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "09247f96dfeef3f9e3840dbcbbf9bb86", "score": "0.58648765", "text": "func (poke *Pokemon) Freeze(){\n\tif poke.status == Fit {\n\t\tpoke.status = FrozenSolid\n\t}\n}", "title": "" }, { "docid": "5a71d753224bb1c28bcd7a20a675ffb0", "score": "0.57937974", "text": "func (g *Game) lifelost() {\n\tg.slives[g.lives].typ = 0 // cancel the last life used\n\n\tg.lives--\n\tif g.lives < 0 {\n\t\treturn\n\t}\n\n\tfn := func() {\n\t\tg.ghostship = true\n\n\t\t// reset the ship\n\t\tg.objects[0].typ = g.ship\n\t\tg.objects[0].dx = 0\n\t\tg.objects[0].dy = 0\n\t\tg.objects[0].x = (SW / 2) << pixelshift\n\t\tg.objects[0].y = (SH / 2) << pixelshift\n\n\t\tobj := g.findspacenzero()\n\t\tobj.typ = g.numbers\n\n\t\t// Count down the time to go\n\t\tend_time := g.time_now + 5*64 - 4\n\t\tvar fn2 func()\n\t\tfn2 = func() {\n\t\t\tif g.time_now-end_time < 0 {\n\t\t\t\tobj.x = g.objects[0].x - (8 << pixelshift)\n\t\t\t\tobj.y = g.objects[0].y - (8 << pixelshift)\n\t\t\t\tobj.state = (((end_time - g.time_now) >> 6) + 1) & 7\n\t\t\t\tg.push(fn2)\n\t\t\t} else {\n\t\t\t\tobj.typ = 0\n\t\t\t\tg.ghostship = false\n\t\t\t}\n\t\t}\n\t\tfn2()\n\t}\n\tg.push(\n\t\tg.gamepause(300),\n\t\tfn,\n\t)\n}", "title": "" }, { "docid": "eb977d52e67798ffdb36371520f2bba4", "score": "0.55634075", "text": "func (p *Player) die() {\n\tlogger.Infof(\"Killing player %v\", p.Username)\n\tp.status = Dead\n\tp.PosX = []int{}\n\tp.PosY = []int{}\n\n\tp.Size = 0\n}", "title": "" }, { "docid": "96a19f91030fa63a2ac8d3d2f16de70e", "score": "0.5511153", "text": "func (poke *Pokemon) Unflinch(){\n\tpoke.volatileStatus[Flinched] = false\n}", "title": "" }, { "docid": "fa50eccc076e9f6d3379066eb3452291", "score": "0.5472668", "text": "func (poke *Pokemon) Unleech(){\n\tpoke.volatileStatus[Leeched] = false\n}", "title": "" }, { "docid": "e5c9cd1b1184e2368130eda8ce1fad6f", "score": "0.545364", "text": "func (s *Ship) Hit() {\n\ts.hitpoints--\n}", "title": "" }, { "docid": "61d37ff348401f9dee64d0bdfd7e745a", "score": "0.5439054", "text": "func (sm *ShardMaster) Revive(){\n sm.mu.Lock()\n defer sm.mu.Unlock()\n\n sm.restartMemory()\n sm.fail = false\n}", "title": "" }, { "docid": "1bf9d8228295d4f7106bdfe3faea9874", "score": "0.54060423", "text": "func (g *Game) update(obj *object) {\n\tsy := obj.y\n\tsx := obj.x\n\n\tsx = g.dtime*obj.dx + sx // scale for time\n\tclip(&sx, SW<<pixelshift)\n\tobj.x = sx // x+=dx\n\n\tsy = g.dtime*obj.dy + sy // scale for time\n\tclip(&sy, SH<<pixelshift)\n\tobj.y = sy // y+=dy\n\n\t// if object is mortal and over age limit, kill it\n\tif obj.life != 0 && obj.life-g.time_now <= 0 {\n\t\t// debugf(\"Killing object %i %i %i\\n\", obj.life, time_now, obj.life - time_now);\n\t\tif obj.typ == g.bullet {\n\t\t\tg.bulletexplosion(obj)\n\t\t}\n\t\tobj.typ = 0\n\t\t// return; FIXME ;;;; ???\n\t}\n\n\t// increment object phase\n\tobj.phase = (obj.phase & 0xFF00) | ((obj.phase + 1) & (obj.phase >> 8))\n\n\t// if ship is dead, don't do the below\n\tif g.objects[0].typ != g.ship {\n\t\treturn\n\t}\n\n\t// These deal with attacking the ship\n\n\t// Drive the attacker in decaying orbits around the ship\n\tif obj.typ == g.roid && obj.state == g.roid_attacker {\n\t\tdx := obj.dx\n\t\tdy := obj.dy\n\n\t\tdx -= (dx / (1 << 10))\n\t\tif g.objects[0].x > obj.x {\n\t\t\tdx += 4\n\t\t}\n\t\tif g.objects[0].x < obj.x {\n\t\t\tdx -= 4\n\t\t}\n\t\tobj.dx = dx\n\n\t\tdy -= (dy / (1 << 10))\n\t\tif g.objects[0].y > obj.y {\n\t\t\tdy += 4\n\t\t}\n\t\tif g.objects[0].y < obj.y {\n\t\t\tdy -= 4\n\t\t}\n\t\tobj.dy = dy\n\t}\n\n\t// make sure the shooter shoots now and again\n\tif obj.typ == g.roid && obj.state == g.roid_shooter &&\n\t\t!g.ghostship && (rand.Int()&0xFF) < (0xFF/20) {\n\t\tg.roidfire(obj)\n\t}\n}", "title": "" }, { "docid": "d9953fc9f85979ba6a7851a5daeb08b2", "score": "0.53397155", "text": "func (g *GoldPile) Drop(s *stats.Stats) {}", "title": "" }, { "docid": "23bfb94fb6ce6dc1c3c8c372e6c0dce8", "score": "0.53059", "text": "func cantFly() {\n\tfmt.Println(\"We do not have the avaialable fuel to fly there.\")\n}", "title": "" }, { "docid": "03ce9f8defcab6c909b93d185f1a4fb9", "score": "0.52943367", "text": "func (d *dense) fixDeadEnd(random *rand.Rand, u *cell) {\n\tif !u.isWall {\n\t\twalls := d.neighbours(u, allWalls)\n\t\tif len(walls) > 2 {\n\t\t\tindex := random.Intn(len(walls))\n\t\t\tu = walls[index]\n\t\t\tu.isWall = allPassages\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b46884af6f72838e250d4eaa3156cf94", "score": "0.52752197", "text": "func (b *Box) wipe() {\n\tb.gameIDs = make([]string, 0)\n\tb.pages = []Page{}\n\tb.Clear()\n\tb.SetCursor(0, 2)\n}", "title": "" }, { "docid": "fe9c6a23b9173e3c9b8c00eee0bb5d1d", "score": "0.5255445", "text": "func (fom *FreezeOMatic) Off() {\n\n}", "title": "" }, { "docid": "9ac5093b2727041ceb2d55e47bf7ec43", "score": "0.5227631", "text": "func (b *Bullet) die(s *tl.Screen) {\n\ts.Level().RemoveEntity(b)\n}", "title": "" }, { "docid": "203c7594e81c346497f8e58c316ce041", "score": "0.5220427", "text": "func cantFly() {\n\tfmt.Println(\"Sorry we don't have the required amount of fuel to fly there\")\n}", "title": "" }, { "docid": "11fee52763f5dbd84b296d01b4c407da", "score": "0.5209775", "text": "func clearToCastle(position position, side int) bool {\n\t// For each index in the potential blockers, check that there is no piece\n\t// present.\n\tfor _, index := range castlingBlocks[position.toMove][side] {\n\t\tif piecePresent(position, index) {\n\t\t\treturn false\n\t\t}\n\t}\n\n\t// For each index in the potentially-checked indices, ensure that the index\n\t// is not attacked. This could be optimised by only generating the attack\n\t// map once.\n\tfor _, index := range castlingChecks[position.toMove][side] {\n\t\tvar attackingColor byte\n\t\tif position.toMove == White {\n\t\t\tattackingColor = Black\n\t\t} else {\n\t\t\tattackingColor = White\n\t\t}\n\n\t\tif isAttacked(position, attackingColor, index) {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "79f0f9c0d3e750d0dc13ddee53ecb3f1", "score": "0.51677835", "text": "func runShip(address, serverPort, clientPort string) {\n\t// set up physics\n\tcreateBodies()\n\n\tcommands := make(chan *message.Vector, 1000)\n\trender := make(chan bool, 1)\n\tum := make(map[int]*queue.Queue)\n\n\tship := &Ship{name: 100, commands: commands, updateMap: &UpdateMap{updates: um},\n\t\trenderChan: render}\n\n\tconnected := ship.Connect(address, serverPort, clientPort)\n\n\tif connected {\n\t\tlog.Println(\"Ship is connected to server\")\n\t} else {\n\t\tlog.Println(\"Unable to start ship\")\n\t\treturn\n\t}\n\n\t//ApplyUpdates := time.NewTicker(time.Millisecond * 5).C\n\t//\tSendCommands := time.NewTicker(time.Millisecond * 100).C\n\t//Display := time.NewTicker(time.Millisecond * 120).C\n\tDisplayFrames := time.NewTicker(time.Second * 1).C\n\tRandom := time.NewTicker(time.Millisecond * 1).C\n\tDieTime := time.NewTicker(time.Second * 60).C\n\tRender := time.NewTicker(time.Millisecond * 1).C\n\nOuterLoop:\n\tfor {\n\t\tselect {\n\t\t//\tcase <-ApplyUpdates:\n\t\t//\t\tship.ApplyUpdates()\n\t\t//\t\tcase <-SendCommands:\n\t\t//\t\t\tship.SendCommands()\n\t\t//\tcase <-Display:\n\t\t//\t\tship.Display()\n\t\tcase <-Render:\n\t\t\tship.renderChan <- true\n\t\tcase <-DisplayFrames:\n\t\t\tship.DisplayFrames()\n\t\tcase <-Random:\n\t\t\tship.commands <- RandomMove()\n\t\tcase <-DieTime:\n\t\t\tship.Close()\n\t\t\tlog.Printf(\"Ship %+v dead\", ship)\n\t\t\tbreak OuterLoop\n\t\tdefault:\n\t\t}\n\t}\n}", "title": "" }, { "docid": "eb6aa067c1dc43375eda1cf53266a4e2", "score": "0.51673734", "text": "func (poke *Pokemon) Uninvulnerate(){\n\tpoke.invulnerability = false\n}", "title": "" }, { "docid": "344d4288142373f405b65710498f5919", "score": "0.5160544", "text": "func runShip(address, serverPort, clientPort string) {\n\n\tcommands := make(chan *message.Vector, 1000)\n\tship := &Ship{name: 100, commands: commands}\n\n\tconnected := ship.Connect(address, serverPort, clientPort)\n\n\tif connected {\n\t\tlog.Println(\"Ship is connected to server\")\n\t} else {\n\t\tlog.Println(\"Unable to start ship\")\n\t\treturn\n\t}\n\n\t//ApplyUpdates := time.NewTicker(time.Millisecond * 5).C\n\tSendCommands := time.NewTicker(time.Millisecond * 100).C\n\t//Display := time.NewTicker(time.Millisecond * 120).C\n\tDisplayFrames := time.NewTicker(time.Second * 1).C\n\tRandom := time.NewTicker(time.Millisecond * 1).C\n\tDieTime := time.NewTicker(time.Second * 10).C\n\nOuterLoop:\n\tfor {\n\t\tselect {\n\t\t//\tcase <-ApplyUpdates:\n\t\t//\t\tship.ApplyUpdates()\n\t\tcase <-SendCommands:\n\t\t\tship.SendCommands()\n\t\t//\tcase <-Display:\n\t\t//\t\tship.Display()\n\t\tcase <-DisplayFrames:\n\t\t\tship.DisplayFrames()\n\t\tcase <-Random:\n\t\t\tship.commands <- RandomMove()\n\t\tcase <-DieTime:\n\t\t\tship.Close()\n\t\t\tlog.Printf(\"Ship %+v dead\", ship)\n\t\t\tbreak OuterLoop\n\t\tdefault:\n\t\t}\n\t}\n}", "title": "" }, { "docid": "87aa92f7c331cbbe56854b9ec674d2e2", "score": "0.51397806", "text": "func (g *Gopher) Shoot() {\n\tg.NoShots = true\n\tg.NoShotsFor = uint64(shotTimeout)\n}", "title": "" }, { "docid": "4ecf31f29a141d6737846e5d11ada2be", "score": "0.51177484", "text": "func (Contractor) Unfasten(p NailPuller, nailSupply *int, b *Board) {\n\tfor b.NailsDriven > b.NailsNeeded {\n\t\tp.PullNail(nailSupply, b)\n\t}\n}", "title": "" }, { "docid": "89ed0af41cd141120df6999732710a05", "score": "0.50984424", "text": "func (wu *WorkUnit) punish() {\n\twu.receivedFromLock.Lock()\n\tdefer wu.receivedFromLock.Unlock()\n\tfor _, p := range wu.receivedFrom {\n\t\tmetrics.SharedServerMetrics.InvalidTransactions.Inc()\n\n\t\t// drop the connection to the peer\n\t\tpeering.Manager().Remove(p.ID)\n\t}\n}", "title": "" }, { "docid": "ffe82c9f63b06e357f62cccac06fa404", "score": "0.5092287", "text": "func (s *SpriteBase) Despawn() {}", "title": "" }, { "docid": "781b8271cfcc489e198ad0f57024138e", "score": "0.5084798", "text": "func (xw *xWingCS) fix() {\n\tbMain.revision++\n\tfor _, cell := range xw.cells {\n\t\teliminate(cell, xw.digit)\n\t}\n}", "title": "" }, { "docid": "e88f0c4aa05df02fec91933ac21ef8e8", "score": "0.50826514", "text": "func outOfFuel(lem *lander.Lander) {\n\tfmt.Printf(\"\\nFUEL OUT AT %0.2f SECONDS\\n\", lem.ElapsedTime)\n\tsecondsToImpact := ((-1.0 * lem.Velocity) + math.Sqrt(\n\t\tmath.Pow(lem.Velocity, 2.0)+(2.0*lem.Altitude*\n\t\t\tlander.Gravity))) / lander.Gravity\n\tlem.Velocity = lem.Velocity + (lander.Gravity * secondsToImpact)\n}", "title": "" }, { "docid": "c0236aabe5eaa6d368279a5cf89e81f3", "score": "0.50612336", "text": "func (g *Game) blowroid(r *object, x int, y int) {\n\tg.score += r.state * 10\n\n\tif r.state > g.roid_endsplit {\n\t\t// don't split this roid into two\n\t\tif r.state > g.roid_endsmall || (rand.Int()&0xFF) > (0x100/10) {\n\t\t\tr.typ = 0 // destroy roid\n\t\t\tg.nroids--\n\t\t} else {\n\t\t\t// make an attacking roid if small roid and chance\n\t\t\tr.state = g.roid_attacker\n\t\t\tr.x = x - (8 << pixelshift)\n\t\t\tr.y = y - (8 << pixelshift)\n\t\t\t// debugf(\"roid_attacker at (%g,%g)\\n\", (double)x/(1<<pixelshift), (double)y/(1<<pixelshift));\n\t\t}\n\t} else {\n\t\tif r.state == 0 && (rand.Int()&0xFF) < (0x100/2) {\n\t\t\t// make a shooting roid if big roid and chance\n\t\t\tr.state = g.roid_shooter\n\t\t\tr.x += ((32 - 24) / 2) << pixelshift\n\t\t\tr.y += ((32 - 24) / 2) << pixelshift\n\t\t\tg.roidfire(r) // make it fire\n\t\t} else {\n\t\t\ts := g.findspace()\n\n\t\t\t// split the roid into two\n\t\t\tr.state = 2*r.state + 1\n\t\t\ts.typ = g.roid\n\t\t\ts.state = r.state + 1\n\t\t\ts.life = 0\n\t\t\ts.lives = 0\n\t\t\ts.phase = 0\n\t\t\ts.x = r.x\n\t\t\ts.y = r.y\n\n\t\t\t// Add a random element to the speed to make the roids split\n\t\t\tdx := (rand.Int() & 0xFF) - 0x80\n\t\t\tdy := (rand.Int() & 0xFF) - 0x80\n\t\t\ts.dx = r.dx - dx\n\t\t\ts.dy = r.dy - dy\n\t\t\tr.dx = r.dx + dx\n\t\t\tr.dy = r.dy + dy\n\n\t\t\tg.nroids++\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4a9b1031e3c63609a9ea26fdbd66e752", "score": "0.5059916", "text": "func (this *Board) addDummyShips() {\n\tthis.board[5][5] = this.markerShip\n\tthis.board[6][5] = this.markerShip\n\tthis.board[7][5] = this.markerShip\n\tthis.board[8][5] = this.markerShip\n\n\n\tthis.board[2][7] = this.markerShip\n\tthis.board[3][7] = this.markerShip\n\n\tthis.board[2][3] = this.markerShip\n\tthis.board[2][4] = this.markerShip\n\tthis.board[2][5] = this.markerShip\n\n\tthis.board[7][2] = this.markerShip\n\tthis.board[7][3] = this.markerShip\n}", "title": "" }, { "docid": "3ae4774e731c259f611f21a91f723dcc", "score": "0.5006959", "text": "func HillClimb(model Annealable, iterations int) {\n\tcurrentE := model.Energy()\n\tfor i := 0; i < iterations; i++ {\n\t\trevert := model.DoMove()\n\t\tnewE := model.Energy()\n\t\tif newE <= currentE {\n\t\t\tcurrentE = newE\n\t\t} else {\n\t\t\tmodel.UndoMove(revert)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "92f1ddd1c9386c1baabf03abd57bb4ba", "score": "0.50054586", "text": "func (vsw Vsw) Wipe(rate int, src int, wipe_type int) {\n\t//log.Printf(\"wipe(%d, %d, %d)\\n\", rate, src, wipe_type)\n\tif src < 0 || 4 < src {\n\t\treturn\n\t}\n\tif wipe_type < 0 || wipe_type >= WIPE_TYPE_NUM {\n\t\treturn\n\t}\n\ttransMain(vsw.conn, rate, src, TRANSITION_TYPE_WIPE+wipe_type, 0, 0)\n}", "title": "" }, { "docid": "c446609561be906a34a80a6ae10bd142", "score": "0.49972627", "text": "func (rf *Raft) LeaveLeaderShip(newTerm int) {\n\trf.isCandidate = false\n\trf.isLeader = false\n\trf.CurrentTerm = newTerm\n}", "title": "" }, { "docid": "1cd663c67bca8dde70d14866000e179d", "score": "0.49957702", "text": "func doNotLoseHope(state *hex.State, playerColor hex.Color) (*hex.Action, error) {\n\tfmt.Println(\"A player doesn't want to give up!\")\n\texists, solution := state.IsGoalState(false)\n\tif !exists {\n\t\treturn nil, errors.New(\"Game lost but solution does not exist\")\n\t}\n\twinPath := solution.([][2]int)\n\n\t// Find opponent's safe cells, attack one\n\tsafeCells := findSafeCells(winPath, state.GetSize(), playerColor.Opponent())\n\ta := hex.NewAction(byte(safeCells[0][0].x), byte(safeCells[0][0].y), playerColor)\n\n\treturn a, nil\n}", "title": "" }, { "docid": "6a299017b0551942c75dd7351961a93f", "score": "0.4995582", "text": "func (this *Command) DoomedAntsTakeHeart() {\n //log := NewTurnLog(\"DoomedAntsTakeHeart\", \"txt\")\n\n ForEachPoint(func(p Point) {\n if this.terrain.At(p).HasFriendlyAnt() && this.moves.At(p) == 0 {\n //log.WriteString(fmt.Sprintf(\"Restoring %v\\n\", p))\n\n ForEachDirection(func(dir Direction) {\n move := Move{p, dir}\n s := this.terrain.At(move.Destination())\n if !s.HasWater() && !s.HasFood() {\n this.moves.Include(move)\n }\n })\n }\n })\n}", "title": "" }, { "docid": "a484eeeb35c3389993b235ca23a2fdbe", "score": "0.49846968", "text": "func (b *Board) Cleanup() {\n\tb.sides[0].Cleanup()\n\tb.sides[1].Cleanup()\n}", "title": "" }, { "docid": "d9383e4abea8df780bc0a5624247a113", "score": "0.49814615", "text": "func Surify() {\n\t*crashTTL = 0\n\t*cheatFate = true\n\t*defaultFateP = 0\n}", "title": "" }, { "docid": "553ca7be9da685b3ce4fb21535569f0d", "score": "0.4980441", "text": "func (g *Game) gameover() {\n\tobj := g.findspacenzero()\n\n\tobj.x = (SW - g.sprite[g.gameoverword].Rect.Dx()) << (pixelshift - 1)\n\tobj.y = (SH - g.sprite[g.gameoverword].Rect.Dy()) << (pixelshift - 1)\n\tobj.typ = g.gameoverword\n\n\tg.push(\n\t\tg.gamepause(500),\n\t\tfunc() {\n\t\t\tobj.typ = 0\n\t\t},\n\t)\n}", "title": "" }, { "docid": "00b8fe58999e8d9a091db1f85d598d07", "score": "0.4971281", "text": "func chkLoseMove() bool{\n\tfor i, v := range pos {\n\t\tif v == \" \"{\n\t\t\tpos[i] = \"x\"\n\t\t\tif verifyWin() == \"player\"{\n\t\t\t\tpos[i] = \"o\"\n\t\t\t\tplays++\n\t\t\t\tplayed = append(played, i+1)\n\t\t\t\treturn true\n\t\t\t} \n\t\t\tpos[i] = \" \"\t\t\t\n\t\t}\t\t\n\t}\n\treturn false\n}", "title": "" }, { "docid": "40fdef788055b04d752a60e56ed269d6", "score": "0.4971261", "text": "func (g *Game) fire() {\n\tobj := g.findspace()\n\n\tg.score--\n\tif g.score < 0 {\n\t\tg.score = 0\n\t}\n\n\tobj.typ = g.bullet\n\tobj.state = 0\n\tobj.phase = 0\n\tobj.lives = 0\n\n\tobj.life = g.time_now + 200\n\n\tx := g.objects[0].x\n\ty := g.objects[0].y\n\tdx := g.objects[0].dx\n\tdy := g.objects[0].dy\n\n\tc := g.cos_table[g.ship_direction()]\n\ts := g.sin_table[g.ship_direction()]\n\n\tx += ((16 - 4) / 2) << pixelshift\n\ty += ((16 - 4) / 2) << pixelshift\n\tx += c / (1 << (13 - pixelshift))\n\tx += c / (1 << (15 - pixelshift))\n\ty += s / (1 << (13 - pixelshift))\n\ty += s / (1 << (15 - pixelshift))\n\tobj.x = x\n\tobj.y = y\n\n\tdx += c / (1 << (16 - pixelshift))\n\tdy += s / (1 << (16 - pixelshift))\n\tobj.dx = dx\n\tobj.dy = dy\n\n\t// sound_fire();\n}", "title": "" }, { "docid": "a2179e2ed996da46b93f694ea2876d34", "score": "0.49457106", "text": "func (np *nakedPairCS) fix() {\n\tbMain.revision++\n\tfor _, cell := range np.cells {\n\t\teliminate(cell, np.pair[0])\n\t\teliminate(cell, np.pair[1])\n\t}\n}", "title": "" }, { "docid": "bec943621f4c42783b2c2bffaabf2d0b", "score": "0.49456123", "text": "func fix(\n\tgh *gadget2Header, context *Context, path string,\n\txs, vs [][3]float32, ms[]float32,\n) error {\n\trootA := float32(math.Sqrt(float64(gh.Time)))\n\n\ttw := float32(gh.BoxSize)\n\tfor i := range xs {\n\t\tfor j := 0; j < 3; j++ {\n\t\t\tvs[i][j] = vs[i][j] * rootA\n\t\t\t\n\t\t\tif xs[i][j] < 0 {\n\t\t\t\txs[i][j] += tw\n\t\t\t} else if xs[i][j] >= tw {\n\t\t\t\txs[i][j] -= tw\n\t\t\t}\n\n\t\t\tif math.IsNaN(float64(xs[i][j])) ||\n\t\t\t\tmath.IsInf(float64(xs[i][j]), 0) ||\n\t\t\t\txs[i][j] < -tw || xs[i][j] > 2*tw {\n\n\t\t\t\treturn fmt.Errorf(\n\t\t\t\t\t\"Corruption detected in the file %s. I can't analyze it.\",\n\t\t\t\t\tpath,\n\t\t\t\t)\n\t\t\t}\n\n\t\t\txs[i][j] *= float32(context.GadgetPositionUnits)\n\t\t}\n\t\tms[i] *= float32(context.GadgetMassUnits)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cf6d9f2f19955333dff1c44c6eccabf4", "score": "0.49429625", "text": "func unmakeMove(b *board, m *move) *board {\n\tdefer func() {\n\t\tb.flags = m.boardFlags\n\t}()\n\n\tfromPiece := b.squares[m.toX][m.toY]\n\n\t// Check for special move flags\n\tif hasFlag(m.flags, queenPromotion) || hasFlag(m.flags, rookPromotion) || hasFlag(m.flags, knightPromotion) || hasFlag(m.flags, bishopPromotion) {\n\t\tif isWhite(fromPiece) {\n\t\t\tfromPiece = whitePawn\n\t\t} else {\n\t\t\tfromPiece = blackPawn\n\t\t}\n\t}\n\n\tif hasFlag(m.flags, kingCastle) {\n\t\tif m.fromY == 0 {\n\t\t\tb.squares[4][m.fromY] = whiteKing\n\t\t\tb.squares[7][m.fromY] = whiteRook\n\t\t} else {\n\t\t\tb.squares[4][m.fromY] = blackKing\n\t\t\tb.squares[7][m.fromY] = blackRook\n\t\t}\n\n\t\tb.squares[6][m.fromY] = empty\n\t\tb.squares[5][m.fromY] = empty\n\n\t\treturn b\n\t} else if hasFlag(m.flags, queenCastle) {\n\t\tif m.fromY == 0 {\n\t\t\tb.squares[4][m.fromY] = whiteKing\n\t\t\tb.squares[0][m.fromY] = whiteRook\n\t\t} else {\n\t\t\tb.squares[4][m.fromY] = blackKing\n\t\t\tb.squares[0][m.fromY] = blackRook\n\t\t}\n\t\tb.squares[2][m.fromY] = empty\n\t\tb.squares[3][m.fromY] = empty\n\n\t\treturn b\n\t}\n\n\tb.squares[m.fromX][m.fromY] = fromPiece\n\tb.squares[m.toX][m.toY] = m.taken\n\n\treturn b\n}", "title": "" }, { "docid": "351665e50ebecebd8136020c786d62c0", "score": "0.49340332", "text": "func (h *Hero) downgradeToLowestSilent() {\n\th.grade = 0\n\th.switchResSet(0)\n\th.reCalcLevelRectSize()\n}", "title": "" }, { "docid": "ec03a29983043772c1cd6f9b8bcb897f", "score": "0.49321708", "text": "func _RecoveryRequirements() {\n}", "title": "" }, { "docid": "dc511055d38dbf6aa7f60c096edf6ece", "score": "0.49239448", "text": "func (board *Board) TakeMove() {\n\tboard.ply--\n\n\t// get history for previous move in the ply\n\tmove := board.history[board.ply].move\n\tfromSq := FromSq(move)\n\ttoSq := ToSq(move)\n\t// the moved piece type is the piece in the to square\n\tpieceType := board.position[toSq]\n\n\tif board.bitboards[EP] != 0 {\n\t\t// Unhash enpassant if it was active(hashed)\n\t\t// This might be hashed again later if the previous move also\n\t\t// had an active en passant file.\n\t\tboard.positionKey ^= PieceKeys[EP][bits.TrailingZeros64(board.bitboards[EP])]\n\t\t// fmt.Printf(\"-Unhashing enpass file %d\\n\", bits.TrailingZeros64(board.bitboards[EP]))\n\t}\n\n\t// fmt.Printf(\"-Unhashing castle perm %d\\n\", board.castlePermissions)\n\t// unhash current castling permissions and hash in the permissions from the last move (below)\n\tboard.positionKey ^= CastleKeys[board.castlePermissions]\n\n\tboard.castlePermissions = board.history[board.ply].castlePermissions\n\tboard.fiftyMove = board.history[board.ply].fiftyMove\n\tboard.bitboards[EP] = board.history[board.ply].enPassantFile\n\n\tif board.bitboards[EP] != 0 {\n\t\t// if en passant was active in the previous position - hash it in\n\t\tboard.positionKey ^= PieceKeys[EP][bits.TrailingZeros64(board.bitboards[EP])]\n\t\t// fmt.Printf(\"+Hashing enpass file %d\\n\", bits.TrailingZeros64(board.bitboards[EP]))\n\t}\n\n\tboard.positionKey ^= CastleKeys[board.castlePermissions]\n\t// fmt.Printf(\"+Hashing castle perm %d\\n\", board.castlePermissions)\n\n\t// change side and hash in the side key\n\tboard.Side ^= 1\n\tboard.positionKey ^= SideKey\n\t// fmt.Printf(\"+Hashing side key %d\\n\", SideKey)\n\n\t// Remove piece from to sq in piece's bitboard\n\tboard.removePieceFromSq(pieceType, toSq)\n\tboard.position[toSq] = NoPiece\n\t// Add the piece to start sq in piece's bitboard\n\tboard.addPieceToSq(pieceType, fromSq)\n\tboard.position[fromSq] = pieceType\n\n\tif CastleFlag(move) == 1 {\n\t\tif pieceType == WK && toSq == G1 {\n\t\t\tboard.removePieceFromSq(WR, F1)\n\t\t\tboard.addPieceToSq(WR, H1)\n\t\t\tboard.position[F1] = NoPiece\n\t\t\tboard.position[H1] = WR\n\t\t} else if pieceType == WK && toSq == C1 {\n\t\t\tboard.removePieceFromSq(WR, D1)\n\t\t\tboard.addPieceToSq(WR, A1)\n\t\t\tboard.position[D1] = NoPiece\n\t\t\tboard.position[A1] = WR\n\t\t} else if pieceType == BK && toSq == G8 {\n\t\t\tboard.removePieceFromSq(BR, F8)\n\t\t\tboard.addPieceToSq(BR, H8)\n\t\t\tboard.position[F8] = NoPiece\n\t\t\tboard.position[H8] = BR\n\t\t} else if pieceType == BK && toSq == C8 {\n\t\t\tboard.removePieceFromSq(BR, D8)\n\t\t\tboard.addPieceToSq(BR, A8)\n\t\t\tboard.position[D8] = NoPiece\n\t\t\tboard.position[A8] = BR\n\t\t} else {\n\t\t\tpanic(\"Incorrect castle move\")\n\t\t}\n\t}\n\n\tcapturedPiece := Captured(move)\n\tif capturedPiece != NoPiece && EnPassantFlag(move) == 0 {\n\t\tboard.addPieceToSq(capturedPiece, toSq) // add enemy piece from its board\n\t\tboard.position[toSq] = capturedPiece\n\t} else if (capturedPiece == WP || capturedPiece == BP) && EnPassantFlag(move) == 1 {\n\t\t// re-add enpassant captured pawn\n\t\tif board.Side == White {\n\t\t\tboard.addPieceToSq(BP, toSq+8)\n\t\t\t// add captured enpassant pawn to piece bitboard\n\t\t\tboard.position[toSq+8] = BP\n\t\t} else {\n\t\t\tboard.addPieceToSq(WP, toSq-8)\n\t\t\tboard.position[toSq-8] = WP\n\t\t}\n\t}\n\n\tif promoted := Promoted(move); promoted > 0 {\n\t\t// So far we have moved back the piece to original square\n\t\t// however, when we have promotions we have ended up\n\t\t// moving the promoted piece back. So here we need to\n\t\t// replace the promoted piece with a pawn of the corresponding\n\t\t// color\n\t\tboard.removePieceFromSq(promoted, fromSq)\n\n\t\tpawn := BP\n\t\tif board.Side == White {\n\t\t\tpawn = WP\n\t\t}\n\n\t\tboard.addPieceToSq(pawn, fromSq)\n\t\tboard.position[fromSq] = pawn\n\t}\n}", "title": "" }, { "docid": "93e95efbb6ee6db11bcb2b7ca1e88bba", "score": "0.49236387", "text": "func (f *Function) PutAway() {\n\tf.stack.Push(f.Stmts)\n\tf.Stmts = []Statement{}\n}", "title": "" }, { "docid": "5f09c6deb647755d177bfa46c146172c", "score": "0.49154595", "text": "func setGameOver(screen *ebiten.Image){\n\ttext.Draw(screen, gameOverText, myGameFont, 100, screenHeight/2, color.White)\n\tgravity = 0\n\tpipeSpeed = 0\t\n\tupVelocity = 0\n\tisBirdAlive = false\n}", "title": "" }, { "docid": "794ed9bd357aff61b6c79775b8c11af8", "score": "0.4910103", "text": "func (g *Game) Forfeit(id string) error {\n\tif !g.exists(id) {\n\t\treturn errNotExist()\n\t}\n\tif g.cups[id] == 0 {\n\t\treturn errAlreadyLost()\n\t}\n\n\treturn g.forfeit(id)\n}", "title": "" }, { "docid": "483650fbf25e741185a99a997e717520", "score": "0.49082917", "text": "func (p *PeerTracker) FullThaw() {\n\tp.freezeVal = 0\n}", "title": "" }, { "docid": "fc0cd3c22ec8095e665b8604d2669edb", "score": "0.49058825", "text": "func (pnj *Npc)MoveHarvest(c carte.Carte){\n\tvar i, j int\n\tvar ress *ressource.Ressource\n\tdistance := 2000\n\tif (pnj.GetType() == 2){\n\t\tfmt.Println(\"Un soldat ne peut pas recolter de ressources\")\n\t\treturn\n\t}\n\tfor i = pnj.GetX() - pnj.GetVue(); i <= pnj.GetX() + pnj.GetVue() || i > c.GetSize(); i++{\n\t\tif (i < 0){\n\t\t\ti = 0\n\t\t}\n\t\tfor j = pnj.GetY() - pnj.GetVue(); j <= pnj.GetY() + pnj.GetVue() || j > c.GetSize(); j++{\n\t\t\tif (j < 0){\n\t\t\t\tj = 0\n\t\t\t}\n\t\t\tif (c.GetTile(i, j).GetType() == 2){\n\t\t\t\tif (c.GetTile(i, j).GetRess().GetType() == 2 && pnj.GetType() != 0){\n\t\t\t\t\tfmt.Println(\"Seul un harvester peut recolter de la pierre\")\n\t\t\t\t\tcontinue;\n\t\t\t\t}\n\t\t\t\tif ((Abs(i - pnj.GetX()) + Abs(j - pnj.GetY())) < distance &&\n\t\t\t\t\tRecoltePossible(c, i, j)){\n\t\t\t\t\tdistance = Abs(i - pnj.GetX()) + Abs(j - pnj.GetY())\n\t\t\t\t\tress = c.GetTile(i, j).GetRess()\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\t//fmt.Println(\"ressource?\",ress == nil)\n\n\t// pas de ressources dans la vue du villageois\n\tif (distance == 2000){\n\t\treturn\n\t}\n\n\tvar posRecolteVillX, posRecolteVillY int\n\tdistance = 2000\n\n\tfor i = ress.GetX() - constants.HarvesterVillPortee; i <= ress.GetX() + constants.HarvesterVillPortee; i++{\n\t\tfor j = ress.GetY() - constants.HarvesterVillPortee; j <= ress.GetY() + constants.HarvesterVillPortee; j++{\n\t\t\tif ( (Abs(i - pnj.GetX()) + Abs(j - pnj.GetY()) ) < distance &&\n\t\t\t\tc.IsEmpty(i, j)){\n\t\t\t\tdistance = Abs(i - pnj.GetX()) + Abs(j - pnj.GetY())\n\t\t\t\tposRecolteVillX = i\n\t\t\t\tposRecolteVillY = j\n\t\t\t}\n\t\t}\n\t}\n\t// pas d'accès possible pour recolter la ressource\n\tif (distance == 2000){\n\t\treturn\n\t}\n\t// on attends que le villageois ait finit son déplacement\n\tvar wg sync.WaitGroup\n\twg.Add(1)\n go pnj.MoveTo(c, posRecolteVillX, posRecolteVillY, &wg)\n\twg.Wait()\n\n // fmt.Printf(\"posRecolteVillX : %d, posRecolteVillY : %d\\n\", posRecolteVillX, posRecolteVillY)\n\t// fmt.Printf(\"villX : %d, villY: %d\\n\", pnj.GetX(), pnj.GetY())\n\n\t// Le villageois se trouve bien à l'emplacement de la recolte?\n\tif (pnj.GetX() == (posRecolteVillX) && pnj.GetY() == posRecolteVillY){\n\t\t go (pnj).Harvest(c, ress, posRecolteVillX, posRecolteVillY)\n\t}\n}", "title": "" }, { "docid": "b3931b9367e9c97d641418a4e2e02188", "score": "0.49057588", "text": "func FIPSOnly()", "title": "" }, { "docid": "50eb5757560741d13527956c3c8fa752", "score": "0.48980722", "text": "func (this *Board) Punish(dropPattern int, starPunishments int, normalPunishments int) (*[][]*gem.Gem, bool) {\n var punishmentGems [][]*gem.Gem = make([][]*gem.Gem, 0);\n var success bool = true;\n var gemPtr *[][]*gem.Gem;\n\n if (starPunishments + normalPunishments > 0) {\n gemPtr, success = gem.GetPunishmentGems(dropPattern, starPunishments, normalPunishments, &this.Board);\n punishmentGems = *gemPtr;\n\n var baselines *[]int = gem.GetBaselines(&this.Board);\n for col, gems := range punishmentGems {\n for rowOffset, punishmentGem := range gems {\n this.Board[(*baselines)[col] - rowOffset][col] = punishmentGem;\n }\n }\n }\n\n return &punishmentGems, success;\n}", "title": "" }, { "docid": "8b9935565db36b689718b9b0989ab989", "score": "0.4896803", "text": "func (r *Dev) antiColl() ([]byte, error) {\n\tif err := r.LowLevel.DevWrite(commands.BitFramingReg, 0x00); err != nil {\n\t\treturn nil, err\n\t}\n\n\tbackData, _, err := r.LowLevel.CardWrite(commands.PCD_TRANSCEIVE, []byte{commands.PICC_ANTICOLL, 0x20}[:])\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(backData) != 5 {\n\t\treturn nil, wrapf(\"back data expected 5, actual %d\", len(backData))\n\t}\n\n\tcrc := byte(0)\n\n\tfor _, v := range backData[:4] {\n\t\tcrc = crc ^ v\n\t}\n\n\tif crc != backData[4] {\n\t\treturn nil, wrapf(\"CRC mismatch, expected %02x actual %02x\", crc, backData[4])\n\t}\n\n\treturn backData, nil\n}", "title": "" }, { "docid": "18307423ba970d062b4862bbe5c88eeb", "score": "0.4896758", "text": "func (b *Board) clearTargetSquare(m Move) {\n\tif b.IsWhiteMove {\n\t\tb.WhitePieces = b.WhitePieces &^ m.getDestSquare()\n\t} else {\n\t\tb.BlackPieces = b.BlackPieces &^ m.getDestSquare()\n\t}\n\n\tswitch m.getDestOccupancyBeforeMove() {\n\tcase whitePawn:\n\t\tb.Pawns = b.Pawns &^ m.getDestSquare()\n\tcase whiteKnight:\n\t\tb.Knights = b.Knights &^ m.getDestSquare()\n\tcase whiteBishop:\n\t\tb.Bishops = b.Bishops &^ m.getDestSquare()\n\tcase whiteRook:\n\t\tb.Rooks = b.Rooks &^ m.getDestSquare()\n\tcase whiteQueen:\n\t\tb.Queens = b.Queens &^ m.getDestSquare()\n\tcase whiteKing:\n\t\tb.Kings = b.Kings &^ m.getDestSquare()\n\n\tcase blackPawn:\n\t\tb.Pawns = b.Pawns &^ m.getDestSquare()\n\tcase blackKnight:\n\t\tb.Knights = b.Knights &^ m.getDestSquare()\n\tcase blackBishop:\n\t\tb.Bishops = b.Bishops &^ m.getDestSquare()\n\tcase blackRook:\n\t\tb.Rooks = b.Rooks &^ m.getDestSquare()\n\tcase blackQueen:\n\t\tb.Queens = b.Queens &^ m.getDestSquare()\n\tcase blackKing:\n\t\tb.Kings = b.Kings &^ m.getDestSquare()\n\tcase empty:\n\t\t//do nothing\n\tdefault:\n\t\tpanic(fmt.Sprintf(\"m.getDestOccupancyBeforeMove() returned %v - piece %064b\", m.getDestOccupancyBeforeMove(), m.getOriginSquare()))\n\t}\n}", "title": "" }, { "docid": "98ac87d5dbe83f95759186554585f6b3", "score": "0.489576", "text": "func (d Dragon) Fly() {\n\td.bird.Fly()\n}", "title": "" }, { "docid": "514e2385b9f4f737cdb4a30824e6ddfd", "score": "0.489166", "text": "func elevatorStuck() {\n\tlocalState.Stuck = true\n\tfor floor := 0; floor < def.NUMB_FLOORS; floor++ {\n\t\tfor button := def.HALL_UP; button <= def.HALL_DOWN; button++ {\n\t\t\tlocalState.AcceptedOrders[floor][button] = false\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c05f8e147f2782a57be634a458de64ed", "score": "0.48895195", "text": "func (client *Player) Cleanup() {\n\n}", "title": "" }, { "docid": "2eff0ca369f2f615aee88a453afe0bb6", "score": "0.48839694", "text": "func (g *Game) shipfriction() {\n\tdx := g.objects[0].dx\n\tdy := g.objects[0].dy\n\n\tdx -= dx / (1 << logshipfriction)\n\tif dx < 0 {\n\t\tdx += 1\n\t}\n\tif dx > 0 {\n\t\tdx -= 1\n\t}\n\n\tdy -= dy / (1 << logshipfriction)\n\tif dy < 0 {\n\t\tdy += 1\n\t}\n\tif dy > 0 {\n\t\tdy -= 1\n\t}\n\n\tg.objects[0].dx = dx\n\tg.objects[0].dy = dy\n}", "title": "" }, { "docid": "9b3a7569e85c094eeb312dc01e92fa3b", "score": "0.48586032", "text": "func (sfm *FaultSlasher) Slash(ctx context.Context, currentHeight *types.BlockHeight) error {\n\tres, err := sfm.plumbing.MessageQuery(ctx, sfm.msgSender, address.StorageMarketAddress, \"getLateMiners\")\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"getLateMiners message failed\")\n\t}\n\n\tlateMiners, err := abi.Deserialize(res[0], abi.MinerPoStStates)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"deserializing MinerPoStStates failed\")\n\t}\n\n\tlms, ok := lateMiners.Val.(*map[string]uint64)\n\tif !ok {\n\t\treturn errors.Wrapf(err, \"expected *map[string]uint64 but got %T\", lms)\n\t}\n\tsfm.log.Debugf(\"there are %d late miners\\n\", len(*lms))\n\n\t// Slash late miners.\n\tfor minerStr, state := range *lms {\n\t\tminerAddr, err := address.NewFromString(minerStr)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"could not create minerAddr string\")\n\t\t}\n\n\t\t// add slash message to message pull w/o broadcasting\n\t\tsfm.log.Debugf(\"Slashing %s with state %d\\n\", minerStr, state)\n\n\t\t_, err = sfm.outbox.Send(ctx, sfm.msgSender, minerAddr, types.ZeroAttoFIL, sfm.gasPrice,\n\t\t\tsfm.gasLimit, false, \"slashStorageFault\")\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"slashStorageFault message failed\")\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0bb75920b2d8c983903affa802bab261", "score": "0.48539484", "text": "func ship(fd int, name string, log io.Writer, stderr *os.File) error {\n\tr, w, err := Dup(fd, name)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tgo func() {\n\t\tbuf := bufio.NewReader(r)\n\n\t\tfor {\n\t\t\tline, err := buf.ReadBytes('\\n')\n\n\t\t\t_, err = log.Write(line)\n\n\t\t\tif err != nil {\n\t\t\t\tfmt.Fprintf(stderr, \"ERROR: shipit failed to write to writer: %s\", err)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tif err == io.EOF {\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tif err != nil {\n\t\t\t\tfmt.Fprintf(stderr, \"ERROR: shipit failed to read from %s: %s\", name, err)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\t_, err = w.Write(line)\n\n\t\t\tif err != nil {\n\t\t\t\tfmt.Fprintf(stderr, \"ERROR: shipit failed to write to %s: %s\", name, err)\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}()\n\n\treturn nil\n}", "title": "" }, { "docid": "38571e669a745d520611616c4a3f4c3b", "score": "0.48512203", "text": "func (g *Game) SendRevealSafe() error {\n\tg.gameLock.Lock()\n\te := g.SendReveal()\n\tg.gameLock.Unlock()\n\treturn e\n}", "title": "" }, { "docid": "98a56d2f5c1354261a0f03a2775bbb0a", "score": "0.48467782", "text": "func cantFly() {\n fmt.Println(\"We do not have the available fule to fly there\")\n}", "title": "" }, { "docid": "02f579e1843d5551774a376611bb92cc", "score": "0.48465028", "text": "func (screen *GameScreen) RunFightDragonUndead() {\n\tif len(screen.user.InventoryAngelSwords()) == 0 {\n\t\tscreen.actionText = loud.Sprintf(\"You can't fight undead dragon without angel sword.\")\n\t\tscreen.Render()\n\t\treturn\n\t}\n\tscreen.RunTxProcess(WaitFightDragonUndead, RsltFightDragonUndead, func() (string, error) {\n\t\treturn loud.FightDragonUndead(screen.user)\n\t})\n}", "title": "" }, { "docid": "7ecc51eaaa01d2e54ce099e6c15f2a04", "score": "0.4844052", "text": "func Unreached() {\n\tpanic(\"reached\")\n}", "title": "" }, { "docid": "4df8079ebf86dbbab458110fcbdaf8f6", "score": "0.48408687", "text": "func (ui userImage) placeDestroyer(x, y int, direction shipDirection) {\n\tui.drawShip(x, y, 2, direction)\n}", "title": "" }, { "docid": "3c6d057add2e949b49a19ceab024576a", "score": "0.48405653", "text": "func (d *dense) ensureExit(random *rand.Rand, side []*cell, max int) {\n\tif len(side) == max {\n\t\tindex := random.Intn(len(side))\n\t\tu := side[index]\n\t\tu.isWall = allPassages\n\n\t\t// ensure the chop gets into the grid by chopping again if necessary.\n\t\twalls := d.neighbours(u, allWalls)\n\t\tif len(walls) == 3 {\n\t\t\twallIndex := random.Intn(len(walls))\n\t\t\tu := walls[wallIndex]\n\t\t\tu.isWall = allPassages\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3b62e4ff5b4cf64f526e2c7e72162998", "score": "0.48359588", "text": "func (hand Hand) Drop(piece Piece) {\n\thand[piece.ForceDemote()]--\n}", "title": "" }, { "docid": "450d9d2d560c18b134bb55320bdfd043", "score": "0.48323855", "text": "func (inv *Invasion) MoveAliens() {\n\t//logger.Println(\"----> moveAliens : \", inv.totalMoves);\n\tvar roads map[string]string;\n\tfor alien, city := range inv.aliens {\n\t\troads = inv.cityMap[city].roads;\n\t\tif (len(roads) == 0) {\n\t\t\t//City is island\n\t\t\t//Alien is trapped and destroyed itself\n\t\t\tdelete(inv.aliens, alien);\n\t\t\tfmt.Printf(\"Alien %d is trapped on %s island and destroyed himself\\n\", alien, city);\n\t\t\tlogger.Printf(\"Alien %d is trapped on %s island and destroyed himself\\n\", alien, city);\n\t\t\tcontinue;\n\t\t}\n\t\tdir := GetRandomKey(roads);\n\t\tcityTo := inv.cityMap[city].roads[dir];\n\t\tinv.MoveCityTo(alien, city, cityTo);\n\t}\n}", "title": "" }, { "docid": "e5de735b2d2c38968742b45c882cce0b", "score": "0.48320198", "text": "func (poke *Pokemon) Burn(){\n\tif poke.status == Fit{\n\t\tpoke.status = Burned\n\t}\n}", "title": "" }, { "docid": "e8acf7c8d8dad90baae4bd3e5535c38e", "score": "0.48196685", "text": "func (o *Optimizer) hillClimbMap(m *Map) *Map {\r\n\tfor i := 0; i < o.AdjustCycle; i++ {\r\n\t\timpactedX, impactedY, _, newType, impactedTiles, impactedScore := m.Adjust(o.TileRandomizer, o.Goal)\r\n\r\n\t\tif impactedScore > 0.0 {\r\n\t\t\t// Apply adjust change\r\n\t\t\tm.Tiles[impactedY][impactedX].Type = newType\r\n\t\t\tfor _, impactedTile := range impactedTiles {\r\n\t\t\t\tm.Tiles[impactedTile.Y][impactedTile.X].SpeedMultiplier = impactedTile.NewSpeedMultiplier\r\n\t\t\t\tm.Tiles[impactedTile.Y][impactedTile.X].ProductionMultiplier = impactedTile.NewProductionMultiplier\r\n\t\t\t}\r\n\r\n\t\t\t// Update map score\r\n\t\t\tm.Score += impactedScore\r\n\r\n\t\t\t// Debugging code block\r\n\t\t\t// fmt.Printf(\"new calculation %.2f\", m.Score)\r\n\t\t\t// m.UpdateScore(o.Goal)\r\n\t\t\t// fmt.Printf(\" updated %.2f oldType %s newType %s impactedX %d impactedY %d impactedScore %.2f\\n\", m.Score, oldType, newType, impactedX, impactedY, impactedScore)\r\n\t\t}\r\n\t}\r\n\treturn m\r\n}", "title": "" }, { "docid": "f800c241aaeeea888c1be89ed2c1c82c", "score": "0.4816247", "text": "func (hillOrAnt Item) ToUnoccupied() Item {\n\treturn Item(hillOrAnt.Player()) + MY_HILL\n}", "title": "" }, { "docid": "c1c55a19fc820b34cd418cf89126d984", "score": "0.48087397", "text": "func (s *snake) isOutOfBounds() bool {\n\tif s.body[0][0] >= boardSize || s.body[0][1] >= boardSize ||\n\t\ts.body[0][0] < 0 || s.body[0][1] < 0 {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "8438eccc95b28ab8e4d2a6918e4036e3", "score": "0.48083282", "text": "func (Sword) Drop() {}", "title": "" }, { "docid": "c65a9f4216e502fb0de57c8869c9a422", "score": "0.480739", "text": "func (g *Game) roidfire(parent *object) {\n\tweapon := g.findspace()\n\n\tweapon.typ = g.roid\n\tweapon.state = g.roid_weapon\n\tweapon.life = 0\n\tweapon.lives = 0\n\tweapon.phase = (rand.Int() & 3) | (0x03 << 8)\n\tweapon.x = parent.x\n\tweapon.y = parent.y\n\n\t// calculate a trajectory to fire at the ship\n\tdx := g.objects[0].x - weapon.x\n\tdy := g.objects[0].y - weapon.y\n\tabs_dx := dx\n\tif dx < 0 {\n\t\tabs_dx = -dx\n\t}\n\tabs_dy := dy\n\tif dy < 0 {\n\t\tabs_dy = -dy\n\t}\n\n\t// shift dx,dy until less than a certain amount so bullet doesn't\n\t// move too fast. normal programs would use a divide here but\n\t// remember this is an assembler conversion ;-)\n\tfor abs_dx >= (1<<pixelshift) || abs_dy >= (1<<pixelshift) {\n\t\tdx /= 2\n\t\tdy /= 2\n\t\tabs_dx /= 2\n\t\tabs_dy /= 2\n\t}\n\n\tweapon.dx = dx\n\tweapon.dy = dy\n\n\t// sound_roidfire()\n\n\tg.nroids++\n}", "title": "" }, { "docid": "f728e992ac596e14e736f628057644bd", "score": "0.4800504", "text": "func (enemy *enemy) revive() {\n\tif enemy.health <= 0 {\n\t\t//if the enemy has 0 or less health\n\t\tenemy.health = enemy.maxhealth\n\t\tfmt.Println(\"You revived\", enemy.name, \"to max health!\")\n\t} else {\n\t\t//If the enemy has more than 0 health, then the enemy is still alive and cannot be revived\n\t\tfmt.Println(enemy.name, \"could not be revived as they are not dead!\")\n\t}\n}", "title": "" }, { "docid": "0f527b8c3633fdb89d500076329d850b", "score": "0.47976086", "text": "func (w *board) transfer(pth []cell) {\r\n\t//oCost := w.getCost() // Original cost\r\n\ttour := pth\r\n\tsmallestqnty := 1000\r\n\tfmt.Println(\"error here\")\r\n\tfor j := 0; j < len(tour); j++ {\r\n\t\tif (w.matrix[tour[j].row][tour[j].column].quantity > 0) && (w.matrix[tour[j].row][tour[j].column].quantity < smallestqnty) {\r\n\t\t\tsmallestqnty = w.matrix[tour[j].row][tour[j].column].quantity\r\n\t\t}\r\n\t}\r\n\tfor z := 0; z < smallestqnty; z++ {\r\n\t\tfor i := 0; i < len(tour); i++ {\r\n\t\t\tif i%2 == 0 {\r\n\t\t\t\tw.matrix[tour[i].row][tour[i].column].quantity++\r\n\t\t\t} else {\r\n\t\t\t\tw.matrix[tour[i].row][tour[i].column].quantity--\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n}", "title": "" }, { "docid": "0c4d3081b75cd8828bb9f7eabe9c4373", "score": "0.47939453", "text": "func dealToWaste(stacks []solitaire.Pile, deck *generic.Deck, pass int) int {\n\tif len(stacks[7].Cards) > 0 {\n\t\tstacks[7].Cards[stacks[7].Firstfaceup].Turn()\n\t}\n\tif deck.AllDealt {\n\t\tdeck.Cards = deck.Cards[:0]\n\t\tdeck.Cards = append(deck.Cards, stacks[7].Cards...)\n\t\tdeck.LastDealt = 0\n\t\tdeck.AllDealt = false\n\t\tstacks[7].Cards = stacks[7].Cards[:0]\n\t\tpass++\n\t}\n\tstacks[7].Cards = append(stacks[7].Cards, deck.Deal(3, 1)...)\n\tstacks[7].Firstfaceup = len(stacks[7].Cards) - 1\n\treturn pass\n}", "title": "" }, { "docid": "6e42b9d4abda18632fbbb467838c86e4", "score": "0.4792408", "text": "func (q *bodyQueue) unreserve(peer string) int {\n\tfails := q.queue.ExpireBodies(peer)\n\tif fails > 2 {\n\t\tlog.Debug(\"Body delivery timed out\", \"peer\", peer)\n\t} else {\n\t\tlog.Debug(\"Body delivery stalling\", \"peer\", peer)\n\t}\n\treturn fails\n}", "title": "" }, { "docid": "9e9c4ebddc22bb342128cdcc0564ff6a", "score": "0.47919226", "text": "func lostLife(ps *PlayerSystem) {\n\t// remove life\n\tit := ps.EntityManager.IterAvailable(-1)\n\tvar lifeIds [3]uint16\n\tvar count int\n\tfor obj, entIndex := it(); entIndex != -1; obj, entIndex = it() {\n\t\tif obj.GetType() == \"life\" {\n\t\t\tlifeIds[count] = obj.GetID()\n\t\t\tcount++\n\t\t}\n\t}\n\tps.EntityManager.Delete(lifeIds[0])\n\t// add lost life image\n\tobj := ps.EntityManager.Create(\"lifeless\")\n\tsprite, _ := ps.sprites[\"lifeless\"]\n\tx := 620 + ps.lifes*40\n\tobj.AddComponent(&sprite)\n\tobj.AddComponent(&entity.PositionComponent{Pos: &sdl.Point{int32(x), 10}})\n}", "title": "" }, { "docid": "09b52c631b6517289360eef991ad0c79", "score": "0.47877282", "text": "func (w *board) steppingStone() {\r\n\tvar emptyCell cell\r\n\tleastExpensive := 0\r\n\tvar tour, finaltour []cell\r\n\tvar mrgCost int\r\n\t//transferP := make(chan []cell)\r\n\tfor x := 0; x < len(w.supply); x++ {\r\n\t\tfor y := 0; y < len(w.demand); y++ {\r\n\t\t\tif w.matrix[x][y].quantity == 0 { // Looking for an empty cell\r\n\t\t\t\temptyCell = w.matrix[x][y]\r\n\t\t\t\ttour, mrgCost = w.getClosedPath(emptyCell)\r\n\t\t\t\tif mrgCost < leastExpensive {\r\n\t\t\t\t\tfinaltour = tour\r\n\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\t//fmt.Println(finaltour)\r\n\t//fmt.Println(\"error here\")\r\n\t//transferP <- finaltour\r\n\tw.transfer(finaltour)\r\n\r\n}", "title": "" }, { "docid": "a820a9d4204ac93e4ee2cd0c556cdc4f", "score": "0.4784797", "text": "func (lt *Table) HandoverIndexesToShipper(force bool) error {\n\tindexesHandedOverToShipper, err := lt.handoverIndexesToShipper(force)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlt.dbsMtx.Lock()\n\tdefer lt.dbsMtx.Unlock()\n\n\tfor _, name := range indexesHandedOverToShipper {\n\t\tdelete(lt.dbs, name)\n\t\tif err := lt.removeSnapshotDB(name); err != nil {\n\t\t\tlevel.Error(util_log.Logger).Log(\"msg\", fmt.Sprintf(\"failed to remove snapshot db %s\", name))\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f79ad2865feaa4a636e050c53f3bd983", "score": "0.4783584", "text": "func (game *Game) gameOver() {\n\tgame.alive = false // Boolean that says if the main snake is still alive\n\tgame.hud.game.crashCount = 0\n}", "title": "" }, { "docid": "7cebfd88cdf978f9e00406a0e5266806", "score": "0.47793442", "text": "func (kv *ShardKV) kill() {\n kv.dead = true\n kv.l.Close()\n kv.px.Kill()\n}", "title": "" }, { "docid": "f628149dac20401c83109b864fe173f6", "score": "0.47791535", "text": "func (b Board) addShip(s *Ship) (added bool) {\n\tif validateShipCoordinates(s) {\n\t\tif s.First.X == s.Last.X {\n\t\t\t//check if it`s any ship on top\n\t\t\tif s.First.Y != 0 && b[s.First.Y-1][s.First.X] == ShipPresent {\n\t\t\t\treturn false\n\t\t\t}\n\t\t\t//check if it's any ship on bottom\n\t\t\tif s.Last.Y != 9 && b[s.Last.Y+1][s.Last.X] == ShipPresent {\n\t\t\t\treturn false\n\t\t\t}\n\n\t\t\tfor i := s.First.Y; i <= s.Last.Y; i++ {\n\t\t\t\tif s.First.X != 0 && b[i][s.First.X-1] == ShipPresent {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t\tif s.First.X != 9 && b[i][s.First.X+1] == ShipPresent {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t\tif b[i][s.First.X] == ShipPresent {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t\tb[i][s.First.X] = ShipPresent\n\n\t\t\t}\n\t\t\treturn true\n\t\t} else {\n\t\t\t//LEFT\n\t\t\tif s.First.X != 0 && b[s.First.Y][s.First.X-1] == ShipPresent {\n\t\t\t\treturn false\n\t\t\t}\n\t\t\t//RIGHT\n\t\t\tif s.Last.X != 9 && b[s.Last.Y][s.Last.X+1] == ShipPresent {\n\t\t\t\treturn false\n\t\t\t}\n\n\t\t\tfor i := s.First.X; i <= s.Last.X; i++ {\n\t\t\t\tif s.First.Y != 0 && b[s.First.Y-1][i] == ShipPresent {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t\tif s.First.Y != 9 && b[s.First.Y+1][i] == ShipPresent {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t\tif b[s.First.Y][i] == ShipPresent {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t\tb[s.First.Y][i] = ShipPresent\n\t\t\t}\n\t\t\treturn true\n\n\t\t}\n\t} else {\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "80adee4d4a6ffbd40310ed55f80bee1c", "score": "0.47774097", "text": "func (b *Board) clearOriginSquare(m Move) {\n\tif b.IsWhiteMove {\n\t\tb.WhitePieces = b.WhitePieces &^ m.getOriginSquare()\n\t} else {\n\t\tb.BlackPieces = b.BlackPieces &^ m.getOriginSquare()\n\t}\n\n\tswitch m.getOriginOccupancy() {\n\tcase whitePawn:\n\t\tb.Pawns = b.Pawns &^ m.getOriginSquare()\n\tcase whiteKnight:\n\t\tb.Knights = b.Knights &^ m.getOriginSquare()\n\tcase whiteBishop:\n\t\tb.Bishops = b.Bishops &^ m.getOriginSquare()\n\tcase whiteRook:\n\t\tb.Rooks = b.Rooks &^ m.getOriginSquare()\n\tcase whiteQueen:\n\t\tb.Queens = b.Queens &^ m.getOriginSquare()\n\tcase whiteKing:\n\t\tb.Kings = b.Kings &^ m.getOriginSquare()\n\n\tcase blackPawn:\n\t\tb.Pawns = b.Pawns &^ m.getOriginSquare()\n\tcase blackKnight:\n\t\tb.Knights = b.Knights &^ m.getOriginSquare()\n\tcase blackBishop:\n\t\tb.Bishops = b.Bishops &^ m.getOriginSquare()\n\tcase blackRook:\n\t\tb.Rooks = b.Rooks &^ m.getOriginSquare()\n\tcase blackQueen:\n\t\tb.Queens = b.Queens &^ m.getOriginSquare()\n\tcase blackKing:\n\t\tb.Kings = b.Kings &^ m.getOriginSquare()\n\tdefault:\n\t\tpanic(fmt.Sprintf(\"m.getOriginOccupancy() returned: %v\", m.getOriginOccupancy()))\n\t}\n}", "title": "" }, { "docid": "44ba501951b2fe0730ae937dea5309b5", "score": "0.47661367", "text": "func (w *window) Fail() {\n\tw.Lock()\n\tb := w.latestBucket()\n\tw.conseErr++\n\tw.Unlock()\n\tb.Fail()\n}", "title": "" }, { "docid": "14cc6cdc8a26a5aa97efa386bb6666a9", "score": "0.47646436", "text": "func (g *Game) Crashed() {\n\tg.crashed = true\n}", "title": "" }, { "docid": "15a665248284f1b144ea2580897fae7e", "score": "0.47639838", "text": "func (g *Game) ForceToPayoutStateSafe() error {\n\tg.gameLock.Lock()\n\te := g.ForceToPayoutState()\n\tg.gameLock.Unlock()\n\treturn e\n}", "title": "" }, { "docid": "71292ac0b63282dcfc3780624bfc13dc", "score": "0.47632912", "text": "func shbad(runes []rune, ix int) bool {\n\tif ix < 0 {\n\t\treturn true\n\t}\n\n\tif ix >= len(runes) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "3b3949c82ae441e739ee1d1c0a68fc3f", "score": "0.47632155", "text": "func easterFlank(x1, y, x2 int, baseShift Point) (int, int, int, Point) {\n\n\tif y < 0 {\n\t\tbaseShift.x += x1 // move base to start the right flank\n\t\tx1, x2 = x2, x1\n\t}\n\treturn x1, y, x2, baseShift\n}", "title": "" }, { "docid": "36c1a608cd28046f1a1744e7b0b6f953", "score": "0.4759726", "text": "func (bm *BulletManager) Shoot(playerPos pixel.Vec, playHeight float64) {\n\tif time.Now().Before(bm.nextShotTime) {\n\t\treturn\n\t}\n\n\tif bm.currentBullet >= MAX_BULLETS-1 {\n\t\tbm.currentBullet = -1\n\t}\n\n\tif bm.bullets[bm.currentBullet+1].IsAlive() {\n\t\treturn\n\t}\n\n\tbm.currentBullet++\n\n\tbm.bullets[bm.currentBullet].Reset(playerPos, playHeight)\n\tbm.bullets[bm.currentBullet].Resurrect()\n\n\tbm.nextShotTime = time.Now().Add(SHOOT_DELAY)\n}", "title": "" }, { "docid": "d6a72481c4e84b8cb79d42d9fe83b5b4", "score": "0.47571355", "text": "func (s *SOMASServer) deductCostOfLiving(costOfLiving shared.Resources) {\n\ts.logf(\"start deductCostOfLiving\")\n\tdefer s.logf(\"finish deductCostOfLiving\")\n\n\tnonDeadClients := getNonDeadClientIDs(s.gameState.ClientInfos)\n\tfor _, id := range nonDeadClients {\n\t\tci := s.gameState.ClientInfos[id]\n\t\tif ci.Resources < costOfLiving {\n\t\t\tci.Resources = 0\n\t\t} else {\n\t\t\tci.Resources -= costOfLiving\n\t\t}\n\t\ts.gameState.ClientInfos[id] = ci\n\t}\n}", "title": "" }, { "docid": "275710cf727aa7ec4cb46f44005458a0", "score": "0.4748696", "text": "func crash(repair_vehicle_unit repair_vehicle, trains []train, system [][]railway, rail_switches []rail_switch) {\n for {\n time.Sleep(time.Millisecond * time.Duration(360000/TIME_RATE))\n\n if rand.Float32() < CRASH_RATE && !crash_active {\n choice := rand.Intn(3)\n switch choice {\n case 0: //crash railway\n v1 := rand.Intn(len(system))\n v2 := rand.Intn(len(system))\n for system[v1][v2].is_free == nil{\n v1 = rand.Intn(len(system))\n v2 = rand.Intn(len(system))\n }\n logs(nil, \"Railway crashed \", strconv.Itoa(v1),\"====\", strconv.Itoa(v2))\n crash_active = true\n //dont allow to use railway by other trains\n <-system[v1][v2].is_free\n //send information to repair vehicle about crashed railway\n repair_vehicle_unit.railway_crash <- v1\n repair_vehicle_unit.railway_crash <- v2\n\n case 1: //crash train\n indx := rand.Intn(len(trains))\n trains[indx].broken = true\n crash_active = true\n logs(nil, \"Train\",trains[indx].name,\"has crashed\")\n repair_vehicle_unit.train_crash <- indx\n\n case 2: //crash switch\n indx := rand.Intn(len(rail_switches))\n crash_active = true\n logs(nil, \"Railswitch crashed at vertex\", strconv.Itoa(rail_switches[indx].vertex_index))\n //dont allow to use rail switch by other trains\n <- rail_switches[indx].is_free \n repair_vehicle_unit.rail_switch_crash <- rail_switches[indx].vertex_index\n } \n }\n }\n}", "title": "" }, { "docid": "ad60cc11c130673e99429aaceb146bb8", "score": "0.47421953", "text": "func hcrash() {\n\tif Flag.LowerH != 0 {\n\t\tFlushErrors()\n\t\tif Flag.LowerO != \"\" {\n\t\t\tos.Remove(Flag.LowerO)\n\t\t}\n\t\tpanic(\"-h\")\n\t}\n}", "title": "" }, { "docid": "f58a7750f63e6763567ed0af79f75bdd", "score": "0.4741921", "text": "func (pos *Position) gc(id int, catastrophe bool) {\n\tstar := &pos.stars[id]\n\tif catastrophe {\n\t\t// check for catastrophe\n\t\tpieces := star.pieces\n\t\tpieces.add(star.ships[0])\n\t\tpieces.add(star.ships[1])\n\t\tvar mask uint32\n\t\tfor c := Color(0); c < Color(4); c++ {\n\t\t\tif pieces.ColorCount(c) >= 4 {\n\t\t\t\tmask |= uint32(63) << (c * 6)\n\t\t\t}\n\t\t}\n\t\tif mask != 0 {\n\t\t\t// XXX ugly\n\t\t\t// delete affected star pieces\n\t\t\tpos.bank.bits += star.pieces.bits & mask\n\t\t\tstar.pieces.bits &^= mask\n\t\t\tif star.pieces.IsEmpty() {\n\t\t\t\tpos.bank.add(star.ships[North])\n\t\t\t\tpos.bank.add(star.ships[South])\n\t\t\t\tstar.ships[0].bits = 0\n\t\t\t\tstar.ships[1].bits = 0\n\t\t\t\tgoto delete\n\t\t\t}\n\t\t\t// delete affected ships\n\t\t\tpos.bank.bits += star.ships[0].bits & mask\n\t\t\tpos.bank.bits += star.ships[1].bits & mask\n\t\t\tstar.ships[0].bits &^= mask\n\t\t\tstar.ships[1].bits &^= mask\n\t\t}\n\t}\n\n\t// delete if empty\n\tif star.ships[North].IsEmpty() && star.ships[South].IsEmpty() {\n\t\tgoto delete\n\t}\n\treturn\n\ndelete:\n\tif id >= 2 {\n\t\tpos.bank.add(star.pieces)\n\t\tpos.stars = append(pos.stars[:id], pos.stars[id+1:]...)\n\t}\n}", "title": "" }, { "docid": "c622c9de714c6dc04cd680ea85ab520b", "score": "0.47408605", "text": "func StraightShrinky(ar *Reservoir, fs Fusion) (chosen *Amorph, baseShift Point) {\n\n\t// pfTmp := intermedPf(pf)\n\t// defer func() { pf = pfTmp }()\n\n\tvar x1, y, x2 = fs.xyx[0], fs.xyx[1], fs.xyx[2]\n\tx1, y, x2, baseShift = easterFlank(x1, y, x2, baseShift)\n\n\tif x1 > wideGapCap*ar.SmallestDesirableWidth {\n\t\tx1 = wideGapMin * ar.SmallestDesirableWidth // worsens results\n\t\tx1 = ar.SmallestDesirableWidth // testing yields: best fallback\n\t}\n\n\tif x1 >= wideGapMin*ar.SmallestDesirableWidth {\n\n\t\tpf(\"gap%v wider than%v => StraightShrinky \", x1, wideGapMin*ar.SmallestDesirableWidth)\n\n\t\t// leave at least SmallestDesirableWidth for further fill\n\t\t// stop at SmallestDesirableWidth\n\t\t// x-SDW ... SDW\n\t\tshrinkStart := x1 - ar.SmallestDesirableWidth\n\t\tfor i := shrinkStart; i >= ar.SmallestDesirableWidth; i-- {\n\t\t\tpf(\"srch%v \", i)\n\t\t\t_, chosen = exactStraightEdge(ar, fs, i)\n\t\t\tif chosen != nil {\n\t\t\t\t// pf(\" found %v\", chosen)\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tpf(\"\\n\")\n\t\treturn chosen, baseShift\n\t} else {\n\t\tpf(\"gap%v narrower than%v => no StraightShrinky\\n\", x1, wideGapMin*ar.SmallestDesirableWidth)\n\t\treturn\n\t}\n\n}", "title": "" }, { "docid": "cc7643fdd3caa0eea3e42ccf6a36bcb5", "score": "0.47347647", "text": "func shrinkstack(gp *g) {\n\tif gp.stack.lo == 0 {\n\t\tthrow(\"missing stack in shrinkstack\")\n\t}\n\tif s := readgstatus(gp); s&_Gscan == 0 {\n\t\t// We don't own the stack via _Gscan. We could still\n\t\t// own it if this is our own user G and we're on the\n\t\t// system stack.\n\t\tif !(gp == getg().m.curg && getg() != getg().m.curg && s == _Grunning) {\n\t\t\t// We don't own the stack.\n\t\t\tthrow(\"bad status in shrinkstack\")\n\t\t}\n\t}\n\tif !isShrinkStackSafe(gp) {\n\t\tthrow(\"shrinkstack at bad time\")\n\t}\n\t// Check for self-shrinks while in a libcall. These may have\n\t// pointers into the stack disguised as uintptrs, but these\n\t// code paths should all be nosplit.\n\tif gp == getg().m.curg && gp.m.libcallsp != 0 {\n\t\tthrow(\"shrinking stack in libcall\")\n\t}\n\n\tif debug.gcshrinkstackoff > 0 {\n\t\treturn\n\t}\n\tf := findfunc(gp.startpc)\n\tif f.valid() && f.funcID == funcID_gcBgMarkWorker {\n\t\t// We're not allowed to shrink the gcBgMarkWorker\n\t\t// stack (see gcBgMarkWorker for explanation).\n\t\treturn\n\t}\n\n\toldsize := gp.stack.hi - gp.stack.lo\n\tnewsize := oldsize / 2\n\t// Don't shrink the allocation below the minimum-sized stack\n\t// allocation.\n\tif newsize < _FixedStack {\n\t\treturn\n\t}\n\t// Compute how much of the stack is currently in use and only\n\t// shrink the stack if gp is using less than a quarter of its\n\t// current stack. The currently used stack includes everything\n\t// down to the SP plus the stack guard space that ensures\n\t// there's room for nosplit functions.\n\tavail := gp.stack.hi - gp.stack.lo\n\tif used := gp.stack.hi - gp.sched.sp + _StackLimit; used >= avail/4 {\n\t\treturn\n\t}\n\n\tif stackDebug > 0 {\n\t\tprint(\"shrinking stack \", oldsize, \"->\", newsize, \"\\n\")\n\t}\n\n\tcopystack(gp, newsize)\n}", "title": "" }, { "docid": "e5683c2bf0b0d476abfbe659fe6b7cfb", "score": "0.4727239", "text": "func (sm *ShardMaster) Kill() {\n sm.dead = true\n sm.l.Close()\n sm.px.Kill()\n}", "title": "" }, { "docid": "e5683c2bf0b0d476abfbe659fe6b7cfb", "score": "0.4727239", "text": "func (sm *ShardMaster) Kill() {\n sm.dead = true\n sm.l.Close()\n sm.px.Kill()\n}", "title": "" }, { "docid": "e5683c2bf0b0d476abfbe659fe6b7cfb", "score": "0.4727239", "text": "func (sm *ShardMaster) Kill() {\n sm.dead = true\n sm.l.Close()\n sm.px.Kill()\n}", "title": "" }, { "docid": "e5683c2bf0b0d476abfbe659fe6b7cfb", "score": "0.4727239", "text": "func (sm *ShardMaster) Kill() {\n sm.dead = true\n sm.l.Close()\n sm.px.Kill()\n}", "title": "" } ]
68f7589bf10991a0b2dfa25b47cc982b
VPCMPUB: Compare Packed Unsigned Byte Values. Forms: VPCMPUB imm8 m128 xmm k k VPCMPUB imm8 m128 xmm k VPCMPUB imm8 m256 ymm k k VPCMPUB imm8 m256 ymm k VPCMPUB imm8 xmm xmm k k VPCMPUB imm8 xmm xmm k VPCMPUB imm8 ymm ymm k k VPCMPUB imm8 ymm ymm k VPCMPUB imm8 m512 zmm k k VPCMPUB imm8 m512 zmm k VPCMPUB imm8 zmm zmm k k VPCMPUB imm8 zmm zmm k Construct and append a VPCMPUB instruction to the active function. Operates on the global context.
[ { "docid": "c49de804cac64df488bc710ad1d91da7", "score": "0.7477675", "text": "func VPCMPUB(ops ...operand.Op) { ctx.VPCMPUB(ops...) }", "title": "" } ]
[ { "docid": "3da0444010ac2f451a51f73845d6076e", "score": "0.7720833", "text": "func (c *Context) VPCMPUB(ops ...operand.Op) {\n\tc.addinstruction(x86.VPCMPUB(ops...))\n}", "title": "" }, { "docid": "bef2d0e7c5672c234c7236b569fda195", "score": "0.6370759", "text": "func (c *Context) VPMAXUB(ops ...operand.Op) {\n\tc.addinstruction(x86.VPMAXUB(ops...))\n}", "title": "" }, { "docid": "ffa5129e2fb73f0a54ac909ee34da7ad", "score": "0.63564724", "text": "func (c *Context) VPMINUB(ops ...operand.Op) {\n\tc.addinstruction(x86.VPMINUB(ops...))\n}", "title": "" }, { "docid": "49f4b4a46587456b8bb6ed6c82ed18cd", "score": "0.62576437", "text": "func (c *Context) VPCMPUD(ops ...operand.Op) {\n\tc.addinstruction(x86.VPCMPUD(ops...))\n}", "title": "" }, { "docid": "0857d81e488ee5dfef1054f472576a43", "score": "0.6190985", "text": "func VPMINUB(ops ...operand.Op) { ctx.VPMINUB(ops...) }", "title": "" }, { "docid": "4735a64a4a1b508fe737db5f784079cb", "score": "0.60776466", "text": "func VPSUBB_Z(mxyz, xyz, k, xyz1 operand.Op) { ctx.VPSUBB_Z(mxyz, xyz, k, xyz1) }", "title": "" }, { "docid": "3094c3c14cdd348e493105ebad02271c", "score": "0.60230464", "text": "func (c *Context) VPSUBB_Z(mxyz, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPSUBB_Z(mxyz, xyz, k, xyz1))\n}", "title": "" }, { "docid": "cd5c13e27a7ef4029d25cd71a66fda6f", "score": "0.60176176", "text": "func VPCMPUD(ops ...operand.Op) { ctx.VPCMPUD(ops...) }", "title": "" }, { "docid": "d451513da6bf482b98cfc63450585b26", "score": "0.6002485", "text": "func VPMAXUB(ops ...operand.Op) { ctx.VPMAXUB(ops...) }", "title": "" }, { "docid": "88c14573cce0ef9ff751649cb474e03e", "score": "0.59697694", "text": "func (c *Context) VPMAXUB_Z(mxyz, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPMAXUB_Z(mxyz, xyz, k, xyz1))\n}", "title": "" }, { "docid": "283ace25ecc6cff7ddf5247bfce84a9a", "score": "0.5963629", "text": "func (c *Context) VPMINUB_Z(mxyz, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPMINUB_Z(mxyz, xyz, k, xyz1))\n}", "title": "" }, { "docid": "010a611b560d464214fd5b61a0e568b7", "score": "0.5907737", "text": "func (c *Context) VPCMPUD_BCST(ops ...operand.Op) {\n\tc.addinstruction(x86.VPCMPUD_BCST(ops...))\n}", "title": "" }, { "docid": "524f077034fd196c56c41abc9671ac38", "score": "0.58910763", "text": "func VPCMPB(ops ...operand.Op) { ctx.VPCMPB(ops...) }", "title": "" }, { "docid": "1c79885f12c552836fa45ad3f5016392", "score": "0.58715934", "text": "func PMAXUWm128byte(X1 []byte, X2 []byte)", "title": "" }, { "docid": "1f937f5762ad5956a47436202bb4170c", "score": "0.5840435", "text": "func VPMAXUB_Z(mxyz, xyz, k, xyz1 operand.Op) { ctx.VPMAXUB_Z(mxyz, xyz, k, xyz1) }", "title": "" }, { "docid": "22ecc5b4fcd5cb5b1549db86622a7599", "score": "0.5809745", "text": "func VPMINUB_Z(mxyz, xyz, k, xyz1 operand.Op) { ctx.VPMINUB_Z(mxyz, xyz, k, xyz1) }", "title": "" }, { "docid": "395fd73962cba7cf91835a90817161aa", "score": "0.57682055", "text": "func VPSUBB(ops ...operand.Op) { ctx.VPSUBB(ops...) }", "title": "" }, { "docid": "b95ea335ff8809fb3c721248fd1a51c8", "score": "0.5760944", "text": "func (c *Context) VPCMPB(ops ...operand.Op) {\n\tc.addinstruction(x86.VPCMPB(ops...))\n}", "title": "" }, { "docid": "61b28c6db647e57bdcbbf7b99da4be0d", "score": "0.5735032", "text": "func VCMPPD(ops ...operand.Op) { ctx.VCMPPD(ops...) }", "title": "" }, { "docid": "03cc314af4feb1ab49752fb119e50b78", "score": "0.5709832", "text": "func (c *Context) VPSUBUSW_Z(mxyz, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPSUBUSW_Z(mxyz, xyz, k, xyz1))\n}", "title": "" }, { "docid": "ec9ce7112c623760f3c64a3cf5fb5a3c", "score": "0.5688128", "text": "func VPSUBUSW_Z(mxyz, xyz, k, xyz1 operand.Op) { ctx.VPSUBUSW_Z(mxyz, xyz, k, xyz1) }", "title": "" }, { "docid": "5c72428496d2e3b33dd037c4a43d7f10", "score": "0.56842047", "text": "func (c *Context) VPSUBQ_Z(mxyz, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPSUBQ_Z(mxyz, xyz, k, xyz1))\n}", "title": "" }, { "docid": "c0cfdfa8b2376a2ae476b19972e9a7e3", "score": "0.56655276", "text": "func PMAXUDm128byte(X1 []byte, X2 []byte)", "title": "" }, { "docid": "4865d45c3410186428ed5a118f640b9e", "score": "0.5659371", "text": "func VPSUBQ_BCST_Z(m, xyz, k, xyz1 operand.Op) { ctx.VPSUBQ_BCST_Z(m, xyz, k, xyz1) }", "title": "" }, { "docid": "444e9320fd4c4740ffe9bc0c47cfaf3d", "score": "0.5652296", "text": "func VPSUBQ_Z(mxyz, xyz, k, xyz1 operand.Op) { ctx.VPSUBQ_Z(mxyz, xyz, k, xyz1) }", "title": "" }, { "docid": "42b99ed3439da0d009c1c977174bf74f", "score": "0.5643216", "text": "func VPSUBW_Z(mxyz, xyz, k, xyz1 operand.Op) { ctx.VPSUBW_Z(mxyz, xyz, k, xyz1) }", "title": "" }, { "docid": "3a6f2f8c205bbca414c0d3402fd9adf3", "score": "0.564298", "text": "func (c *Context) VPMULUDQ_BCST(ops ...operand.Op) {\n\tc.addinstruction(x86.VPMULUDQ_BCST(ops...))\n}", "title": "" }, { "docid": "18dbd4ac1f689fae5be42d200ec75e72", "score": "0.5547375", "text": "func (c *Context) VPSUBW_Z(mxyz, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPSUBW_Z(mxyz, xyz, k, xyz1))\n}", "title": "" }, { "docid": "0e828d8b96010e1441425f8ecb4366cb", "score": "0.5535087", "text": "func (c *Context) VPMAXUQ_Z(mxyz, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPMAXUQ_Z(mxyz, xyz, k, xyz1))\n}", "title": "" }, { "docid": "09a62b175c897215c808d9d41d7b7e6f", "score": "0.5530796", "text": "func VFNMSUB231PD(ops ...operand.Op) { ctx.VFNMSUB231PD(ops...) }", "title": "" }, { "docid": "b81e6ee12a40f0bea6ce7ab2c2fb1bf3", "score": "0.55305994", "text": "func PCMPGTB(mx, x operand.Op) { ctx.PCMPGTB(mx, x) }", "title": "" }, { "docid": "6dc21749aad2b098f438e919fb206c02", "score": "0.5520788", "text": "func (c *Context) VFNMSUB231PS(ops ...operand.Op) {\n\tc.addinstruction(x86.VFNMSUB231PS(ops...))\n}", "title": "" }, { "docid": "1d4937543dfb4dec4bda2fec8bdb9db0", "score": "0.55194527", "text": "func VPCMPUD_BCST(ops ...operand.Op) { ctx.VPCMPUD_BCST(ops...) }", "title": "" }, { "docid": "df79d4ca5700fb197a803805ff056080", "score": "0.55161124", "text": "func (c *Context) VPSUBQ(ops ...operand.Op) {\n\tc.addinstruction(x86.VPSUBQ(ops...))\n}", "title": "" }, { "docid": "86fe7c8d478c39c42afe0fcfc305cba1", "score": "0.5510632", "text": "func (c *Context) VPMULUDQ_BCST_Z(m, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPMULUDQ_BCST_Z(m, xyz, k, xyz1))\n}", "title": "" }, { "docid": "3210c7ec807db08ed2303aa074f12105", "score": "0.55044377", "text": "func (c *Context) VFNMSUB231PD(ops ...operand.Op) {\n\tc.addinstruction(x86.VFNMSUB231PD(ops...))\n}", "title": "" }, { "docid": "b7b4aa72c2b3facbe44cf18502067a04", "score": "0.54923576", "text": "func VPOPCNTB(ops ...operand.Op) { ctx.VPOPCNTB(ops...) }", "title": "" }, { "docid": "be4247de71b7d447d127c6ef60950e6f", "score": "0.54847443", "text": "func VCMPPS(ops ...operand.Op) { ctx.VCMPPS(ops...) }", "title": "" }, { "docid": "8a9de6c77bb6ee0e839e3ad98f52655a", "score": "0.5482763", "text": "func (c *Context) VPTESTMB(ops ...operand.Op) {\n\tc.addinstruction(x86.VPTESTMB(ops...))\n}", "title": "" }, { "docid": "a48f8d66dbba90cbd247e1957ad48ab6", "score": "0.5481292", "text": "func (c *Context) PMAXUB(mx, x operand.Op) {\n\tc.addinstruction(x86.PMAXUB(mx, x))\n}", "title": "" }, { "docid": "cacb23fe245b5c731fd5222fc165329d", "score": "0.5454438", "text": "func VFNMSUB231PS(ops ...operand.Op) { ctx.VFNMSUB231PS(ops...) }", "title": "" }, { "docid": "eeb8699d348ac01089608532792a4994", "score": "0.5454293", "text": "func (c *Context) VPSUBQ_BCST_Z(m, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPSUBQ_BCST_Z(m, xyz, k, xyz1))\n}", "title": "" }, { "docid": "3428af93221d605e30b5cfea3b04bf8f", "score": "0.54538554", "text": "func VPSUBD_BCST_Z(m, xyz, k, xyz1 operand.Op) { ctx.VPSUBD_BCST_Z(m, xyz, k, xyz1) }", "title": "" }, { "docid": "d39142273c7536f64884dfc624759d8d", "score": "0.5446597", "text": "func VPSUBSB_Z(mxyz, xyz, k, xyz1 operand.Op) { ctx.VPSUBSB_Z(mxyz, xyz, k, xyz1) }", "title": "" }, { "docid": "c7114525153acf3e2e411e9f1f81689c", "score": "0.5444825", "text": "func PSUBB(mx, x operand.Op) { ctx.PSUBB(mx, x) }", "title": "" }, { "docid": "99df82157071fde43922b80e3acb44b3", "score": "0.54444903", "text": "func VPSUBD_Z(mxyz, xyz, k, xyz1 operand.Op) { ctx.VPSUBD_Z(mxyz, xyz, k, xyz1) }", "title": "" }, { "docid": "cd5fc84b59c4d6e6f4c2a9f5d42fdc02", "score": "0.54353905", "text": "func VPSHUFBITQMB(ops ...operand.Op) { ctx.VPSHUFBITQMB(ops...) }", "title": "" }, { "docid": "7b2fcdd4d9b5cbb1b63d254bf2d491df", "score": "0.5431032", "text": "func (c *Context) VFIXUPIMMPD_BCST(ops ...operand.Op) {\n\tc.addinstruction(x86.VFIXUPIMMPD_BCST(ops...))\n}", "title": "" }, { "docid": "0a814713b6796dcf23da36846b02f338", "score": "0.5427985", "text": "func (c *Context) VPSHUFBITQMB(ops ...operand.Op) {\n\tc.addinstruction(x86.VPSHUFBITQMB(ops...))\n}", "title": "" }, { "docid": "9d7389c63ad800c87bfec209e1cb89d5", "score": "0.54276204", "text": "func PMADDUBSW(mx, x operand.Op) { ctx.PMADDUBSW(mx, x) }", "title": "" }, { "docid": "728b71c070b9101d2e9bfb569fc999c1", "score": "0.5409122", "text": "func PTESTm128byte(X1 []byte, X2 []byte)", "title": "" }, { "docid": "a5e3a8994826819a68692f8097f119cf", "score": "0.54040104", "text": "func VFIXUPIMMPD(ops ...operand.Op) { ctx.VFIXUPIMMPD(ops...) }", "title": "" }, { "docid": "7370cea8ba2b961d5f0ca1ae816e9caf", "score": "0.5388168", "text": "func (c *Context) VPSUBB(ops ...operand.Op) {\n\tc.addinstruction(x86.VPSUBB(ops...))\n}", "title": "" }, { "docid": "a83b495ba8295e5c2a4a06cea28cafea", "score": "0.53880805", "text": "func (c *Context) VFIXUPIMMPD(ops ...operand.Op) {\n\tc.addinstruction(x86.VFIXUPIMMPD(ops...))\n}", "title": "" }, { "docid": "5fb5430c6df8a86dc4a830b97de19832", "score": "0.53848654", "text": "func VPCMPGTB(ops ...operand.Op) { ctx.VPCMPGTB(ops...) }", "title": "" }, { "docid": "8356c9f4adab4e76bc66a0d490dad023", "score": "0.53818303", "text": "func VCMPPD_BCST(ops ...operand.Op) { ctx.VCMPPD_BCST(ops...) }", "title": "" }, { "docid": "11ae8b011c02752a668a739dffa26a95", "score": "0.53801006", "text": "func (c *Context) VPMINUD_BCST_Z(m, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPMINUD_BCST_Z(m, xyz, k, xyz1))\n}", "title": "" }, { "docid": "fc836d012fe6105f32c71ab0900273b8", "score": "0.5370711", "text": "func (c *Context) VPMAXUQ_BCST_Z(m, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPMAXUQ_BCST_Z(m, xyz, k, xyz1))\n}", "title": "" }, { "docid": "542186e326a9c800aef1f2fde304cccc", "score": "0.5368467", "text": "func (c *Context) VPMULUDQ(ops ...operand.Op) {\n\tc.addinstruction(x86.VPMULUDQ(ops...))\n}", "title": "" }, { "docid": "7dbd5b4bad780512a3c74675ec65ff0e", "score": "0.5360427", "text": "func (c *Context) VPCMPGTB(ops ...operand.Op) {\n\tc.addinstruction(x86.VPCMPGTB(ops...))\n}", "title": "" }, { "docid": "9d480d49eacd55278cbbfb4f75b4318a", "score": "0.53595525", "text": "func (c *Context) VPSUBUSB_Z(mxyz, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPSUBUSB_Z(mxyz, xyz, k, xyz1))\n}", "title": "" }, { "docid": "6095a2795c45a7efef68fe71a16ff5f3", "score": "0.53538996", "text": "func (c *Context) VCVTUDQ2PS_BCST_Z(m, k, xyz operand.Op) {\n\tc.addinstruction(x86.VCVTUDQ2PS_BCST_Z(m, k, xyz))\n}", "title": "" }, { "docid": "6300f87050e9a5b1de1ddb0fdbe077e8", "score": "0.5350337", "text": "func VPOPCNTQ_BCST(ops ...operand.Op) { ctx.VPOPCNTQ_BCST(ops...) }", "title": "" }, { "docid": "506ebb2ca48777e25b01e570c7ce2eaa", "score": "0.534986", "text": "func (c *Context) VPMAXUQ_BCST(ops ...operand.Op) {\n\tc.addinstruction(x86.VPMAXUQ_BCST(ops...))\n}", "title": "" }, { "docid": "03f9e27f9489be9a49b1b68fc7cc4274", "score": "0.53494", "text": "func VPSUBQ_BCST(ops ...operand.Op) { ctx.VPSUBQ_BCST(ops...) }", "title": "" }, { "docid": "31cec9c1140bb20efac39e503ea43803", "score": "0.5345981", "text": "func (c *Context) VPSUBSB_Z(mxyz, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPSUBSB_Z(mxyz, xyz, k, xyz1))\n}", "title": "" }, { "docid": "40562d7ded151ab53564a631e8ed0319", "score": "0.53442293", "text": "func (c *Context) PMINUB(mx, x operand.Op) {\n\tc.addinstruction(x86.PMINUB(mx, x))\n}", "title": "" }, { "docid": "5f69fc7fa107651dcc97605f0763f394", "score": "0.5340568", "text": "func (c *Context) VPMULUDQ_Z(mxyz, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPMULUDQ_Z(mxyz, xyz, k, xyz1))\n}", "title": "" }, { "docid": "b50abd9f37830a5c3318ca4ea02e3a4f", "score": "0.53369087", "text": "func VCMPSS(ops ...operand.Op) { ctx.VCMPSS(ops...) }", "title": "" }, { "docid": "d08cebc8006ae5206d6e43b50c3dc2a8", "score": "0.5335174", "text": "func PMULDQm128byte(X1 []byte, X2 []byte)", "title": "" }, { "docid": "a4e61eb544ba0ea27039e4a7b1ba3ecf", "score": "0.5328128", "text": "func VGF2P8MULB(ops ...operand.Op) { ctx.VGF2P8MULB(ops...) }", "title": "" }, { "docid": "92c5bb30f765939ca6e753cc1a6fba7a", "score": "0.5327831", "text": "func VPSUBW(ops ...operand.Op) { ctx.VPSUBW(ops...) }", "title": "" }, { "docid": "9e3943cccfcd1c00960ac8ac409e10fa", "score": "0.53225714", "text": "func VCMPPS_BCST(ops ...operand.Op) { ctx.VCMPPS_BCST(ops...) }", "title": "" }, { "docid": "0d71d05c2806750940ba75a7c97d03ae", "score": "0.53224593", "text": "func (c *Context) VFNMSUB231PS_Z(mxyz, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VFNMSUB231PS_Z(mxyz, xyz, k, xyz1))\n}", "title": "" }, { "docid": "ce4a0976fb9fdff5aa2cde37451fa186", "score": "0.5318725", "text": "func (c *Context) VPSUBUSW(ops ...operand.Op) {\n\tc.addinstruction(x86.VPSUBUSW(ops...))\n}", "title": "" }, { "docid": "700aa6e1c5f077fc971e4dde2b5fa0e0", "score": "0.53184265", "text": "func (c *Context) VPMINUD_BCST(ops ...operand.Op) {\n\tc.addinstruction(x86.VPMINUD_BCST(ops...))\n}", "title": "" }, { "docid": "407ede142538e936212bc816e5c7089f", "score": "0.5312763", "text": "func VPSUBUSB_Z(mxyz, xyz, k, xyz1 operand.Op) { ctx.VPSUBUSB_Z(mxyz, xyz, k, xyz1) }", "title": "" }, { "docid": "c759c5a42400541f3574c210e3cbb17c", "score": "0.5311871", "text": "func VPMULUDQ_BCST_Z(m, xyz, k, xyz1 operand.Op) { ctx.VPMULUDQ_BCST_Z(m, xyz, k, xyz1) }", "title": "" }, { "docid": "fcd6da7d6dada4e5d3508342eaf26c1c", "score": "0.53086066", "text": "func (c *Context) VPCMPQ(ops ...operand.Op) {\n\tc.addinstruction(x86.VPCMPQ(ops...))\n}", "title": "" }, { "docid": "52aaf8320f7a7fd743d6236dabc57f75", "score": "0.53046125", "text": "func VFNMSUB231PS_Z(mxyz, xyz, k, xyz1 operand.Op) { ctx.VFNMSUB231PS_Z(mxyz, xyz, k, xyz1) }", "title": "" }, { "docid": "c4d8b92291a92dca791b38d2fc5d4b34", "score": "0.53042614", "text": "func (c *Context) VPMINUQ_Z(mxyz, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPMINUQ_Z(mxyz, xyz, k, xyz1))\n}", "title": "" }, { "docid": "bd9b2af85512d7b141751a980dd4c831", "score": "0.52992433", "text": "func VPSUBUSW(ops ...operand.Op) { ctx.VPSUBUSW(ops...) }", "title": "" }, { "docid": "5fc3f045b0d918cc8a111a1653a4a86f", "score": "0.52986854", "text": "func VPOPCNTB_Z(mxyz, k, xyz operand.Op) { ctx.VPOPCNTB_Z(mxyz, k, xyz) }", "title": "" }, { "docid": "05f9bcd3037bcf60bfb12ddc1d17d1c2", "score": "0.5298568", "text": "func (c *Context) VPMINUQ_BCST(ops ...operand.Op) {\n\tc.addinstruction(x86.VPMINUQ_BCST(ops...))\n}", "title": "" }, { "docid": "7aaf9a3b48c22433494bca49c7b79c3b", "score": "0.5297896", "text": "func VPSUBQ(ops ...operand.Op) { ctx.VPSUBQ(ops...) }", "title": "" }, { "docid": "945666effac3acbbd2df660fd60c8901", "score": "0.5294329", "text": "func (c *Context) VPMAXUD_BCST_Z(m, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPMAXUD_BCST_Z(m, xyz, k, xyz1))\n}", "title": "" }, { "docid": "ea0dd97e3152aac98d42728fc99eedce", "score": "0.52940184", "text": "func VPSUBD(ops ...operand.Op) { ctx.VPSUBD(ops...) }", "title": "" }, { "docid": "fe8e4ac1147c750f2f1b6782dcdbcc00", "score": "0.52916974", "text": "func PMAXUWm128uint16(X1 []uint16, X2 []uint16)", "title": "" }, { "docid": "c348d929b5365906d0f47f58a386e536", "score": "0.5288658", "text": "func (c *Context) VPSUBQ_BCST(ops ...operand.Op) {\n\tc.addinstruction(x86.VPSUBQ_BCST(ops...))\n}", "title": "" }, { "docid": "f7fed67850ee83ffbdefc64b918a3a89", "score": "0.52885836", "text": "func VPMAXUQ_Z(mxyz, xyz, k, xyz1 operand.Op) { ctx.VPMAXUQ_Z(mxyz, xyz, k, xyz1) }", "title": "" }, { "docid": "4493c0dc9f134ec82af1e03448ceb0eb", "score": "0.52869135", "text": "func PMAXUDm128uint32(X1 []uint32, X2 []uint32)", "title": "" }, { "docid": "0fdb3636a050ce12d3e274c1f010deb2", "score": "0.5280335", "text": "func VBROADCASTI64X4_Z(m, k, z operand.Op) { ctx.VBROADCASTI64X4_Z(m, k, z) }", "title": "" }, { "docid": "dfe288b19af25ce80ccc165fccea70b6", "score": "0.52762604", "text": "func PMINUWm128byte(X1 []byte, X2 []byte)", "title": "" }, { "docid": "7d4cd55ea5cfc81b1ce1291e7dfe8e7f", "score": "0.5274591", "text": "func VPOPCNTQ_BCST_Z(m, k, xyz operand.Op) { ctx.VPOPCNTQ_BCST_Z(m, k, xyz) }", "title": "" }, { "docid": "ddb841d1feea1e3ba2b77a7980255667", "score": "0.52657163", "text": "func (c *Context) VPMINUQ_BCST_Z(m, xyz, k, xyz1 operand.Op) {\n\tc.addinstruction(x86.VPMINUQ_BCST_Z(m, xyz, k, xyz1))\n}", "title": "" }, { "docid": "c0945e31b3139b887227d2de63d31896", "score": "0.52608263", "text": "func VFMSUB231PD(ops ...operand.Op) { ctx.VFMSUB231PD(ops...) }", "title": "" }, { "docid": "6abfc2a38139f6c230051d90b3e8f75f", "score": "0.5258974", "text": "func (c *Context) VPMAXUQ(ops ...operand.Op) {\n\tc.addinstruction(x86.VPMAXUQ(ops...))\n}", "title": "" }, { "docid": "a3fddad2a613b954c6edb0dcb1956eaa", "score": "0.52515006", "text": "func (c *Context) VPMAXUD(ops ...operand.Op) {\n\tc.addinstruction(x86.VPMAXUD(ops...))\n}", "title": "" }, { "docid": "1fb93aaa982256a5ebcf78a1d337b69d", "score": "0.5248301", "text": "func (c *Context) VPMAXUD_BCST(ops ...operand.Op) {\n\tc.addinstruction(x86.VPMAXUD_BCST(ops...))\n}", "title": "" }, { "docid": "3104fbbfe890ade3a037b449819bcf9f", "score": "0.52465564", "text": "func VFMSUB231PS_Z(mxyz, xyz, k, xyz1 operand.Op) { ctx.VFMSUB231PS_Z(mxyz, xyz, k, xyz1) }", "title": "" } ]
2f8b340fc5ec3ac03775b37c0dec5afb
UpdateUniform sends an update to the openGL shader for the transformation matrix This is called when the transformation matrix has changed and we want to push that change to the shader
[ { "docid": "ae653ff662269086c67b27b5cdd33def", "score": "0.8489087", "text": "func (t *Transformation) UpdateUniform() {\n\tgl.UniformMatrix4fv(t.addr, 1, false, &t.matrix[0])\n}", "title": "" } ]
[ { "docid": "99654b3b7529b42fa0e42c2c19b371e6", "score": "0.6056853", "text": "func (t *Transformation) UpdateMatrix(newMatrix mgl32.Mat4) {\n\tt.matrix = newMatrix\n}", "title": "" }, { "docid": "35bb6710a61320595631ac20d8d4e9e9", "score": "0.5947521", "text": "func (t *Texture) SetUniform(uloc int32) error {\n\tif t.unit == 0 {\n\t\treturn ErrTextureNotBound\n\t}\n\tgl.Uniform1i(uloc, int32(t.unit-gl.TEXTURE0))\n\treturn nil\n}", "title": "" }, { "docid": "41cc09f3b33c15a70bab969b9d46f099", "score": "0.58748657", "text": "func (s *Shader) SetUniform(name string, arg interface{}) {\n\t// check descriptors\n\tdescriptor, ok := s.descriptors[name]\n\tif !ok {\n\t\tlog.Warnf(\"uniform `%s` was not recognized\", name)\n\t\treturn\n\t}\n\t// buffer uniform data\n\tswitch descriptor.Type {\n\tcase gl.SAMPLER_2D:\n\t\ts.SetUniform1i(descriptor.Location, arg)\n\tcase gl.SAMPLER_CUBE:\n\t\ts.SetUniform1i(descriptor.Location, arg)\n\tcase gl.INT:\n\t\tif descriptor.Count > 1 {\n\t\t\ts.SetUniform1iv(descriptor.Location, descriptor.Count, arg)\n\t\t} else {\n\t\t\ts.SetUniform1i(descriptor.Location, arg)\n\t\t}\n\tcase gl.UNSIGNED_INT:\n\t\tif descriptor.Count > 1 {\n\t\t\ts.SetUniform1uiv(descriptor.Location, descriptor.Count, arg)\n\t\t} else {\n\t\t\ts.SetUniform1ui(descriptor.Location, arg)\n\t\t}\n\tcase gl.FLOAT:\n\t\tif descriptor.Count > 1 {\n\t\t\ts.SetUniform1fv(descriptor.Location, descriptor.Count, arg)\n\t\t} else {\n\t\t\ts.SetUniform1f(descriptor.Location, arg)\n\t\t}\n\tcase gl.FLOAT_VEC2:\n\t\ts.SetUniform2fv(descriptor.Location, descriptor.Count, arg)\n\tcase gl.FLOAT_VEC3:\n\t\ts.SetUniform3fv(descriptor.Location, descriptor.Count, arg)\n\tcase gl.FLOAT_VEC4:\n\t\ts.SetUniform4fv(descriptor.Location, descriptor.Count, arg)\n\tcase gl.FLOAT_MAT3:\n\t\ts.SetUniformMatrix3fv(descriptor.Location, descriptor.Count, arg)\n\tcase gl.FLOAT_MAT4:\n\t\ts.SetUniformMatrix4fv(descriptor.Location, descriptor.Count, arg)\n\t}\n}", "title": "" }, { "docid": "8df4ded232e5bf22d94d1d09822a5a8e", "score": "0.5872257", "text": "func (shader *Shader) UpdateMat4(uniformName string, mat mgl32.Mat4) {\n\tlocation := gl.GetUniformLocation(shader.programHandle, gl.Str(uniformName+\"\\x00\"))\n\tif location != -1 {\n\t\tgl.UniformMatrix4fv(location, 1, false, &mat[0])\n\t}\n}", "title": "" }, { "docid": "b337f3104c7b171e28f0deb63d4e58c5", "score": "0.5571363", "text": "func (s *Shader) SetUniformMatrix4fv(location int32, count int32, arg interface{}) {\n\tvalue, ok := arg.(*float32)\n\tif !ok {\n\t\tlog.Warnf(\"%v is not of type *float32\", arg)\n\t\treturn\n\t}\n\tgl.UniformMatrix4fv(location, count, false, value)\n}", "title": "" }, { "docid": "17df6e4ba116322fc835c4d0f2c91842", "score": "0.554686", "text": "func (c *Context) UniformMatrix4fv(location js.Value, transpose bool, value []float32) {\n\tc.Call(\"uniformMatrix4fv\", location, transpose, value)\n}", "title": "" }, { "docid": "d36811db3c4061864688021de5e73130", "score": "0.55274844", "text": "func (s *Shader) SetUniformMatrix3fv(location int32, count int32, arg interface{}) {\n\tvalue, ok := arg.(*float32)\n\tif !ok {\n\t\tlog.Warnf(\"%v is not of type *float32\", arg)\n\t\treturn\n\t}\n\tgl.UniformMatrix3fv(location, count, false, value)\n}", "title": "" }, { "docid": "f41c98c2ad651e5928555cc7813d0974", "score": "0.55124927", "text": "func (s *Shader) SetUniform1fv(location int32, count int32, arg interface{}) {\n\tvalue, ok := arg.(*float32)\n\tif !ok {\n\t\tlog.Warnf(\"%v is not of type *float32\", arg)\n\t\treturn\n\t}\n\tgl.Uniform1fv(location, count, value)\n}", "title": "" }, { "docid": "2f59dd80de03679eef79603eb1a21bad", "score": "0.5455087", "text": "func (shader *Shader) UpdateVec3(uniformName string, vec3 mgl32.Vec3) {\n\tlocation := gl.GetUniformLocation(shader.programHandle, gl.Str(uniformName+\"\\x00\"))\n\tif location != -1 {\n\t\tgl.Uniform3fv(location, 1, &vec3[0])\n\t}\n}", "title": "" }, { "docid": "17bea72d6f0b4a67f6e8f0bcd68cb011", "score": "0.5453381", "text": "func (c *Context) UniformMatrix3fv(location js.Value, transpose bool, value []float32) {\n\tc.Call(\"uniformMatrix3fv\", location, transpose, value)\n}", "title": "" }, { "docid": "7507e7a7a46017a1f233d6713fb13c09", "score": "0.543568", "text": "func (shader *Shader) UpdateFloat32(uniformName string, f32 float32) {\n\tlocation := gl.GetUniformLocation(shader.programHandle, gl.Str(uniformName+\"\\x00\"))\n\tif location != -1 {\n\t\tgl.Uniform1f(location, f32)\n\t}\n}", "title": "" }, { "docid": "812c2b5f8662c1d9089520ab0073bc74", "score": "0.53456265", "text": "func (s *Shader) SetUniform3fv(location int32, count int32, arg interface{}) {\n\tvalue, ok := arg.(*float32)\n\tif !ok {\n\t\tlog.Warnf(\"%v is not of type *float32\", arg)\n\t\treturn\n\t}\n\tgl.Uniform3fv(location, count, value)\n}", "title": "" }, { "docid": "aa504eb5baef6e429d9005c8e4b2b069", "score": "0.533554", "text": "func (s *Shader) SetUniform2fv(location int32, count int32, arg interface{}) {\n\tvalue, ok := arg.(*float32)\n\tif !ok {\n\t\tlog.Warnf(\"%v is not of type *float32\", arg)\n\t\treturn\n\t}\n\tgl.Uniform2fv(location, count, value)\n}", "title": "" }, { "docid": "03bbe7d54639f04dbd1412d18f07b5bf", "score": "0.5323612", "text": "func (a *Attributes) UpdateMVPMatrix() {\n\ta.model = mgl32.Ident4().Mul4(mgl32.HomogRotate3DZ(a.rotationAngle)).Mul4(mgl32.Translate3D(a.xyTranslation.X(), a.xyTranslation.Y(), 0)).Mul4(mgl32.Scale3D(a.scale, a.scale, 0))\n\ta.mvp = a.projection.Mul4(a.model)\n}", "title": "" }, { "docid": "0ad6aa40ff60c5fb89cb64f7d028656b", "score": "0.5310732", "text": "func UniformMatrix4fv(location int32, count int32, transpose byte, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tctranspose, _ := (C.GLboolean)(transpose), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniformMatrix4fv(clocation, ccount, ctranspose, cvalue)\n}", "title": "" }, { "docid": "1e94731bb930df114a6aafbf044e9e86", "score": "0.52972925", "text": "func (c *Context) UniformMatrix2fv(location js.Value, transpose bool, value []float32) {\n\tc.Call(\"uniformMatrix2fv\", location, transpose, value)\n}", "title": "" }, { "docid": "8c6a404a17c84000cd740fb08bd815b4", "score": "0.5297047", "text": "func UniformMatrix4x2fv(location int32, count int32, transpose byte, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tctranspose, _ := (C.GLboolean)(transpose), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniformMatrix4x2fv(clocation, ccount, ctranspose, cvalue)\n}", "title": "" }, { "docid": "7a051bfca826d130f9e703783d2fbd76", "score": "0.5266307", "text": "func (s *Shader) SetUniform4fv(location int32, count int32, arg interface{}) {\n\tvalue, ok := arg.(*float32)\n\tif !ok {\n\t\tlog.Warnf(\"%v is not of type *float32\", arg)\n\t\treturn\n\t}\n\tgl.Uniform4fv(location, count, value)\n}", "title": "" }, { "docid": "4d70cd36ce54618acef67ad1ac58d6b0", "score": "0.5263706", "text": "func (c *Context) UniformMatrix4fv(location *UniformLocation, transpose bool, value []float32) {\n\tc.Call(\"uniformMatrix4fv\", location.Object, transpose, value)\n}", "title": "" }, { "docid": "3e5718d63a39b4c785003c031d3c0e76", "score": "0.5256802", "text": "func (self *WebGLRenderer) UpdateTexture(texture *Texture) bool{\n return self.Object.Call(\"updateTexture\", texture).Bool()\n}", "title": "" }, { "docid": "03c288df2f4627dd37e368b11a64df90", "score": "0.5255781", "text": "func (s *Shader) SetUniform1f(location int32, arg interface{}) {\n\tvalue, ok := arg.(float32)\n\tif !ok {\n\t\tlog.Warnf(\"%v is not of type float32\", arg)\n\t\treturn\n\t}\n\tgl.Uniform1f(location, value)\n}", "title": "" }, { "docid": "99b1a7fd820b7b3ecb80431256ec61e3", "score": "0.522387", "text": "func Uniform1fv(location int32, count int32, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniform1fv(clocation, ccount, cvalue)\n}", "title": "" }, { "docid": "6685c81d1627272d75e961096fc018e1", "score": "0.51922363", "text": "func (m *Mesh) UpdateData(data *MeshData) error {\n\tconst F = C.sizeof_float\n\n\tif data.Material != nil {\n\t\tm.material = data.Material\n\t}\n\n\tm.count = int32(len(data.Vertices))\n\thasNorms := len(data.Normals) > 0\n\thasTxcds := len(data.TexCoords) > 0\n\n\tbuf := make([]float32, 0, (len(data.Vertices)*3)+(len(data.Normals)*3)+(len(data.TexCoords)*2))\n\tfor i := range data.Vertices {\n\t\tbuf = append(buf, data.Vertices[i][0], data.Vertices[i][1], data.Vertices[i][2])\n\t\tif hasNorms {\n\t\t\tbuf = append(buf, data.Normals[i][0], data.Normals[i][1], data.Normals[i][2])\n\t\t}\n\t\tif hasTxcds {\n\t\t\tbuf = append(buf, data.TexCoords[i][0], data.TexCoords[i][1])\n\t\t}\n\t}\n\n\tgl.BindBuffer(gl.ARRAY_BUFFER, m.vbo)\n\n\tif m.size == len(buf) {\n\t\tgl.BufferSubData(gl.ARRAY_BUFFER, 0, len(buf)*F, gl.Ptr(buf))\n\t} else {\n\t\tm.size = len(buf)\n\t\tgl.BufferData(gl.ARRAY_BUFFER, len(buf)*F, gl.Ptr(buf), gl.STATIC_DRAW)\n\t}\n\n\tgl.BindBuffer(gl.ARRAY_BUFFER, 0)\n\n\treturn nil\n}", "title": "" }, { "docid": "a4ea15851a29b9886d45121fe26dfcee", "score": "0.51899606", "text": "func UniformMatrix3fv(location int32, count int32, transpose byte, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tctranspose, _ := (C.GLboolean)(transpose), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniformMatrix3fv(clocation, ccount, ctranspose, cvalue)\n}", "title": "" }, { "docid": "d62ac7b242fa42453ec76c3862bef173", "score": "0.5172291", "text": "func (c *Context) UniformMatrix3fv(location *UniformLocation, transpose bool, value []float32) {\n\tc.Call(\"uniformMatrix3fv\", location.Object, transpose, value)\n}", "title": "" }, { "docid": "e582b20d68a8da1150c1bb69822fbd4c", "score": "0.5148168", "text": "func GetUniformfv(program uint32, location int32, params *float32) {\n\tcprogram, _ := (C.GLuint)(program), cgoAllocsUnknown\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tcparams, _ := (*C.GLfloat)(unsafe.Pointer(params)), cgoAllocsUnknown\n\tC.glGetUniformfv(cprogram, clocation, cparams)\n}", "title": "" }, { "docid": "1b8ce0427e48f5530052335fe52c22e6", "score": "0.51426923", "text": "func UniformMatrix2fv(location int32, count int32, transpose byte, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tctranspose, _ := (C.GLboolean)(transpose), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniformMatrix2fv(clocation, ccount, ctranspose, cvalue)\n}", "title": "" }, { "docid": "bec02ff2fe475322ba2a2ef963494f38", "score": "0.51302135", "text": "func UniformMatrix4x3fv(location int32, count int32, transpose byte, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tctranspose, _ := (C.GLboolean)(transpose), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniformMatrix4x3fv(clocation, ccount, ctranspose, cvalue)\n}", "title": "" }, { "docid": "f8e06805a27c18683dfe2fb6e5f0fc3e", "score": "0.50669676", "text": "func UniformMatrix2x4fv(location int32, count int32, transpose byte, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tctranspose, _ := (C.GLboolean)(transpose), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniformMatrix2x4fv(clocation, ccount, ctranspose, cvalue)\n}", "title": "" }, { "docid": "076de6c35a04cbe0408795896fd1a297", "score": "0.5061269", "text": "func (shader *Shader) UpdateInt32(uniformName string, i32 int32) {\n\tlocation := gl.GetUniformLocation(shader.programHandle, gl.Str(uniformName+\"\\x00\"))\n\tif location != -1 {\n\t\tgl.Uniform1i(location, i32)\n\t}\n}", "title": "" }, { "docid": "1e3c099616676501cb024c6ac0057d0a", "score": "0.5042306", "text": "func UniformMatrix3x4fv(location int32, count int32, transpose byte, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tctranspose, _ := (C.GLboolean)(transpose), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniformMatrix3x4fv(clocation, ccount, ctranspose, cvalue)\n}", "title": "" }, { "docid": "b334f6d935996478357a9c88b60acce0", "score": "0.50334615", "text": "func UniformMatrix3x2fv(location int32, count int32, transpose byte, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tctranspose, _ := (C.GLboolean)(transpose), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniformMatrix3x2fv(clocation, ccount, ctranspose, cvalue)\n}", "title": "" }, { "docid": "d008e949740300ec6e79aeea2cd6ae2c", "score": "0.50046414", "text": "func Uniform4fv(location int32, count int32, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniform4fv(clocation, ccount, cvalue)\n}", "title": "" }, { "docid": "7a09c176a92305bd372067137c304d0f", "score": "0.49601611", "text": "func (c *Context) UniformMatrix2fv(location *UniformLocation, transpose bool, value []float32) {\n\tc.Call(\"uniformMatrix2fv\", location.Object, transpose, value)\n}", "title": "" }, { "docid": "bd308e1acb2afa4b81ae2e5550db9b6d", "score": "0.49417707", "text": "func (shader *Shader) UpdateFloat32Slice(uniformName string, f32 []float32) {\n\tlocation := gl.GetUniformLocation(shader.programHandle, gl.Str(uniformName+\"\\x00\"))\n\tif location != -1 {\n\t\tgl.Uniform1fv(location, int32(len(f32)), &f32[0])\n\t}\n}", "title": "" }, { "docid": "b001b772c151f71155360910f11dfc77", "score": "0.49219644", "text": "func (s *Shader) SetUniform1uiv(location int32, count int32, arg interface{}) {\n\tvalue, ok := arg.(*uint32)\n\tif !ok {\n\t\tlog.Warnf(\"%v is not of type *uint32\", arg)\n\t\treturn\n\t}\n\tgl.Uniform1uiv(location, count, value)\n}", "title": "" }, { "docid": "818bb027c246f01386764526871efb8a", "score": "0.4907809", "text": "func (obj Device) UpdateTexture(\n\tpSourceTexture BaseTexture,\n\tpDestinationTexture BaseTexture,\n) (\n\terr Error,\n) {\n\terr = toErr(C.IDirect3DDevice9UpdateTexture(\n\t\tobj.handle,\n\t\tpSourceTexture.handle,\n\t\tpDestinationTexture.handle,\n\t))\n\treturn\n}", "title": "" }, { "docid": "28b5acedbab93512095be5003f1f255b", "score": "0.4901768", "text": "func Uniform3fv(location int32, count int32, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniform3fv(clocation, ccount, cvalue)\n}", "title": "" }, { "docid": "15f2bdff9b87d7212c6bd33960499e0e", "score": "0.4888894", "text": "func Uniform1f(location int32, v0 float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tcv0, _ := (C.GLfloat)(v0), cgoAllocsUnknown\n\tC.glUniform1f(clocation, cv0)\n}", "title": "" }, { "docid": "84cbf4e32e971a414f2525e0b6141eb9", "score": "0.48832548", "text": "func UniformMatrix2x3fv(location int32, count int32, transpose byte, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tctranspose, _ := (C.GLboolean)(transpose), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniformMatrix2x3fv(clocation, ccount, ctranspose, cvalue)\n}", "title": "" }, { "docid": "53a7f895e052d992230b5fe8ca97c441", "score": "0.48710227", "text": "func UpdateTexture(texture *Texture2D, pixels []Color) {\n\ttexture.UpdateTexture(pixels)\n}", "title": "" }, { "docid": "94111af66ece2153d5100a7df7b1c944", "score": "0.48433763", "text": "func (self *Texture) _updateUvs() {\n self.Object.Call(\"_updateUvs\")\n}", "title": "" }, { "docid": "5e93cf3ef19e7dba2fe64b502b6c874e", "score": "0.48347872", "text": "func (c *Context) Uniform4f(location js.Value, x, y, z, w float32) {\n\tc.Call(\"uniform4f\", location, x, y, z, w)\n}", "title": "" }, { "docid": "bddfe4b34c19251c22a569fd1b0d58f1", "score": "0.48286837", "text": "func (s *Shader) SetUniform1ui(location int32, arg interface{}) {\n\tvalue, ok := arg.(uint32)\n\tif !ok {\n\t\tlog.Warnf(\"%v is not of type uint32\", arg)\n\t\treturn\n\t}\n\tgl.Uniform1ui(location, value)\n}", "title": "" }, { "docid": "538867eeda1556a92507aec91986f5bb", "score": "0.48238966", "text": "func (s *Shader) SetUniform1i(location int32, arg interface{}) {\n\tvalue, ok := arg.(int32)\n\tif !ok {\n\t\tlog.Warnf(\"%v is not of type int32\", arg)\n\t\treturn\n\t}\n\tgl.Uniform1i(location, value)\n}", "title": "" }, { "docid": "a42fc4370c770b4e99b1fc678ccd0480", "score": "0.48206335", "text": "func Uniform2fv(location int32, count int32, value *float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLfloat)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniform2fv(clocation, ccount, cvalue)\n}", "title": "" }, { "docid": "2192c49f52b47b1d9f6c8288d6d50c09", "score": "0.48133513", "text": "func defineMatrices(shader uint32) {\n projection := mgl32.Perspective(g_fovy, g_aspect, g_nearPlane, g_farPlane)\n camera := mgl32.LookAtV(GetCameraLookAt())\n\n viewProjection := projection.Mul4(camera);\n cameraUniform := gl.GetUniformLocation(shader, gl.Str(\"viewProjectionMat\\x00\"))\n gl.UniformMatrix4fv(cameraUniform, 1, false, &viewProjection[0])\n}", "title": "" }, { "docid": "2192c49f52b47b1d9f6c8288d6d50c09", "score": "0.48133513", "text": "func defineMatrices(shader uint32) {\n projection := mgl32.Perspective(g_fovy, g_aspect, g_nearPlane, g_farPlane)\n camera := mgl32.LookAtV(GetCameraLookAt())\n\n viewProjection := projection.Mul4(camera);\n cameraUniform := gl.GetUniformLocation(shader, gl.Str(\"viewProjectionMat\\x00\"))\n gl.UniformMatrix4fv(cameraUniform, 1, false, &viewProjection[0])\n}", "title": "" }, { "docid": "893522afc9133276b162692ad2010b0f", "score": "0.48100647", "text": "func (m *IVector3) Set(nv IVec3) {\n\tgl.ProgramUniform3iv(m.program, m.uniform, 1, &nv[0])\n}", "title": "" }, { "docid": "402e7dc72ca945339d5cefe63ef8ec14", "score": "0.47997764", "text": "func (c *MouseCamera) Update(win *pixelgl.Window) {\n\tif !c.corrected {\n\t\t// a bit hackish, but works for now\n\t\tc.Position = win.Bounds().Center().Sub(c.worldZeroInWindow)\n\t\tc.origPos = c.Position\n\t\tc.corrected = true\n\t}\n\n\t// translate the matrix only when mouse is dragged, and then translate\n\t// by the difference between the new and previous mouse positions.\n\tif win.JustPressed(pixelgl.MouseButtonLeft) {\n\t\tc.prevMousePos = win.MousePosition()\n\t} else if win.Pressed(pixelgl.MouseButtonLeft) {\n\t\tnewMousePos := win.MousePosition()\n\t\tdelta := newMousePos.Sub(c.prevMousePos).Scaled(-1) // this delta is in the opposite direction we want to move \"Position\", so invert\n\t\tc.prevMousePos = newMousePos // todo? i wonder if there's a potential error here\n\n\t\t// check that new position is within extents.\n\t\t// if NOT then clamp\n\t\tnewPos := c.Position.Add(delta.Scaled(1 / c.Zoom))\n\t\tnewPos.X = pixel.Clamp(newPos.X, c.XExtents.Low, c.XExtents.High)\n\t\tnewPos.Y = pixel.Clamp(newPos.Y, c.YExtents.Low, c.YExtents.High)\n\n\t\t// update matrix and position\n\t\tc.viewMatrix = c.viewMatrix.Moved(newPos.Sub(c.Position).Scaled(-c.Zoom))\n\t\tc.Position = newPos\n\t}\n\n\t// scale the matrix only when the mouse wheel is scrolled. MouseScroll()\n\t// returns the change since last window update, so zoomspeed^mouse.Y is\n\t// the change in zoom\n\tif win.MouseScroll().Y != 0 {\n\t\tdelta := math.Pow(c.ZoomSpeed, win.MouseScroll().Y)\n\t\t// check that the new zoom is within extents.\n\t\t// if NOT then clamp\n\t\tnewZoom := c.Zoom * delta\n\t\tnewZoom = pixel.Clamp(newZoom, c.ZExtents.Low, c.ZExtents.High)\n\n\t\t// update matrix and zoom\n\t\tc.viewMatrix = c.viewMatrix.Scaled(win.MousePosition(), newZoom/c.Zoom)\n\t\tc.Zoom = newZoom\n\n\t\t// move position so that point under window center\n\t\t// accurately reflects \"world\" coordinate\n\t\tc.Position = c.viewMatrix.Unproject(win.Bounds().Center())\n\t}\n\n}", "title": "" }, { "docid": "54e356cd80e3d740d24be7d8c32b67ee", "score": "0.4786726", "text": "func (p Program) GetUniformfv(location Uniform, params []float32) {\n\tGetUniformfv(p.c(), location.c(), &params[0])\n}", "title": "" }, { "docid": "e00be3f127fe80b5f0de237de2989506", "score": "0.476313", "text": "func renderMatrix(mm *lin.M4, rm *render.M4) *render.M4 { return vu.RenderMatrix(mm, rm) }", "title": "" }, { "docid": "f07eae22a41a9e6f08ee36ab0c72436f", "score": "0.47575456", "text": "func Uniform4f(location int32, v0 float32, v1 float32, v2 float32, v3 float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tcv0, _ := (C.GLfloat)(v0), cgoAllocsUnknown\n\tcv1, _ := (C.GLfloat)(v1), cgoAllocsUnknown\n\tcv2, _ := (C.GLfloat)(v2), cgoAllocsUnknown\n\tcv3, _ := (C.GLfloat)(v3), cgoAllocsUnknown\n\tC.glUniform4f(clocation, cv0, cv1, cv2, cv3)\n}", "title": "" }, { "docid": "dd756f693af15a388d95a8ba23bd85eb", "score": "0.472931", "text": "func (p *Primitive2D) SetUniforms() {\n\tp.shaderProgram.SetUniform(\"color\", &p.color)\n\tp.shaderProgram.SetUniform(\"model\", p.ModelMatrix())\n}", "title": "" }, { "docid": "7f892f1e3d5693239a1261de1fd542ca", "score": "0.47275874", "text": "func (self *WebGLRenderer) UpdateTextureI(args ...interface{}) bool{\n return self.Object.Call(\"updateTexture\", args).Bool()\n}", "title": "" }, { "docid": "5920abfe59846f7b3d673a9ba0874279", "score": "0.47111621", "text": "func (s *SumSq) Update(x float64) {\n\ts.xx.Update(x, x)\n}", "title": "" }, { "docid": "788140ae450d83e350a77d9e7f2d9d9d", "score": "0.47105244", "text": "func (c *Context) Uniform4i(location js.Value, x, y, z, w int) {\n\tc.Call(\"uniform4i\", location, x, y, z, w)\n}", "title": "" }, { "docid": "a352c3e689f1481fc02224da6e561038", "score": "0.47024184", "text": "func (m Map) MakeUniform() Map {\r\n\tmin, max := m.GetMinMax()\r\n\tlinear := m.ToLinear()\r\n\tlinear.MakeUniform()\r\n\tlinear.To2D(m)\r\n\tm.Interpolate(min, max)\r\n\r\n\treturn m\r\n}", "title": "" }, { "docid": "f3f02023cb7b70cedbbdfd88a58cd02f", "score": "0.46898764", "text": "func (c *Context) Uniform4f(location *UniformLocation, x, y, z, w float32) {\n\tc.Call(\"uniform4f\", location.Object, x, y, z, w)\n}", "title": "" }, { "docid": "5d9e4f0c1e215137efcee5a5586d31ec", "score": "0.46826303", "text": "func (grmat *GraphicMaterial) Render(gs *gls.GLS, rinfo *core.RenderInfo) {\n\n\t// Setup the associated material (set states and transfer material uniforms and textures)\n\tgrmat.imat.RenderSetup(gs)\n\n\t// Setup the associated geometry (set VAO and transfer VBOS)\n\tgr := grmat.igraphic.GetGraphic()\n\tgr.igeom.RenderSetup(gs)\n\n\t// Setup current graphic (transfer matrices)\n\tgrmat.igraphic.RenderSetup(gs, rinfo)\n\n\t// Get the number of vertices for the current material\n\tcount := grmat.count\n\n\tgeom := gr.igeom.GetGeometry()\n\tindices := geom.Indices()\n\t// Indexed geometry\n\tif indices.Size() > 0 {\n\t\tif count == 0 {\n\t\t\tcount = indices.Size()\n\t\t}\n\t\tgs.DrawElements(gr.mode, int32(count), gls.UNSIGNED_INT, 4*uint32(grmat.start))\n\t\t// Non indexed geometry\n\t} else {\n\t\tif count == 0 {\n\t\t\tcount = geom.Items()\n\t\t}\n\t\tgs.DrawArrays(gr.mode, int32(grmat.start), int32(count))\n\t}\n}", "title": "" }, { "docid": "789eef51f68d8c54fbaf25f4b30ebf1b", "score": "0.46791762", "text": "func (t *RenderTarget) update() {\n\tif !t.initialized {\n\t\tt.init()\n\t}\n\n\t// setup texture buffer\n\tt.textureBuffer.Bind(gl.TEXTURE_2D)\n\n\tgl.TexParameteri(gl.TEXTURE_2D, gl.TEXTURE_MAG_FILTER, gl.NEAREST)\n\tgl.TexParameteri(gl.TEXTURE_2D, gl.TEXTURE_MIN_FILTER, gl.NEAREST)\n\n\tgl.TexImage2D(gl.TEXTURE_2D, 0, gl.RGB,\n\t\tt.width, t.height,\n\t\t0, gl.RGB, gl.UNSIGNED_BYTE, nil) // empty image\n\n\t// setup frame buffer\n\tt.frameBuffer.Bind() // t.frameBuffer.BindTarget(gl.FRAMEBUFFER)\n\n\tslot := 0\n\tgl.FramebufferTexture2D(gl.FRAMEBUFFER, gl.COLOR_ATTACHMENT0+gl.GLenum(slot), gl.TEXTURE_2D, t.textureBuffer, 0)\n\n\t// setup depth buffer\n\tt.renderBuffer.Bind()\n\tgl.RenderbufferStorage(gl.RENDERBUFFER, gl.DEPTH_COMPONENT16, t.width, t.height)\n\tt.renderBuffer.FramebufferRenderbuffer(gl.FRAMEBUFFER, gl.DEPTH_ATTACHMENT, gl.RENDERBUFFER)\n\n\t// configure framebuffer\n\t//gl.DrawBuffers(1, []gl.GLenum{gl.COLOR_ATTACHMENT0 + gl.GLenum(slot)})\n\t//gl.Viewport(0, 0, t.width, t.height)\n\n\t// check for errors during setup\n\tif gl.CheckFramebufferStatus(gl.FRAMEBUFFER) != gl.FRAMEBUFFER_COMPLETE {\n\t\tpanic(\"could not initialize framebuffer\")\n\t}\n\n\t// release\n\tt.textureBuffer.Unbind(gl.TEXTURE_2D)\n\tt.renderBuffer.Unbind()\n\tt.frameBuffer.Unbind()\n\n\tt.needsUpdate = false\n}", "title": "" }, { "docid": "30199b9525663c797e846b5cb5a75ef5", "score": "0.46724173", "text": "func Uniform1ui(location int32, v0 uint32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tcv0, _ := (C.GLuint)(v0), cgoAllocsUnknown\n\tC.glUniform1ui(clocation, cv0)\n}", "title": "" }, { "docid": "6b348d9bed3dd59cbb12e7c59386840e", "score": "0.46710616", "text": "func (s *StatsView) UpdateStat(name string, value string) error {\n\tfor _, stat := range s.stats {\n\t\tif stat == name {\n\t\t\ts.statValues[name] = value\n\t\t}\n\t}\n\treturn fmt.Errorf(\"Statistic not registered %s\", name)\n}", "title": "" }, { "docid": "ea0e427439b1249aea1740b926145725", "score": "0.46438238", "text": "func (vertex *Vertex) Transform(matrix mat64.Matrix) {\n\t// Create a column vector from the vertex\n\tvector := mat64.NewVector(len(vertex.attributes), vertex.attributes)\n\t//fmt.Printf(\"%v\\n\", mat64.Formatted(vector))\n\n\t// Apply the transformation\n\tvector.MulVec(matrix, vector)\n\n\t// Put the new vertex data back\n\tvertex.attributes = stripVector(vector)\n}", "title": "" }, { "docid": "e300adbb8f905a9a5fb30ee888718f81", "score": "0.46357158", "text": "func (shader *Shader) UpdateInt32Slice(uniformName string, i32 []int32) {\n\tlocation := gl.GetUniformLocation(shader.programHandle, gl.Str(uniformName+\"\\x00\"))\n\tif location != -1 {\n\t\tgl.Uniform1iv(location, int32(len(i32)), &i32[0])\n\t}\n}", "title": "" }, { "docid": "4fbe3473f298c02a60ec0c30a2a5f114", "score": "0.4627734", "text": "func UniformBlockBinding(program uint32, uniformBlockIndex uint32, uniformBlockBinding uint32) {\n\tcprogram, _ := (C.GLuint)(program), cgoAllocsUnknown\n\tcuniformBlockIndex, _ := (C.GLuint)(uniformBlockIndex), cgoAllocsUnknown\n\tcuniformBlockBinding, _ := (C.GLuint)(uniformBlockBinding), cgoAllocsUnknown\n\tC.glUniformBlockBinding(cprogram, cuniformBlockIndex, cuniformBlockBinding)\n}", "title": "" }, { "docid": "9234adf96b7b2d45f14254833f5f7b76", "score": "0.4609075", "text": "func (s *SumVector) GenUpdate(eta float64, wkey string) {\n\tv, _ := s.Ch()[0].Stored(\"correct\")\n\tk := int(v)\n\ts.w[k] += eta * s.pweights[wkey][k]\n\n\t// Normalize\n\tt := 0.0\n\tfor i := 0; i < s.n; i++ {\n\t\tt += s.w[i]\n\t}\n\tfor i := 0; i < s.n; i++ {\n\t\ts.w[i] /= t\n\t}\n}", "title": "" }, { "docid": "689edd4afa8a667328ee52e94ea7e914", "score": "0.4605466", "text": "func (mat *Material) SetShaderUnique(unique bool) {\n\n\tmat.shaderUnique = unique\n}", "title": "" }, { "docid": "d59a3ea614bae548d444283320359978", "score": "0.45910683", "text": "func Uniform1uiv(location int32, count int32, value *uint32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLuint)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniform1uiv(clocation, ccount, cvalue)\n}", "title": "" }, { "docid": "acc6797a02dfeed23b919bfd4d4b6c5d", "score": "0.45866057", "text": "func Uniform1i(location int32, v0 int32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tcv0, _ := (C.GLint)(v0), cgoAllocsUnknown\n\tC.glUniform1i(clocation, cv0)\n}", "title": "" }, { "docid": "f5f1d6c4ffe362c0c100c50a72c6770e", "score": "0.45856842", "text": "func (gb *GBuffer) Render(cam *Camera, mesh Mesh, tex gl2.Texture2D, t *Transform) {\n\n\tmodel := t.Mat4()\n\tmvp := gb.vp.Mul4(&model)\n\tgb.MVPUni.UniformMatrix4fv(1, false, &mvp[0])\n\n\tgb.MUni.UniformMatrix4fv(1, false, &model[0])\n\n\tnormal := model.Inverse()\n\tgb.NUni.UniformMatrix4fv(1, true, &normal[0])\n\n\tgl.ActiveTexture(gl2.TEXTURE0)\n\ttex.Bind()\n\tgb.DiffuseUni.Uniform1i(0)\n\n\tmesh.Bind()\n\tmesh.DrawCall()\n}", "title": "" }, { "docid": "7a40b99cab56b6787f461bcfeba46ac8", "score": "0.45749155", "text": "func (c *Context) Uniform1f(location js.Value, x float32) {\n\tc.Call(\"uniform1f\", location, x)\n}", "title": "" }, { "docid": "bf86c46ce23a977dac52809b697b229c", "score": "0.45638928", "text": "func (c *Context) Uniform1f(location *UniformLocation, x float32) {\n\tc.Call(\"uniform1f\", location.Object, x)\n}", "title": "" }, { "docid": "9ae1cc77dc1ca3c9bca67aa0f6e614c6", "score": "0.45559275", "text": "func (shader *Shader) UpdateVec2(uniformName string, vec2 mgl32.Vec2) {\n\tlocation := gl.GetUniformLocation(shader.programHandle, gl.Str(uniformName+\"\\x00\"))\n\tif location != -1 {\n\t\tgl.Uniform2fv(location, 1, &vec2[0])\n\t}\n}", "title": "" }, { "docid": "857f891a9ed10ea64dc23539d59beea5", "score": "0.4555431", "text": "func Uniform4ui(location int32, v0 uint32, v1 uint32, v2 uint32, v3 uint32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tcv0, _ := (C.GLuint)(v0), cgoAllocsUnknown\n\tcv1, _ := (C.GLuint)(v1), cgoAllocsUnknown\n\tcv2, _ := (C.GLuint)(v2), cgoAllocsUnknown\n\tcv3, _ := (C.GLuint)(v3), cgoAllocsUnknown\n\tC.glUniform4ui(clocation, cv0, cv1, cv2, cv3)\n}", "title": "" }, { "docid": "f0abb445531582f1e24d899efe436f37", "score": "0.45487", "text": "func (c *Context) Uniform4i(location *UniformLocation, x, y, z, w int) {\n\tc.Call(\"uniform4i\", location.Object, x, y, z, w)\n}", "title": "" }, { "docid": "8fb6e36f66fec66e07aff1689ac46730", "score": "0.4543662", "text": "func (c *Context) GetUniform(program *Program, location *UniformLocation) *js.Object {\n\treturn c.Call(\"getUniform\", program.Object, location.Object)\n}", "title": "" }, { "docid": "f40a47cbe3d61088c8913b21ff0b8078", "score": "0.4528022", "text": "func Uniform4i(location int32, v0 int32, v1 int32, v2 int32, v3 int32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tcv0, _ := (C.GLint)(v0), cgoAllocsUnknown\n\tcv1, _ := (C.GLint)(v1), cgoAllocsUnknown\n\tcv2, _ := (C.GLint)(v2), cgoAllocsUnknown\n\tcv3, _ := (C.GLint)(v3), cgoAllocsUnknown\n\tC.glUniform4i(clocation, cv0, cv1, cv2, cv3)\n}", "title": "" }, { "docid": "6fc492bbb937d92b70c580c891915203", "score": "0.4527", "text": "func (ds *DataShaderTr) UniViewToShader() (err error) {\n\tif ds.ShaderPtr == nil {\n\t\treturn errors.New(\"ds.ShaderPtr == nil // type *ShaderTr\")\n\t}\n\tif ds.UniPtr == nil {\n\t\treturn errors.New(\"ds.UniPtr == nil // type *GLUni\")\n\t}\n\n\tgl.UseProgram(ds.ShaderPtr.ProgramId)\n\tgl.UniformMatrix4fv(ds.ShaderPtr.ViewUni, 1, false, &(ds.UniPtr.ViewUni[0]))\n\n\treturn nil\n}", "title": "" }, { "docid": "aa2c1e4d5f5673d2ec7820e8f53b5656", "score": "0.4509108", "text": "func GetUniformuiv(program uint32, location int32, params *uint32) {\n\tcprogram, _ := (C.GLuint)(program), cgoAllocsUnknown\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tcparams, _ := (*C.GLuint)(unsafe.Pointer(params)), cgoAllocsUnknown\n\tC.glGetUniformuiv(cprogram, clocation, cparams)\n}", "title": "" }, { "docid": "b4d82da25e51405a532e340c2c90f5a3", "score": "0.45084062", "text": "func Uniform4uiv(location int32, count int32, value *uint32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLuint)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniform4uiv(clocation, ccount, cvalue)\n}", "title": "" }, { "docid": "a92b0bddf34a08b40e5c6250c2862673", "score": "0.4496435", "text": "func incrementTransMatrix(transMatrix *[][]float32, prevTagIndex int, currTagIndex int) {\r\n\t(*transMatrix)[prevTagIndex][currTagIndex]++\r\n}", "title": "" }, { "docid": "827ef4f91caaf3b9ce17ad4c38483b87", "score": "0.44651988", "text": "func Uniform3f(location int32, v0 float32, v1 float32, v2 float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tcv0, _ := (C.GLfloat)(v0), cgoAllocsUnknown\n\tcv1, _ := (C.GLfloat)(v1), cgoAllocsUnknown\n\tcv2, _ := (C.GLfloat)(v2), cgoAllocsUnknown\n\tC.glUniform3f(clocation, cv0, cv1, cv2)\n}", "title": "" }, { "docid": "2553fcaa26da72656f7f1d86619d02b1", "score": "0.44600844", "text": "func (v *View) UpdateCameraLocation(position, target, up mgl32.Vec3) {\n\tv.matrix = mgl32.LookAtV(position, target, up)\n}", "title": "" }, { "docid": "27d74e3bba4f1166e9c7308e9ab100d7", "score": "0.44590655", "text": "func (s *scene) Render() {\n\t// The shader sees previous frame via prevTex texture and renders the\n\t// current frame to curTex texture through curFB framebuffer.\n\tprevTex := s.canvasTex[s.frame%2]\n\tcurTex := s.canvasTex[(s.frame+1)%2]\n\tcurFB := s.canvasFB[(s.frame+1)%2]\n\n\t// User program sees the number of frames that have been rendered.\n\tframeLoc := gl.GetUniformLocation(s.userProgram, gl.Str(\"frame\\x00\"))\n\tgl.UseProgram(s.userProgram)\n\tgl.Uniform1i(frameLoc, int32(s.frame))\n\n\tgl.ActiveTexture(gl.TEXTURE0)\n\n\t// Let user program render to framebuffer.\n\tgl.Viewport(0, 0, int32(s.canvasSize.X), int32(s.canvasSize.Y))\n\tgl.UseProgram(s.userProgram)\n\tgl.BindTexture(gl.TEXTURE_2D, prevTex)\n\tgl.BindFramebuffer(gl.FRAMEBUFFER, curFB)\n\tgl.BindVertexArray(s.vao)\n\tgl.DrawArrays(gl.TRIANGLE_STRIP, 0, 4)\n\n\t// Scale and render the result to viewport.\n\tgl.Viewport(0, 0, int32(s.viewportSize.X), int32(s.viewportSize.Y))\n\tgl.UseProgram(s.viewProgram)\n\tgl.BindTexture(gl.TEXTURE_2D, curTex)\n\tgl.BindFramebuffer(gl.FRAMEBUFFER, 0)\n\tgl.BindVertexArray(s.vao)\n\tgl.DrawArrays(gl.TRIANGLE_STRIP, 0, 4)\n\n\ts.frame++\n}", "title": "" }, { "docid": "d9b03e84203cb05785579ae8c790b728", "score": "0.44565013", "text": "func (c *Context) GetUniformLocation(program js.Value, name string) js.Value {\n\treturn c.Call(\"getUniformLocation\", program, name)\n}", "title": "" }, { "docid": "9ca3ee5ea4a24294bd0224797206b032", "score": "0.44478884", "text": "func (s *Shader) SetMatrix4(name string, matrix mgl.Mat4, useShader bool) {\n\tif useShader {\n\t\ts.Use()\n\t}\n\tgl.UniformMatrix4fv(s.getUniformLocation(name), 1, false, &matrix[0])\n}", "title": "" }, { "docid": "2a93b77594967fb4374a56d914e0d04a", "score": "0.44404486", "text": "func (s *Shader) SetUniform1iv(location int32, count int32, arg interface{}) {\n\tvalue, ok := arg.(*int32)\n\tif !ok {\n\t\tlog.Warnf(\"%v is not of type *int32\", arg)\n\t\treturn\n\t}\n\tgl.Uniform1iv(location, count, value)\n}", "title": "" }, { "docid": "672e9e3d7f06ab129ad746fb46185a5a", "score": "0.443679", "text": "func (s *Shader) SetFloat(name string, value float32, useShader bool) {\n\tif useShader {\n\t\ts.Use()\n\t}\n\tgl.Uniform1f(s.getUniformLocation(name), value)\n}", "title": "" }, { "docid": "51018df9250aed800cbb62bf46a8f5fe", "score": "0.44331154", "text": "func Uniform2f(location int32, v0 float32, v1 float32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tcv0, _ := (C.GLfloat)(v0), cgoAllocsUnknown\n\tcv1, _ := (C.GLfloat)(v1), cgoAllocsUnknown\n\tC.glUniform2f(clocation, cv0, cv1)\n}", "title": "" }, { "docid": "1f49ffc34f7d01033c88a09f8828eff5", "score": "0.4432042", "text": "func Uniform1iv(location int32, count int32, value *int32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tccount, _ := (C.GLsizei)(count), cgoAllocsUnknown\n\tcvalue, _ := (*C.GLint)(unsafe.Pointer(value)), cgoAllocsUnknown\n\tC.glUniform1iv(clocation, ccount, cvalue)\n}", "title": "" }, { "docid": "7378fada494e60ede539994295ca5d96", "score": "0.44275934", "text": "func (c *Context) GetUniform(program, location js.Value) js.Value {\n\treturn c.Call(\"getUniform\", program, location)\n}", "title": "" }, { "docid": "431bc2441743f6f9c123cc15e013021d", "score": "0.4422173", "text": "func SetShaderValueMatrix(shader Shader, uniformLoc int32, mat Matrix) {\n\tcshader, _ := *(*C.Shader)(unsafe.Pointer(&shader)), cgoAllocsUnknown\n\tcuniformLoc, _ := (C.int)(uniformLoc), cgoAllocsUnknown\n\tcmat, _ := *(*C.Matrix)(unsafe.Pointer(&mat)), cgoAllocsUnknown\n\tC.SetShaderValueMatrix(cshader, cuniformLoc, cmat)\n}", "title": "" }, { "docid": "aecb473cd6ee0adaead9e0e4c88c922e", "score": "0.44093516", "text": "func (self *Texture) _updateUvsI(args ...interface{}) {\n self.Object.Call(\"_updateUvs\", args)\n}", "title": "" }, { "docid": "71823cbc8952790c8e1e427bfd66dab3", "score": "0.44083306", "text": "func (_m *EnvoyController) UpdateSnapshot(_a0 control_plane.UEInfoMap) {\n\t_m.Called(_a0)\n}", "title": "" }, { "docid": "e78bafb2519b137cff06ebbb2909be2f", "score": "0.4407378", "text": "func (n *Node) UpdateStats(metricsChange map[Metric]float64) {\n\tn.Uses++\n\tfor key, change := range metricsChange {\n\t\tn.Metrics[key] += change\n\t\tuses := n.Uses\n\t\tn.MetricsAvgs[key] = (n.MetricsAvgs[key]*(uses-1.0) + change) / uses\n\t}\n}", "title": "" }, { "docid": "c92ce700bda7fc4708ef4897eaa8c368", "score": "0.44015044", "text": "func (ds *DataShaderTex) UniViewToShader() (err error) {\n\tif ds.ShaderPtr == nil {\n\t\treturn errors.New(\"ds.ShaderPtr == nil // type *ShaderTr\")\n\t}\n\tif ds.UniPtr == nil {\n\t\treturn errors.New(\"ds.UniPtr == nil // type *GLUni\")\n\t}\n\n\tgl.UseProgram(ds.ShaderPtr.ProgramId)\n\tgl.UniformMatrix4fv(ds.ShaderPtr.ViewUni, 1, false, &(ds.UniPtr.ViewUni[0]))\n\n\treturn nil\n}", "title": "" }, { "docid": "55ef7bc6e7e2dd1bb75096e3f49f78a0", "score": "0.43961293", "text": "func (ds *DataShaderTr) UniProjectionToShader() (err error) {\n\tif ds.ShaderPtr == nil {\n\t\treturn errors.New(\"ds.ShaderPtr == nil // type *ShaderTr\")\n\t}\n\tif ds.UniPtr == nil {\n\t\treturn errors.New(\"ds.UniPtr == nil // type *GLUni\")\n\t}\n\n\tgl.UseProgram(ds.ShaderPtr.ProgramId)\n\tgl.UniformMatrix4fv(ds.ShaderPtr.ProjectionUni, 1, false, &(ds.UniPtr.ProjectionUni[0]))\n\n\treturn nil\n}", "title": "" }, { "docid": "70442cda3cb97b14701ab8940c7cd5f4", "score": "0.43912894", "text": "func Uniform2ui(location int32, v0 uint32, v1 uint32) {\n\tclocation, _ := (C.GLint)(location), cgoAllocsUnknown\n\tcv0, _ := (C.GLuint)(v0), cgoAllocsUnknown\n\tcv1, _ := (C.GLuint)(v1), cgoAllocsUnknown\n\tC.glUniform2ui(clocation, cv0, cv1)\n}", "title": "" }, { "docid": "ba265830e241e2112c7f06d76289444d", "score": "0.43911242", "text": "func (s *WavyFragShader) Apply(win *pixelgl.Window) {\n\ts.uTime = float32(time.Since(s.startTime).Seconds())\n\n\twin.Canvas().SetUniform(\"uTime\", &s.uTime)\n\twin.Canvas().SetUniform(\"uSpeed\", &s.uSpeed)\n\twin.Canvas().SetFragmentShader(s.glsl)\n}", "title": "" } ]
78931e6002358c3573bd8532246f3295
Open an object for read
[ { "docid": "a5b2f488987e3c64bbcffc0c232f7deb", "score": "0.70471203", "text": "func (o *Object) Open(ctx context.Context, options ...fs.OpenOption) (in io.ReadCloser, err error) {\n\tdefer log.Trace(o, \"\")(\"\")\n\terr = o.readMetaData(ctx)\n\tif err != nil {\n\t\tfs.Debugf(o, \"Open: Failed to read metadata: %v\", err)\n\t\treturn nil, err\n\t}\n\tvar resp *http.Response\n\topts := rest.Opts{\n\t\tMethod: \"GET\",\n\t\tRootURL: o.downloadURL(),\n\t\tOptions: options,\n\t}\n\terr = o.fs.pacer.Call(func() (bool, error) {\n\t\tresp, err = o.fs.srv.Call(ctx, &opts)\n\t\treturn shouldRetry(ctx, resp, err)\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn resp.Body, err\n}", "title": "" } ]
[ { "docid": "13b765ac036e424068ebfd4699657843", "score": "0.74242854", "text": "func (om *Manager) Open(ctx context.Context, objectID ID) (Reader, error) {\n\treturn om.openAndAssertLength(ctx, objectID, -1)\n}", "title": "" }, { "docid": "d226d8d77eb6aa60b3b70ef5cd200196", "score": "0.69757795", "text": "func (o *LargeObjects) Open(oid Oid, mode LargeObjectMode) (*LargeObject, error) {\n\tfd, err := fpInt32(o.fp.CallFn(\"lo_open\", []fpArg{fpIntArg(int32(oid)), fpIntArg(int32(mode))}))\n\treturn &LargeObject{fd: fd, lo: o}, err\n}", "title": "" }, { "docid": "756a0f8a531bd73db9bbfd386b8d5cd0", "score": "0.68922323", "text": "func (o *Object) Open(ctx context.Context, options ...fs.OpenOption) (in io.ReadCloser, err error) {\n\tvar offset, limit int64 = 0, -1\n\tfor _, option := range options {\n\t\tswitch x := option.(type) {\n\t\tcase *fs.RangeOption:\n\t\t\toffset, limit = x.Decode(int64(len(o.od.data)))\n\t\tcase *fs.SeekOption:\n\t\t\toffset = x.Offset\n\t\tdefault:\n\t\t\tif option.Mandatory() {\n\t\t\t\tfs.Logf(o, \"Unsupported mandatory option: %v\", option)\n\t\t\t}\n\t\t}\n\t}\n\tif offset > int64(len(o.od.data)) {\n\t\toffset = int64(len(o.od.data))\n\t}\n\tdata := o.od.data[offset:]\n\tif limit >= 0 {\n\t\tif limit > int64(len(data)) {\n\t\t\tlimit = int64(len(data))\n\t\t}\n\t\tdata = data[:limit]\n\t}\n\treturn io.NopCloser(bytes.NewBuffer(data)), nil\n}", "title": "" }, { "docid": "77eec34381997c1857051a4e928c7118", "score": "0.6849365", "text": "func (bk *RadosBucket) OpenRead(key string) (rd ObjectReader, err error) {\n\treturn &RadosObjectReader{\n\t\tbucket: bk,\n\t\tname: key,\n\t\toffset: uint64(0),\n\t}, nil\n}", "title": "" }, { "docid": "f096039e360ee598ea442f6b56d256a7", "score": "0.6692878", "text": "func Open(ctx context.Context, object storage.Object, options ...storage.Option) (io.ReadCloser, error) {\n\treturn OpenURL(ctx, object.URL(), options...)\n}", "title": "" }, { "docid": "2395dcf49906ff82bfdb08089e893d85", "score": "0.661976", "text": "func (o *Object) Open(ctx context.Context, options ...fs.OpenOption) (io.ReadCloser, error) {\n\tfs.FixRangeOption(options, o.file.Size)\n\tdownloadToken, err := o.fs.getDownloadToken(ctx, o.file.URL)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar resp *http.Response\n\topts := rest.Opts{\n\t\tMethod: \"GET\",\n\t\tRootURL: downloadToken.URL,\n\t\tOptions: options,\n\t}\n\n\terr = o.fs.pacer.Call(func() (bool, error) {\n\t\tresp, err = o.fs.rest.Call(ctx, &opts)\n\t\treturn shouldRetry(ctx, resp, err)\n\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn resp.Body, err\n}", "title": "" }, { "docid": "71192ca918703e15e9fe515e9276715c", "score": "0.6438504", "text": "func (o *Object) Open(options ...fs.OpenOption) (in io.ReadCloser, err error) {\n\treq, res, err := o.httpResponse(\"GET\", options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t_, isRanging := req.Header[\"Range\"]\n\tif !(res.StatusCode == http.StatusOK || (isRanging && res.StatusCode == http.StatusPartialContent)) {\n\t\t_ = res.Body.Close() // ignore error\n\t\treturn nil, errors.Errorf(\"bad response: %d: %s\", res.StatusCode, res.Status)\n\t}\n\t// If it is a document, update the size with what we are\n\t// reading as it can change from the HEAD in the listing to\n\t// this GET. This stops rclone marking the transfer as\n\t// corrupted.\n\tif o.isDocument {\n\t\treturn &openFile{o: o, in: res.Body}, nil\n\t}\n\treturn res.Body, nil\n}", "title": "" }, { "docid": "41f20735773c36bcdc18c0e1a6cbc0d5", "score": "0.6427255", "text": "func (pf *PackFile) OpenObject(offset int64) (Object, error) {\n\n\tobj, err := pf.readRawObject(offset)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tswitch obj.otype {\n\tcase ObjCommit:\n\t\treturn parseCommit(obj)\n\tcase ObjTree:\n\t\treturn parseTree(obj)\n\tcase ObjBlob:\n\t\treturn parseBlob(obj)\n\tcase ObjTag:\n\t\treturn parseTag(obj)\n\n\tcase ObjOFSDelta:\n\t\tfallthrough\n\tcase ObjRefDelta:\n\t\treturn parseDelta(obj)\n\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"git: unknown object type\")\n\t}\n}", "title": "" }, { "docid": "9399c5bd37089e1ca7636e258a0d044d", "score": "0.6390635", "text": "func (o *Object) Open(ctx context.Context, options ...fs.OpenOption) (in io.ReadCloser, err error) {\n\tvar offset, limit int64 = 0, -1\n\tfor _, option := range options {\n\t\tswitch x := option.(type) {\n\t\tcase *fs.SeekOption:\n\t\t\toffset = x.Offset\n\t\tcase *fs.RangeOption:\n\t\t\toffset, limit = x.Decode(o.Size())\n\t\tdefault:\n\t\t\tif option.Mandatory() {\n\t\t\t\tfs.Logf(o, \"Unsupported mandatory option: %v\", option)\n\t\t\t}\n\t\t}\n\t}\n\tc, err := o.fs.getSftpConnection(ctx)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Open: %w\", err)\n\t}\n\tsftpFile, err := c.sftpClient.Open(o.path())\n\to.fs.putSftpConnection(&c, err)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Open failed: %w\", err)\n\t}\n\tif offset > 0 {\n\t\toff, err := sftpFile.Seek(offset, io.SeekStart)\n\t\tif err != nil || off != offset {\n\t\t\treturn nil, fmt.Errorf(\"Open Seek failed: %w\", err)\n\t\t}\n\t}\n\tin = readers.NewLimitedReadCloser(o.fs.newObjectReader(sftpFile), limit)\n\treturn in, nil\n}", "title": "" }, { "docid": "20e373d07085f4f6966af5b2cae8c9fc", "score": "0.6388006", "text": "func (o *Object) Open(ctx context.Context, options ...fs.OpenOption) (io.ReadCloser, error) {\n\tbucket, bucketPath := o.split()\n\tbucketInit, err := o.fs.svc.Bucket(bucket, o.fs.zone)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq := qs.GetObjectInput{}\n\tfs.FixRangeOption(options, o.size)\n\tfor _, option := range options {\n\t\tswitch option.(type) {\n\t\tcase *fs.RangeOption, *fs.SeekOption:\n\t\t\t_, value := option.Header()\n\t\t\treq.Range = &value\n\t\tdefault:\n\t\t\tif option.Mandatory() {\n\t\t\t\tfs.Logf(o, \"Unsupported mandatory option: %v\", option)\n\t\t\t}\n\t\t}\n\t}\n\tresp, err := bucketInit.GetObject(bucketPath, &req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn resp.Body, nil\n}", "title": "" }, { "docid": "91993b2d02866a0d12b7ae42ab24526e", "score": "0.6346097", "text": "func openROLazy(path string) io.Reader {\n\treturn &lazyROFile{Path: path}\n}", "title": "" }, { "docid": "2fc5091de4a6cc63f05c6352f6243e20", "score": "0.6345199", "text": "func (pi *PackIndex) OpenObject(id SHA1) (Object, error) {\n\n\toff, err := pi.FindOffset(id)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpf, err := pi.OpenPackFile()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tobj, err := pf.readRawObject(off)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif IsStandardObject(obj.otype) {\n\t\treturn parseObject(obj)\n\t}\n\n\tif !IsDeltaObject(obj.otype) {\n\t\treturn nil, fmt.Errorf(\"git: unsupported object\")\n\t}\n\n\t//This is a delta object\n\tdelta, err := parseDelta(obj)\n\n\treturn delta, err\n}", "title": "" }, { "docid": "3172ffdf29f902c92bc0f7892c6ed3f3", "score": "0.6317084", "text": "func Open(ctx context.Context, path string) (FileReader, error) { return Default.Open(ctx, path) }", "title": "" }, { "docid": "b314998a8d53fcae79c3d0b9c20175c8", "score": "0.6313468", "text": "func (d *dummy) Open() error { return nil }", "title": "" }, { "docid": "36949ab495cfb2feda117024112945f9", "score": "0.6264582", "text": "func (sr *shimRepository) OpenObject(ctx context.Context, id object.ID) (object.Reader, error) {\n\treader, err := sr.udmRepo.OpenObject(ctx, udmrepo.ID(id.String()))\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"failed to open object with id %v\", id)\n\t}\n\tif reader == nil {\n\t\treturn nil, err\n\t}\n\n\treturn &shimObjectReader{\n\t\trepoReader: reader,\n\t}, err\n}", "title": "" }, { "docid": "e77955c6d2e63de21f540c7236f0c019", "score": "0.6133853", "text": "func (o *Object) Reader() (core.ObjectReader, error) {\n\treturn ioutil.NopCloser(bytes.NewBuffer(o.content)), nil\n}", "title": "" }, { "docid": "e63ced5d599c3827869f85c562593fc4", "score": "0.6130706", "text": "func Open(name string) (ReadOnlyFile, error) {\n\treturn Resource.Open(name)\n}", "title": "" }, { "docid": "6a94b9b8382eb774fe7b3b29061c267a", "score": "0.6125066", "text": "func OpenRead(filename string) (*Db, error) {\n\treturn open(filename, 0, 1)\n}", "title": "" }, { "docid": "2cd6e835de8bb91ef7ca61a3b6f2bee5", "score": "0.6087849", "text": "func ReadObj(objType, objKey string, retVal interface{}) error {\n\tkey := \"/modeldb/\" + objType + \"/\" + objKey\n\terr := cdb.GetObj(key, retVal)\n\tif err != nil {\n\t\tlog.Errorf(\"Error reading object: %s. Err: %v\", key, err)\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0caca29e6b6a7794e9232e6598e5a55c", "score": "0.60719335", "text": "func ReadObject(kapi client.KeysAPI, ctxt context.Context, path string, v interface{}) error {\n\tresp, err := kapi.Get(ctxt, path, &client.GetOptions{Recursive: true})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn processNode(resp.Node, v, \"\")\n\n}", "title": "" }, { "docid": "4239682ab9cdb7c1f5520344c021ccd7", "score": "0.6062819", "text": "func (p *Prog) Open() io.ReadSeeker { return io.NewSectionReader(p.sr, 0, 1<<63-1) }", "title": "" }, { "docid": "776542cdbe9bc1f9d692303fade90f33", "score": "0.6055054", "text": "func (v *Validating) Open(id c4.ID) (io.ReadCloser, error) {\n\tr, err := v.s.Open(id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &validatingReader{sha512.New(), id, r}, nil\n}", "title": "" }, { "docid": "0c045303aa52a025e94aa910ac050896", "score": "0.60520875", "text": "func (f *file) Object(o ObjectNumber) (object Object,err error) {\n\tentry := (*f.xref.At(uint(o.number))).(*xrefEntry)\n\tvar r Scanner\n\n\t// Reads can trigger additional reads, so this routine is\n\t// recursive (For example, read a stream dictionary containing\n\t// an indirect reference to the stream length; read the length\n\t// from another part of the file, then return to the original\n\t// position to read the stream data. All reads occur in main\n\t// goroutine so there should never be more than one goroutine\n\t// manipulating f.readNesting.\n\tif f.readNesting == 0 {\n\t\t// Block writes\n\t\t<-f.semaphore\n\t}\n\tf.readNesting += 1\n\n\tif entry.serialization == nil {\n\t\t// Save file position before moving for later restore\n\t\t// so that f.Writer is unaware of the move.\n\t\tposition,_ := f.file.Seek(0, os.SEEK_CUR)\n\t\tf.file.Seek(int64(entry.byteOffset),os.SEEK_SET)\n\n\t\tr = bufio.NewReader(f.file)\n\t\tobject,err = NewParser(r).ScanIndirect(o, f)\n\n\t\t// Restore position\n\t\tf.file.Seek(position,os.SEEK_SET)\n\t} else {\n\t\tr = bytes.NewReader(entry.serialization)\n\t\t// Cached entry does not contain \"obj\" header and \"endobj\" trailer\n\t\t// so use Parser.Scan() rather than Parser.ScanIndirect().\n\t\tobject,err = NewParser(r).Scan(f)\n\t\tfmt.Fprintf(logger, \"Object pulled from cache: \\\"%v\\\"\\n\", string(entry.serialization))\n\t}\n\n\tf.readNesting -= 1\n\tif f.readNesting == 0 {\n\t\t// Allow writes\n\t\tf.semaphore<-true\n\t}\n\n\treturn object,err\n}", "title": "" }, { "docid": "38a99adc1efdc52ec60983607401e256", "score": "0.59749204", "text": "func ReadObject(file string, into apimachineryRuntime.Object) error {\n\tdata, err := ioutil.ReadFile(file)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, _, err = serializer.NewCodecFactory(kubernetes.GardenScheme).UniversalDecoder().Decode(data, nil, into)\n\treturn err\n}", "title": "" }, { "docid": "f02f8ce156c6ed2a0bd4b3f8a49ad48a", "score": "0.59659135", "text": "func (r *inMemReader) Open() (io.ReadCloser, error) {\n\treturn &bytesReaderCloser{*bytes.NewReader(r.data.Bytes())}, nil\n}", "title": "" }, { "docid": "477b65e6135666620ae8d671b1a64e39", "score": "0.5953174", "text": "func (dp *OfflineDataProvider) Reader(lom *cluster.LOM) (cos.ReadOpenCloser, cmn.ObjAttrsHolder, error) {\n\tvar (\n\t\tr cos.ReadCloseSizer\n\t\terr error\n\t)\n\tcall := func() (int, error) {\n\t\tr, err = dp.comm.OfflineTransform(lom.Bck(), lom.ObjName, dp.requestTimeout)\n\t\treturn 0, err\n\t}\n\t// TODO: Check if ETL pod is healthy and wait some more if not (yet).\n\terr = cmn.NetworkCallWithRetry(&cmn.CallWithRetryArgs{\n\t\tCall: call,\n\t\tAction: \"etl-obj-\" + lom.Uname(),\n\t\tSoftErr: 5,\n\t\tHardErr: 2,\n\t\tSleep: 50 * time.Millisecond,\n\t\tBackOff: true,\n\t\tVerbosity: cmn.CallWithRetryLogQuiet,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\toah := &cmn.ObjAttrs{\n\t\tSize: r.Size(),\n\t\tVer: \"\", // after ETL a new object\n\t\tCksum: cos.NoneCksum, // TODO: checksum\n\t\tAtime: lom.AtimeUnix(),\n\t}\n\treturn cos.NopOpener(r), oah, nil\n}", "title": "" }, { "docid": "7b42fcaff4a60cea3e1e8b05e63719c5", "score": "0.5951935", "text": "func (c *Client) readObject(typename string, href string) (IObject, error) {\n\turl := fmt.Sprintf(\"%s?exclude_back_refs=true&exclude_children=true\",\n\t\thref)\n\tresp, err := c.httpGet(url)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn nil, fmt.Errorf(\"%s: %s\", resp.Status, body)\n\t}\n\n\tvar m map[string]*json.RawMessage\n\terr = json.Unmarshal(body, &m)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcontent, ok := m[typename]\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"No %s in Response\", typename)\n\t}\n\n\tvar xtype reflect.Type = typeMap[typename]\n\tvalueT := reflect.New(xtype)\n\tobj := valueT.Interface().(IObject)\n\terr = json.Unmarshal(*content, obj)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tobj.SetClient(c)\n\treturn obj, err\n}", "title": "" }, { "docid": "438dcae1073b05c0ef8423f0b5b6292a", "score": "0.593445", "text": "func OpenReadOnly(path string, opts ...carv2.Option) (*ReadOnly, error) {\n\tf, err := mmap.Open(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trobs, err := NewReadOnly(f, nil, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\trobs.carv2Closer = f\n\n\treturn robs, nil\n}", "title": "" }, { "docid": "c42587ce5ccba7f85e20a4895c1c9bfe", "score": "0.5931821", "text": "func (fs *MemoryFS) Read(decoder runtime.Decoder, p string, newFunc func() runtime.Object) (runtime.Object, error) {\n\tfs.mu.Lock()\n\tbuf, err := fs.readBuffer(p)\n\tfs.mu.Unlock()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tobj, err := fs.decodeBuffer(decoder, buf, newFunc)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn obj, nil\n}", "title": "" }, { "docid": "9b9cd7b60b1c076043ed9ba23a6d7bf6", "score": "0.5914611", "text": "func (fs *FileSystem) Open(ctx context.Context, name string) (io.ReadCloser, error) {\n\tsvc := fs.s3()\n\tresp, err := svc.GetObject(ctx, &s3.GetObjectInput{\n\t\tBucket: aws.String(fs.Bucket),\n\t\tKey: aws.String(fs.filekey(name)),\n\t})\n\tif err != nil {\n\t\tvar respErr *awshttp.ResponseError\n\t\tif errors.As(err, &respErr) {\n\t\t\tswitch respErr.HTTPStatusCode() {\n\t\t\tcase http.StatusNotFound:\n\t\t\t\treturn nil, &os.PathError{\n\t\t\t\t\tOp: \"open\",\n\t\t\t\t\tPath: filename(name),\n\t\t\t\t\tErr: os.ErrNotExist,\n\t\t\t\t}\n\t\t\tcase http.StatusForbidden:\n\t\t\t\treturn nil, &os.PathError{\n\t\t\t\t\tOp: \"open\",\n\t\t\t\t\tPath: filename(name),\n\t\t\t\t\tErr: os.ErrPermission,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn nil, &os.PathError{\n\t\t\tOp: \"open\",\n\t\t\tPath: filename(name),\n\t\t\tErr: err,\n\t\t}\n\t}\n\treturn resp.Body, nil\n}", "title": "" }, { "docid": "3c396f8ea0f065bd26c841db13150ca6", "score": "0.58778584", "text": "func (b *Builder) OpenObject(unindexed ...bool) error {\n\tvar vType byte\n\tif optionalBool(unindexed, false) {\n\t\tvType = 0x14\n\t} else {\n\t\tvType = 0x0b\n\t}\n\treturn WithStack(b.openCompoundValue(vType))\n}", "title": "" }, { "docid": "d13cba2324130f55b774289f1817cd44", "score": "0.58585167", "text": "func (f *FileInode) openReader(ctx context.Context) (io.ReadCloser, error) {\n\trc, err := f.bucket.NewReader(\n\t\tctx,\n\t\t&gcs.ReadObjectRequest{\n\t\t\tName: f.src.Name,\n\t\t\tGeneration: f.src.Generation,\n\t\t\tReadCompressed: f.src.HasContentEncodingGzip(),\n\t\t})\n\tif err != nil {\n\t\terr = fmt.Errorf(\"NewReader: %w\", err)\n\t}\n\treturn rc, err\n}", "title": "" }, { "docid": "627c2c2dfb0583f0992357ba60bdb58f", "score": "0.58142614", "text": "func ReadObject(path string) (*models.CommitModel, error) {\n\tbuf, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn readCompressedData(buf)\n}", "title": "" }, { "docid": "57242dcbdb2c2c1e2d7978676fbeb492", "score": "0.5812025", "text": "func (s3Select *S3Select) Open(getReader func(offset, length int64) (io.ReadCloser, error)) error {\n\tswitch s3Select.Input.format {\n\tcase csvFormat:\n\t\trc, err := getReader(0, -1)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\ts3Select.progressReader, err = newProgressReader(rc, s3Select.Input.CompressionType)\n\t\tif err != nil {\n\t\t\trc.Close()\n\t\t\treturn err\n\t\t}\n\n\t\ts3Select.recordReader, err = csv.NewReader(s3Select.progressReader, &s3Select.Input.CSVArgs)\n\t\tif err != nil {\n\t\t\trc.Close()\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\tcase jsonFormat:\n\t\trc, err := getReader(0, -1)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\ts3Select.progressReader, err = newProgressReader(rc, s3Select.Input.CompressionType)\n\t\tif err != nil {\n\t\t\trc.Close()\n\t\t\treturn err\n\t\t}\n\n\t\ts3Select.recordReader = json.NewReader(s3Select.progressReader, &s3Select.Input.JSONArgs)\n\t\treturn nil\n\tcase parquetFormat:\n\t\tvar err error\n\t\ts3Select.recordReader, err = parquet.NewReader(getReader, &s3Select.Input.ParquetArgs)\n\t\treturn err\n\t}\n\n\tpanic(fmt.Errorf(\"unknown input format '%v'\", s3Select.Input.format))\n}", "title": "" }, { "docid": "a8ae1f59ac6815dca21437ba0c6f8e85", "score": "0.5800488", "text": "func (recv *FileInputStream) Object() *gobject.Object {\n\treturn recv.InputStream().Object()\n}", "title": "" }, { "docid": "db70c081efe8a2558bb5177db8b84da3", "score": "0.5770974", "text": "func (lob *Lob) OpenReader() (lobr *LobReader, err error) {\n\terr = lob.conn.cerr(oci_OCILobOpen.Call(\n\t\tlob.conn.serv.ptr,\n\t\tlob.conn.err.ptr,\n\t\tlob.ptr,\n\t\tOCI_LOB_READONLY))\n\n\treturn &LobReader{Lob: lob, offset: 1}, err\n}", "title": "" }, { "docid": "078e858a823d6445bcdb92dc1f52e8bc", "score": "0.57441986", "text": "func Open(reader io.Reader) *SRecordReader {\n\tresult := SRecordReader{\n\t\treader: bufio.NewReader(reader),\n\t}\n\treturn &result\n}", "title": "" }, { "docid": "c39dddd04ddcd3b1d95d0a8b74ea55c5", "score": "0.57379127", "text": "func (o *MemoryObject) Reader() (io.ReadCloser, error) {\n\treturn nopCloser{bytes.NewReader(o.cont)}, nil\n}", "title": "" }, { "docid": "170612c449a9c2fe972e55dc17293b1b", "score": "0.57278633", "text": "func (d *DotGit) Object(h plumbing.Hash) (billy.File, error) {\n\thash := h.String()\n\tfile := d.fs.Join(objectsPath, hash[0:2], hash[2:40])\n\n\treturn d.fs.Open(file)\n}", "title": "" }, { "docid": "27c0d3c9f9e99994b1afcfe08cfaf42d", "score": "0.5704284", "text": "func openReader(name string) (*ReadCloser, error) {\n\ttr, f, err := openFile(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tr := new(ReadCloser)\n\tif err := r.init(tr); err != nil {\n\t\treturn nil, err\n\t}\n\tr.f = f\n\treturn r, nil\n}", "title": "" }, { "docid": "b0b4ad997437682c8bfd9b361086e7e9", "score": "0.57019776", "text": "func (c *FakeClient) ReadObject(bucket, objectKey string) ([]byte, error) {\n\treturn nil, nil\n}", "title": "" }, { "docid": "4890aa860f523c303842e1cea22f4f8a", "score": "0.56951433", "text": "func (pres *presentDay) open(st store) (rerr error) {\n\tdefer func() { pres.sc.Reset(pres.FileArena) }()\n\n\tif err := pres.reset(); err != nil {\n\t\treturn err\n\t}\n\trc, err := st.open()\n\tif err != nil {\n\t\treturn err\n\t}\n\tra, size, err := sizedReaderAt(rc)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn pres.FileArena.Reset(ra, size)\n}", "title": "" }, { "docid": "d08b5f9505d544ece60a1af14e7a973a", "score": "0.5684512", "text": "func ReadObject(bucketName string, key string, version int64) (payload []byte, err error) {\n\tctx := context.Background()\n\tclient, err := storage.NewClient(ctx)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to create storage client: %v\", err)\n\t}\n\n\tbucket := client.Bucket(bucketName)\n\n\tctx, cancel := context.WithTimeout(ctx, time.Second*300)\n\tdefer cancel()\n\n\tobject := bucket.Object(key)\n\tif version != 0 {\n\t\tobject = object.Generation(version)\n\t}\n\treader, err := object.NewReader(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer reader.Close()\n\n\tdata, err := ioutil.ReadAll(reader)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn data, nil\n}", "title": "" }, { "docid": "0703f198ed218e70733f21b6a1b78b15", "score": "0.5681739", "text": "func (fs *fileSystem) Open(path string) (http.File, error) {\n\trf, err := fs.RemoteOpen(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rf.Close()\n\n\tbuf, err := ioutil.ReadAll(rf)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &file{\n\t\tReadSeeker: bytes.NewReader(buf),\n\t\tstat: &fileInfo{\n\t\t\tname: rf.Name,\n\t\t\tsize: rf.Size,\n\t\t\tmodTime: rf.ModTime,\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "f7eb106cd357b1aabbf950071e8c9e82", "score": "0.56806713", "text": "func Open(path, layout string) (Pool, error) {\n\tpop, err := C.pmemobj_open(C.CString(path), C.CString(layout))\n\treturn Pool{pop, pop != nil}, err\n}", "title": "" }, { "docid": "247aec77f4c80f0cede0fdfc4d16fa93", "score": "0.56680363", "text": "func (recv *FileIOStream) Object() *gobject.Object {\n\treturn recv.IOStream().Object()\n}", "title": "" }, { "docid": "4feacfe98b057f0c25615c3908a38eab", "score": "0.5665592", "text": "func (l *InMemLoader) Open(templatePath string) (io.ReadCloser, error) {\n\ttemplatePath = l.normalize(templatePath)\n\tl.lock.RLock()\n\tdefer l.lock.RUnlock()\n\tf, ok := l.files[templatePath]\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"%s does not exist\", templatePath)\n\t}\n\n\treturn ioutil.NopCloser(bytes.NewReader(f)), nil\n}", "title": "" }, { "docid": "01517d9a2e8cb8deb07c2404bb37af83", "score": "0.56602967", "text": "func Open(filepath string) (*Project, error) {\n\n\tvar project *Project\n\n\tvar bytes []byte\n\tvar err error\n\n\tbytes, err = ioutil.ReadFile(filepath)\n\n\tif err == nil {\n\t\tproject, err = Read(bytes)\n\t}\n\n\treturn project, err\n\n}", "title": "" }, { "docid": "2ac6ebf77c5bc423e3a95362a4f855ea", "score": "0.5654142", "text": "func (r *randReader) Open() (io.ReadCloser, error) {\n\treturn &randReader{\n\t\tseed: r.seed,\n\t\trnd: rand.New(rand.NewSource(r.seed)),\n\t\tsize: r.size,\n\t\txxHash: r.xxHash,\n\t}, nil\n}", "title": "" }, { "docid": "632739c46ed03ed4d560653fd53e5b1e", "score": "0.56474626", "text": "func (oc *objectContent) newReader(\n\tctx context.Context,\n\ttgs *TGStore,\n\taead cipher.AEAD,\n\toffset int64,\n) (io.ReadCloser, error) {\n\tif offset >= oc.Size {\n\t\treturn ioutil.NopCloser(bytes.NewReader(nil)), nil\n\t}\n\n\tfullChunkOffset := offset / objectChunkSize\n\toffset -= fullChunkOffset * objectChunkSize\n\n\trc, err := tgs.downloadTelegramFile(\n\t\tctx,\n\t\toc.ID,\n\t\tfullChunkOffset*objectEncryptedChunkSize,\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpipeReader, pipeWriter := io.Pipe()\n\tgo func() (err error) {\n\t\tdefer func() {\n\t\t\tpipeWriter.CloseWithError(err)\n\t\t\trc.Close()\n\t\t}()\n\n\t\tbuf := make([]byte, objectEncryptedChunkSize)\n\t\tfor {\n\t\t\tn, err := io.ReadFull(rc, buf)\n\t\t\tif err != nil {\n\t\t\t\tif errors.Is(err, io.EOF) {\n\t\t\t\t\tbreak\n\t\t\t\t} else if !errors.Is(err, io.ErrUnexpectedEOF) {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tnonce := buf[:chacha20poly1305.NonceSize]\n\t\t\tchunkContent := buf[chacha20poly1305.NonceSize:n]\n\t\t\tif chunkContent, err = aead.Open(\n\t\t\t\tchunkContent[:0],\n\t\t\t\tnonce,\n\t\t\t\tchunkContent,\n\t\t\t\tnil,\n\t\t\t); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif offset > 0 {\n\t\t\t\tchunkContent = chunkContent[offset:]\n\t\t\t\toffset = 0\n\t\t\t}\n\n\t\t\tif _, err := pipeWriter.Write(\n\t\t\t\tchunkContent,\n\t\t\t); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\treturn nil\n\t}()\n\n\treturn pipeReader, nil\n}", "title": "" }, { "docid": "611d7ee36c90810f36123d30454bf45f", "score": "0.5646718", "text": "func (o *Object) Read(ctx context.Context, req *fuse.ReadRequest, resp *fuse.ReadResponse) error {\n\tLog.Debugf(\"Read: Requested %d bytes\", req.Size)\n\n\tvar err error\n\tresp.Data, err = o.fromChunks(ctx, req.Offset, int64(req.Size))\n\n\tLog.Debugf(\"Read: Returned %d bytes\", len(resp.Data))\n\treturn toFuseErr(ctx, err)\n}", "title": "" }, { "docid": "977443e6f7ecfa585259bfdd256836c1", "score": "0.5637458", "text": "func (os *jsonObjectStream) ReadObject(v interface{}) error { return os.decoder.Decode(v) }", "title": "" }, { "docid": "91f1fa682b7fa390ddb68967c41435c3", "score": "0.56319934", "text": "func Open(name string, options ...ClientOption) (io.ReadCloser, error) {\n\tc, err := New(options...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn c.Open(name)\n}", "title": "" }, { "docid": "f8fd4d6254f32470aff9c5061e56dd4e", "score": "0.56308943", "text": "func (j *JSONPod) Open(path string) error {\n\tf, err := os.Open(path)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer f.Close()\n\n\treturn json.NewDecoder(f).Decode(j.v)\n}", "title": "" }, { "docid": "30bd35599c916d96bf29100ba8fa9131", "score": "0.5629806", "text": "func (fsys Fsys) Open(p string) (io.ReadCloser, error) {\n\treturn os.Open(p)\n}", "title": "" }, { "docid": "f0f080d963fe2c4fbebff9b5fe383d4a", "score": "0.56050587", "text": "func OpenForRead(lg *zap.Logger, dirpath string, snap walpb.Snapshot) (*WAL, error) {\n\treturn openAtIndex(lg, dirpath, snap, false)\n}", "title": "" }, { "docid": "578e959065baeb749e49c735ff5bd5f9", "score": "0.56014204", "text": "func (or *ObjectReader) Read(b []byte) (int, error) {\n\tor.mutex.Lock()\n\tdefer or.mutex.Unlock()\n\n\tif or.closed {\n\t\treturn 0, os.ErrClosed\n\t} else if or.offset >= or.object.Size {\n\t\treturn 0, io.EOF\n\t}\n\n\tif or.readCloser == nil {\n\t\tpipeReader, pipeWriter := io.Pipe()\n\t\tgo func() (err error) {\n\t\t\tdefer func() {\n\t\t\t\tpipeWriter.CloseWithError(err)\n\t\t\t}()\n\n\t\t\toffset := or.offset\n\t\t\tfor _, content := range or.object.contents {\n\t\t\t\tif content.Size > offset {\n\t\t\t\t\tcr, err := content.newReader(\n\t\t\t\t\t\tor.ctx,\n\t\t\t\t\t\tor.object.tgs,\n\t\t\t\t\t\tor.object.aead,\n\t\t\t\t\t\toffset,\n\t\t\t\t\t)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\n\t\t\t\t\t_, err = io.Copy(pipeWriter, cr)\n\t\t\t\t\tcr.Close()\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\n\t\t\t\t\toffset = 0\n\t\t\t\t} else {\n\t\t\t\t\toffset -= content.Size\n\t\t\t\t}\n\t\t\t}\n\n\t\t\treturn nil\n\t\t}()\n\n\t\tor.readCloser = pipeReader\n\t}\n\n\tn, err := or.readCloser.Read(b)\n\tor.offset += int64(n)\n\n\treturn n, err\n}", "title": "" }, { "docid": "5b0d38f03a09ed4e31257ef7cf9f505f", "score": "0.5588869", "text": "func (c *Collection) Open(name string) (ReadStream, error) {\n\treturn c.open(name, false)\n}", "title": "" }, { "docid": "a4a3cc0d5b7f6ac75b2a6ef16d639733", "score": "0.5587072", "text": "func (c *Collection) Openl(name string) (ReadStream, error) {\n\treturn c.open(name, true)\n}", "title": "" }, { "docid": "17ed86becfc0685366f091dabe043bc9", "score": "0.557797", "text": "func Open(path string) (io.ReadCloser, error) {\n\tif path == \"\" {\n\t\treturn nil, errors.New(\"Missing file path\")\n\t}\n\tm, err := magic(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\thandle, err := os.Open(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif m == Gzip {\n\t\tgzipHandle, err := gzip.NewReader(handle)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn gzipHandle, nil\n\t}\n\treturn handle, nil\n}", "title": "" }, { "docid": "735187d51ea9e78cd3769292d94d7b68", "score": "0.55592585", "text": "func Open(path string, rw bool) (*File, error) {\n\tvar flag h5f.Flag\n\tif rw {\n\t\tflag = h5f.RW\n\t} else {\n\t\tflag = h5f.RO\n\t}\n\tfid, err := h5f.Open(path, flag, FileAccess)\n\tout := &File{\n\t\tloc: new(loc),\n\t\tFile: fid,\n\t\tpath: path,\n\t}\n\tout.loc.at = \"\"\n\tout.loc.where = out\n\tout.loc.in = out\n\tif err != nil {\n\t\treturn out, err\n\t}\n\treturn out, out.defaults()\n}", "title": "" }, { "docid": "2ddfc702356b9e30fbaaa699d8032e92", "score": "0.555222", "text": "func Open(path string) (*Stardict, error) {\n\ts := &Stardict{\n\t\tifoPath: path,\n\t\tidxoffsetbits: 32,\n\t}\n\n\tifoExt := filepath.Ext(s.ifoPath)\n\tif ifoExt != \".ifo\" && ifoExt != \".IFO\" {\n\t\treturn nil, fmt.Errorf(\"bad extension: %v\", ifoExt)\n\t}\n\n\tifoFile, err := os.Open(s.ifoPath)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error opening %q: %w\", s.ifoPath, err)\n\t}\n\tdefer ifoFile.Close()\n\n\ts.ifo, err = ifo.New(ifoFile)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error reading %q: %w\", s.ifoPath, err)\n\t}\n\n\tif s.ifo.Magic() != ifoMagic {\n\t\treturn nil, fmt.Errorf(\"%q bad magic data\", s.ifoPath)\n\t}\n\n\t// Validate the version\n\ts.version = s.ifo.Value(\"version\")\n\tswitch s.version {\n\tcase \"2.4.2\":\n\tcase \"3.0.0\":\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"invalid version: %v\", s.version)\n\t}\n\n\ts.bookname = s.ifo.Value(\"bookname\")\n\tif s.bookname == \"\" {\n\t\treturn nil, fmt.Errorf(\"missing bookname\")\n\t}\n\n\ts.wordcount, err = strconv.ParseInt(s.ifo.Value(\"wordcount\"), 10, 64)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"bad wordcount: %w\", err)\n\t}\n\n\ts.idxfilesize, err = strconv.ParseInt(s.ifo.Value(\"idxfilesize\"), 10, 64)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"bad idxfilesize: %w\", err)\n\t}\n\n\tidxoffsetbits := s.ifo.Value(\"idxoffsetbits\")\n\tif idxoffsetbits != \"\" && s.version == \"3.0.0\" {\n\t\ts.idxoffsetbits, err = strconv.ParseInt(idxoffsetbits, 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid idxoffsetbits: %w\", err)\n\t\t}\n\t}\n\n\tsynwordcount := s.ifo.Value(\"synwordcount\")\n\tif synwordcount != \"\" {\n\t\ts.synwordcount, err = strconv.ParseInt(synwordcount, 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"bad synwordcount: %w\", err)\n\t\t}\n\t}\n\n\tsametypesequence := s.ifo.Value(\"sametypesequence\")\n\tif sametypesequence != \"\" {\n\t\tfor _, r := range sametypesequence {\n\t\t\ts.sametypesequence = append(s.sametypesequence, dict.DataType(r))\n\t\t}\n\t}\n\n\ts.author = s.ifo.Value(\"author\")\n\ts.email = s.ifo.Value(\"email\")\n\ts.description = s.ifo.Value(\"description\")\n\ts.website = s.ifo.Value(\"website\")\n\n\t// TODO: support the .syn file.\n\t// TODO: support the .tdx file.\n\t// TODO: support resource storage\n\n\treturn s, nil\n}", "title": "" }, { "docid": "1f52832878c443a9cf0b92f4aad07789", "score": "0.55501467", "text": "func (request *ReadRequest) Open() (opened bool, err error) {\n\treturn request.commonOpen()\n}", "title": "" }, { "docid": "a07a2cf6543955aa39b2469e32e077f9", "score": "0.5545226", "text": "func (l *OSFileSystemLoader) Open(name string) (io.ReadCloser, error) {\n\treturn os.Open(name)\n}", "title": "" }, { "docid": "96774416222cf0f81f05f7a10a9540e8", "score": "0.55439514", "text": "func Open(fname string) (*Stream, error) {\n\tvar stream *Stream\n\tvar err error\n\n\tf, err := os.Open(fname)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tstream = &Stream{\n\t\tname: fname,\n\t\tf: f,\n\t\trecs: make(map[string]*Record),\n\t}\n\n\treturn stream, err\n}", "title": "" }, { "docid": "91fec9d47bcc278ec352a7c4adde7cb4", "score": "0.5528867", "text": "func (sr *shimObjectReader) Read(p []byte) (n int, err error) {\n\treturn sr.repoReader.Read(p)\n}", "title": "" }, { "docid": "66c3e2ecd62359598e96c98d1687370c", "score": "0.5527692", "text": "func (ti *traceFSTracingInstance) open() (io.Reader, error) {\n\ttracePipe, err := os.Open(ti.path + \"/trace_pipe\")\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"opening trace_pipe: %w\", err)\n\t}\n\n\tti.pipe = tracePipe\n\treturn tracePipe, nil\n}", "title": "" }, { "docid": "ae1fef3ed0f9f282a172b3f56682bff6", "score": "0.552364", "text": "func IOOpen(l *State) int {\n\tNewLibrary(l, ioLibrary)\n\n\tNewMetaTable(l, fileHandle)\n\tl.PushValue(-1)\n\tl.SetField(-2, \"__index\")\n\tSetFunctions(l, fileHandleMethods, 0)\n\tl.Pop(1)\n\n\tregisterStdFile(l, os.Stdin, input, \"stdin\")\n\tregisterStdFile(l, os.Stdout, output, \"stdout\")\n\tregisterStdFile(l, os.Stderr, \"\", \"stderr\")\n\n\treturn 1\n}", "title": "" }, { "docid": "0273ad99df87cc42df518f5546d713b7", "score": "0.55214083", "text": "func (f *File) Open() (io.ReadCloser, error) {\n\tif f.Solid {\n\t\treturn nil, errSolidOpen\n\t}\n\tr := new(ReadCloser)\n\tr.pr = f.pr.clone()\n\treturn r, r.pr.init()\n}", "title": "" }, { "docid": "768bcab948c42ab2e26805fc0122cc6e", "score": "0.55130893", "text": "func openPart(bundleDir string, id, index int64) (bool, io.ReadCloser, error) {\n\tf, err := os.Open(paths.UploadPartFilename(bundleDir, id, int64(index)))\n\tif err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\treturn false, nil, nil\n\t\t}\n\n\t\treturn false, nil, err\n\t}\n\n\treader, err := gzip.NewReader(f)\n\tif err != nil {\n\t\treturn false, nil, err\n\t}\n\n\treturn true, &partReader{reader, f}, nil\n}", "title": "" }, { "docid": "9f8a0dea583e75106918cd474635482a", "score": "0.55088323", "text": "func (m *MAX31855) Open(name string) error {\n\tvar err error\n\tm.device, err = os.Open(name)\n\treturn err\n}", "title": "" }, { "docid": "8798cd939d4a33fda45dc03ef8286ad3", "score": "0.55078816", "text": "func (LocalFS) Open(_ context.Context, path string) (FileReader, error) {\n\tif path == \"-\" {\n\t\treturn stdinWrapper{os.Stdin}, nil\n\t}\n\treturn os.Open(path)\n}", "title": "" }, { "docid": "fce89698a59e7b58f6ec026f44d367c6", "score": "0.55039006", "text": "func (o *tracingObjClient) Reader(ctx context.Context, name string, offset uint64, size uint64) (io.ReadCloser, error) {\n\tspan, ctx := tracing.AddSpanToAnyExisting(ctx, \"/\"+o.provider+\"/Reader\",\n\t\t\"name\", name,\n\t\t\"offset\", fmt.Sprintf(\"%d\", offset),\n\t\t\"size\", fmt.Sprintf(\"%d\", size))\n\tdefer tracing.FinishAnySpan(span)\n\treturn o.Client.Reader(ctx, name, offset, size)\n}", "title": "" }, { "docid": "f7f2dc6301a5d59e606b53052a863ae3", "score": "0.549848", "text": "func (fs *FSObjects) getObject(ctx context.Context, bucket, object string, offset int64, length int64, writer io.Writer, etag string, lock bool) (err error) {\n\tif _, err = fs.statBucketDir(ctx, bucket); err != nil {\n\t\treturn toObjectErr(err, bucket)\n\t}\n\n\t// Offset cannot be negative.\n\tif offset < 0 {\n\t\tlogger.LogIf(ctx, errUnexpected)\n\t\treturn toObjectErr(errUnexpected, bucket, object)\n\t}\n\n\t// Writer cannot be nil.\n\tif writer == nil {\n\t\tlogger.LogIf(ctx, errUnexpected)\n\t\treturn toObjectErr(errUnexpected, bucket, object)\n\t}\n\n\t// If its a directory request, we return an empty body.\n\tif hasSuffix(object, SlashSeparator) {\n\t\t_, err = writer.Write([]byte(\"\"))\n\t\tlogger.LogIf(ctx, err)\n\t\treturn toObjectErr(err, bucket, object)\n\t}\n\n\tif bucket != minioMetaBucket {\n\t\tfsMetaPath := pathJoin(fs.fsPath, minioMetaBucket, bucketMetaPrefix, bucket, object, fs.metaJSONFile)\n\t\tif lock {\n\t\t\t_, err = fs.rwPool.Open(fsMetaPath)\n\t\t\tif err != nil && err != errFileNotFound {\n\t\t\t\tlogger.LogIf(ctx, err)\n\t\t\t\treturn toObjectErr(err, bucket, object)\n\t\t\t}\n\t\t\tdefer fs.rwPool.Close(fsMetaPath)\n\t\t}\n\t}\n\n\tif etag != \"\" && etag != defaultEtag {\n\t\tobjEtag, perr := fs.getObjectETag(ctx, bucket, object, lock)\n\t\tif perr != nil {\n\t\t\treturn toObjectErr(perr, bucket, object)\n\t\t}\n\t\tif objEtag != etag {\n\t\t\tlogger.LogIf(ctx, InvalidETag{})\n\t\t\treturn toObjectErr(InvalidETag{}, bucket, object)\n\t\t}\n\t}\n\n\t// Read the object, doesn't exist returns an s3 compatible error.\n\tfsObjPath := pathJoin(fs.fsPath, bucket, object)\n\treader, size, err := fsOpenFile(ctx, fsObjPath, offset)\n\tif err != nil {\n\t\treturn toObjectErr(err, bucket, object)\n\t}\n\tdefer reader.Close()\n\n\tbufSize := int64(readSizeV1)\n\tif length > 0 && bufSize > length {\n\t\tbufSize = length\n\t}\n\n\t// For negative length we read everything.\n\tif length < 0 {\n\t\tlength = size - offset\n\t}\n\n\t// Reply back invalid range if the input offset and length fall out of range.\n\tif offset > size || offset+length > size {\n\t\terr = InvalidRange{offset, length, size}\n\t\tlogger.LogIf(ctx, err)\n\t\treturn err\n\t}\n\n\t// Allocate a staging buffer.\n\tbuf := make([]byte, int(bufSize))\n\n\t_, err = io.CopyBuffer(writer, io.LimitReader(reader, length), buf)\n\t// The writer will be closed incase of range queries, which will emit ErrClosedPipe.\n\tif err == io.ErrClosedPipe {\n\t\terr = nil\n\t}\n\treturn toObjectErr(err, bucket, object)\n}", "title": "" }, { "docid": "44698fc22a3cb8cbc24a1a18f6314fb0", "score": "0.5497899", "text": "func Open(path string) error {\n\tspellMu.Lock()\n\tdefer spellMu.Unlock()\n\n\tResetLearnTime()\n\tvar err error\n\topenTime, err = ModTime(path)\n\tif err != nil {\n\t\topenFPath = path // save for later, so it will save when learning\n\t\topenTime = time.Now()\n\t\treturn err\n\t}\n\tmodel, err = Load(path)\n\tif err == nil {\n\t\topenFPath = path\n\t\tinited = true\n\t}\n\treturn err\n}", "title": "" }, { "docid": "90bb3cc380d253c6ebfaf43496f8b669", "score": "0.5481834", "text": "func (t FS) Open(name string) (fs.File, error) {\n\treturn t.FS.Open(filepath.ToSlash(name))\n}", "title": "" }, { "docid": "484e71e464d4c54813d4193f34ad734b", "score": "0.54704905", "text": "func (s *S3Storage) Open(filepath string) (File, error) {\n\tbucket, err := s.Bucket()\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tkey, err := s.Key(filepath)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbody, err := bucket.GetReader(s.Path(filepath))\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &S3StorageFile{\n\t\tbody,\n\t\tkey,\n\t\ts,\n\t}, nil\n}", "title": "" }, { "docid": "952d7e63c79b664bc7747f1d8f0e27f4", "score": "0.5469778", "text": "func Open(path string) (stream *Stream, err error) {\n\tf, err := os.Open(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tstream, err = New(f)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tstream.c = f\n\treturn stream, err\n}", "title": "" }, { "docid": "4b548a07cbee98a06e5103259fc9f125", "score": "0.5469486", "text": "func (b *Book) Open(file []byte) error {\n\treturn open(file, b)\n}", "title": "" }, { "docid": "2c664eb99a1213032c6a148a87152d76", "score": "0.5467682", "text": "func Example_open() {\n\tctx := context.Background()\n\n\t// The load path is of the form: github.com/<owner>/<repo>(/<path>)?(@<ref>)?.\n\t// `ref` can reference any git tag or branch. If github releases are in Semver format,\n\t// the `tags/` prefix is not needed in the `ref` part.\n\tfs, err := New(ctx, \"github.com/kelseyhightower/helloworld@3.0.0\")\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed initialize filesystem: %s\", err)\n\t}\n\n\t// Open any file in the github repository, using the `Open` function. Both files\n\t// and directory can be opened. The content is not loaded until it is actually being\n\t// read. The content is loaded only once.\n\tf, err := fs.Open(\"README.md\")\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed opening file: %s\", err)\n\t}\n\n\t// Copy the content to stdout.\n\tio.Copy(os.Stdout, f)\n\n\t// Output: # helloworld\n}", "title": "" }, { "docid": "3f5fe959115e54356d011b01ee9f29ec", "score": "0.5466206", "text": "func OpenStructureLibrary(r io.Reader) (*StructureLibrary, error) {\n\tvar lib *StructureLibrary\n\n\tdec := gob.NewDecoder(r)\n\tif err := dec.Decode(&lib); err != nil {\n\t\treturn nil, err\n\t}\n\treturn lib, nil\n}", "title": "" }, { "docid": "d30f9d2a84786522365219a32cb4e6a8", "score": "0.5464604", "text": "func (recv *DataInputStream) Object() *gobject.Object {\n\treturn recv.BufferedInputStream().Object()\n}", "title": "" }, { "docid": "aaefbeab4c8bcffd6a96cfb9f70356e6", "score": "0.5461338", "text": "func (recv *InputStream) Object() *gobject.Object {\n\treturn gobject.ObjectNewFromC(unsafe.Pointer(recv.native))\n}", "title": "" }, { "docid": "554cdb411c0e4c9ac534dbec3efe1cec", "score": "0.5453057", "text": "func openone(fname string) (*Ndb, error) {\n\tdb := &Ndb{filename: fname}\n\n\t// open file\n\tf, err := os.Open(db.filename)\n\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"open: %s\", err)\n\t}\n\n\tdefer f.Close()\n\n\t// read mtime\n\tif fstat, err := f.Stat(); err != nil {\n\t\treturn nil, fmt.Errorf(\"open: %s\", err)\n\t} else {\n\t\tdb.mtime = fstat.ModTime()\n\t}\n\n\t// read all data\n\tif data, err := ioutil.ReadAll(f); err != nil {\n\t\treturn nil, fmt.Errorf(\"open: %s\", err)\n\t} else {\n\t\tdb.data = bytes.NewReader(data)\n\t}\n\n\t// parse records\n\tif db.records, err = parserec(db); err != nil {\n\t\treturn nil, fmt.Errorf(\"open: %s\", err)\n\t}\n\n\treturn db, nil\n}", "title": "" }, { "docid": "ca1d97061a950dbad8417cbc98c4cb90", "score": "0.5450529", "text": "func Open(fname string) (index.StoreReader, error) {\n\tf, err := os.Open(fname)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &reader{\n\t\tReader: table.NewReader(f, nil),\n\t}, nil\n}", "title": "" }, { "docid": "5b14a05438b3a4435c2f120472d594fa", "score": "0.54361296", "text": "func (pl ProfileList) open(ctx context.Context, oc *openContext, path []string) (dokan.File, dokan.CreateStatus, error) {\n\tif len(path) == 0 {\n\t\treturn oc.returnDirNoCleanup(ProfileList{})\n\t}\n\tif len(path) > 1 || !libfs.IsSupportedProfileName(path[0]) {\n\t\treturn nil, 0, dokan.ErrObjectNameNotFound\n\t}\n\tf := libfs.ProfileGet(path[0])\n\tif f == nil {\n\t\treturn nil, 0, dokan.ErrObjectNameNotFound\n\t}\n\treturn oc.returnFileNoCleanup(&SpecialReadFile{read: f, fs: pl.fs})\n}", "title": "" }, { "docid": "b81cd9505e6c6d593e6d3b22c1d6823c", "score": "0.5432206", "text": "func (o objectAPI) GetObject(bucket, object string, startOffset int64) (io.ReadCloser, *probe.Error) {\n\t// Verify if bucket is valid.\n\tif !IsValidBucketName(bucket) {\n\t\treturn nil, probe.NewError(BucketNameInvalid{Bucket: bucket})\n\t}\n\t// Verify if object is valid.\n\tif !IsValidObjectName(object) {\n\t\treturn nil, probe.NewError(ObjectNameInvalid{Bucket: bucket, Object: object})\n\t}\n\tr, e := o.storage.ReadFile(bucket, object, startOffset)\n\tif e != nil {\n\t\treturn nil, probe.NewError(toObjectErr(e, bucket, object))\n\t}\n\treturn r, nil\n}", "title": "" }, { "docid": "cbf656031cfd263823000a1fb4b07d8d", "score": "0.5430967", "text": "func Open(path string, mode fs.FileMode, options *bolt.Options) error {\n\tvar err error\n\tdb, err = bolt.Open(path, mode, options)\n\treturn err\n}", "title": "" }, { "docid": "fca94d43e8b32739b3c5592bc7996b79", "score": "0.5429248", "text": "func (device Device) open() (*os.File, error) {\n\treturn os.OpenFile(device.Path(), device.flags, 0660)\n}", "title": "" }, { "docid": "3eddfb71ded9ef02c9099d0f24d4c78d", "score": "0.54206204", "text": "func Open(filename string) (*Reader, error) {\n\tfilename = filename[0 : len(filename)-3]\n\tshp, err := os.Open(filename + \"shp\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ts := &Reader{filename: filename, shp: shp}\n\ts.readHeaders()\n\treturn s, nil\n}", "title": "" }, { "docid": "286ce54b4fd9d92a05a944e9959f56db", "score": "0.541331", "text": "func (recv *FileEnumerator) Object() *gobject.Object {\n\treturn gobject.ObjectNewFromC(unsafe.Pointer(recv.native))\n}", "title": "" }, { "docid": "dcc6b04d42e3111cad1c6622cdcb68a7", "score": "0.5408029", "text": "func Open(dir, fname string) File {\n\treturn Fs.Open(dir, fname)\n}", "title": "" }, { "docid": "83e224562f4352ec598aad54e463870d", "score": "0.54050326", "text": "func openReader(file string) (input io.ReadCloser) {\n\tif *localFiles {\n\t\tf, err := os.Open(file)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tinput = f\n\t} else {\n\t\tpath := *url + file\n\t\tresp, err := http.Get(path)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tif resp.StatusCode != 200 {\n\t\t\tlog.Fatal(\"bad GET status for \"+file, resp.Status)\n\t\t}\n\t\tinput = resp.Body\n\t}\n\treturn\n}", "title": "" }, { "docid": "58411c7128aa7f803fa3bf1ebefc26a7", "score": "0.5403849", "text": "func (recv *MemoryInputStream) Object() *gobject.Object {\n\treturn recv.InputStream().Object()\n}", "title": "" }, { "docid": "d1eea3b40e8a77a0355bca7f8f612431", "score": "0.53986526", "text": "func (xl xlObjects) GetObject(bucket, object string, startOffset int64) (io.ReadCloser, error) {\n\t// Verify if bucket is valid.\n\tif !IsValidBucketName(bucket) {\n\t\treturn nil, BucketNameInvalid{Bucket: bucket}\n\t}\n\tif !isBucketExist(xl.storage, bucket) {\n\t\treturn nil, BucketNotFound{Bucket: bucket}\n\t}\n\t// Verify if object is valid.\n\tif !IsValidObjectName(object) {\n\t\treturn nil, ObjectNameInvalid{Bucket: bucket, Object: object}\n\t}\n\tif ok, err := isMultipartObject(xl.storage, bucket, object); err != nil {\n\t\treturn nil, toObjectErr(err, bucket, object)\n\t} else if !ok {\n\t\tif _, err = xl.storage.StatFile(bucket, object); err == nil {\n\t\t\tvar reader io.ReadCloser\n\t\t\treader, err = xl.storage.ReadFile(bucket, object, startOffset)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, toObjectErr(err, bucket, object)\n\t\t\t}\n\t\t\treturn reader, nil\n\t\t}\n\t\treturn nil, toObjectErr(err, bucket, object)\n\t}\n\tfileReader, fileWriter := io.Pipe()\n\tinfo, err := getMultipartObjectInfo(xl.storage, bucket, object)\n\tif err != nil {\n\t\treturn nil, toObjectErr(err, bucket, object)\n\t}\n\tpartIndex, offset, err := info.GetPartNumberOffset(startOffset)\n\tif err != nil {\n\t\treturn nil, toObjectErr(err, bucket, object)\n\t}\n\tgo func() {\n\t\tfor ; partIndex < len(info.Parts); partIndex++ {\n\t\t\tpart := info.Parts[partIndex]\n\t\t\tr, err := xl.storage.ReadFile(bucket, pathJoin(object, partNumToPartFileName(part.PartNumber)), offset)\n\t\t\tif err != nil {\n\t\t\t\tfileWriter.CloseWithError(err)\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// Reset offset to 0 as it would be non-0 only for the first loop if startOffset is non-0.\n\t\t\toffset = 0\n\t\t\tif _, err = io.Copy(fileWriter, r); err != nil {\n\t\t\t\tswitch reader := r.(type) {\n\t\t\t\tcase *io.PipeReader:\n\t\t\t\t\treader.CloseWithError(err)\n\t\t\t\tcase io.ReadCloser:\n\t\t\t\t\treader.Close()\n\t\t\t\t}\n\t\t\t\tfileWriter.CloseWithError(err)\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// Close the readerCloser that reads multiparts of an object from the xl storage layer.\n\t\t\t// Not closing leaks underlying file descriptors.\n\t\t\tr.Close()\n\t\t}\n\t\tfileWriter.Close()\n\t}()\n\treturn fileReader, nil\n}", "title": "" }, { "docid": "aad6cbdbc0646b850ea155c44e07326b", "score": "0.53983843", "text": "func (l *Lock) open() (err error) {\n\tl.openLock.Lock()\n\tdefer l.openLock.Unlock()\n\n\tl.fileWasCreated = false\n\n\tflags := FileOpenFlags\n\tif _, err := os.Stat(l.name); os.IsNotExist(err) {\n\t\tflags = FileCreateFlags\n\t}\n\n\tfile, err := os.OpenFile(l.name, flags, FileMode)\n\tif err != nil && flags == FileCreateFlags {\n\t\tflags = FileOpenFlags\n\t\tfile, err = os.OpenFile(l.name, flags, FileMode)\n\t}\n\n\tif err == nil {\n\t\tl.file = file\n\t\tl.fileWasCreated = flags == FileCreateFlags\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "0e9fe92811739d4a3ae5a464681853ab", "score": "0.5396495", "text": "func (o *LargeObject) Read(p []byte) (int, error) {\n\tres, err := o.lo.fp.CallFn(\"loread\", []fpArg{fpIntArg(o.fd), fpIntArg(int32(len(p)))})\n\tif len(res) < len(p) {\n\t\terr = io.EOF\n\t}\n\treturn copy(p, res), err\n}", "title": "" }, { "docid": "6ef6663ceeb9c43e70ec19e04a57ef7b", "score": "0.53879166", "text": "func (d Dir) Open(key string) (io.ReadCloser, error) {\n\tfilename, err := d.Filename(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn os.Open(filename)\n}", "title": "" }, { "docid": "5c2e7460ad4b97181dd5f8640fc0e329", "score": "0.53781503", "text": "func OpenReader(name string) (*ReadCloser, error) {\n\tf, err := os.Open(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfi, err := f.Stat()\n\tif err != nil {\n\t\tf.Close()\n\t\treturn nil, err\n\t}\n\treturn &ReadCloser{f: f, Decoder: NewDecoder(f, fi.Size())}, nil\n}", "title": "" }, { "docid": "373d83b7bcd6f9d829af9aedc7a7b6ee", "score": "0.53761756", "text": "func (ctx TestCtx) Open(filename string) (io.WriteCloser, error) { return ctx, nil }", "title": "" } ]
dc34a168c30a71410814a62c630ec6cb
UpdateTransactionByID indicates an expected call of UpdateTransactionByID.
[ { "docid": "a96ad7777cece59025bb37efbd32db12", "score": "0.7571598", "text": "func (mr *MockITransactionRepoMockRecorder) UpdateTransactionByID(amount, category, memo, id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UpdateTransactionByID\", reflect.TypeOf((*MockITransactionRepo)(nil).UpdateTransactionByID), amount, category, memo, id)\n}", "title": "" } ]
[ { "docid": "7867e9325cffbd08345ea53ff395da63", "score": "0.7163918", "text": "func (m *MockITransactionRepo) UpdateTransactionByID(amount, category, memo, id string) (*mongo.UpdateResult, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"UpdateTransactionByID\", amount, category, memo, id)\n\tret0, _ := ret[0].(*mongo.UpdateResult)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "c82a9950a73aaf2164f0244d08df8330", "score": "0.6836924", "text": "func (mr *MockITransactionRepoMockRecorder) UpdateIncomeByID(amount, month, memo, id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UpdateIncomeByID\", reflect.TypeOf((*MockITransactionRepo)(nil).UpdateIncomeByID), amount, month, memo, id)\n}", "title": "" }, { "docid": "eb170def817f408c0631dcd77b4af7f7", "score": "0.6757787", "text": "func (mr *MockITransactionRepoMockRecorder) GetTransactionByID(ID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetTransactionByID\", reflect.TypeOf((*MockITransactionRepo)(nil).GetTransactionByID), ID)\n}", "title": "" }, { "docid": "7aef157cc4b9d9178a64aa6bb6139544", "score": "0.6678364", "text": "func (mr *MockEquipmentMockRecorder) UpdateByID(id, name, comment, stock, tagID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UpdateByID\", reflect.TypeOf((*MockEquipment)(nil).UpdateByID), id, name, comment, stock, tagID)\n}", "title": "" }, { "docid": "6cad061d99f1d659febf1afa46a66261", "score": "0.637602", "text": "func (mr *MockBooksPartInterfaceMockRecorder) ChangeBookStatusByID(ID, status interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ChangeBookStatusByID\", reflect.TypeOf((*MockBooksPartInterface)(nil).ChangeBookStatusByID), ID, status)\n}", "title": "" }, { "docid": "635f245e5614574f88a1f3e2f35842db", "score": "0.63494676", "text": "func (mr *MockIEventDetailMockRecorder) UpdateEventDetailByID(eventDetail interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UpdateEventDetailByID\", reflect.TypeOf((*MockIEventDetail)(nil).UpdateEventDetailByID), eventDetail)\n}", "title": "" }, { "docid": "4c2cecc423624deb7454fe6291c0a45f", "score": "0.6171477", "text": "func (m *MockITransactionRepo) UpdateIncomeByID(amount, month, memo, id string) (*mongo.UpdateResult, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"UpdateIncomeByID\", amount, month, memo, id)\n\tret0, _ := ret[0].(*mongo.UpdateResult)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "3f8fdf970e6290307685e9aa97ef5c7a", "score": "0.6111512", "text": "func (m *MockEquipment) UpdateByID(id int, name, comment string, stock, tagID int) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"UpdateByID\", id, name, comment, stock, tagID)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "5f27d2f0a4313fb060168e71beef610a", "score": "0.605441", "text": "func (mr *DBUserRecorderMock) GetUserByID(id interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetUserByID\", reflect.TypeOf((*DBUserRepositoryMock)(nil).GetUserByID), id)\n}", "title": "" }, { "docid": "b10ef8945949ca608d1ffabca715e054", "score": "0.60056376", "text": "func (mr *MockITransactionRepoMockRecorder) GetIncomeByID(ID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetIncomeByID\", reflect.TypeOf((*MockITransactionRepo)(nil).GetIncomeByID), ID)\n}", "title": "" }, { "docid": "9fb7e84982761c6bd4ae3d5ebaa0bbb8", "score": "0.5999322", "text": "func (mr *MockDBRepositoryMockRecorder) GetUserByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetUserByID\", reflect.TypeOf((*MockDBRepository)(nil).GetUserByID), id)\n}", "title": "" }, { "docid": "ef72da3bf2eb8023ab0549365dfffd3e", "score": "0.5996434", "text": "func (mr *MockUserManagerMockRecorder) FindByID(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"FindByID\", reflect.TypeOf((*MockUserManager)(nil).FindByID), arg0)\n}", "title": "" }, { "docid": "22b5657a1620d3862976048043bcb601", "score": "0.5948174", "text": "func (mr *MockuserManagerMockRecorder) GetUserByID(ctx, id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetUserByID\", reflect.TypeOf((*MockuserManager)(nil).GetUserByID), ctx, id)\n}", "title": "" }, { "docid": "c1b1003ae527b3f8a9bcd633bc19425b", "score": "0.59425235", "text": "func (mr *MockCharacterSyncLogRepositoryMockRecorder) FindByID(id interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"FindByID\", reflect.TypeOf((*MockCharacterSyncLogRepository)(nil).FindByID), id)\n}", "title": "" }, { "docid": "d72ac84dc54efac8546be46efcd2bcf5", "score": "0.59347415", "text": "func (mr *MockBookRepositoryMockRecorder) GetByID(ctx, id interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetByID\", reflect.TypeOf((*MockBookRepository)(nil).GetByID), ctx, id)\n}", "title": "" }, { "docid": "8488ffd7fb412e070abce9fc0d02aaaf", "score": "0.59309876", "text": "func (mr *MockIRepositoryMockRecorder) GetByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetByID\", reflect.TypeOf((*MockIRepository)(nil).GetByID), id)\n}", "title": "" }, { "docid": "275b67f84f2649042fc116a16d7c5f1c", "score": "0.59228253", "text": "func (mr *MockUserServiceMockRecorder) GetByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetByID\", reflect.TypeOf((*MockUserService)(nil).GetByID), id)\n}", "title": "" }, { "docid": "7d57585a26a5d0f9797452df54bd9b21", "score": "0.59207153", "text": "func (_mr *MockIUserServiceMockRecorder) GetByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn _mr.mock.ctrl.RecordCallWithMethodType(_mr.mock, \"GetByID\", reflect.TypeOf((*MockIUserService)(nil).GetByID), arg0, arg1)\n}", "title": "" }, { "docid": "b6b8018980862b354ca9d79119b25eff", "score": "0.59066015", "text": "func (mr *MockUserRepositoryMockRecorder) FindByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"FindByID\", reflect.TypeOf((*MockUserRepository)(nil).FindByID), id)\n}", "title": "" }, { "docid": "89a2791be405de7c7541cec8282a8302", "score": "0.5901687", "text": "func (mr *MockEquipmentMockRecorder) GetByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetByID\", reflect.TypeOf((*MockEquipment)(nil).GetByID), id)\n}", "title": "" }, { "docid": "ea51ce533849e3e971b4f939ff755d6a", "score": "0.5899197", "text": "func (mr *MockUserDAOInterfaceMockRecorder) FindByID(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"FindByID\", reflect.TypeOf((*MockUserDAOInterface)(nil).FindByID), arg0)\n}", "title": "" }, { "docid": "7abd9b081370abe2dfe5b024396d8c27", "score": "0.58709925", "text": "func (mr *MockUserMockRecorder) FindByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"FindByID\", reflect.TypeOf((*MockUser)(nil).FindByID), id)\n}", "title": "" }, { "docid": "9d2b9e7c7627e685c5ba7cccdc95abd6", "score": "0.5863919", "text": "func (mr *MockNodeIfaceMockRecorder) NodesWorkflowActionByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"NodesWorkflowActionByID\", reflect.TypeOf((*MockNodeIface)(nil).NodesWorkflowActionByID), arg0, arg1)\n}", "title": "" }, { "docid": "677463777c5ebe37bae055ef680e027c", "score": "0.5860527", "text": "func (mr *MockRepositoryMockRecorder) GetByID(ctx, id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetByID\", reflect.TypeOf((*MockRepository)(nil).GetByID), ctx, id)\n}", "title": "" }, { "docid": "b8ad13785c00b1054c44021804b009a5", "score": "0.58557916", "text": "func (mr *MockRepositoryMockRecorder) GetByID(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetByID\", reflect.TypeOf((*MockRepository)(nil).GetByID), arg0, arg1)\n}", "title": "" }, { "docid": "0919ca6a9c136f911f9bb368bdf15b66", "score": "0.5814347", "text": "func (mr *MockCacheRepositoryMockRecorder) GetUserByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetUserByID\", reflect.TypeOf((*MockCacheRepository)(nil).GetUserByID), id)\n}", "title": "" }, { "docid": "d444d8f24a39498b1abd25e009191b89", "score": "0.5801663", "text": "func (mr *MockUserMockRecorder) FindByID(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"FindByID\", reflect.TypeOf((*MockUser)(nil).FindByID), arg0, arg1)\n}", "title": "" }, { "docid": "d8a91990e1acd3f54d6be5023f7310e7", "score": "0.579118", "text": "func (mr *MockIUserRepositoryMockRecorder) GetByID(userID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetByID\", reflect.TypeOf((*MockIUserRepository)(nil).GetByID), userID)\n}", "title": "" }, { "docid": "6e587e016e4b656d350ab01ca9ea18ce", "score": "0.5760317", "text": "func (mr *MockNodeIfaceMockRecorder) NodesPatchByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"NodesPatchByID\", reflect.TypeOf((*MockNodeIface)(nil).NodesPatchByID), arg0, arg1)\n}", "title": "" }, { "docid": "8900a2234c31fb203ddc74fd1ab15557", "score": "0.57520074", "text": "func (m *MockIEventDetail) UpdateEventDetailByID(eventDetail model.EventDetail) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"UpdateEventDetailByID\", eventDetail)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "725fb058b8651c2c7c8789b72e3e4cf0", "score": "0.5747565", "text": "func (mr *MockKeyCloakClientInterfaceMockRecorder) GetUserByID(realm, id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetUserByID\", reflect.TypeOf((*MockKeyCloakClientInterface)(nil).GetUserByID), realm, id)\n}", "title": "" }, { "docid": "628a63780eddb3380cc193e1080bd893", "score": "0.5710557", "text": "func (mr *MockNodeIfaceMockRecorder) NodesPatchTagByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"NodesPatchTagByID\", reflect.TypeOf((*MockNodeIface)(nil).NodesPatchTagByID), arg0, arg1)\n}", "title": "" }, { "docid": "30ccee883adac9aaa10069ce6f13e91c", "score": "0.5696849", "text": "func (mr *MockAuthRepositoryMockRecorder) GetUserByID(userID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetUserByID\", reflect.TypeOf((*MockAuthRepository)(nil).GetUserByID), userID)\n}", "title": "" }, { "docid": "e152800f33adbe3ac3678b70bed4a33f", "score": "0.5696392", "text": "func (mr *MockSegmentMockRecorder) FindByID(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"FindByID\", reflect.TypeOf((*MockSegment)(nil).FindByID), arg0, arg1)\n}", "title": "" }, { "docid": "b3bf89fa396912083829f417485d174a", "score": "0.5695233", "text": "func (mr *MockDBRPMappingServiceV2MockRecorder) FindByID(arg0, arg1, arg2 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"FindByID\", reflect.TypeOf((*MockDBRPMappingServiceV2)(nil).FindByID), arg0, arg1, arg2)\n}", "title": "" }, { "docid": "661048893d11b19d8ddc2fcbfd78266b", "score": "0.56822866", "text": "func (mr *MockTrackUsecaseMockRecorder) GetByID(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetByID\", reflect.TypeOf((*MockTrackUsecase)(nil).GetByID), arg0, arg1)\n}", "title": "" }, { "docid": "809916a62db1cb99bab49eb8bed9872c", "score": "0.56777006", "text": "func (mr *MockBooksPartInterfaceMockRecorder) GetBookByID(ID interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetBookByID\", reflect.TypeOf((*MockBooksPartInterface)(nil).GetBookByID), ID)\n}", "title": "" }, { "docid": "844ff9688a93d74186736243e9f1b6d2", "score": "0.56716365", "text": "func (mr *MockClientInterfaceMockRecorder) GetArticleByID(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetArticleByID\", reflect.TypeOf((*MockClientInterface)(nil).GetArticleByID), arg0)\n}", "title": "" }, { "docid": "f21ac6f11212f643ba481776cd0e2ff2", "score": "0.5671426", "text": "func (mr *MockImagesServiceMockRecorder) GetByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetByID\", reflect.TypeOf((*MockImagesService)(nil).GetByID), id)\n}", "title": "" }, { "docid": "5735645e28b6c5195d952b706e122a95", "score": "0.5644729", "text": "func TestUpdateUserByID(t *testing.T) {\n\tdb, mock, err := sqlmock.New()\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\tdefer db.Close()\n\tsqlxDB := sqlx.NewDb(db, \"sqlmock\")\n\tstr := `{\"first_name\":\"AAA\",\"last_name\":\"BBB\",\"interests\":\"CCC\"}`\n\tstoreUser := NewStore(sqlxDB)\n\tfield := \"first_name\"\n\tvalue := \"DDD\"\n\n\tmock.ExpectBegin()\n\tmock.ExpectExec(\"UPDATE users\").WithArgs(str, 1).WillReturnResult(sqlmock.NewResult(0, 1))\n\tmock.ExpectCommit()\n\n\tif _, err = storeUser.UpdateUserByID(1, field, value); err != nil {\n\t\tt.Errorf(\"error was not expected while updating stats: %s\", err)\n\t}\n\n\tif err = mock.ExpectationsWereMet(); err != nil {\n\t\tt.Errorf(\"there were unfulfilled expectations: %s\", err)\n\t}\n\tdefer sqlxDB.Close()\n}", "title": "" }, { "docid": "a175a2edda5cdf203edd529a49bad4f5", "score": "0.560004", "text": "func (mr *MockNotifiersServiceMockRecorder) NotifierByID(arg0, arg1, arg2 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"NotifierByID\", reflect.TypeOf((*MockNotifiersService)(nil).NotifierByID), arg0, arg1, arg2)\n}", "title": "" }, { "docid": "f55fbc0fe14817b69d5d2372fb3390af", "score": "0.5598155", "text": "func (mr *MockDriverTypeStoreInterfaceMockRecorder) GetByID(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetByID\", reflect.TypeOf((*MockDriverTypeStoreInterface)(nil).GetByID), arg0)\n}", "title": "" }, { "docid": "fcfd091bc1e4cdae1e1c3da30d399db5", "score": "0.5596391", "text": "func (mr *MockModuleTypeStoreInterfaceMockRecorder) GetByID(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetByID\", reflect.TypeOf((*MockModuleTypeStoreInterface)(nil).GetByID), arg0)\n}", "title": "" }, { "docid": "1fe88fd2662e40ef85d1ec4b4c1b50c6", "score": "0.55862546", "text": "func (mr *MockNodeIfaceMockRecorder) NodesPostWorkflowByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"NodesPostWorkflowByID\", reflect.TypeOf((*MockNodeIface)(nil).NodesPostWorkflowByID), arg0, arg1)\n}", "title": "" }, { "docid": "92b8eb2d431cb3b85c3614170ec82b63", "score": "0.55820906", "text": "func (mr *MockMutableStateMockRecorder) GetWorkflowTaskByID(scheduledEventID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetWorkflowTaskByID\", reflect.TypeOf((*MockMutableState)(nil).GetWorkflowTaskByID), scheduledEventID)\n}", "title": "" }, { "docid": "38c816da1c91503e8ccd28c75621a543", "score": "0.5575644", "text": "func (mr *MockStorageMockRecorder) FindTokenByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"FindTokenByID\", reflect.TypeOf((*MockStorage)(nil).FindTokenByID), id)\n}", "title": "" }, { "docid": "ab04d88a4e6403f7d71236b97b7a2628", "score": "0.55732256", "text": "func (_mr *MockCommentUsecaseMockRecorder) CommentsByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn _mr.mock.ctrl.RecordCallWithMethodType(_mr.mock, \"CommentsByID\", reflect.TypeOf((*MockCommentUsecase)(nil).CommentsByID), arg0, arg1)\n}", "title": "" }, { "docid": "72e20ae698b74fa762cfd94f686424aa", "score": "0.55681694", "text": "func (mr *MockStoreMockRecorder) FindPersonByID(ctx, id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"FindPersonByID\", reflect.TypeOf((*MockStore)(nil).FindPersonByID), ctx, id)\n}", "title": "" }, { "docid": "91697159c8a6bdf3135e86cd671c5614", "score": "0.55616724", "text": "func (mr *MockDBMockRecorder) GetPersonByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetPersonByID\", reflect.TypeOf((*MockDB)(nil).GetPersonByID), arg0, arg1)\n}", "title": "" }, { "docid": "dbc9742637edede0dfce131018a2e076", "score": "0.5554491", "text": "func (mr *MockUseCaseMockRecorder) GetUserById(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetUserById\", reflect.TypeOf((*MockUseCase)(nil).GetUserById), arg0)\n}", "title": "" }, { "docid": "643fbc1b6d2a98a9e75c756dd5649c2f", "score": "0.5513662", "text": "func (mr *MockCustomEventSpecificationResourceMockRecorder) DeleteByID(specID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteByID\", reflect.TypeOf((*MockCustomEventSpecificationResource)(nil).DeleteByID), specID)\n}", "title": "" }, { "docid": "5674971566f70f5fd9430f335eedb51f", "score": "0.5496283", "text": "func (mr *MockRequesterMockRecorder) SetID(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SetID\", reflect.TypeOf((*MockRequester)(nil).SetID), arg0)\n}", "title": "" }, { "docid": "c0a6d061312082de383925594d31fb95", "score": "0.54947716", "text": "func (mr *MockNodeIfaceMockRecorder) NodesDelByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"NodesDelByID\", reflect.TypeOf((*MockNodeIface)(nil).NodesDelByID), arg0, arg1)\n}", "title": "" }, { "docid": "1ab7c4f5995b9279722daab9d0d93775", "score": "0.5474545", "text": "func (mr *MockTaskDefinitionPersistenceMockRecorder) GetByID(arg0, arg1, arg2 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetByID\", reflect.TypeOf((*MockTaskDefinitionPersistence)(nil).GetByID), arg0, arg1, arg2)\n}", "title": "" }, { "docid": "a36a1d9d24d6f78039ec83cd9e73735d", "score": "0.5455697", "text": "func (mr *MockWorkflowExecutionDaoMockRecorder) FindById(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"FindById\", reflect.TypeOf((*MockWorkflowExecutionDao)(nil).FindById), arg0, arg1)\n}", "title": "" }, { "docid": "04351c5573381fa1ae2d40b62c134aae", "score": "0.54457366", "text": "func (mr *MockUserServiceIfaceMockRecorder) GetUserByID(id interface{}, opts ...interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\tvarargs := append([]interface{}{id}, opts...)\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetUserByID\", reflect.TypeOf((*MockUserServiceIface)(nil).GetUserByID), varargs...)\n}", "title": "" }, { "docid": "288e9af8cddfee0ad265d8a2049f6288", "score": "0.54163754", "text": "func (mr *MockAccessRequesterMockRecorder) SetID(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SetID\", reflect.TypeOf((*MockAccessRequester)(nil).SetID), arg0)\n}", "title": "" }, { "docid": "be6dd1d9d27ff0d2a106000db5bbb9cb", "score": "0.54127425", "text": "func (mr *MockNodeIfaceMockRecorder) NodesDelTagByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"NodesDelTagByID\", reflect.TypeOf((*MockNodeIface)(nil).NodesDelTagByID), arg0, arg1)\n}", "title": "" }, { "docid": "128258fd16cd5556ffec6483b8482dd9", "score": "0.5409963", "text": "func (_m *ClientAPI) UpdateByID(ctx context.Context, resourceID string, parameters resources.GenericResource) (resources.UpdateByIDFuture, error) {\n\tret := _m.Called(ctx, resourceID, parameters)\n\n\tvar r0 resources.UpdateByIDFuture\n\tif rf, ok := ret.Get(0).(func(context.Context, string, resources.GenericResource) resources.UpdateByIDFuture); ok {\n\t\tr0 = rf(ctx, resourceID, parameters)\n\t} else {\n\t\tr0 = ret.Get(0).(resources.UpdateByIDFuture)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string, resources.GenericResource) error); ok {\n\t\tr1 = rf(ctx, resourceID, parameters)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "9e7bfd80d688eda2764d0e3a35a53d93", "score": "0.540049", "text": "func (mr *MockActionAPIMockRecorder) Update(id, a interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Update\", reflect.TypeOf((*MockActionAPI)(nil).Update), id, a)\n}", "title": "" }, { "docid": "6975802ad3a60e5307070c2d33d49fd0", "score": "0.5396612", "text": "func (mr *MockRestResourceMockRecorder) DeleteByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteByID\", reflect.TypeOf((*MockRestResource)(nil).DeleteByID), id)\n}", "title": "" }, { "docid": "6975802ad3a60e5307070c2d33d49fd0", "score": "0.5396612", "text": "func (mr *MockRestResourceMockRecorder) DeleteByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteByID\", reflect.TypeOf((*MockRestResource)(nil).DeleteByID), id)\n}", "title": "" }, { "docid": "2ab402fabec181a88c70e0bec45dcbbe", "score": "0.5366073", "text": "func (mr *MockModuleTypeStoreInterfaceMockRecorder) GetAllByID(arg0 ...interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetAllByID\", reflect.TypeOf((*MockModuleTypeStoreInterface)(nil).GetAllByID), arg0...)\n}", "title": "" }, { "docid": "c36bcb0d63abc84a824e75aefc5e00c5", "score": "0.53633386", "text": "func (mr *MockProductStoreMockRecorder) GetProductByID(ID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetProductByID\", reflect.TypeOf((*MockProductStore)(nil).GetProductByID), ID)\n}", "title": "" }, { "docid": "c343b835c1a5025925e86d267231f726", "score": "0.5362414", "text": "func (mr *MockEquipmentMockRecorder) DeleteByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteByID\", reflect.TypeOf((*MockEquipment)(nil).DeleteByID), id)\n}", "title": "" }, { "docid": "32b9f15dde3ebc50bf902676ad9b6f94", "score": "0.5352025", "text": "func (mr *MockNodeIfaceMockRecorder) NodesGetByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"NodesGetByID\", reflect.TypeOf((*MockNodeIface)(nil).NodesGetByID), arg0, arg1)\n}", "title": "" }, { "docid": "116cd89a59e78c00d281edfcd51d4f3a", "score": "0.535044", "text": "func (m *testDBRepo) UpdateTaskByID(id int, task models.Task) (models.Task, error) {\n\tvar newTask models.Task\n\tif id == 1 {\n\t\treturn newTask, nil\n\t}\n\n\treturn newTask, errors.New(\"some errors\")\n}", "title": "" }, { "docid": "a2f4640483939b8f65032c460b13b694", "score": "0.5347767", "text": "func UpdatePersonByID(id string, updatedPerson models.Person) models.TransactionResponse {\n\tmongoClient := connectToMongoDB()\n\tpeopleCollection := mongoClient.Database(dbName).Collection(collectionName)\n\n\ttransactionResponse := models.TransactionResponse{IsSuccess: true}\n\n\tobjectID, _ := primitive.ObjectIDFromHex(id)\n\n\t_, err := peopleCollection.UpdateOne(context.TODO(), bson.M{\"_id\": objectID}, bson.M{\"$set\": bson.M{\n\t\t\"firstName\": updatedPerson.FirstName,\n\t\t\"lastName\": updatedPerson.LastName,\n\t\t\"birthdate\": updatedPerson.Birthdate,\n\t\t\"email\": updatedPerson.Email,\n\t\t\"updatedTime\": time.Now().String()}})\n\n\ttransactionResponse.IsSuccess = !checkError(err)\n\n\tif err != nil {\n\t\ttransactionResponse.Message = err.Error()\n\t\ttransactionResponse.IsSuccess = false\n\t} else {\n\t\ttransactionResponse.Message = fmt.Sprintf(\"Object Id: %s updated !\", id)\n\t}\n\n\tdefer mongoClient.Disconnect(context.TODO())\n\treturn transactionResponse\n}", "title": "" }, { "docid": "d58629f93897bccb29da8c06ed5fa3e2", "score": "0.5338707", "text": "func (m *MockITransactionRepo) GetTransactionByID(ID string) (*models.Transaction, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetTransactionByID\", ID)\n\tret0, _ := ret[0].(*models.Transaction)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "3dbbc2f0df6cc82a64070943c3afe702", "score": "0.532206", "text": "func (mr *MockControllerMockRecorder) GetBookByID(ctx, i interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetBookByID\", reflect.TypeOf((*MockController)(nil).GetBookByID), ctx, i)\n}", "title": "" }, { "docid": "816845b91abe30fb849de8b0fb225760", "score": "0.52981025", "text": "func (mr *MockProductWriterMockRecorder) DeleteByID(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteByID\", reflect.TypeOf((*MockProductWriter)(nil).DeleteByID), arg0)\n}", "title": "" }, { "docid": "7091660a5e8ab766b6e09fc3e979a8c4", "score": "0.5284895", "text": "func (mr *MockAlertServiceIfaceMockRecorder) GetAlertByID(id interface{}, opts ...interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\tvarargs := append([]interface{}{id}, opts...)\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetAlertByID\", reflect.TypeOf((*MockAlertServiceIface)(nil).GetAlertByID), varargs...)\n}", "title": "" }, { "docid": "c7b613d629403e39322d46fa327682f7", "score": "0.5283809", "text": "func (mr *MockTrackRepMockRecorder) SelectByID(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SelectByID\", reflect.TypeOf((*MockTrackRep)(nil).SelectByID), arg0, arg1)\n}", "title": "" }, { "docid": "84bd9d89fde9cb488bbe2d28da780a74", "score": "0.5270214", "text": "func (mr *MockRoverAPIMockRecorder) ID() *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ID\", reflect.TypeOf((*MockRoverAPI)(nil).ID))\n}", "title": "" }, { "docid": "4181c59b55e9f08d165adea645abcb35", "score": "0.5252607", "text": "func (_m *ITransactionService) UpdateTransactionService(id int, transaction *model.Transaction) (*model.Transaction, error) {\n\tret := _m.Called(id, transaction)\n\n\tvar r0 *model.Transaction\n\tif rf, ok := ret.Get(0).(func(int, *model.Transaction) *model.Transaction); ok {\n\t\tr0 = rf(id, transaction)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*model.Transaction)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int, *model.Transaction) error); ok {\n\t\tr1 = rf(id, transaction)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "8a3f3ebaa3f58916a6c074d29520e3c9", "score": "0.52519816", "text": "func (mr *MockCountryRepositoryMockRecorder) SelectByID(countryID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SelectByID\", reflect.TypeOf((*MockCountryRepository)(nil).SelectByID), countryID)\n}", "title": "" }, { "docid": "ef9d9e2916518f9ba4e3223e7b852057", "score": "0.52378476", "text": "func (mr *MockIEventDetailMockRecorder) GetEventDetailByID(ID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetEventDetailByID\", reflect.TypeOf((*MockIEventDetail)(nil).GetEventDetailByID), ID)\n}", "title": "" }, { "docid": "ecf5f8699d575887d7aead9d629385c5", "score": "0.5229312", "text": "func (mr *MockTransactionRepositoryMockRecorder) UpdateTransaction(ctx, transactionID, Amount, Target, tags, group, requestID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UpdateTransaction\", reflect.TypeOf((*MockTransactionRepository)(nil).UpdateTransaction), ctx, transactionID, Amount, Target, tags, group, requestID)\n}", "title": "" }, { "docid": "1c8a2fd20731d827d0291efeb68ef9f7", "score": "0.5226241", "text": "func (mr *MockITagUsecaseMockRecorder) GetTagByID(tagID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetTagByID\", reflect.TypeOf((*MockITagUsecase)(nil).GetTagByID), tagID)\n}", "title": "" }, { "docid": "3b7488c17a2b69f161515f90cd247ad2", "score": "0.52145886", "text": "func (s RequestStorage) UpdateByID(ormer orm.Ormer, input *models.Request) (num int64, err error) {\n\tinput.UpdatedAt = time.Now()\n\tnum, err = ormer.Update(input)\n\treturn\n}", "title": "" }, { "docid": "3020a5bc0555b5305925e874b2c3c319", "score": "0.52102613", "text": "func (mr *MockNodeIfaceMockRecorder) NodesGetWorkflowByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"NodesGetWorkflowByID\", reflect.TypeOf((*MockNodeIface)(nil).NodesGetWorkflowByID), arg0, arg1)\n}", "title": "" }, { "docid": "6d897bd85c3c934441fca65e2dc02319", "score": "0.52034867", "text": "func (mr *MockAccountServiceIfaceMockRecorder) GetAccountByID(id interface{}, opts ...interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\tvarargs := append([]interface{}{id}, opts...)\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetAccountByID\", reflect.TypeOf((*MockAccountServiceIface)(nil).GetAccountByID), varargs...)\n}", "title": "" }, { "docid": "30a609d54555e5d459371874c1011120", "score": "0.5199734", "text": "func (mock *RepositoryMock) UpdateAppNameByIDCalls() []struct {\n\tID string\n\tName string\n} {\n\tvar calls []struct {\n\t\tID string\n\t\tName string\n\t}\n\tlockRepositoryMockUpdateAppNameByID.RLock()\n\tcalls = mock.calls.UpdateAppNameByID\n\tlockRepositoryMockUpdateAppNameByID.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "86f1f1675d455289a777c53af92fbb61", "score": "0.5197025", "text": "func (mr *MockInstanceMockRecorder) SetID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SetID\", reflect.TypeOf((*MockInstance)(nil).SetID), id)\n}", "title": "" }, { "docid": "6d9e64c1510f8df95ed895e1738e4f1b", "score": "0.5195561", "text": "func (mr *MockDataAccessMockRecorder) SelectResultByID(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SelectResultByID\", reflect.TypeOf((*MockDataAccess)(nil).SelectResultByID), id)\n}", "title": "" }, { "docid": "3da2e91a52fa0dd69727481e7eb816eb", "score": "0.5192411", "text": "func (mr *MockNodeIfaceMockRecorder) NodesMasterDelTagByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"NodesMasterDelTagByID\", reflect.TypeOf((*MockNodeIface)(nil).NodesMasterDelTagByID), arg0, arg1)\n}", "title": "" }, { "docid": "965855f209c3a0f05ce0919d9fe460c5", "score": "0.5186713", "text": "func (mr *MockAMQPClientMockRecorder) ID() *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ID\", reflect.TypeOf((*MockAMQPClient)(nil).ID))\n}", "title": "" }, { "docid": "231cb691743b5c5e72482cfd0db411cb", "score": "0.5184135", "text": "func (mr *MockRestaurantUsecaseMockRecorder) GetById(arg0, arg1, arg2 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetById\", reflect.TypeOf((*MockRestaurantUsecase)(nil).GetById), arg0, arg1, arg2)\n}", "title": "" }, { "docid": "8d952e04f19f216e524fe1daed46f8fa", "score": "0.5183329", "text": "func (m *MockTransactionRepository) UpdateTransaction(ctx context.Context, transactionID uuid.UUID, Amount int, Target string, tags []*uuid.UUID, group, requestID *uuid.UUID) (*model.TransactionResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"UpdateTransaction\", ctx, transactionID, Amount, Target, tags, group, requestID)\n\tret0, _ := ret[0].(*model.TransactionResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "bfa3c398349ccd0b37f841fb88ddc290", "score": "0.5168452", "text": "func (mr *MockIMarketMockRecorder) ID(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ID\", reflect.TypeOf((*MockIMarket)(nil).ID), arg0)\n}", "title": "" }, { "docid": "52bb5fa6d8ec878ab64bbee3fe090891", "score": "0.51577806", "text": "func TestGetUserByID(t *testing.T) {\n\tuserModel := NewUserModel()\n\tuser := NewUser(\"blarg\", \"foo\", \"foo\", \"foo\")\n\terr := userModel.AddUser(user)\n\tdefer callSQL(\"clean_get_user_by_id_test.sql\")\n\tif err != nil {\n\t\tt.Logf(\"Should not have gotten error, got '%s'.\", err)\n\t\tt.FailNow()\n\t}\n\tfoundUser, err := userModel.GetUserByID(user.ID)\n\tif err != nil {\n\t\tt.Logf(\"Should not have gotten error, got '%s'.\", err)\n\t\tt.FailNow()\n\t}\n\tif foundUser.Name != user.Name {\n\t\tt.Logf(\"Expected '%s', got '%s'.\", user.Name, foundUser.Name)\n\t\tt.Fail()\n\t}\n}", "title": "" }, { "docid": "d78dd3fd681e8f34690a2ba501079152", "score": "0.51528394", "text": "func (mr *MockUserRepositoryMockRecorder) FindById(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"FindById\", reflect.TypeOf((*MockUserRepository)(nil).FindById), arg0)\n}", "title": "" }, { "docid": "b2da3e5ae5ae68d851631f800c410aad", "score": "0.51484513", "text": "func (mr *MockSampleRepositoryMockRecorder) GetById(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetById\", reflect.TypeOf((*MockSampleRepository)(nil).GetById), id)\n}", "title": "" }, { "docid": "fcdd8d1ebf61e57e9edaa59ec8e4e7b2", "score": "0.51412994", "text": "func (mr *MockCustomerServiceInterfaceMockRecorder) GetById(id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetById\", reflect.TypeOf((*MockCustomerServiceInterface)(nil).GetById), id)\n}", "title": "" }, { "docid": "4fd2422b33754996bc30b5291d5c53e1", "score": "0.5140211", "text": "func (mr *MockTopologyServiceMockRecorder) GetTopologyByID(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetTopologyByID\", reflect.TypeOf((*MockTopologyService)(nil).GetTopologyByID), arg0, arg1)\n}", "title": "" }, { "docid": "b8c1c88d45709669f9dbca81a441ef86", "score": "0.5123681", "text": "func (m *MockBooksPartInterface) ChangeBookStatusByID(ID int32, status bool) error {\n\tret := m.ctrl.Call(m, \"ChangeBookStatusByID\", ID, status)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "25de9a2a6add88b593122872a443bce4", "score": "0.51222533", "text": "func (mr *MockCountryRepositoryMockRecorder) DeleteByID(countryID interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteByID\", reflect.TypeOf((*MockCountryRepository)(nil).DeleteByID), countryID)\n}", "title": "" }, { "docid": "8210aedaaac2647c9ed87040f4c6f913", "score": "0.51176417", "text": "func (_mr *MockAptMockRecorder) Update() *gomock.Call {\n\treturn _mr.mock.ctrl.RecordCallWithMethodType(_mr.mock, \"Update\", reflect.TypeOf((*MockApt)(nil).Update))\n}", "title": "" }, { "docid": "0666b35edb2eba5ee520d4d0a595b2c1", "score": "0.51104516", "text": "func (_m *Orchestrator) GetTransactionByID(ctx context.Context, ns string, id string) (*fftypes.Transaction, error) {\n\tret := _m.Called(ctx, ns, id)\n\n\tvar r0 *fftypes.Transaction\n\tif rf, ok := ret.Get(0).(func(context.Context, string, string) *fftypes.Transaction); ok {\n\t\tr0 = rf(ctx, ns, id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*fftypes.Transaction)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string, string) error); ok {\n\t\tr1 = rf(ctx, ns, id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "31185d1a31422f07df14769387336ecd", "score": "0.5109829", "text": "func (mr *MockNodeIfaceMockRecorder) NodesGetPollersByID(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"NodesGetPollersByID\", reflect.TypeOf((*MockNodeIface)(nil).NodesGetPollersByID), arg0, arg1)\n}", "title": "" } ]
a9a00ecd4779d8a8b14136f8a27e11c7
EXPECT returns an object that allows the caller to indicate expected use.
[ { "docid": "a7bb916d18432a30137bfba62e0eb815", "score": "0.0", "text": "func (m *MockDiscovery) EXPECT() *MockDiscoveryMockRecorder {\n\treturn m.recorder\n}", "title": "" } ]
[ { "docid": "8e9cd2d35b436e4e2e71fe6311a7ceab", "score": "0.61723924", "text": "func Expect(t *testing.T, actual interface{}) *Testee {\n\treturn newTestee(t, actual)\n}", "title": "" }, { "docid": "d91658ed8083d76d5bcd2be2f939f9d1", "score": "0.6055155", "text": "func (m *Mint) Expect(actual interface{}) *Testee {\n\treturn newTestee(m.t, actual)\n}", "title": "" }, { "docid": "9616a65bc4acd286dcbc96d1aed023cd", "score": "0.6018881", "text": "func Expect(data ...interface{}) MyExpect {\n\treturn MyExpect{\n\t\tIExpect: hit.Expect(data...),\n\t}\n}", "title": "" }, { "docid": "6a28f5dfb8215992ccd368c6aaee8947", "score": "0.5880774", "text": "func (mmIsAvailable *mAvailabilityCheckerMockIsAvailable) Expect(ctx context.Context) *mAvailabilityCheckerMockIsAvailable {\n\tif mmIsAvailable.mock.funcIsAvailable != nil {\n\t\tmmIsAvailable.mock.t.Fatalf(\"AvailabilityCheckerMock.IsAvailable mock is already set by Set\")\n\t}\n\n\tif mmIsAvailable.defaultExpectation == nil {\n\t\tmmIsAvailable.defaultExpectation = &AvailabilityCheckerMockIsAvailableExpectation{}\n\t}\n\n\tmmIsAvailable.defaultExpectation.params = &AvailabilityCheckerMockIsAvailableParams{ctx}\n\tfor _, e := range mmIsAvailable.expectations {\n\t\tif minimock.Equal(e.params, mmIsAvailable.defaultExpectation.params) {\n\t\t\tmmIsAvailable.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmIsAvailable.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmIsAvailable\n}", "title": "" }, { "docid": "abde1aa7d95f24accc883003bc90160f", "score": "0.58737296", "text": "func (tc TestCases) expect() {\n\tif !reflect.DeepEqual(tc.resp, tc.respExp) {\n\t\ttc.t.Error(fmt.Sprintf(\"\\nRequested: \", tc.req, \"\\nExpected: \", tc.respExp, \"\\nFound: \", tc.resp))\n\t}\n}", "title": "" }, { "docid": "0f5933e03c60bbb842bc9252fa54cbf7", "score": "0.5782782", "text": "func mockSenderReference() *SenderReference {\n\tsr := NewSenderReference()\n\tsr.SenderReference = \"Sender Reference\"\n\treturn sr\n}", "title": "" }, { "docid": "9f8caa7b784236351efbe3ee63b04120", "score": "0.5710667", "text": "func testMetadataObj() (metadata Metadata) {\n\tmetadata = Metadata{\n\t\tPackage: testModuleName(),\n\t\tVersion: \"0.1.0\",\n\t\tDescription: \"Test Project for Gomason.\",\n\t\tBuildInfo: BuildInfo{\n\t\t\tPrepCommands: []string{\n\t\t\t\t\"echo \\\"GOPATH is: ${GOPATH}\\\"\",\n\t\t\t},\n\t\t\tTargets: []BuildTarget{\n\t\t\t\t{\n\t\t\t\t\tName: \"linux/amd64\",\n\t\t\t\t\tFlags: map[string]string{\n\t\t\t\t\t\t\"FOO\": \"bar\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\tSignInfo: SignInfo{\n\t\t\tProgram: \"gpg\",\n\t\t\tEmail: \"gomason-tester@foo.com\",\n\t\t},\n\t\tPublishInfo: PublishInfo{\n\t\t\tTargets: []PublishTarget{\n\t\t\t\t{\n\t\t\t\t\tSource: \"testproject_linux_amd64\",\n\t\t\t\t\tDestination: \"{{.Repository}}/testproject/{{.Version}}/linux/amd64/testproject\",\n\t\t\t\t\tSignature: true,\n\t\t\t\t\tChecksums: true,\n\t\t\t\t},\n\t\t\t},\n\t\t\tTargetsMap: map[string]PublishTarget{\n\t\t\t\t\"testproject_linux_amd64\": {\n\t\t\t\t\tSource: \"testproject_linux_amd64\",\n\t\t\t\t\tDestination: \"{{.Repository}}/testproject/{{.Version}}/linux/amd64/testproject\",\n\t\t\t\t\tSignature: true,\n\t\t\t\t\tChecksums: true,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\treturn metadata\n}", "title": "" }, { "docid": "0a03d2b73359fd0d3c3a30f9f1410c34", "score": "0.569735", "text": "func (m *MockMachinery) EXPECT() *MockMachineryMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "05f86ef8d05cf6c5c7014e56476aee3e", "score": "0.5690565", "text": "func (i *Mock) Expect() *RequestBuilder {\n\treturn i.request(nil)\n}", "title": "" }, { "docid": "aa77dfd1b6378abe9a9176b11c4060e0", "score": "0.56505376", "text": "func mock() error {\n\treturn nil\n}", "title": "" }, { "docid": "2462c35c7cc292b9dbb86b8826299b62", "score": "0.56503326", "text": "func (_m *MockPhotoUsecase) EXPECT() *MockPhotoUsecaseMockRecorder {\n\treturn _m.recorder\n}", "title": "" }, { "docid": "df50189b0189759b5ec904bb0719049c", "score": "0.56441045", "text": "func expect(t *testing.T, a interface{}, b interface{}) {\n\tif a != b {\n\t\tt.Errorf(\n\t\t\t\"Expected %v - Got %v\",\n\t\t\ta, b,\n\t\t)\n\t}\n}", "title": "" }, { "docid": "8f3df68329efd943b20abbf46e60e945", "score": "0.5636874", "text": "func (m *MocksecretCreator) EXPECT() *MocksecretCreatorMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "81ab3881ba841fa9c2b63364405c0a60", "score": "0.5632456", "text": "func (_m *MockYAML) EXPECT() *MockYAMLMockRecorder {\n\treturn _m.recorder\n}", "title": "" }, { "docid": "85ed90beba6e45df1971b82b727bb898", "score": "0.56249547", "text": "func (mmAsBytes *mSignatureHolderMockAsBytes) Expect() *mSignatureHolderMockAsBytes {\n\tif mmAsBytes.mock.funcAsBytes != nil {\n\t\tmmAsBytes.mock.t.Fatalf(\"SignatureHolderMock.AsBytes mock is already set by Set\")\n\t}\n\n\tif mmAsBytes.defaultExpectation == nil {\n\t\tmmAsBytes.defaultExpectation = &SignatureHolderMockAsBytesExpectation{}\n\t}\n\n\treturn mmAsBytes\n}", "title": "" }, { "docid": "5d695a2909565d104acc0790ce0ccf1e", "score": "0.5624112", "text": "func (m *MockUsecase) EXPECT() *MockUsecaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "5d695a2909565d104acc0790ce0ccf1e", "score": "0.5624112", "text": "func (m *MockUsecase) EXPECT() *MockUsecaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "5d695a2909565d104acc0790ce0ccf1e", "score": "0.5624112", "text": "func (m *MockUsecase) EXPECT() *MockUsecaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "5d695a2909565d104acc0790ce0ccf1e", "score": "0.5624112", "text": "func (m *MockUsecase) EXPECT() *MockUsecaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "b8fd990bd60fd4c54b28a110ed49f477", "score": "0.5610972", "text": "func (m *MockHelm) EXPECT() *MockHelmMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "e17ee473a9ab97b4cb84870278f52560", "score": "0.56040436", "text": "func (mmMatch *mStaterMockMatch) Expect() *mStaterMockMatch {\n\tif mmMatch.mock.funcMatch != nil {\n\t\tmmMatch.mock.t.Fatalf(\"StaterMock.Match mock is already set by Set\")\n\t}\n\n\tif mmMatch.defaultExpectation == nil {\n\t\tmmMatch.defaultExpectation = &StaterMockMatchExpectation{}\n\t}\n\n\treturn mmMatch\n}", "title": "" }, { "docid": "975a9873c8ed197390d4794172408215", "score": "0.5601497", "text": "func (mmCreate *mStorageMockCreate) Expect(model interface{}) *mStorageMockCreate {\n\tif mmCreate.mock.funcCreate != nil {\n\t\tmmCreate.mock.t.Fatalf(\"StorageMock.Create mock is already set by Set\")\n\t}\n\n\tif mmCreate.defaultExpectation == nil {\n\t\tmmCreate.defaultExpectation = &StorageMockCreateExpectation{}\n\t}\n\n\tmmCreate.defaultExpectation.params = &StorageMockCreateParams{model}\n\tfor _, e := range mmCreate.expectations {\n\t\tif minimock.Equal(e.params, mmCreate.defaultExpectation.params) {\n\t\t\tmmCreate.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmCreate.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmCreate\n}", "title": "" }, { "docid": "2945593079656838127544e97014ddb9", "score": "0.5600792", "text": "func (mmState *mStaterMockState) Expect() *mStaterMockState {\n\tif mmState.mock.funcState != nil {\n\t\tmmState.mock.t.Fatalf(\"StaterMock.State mock is already set by Set\")\n\t}\n\n\tif mmState.defaultExpectation == nil {\n\t\tmmState.defaultExpectation = &StaterMockStateExpectation{}\n\t}\n\n\treturn mmState\n}", "title": "" }, { "docid": "457c17df2b7332599c73fcd99bfc8ea9", "score": "0.55865365", "text": "func (mmWriteTo *mSignatureHolderMockWriteTo) Expect(w io.Writer) *mSignatureHolderMockWriteTo {\n\tif mmWriteTo.mock.funcWriteTo != nil {\n\t\tmmWriteTo.mock.t.Fatalf(\"SignatureHolderMock.WriteTo mock is already set by Set\")\n\t}\n\n\tif mmWriteTo.defaultExpectation == nil {\n\t\tmmWriteTo.defaultExpectation = &SignatureHolderMockWriteToExpectation{}\n\t}\n\n\tmmWriteTo.defaultExpectation.params = &SignatureHolderMockWriteToParams{w}\n\tfor _, e := range mmWriteTo.expectations {\n\t\tif minimock.Equal(e.params, mmWriteTo.defaultExpectation.params) {\n\t\t\tmmWriteTo.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmWriteTo.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmWriteTo\n}", "title": "" }, { "docid": "6bfd13a35eb7e1a9bb22d7badd701a73", "score": "0.55826366", "text": "func (m *MockParser) EXPECT() *MockParserMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "6bfd13a35eb7e1a9bb22d7badd701a73", "score": "0.55826366", "text": "func (m *MockParser) EXPECT() *MockParserMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "8fd83461c48baa3c0140ce2806f31547", "score": "0.5563487", "text": "func (mmStart *mStarterMockStart) Expect(ctx context.Context) *mStarterMockStart {\n\tif mmStart.mock.funcStart != nil {\n\t\tmmStart.mock.t.Fatalf(\"StarterMock.Start mock is already set by Set\")\n\t}\n\n\tif mmStart.defaultExpectation == nil {\n\t\tmmStart.defaultExpectation = &StarterMockStartExpectation{}\n\t}\n\n\tmmStart.defaultExpectation.params = &StarterMockStartParams{ctx}\n\tfor _, e := range mmStart.expectations {\n\t\tif minimock.Equal(e.params, mmStart.defaultExpectation.params) {\n\t\t\tmmStart.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmStart.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmStart\n}", "title": "" }, { "docid": "5e172ad935996c4d8245964d03ae121e", "score": "0.5561267", "text": "func (m *MockArticlesUsecase) EXPECT() *MockArticlesUsecaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "411745a5804c54803f984dd4e92f3439", "score": "0.55572474", "text": "func NewRequesterArgSameAsNamedImport(t interface {\n\tmock.TestingT\n\tCleanup(func())\n}) *RequesterArgSameAsNamedImport {\n\tmock := &RequesterArgSameAsNamedImport{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "e039ee2460bf9ba1928b1597f55fdcff", "score": "0.555213", "text": "func (mmAsByteString *mSignatureHolderMockAsByteString) Expect() *mSignatureHolderMockAsByteString {\n\tif mmAsByteString.mock.funcAsByteString != nil {\n\t\tmmAsByteString.mock.t.Fatalf(\"SignatureHolderMock.AsByteString mock is already set by Set\")\n\t}\n\n\tif mmAsByteString.defaultExpectation == nil {\n\t\tmmAsByteString.defaultExpectation = &SignatureHolderMockAsByteStringExpectation{}\n\t}\n\n\treturn mmAsByteString\n}", "title": "" }, { "docid": "8bee2904aec9a91efe4fb8a85938faed", "score": "0.5544446", "text": "func (m *MockIssueParser) EXPECT() *MockIssueParserMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "935a097e8ed9b7113c4311bd8276b9ba", "score": "0.5538422", "text": "func (m *MockItemUsecase) EXPECT() *MockItemUsecaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "d6b09a8d78998bd92bd646477962a7ba", "score": "0.55300325", "text": "func (mmStorage *mJetKeeperMockStorage) Expect() *mJetKeeperMockStorage {\n\tif mmStorage.mock.funcStorage != nil {\n\t\tmmStorage.mock.t.Fatalf(\"JetKeeperMock.Storage mock is already set by Set\")\n\t}\n\n\tif mmStorage.defaultExpectation == nil {\n\t\tmmStorage.defaultExpectation = &JetKeeperMockStorageExpectation{}\n\t}\n\n\treturn mmStorage\n}", "title": "" }, { "docid": "d22547a1adcd845ee0adaecd901c275e", "score": "0.55176467", "text": "func (mmGetState *mNetworkMockGetState) Expect() *mNetworkMockGetState {\n\tif mmGetState.mock.funcGetState != nil {\n\t\tmmGetState.mock.t.Fatalf(\"NetworkMock.GetState mock is already set by Set\")\n\t}\n\n\tif mmGetState.defaultExpectation == nil {\n\t\tmmGetState.defaultExpectation = &NetworkMockGetStateExpectation{}\n\t}\n\n\treturn mmGetState\n}", "title": "" }, { "docid": "7f73633552d8ccb39a9a7871dccf5aab", "score": "0.55084395", "text": "func Expect(t TestingT, expect string, actual interface{}, args ...int) bool {\n\tcall := 3\n\tif len(args) > 0 {\n\t\tcall = args[0]\n\t}\n\n\tactualStr := fmt.Sprint(actual)\n\tif expect != actualStr {\n\t\terr := FmtErr(call)\n\t\tt.Errorf(err, expect, actualStr)\n\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "b3c06db3fccbfb18dff22d73db23a571", "score": "0.5494406", "text": "func (mmStart *mHostNetworkMockStart) Expect(ctx context.Context) *mHostNetworkMockStart {\n\tif mmStart.mock.funcStart != nil {\n\t\tmmStart.mock.t.Fatalf(\"HostNetworkMock.Start mock is already set by Set\")\n\t}\n\n\tif mmStart.defaultExpectation == nil {\n\t\tmmStart.defaultExpectation = &HostNetworkMockStartExpectation{}\n\t}\n\n\tmmStart.defaultExpectation.params = &HostNetworkMockStartParams{ctx}\n\tfor _, e := range mmStart.expectations {\n\t\tif minimock.Equal(e.params, mmStart.defaultExpectation.params) {\n\t\t\tmmStart.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmStart.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmStart\n}", "title": "" }, { "docid": "0cd29bf1e830b3f362080932f59d29dd", "score": "0.54906327", "text": "func (mmStartWorker *mStaterMockStartWorker) Expect() *mStaterMockStartWorker {\n\tif mmStartWorker.mock.funcStartWorker != nil {\n\t\tmmStartWorker.mock.t.Fatalf(\"StaterMock.StartWorker mock is already set by Set\")\n\t}\n\n\tif mmStartWorker.defaultExpectation == nil {\n\t\tmmStartWorker.defaultExpectation = &StaterMockStartWorkerExpectation{}\n\t}\n\n\treturn mmStartWorker\n}", "title": "" }, { "docid": "3881f42cf99f96acb222d0c70724f800", "score": "0.5490514", "text": "func (_m *MockStager) EXPECT() *MockStagerMockRecorder {\n\treturn _m.recorder\n}", "title": "" }, { "docid": "3881f42cf99f96acb222d0c70724f800", "score": "0.5490514", "text": "func (_m *MockStager) EXPECT() *MockStagerMockRecorder {\n\treturn _m.recorder\n}", "title": "" }, { "docid": "3881f42cf99f96acb222d0c70724f800", "score": "0.5490514", "text": "func (_m *MockStager) EXPECT() *MockStagerMockRecorder {\n\treturn _m.recorder\n}", "title": "" }, { "docid": "569ff5b6f5631e1b228457e2af5cd45f", "score": "0.5490313", "text": "func (mmRead *mSignatureHolderMockRead) Expect(p []byte) *mSignatureHolderMockRead {\n\tif mmRead.mock.funcRead != nil {\n\t\tmmRead.mock.t.Fatalf(\"SignatureHolderMock.Read mock is already set by Set\")\n\t}\n\n\tif mmRead.defaultExpectation == nil {\n\t\tmmRead.defaultExpectation = &SignatureHolderMockReadExpectation{}\n\t}\n\n\tmmRead.defaultExpectation.params = &SignatureHolderMockReadParams{p}\n\tfor _, e := range mmRead.expectations {\n\t\tif minimock.Equal(e.params, mmRead.defaultExpectation.params) {\n\t\t\tmmRead.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmRead.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmRead\n}", "title": "" }, { "docid": "858cfe719c7fbb03df94c8867dc232ee", "score": "0.5489805", "text": "func mockAmount() *Amount {\n\ta := NewAmount()\n\ta.Amount = \"000001234567\"\n\treturn a\n}", "title": "" }, { "docid": "858cfe719c7fbb03df94c8867dc232ee", "score": "0.5489805", "text": "func mockAmount() *Amount {\n\ta := NewAmount()\n\ta.Amount = \"000001234567\"\n\treturn a\n}", "title": "" }, { "docid": "903ac115c3a6dbc7f1cbbb9654ae7ad8", "score": "0.5481647", "text": "func (m *Mockcodestar) EXPECT() *MockcodestarMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "d770632d8c73de7373e8b18ecca3d610", "score": "0.5476239", "text": "func Expect(err error, msg string) {\n\tif err != nil {\n\t\tpanic(msg)\n\t}\n}", "title": "" }, { "docid": "2e6108dab77afb0efc61d119db3440be", "score": "0.54719436", "text": "func (mmSender *mMessageMockSender) Expect() *mMessageMockSender {\n\tif mmSender.mock.funcSender != nil {\n\t\tmmSender.mock.t.Fatalf(\"MessageMock.Sender mock is already set by Set\")\n\t}\n\n\tif mmSender.defaultExpectation == nil {\n\t\tmmSender.defaultExpectation = &MessageMockSenderExpectation{}\n\t}\n\n\treturn mmSender\n}", "title": "" }, { "docid": "7deab9278cba09c041ea98122d095104", "score": "0.54700464", "text": "func (mmCopyOfSignature *mSignatureHolderMockCopyOfSignature) Expect() *mSignatureHolderMockCopyOfSignature {\n\tif mmCopyOfSignature.mock.funcCopyOfSignature != nil {\n\t\tmmCopyOfSignature.mock.t.Fatalf(\"SignatureHolderMock.CopyOfSignature mock is already set by Set\")\n\t}\n\n\tif mmCopyOfSignature.defaultExpectation == nil {\n\t\tmmCopyOfSignature.defaultExpectation = &SignatureHolderMockCopyOfSignatureExpectation{}\n\t}\n\n\treturn mmCopyOfSignature\n}", "title": "" }, { "docid": "3e873dcabdf1ae312f4df652c53b4af5", "score": "0.54575956", "text": "func (m *MockStorable) EXPECT() *MockStorableMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "64e46fc0d22e8ebb26b76b6c0f0f5c15", "score": "0.5456053", "text": "func (m *MockSomethingUseCase) EXPECT() *MockSomethingUseCaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "eb36b8d58f1da7de8d25b3aa0ac944b2", "score": "0.54547477", "text": "func (m *MockMaker) EXPECT() *MockMakerMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "9676a270dddb8f896660bc388670ac8c", "score": "0.5450308", "text": "func (m *MockinstanceMetadata) EXPECT() *MockinstanceMetadataMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "e36866b373868647589cda37902c8517", "score": "0.5442647", "text": "func (m *MockProviders) EXPECT() *MockProvidersMockRecorder {\r\n\treturn m.recorder\r\n}", "title": "" }, { "docid": "98842eb6b5743f386ca1ff98f6fe2cf6", "score": "0.54411596", "text": "func (m *MockenvironmentCreator) EXPECT() *MockenvironmentCreatorMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "bee9a4103ff0babde1fa4fcfd506d6db", "score": "0.54281783", "text": "func (m *MockExternalIssueParser) EXPECT() *MockExternalIssueParserMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "5be5c08c31ef72bd3d9d26452a686a69", "score": "0.54238075", "text": "func (m *MockapplicationCreator) EXPECT() *MockapplicationCreatorMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "346e12f057d9ea860fad425e838523a9", "score": "0.541958", "text": "func (mmGetSignatureVerifier *mLocalNodeMockGetSignatureVerifier) Expect() *mLocalNodeMockGetSignatureVerifier {\n\tif mmGetSignatureVerifier.mock.funcGetSignatureVerifier != nil {\n\t\tmmGetSignatureVerifier.mock.t.Fatalf(\"LocalNodeMock.GetSignatureVerifier mock is already set by Set\")\n\t}\n\n\tif mmGetSignatureVerifier.defaultExpectation == nil {\n\t\tmmGetSignatureVerifier.defaultExpectation = &LocalNodeMockGetSignatureVerifierExpectation{}\n\t}\n\n\treturn mmGetSignatureVerifier\n}", "title": "" }, { "docid": "7d0ea3e1ec648dc04e117ab2070be8f4", "score": "0.541911", "text": "func (_m *MockExample) EXPECT() *MockExampleMockRecorder {\n\treturn _m.recorder\n}", "title": "" }, { "docid": "c4e5318bd99adaf2a94b55428439b89c", "score": "0.5416726", "text": "func (m *MockfsCreator) EXPECT() *MockfsCreatorMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "39dda80493fa584c31f5ece56d6b8ec1", "score": "0.5415592", "text": "func (mmStart *mOpentelemetryTracerMockStart) Expect(ctx context.Context, spanName string, opts ...mm_trace.SpanStartOption) *mOpentelemetryTracerMockStart {\n\tif mmStart.mock.funcStart != nil {\n\t\tmmStart.mock.t.Fatalf(\"OpentelemetryTracerMock.Start mock is already set by Set\")\n\t}\n\n\tif mmStart.defaultExpectation == nil {\n\t\tmmStart.defaultExpectation = &OpentelemetryTracerMockStartExpectation{}\n\t}\n\n\tmmStart.defaultExpectation.params = &OpentelemetryTracerMockStartParams{ctx, spanName, opts}\n\tfor _, e := range mmStart.expectations {\n\t\tif minimock.Equal(e.params, mmStart.defaultExpectation.params) {\n\t\t\tmmStart.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmStart.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmStart\n}", "title": "" }, { "docid": "f6fea4bb8eac8ac6a154fb9129b35eed", "score": "0.5415032", "text": "func (m *MockLambdaAPI) EXPECT() *MockLambdaAPIMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "f6fea4bb8eac8ac6a154fb9129b35eed", "score": "0.5415032", "text": "func (m *MockLambdaAPI) EXPECT() *MockLambdaAPIMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "246f528603a0478293c790d4d3e17174", "score": "0.5411957", "text": "func (m *MockResourceManager) EXPECT() *MockResourceManagerMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "246f528603a0478293c790d4d3e17174", "score": "0.5411957", "text": "func (m *MockResourceManager) EXPECT() *MockResourceManagerMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "246f528603a0478293c790d4d3e17174", "score": "0.5411957", "text": "func (m *MockResourceManager) EXPECT() *MockResourceManagerMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "f159c24e51cbf4b728f486063adfac9d", "score": "0.54103726", "text": "func (_m *MockManifest) EXPECT() *MockManifestMockRecorder {\n\treturn _m.recorder\n}", "title": "" }, { "docid": "f159c24e51cbf4b728f486063adfac9d", "score": "0.54103726", "text": "func (_m *MockManifest) EXPECT() *MockManifestMockRecorder {\n\treturn _m.recorder\n}", "title": "" }, { "docid": "9cda667b4e970353045d30fe08466d30", "score": "0.54100025", "text": "func (m *MockIUsecase) EXPECT() *MockIUsecaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "9cda667b4e970353045d30fe08466d30", "score": "0.54100025", "text": "func (m *MockIUsecase) EXPECT() *MockIUsecaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "a48d44cd14fc094bcbc070180085952f", "score": "0.5404678", "text": "func (m *MockstackSerializer) EXPECT() *MockstackSerializerMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "052b2d7f0f7f0d161e8a2ca31ecfb060", "score": "0.5404327", "text": "func expectBody(t *testing.T, got interface{}, expected interface{}) {\n\tif got != expected {\n\t\tt.Errorf(\"handler returned wrong body: got %v want %v\", got, expected)\n\t}\n}", "title": "" }, { "docid": "94e2a10fbe712626aea93a77edb6d281", "score": "0.5398861", "text": "func (m *MockTokenCreator) EXPECT() *MockTokenCreatorMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "79b25f08728b43bd3921f39b9a45ea97", "score": "0.53982276", "text": "func (m *MockCliInterface) EXPECT() *MockCliInterfaceMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "86732e4a6ff0339e9ebdfd83d5135395", "score": "0.5397852", "text": "func (m *MockUserUsecase) EXPECT() *MockUserUsecaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "f7dafa83441396025e66dd7babcddc1d", "score": "0.5396741", "text": "func (c *Challenge) Be(expected interface{}) *Challenge {\n\tc.t.Helper()\n\tif _, ok := c.v.(error); ok {\n\t\treturn c.RaiseError(expected)\n\t}\n\n\tc.expect(reflect.DeepEqual(c.v, expected), \"Expected '%v' to equal '%v'\", c.v, expected)\n\treturn c\n}", "title": "" }, { "docid": "a5e89b0252616a7b800c830e51d31a5b", "score": "0.5395575", "text": "func (m *MockNAT) EXPECT() *MockNATMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "a65eb57cca6da1a1ae1e023132d23d92", "score": "0.53919053", "text": "func (m *MockAbillity) EXPECT() *MockAbillityMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "bfa3d8c3520eaa90ee6b8c96d89cfd7a", "score": "0.5391712", "text": "func (m *MockFactory) EXPECT() *MockFactoryMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "bfa3d8c3520eaa90ee6b8c96d89cfd7a", "score": "0.5391712", "text": "func (m *MockFactory) EXPECT() *MockFactoryMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "bfa3d8c3520eaa90ee6b8c96d89cfd7a", "score": "0.5391712", "text": "func (m *MockFactory) EXPECT() *MockFactoryMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "bfa3d8c3520eaa90ee6b8c96d89cfd7a", "score": "0.5391712", "text": "func (m *MockFactory) EXPECT() *MockFactoryMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "0426cee0d6fe36d1edf7982cadb7f1fa", "score": "0.53854394", "text": "func (m MockProvider) MockASG() *mocksv2.ASG { return m.ASG().(*mocksv2.ASG) }", "title": "" }, { "docid": "1d6591cfeb43463d8799568983335930", "score": "0.53844357", "text": "func (m *MockJSONCreator) EXPECT() *MockJSONCreatorMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "2176f8782377ba05467bec3bada7ecb0", "score": "0.53826284", "text": "func (m *MockEC2) EXPECT() *MockEC2MockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "4df3a1af6992a369483245ca3fb571d9", "score": "0.5381891", "text": "func (mmIsVoter *mLocalNodeMockIsVoter) Expect() *mLocalNodeMockIsVoter {\n\tif mmIsVoter.mock.funcIsVoter != nil {\n\t\tmmIsVoter.mock.t.Fatalf(\"LocalNodeMock.IsVoter mock is already set by Set\")\n\t}\n\n\tif mmIsVoter.defaultExpectation == nil {\n\t\tmmIsVoter.defaultExpectation = &LocalNodeMockIsVoterExpectation{}\n\t}\n\n\treturn mmIsVoter\n}", "title": "" }, { "docid": "78a0951eac3f13affda1c717b02f798d", "score": "0.5380391", "text": "func (m *MockUseCase) EXPECT() *MockUseCaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "78a0951eac3f13affda1c717b02f798d", "score": "0.5380391", "text": "func (m *MockUseCase) EXPECT() *MockUseCaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "78a0951eac3f13affda1c717b02f798d", "score": "0.5380391", "text": "func (m *MockUseCase) EXPECT() *MockUseCaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "78a0951eac3f13affda1c717b02f798d", "score": "0.5380391", "text": "func (m *MockUseCase) EXPECT() *MockUseCaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "78a0951eac3f13affda1c717b02f798d", "score": "0.5380391", "text": "func (m *MockUseCase) EXPECT() *MockUseCaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "78a0951eac3f13affda1c717b02f798d", "score": "0.5380391", "text": "func (m *MockUseCase) EXPECT() *MockUseCaseMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "be4610eda0d6bbb63a18fe84ed75ad7c", "score": "0.53762406", "text": "func (m *MockDiagnosticBundleFactory) EXPECT() *MockDiagnosticBundleFactoryMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "50ba3023fc5d911395c841c0b2da3840", "score": "0.53746843", "text": "func (m *MockExternalSourceParser) EXPECT() *MockExternalSourceParserMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "e303124c9f5ce1cff7a0404f3936bef2", "score": "0.5374535", "text": "func mockInstructedAmount() *InstructedAmount {\n\tia := NewInstructedAmount()\n\tia.CurrencyCode = \"USD\"\n\tia.Amount = \"4567,89\"\n\treturn ia\n}", "title": "" }, { "docid": "7110bebe146769d704d2918fa225f000", "score": "0.53745055", "text": "func (d MyInterfaceMockDescriptor) ReturnSomethingAtLeast() *MyInterfaceReturnSomethingAtLeastMockDescriptor {\n\treturn d.newMyInterfaceReturnSomethingAtLeastMockDescriptor()\n}", "title": "" }, { "docid": "f557e879232903dc00f2d35fd6e8afec", "score": "0.5373675", "text": "func (m *MockAMI) EXPECT() *MockAMIMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "17be70a87fa908e192ca2677e63b4246", "score": "0.5368239", "text": "func (m *MockStream) EXPECT() *MockStreamMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "b357c5e31e89520b9e9bb55803fb7997", "score": "0.5365506", "text": "func (_m *MockLogic) EXPECT() *MockLogicMockRecorder {\n\treturn _m.recorder\n}", "title": "" }, { "docid": "2c5320f2270f605a5a7275f954fd7cba", "score": "0.5363213", "text": "func (mmUploader *mStaterMockUploader) Expect() *mStaterMockUploader {\n\tif mmUploader.mock.funcUploader != nil {\n\t\tmmUploader.mock.t.Fatalf(\"StaterMock.Uploader mock is already set by Set\")\n\t}\n\n\tif mmUploader.defaultExpectation == nil {\n\t\tmmUploader.defaultExpectation = &StaterMockUploaderExpectation{}\n\t}\n\n\treturn mmUploader\n}", "title": "" }, { "docid": "cf41e43707b22d7a56b1bcb860585f44", "score": "0.5361407", "text": "func (m *MockSerializer) EXPECT() *MockSerializerMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "e347bbf039917a30b5ff944996563271", "score": "0.53602606", "text": "func (mmStart *mTransformerMockStart) Expect(ctx context.Context) *mTransformerMockStart {\n\tif mmStart.mock.funcStart != nil {\n\t\tmmStart.mock.t.Fatalf(\"TransformerMock.Start mock is already set by Set\")\n\t}\n\n\tif mmStart.defaultExpectation == nil {\n\t\tmmStart.defaultExpectation = &TransformerMockStartExpectation{}\n\t}\n\n\tmmStart.defaultExpectation.params = &TransformerMockStartParams{ctx}\n\tfor _, e := range mmStart.expectations {\n\t\tif minimock.Equal(e.params, mmStart.defaultExpectation.params) {\n\t\t\tmmStart.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmStart.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmStart\n}", "title": "" }, { "docid": "4b275b82fd7b854e480e94ec1a185e38", "score": "0.53584", "text": "func (m *MockInstance) EXPECT() *MockInstanceMockRecorder {\n\treturn m.recorder\n}", "title": "" } ]
b705ba4f4956f837e76f281ddd206a36
COUNTERNUMBERNEQ applies the NEQ predicate on the "COUNTER_NUMBER" field.
[ { "docid": "a5d54755025b210f654767f982497ea5", "score": "0.8549079", "text": "func COUNTERNUMBERNEQ(v string) predicate.ServicePoint {\n\treturn predicate.ServicePoint(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCOUNTERNUMBER), v))\n\t})\n}", "title": "" } ]
[ { "docid": "abb63cbda3f0abde3807fd6c837dc82c", "score": "0.74320686", "text": "func IdentificationnumberNEQ(v string) predicate.Customer {\n\treturn predicate.Customer(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldIdentificationnumber), v))\n\t})\n}", "title": "" }, { "docid": "8c3fcb49b1638fc84948303d5cad8cb7", "score": "0.71887505", "text": "func CardNumberNEQ(v string) predicate.PatientInfo {\n\treturn predicate.PatientInfo(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCardNumber), v))\n\t})\n}", "title": "" }, { "docid": "cd535095cb2565bca660207502423050", "score": "0.71689755", "text": "func COUNTERNUMBEREQ(v string) predicate.ServicePoint {\n\treturn predicate.ServicePoint(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldCOUNTERNUMBER), v))\n\t})\n}", "title": "" }, { "docid": "a1a35883b89676c504ca886912bf37f0", "score": "0.6825434", "text": "func PhonenumberNEQ(v string) predicate.Customer {\n\treturn predicate.Customer(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldPhonenumber), v))\n\t})\n}", "title": "" }, { "docid": "e23c54b93f538a3c74fce4681baab543", "score": "0.65692335", "text": "func COUNTERNUMBERNotIn(vs ...string) predicate.ServicePoint {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.ServicePoint(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.NotIn(s.C(FieldCOUNTERNUMBER), v...))\n\t})\n}", "title": "" }, { "docid": "a716ccacee8a0a3915715411cec91d5f", "score": "0.6563681", "text": "func RoomnumberNEQ(v string) predicate.Office {\n\treturn predicate.Office(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldRoomnumber), v))\n\t})\n}", "title": "" }, { "docid": "55078cc46b1253b5c942cebc1233e355", "score": "0.6548036", "text": "func NonceNEQ(v string) predicate.AuthCode {\n\treturn predicate.AuthCode(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldNonce), v))\n\t})\n}", "title": "" }, { "docid": "188902907b980e6e0bb7a11c5f8c8334", "score": "0.6368158", "text": "func IdentityCardNEQ(v string) predicate.Checkout {\n\treturn predicate.Checkout(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldIdentityCard), v))\n\t})\n}", "title": "" }, { "docid": "19c7d9864afa8f9bf7119d92eb729eeb", "score": "0.63366485", "text": "func NonceNEQ(v string) predicate.RefreshToken {\n\treturn predicate.RefreshToken(sql.FieldNEQ(FieldNonce, v))\n}", "title": "" }, { "docid": "a61e475d2f832e590b6324476e3c16ba", "score": "0.6320187", "text": "func PidNEQ(v int64) predicate.Category {\n\treturn predicate.Category(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldPid), v))\n\t})\n}", "title": "" }, { "docid": "8a311e04125e68d9e97da9774212f3b2", "score": "0.62633604", "text": "func ClientIDNEQ(v string) predicate.AuthCode {\n\treturn predicate.AuthCode(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldClientID), v))\n\t})\n}", "title": "" }, { "docid": "00c2a0e845f7b831e2636108236ad2c2", "score": "0.62627256", "text": "func IdolIDNEQ(v int) predicate.UserUser {\n\treturn predicate.UserUser(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldIdolID), v))\n\t})\n}", "title": "" }, { "docid": "8ef018f262a3921e679413d1d2b70d50", "score": "0.6251538", "text": "func ProductnumberNEQ(v string) predicate.Fix {\n\treturn predicate.Fix(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldProductnumber), v))\n\t})\n}", "title": "" }, { "docid": "4b330718c537b54a1e9fa736a663dd2e", "score": "0.6237771", "text": "func XueqiuCommentCountNEQ(v int64) predicate.TradeDate {\n\treturn predicate.TradeDate(sql.FieldNEQ(FieldXueqiuCommentCount, v))\n}", "title": "" }, { "docid": "03ef27147c9bde8469c5b9ab005ce1ac", "score": "0.6200975", "text": "func PeerIDNEQ(v string) predicate.Session {\n\treturn predicate.Session(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldPeerID), v))\n\t})\n}", "title": "" }, { "docid": "6f8f303db61aa5c9919a8f6cd174d60f", "score": "0.61872077", "text": "func VeritiumNEQ(v int) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldVeritium), v))\n\t})\n}", "title": "" }, { "docid": "3320bae1eff4849b5010a984f375b5e7", "score": "0.61826384", "text": "func DoctoridcardNEQ(v string) predicate.Office {\n\treturn predicate.Office(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldDoctoridcard), v))\n\t})\n}", "title": "" }, { "docid": "8cbc8db90f8b64920e4fded1cf9f7a03", "score": "0.6177243", "text": "func TrackingIDNEQ(v uuid.UUID) predicate.RawEvent {\n\treturn predicate.RawEvent(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldTrackingID), v))\n\t})\n}", "title": "" }, { "docid": "bcb7bcd1797add50edb2559a6146b42a", "score": "0.61595017", "text": "func MturkWorkerIDNEQ(v string) predicate.Participation {\n\treturn predicate.Participation(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldMturkWorkerID), v))\n\t})\n}", "title": "" }, { "docid": "ea67714c1f98e80144f14443fdc5440a", "score": "0.61185825", "text": "func COUNTERNUMBER(v string) predicate.ServicePoint {\n\treturn predicate.ServicePoint(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldCOUNTERNUMBER), v))\n\t})\n}", "title": "" }, { "docid": "fdbdeac18084ad37ea07056f60e00204", "score": "0.6092719", "text": "func TagNEQ(v string) predicate.ModuleVersion {\n\treturn predicate.ModuleVersion(\n\t\tfunc(s *sql.Selector) {\n\t\t\ts.Where(sql.NEQ(s.C(FieldTag), v))\n\t\t},\n\t)\n}", "title": "" }, { "docid": "5fff8e24a2a90235c46e2418935459a5", "score": "0.60762995", "text": "func IDNEQ(id int) predicate.OutcomeMeasurement {\n\treturn predicate.OutcomeMeasurement(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "c07d1456794fad5703c7ee53e379bcca", "score": "0.6068111", "text": "func COUNTERNUMBERLTE(v string) predicate.ServicePoint {\n\treturn predicate.ServicePoint(func(s *sql.Selector) {\n\t\ts.Where(sql.LTE(s.C(FieldCOUNTERNUMBER), v))\n\t})\n}", "title": "" }, { "docid": "7e88d978fa214f7af0e22f1ed0618f25", "score": "0.6067708", "text": "func UserIDNEQ(v string) predicate.Session {\n\treturn predicate.Session(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldUserID), v))\n\t})\n}", "title": "" }, { "docid": "d6af46922269887b688f4b6051ed683a", "score": "0.6057567", "text": "func InsuranceIdentificationNEQ(v string) predicate.Insurance {\n\treturn predicate.Insurance(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldInsuranceIdentification), v))\n\t})\n}", "title": "" }, { "docid": "8e16eeeb6436d9f1f015153df489ec4d", "score": "0.6053632", "text": "func CountNEQ(v int) predicate.BarGroup {\n\treturn predicate.BarGroup(sql.FieldNEQ(FieldCount, v))\n}", "title": "" }, { "docid": "08daffdcef24ccf19f5efd6325c40a19", "score": "0.6043231", "text": "func SalesNumNEQ(v int) predicate.GoodsSpu {\n\treturn predicate.GoodsSpu(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldSalesNum), v))\n\t})\n}", "title": "" }, { "docid": "da827748c71419ca609356214eeea285", "score": "0.60369474", "text": "func IDNEQ(id uuid.UUID) predicate.Profile {\n\treturn predicate.Profile(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "e51466ca92ddfc0fcb51d8dd1489f76c", "score": "0.60350025", "text": "func FingerprintNEQ(v string) predicate.Machine {\n\treturn predicate.Machine(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldFingerprint), v))\n\t})\n}", "title": "" }, { "docid": "88634f2a124222a428b97e412b727ff0", "score": "0.6031463", "text": "func UserIdNEQ(v int) predicate.Token {\n\treturn predicate.Token(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldUserId), v))\n\t})\n}", "title": "" }, { "docid": "a167464d5d349f3dffbd72a05f116ad1", "score": "0.603011", "text": "func IDNEQ(id int) predicate.Severity {\n\treturn predicate.Severity(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "7212af3577083e68f4f33b333d241e76", "score": "0.60195345", "text": "func UseridNEQ(v string) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldUserid), v))\n\t})\n}", "title": "" }, { "docid": "258bf7edee38e958385eaf59d99f2823", "score": "0.60185254", "text": "func IDNEQ(id int32) predicate.Review {\n\treturn predicate.Review(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "e917e4c040255062f6dc74f11c63b801", "score": "0.60131973", "text": "func TagIDNEQ(v int) predicate.TagTopic {\n\treturn predicate.TagTopic(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldTagID), v))\n\t})\n}", "title": "" }, { "docid": "c82de71b8978f010e3ad9b76ae599f08", "score": "0.5999305", "text": "func IDNEQ(id string) predicate.AuthCode {\n\treturn predicate.AuthCode(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "cfd7f78c66fb0b7f8bb33c5620e2091c", "score": "0.5985968", "text": "func HwidNEQ(v string) predicate.Machine {\n\treturn predicate.Machine(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldHwid), v))\n\t})\n}", "title": "" }, { "docid": "a2a631ea2cc06721c949b5631e6da1b5", "score": "0.5981826", "text": "func IDNEQ(id int) predicate.Customer {\n\treturn predicate.Customer(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "e0217713cafc5dbede63f8424111a177", "score": "0.59713095", "text": "func UserIDNEQ(v string) predicate.RawEvent {\n\treturn predicate.RawEvent(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldUserID), v))\n\t})\n}", "title": "" }, { "docid": "66820c9438d448468029be9d2f8b5286", "score": "0.59600985", "text": "func IDNEQ(id string) predicate.Book {\n\treturn predicate.Book(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "8388564a2153575fafaacf640d59c82d", "score": "0.59554875", "text": "func RhumNEQ(v int) predicate.Alert {\n\treturn predicate.Alert(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldRhum), v))\n\t})\n}", "title": "" }, { "docid": "149ac237f1f253982009e204e8f12f70", "score": "0.5941097", "text": "func IDNEQ(id int) predicate.ModuleVersion {\n\treturn predicate.ModuleVersion(\n\t\tfunc(s *sql.Selector) {\n\t\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t\t},\n\t)\n}", "title": "" }, { "docid": "f4bde34041682bc5e1b74302bd7b8dba", "score": "0.5939486", "text": "func CidUserNEQ(v string) predicate.Rent {\n\treturn predicate.Rent(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldCidUser), v))\n\t})\n}", "title": "" }, { "docid": "627dd7efa046137c2dd1a7f984bb8a6b", "score": "0.5936365", "text": "func IDNEQ(id uuid.UUID) predicate.Instance {\n\treturn predicate.Instance(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "e0d8283be10eff19bf135d8d56d62b97", "score": "0.5928151", "text": "func OutcomeMeasurementValueNEQ(v string) predicate.OutcomeMeasurement {\n\treturn predicate.OutcomeMeasurement(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldOutcomeMeasurementValue), v))\n\t})\n}", "title": "" }, { "docid": "a41d1303044b723ed2c927dffa7b46d4", "score": "0.59254783", "text": "func TotalNEQ(v string) predicate.Bill {\n\treturn predicate.Bill(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldTotal), v))\n\t})\n}", "title": "" }, { "docid": "c35d0358962f542e52c53c52da41be4a", "score": "0.5924857", "text": "func OrganizationIdNEQ(v int) predicate.Token {\n\treturn predicate.Token(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldOrganizationId), v))\n\t})\n}", "title": "" }, { "docid": "ec3c79c7cb0a746fb6e0e753b3c3fc1b", "score": "0.5924481", "text": "func IDNEQ(id int) predicate.Auth {\n\treturn predicate.Auth(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "110812cba84fea255b32a0d752d4645e", "score": "0.5923685", "text": "func StatusNEQ(v string) predicate.Instance {\n\treturn predicate.Instance(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" }, { "docid": "c5fee41289fba55ee1447159adf5ec24", "score": "0.5916863", "text": "func IDNEQ(id int) predicate.Customertype {\n\treturn predicate.Customertype(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "dfe89b8b2cf9eec49dc6f80bb0f4c171", "score": "0.5914935", "text": "func COUNTERNUMBERContains(v string) predicate.ServicePoint {\n\treturn predicate.ServicePoint(func(s *sql.Selector) {\n\t\ts.Where(sql.Contains(s.C(FieldCOUNTERNUMBER), v))\n\t})\n}", "title": "" }, { "docid": "b64b129fb58782506f945e760bef2746", "score": "0.5913293", "text": "func IDNEQ(id int) predicate.Alert {\n\treturn predicate.Alert(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "4c86a99426ada2b1d1141356a45d43b5", "score": "0.5908316", "text": "func ArpressNEQ(v int) predicate.Alert {\n\treturn predicate.Alert(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldArpress), v))\n\t})\n}", "title": "" }, { "docid": "2dd8409d056692a82e8c51f7c44d925f", "score": "0.5905706", "text": "func ConnectorIDNEQ(v string) predicate.AuthCode {\n\treturn predicate.AuthCode(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldConnectorID), v))\n\t})\n}", "title": "" }, { "docid": "bb2a384924c1c03e05c8c10c92ea17e7", "score": "0.59038156", "text": "func TokenNEQ(v string) predicate.Session {\n\treturn predicate.Session(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldToken), v))\n\t})\n}", "title": "" }, { "docid": "6e6f9976dd9be54807c0b61c7ebd643c", "score": "0.5901114", "text": "func IDNEQ(id int) predicate.Prename {\n\treturn predicate.Prename(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "4b2625788c06465ff07428a1d42d826d", "score": "0.5898375", "text": "func MturkHitIDNEQ(v string) predicate.Participation {\n\treturn predicate.Participation(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldMturkHitID), v))\n\t})\n}", "title": "" }, { "docid": "94286cd9fdecf8069ece9e2272bfbc27", "score": "0.5893415", "text": "func AmountNEQ(v int) predicate.Dentalexpense {\n\treturn predicate.Dentalexpense(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldAmount), v))\n\t})\n}", "title": "" }, { "docid": "c153ad2ee4467f24371d875b38eb92a9", "score": "0.5891081", "text": "func IDNEQ(id int) predicate.PatientInfo {\n\treturn predicate.PatientInfo(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "83ae505ae90707da5c9941f5ca4a2f7b", "score": "0.58883524", "text": "func NameNEQ(v string) predicate.Book {\n\treturn predicate.Book(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "5730965b8b333fa8e7a85f32590097f6", "score": "0.5887961", "text": "func IDNEQ(id string) predicate.Token {\n\treturn predicate.Token(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "7c1a7589a702d25625badeb73ace02bd", "score": "0.5882357", "text": "func COUNTERNUMBEREqualFold(v string) predicate.ServicePoint {\n\treturn predicate.ServicePoint(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldCOUNTERNUMBER), v))\n\t})\n}", "title": "" }, { "docid": "a80db9ed7a8ecde035fa6a9a370cea38", "score": "0.5878335", "text": "func SessionIDNEQ(v string) predicate.RawEvent {\n\treturn predicate.RawEvent(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldSessionID), v))\n\t})\n}", "title": "" }, { "docid": "8e74ed3a4f9aebad043bb0ef0d7105be", "score": "0.5874102", "text": "func IDNEQ(id int) predicate.Insurance {\n\treturn predicate.Insurance(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "9a32ebd679325c08451962283e56e626", "score": "0.58712", "text": "func IDNEQ(id int) predicate.UserAccount {\n\treturn predicate.UserAccount(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t},\n\t)\n}", "title": "" }, { "docid": "fb3940a6c2c86a04207a869ead966be4", "score": "0.58707774", "text": "func IDNEQ(id int) predicate.Checkout {\n\treturn predicate.Checkout(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "62ed27c174c298b03acca1277aaffbd5", "score": "0.58698034", "text": "func NameNEQ(v string) predicate.PatientInfo {\n\treturn predicate.PatientInfo(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "48b0249bb349e865b183432aedd4eeff", "score": "0.5863977", "text": "func AddressNEQ(v string) predicate.Customer {\n\treturn predicate.Customer(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "7e4714a71c87332073bd0ecc56ba2f57", "score": "0.58598894", "text": "func IDNEQ(id int) predicate.Resource {\n\treturn predicate.Resource(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "f1828c1c2d14d1faa0a807d6a6859d0c", "score": "0.58555233", "text": "func IDNEQ(id int) predicate.Expertise {\n\treturn predicate.Expertise(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "6dd08e9f70784188bb6e3b06ea06e404", "score": "0.5855352", "text": "func IDNEQ(id int64) predicate.Category {\n\treturn predicate.Category(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "cbbedbc4710bccd6bb7cb1befb0e77fd", "score": "0.585521", "text": "func UlidNEQ(v string) predicate.Alert {\n\treturn predicate.Alert(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldUlid), v))\n\t})\n}", "title": "" }, { "docid": "e50e33325b9f1bfb62b200eddef6d3dc", "score": "0.5853171", "text": "func IDNEQ(id uuid.UUID) predicate.Workspace {\n\treturn predicate.Workspace(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "9baff3c855b68b37a80ce2976a796a76", "score": "0.58517295", "text": "func IDNEQ(id int32) predicate.Session {\n\treturn predicate.Session(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "1cae15576ddee0020580a8959ab97ed9", "score": "0.5847185", "text": "func IDNEQ(id int) predicate.Timing {\n\treturn predicate.Timing(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "0a77b1db5196cf12f4c469385dc10304", "score": "0.58301973", "text": "func OrganizationIdNEQ(v int) predicate.Resource {\n\treturn predicate.Resource(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldOrganizationId), v))\n\t})\n}", "title": "" }, { "docid": "1a9ecb266187fae513a60de653fff352", "score": "0.58273524", "text": "func IDNEQ(id int) predicate.Urgent {\n\treturn predicate.Urgent(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "2358b4aea6b70a176c5efbdd03e88c2d", "score": "0.58119833", "text": "func IDNEQ(id int) predicate.Network {\n\treturn predicate.Network(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "1919d492cca65952d27e56dc559924a6", "score": "0.5810118", "text": "func MandantidNEQ(v string) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldMandantid), v))\n\t})\n}", "title": "" }, { "docid": "857116fa040c548e0df2dc282a0d39b8", "score": "0.58070934", "text": "func NameNEQ(v string) predicate.Category {\n\treturn predicate.Category(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "082acd79ae387cb949ac916c9e1b1703", "score": "0.58061725", "text": "func AgeNEQ(v int) predicate.Profile {\n\treturn predicate.Profile(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldAge), v))\n\t})\n}", "title": "" }, { "docid": "3c1007d97ecf96969da086e8974dcbcf", "score": "0.5795036", "text": "func IDNEQ(id int) predicate.OutcomeAnalysis {\n\treturn predicate.OutcomeAnalysis(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "3c2eb4352a8afede148b41f85fb56454", "score": "0.5794894", "text": "func IDNEQ(id uuid.UUID) predicate.RawEvent {\n\treturn predicate.RawEvent(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "2d4d1583d41e0516f96b367ff6c2f865", "score": "0.5794366", "text": "func VariableNEQ(v string) predicate.Timing {\n\treturn predicate.Timing(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldVariable), v))\n\t})\n}", "title": "" }, { "docid": "77b83eef421f83981add2d3da6877c44", "score": "0.57909393", "text": "func PhoneNEQ(v string) predicate.Dentalexpense {\n\treturn predicate.Dentalexpense(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldPhone), v))\n\t})\n}", "title": "" }, { "docid": "7d51715ea6da647d8444c73d14cdeb6f", "score": "0.5790514", "text": "func IDNEQ(id int) predicate.Extradoctor {\n\treturn predicate.Extradoctor(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "559fce770d974a09a43171d5b4e1c69d", "score": "0.5789496", "text": "func CommentNEQ(v string) predicate.Checkout {\n\treturn predicate.Checkout(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldComment), v))\n\t})\n}", "title": "" }, { "docid": "4b323b475fbef71bdb15c9cdfa020409", "score": "0.57868963", "text": "func ClaimsUserIDNEQ(v string) predicate.AuthCode {\n\treturn predicate.AuthCode(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldClaimsUserID), v))\n\t})\n}", "title": "" }, { "docid": "9649546ed8e3900b8e77a7f1abc1e55c", "score": "0.57822263", "text": "func IDNEQ(id int) predicate.Prefix {\n\treturn predicate.Prefix(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "e762855c9934acb54e1d73b2078e8be8", "score": "0.57790554", "text": "func SpuCodeNEQ(v string) predicate.GoodsSpu {\n\treturn predicate.GoodsSpu(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldSpuCode), v))\n\t})\n}", "title": "" }, { "docid": "10784cafdfef109afc3dea5dfb7ee382", "score": "0.5778356", "text": "func IDNEQ(id string) predicate.Run {\n\treturn predicate.Run(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "b5990f4f06bd1b8a5c115c378f80819b", "score": "0.5776034", "text": "func DentistPhoneNEQ(v int) predicate.Dentist {\n\treturn predicate.Dentist(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldDentistPhone), v))\n\t})\n}", "title": "" }, { "docid": "01c97d4e44735b1a90a7decb128bcc2b", "score": "0.57732886", "text": "func IDNEQ(id int) predicate.Machine {\n\treturn predicate.Machine(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "54737c43db806fec9c566bb0f9a08bc9", "score": "0.57709664", "text": "func StatusNEQ(v Status) predicate.Run {\n\treturn predicate.Run(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" }, { "docid": "03e7c6d72361485a4d853c44347ed065", "score": "0.57707566", "text": "func TimingLabelNEQ(v string) predicate.Timing {\n\treturn predicate.Timing(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldTimingLabel), v))\n\t})\n}", "title": "" }, { "docid": "a2d77153aabd07cd2dc1effbfa62040d", "score": "0.57697767", "text": "func IDNEQ(id int) predicate.Activity {\n\treturn predicate.Activity(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "a2d77153aabd07cd2dc1effbfa62040d", "score": "0.57697767", "text": "func IDNEQ(id int) predicate.Activity {\n\treturn predicate.Activity(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "44713a3b9b8c980dbd5f716e289c1db5", "score": "0.57657266", "text": "func RankNEQ(v int) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldRank), v))\n\t})\n}", "title": "" }, { "docid": "2acdec0813c4131b63c071bf55c2c112", "score": "0.5764498", "text": "func IDNEQ(id int) predicate.OSContext {\n\treturn predicate.OSContext(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "3f6ddcdce173a3ca0cfcbb338b310d7a", "score": "0.5764004", "text": "func NameNEQ(v string) predicate.Resource {\n\treturn predicate.Resource(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldName), v))\n\t})\n}", "title": "" }, { "docid": "40862bf2c5cfb34072a8c94c75f7027c", "score": "0.57607496", "text": "func StatusNEQ(v bool) predicate.KqiTarget {\n\treturn predicate.KqiTarget(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" } ]
d2f3f311879396bffe5e5510c5b988c0
Exists mocks base method
[ { "docid": "ccfe9416665d639d1783a6fc7a715ada", "score": "0.7394967", "text": "func (m *MockStorage) Exists(arg0 string) (bool, error) {\n\tret := m.ctrl.Call(m, \"Exists\", arg0)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" } ]
[ { "docid": "d13abb935229106a89a86a006fa53d49", "score": "0.74924743", "text": "func (m *MockSecret) Exists() bool {\n\tret := m.ctrl.Call(m, \"Exists\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "51b55d95e863ad55a2768b0b49b9604b", "score": "0.7418308", "text": "func (m *MockConnection) Exists(arg0 string) (bool, *zk.Stat, error) {\n\tret := m.ctrl.Call(m, \"Exists\", arg0)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(*zk.Stat)\n\tret2, _ := ret[2].(error)\n\treturn ret0, ret1, ret2\n}", "title": "" }, { "docid": "ac5f1361d9727db2d78ff53e8474e504", "score": "0.7356969", "text": "func (m *MockInstancesRepository) Exists(arg0 string) (bool, error) {\n\tret := m.ctrl.Call(m, \"Exists\", arg0)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "9816fab081a0b740de0e2f1cd1e32ca2", "score": "0.73453444", "text": "func (m *MockStore) Exist(namespace, typ, key string) bool {\n\tret := m.ctrl.Call(m, \"Exist\", namespace, typ, key)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "d1c5a5e0801ac1c5df149e0529865f5a", "score": "0.7256475", "text": "func (m *MockSubscribableStore) Exist(namespace, typ, key string) bool {\n\tret := m.ctrl.Call(m, \"Exist\", namespace, typ, key)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "6b41c50735f08ecad3ab2cecf299e51f", "score": "0.7196145", "text": "func (m *MockLoginDB) Exists(username string) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Exists\", username)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "8aec52842e2d569085c992850b657d5c", "score": "0.7103798", "text": "func (m *MockClient) Exists(arg0 ...string) *redis.IntCmd {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{}\n\tfor _, a := range arg0 {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"Exists\", varargs...)\n\tret0, _ := ret[0].(*redis.IntCmd)\n\treturn ret0\n}", "title": "" }, { "docid": "a8d993aa3e32869efde846006a289c10", "score": "0.70954967", "text": "func (m *MockConntrack) Exists(conn *Con) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Exists\", conn)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "80a1a4c4675d96439298b5ab15f1eb85", "score": "0.6808309", "text": "func (m *MockIdentityRepository) Exists(ctx context.Context, id string) (bool, error) {\n\treturn true, nil\n}", "title": "" }, { "docid": "043bc2aa1c01d3ba2b66e41bb7e37073", "score": "0.6754161", "text": "func (m *MockDMProduct) Exists(productID int) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Exists\", productID)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "87a570e033e63667d0c1b28d0557eed6", "score": "0.67458004", "text": "func (m *MockRequestRepository) IsExist(ctx context.Context, namespace, url string) (bool, error) {\n\tret := m.ctrl.Call(m, \"IsExist\", ctx, namespace, url)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "96719cad558adc909ca8a0abcca7bc2c", "score": "0.66983336", "text": "func (m *Mock) Exists(ctx context.Context, name string) bool {\n\tm.Lock()\n\tdefer m.Unlock()\n\n\t_, found := m.data[name]\n\treturn found\n}", "title": "" }, { "docid": "192d88c91453d64c5954b6c030ccf674", "score": "0.66857755", "text": "func (_e *Pipeliner_Expecter) Exists(ctx interface{}, keys ...interface{}) *Pipeliner_Exists_Call {\n\treturn &Pipeliner_Exists_Call{Call: _e.mock.On(\"Exists\",\n\t\tappend([]interface{}{ctx}, keys...)...)}\n}", "title": "" }, { "docid": "07f1c6c86956e83402315af6ac92eca0", "score": "0.668572", "text": "func (m *MockDB) Has(key []byte) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Has\", key)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "6d28d4f9485e252ca0a8976289741214", "score": "0.6660836", "text": "func (sm *storageMock) Exists(token *AccessToken) (bool, error) {\n\targs := sm.Called(token)\n\n\treturn args.Bool(0), args.Error(1)\n}", "title": "" }, { "docid": "5dcb35b53d28317d3ceac43415e978b5", "score": "0.6615903", "text": "func (_m *VendorRepository) Exists(ctx context.Context, tenant string, id string) (bool, error) {\n\tret := _m.Called(ctx, tenant, id)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(context.Context, string, string) bool); ok {\n\t\tr0 = rf(ctx, tenant, id)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string, string) error); ok {\n\t\tr1 = rf(ctx, tenant, id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "f9e781f0203fe34d14479ee0795b6207", "score": "0.6568902", "text": "func (_m *IUtil) Exists(path string) bool {\n\tret := _m.Called(path)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(string) bool); ok {\n\t\tr0 = rf(path)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "3f94df7536548c480a5a0aebb6a93626", "score": "0.6559849", "text": "func (_m *SessionManagerServer) Exists(_a0 context.Context, _a1 *mnemosynerpc.ExistsRequest) (*wrappers.BoolValue, error) {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 *wrappers.BoolValue\n\tif rf, ok := ret.Get(0).(func(context.Context, *mnemosynerpc.ExistsRequest) *wrappers.BoolValue); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*wrappers.BoolValue)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, *mnemosynerpc.ExistsRequest) error); ok {\n\t\tr1 = rf(_a0, _a1)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "d73318e1794167787b54708b8e0e40bc", "score": "0.654896", "text": "func (_m *ShortLinkDao) Exists(id string) (bool, error) {\n\tret := _m.Called(id)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(string) bool); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string) error); ok {\n\t\tr1 = rf(id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "b97c66ae32b76b1adbdeb297cb77cd04", "score": "0.6542373", "text": "func (_m *APIRepository) Exists(ctx context.Context, tenant string, id string) (bool, error) {\n\tret := _m.Called(ctx, tenant, id)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(context.Context, string, string) bool); ok {\n\t\tr0 = rf(ctx, tenant, id)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string, string) error); ok {\n\t\tr1 = rf(ctx, tenant, id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "69cd1ecda0b8fd0453c083474f299123", "score": "0.6531323", "text": "func (_m *MockFile) Exists() bool {\n\tret := _m.Called()\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func() bool); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "1cfde36afa75c2585a62c02f32d1da61", "score": "0.65235054", "text": "func (_m *Location) Exists() (bool, error) {\n\tret := _m.Called()\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func() bool); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func() error); ok {\n\t\tr1 = rf()\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "b94b195ab16c0f21d8c560ac4508e4fa", "score": "0.65126127", "text": "func (_m *InstrumentedStorage) Exists(_a0 context.Context, _a1 string) (bool, error) {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(context.Context, string) bool); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string) error); ok {\n\t\tr1 = rf(_a0, _a1)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "b626aa1871c2acdf14c886a5e2309eba", "score": "0.64810616", "text": "func (_m *StorageDao) CheckExists(_a0 string, _a1 string) (bool, error) {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(string, string) bool); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string, string) error); ok {\n\t\tr1 = rf(_a0, _a1)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "d6280fb32f36cd62449f7f9be84374ae", "score": "0.6470813", "text": "func (m *MockNamespaceSet) Has(namespace ezkube.ResourceId) bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Has\", namespace)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "6452ee9145482dea4de97044c041f811", "score": "0.6467149", "text": "func (c *clientMocker) Exists(ctx context.Context, bkt, objPath string) bool {\n\tbktRoot := c.getBucketRoot(bkt)\n\tif bktRoot == nil {\n\t\treturn false\n\t}\n\n\t// just the bucket\n\tif objPath == \"\" {\n\t\treturn true\n\t}\n\n\tdir, obj := filepath.Split(objPath)\n\tif _, ok := bktRoot.obj[newMockPath(dir, obj)]; ok {\n\t\treturn true\n\t}\n\n\t// could be asking for if a directory exists. Since our structure is flat, at\n\t// path of an object containing the searched for directory as its subpath means\n\t// the directory \"exists\"\n\t// NOTE: this is inefficient....but we are not scale testing with mock anyway.\n\tfor k := range bktRoot.obj {\n\t\tif strings.HasPrefix(k.dir, objPath) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "8a9fe5ff938c00b1862b14af60a26f1b", "score": "0.645651", "text": "func (_m *Folder) Exists(objectRelativePath string) (bool, error) {\n\tret := _m.Called(objectRelativePath)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(string) bool); ok {\n\t\tr0 = rf(objectRelativePath)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string) error); ok {\n\t\tr1 = rf(objectRelativePath)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "91539d93f03f0e2fee5dc032894c1f16", "score": "0.6369144", "text": "func (m *MockCloner) IsExistInClones(ctx context.Context, targetImage name.Reference) (error, bool) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsExistInClones\", ctx, targetImage)\n\tret0, _ := ret[0].(error)\n\tret1, _ := ret[1].(bool)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "ea5694aa723c8305484783b264690357", "score": "0.63233614", "text": "func (m *MockChannel) ExistsNext() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ExistsNext\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "b2f90c89979c37c511cad7cd41b434ce", "score": "0.6289995", "text": "func (m *MockBundleClient) Exists(v0 context.Context, v1 string) (bool, error) {\n\tr0, r1 := m.ExistsFunc.nextHook()(v0, v1)\n\tm.ExistsFunc.appendCall(BundleClientExistsFuncCall{v0, v1, r0, r1})\n\treturn r0, r1\n}", "title": "" }, { "docid": "6714628da6a08cd637752986fdd17d99", "score": "0.6265794", "text": "func (m *MockServiceAccountSet) Has(serviceAccount ezkube.ResourceId) bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Has\", serviceAccount)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "b3cbb46da5375a1e4ab3587f17078f6d", "score": "0.62518173", "text": "func (_m *Cache) Exists(ctx context.Context, key string) error {\n\tret := _m.Called(ctx, key)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, string) error); ok {\n\t\tr0 = rf(ctx, key)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "f78f24ceb61cfa6e547282c19dbd24fe", "score": "0.6242611", "text": "func (m *MockClient) ScriptExists(arg0 ...string) *redis.BoolSliceCmd {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{}\n\tfor _, a := range arg0 {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"ScriptExists\", varargs...)\n\tret0, _ := ret[0].(*redis.BoolSliceCmd)\n\treturn ret0\n}", "title": "" }, { "docid": "6e9cd4852c8153654ee8cb803dfe5fb8", "score": "0.62271076", "text": "func (m *MockConnection) ExistsW(arg0 string) (bool, *zk.Stat, <-chan zk.Event, error) {\n\tret := m.ctrl.Call(m, \"ExistsW\", arg0)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(*zk.Stat)\n\tret2, _ := ret[2].(<-chan zk.Event)\n\tret3, _ := ret[3].(error)\n\treturn ret0, ret1, ret2, ret3\n}", "title": "" }, { "docid": "74565c33fc1a9c1f8c14a4a3b2510feb", "score": "0.6206616", "text": "func (f *FakeParser) Exists(preset string) (exists bool) {\n\tf.CalledExists = true\n\texists = f.MockExists\n\treturn\n}", "title": "" }, { "docid": "21958ac896fb4ad7145454ef3e025831", "score": "0.6193315", "text": "func (_Impro *ImproCaller) Exists(opts *bind.CallOpts, _perceptualHash string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _Impro.contract.Call(opts, out, \"exists\", _perceptualHash)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "764259a0c7a2be70e882bf1c9b93193a", "score": "0.6183674", "text": "func (_m *UserProvider) Exists(_a0 context.Context, _a1 int64) (bool, error) {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(context.Context, int64) bool); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {\n\t\tr1 = rf(_a0, _a1)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "9e75c886c4f71e50ea174cf7af54e0a0", "score": "0.6136122", "text": "func (m *MockSecretSet) Has(secret ezkube.ResourceId) bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Has\", secret)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "191f31c0302a49d50b91c28fcef90fa7", "score": "0.6089582", "text": "func (_e *Pipeliner_Expecter) HExists(ctx interface{}, key interface{}, field interface{}) *Pipeliner_HExists_Call {\n\treturn &Pipeliner_HExists_Call{Call: _e.mock.On(\"HExists\", ctx, key, field)}\n}", "title": "" }, { "docid": "476ec5a62dbbfa55b648cf2c7e2ca9e6", "score": "0.60571814", "text": "func (m *MockValidatingWebhookConfigurationSet) Has(validatingWebhookConfiguration ezkube.ResourceId) bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Has\", validatingWebhookConfiguration)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "6ac4ae154de9655dc487d9d016c311fa", "score": "0.60097563", "text": "func (impl *TokenSetMock) Has(ctx context.Context, target string, token string) (MethodCallForHas, error) {\n\tvar caller MethodCallForHas\n\n\tcaller.When = time.Now()\n\tcaller.Start = caller.When\n\n\tcaller.Ctx = ctx\n\n\tcaller.Target = target\n\n\tcaller.Token = token\n\n\tvar found bool\n\tfor _, possibleCall := range impl.HasMethodCalls {\n\t\tif possibleCall.MatchArguments(caller) {\n\t\t\tfound = true\n\n\t\t\tcaller.Ret1 = possibleCall.Ret1\n\n\t\t\tcaller.Ret2 = possibleCall.Ret2\n\n\t\t\tcaller.PanicError = possibleCall.PanicError\n\t\t\tcaller.PanicStack = possibleCall.PanicStack\n\t\t\tbreak\n\t\t}\n\t}\n\n\tcaller.End = time.Now()\n\tif found {\n\t\treturn caller, nil\n\t}\n\n\treturn caller, errors.New(\"no matching response found\")\n}", "title": "" }, { "docid": "8846ba44697730ea17fe1ba2d1e04938", "score": "0.59833676", "text": "func (m *MockShortenerCacheRepo) IsSingleURLExist(arg0 string) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsSingleURLExist\", arg0)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "1a3ba5d9315d10fcd265671af75d1220", "score": "0.59613585", "text": "func (m *MockTerraformer) ConfigExists() (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ConfigExists\")\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "661b6cf0ce38c19daa7d6705b88dccd2", "score": "0.5942731", "text": "func (m *MockAccountRetriever) EnsureExists(clientCtx client.Context, addr types0.AccAddress) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"EnsureExists\", clientCtx, addr)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "6ca55462a2c851362faf5e11ec7e7cac", "score": "0.59143424", "text": "func (_m *Pipeliner) HExists(ctx context.Context, key string, field string) *redis.BoolCmd {\n\tret := _m.Called(ctx, key, field)\n\n\tvar r0 *redis.BoolCmd\n\tif rf, ok := ret.Get(0).(func(context.Context, string, string) *redis.BoolCmd); ok {\n\t\tr0 = rf(ctx, key, field)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*redis.BoolCmd)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "27ed70df84da28bbff34054dba8f1983", "score": "0.5904997", "text": "func (m *MockProviderGovcClient) LibraryElementExists(arg0 context.Context, arg1 string) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"LibraryElementExists\", arg0, arg1)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d7194b61ef535988d8399bc3860e55c2", "score": "0.5887614", "text": "func (m *MockUpdate) SetIfNotExists(path string, value interface{}) dynamodb.Update {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SetIfNotExists\", path, value)\n\tret0, _ := ret[0].(dynamodb.Update)\n\treturn ret0\n}", "title": "" }, { "docid": "60adc77891b4e6d41ebdcc2b977d39de", "score": "0.58751565", "text": "func (_m *TxnKV) Has(key string) (bool, error) {\n\tret := _m.Called(key)\n\n\tvar r0 bool\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(string) (bool, error)); ok {\n\t\treturn rf(key)\n\t}\n\tif rf, ok := ret.Get(0).(func(string) bool); ok {\n\t\tr0 = rf(key)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tif rf, ok := ret.Get(1).(func(string) error); ok {\n\t\tr1 = rf(key)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "10d85623ee3b2ec0fb4a069f9f251539", "score": "0.5860789", "text": "func (m *MockElasticSearchServiceInterface) CheckIndexExist(name string) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CheckIndexExist\", name)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "9ce5ee0f0af4e9a3995cf142d6817171", "score": "0.581337", "text": "func (self *ComponentCore) Exists() bool{\n return self.Object.Get(\"exists\").Bool()\n}", "title": "" }, { "docid": "3997c1516e9733953c5f454066ee2d50", "score": "0.58107245", "text": "func (w TestEnv) Exists(path string) bool {\n\tw.t.Logf(\"world: Exists(%s)\", path)\n\treturn true\n}", "title": "" }, { "docid": "849bf43f8db2884985749d29655e4b35", "score": "0.5804487", "text": "func (_Impro *ImproCallerSession) Exists(_perceptualHash string) (bool, error) {\n\treturn _Impro.Contract.Exists(&_Impro.CallOpts, _perceptualHash)\n}", "title": "" }, { "docid": "adef3e032fa65d68fae3b2b80cbcba04", "score": "0.5802343", "text": "func (_m *MockUserRepository) CheckSuperLikeMe(_param0 int, _param1 int) bool {\n\tret := _m.ctrl.Call(_m, \"CheckSuperLikeMe\", _param0, _param1)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "d3cd52720ea8cfab1263b78c7b6c2938", "score": "0.57741004", "text": "func (m *MockLimitedOS) IsNotExist(err error) bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsNotExist\", err)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "9dab73f85879060947507205a935672e", "score": "0.57448274", "text": "func (_m *Pipeliner) Exists(ctx context.Context, keys ...string) *redis.IntCmd {\n\t_va := make([]interface{}, len(keys))\n\tfor _i := range keys {\n\t\t_va[_i] = keys[_i]\n\t}\n\tvar _ca []interface{}\n\t_ca = append(_ca, ctx)\n\t_ca = append(_ca, _va...)\n\tret := _m.Called(_ca...)\n\n\tvar r0 *redis.IntCmd\n\tif rf, ok := ret.Get(0).(func(context.Context, ...string) *redis.IntCmd); ok {\n\t\tr0 = rf(ctx, keys...)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*redis.IntCmd)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "995466ae57a54004146b000129b7bd61", "score": "0.57399577", "text": "func (_m *RoomRepository) CheckExistence(id string) bool {\n\tret := _m.Called(id)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(string) bool); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "f320e786b34c477364cd1d08a3848324", "score": "0.5727418", "text": "func (m *MockChannel) ExistsBackupNext() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ExistsBackupNext\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "130bf7c642c53c4415b1e293890cb98d", "score": "0.5698704", "text": "func (m *MockShortenerCacheRepo) IsCollectionURLExist(arg0 string) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsCollectionURLExist\", arg0)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d13f345705872dbe10df5ace6cd9bb65", "score": "0.5684678", "text": "func (self *Group) Exists() bool{\n return self.Object.Get(\"exists\").Bool()\n}", "title": "" }, { "docid": "165298de92d2f240656efb87d1ca8661", "score": "0.56826955", "text": "func (p *Payment) TestOnly_SetExists() {\n\tp._exists = true\n}", "title": "" }, { "docid": "b25a6bf94a8816052e5792d675fd842c", "score": "0.56769186", "text": "func (_m *Pipeliner) ScriptExists(ctx context.Context, hashes ...string) *redis.BoolSliceCmd {\n\t_va := make([]interface{}, len(hashes))\n\tfor _i := range hashes {\n\t\t_va[_i] = hashes[_i]\n\t}\n\tvar _ca []interface{}\n\t_ca = append(_ca, ctx)\n\t_ca = append(_ca, _va...)\n\tret := _m.Called(_ca...)\n\n\tvar r0 *redis.BoolSliceCmd\n\tif rf, ok := ret.Get(0).(func(context.Context, ...string) *redis.BoolSliceCmd); ok {\n\t\tr0 = rf(ctx, hashes...)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*redis.BoolSliceCmd)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "cacbe256f99ba4ee6a78990a852ac47d", "score": "0.56465596", "text": "func (_Nft *NftCaller) Exists(opts *bind.CallOpts, tokenId *big.Int) (bool, error) {\n\tvar out []interface{}\n\terr := _Nft.contract.Call(opts, &out, \"exists\", tokenId)\n\n\tif err != nil {\n\t\treturn *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(bool)).(*bool)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "9132beb6cbaec4bc7c43055ec12e2987", "score": "0.5646443", "text": "func (m *MocktableCRUD) IsWorkflowExecutionExists(ctx context.Context, shardID int, domainID, workflowID, runID string) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsWorkflowExecutionExists\", ctx, shardID, domainID, workflowID, runID)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "1b29e8c026e855811322245af25d7ca8", "score": "0.5643914", "text": "func (self *Image) Exists() bool{\n return self.Object.Get(\"exists\").Bool()\n}", "title": "" }, { "docid": "103424a507de2d61b59ec082fde676da", "score": "0.5632654", "text": "func AssertExistsIf(t unittestbridge.Tester, expected bool, bean interface{}, conditions ...interface{}) {\n\tta := unittestbridge.NewAsserter(t)\n\texists, err := LoadBeanIfExists(bean, conditions...)\n\tta.NoError(err)\n\tta.Equal(expected, exists)\n}", "title": "" }, { "docid": "9f77a21c38d7159fd4bd4dc79c67f0fa", "score": "0.56278694", "text": "func (vm *VM) AssertExists(t *testing.T, name, expectedAvailSet, expectedVMSize, expectedOsType, expectedNic string) {\n\tvm.f.Retrier.Run(newID(\"VM\", \"AssertExists\", name), func() error {\n\t\tv, err := vm.client.Get(vm.f.ResGroupName, name, \"\")\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif v.VirtualMachineProperties == nil {\n\t\t\treturn errors.New(\"Field VirtualMachineProperties is nil!\")\n\t\t}\n\t\tproperties := *v.VirtualMachineProperties\n\t\tif properties.AvailabilitySet == nil {\n\t\t\treturn errors.New(\"Field AvailabilitySet is nil!\")\n\t\t}\n\t\tif properties.AvailabilitySet.ID == nil {\n\t\t\treturn errors.New(\"Field ID is nil!\")\n\t\t}\n\t\tgotAvailSet := *properties.AvailabilitySet.ID\n\t\tif !strings.Contains(gotAvailSet, strings.ToUpper(expectedAvailSet)) {\n\t\t\treturn errors.New(\"AvailSet expected is \" + expectedAvailSet + \" but got \" + gotAvailSet)\n\t\t}\n\t\tif properties.HardwareProfile == nil {\n\t\t\treturn errors.New(\"Field HardwareProfile is nil!\")\n\t\t}\n\t\thardwareProfile := *properties.HardwareProfile\n\t\tgotVMSize := string(hardwareProfile.VMSize)\n\t\tif gotVMSize != expectedVMSize {\n\t\t\treturn errors.New(\"VM Size expected is \" + expectedVMSize + \" but got \" + gotVMSize)\n\t\t}\n\t\tif properties.StorageProfile == nil {\n\t\t\treturn errors.New(\"Field StorageProfile is nil!\")\n\t\t}\n\t\tif properties.StorageProfile.OsDisk == nil {\n\t\t\treturn errors.New(\"Field OsDisk is nil!\")\n\t\t}\n\t\tosDisk := *properties.StorageProfile.OsDisk\n\t\tgotOsType := string(osDisk.OsType)\n\t\tif gotOsType != expectedOsType {\n\t\t\treturn errors.New(\"OS type expected is \" + expectedOsType + \" but got \" + gotOsType)\n\t\t}\n\t\tif properties.NetworkProfile == nil {\n\t\t\treturn errors.New(\"Field NetworkProfile is nil!\")\n\t\t}\n\t\tnetwork := *properties.NetworkProfile.NetworkInterfaces\n\t\tif len(network) == 0 {\n\t\t\treturn errors.New(\"Field NetworkInterfaces is nil!\")\n\t\t}\n\t\tnet := network[0]\n\t\tif net.ID == nil {\n\t\t\treturn errors.New(\"Field ID is nil!\")\n\t\t}\n\t\tgotNic := string(*net.ID)\n\t\tif !strings.Contains(gotNic, expectedNic) {\n\t\t\treturn errors.New(\"Nic expected is \" + expectedNic + \" but got \" + gotNic)\n\t\t}\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "a279e5b8d0613f7c95bbcf79b3d9c51a", "score": "0.56247574", "text": "func (m *MockGroupsClientAPI) CheckExistence(arg0 context.Context, arg1 string) (autorest.Response, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CheckExistence\", arg0, arg1)\n\tret0, _ := ret[0].(autorest.Response)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "8af3af06c6630d497229ca3896b39c82", "score": "0.56132746", "text": "func (m *MockNativeService) RemoteBranchExists(branchName string) (bool, string, string, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RemoteBranchExists\", branchName)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(string)\n\tret2, _ := ret[2].(string)\n\tret3, _ := ret[3].(error)\n\treturn ret0, ret1, ret2, ret3\n}", "title": "" }, { "docid": "4f4c8c1ca7563919d63db09fe93aaf6d", "score": "0.56106216", "text": "func (_m *MockRepository) ExistByNameAndVersion(name string, version string) (bool, error) {\n\tret := _m.Called(name, version)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(string, string) bool); ok {\n\t\tr0 = rf(name, version)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string, string) error); ok {\n\t\tr1 = rf(name, version)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "882113c2414193ed55ff687199aebe7b", "score": "0.5607657", "text": "func (m *MockUserService) FindOrCreate(ctx context.Context, phone string) (domain.User, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"FindOrCreate\", ctx, phone)\n\tret0, _ := ret[0].(domain.User)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "02b1bf6bb5a08dff103f115c34313166", "score": "0.5591451", "text": "func Exists(stub shim.ChaincodeStubInterface, key interface{}) (exists bool, err error) {\n\tstringKey, err := Key(stub, key)\n\tif err != nil {\n\t\treturn false, errors.Wrap(err, `check key existence`)\n\t}\n\tbb, err := stub.GetState(stringKey)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\treturn !(bb == nil || len(bb) == 0), nil\n}", "title": "" }, { "docid": "eb305df602ca7ed54b6d4e9e9f8b9c32", "score": "0.55808306", "text": "func (_Impro *ImproSession) Exists(_perceptualHash string) (bool, error) {\n\treturn _Impro.Contract.Exists(&_Impro.CallOpts, _perceptualHash)\n}", "title": "" }, { "docid": "9675d49f1e8eba778d97db67101bf314", "score": "0.5573806", "text": "func (p *THBaseServiceClient) Exists(table []byte, tget *TGet) (r bool, err error) {\n if err = p.sendExists(table, tget); err != nil { return }\n return p.recvExists()\n}", "title": "" }, { "docid": "b157e08d42c7cac984ab3ca88e952762", "score": "0.55645335", "text": "func (m *MockSealingAPI) WalletHas(arg0 context.Context, arg1 address.Address) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"WalletHas\", arg0, arg1)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "f3be54b6f1dbb9bf7c55aa5c93581433", "score": "0.5559009", "text": "func (m *MockSync) HasLock(path string) bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"HasLock\", path)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "164ea154d2ac50b6741904a214bb7c44", "score": "0.5554898", "text": "func (m *Mockdatabase) IsOverloaded() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsOverloaded\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "a92a9c13af91366c752787db4312ece8", "score": "0.5547622", "text": "func (_m *KeyStore) IdentityExists(address types.Address) (bool, error) {\n\tret := _m.Called(address)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(types.Address) bool); ok {\n\t\tr0 = rf(address)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(types.Address) error); ok {\n\t\tr1 = rf(address)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "af434ec06f84df372074d313b3758a38", "score": "0.5537316", "text": "func (m *MockDatabase) IsOverloaded() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsOverloaded\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "f0747e33d5e0925b8737507b92cd3dc3", "score": "0.5535111", "text": "func (impl *TokenSetSnitch) Has(ctx context.Context, target string, token string) (bool, error) {\n\tvar caller MethodCallForHas\n\n\tdefer func() {\n\t\tif err := recover(); err != nil {\n\t\t\ttrace := make([]byte, 1000)\n\t\t\ttrace = trace[:runtime.Stack(trace, true)]\n\n\t\t\tcaller.PanicError = err\n\t\t\tcaller.PanicStack = trace\n\t\t}\n\n\t\tcaller.End = time.Now()\n\t\timpl.HasMethodCalls = append(impl.HasMethodCalls, caller)\n\t}()\n\n\tcaller.When = time.Now()\n\tcaller.Start = caller.When\n\n\tcaller.Ctx = ctx\n\n\tcaller.Target = target\n\n\tcaller.Token = token\n\n\tret1, ret2 := impl.HasFunc(ctx, target, token)\n\n\tcaller.Ret1 = ret1\n\n\tcaller.Ret2 = ret2\n\n\treturn ret1, ret2\n}", "title": "" }, { "docid": "fa02fd4630e8305a59fa7c30a090905e", "score": "0.5528684", "text": "func TestFindByUserIDExists(t *testing.T) {\n\tmockCtrl := gomock.NewController(t)\n\tdefer mockCtrl.Finish()\n\n\texpectErr := errors.New(\"you can only queue for one game at a time\")\n\tmockSecret := \"mock-secret-1\"\n\tmockUser := core.User{ID: 1, Secret: mockSecret}\n\tmockMatchRequest := core.MatchRequest{ID: 2, UserID: mockUser.ID}\n\n\t// Create mocks\n\tmockUsers := mocks.NewMockUsers(mockCtrl)\n\tmockGames := mocks.NewMockGames(mockCtrl)\n\tmockMatchRequests := mocks.NewMockMatchRequests(mockCtrl)\n\tmockMatchRequests.EXPECT().FindByUserID(mockUser.ID).Return(mockMatchRequest, nil)\n\n\t// Create interactor and inject mocks\n\tinteractor := core.NewMatchRequestsInteractor(mockMatchRequests, mockUsers, mockGames)\n\n\t_, err := interactor.MatchMe(mockUser.ID)\n\tif err != nil {\n\t\tif err.Error() != expectErr.Error() {\n\t\t\tt.Fatalf(\"got error: %v, expected error: %v\", err, expectErr)\n\t\t}\n\t} else {\n\t\tt.Fatalf(\"Expected error, but call was succesful\")\n\t}\n}", "title": "" }, { "docid": "9523f5f7a9afff999304e59a2637821b", "score": "0.5528603", "text": "func Exists(obj interface{}) bool {\n\treturn obj != nil\n}", "title": "" }, { "docid": "bd59ee68bf123140b5421679785ed769", "score": "0.55285853", "text": "func (c *PooledClient) Exists(\n\tctx context.Context,\n\tpath string,\n) (bool, *szk.Stat, error) {\n\trespChan := make(chan pooledResp)\n\n\tc.requestChan <- pooledRequest{\n\t\tpath: path,\n\t\tmethod: \"exists\",\n\t\trespChan: respChan,\n\t}\n\n\tselect {\n\tcase resp := <-respChan:\n\t\treturn resp.exists, resp.stats, resp.err\n\tcase <-ctx.Done():\n\t\treturn false, nil, ctx.Err()\n\t}\n}", "title": "" }, { "docid": "cdf095189480ee4f13df73fb5d3dc565", "score": "0.5507369", "text": "func (m *MockComponentCache) Add(key, value interface{}) bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Add\", key, value)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "44e8cee4866de5b6dc3ee876b437be21", "score": "0.5504924", "text": "func (actuator *OvirtActuator) Exists(ctx context.Context, machine *machinev1.Machine) (bool, error) {\n\tklog.Infof(\"Checking machine %v exists.\\n\", machine.Name)\n\tconnection, err := actuator.getConnection()\n\tif err != nil {\n\t\treturn false, errors.Wrap(err, \"failed to create connection to oVirt API\")\n\t}\n\tovirtClient := ovirtC.NewOvirtClient(connection)\n\tmScope := newMachineScope(ctx, ovirtClient, actuator.client, machine, nil)\n\n\treturn mScope.exists()\n}", "title": "" }, { "docid": "cd9f628e81e55d19312cb17b05dde435", "score": "0.550252", "text": "func IsExist(err error) bool", "title": "" }, { "docid": "735cb06ee0011d4ae8fed0de9d8a0145", "score": "0.5501057", "text": "func (_m *Client) DatabaseExists(ctx context.Context, name string) (bool, error) {\n\tret := _m.Called(ctx, name)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(context.Context, string) bool); ok {\n\t\tr0 = rf(ctx, name)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string) error); ok {\n\t\tr1 = rf(ctx, name)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "cfe6dcde015853dc8a7f4776d5b7de75", "score": "0.549347", "text": "func (fi *FactoryInfo) Exists() bool { //factory_info\n\treturn fi._exists\n}", "title": "" }, { "docid": "d4c2f9385a824f593928d9c61f5c163b", "score": "0.54891354", "text": "func (m *MockService) RemoteBranchExists(branchName string) (bool, string, string, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RemoteBranchExists\", branchName)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(string)\n\tret2, _ := ret[2].(string)\n\tret3, _ := ret[3].(error)\n\treturn ret0, ret1, ret2, ret3\n}", "title": "" }, { "docid": "cc3e41068f420fbf49d4ec473f339330", "score": "0.54772633", "text": "func (p *Provider) Exists(alias string) (bool, error) {\n\t_, err := p.Get(alias)\n\n\tif err == storage.ErrNotFound {\n\t\treturn false, nil\n\t}\n\n\treturn true, err\n}", "title": "" }, { "docid": "788617c228b0ca703754d6deec400177", "score": "0.5453458", "text": "func (_m *ArgoDB) RepositoryExists(ctx context.Context, repoURL string) (bool, error) {\n\tret := _m.Called(ctx, repoURL)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(context.Context, string) bool); ok {\n\t\tr0 = rf(ctx, repoURL)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string) error); ok {\n\t\tr1 = rf(ctx, repoURL)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "6d0527b3a499c73e12903b68ab12fb7c", "score": "0.54527456", "text": "func (m *MockDB) IsWorkflowExecutionExists(ctx context.Context, shardID int, domainID, workflowID, runID string) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsWorkflowExecutionExists\", ctx, shardID, domainID, workflowID, runID)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "70a7dbf68d0a2e62566f47ed0596d34a", "score": "0.54475266", "text": "func (s *Store) Exists(ctx context.Context, target ocispec.Descriptor) (bool, error) {\n\treturn s.storage.Exists(ctx, target)\n}", "title": "" }, { "docid": "8e1de5ab5539534b7f9ddc76e5c77524", "score": "0.5446929", "text": "func (d *Driver) Exists(id string) bool {\n\tpath := path.Join(virtPath, id)\n\n\t_, err := os.Stat(path)\n\n\tif err == nil {\n\t\treturn true\n\t} else {\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "f8a8e8f8f7223ca43a5ed5cbe5da9e76", "score": "0.5440477", "text": "func (m *MockPreCommitBatcherApi) WalletHas(arg0 context.Context, arg1 address.Address) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"WalletHas\", arg0, arg1)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "61b85d7dca00e5b6228d6205fb955c79", "score": "0.5434675", "text": "func (m *Mock) FileExists(path string) (bool, error) {\n\targs := m.Called(path)\n\treturn args.Bool(0), args.Error(1)\n}", "title": "" }, { "docid": "0584ba814b8171b42234235a580ffb5a", "score": "0.54345495", "text": "func (wei *WsubExampleItem) Exists() bool {\n\treturn wei._exists\n}", "title": "" }, { "docid": "35076a7e264a01634ea9817d7dad31b9", "score": "0.54340583", "text": "func (_m *CSM) ConnectionExists(_a0 string, _a1 string) (bool, bool, error) {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func(string, string) bool); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 bool\n\tif rf, ok := ret.Get(1).(func(string, string) bool); ok {\n\t\tr1 = rf(_a0, _a1)\n\t} else {\n\t\tr1 = ret.Get(1).(bool)\n\t}\n\n\tvar r2 error\n\tif rf, ok := ret.Get(2).(func(string, string) error); ok {\n\t\tr2 = rf(_a0, _a1)\n\t} else {\n\t\tr2 = ret.Error(2)\n\t}\n\n\treturn r0, r1, r2\n}", "title": "" }, { "docid": "b68d54f9aac8994b7682aec6afebfc28", "score": "0.54328614", "text": "func (m *MockWorkflowCRUD) IsWorkflowExecutionExists(ctx context.Context, shardID int, domainID, workflowID, runID string) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsWorkflowExecutionExists\", ctx, shardID, domainID, workflowID, runID)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "5ccc20d7b468ee2c7f4334ea2cbbb217", "score": "0.54257184", "text": "func (m *MockPolicyService) HasAnyByActionPK(actionPK int64) (bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"HasAnyByActionPK\", actionPK)\n\tret0, _ := ret[0].(bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "880ac8e588c6c74bdcb8ca1dd3f12294", "score": "0.5416897", "text": "func exists(path string) (bool, error) {\n\tendpoint := \"/v1/exists?path=\" + path\n\treq, err := http.NewRequest(http.MethodGet, endpoint, nil)\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"preparing exists request\")\n\t\treturn false, err\n\t}\n\n\tw := httptest.NewRecorder()\n\tts.App.ServeHTTP(w, req)\n\n\tvar res bool\n\td := web.Response{\n\t\tResults: &res,\n\t}\n\n\tif w.Code != http.StatusOK {\n\t\treturn false, errors.New(\"received error performing exists request\")\n\t}\n\n\tif err := json.NewDecoder(w.Body).Decode(&d); err != nil {\n\t\treturn false, errors.Wrap(err, \"unable to unmarshal json\")\n\t}\n\n\treturn res, nil\n}", "title": "" } ]
ecdf4566507c5f688c462fdaf9675c36
Update modifies VPP IP Scan Neighbor.
[ { "docid": "4dce58e42b880c2a3e1e92e909a1a6d1", "score": "0.45615014", "text": "func (d *SRv6GlobalDescriptor) Update(key string, oldValue, newValue *srv6.SRv6Global, oldMetadata interface{}) (newMetadata interface{}, err error) {\n\tif err := d.srHandler.SetEncapsSourceAddress(newValue.EncapSourceAddress); err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" } ]
[ { "docid": "b136e79f52b7bf4ebc4ab92f99d5562c", "score": "0.60422206", "text": "func (c *bgpL2VPNCollector) Update(ch chan<- prometheus.Metric) error {\n\tif err := collectBGP(ch, \"l2vpn\", c.logger, c.descriptions); err != nil {\n\t\treturn err\n\t}\n\tcmd := \"show evpn vni json\"\n\tjsonBGPL2vpnEvpnSum, err := executeZebraCommand(cmd)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif len(jsonBGPL2vpnEvpnSum) == 0 {\n\t\treturn nil\n\t}\n\tif err := processBgpL2vpnEvpnSummary(ch, jsonBGPL2vpnEvpnSum, c.descriptions); err != nil {\n\t\treturn cmdOutputProcessError(cmd, string(jsonBGPL2vpnEvpnSum), err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0de466cf04f7bc26377f622db4849ac7", "score": "0.57145584", "text": "func (h *IPNeighHandler) SetIPScanNeighbor(data *l3.IPScanNeighbor) error {\n\treq := &ip.IPScanNeighborEnableDisable{\n\t\tMode: uint8(data.Mode),\n\t\tScanInterval: uint8(data.ScanInterval),\n\t\tMaxProcTime: uint8(data.MaxProcTime),\n\t\tMaxUpdate: uint8(data.MaxUpdate),\n\t\tScanIntDelay: uint8(data.ScanIntDelay),\n\t\tStaleThreshold: uint8(data.StaleThreshold),\n\t}\n\treply := &ip.IPScanNeighborEnableDisableReply{}\n\n\tif err := h.callsChannel.SendRequest(req).ReceiveReply(reply); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b35b8322d210df722e66ca25f91f0d2c", "score": "0.5482883", "text": "func (i *ip) Update() *Block {\n\tvar ip net.IP\n\tiface, err := net.InterfaceByName(i.networkInterface)\n\tif err != nil {\n\t\tlog.Error(err)\n\t\treturn nil\n\t}\n\n\taddrs, err := iface.Addrs()\n\tif err != nil {\n\t\tlog.Error(err)\n\t\treturn nil\n\t}\n\t// handle err\n\tfor _, addr := range addrs {\n\t\tswitch v := addr.(type) {\n\t\tcase *net.IPNet:\n\t\t\tif v.IP.To4() != nil {\n\t\t\t\tip = v.IP\n\t\t\t}\n\t\t}\n\t\t// process IP address\n\t}\n\tfullTxt := fmt.Sprintf(\" %s %s\", IconIP, ip.String())\n\treturn &Block{FullText: fullTxt, Color: ColorLime}\n}", "title": "" }, { "docid": "d598739f4207d891ae864f4ad628919a", "score": "0.5480864", "text": "func (nv *Params) Update() {\n\tif nv.NetView != nil {\n\t\tnv.NetView.Config()\n\t\tnv.NetView.Update()\n\t}\n}", "title": "" }, { "docid": "73ee31b2e844d938ead0bc2cf75d3b81", "score": "0.5448623", "text": "func (d *MockDataResyncDSL) IPScanNeighbor(val *vpp_l3.IPScanNeighbor) vppclient.DataResyncDSL {\n\tkey := vpp_l3.IPScanNeighborKey()\n\td.Values[key] = val\n\treturn d\n}", "title": "" }, { "docid": "81502026b85ec2aba83a2d750305c073", "score": "0.54452324", "text": "func (h *Host) UpdateIP(ip string) {\n\th.IP = ip\n}", "title": "" }, { "docid": "0f25f20d7953eef11f4e1a7ca6a5dd37", "score": "0.54318297", "text": "func (m VipModel) UpdateVip(id int64, v Vip) (int64, error) {\n\tq := `UPDATE vips\n\t\t\tSET name=$2, country_of_origin=$3, eta=$4, photo=$5, arrived=$6, attributes=$7\n\t\t\tWHERE id=$1`\n\n\trow, err := m.DB.Exec(\n\t\tq,\n\t\tid,\n\t\tv.Name,\n\t\tv.CountryOfOrigin,\n\t\tv.ETA,\n\t\tv.Photo,\n\t\tv.Arrived,\n\t\tpq.Array(v.Attributes),\n\t)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\trAffected, err := row.RowsAffected()\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn rAffected, nil\n}", "title": "" }, { "docid": "a8201d9549454b56c5617bc4269465cb", "score": "0.5411563", "text": "func UpdateipvpnDynamo(svc *dynamodb.DynamoDB, table string, key map[string]*dynamodb.AttributeValue, newvalue map[string]*dynamodb.AttributeValue) error {\n\tinput := &dynamodb.UpdateItemInput{\n\t\tKey: key,\n\t\tTableName: aws.String(table),\n\t\tUpdateExpression: aws.String(\"set #V = :v\"),\n\t\tExpressionAttributeNames: map[string]*string{\n\t\t\t\"#V\": aws.String(\"AddressVpn\"),\n\t\t},\n\t\tExpressionAttributeValues: newvalue,\n\t\tReturnValues: aws.String(\"UPDATED_NEW\"),\n\t}\n\n\t_, err := svc.UpdateItem(input)\n\tif err != nil {\n\t\tlog.Error().Msgf(\"Error %s\", err.Error())\n\t\treturn err\n\t}\n\tlog.Info().Msg(\"Successfully updated\")\n\treturn nil\n}", "title": "" }, { "docid": "d06684e6615e9833362892fe1119ab0f", "score": "0.5369051", "text": "func (p *Floatip) update(spec *vmv1.PublicSepc, stat *vmv1.ResourceStatus) {\n\tvar (\n\t\tv *FipResult\n\t\tok bool\n\t)\n\tp.fmu.RLock()\n\tdefer p.fmu.RUnlock()\n\tif len(p.caches) == 0 {\n\t\treturn\n\t}\n\tv, ok = p.caches[spec.PortId]\n\tif !ok || v.sync == false {\n\t\treturn\n\t}\n\tklog.V(3).Infof(\"update floating ip ResourceStatus %v\", v)\n\n\tif v.unbind {\n\t\tstat.ServerStat = vmv1.ServerStat{}\n\t\tklog.V(2).Infof(\"portid(%v) had unbinded frpm floating ip!\", spec.PortId)\n\t\treturn\n\t}\n\tstat.ServerStat.Ip = v.Ip\n\tstat.ServerStat.ResStat = v.Status\n\tstat.ServerStat.Id = v.ID\n}", "title": "" }, { "docid": "cba55c72dc1248820271348f54210e80", "score": "0.52783483", "text": "func update(ip net.IP, by int, op string) net.IP {\n\tival := binary.BigEndian.Uint32(ip)\n\tival = operators[op](ival, uint32(by))\n\tbval := make([]byte, net.IPv4len)\n\tbinary.BigEndian.PutUint32(bval, ival)\n\treturn net.IP(bval)\n}", "title": "" }, { "docid": "158fb78dc97a0cce4f3a54338058fb26", "score": "0.5161723", "text": "func (r *Repo) UpdateVP(vp pb.VantagePoint) error {\n\t_, err := r.repo.GetWriter().Exec(updateVP,\n\t\tvp.Ip,\n\t\tvp.Hostname,\n\t\tvp.Site,\n\t\tvp.Timestamp,\n\t\tvp.RecordRoute,\n\t\tvp.Spoof,\n\t\tvp.RecSpoof,\n\t\tvp.Ping,\n\t\tvp.Trace,\n\t\t)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e84921a54860acd5f985d8c8ee06337f", "score": "0.5154206", "text": "func (r *AndroidWorkProfileVpnConfigurationRequest) Update(ctx context.Context, reqObj *AndroidWorkProfileVpnConfiguration) error {\n\treturn r.JSONRequest(ctx, \"PATCH\", \"\", reqObj, nil)\n}", "title": "" }, { "docid": "45946fae81cc8f1944de7d76c9458747", "score": "0.51485395", "text": "func (o *Balance) UpdateP(exec boil.Executor, whitelist ...string) {\n\terr := o.Update(exec, whitelist...)\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n}", "title": "" }, { "docid": "6daf51753a686644476863863cfaa169", "score": "0.51015896", "text": "func (g *PrometheusGauge) Update(metric *dto.Metric, networkLabels prometheus.Labels) error {\n\tg.gaugeVec.With(networkLabels).Set(metric.GetGauge().GetValue())\n\treturn nil\n}", "title": "" }, { "docid": "dc9f87ffca2851986d81d9df532058c8", "score": "0.50834435", "text": "func (this *User) UpdateIP() {\n\tthis.ip = IPAddrsGetExternal()\n\tif this.ip == \"\" {\n\t\tthis.ip = IPAddrsGetInternal()\n\t}\n}", "title": "" }, { "docid": "534e672d8bad5796f1a6cc55c2fecabf", "score": "0.50762707", "text": "func (bWr remoteWriter) Update(ctx *sql.Context, old sql.Row, new sql.Row) error {\n\treturn fmt.Errorf(\"the dolt_remotes table is read-only; use the dolt_remote stored procedure to edit remotes\")\n}", "title": "" }, { "docid": "d856cbc8d2a82dbd950ba1c047d1484a", "score": "0.50723875", "text": "func (o *SmpInvs) Update(s *State, ε, Δε []float64, eid, ipid int, time float64) (err error) {\n\treturn o.PU.Update(s, ε, Δε, eid, ipid, time)\n}", "title": "" }, { "docid": "c351b322695a8095410f1989d0664b91", "score": "0.49965385", "text": "func (r *IOSEnterpriseWiFiConfigurationRequest) Update(ctx context.Context, reqObj *IOSEnterpriseWiFiConfiguration) error {\n\treturn r.JSONRequest(ctx, \"PATCH\", \"\", reqObj, nil)\n}", "title": "" }, { "docid": "f893220864050659277450ed21b4c713", "score": "0.49689108", "text": "func (r *remoteAddrTable) Update(remote *net.UDPAddr, pack []byte) error {\n\tkey := remote.IP.String() + \":\" + string(remote.Port)\n\trem, _ := r.remote[key]\n\n\trem.Timer.Reset(2 * time.Second)\n\tif len(pack) == 0 {\n\t\treturn nil\n\t}\n\trem.PackCount++\n\t_, err := rem.Hash.Write(pack)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfmt.Printf(\"[Update] now count is %d \\n\", rem.PackCount)\n\n\treturn nil\n}", "title": "" }, { "docid": "06ce70366a5ae94b4d6b457a3f8e9e4f", "score": "0.49498358", "text": "func (c *egressNetworkPolicy) Update(fw *sdnapi.EgressNetworkPolicy) (result *sdnapi.EgressNetworkPolicy, err error) {\n\tresult = &sdnapi.EgressNetworkPolicy{}\n\terr = c.r.Put().Namespace(c.ns).Resource(\"egressNetworkPolicies\").Name(fw.Name).Body(fw).Do().Into(result)\n\treturn\n}", "title": "" }, { "docid": "27e3579c143a9474f8bfed6c11f46304", "score": "0.49421966", "text": "func (s *PrometheusSummary) Update(metric *dto.Metric, networkLabels prometheus.Labels) error {\n\ts.sumGaugeVec.With(networkLabels).Set(metric.GetSummary().GetSampleSum())\n\ts.countGaugeVec.With(networkLabels).Set(float64(metric.GetSummary().GetSampleCount()))\n\treturn nil\n}", "title": "" }, { "docid": "a2f3bfb72405cf133ecdb774c791a394", "score": "0.49213323", "text": "func (c *PinController) Update(ctx *app.UpdatePinContext) error {\n\t// PinController_Update: start_implement\n\n\tps := c.P.PinService()\n\n\terr := ps.UpdatePin(\n\t\tpinbase.Hash(ctx.PartyHash),\n\t\tpinbase.Hash(ctx.PinHash),\n\t\t&pinbase.PinEdit{\n\t\t\tAliases: ctx.Payload.Aliases,\n\t\t\tWantPinned: *ctx.Payload.WantPinned,\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tp, err := ps.Pin(\n\t\tpinbase.Hash(ctx.PartyHash),\n\t\tpinbase.Hash(ctx.PinHash),\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar e string\n\tif p.LastError != nil {\n\t\te = p.LastError.Error()\n\t}\n\n\tres := &app.PinbasePin{\n\t\tHash: string(p.ID),\n\t\tAliases: p.Aliases,\n\t\tWantPinned: p.WantPinned,\n\t\tStatus: p.Status.String(),\n\t\tLastError: e,\n\t}\n\n\t// PinController_Update: end_implement\n\treturn ctx.OK(res)\n}", "title": "" }, { "docid": "bc6ac99d3adb1ac2ab6636ff808ea599", "score": "0.49213082", "text": "func (r *ipv6Address) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) {\n\tvar terraformModel ipv6AddressModel\n\tvar mikrotikModel client.Ipv6Address\n\tGenericUpdateResource(&terraformModel, &mikrotikModel, r.client)(ctx, req, resp)\n}", "title": "" }, { "docid": "7505a0336a721ed80c8c46ecaa45dd3b", "score": "0.49028125", "text": "func (nt *Network) UpdateParams() {\n\tnt.Network.UpdateParams()\n}", "title": "" }, { "docid": "d673885023dc1eabb5a493ea4b250882", "score": "0.49010152", "text": "func (c *FakeWireGuardPeers) Update(wireGuardPeer *v1alpha1.WireGuardPeer) (result *v1alpha1.WireGuardPeer, err error) {\n\tobj, err := c.Fake.\n\t\tInvokes(testing.NewUpdateAction(wireguardpeersResource, c.ns, wireGuardPeer), &v1alpha1.WireGuardPeer{})\n\n\tif obj == nil {\n\t\treturn nil, err\n\t}\n\treturn obj.(*v1alpha1.WireGuardPeer), err\n}", "title": "" }, { "docid": "1146a18f5839fe89d7db86abc5689341", "score": "0.48816288", "text": "func (c *FakeEgressIPs) Update(ctx context.Context, egressIP *egressipv1.EgressIP, opts v1.UpdateOptions) (result *egressipv1.EgressIP, err error) {\n\tobj, err := c.Fake.\n\t\tInvokes(testing.NewRootUpdateAction(egressipsResource, egressIP), &egressipv1.EgressIP{})\n\tif obj == nil {\n\t\treturn nil, err\n\t}\n\treturn obj.(*egressipv1.EgressIP), err\n}", "title": "" }, { "docid": "e12ea492a8a580c18688593a3646f665", "score": "0.48472753", "text": "func (h *Host) Update(Interval int64, Probes int, URL string) {\n\th.Lock()\n\tdefer h.Unlock()\n\tlogger.Debug(\"Updating host %s\", h.IP.String())\n\tif h.Finished {\n\t\treturn\n\t}\n\t//if (time.Duration(Interval) * time.Second) != h.Interval {\n\tif (time.Duration(Interval) * time.Second) < h.Interval {\n\t// todo: check if tere is several DBHosts with this ip. If one - change interval anyway, if several - use smallest.\n\t\t// Re-Add host, because we cannot update timer when it's in use\n\t\tif err := PingPool.AddHost(h.IP.String(), h.Probes, Interval, h.URL); err != nil {\n\t\t\tlogger.Err(\"Host.Update: Cannot add host '%s' to PingPool: %s\", h.IP.String(), err.Error())\n\t\t}\n\t} else {\n\t\th.Probes = Probes\n\t\th.URL = URL\n\t}\n}", "title": "" }, { "docid": "b6038d72f6b3f4f68e90425110df3abf", "score": "0.4810059", "text": "func (o *Sermon) UpdateP(exec boil.Executor, whitelist ...string) {\n\terr := o.Update(exec, whitelist...)\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n}", "title": "" }, { "docid": "081b108b97cc4fda93bb8067f6584a0d", "score": "0.4807154", "text": "func ConnUpdate() {\n\tmutex_conns.Lock()\n\tfor key, value := range MemberList {\n\t\tif value == localIP || value == \"0\" {\n\t\t\tconns[key] = nil\n\t\t\tcontinue\n\t\t}\n\t\tudpAddr, err := net.ResolveUDPAddr(\"udp4\", value+PORT)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"ResolveUDPAddr %d failed\\n\", key)\n\t\t\tcontinue\n\t\t}\n\t\tconn, err2 := net.DialUDP(\"udp\", nil, udpAddr)\n\t\tif err2 != nil {\n\t\t\tfmt.Printf(\"DialUDP %d failed\\n\", key)\n\t\t\tcontinue\n\t\t}\n\t\tconns[key] = conn\n\t}\n\tmutex_conns.Unlock()\n}", "title": "" }, { "docid": "3444c2f355bf861a2b4e74d9e4a98898", "score": "0.4798561", "text": "func update() error {\n\tdb, err := sqlittle.Open(viper.GetString(\"database\"))\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer db.Close()\n\n\tprovider, err := provider.New(viper.GetString(\"remote\"))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tprisoners, err := jailed(db, provider)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tgeocount.Reset()\n\tfor _, prisoner := range prisoners {\n\t\tgeocount.With(prometheus.Labels{\"country\": prisoner.country, \"geohash\": prisoner.geohash, \"jail\": prisoner.jail, \"currently_banned\": strconv.FormatBool(prisoner.currentlyBanned)}).Inc()\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "2700bbed6a557d279275bbeccb3888c0", "score": "0.47902703", "text": "func (c *FakeSriovNetworks) Update(ctx context.Context, sriovNetwork *sriovnetworkv1.SriovNetwork, opts v1.UpdateOptions) (result *sriovnetworkv1.SriovNetwork, err error) {\n\tobj, err := c.Fake.\n\t\tInvokes(testing.NewUpdateAction(sriovnetworksResource, c.ns, sriovNetwork), &sriovnetworkv1.SriovNetwork{})\n\n\tif obj == nil {\n\t\treturn nil, err\n\t}\n\treturn obj.(*sriovnetworkv1.SriovNetwork), err\n}", "title": "" }, { "docid": "98884559a518774b7d9f20999d78f2d6", "score": "0.47757277", "text": "func (c *Client) UpdateIP(ips []net.IP) error {\n\trs, err := c.DoUpdateIP(ips)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn rs.ToError()\n}", "title": "" }, { "docid": "e1cea98efa8c8f28755bc533ab9454fd", "score": "0.47659355", "text": "func (a *AnnealingSoftmax) Update(option int, reward float64) error {\r\n\ta.Lock()\r\n\tdefer a.Unlock()\r\n\r\n\tif option < 0 || option > len(a.r) {\r\n\t\treturn ErrIndex\r\n\t}\r\n\r\n\tif reward < 0 {\r\n\t\treturn ErrReward\r\n\t}\r\n\r\n\ta.c[option]++\r\n\ta.r[option] += reward\r\n\r\n\treturn nil\r\n}", "title": "" }, { "docid": "8915203ac516fbe5fccd7685fc472447", "score": "0.47506252", "text": "func (f *Field) Update() {\n\tvar exists bool\n\t// Update relivant dead cells to track\n\tfor l, cell := range f.Cells {\n\t\tfor _, loc := range l.Neighbours() {\n\t\t\t_, exists = f.Cells[loc]\n\t\t\t// If we're not tracking a location and it has a living adjacent cell\n\t\t\tif !exists && cell.State {\n\t\t\t\t// start Tracking it\n\t\t\t\tf.SetCell(loc, false)\n\t\t\t}\n\t\t}\n\n\t\t// If we're tracking a dead cell with no living neighbours\n\t\tif !cell.State && cell.Rc == 0 {\n\t\t\t// Stop\n\t\t\tdelete(f.Cells, l)\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "9402a51ecf9ec8e799732bae2daab999", "score": "0.4747123", "text": "func (d *Dnspod) UpdateIP(domainID int, subDomainID string, subDomainName string, ip string) {\n\tvalue := url.Values{}\n\tvalue.Add(\"domain_id\", strconv.Itoa(domainID))\n\tvalue.Add(\"record_id\", subDomainID)\n\tvalue.Add(\"sub_domain\", subDomainName)\n\tvalue.Add(\"record_type\", \"A\")\n\tvalue.Add(\"record_line\", \"默认\")\n\tvalue.Add(\"value\", ip)\n\n\tbody, err := d.postData(\"/Record.Modify\", value)\n\n\tif err != nil {\n\t\tlog.Println(\"Failed to update record to new IP!\")\n\t\tlog.Println(err)\n\t\treturn\n\t}\n\n\tresp := &updateRecords{}\n\tif err := json.Unmarshal(body, resp); err != nil {\n\t\tlog.Println(\"UpdateIP error\")\n\t\tlog.Println(err)\n\t}\n\n\tif resp.Status.Code == \"1\" {\n\t\tlog.Println(\"New IP updated!\")\n\t} else {\n\t\tlog.Println(\"Change IP Failed.\")\n\t}\n}", "title": "" }, { "docid": "a6e54a522923c74082e75f1601f0ba5b", "score": "0.4744025", "text": "func (o *Instrument) UpdateP(exec boil.Executor, whitelist ...string) {\n\terr := o.Update(exec, whitelist...)\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n}", "title": "" }, { "docid": "e9a9e223818464bd95f44651c53cd658", "score": "0.47376493", "text": "func (Query) Update(info Info) error {\n\tdata, err := db.Get([]byte(info.ID))\n\tif err != nil {\n\t\treturn errors.DBOperationError{Message: err.Error()}\n\t}\n\n\tstored, err := decode(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, ip := range info.IPv4 {\n\t\tif !common.HasElem(stored.IPv4, ip) {\n\t\t\tstored.IPv4 = append(stored.IPv4, ip)\n\t\t}\n\t}\n\tif info.RTT != 0.0 {\n\t\tstored.RTT = info.RTT\n\t}\n\n\tencoded, err := stored.encode()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn db.Put([]byte(info.ID), encoded)\n}", "title": "" }, { "docid": "d6e3cdb1b0689d87ecf47b9f7b2bd5c9", "score": "0.4725903", "text": "func (o *FeatureCvtermprop) UpdateP(exec boil.Executor, whitelist ...string) {\n\terr := o.Update(exec, whitelist...)\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n}", "title": "" }, { "docid": "772c8737362c65ff25e34166ed7336a7", "score": "0.47241503", "text": "func (c *FakeOverlappingRangeIPReservations) Update(ctx context.Context, overlappingRangeIPReservation *v1alpha1.OverlappingRangeIPReservation, opts v1.UpdateOptions) (result *v1alpha1.OverlappingRangeIPReservation, err error) {\n\tobj, err := c.Fake.\n\t\tInvokes(testing.NewUpdateAction(overlappingrangeipreservationsResource, c.ns, overlappingRangeIPReservation), &v1alpha1.OverlappingRangeIPReservation{})\n\n\tif obj == nil {\n\t\treturn nil, err\n\t}\n\treturn obj.(*v1alpha1.OverlappingRangeIPReservation), err\n}", "title": "" }, { "docid": "a5e2bd597b12896b15bf4c38bc467ec6", "score": "0.47205222", "text": "func (s *Server) Update() {\n\tdps := DpsMsg{}\n\tif err := dps.HTTPGet(s.URL); err != nil {\n\t\tlog.Errorf(\"%s\", err)\n\t\treturn\n\t}\n\n\tlog.Debugf(\"%v\", dps)\n\n\tif len(dps.DpIds) == 0 {\n\t\tlog.Errorf(\"DpId not found.\")\n\t\treturn\n\t}\n\n\tdpid := dps.DpIds[0]\n\n\tlog.Debugf(\"dpid = %d\", dpid)\n\n\tpsmsg := PortStatsMsg{}\n\tif err := psmsg.HTTPGet(s.URL, dpid); err != nil {\n\t\tlog.Errorf(\"%s\", err)\n\t\treturn\n\t}\n\n\tps, _ := psmsg.PortStats(dpid)\n\ttempPath, err := s.WritePortStats(ps)\n\tif err != nil {\n\t\tlog.Errorf(\"%s\", err)\n\t\treturn\n\t}\n\n\tlog.Debugf(\"temp:%s -> %s\", tempPath, s.Path)\n\n\tif err := moveFile(tempPath, s.Path); err != nil {\n\t\tlog.Errorf(\"%s\", err)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "c25fda0de30ec2a142ec20c7b174a83c", "score": "0.47171077", "text": "func (c *OpsWorks) UpdateElasticIP(req *UpdateElasticIPRequest) (err error) {\n\t// NRE\n\terr = c.client.Do(\"UpdateElasticIp\", \"POST\", \"/\", req, nil)\n\treturn\n}", "title": "" }, { "docid": "52f83b5a79f153608afc6362a0d668f9", "score": "0.47163075", "text": "func (o *Friendship) UpdateP(exec boil.Executor, whitelist ...string) {\n\terr := o.Update(exec, whitelist...)\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n}", "title": "" }, { "docid": "e0d5c0c89e4d2ce373fc1d2cd217e4e8", "score": "0.47152147", "text": "func (h *IPNeighHandler) GetIPScanNeighbor() (*l3.IPScanNeighbor, error) {\n\tdata, err := h.RunCli(context.TODO(), \"show ip scan-neighbor\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tipScanNeigh := &l3.IPScanNeighbor{}\n\n\tmatches := cliIPScanNeighRe.FindStringSubmatch(data)\n\n\tif len(matches) != 8 {\n\t\th.log.Warnf(\"invalid 'show ip scan-neighbor' output: %q\", data)\n\t\treturn nil, errors.Errorf(\"invalid 'show ip scan-neighbor' output\")\n\t}\n\n\tif matches[1] == \"enabled\" {\n\t\tswitch matches[2] {\n\t\tcase \"IPv4\":\n\t\t\tipScanNeigh.Mode = l3.IPScanNeighbor_IPV4\n\t\tcase \"IPv6\":\n\t\t\tipScanNeigh.Mode = l3.IPScanNeighbor_IPV6\n\t\tcase \"IPv4 and IPv6\":\n\t\t\tipScanNeigh.Mode = l3.IPScanNeighbor_BOTH\n\t\t}\n\t}\n\tipScanNeigh.ScanInterval = h.strToUint32(matches[3])\n\tipScanNeigh.StaleThreshold = h.strToUint32(matches[4])\n\tipScanNeigh.MaxProcTime = h.strToUint32(matches[5])\n\tipScanNeigh.MaxUpdate = h.strToUint32(matches[6])\n\tipScanNeigh.ScanIntDelay = h.strToUint32(matches[7])\n\n\treturn ipScanNeigh, nil\n}", "title": "" }, { "docid": "109aaa4963061ac1843e768fdd669241", "score": "0.47055995", "text": "func (r *Repository) Update(haip Haip) error {\n\trequestBody := haipWrapper{Haip: haip}\n\n\treturn r.Client.Put(rest.Request{Endpoint: fmt.Sprintf(\"/haips/%s\", haip.Name), Body: requestBody})\n}", "title": "" }, { "docid": "4601135b75b44f014565cdf19ae21397", "score": "0.46981266", "text": "func (dg *discoveryGateway) StatsUpdate(*discovery.EndPointStats) {\n}", "title": "" }, { "docid": "cd9e50ba47702fb7707094d922f166f1", "score": "0.46871385", "text": "func (ps PeerStore) Update(ih model.InfoHash, p *model.Peer) error {\n\tpanic(\"implement me\")\n}", "title": "" }, { "docid": "9c073a9af5a8f66f7dcdc5a11bb58e67", "score": "0.468123", "text": "func (b *Browsing) Update() (result sql.Result, err error) {\n\tcxt := context.GetContext()\n\tconn, _ := dbr.Open(cxt.GetConf().DBType, cxt.GetConf().GetDSN(), nil)\n\tsess := conn.NewSession(nil)\n\tdefer sess.Close()\n\n\treturn sess.Update(\"browsing\").\n\t\tSet(\"src_ip\", b.SrcIP).\n\t\tSet(\"dst_ip\", b.DstIP).\n\t\tSet(\"src_port\", b.SrcPort).\n\t\tSet(\"dst_port\", b.DstPort).\n\t\tSet(\"timestamp\", b.Timestamp).\n\t\tSet(\"download\", b.Download).\n\t\tSet(\"browsing_time\", b.BrowsingTime).\n\t\tSet(\"title\", b.Title).\n\t\tSet(\"domain\", b.Domain).\n\t\tSet(\"url\", b.URL).\n\t\tWhere(\"id = ?\", b.ID).\n\t\tExec()\n}", "title": "" }, { "docid": "e0ca78d112dc201b7b974076ee6958b4", "score": "0.46786243", "text": "func (r *ExternalConnectionRequest) Update(ctx context.Context, reqObj *ExternalConnection) error {\n\treturn r.JSONRequest(ctx, \"PATCH\", \"\", reqObj, nil)\n}", "title": "" }, { "docid": "3160e19682dc9bc86c4bb33a72432fc3", "score": "0.4670474", "text": "func (t *SimpleChaincode) update_pin(stub shim.ChaincodeStubInterface, v Vehicle, caller string, caller_affiliation string, new_value string) ([]byte, error) {\n\n\tnew_vin, err := strconv.Atoi(string(new_value)) \t\t // will return an error if the new vin contains non numerical chars\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tif err != nil || len(string(new_value)) != 15 { return nil, errors.New(\"Invalid value passed for new VIN\") }\n\n\tif \t\tv.Status\t\t\t== STATE_MANUFACTURE\t&&\n\t\t\tv.Owner\t\t\t\t== caller\t\t\t\t&&\n\t\t\tcaller_affiliation\t== MANUFACTURER\t\t\t&&\n\t\t\tv.VIN\t\t\t\t== 0\t\t\t\t\t&&\t\t\t// Can't change the VIN after its initial assignment\n\t\t\tv.Scrapped\t\t\t== false\t\t\t\t{\n\n\t\t\t\t\tv.VIN = new_vin\t\t\t\t\t// Update to the new value\n\t} else {\n\n return nil, errors.New(fmt.Sprintf(\"Permission denied. update_pin %v %v %v %v %v\", v.Status, STATE_MANUFACTURE, v.Owner, caller, v.VIN, v.Scrapped))\n\n\t}\n\n\t_, err = t.save_changes(stub, v)\t\t\t\t\t\t// Save the changes in the blockchain\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tif err != nil { fmt.Printf(\"UPDATE_VIN: Error saving changes: %s\", err); return nil, errors.New(\"Error saving changes\") }\n\n\treturn nil, nil\n\n}", "title": "" }, { "docid": "b455b9f74a75dcb5c96379bbb3196a07", "score": "0.4665224", "text": "func XUpdatePrivateNetworkInstanceIp(paramId string, params *viper.Viper, body string) (*gentleman.Response, map[string]interface{}, error) {\n\thandlerPath := \"update-private-network-instance-ip\"\n\tif xSubcommand {\n\t\thandlerPath = \"x \" + handlerPath\n\t}\n\n\tserver := viper.GetString(\"server\")\n\tif server == \"\" {\n\t\tserver = xServers()[viper.GetInt(\"server-index\")][\"url\"]\n\t}\n\n\turl := server + \"/private-network/{id}:update-ip\"\n\turl = strings.Replace(url, \"{id}\", paramId, 1)\n\n\treq := cli.Client.Put().URL(url)\n\n\tif body != \"\" {\n\t\treq = req.AddHeader(\"Content-Type\", \"application/json\").BodyString(body)\n\t}\n\n\tcli.HandleBefore(handlerPath, params, req)\n\n\tresp, err := req.Do()\n\tif err != nil {\n\t\treturn nil, nil, errors.Wrap(err, \"Request failed\")\n\t}\n\n\tvar decoded map[string]interface{}\n\n\tif resp.StatusCode < 400 {\n\t\tif err := cli.UnmarshalResponse(resp, &decoded); err != nil {\n\t\t\treturn nil, nil, errors.Wrap(err, \"Unmarshalling response failed\")\n\t\t}\n\t} else {\n\t\treturn nil, nil, errors.Errorf(\"HTTP %d: %s\", resp.StatusCode, resp.String())\n\t}\n\n\tafter := cli.HandleAfter(handlerPath, params, resp, decoded)\n\tif after != nil {\n\t\tdecoded = after.(map[string]interface{})\n\t}\n\n\treturn resp, decoded, nil\n}", "title": "" }, { "docid": "8c59b22c38fbff52379470ab0fc42889", "score": "0.46636596", "text": "func (o *Payment) UpdateP(exec boil.Executor, whitelist ...string) {\n\terr := o.Update(exec, whitelist...)\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n}", "title": "" }, { "docid": "105151f935922f05463180f626841ba1", "score": "0.46551335", "text": "func UpdateIPRange(w http.ResponseWriter, r *http.Request) {\n\thr := HTTPResponse{w}\n\tiprange, ok := getIPRangeHelper(hr, r)\n\tif !ok {\n\t\treturn // Specific response handled by getIPRangeHelper\n\t}\n\n\t// Parse Request\n\tif err := iprange.Decode(r.Body); err != nil {\n\t\thr.JSONMsg(http.StatusBadRequest, err.Error())\n\t\treturn\n\t}\n\n\tif !saveIPRangeHelper(hr, iprange) {\n\t\treturn\n\t}\n\thr.JSON(http.StatusOK, iprange)\n}", "title": "" }, { "docid": "73928cc592d831214147e58cac5b290e", "score": "0.46535316", "text": "func (c *Connection) UpdateEmptyWith(ip net.IP, port uint16, protocol string) {\n\tif c.IP == nil {\n\t\tc.IP = ip\n\t}\n\tif c.Port == 0 {\n\t\tc.Port = port\n\t}\n\tif c.Protocol == \"\" {\n\t\tc.Protocol = protocol\n\t}\n}", "title": "" }, { "docid": "5a10cf25bd73195d03be56e8614498a7", "score": "0.46518102", "text": "func Update(c *gophercloud.ServiceClient, vpcID string, opts UpdateOptsBuilder) (r UpdateResult) {\n\tb, err := opts.ToVpcUpdateMap()\n\tif err != nil {\n\t\tr.Err = err\n\t\treturn\n\t}\n\t_, r.Err = c.Put(updateURL(c, vpcID), b, &r.Body, &gophercloud.RequestOpts{\n\t\tOkCodes: []int{200, 201},\n\t})\n\treturn\n}", "title": "" }, { "docid": "b1adaad8645742e383fdd23ac00817d8", "score": "0.4642936", "text": "func (pair *PPPair) Update(node sqalx.Node) error {\n\ttx, err := node.Beginx()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer tx.Rollback()\n\n\t_, err = sdb.Insert(\"pp_pair\").\n\t\tColumns(\"discord_id\", \"api_key\", \"paired\", \"device_name\").\n\t\tValues(pair.DiscordID, pair.Pair.Key, pair.Paired, pair.DeviceName).\n\t\tSuffix(\"ON CONFLICT (discord_id) DO UPDATE SET api_key = ?, paired = ?, device_name = ?\",\n\t\t\tpair.Pair.Key, pair.Paired, pair.DeviceName).\n\t\tRunWith(tx).Exec()\n\n\tif err != nil {\n\t\treturn errors.New(\"AddPPair: \" + err.Error())\n\t}\n\treturn tx.Commit()\n}", "title": "" }, { "docid": "c6d9ce33279abd6f7e8bdff0eb13f123", "score": "0.46327642", "text": "func (c *PlayerBiddingClient) Update(siteID, importID string, PlayerBiddingConfigurationMetadata *PlayerBiddingConfigurationMetadata) (*PlayerBiddingConfigurationResource, error) {\n\tupdateRequestData := &PlayerBiddingWriteRequest{Metadata: *PlayerBiddingConfigurationMetadata}\n\tplayerBiddingConfig := &PlayerBiddingConfigurationResource{}\n\tpath := fmt.Sprintf(\"/v2/sites/%s/vpb_configs/%s\", siteID, importID)\n\terr := c.v2Client.Request(http.MethodPatch, path, playerBiddingConfig, updateRequestData, nil)\n\treturn playerBiddingConfig, err\n}", "title": "" }, { "docid": "5754da8540da6563168e8e711c619cd7", "score": "0.46152958", "text": "func (extNet *ExternalNetworkV2) Update() (*ExternalNetworkV2, error) {\n\tendpoint := types.OpenApiPathVersion1_0_0 + types.OpenApiEndpointExternalNetworks\n\tapiVersion, err := extNet.client.getOpenApiHighestElevatedVersion(endpoint)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif extNet.ExternalNetwork.ID == \"\" {\n\t\treturn nil, fmt.Errorf(\"cannot update external network without id\")\n\t}\n\n\turlRef, err := extNet.client.OpenApiBuildEndpoint(endpoint, extNet.ExternalNetwork.ID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturnExtNet := &ExternalNetworkV2{\n\t\tExternalNetwork: &types.ExternalNetworkV2{},\n\t\tclient: extNet.client,\n\t}\n\n\terr = extNet.client.OpenApiPutItem(apiVersion, urlRef, nil, extNet.ExternalNetwork, returnExtNet.ExternalNetwork, nil)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error updating external network: %s\", err)\n\t}\n\n\treturn returnExtNet, nil\n}", "title": "" }, { "docid": "50e28fa7ad6647024b50f6a2e2439f45", "score": "0.46097696", "text": "func (c *NetworkClient) Update(ctx context.Context, network *Network, opts NetworkUpdateOpts) (*Network, *Response, error) {\n\treqBody := schema.NetworkUpdateRequest{\n\t\tName: opts.Name,\n\t}\n\tif opts.Labels != nil {\n\t\treqBody.Labels = &opts.Labels\n\t}\n\tif opts.ExposeRoutesToVSwitch != nil {\n\t\treqBody.ExposeRoutesToVSwitch = opts.ExposeRoutesToVSwitch\n\t}\n\n\treqBodyData, err := json.Marshal(reqBody)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tpath := fmt.Sprintf(\"/networks/%d\", network.ID)\n\treq, err := c.client.NewRequest(ctx, \"PUT\", path, bytes.NewReader(reqBodyData))\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\trespBody := schema.NetworkUpdateResponse{}\n\tresp, err := c.client.Do(req, &respBody)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\treturn NetworkFromSchema(respBody.Network), resp, nil\n}", "title": "" }, { "docid": "47c5773ad933a3b9147afc66b9c50c69", "score": "0.4609089", "text": "func (conn *Connection) Update(space, index interface{}, key, ops interface{}) (*Response, error) {\n\treturn conn.UpdateAsync(space, index, key, ops).Get()\n}", "title": "" }, { "docid": "4c594854473193a72225de39465af953", "score": "0.46065903", "text": "func (p *P) PeerUpdate(id string, isup bool, iscf bool, first bool, pd *kibitz.Export, dat *acproto.ACPHeartBeat) {\n\n\tdl.Debug(\"ring: %v %s is %v; %s %v %v\", first, id, isup, pd.BestAddr, pd.IsSameRack, pd.IsSameDC)\n\n\tif first {\n\t\tp.updateAllSrvr(id, isup, pd, dat)\n\t}\n\n\t// update ring\n\tif iscf {\n\t\tp.addServer(id, pd.Datacenter)\n\t} else {\n\t\tp.removeServer(id)\n\t}\n}", "title": "" }, { "docid": "fc26414dda9b8496eb9217a7830997fa", "score": "0.46052966", "text": "func Update(c *gophercloud.ServiceClient, id string, opts UpdateOptsBuilder) (r UpdateResult) {\n\tb, err := opts.ToVIPUpdateMap()\n\tif err != nil {\n\t\tr.Err = err\n\t\treturn\n\t}\n\t_, r.Err = c.Put(resourceURL(c, id), b, &r.Body, &gophercloud.RequestOpts{\n\t\tOkCodes: []int{200, 202},\n\t})\n\treturn\n}", "title": "" }, { "docid": "fe26f664fb68eba40af90d90d5227c4b", "score": "0.46006882", "text": "func (o *FeatureCvtermprop) Update(exec boil.Executor, whitelist ...string) error {\n\tvar err error\n\tif err = o.doBeforeUpdateHooks(exec); err != nil {\n\t\treturn err\n\t}\n\tkey := makeCacheKey(whitelist, nil)\n\tfeatureCvtermpropUpdateCacheMut.RLock()\n\tcache, cached := featureCvtermpropUpdateCache[key]\n\tfeatureCvtermpropUpdateCacheMut.RUnlock()\n\n\tif !cached {\n\t\twl := strmangle.UpdateColumnSet(featureCvtermpropColumns, featureCvtermpropPrimaryKeyColumns, whitelist)\n\t\tif len(wl) == 0 {\n\t\t\treturn errors.New(\"chado: unable to update feature_cvtermprop, could not build whitelist\")\n\t\t}\n\n\t\tcache.query = fmt.Sprintf(\"UPDATE \\\"feature_cvtermprop\\\" SET %s WHERE %s\",\n\t\t\tstrmangle.SetParamNames(\"\\\"\", \"\\\"\", 1, wl),\n\t\t\tstrmangle.WhereClause(\"\\\"\", \"\\\"\", len(wl)+1, featureCvtermpropPrimaryKeyColumns),\n\t\t)\n\t\tcache.valueMapping, err = queries.BindMapping(featureCvtermpropType, featureCvtermpropMapping, append(wl, featureCvtermpropPrimaryKeyColumns...))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tvalues := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), cache.valueMapping)\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, cache.query)\n\t\tfmt.Fprintln(boil.DebugWriter, values)\n\t}\n\n\t_, err = exec.Exec(cache.query, values...)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"chado: unable to update feature_cvtermprop row\")\n\t}\n\n\tif !cached {\n\t\tfeatureCvtermpropUpdateCacheMut.Lock()\n\t\tfeatureCvtermpropUpdateCache[key] = cache\n\t\tfeatureCvtermpropUpdateCacheMut.Unlock()\n\t}\n\n\treturn o.doAfterUpdateHooks(exec)\n}", "title": "" }, { "docid": "982db70a1aa0d919a77a9af6e98e00b2", "score": "0.455865", "text": "func (P *Peer) RoutingUpdate (Packet []byte) {\n\tif (!P.Router) {\n\t\treturn\n\t}\n\tType := Packet[0]\n\tif (Type == 0) { // Init/Reset\n\t\tP.ClearRoutes()\n\t\tP.RemoteRoutes = make(map[string]*InstalledRoute)\n\t\tfor P.RemoteIPv4 == nil {\n\t\t\tvar IPv4 net.IP = net.ParseIP(\"100.127.0.0\")\n\t\t\tIPv4[14] = byte(rand.Intn(256))\n\t\t\tIPv4[15] = byte(rand.Intn(256))\n\t\t\tvar Allocated = false\n\t\t\tfor x := range P.MegaLAN.Peers {\n\t\t\t\tif (bytes.Compare(P.MegaLAN.Peers[x].RemoteIPv4, IPv4) == 0) {\n\t\t\t\t\tAllocated = true\n\t\t\t\t}\n\t\t\t}\n\t\t\tif (!Allocated) {\n\t\t\t\tP.RemoteIPv4 = IPv4\n\t\t\t}\n\t\t}\n\t\tDebug(2, \"Init Router\", P.RemoteIPv4, P.RemoteIPv6)\n\t\tvar IPv4Route netlink.Route\n\t\tIPv4Route.Dst = &net.IPNet{IP: P.RemoteIPv4, Mask: net.CIDRMask(32,32)}\n\t\tIPv4Route.Scope = netlink.SCOPE_LINK\n\t\tIPv4Route.LinkIndex = P.MegaLAN.NIC.Link.Attrs().Index\n\t\tIPv4Route.Protocol = 33\n\t\tIPv4Route.Table = P.MegaLAN.RoutingTable\n\t\tIPv4Route.Priority = 1\n\t\tnetlink.RouteAdd(&IPv4Route)\n\t}\n\tif (P.RemoteRoutes == nil) {\n\t\tDebug(2, \"ROUTER\", \"Update before Init\")\n\t\treturn\n\t}\n\tif (Type == 1 && len(Packet)>=8) { // IPv4 Add\n\t\tvar IP net.IP = Packet[1:5]\n\t\tvar Mask = Packet[5]\n\t\tvar Metric = binary.BigEndian.Uint16(Packet[6:8])\n\t\tRoute := InstalledRoute{IP, Mask, Metric, nil}\n\t\tP.RemoteRoutes[Route.String()] = &Route\n\n\t\tvar IPv4Route netlink.Route\n\t\tIPv4Route.Dst = &net.IPNet{IP: Route.IP, Mask: net.CIDRMask(int(Route.PrefixLength),32)}\n\t\tIPv4Route.Scope = netlink.SCOPE_UNIVERSE\n\t\tIPv4Route.Gw = P.RemoteIPv4\n\t\tIPv4Route.LinkIndex = P.MegaLAN.NIC.Link.Attrs().Index\n\t\tIPv4Route.Protocol = 33\n\t\tIPv4Route.Table = P.MegaLAN.RoutingTable\n\t\tIPv4Route.Priority = int(Route.Metric + P.Latency)\n\t\tnetlink.RouteAdd(&IPv4Route)\n\t\tRoute.InstalledRoute = &IPv4Route\n\t\tDebug(2, \"AddRoute\", Route)\n\t} else if (Type == 2 && len(Packet)>=20) { // IPv6 Add\n\t\tvar IP net.IP = Packet[1:17]\n\t\tvar Mask = Packet[17]\n\t\tvar Metric = binary.BigEndian.Uint16(Packet[18:20])\n\t\tRoute := InstalledRoute{IP, Mask, Metric, nil}\n\t\tP.RemoteRoutes[Route.String()] = &Route\n\n\t\tvar IPv6Route netlink.Route\n\t\tIPv6Route.Dst = &net.IPNet{IP: Route.IP, Mask: net.CIDRMask(int(Route.PrefixLength),128)}\n\t\tIPv6Route.Scope = netlink.SCOPE_UNIVERSE\n\t\tIPv6Route.Gw = P.RemoteIPv6\n\t\tIPv6Route.LinkIndex = P.MegaLAN.NIC.Link.Attrs().Index\n\t\tIPv6Route.Protocol = 33\n\t\tIPv6Route.Table = P.MegaLAN.RoutingTable\n\t\tIPv6Route.Priority = int(Route.Metric + P.Latency)\n\t\tnetlink.RouteAdd(&IPv6Route)\n\t\tRoute.InstalledRoute = &IPv6Route\n\t\tDebug(2, \"AddRoute\", Route)\n\t} else if (Type == 3 && len(Packet)>=8) { // IPv4 Delete\n\t\tvar IP net.IP = Packet[1:5]\n\t\tvar Mask = Packet[5]\n\t\tvar Metric = binary.BigEndian.Uint16(Packet[6:8])\n\t\tRouteTemplate := InstalledRoute{IP, Mask, Metric, nil}\n\t\tif Route, ok := P.RemoteRoutes[RouteTemplate.String()]; ok {\n\t\t\tnetlink.RouteDel(Route.InstalledRoute)\n\t\t\tDebug(2, \"DelRoute\", Route)\n\t\t}\n\t} else if (Type == 4 && len(Packet)>=20) { // IPv6 Delete\n\t\tvar IP net.IP = Packet[1:17]\n\t\tvar Mask = Packet[17]\n\t\tvar Metric = binary.BigEndian.Uint16(Packet[18:20])\n\t\tRouteTemplate := InstalledRoute{IP, Mask, Metric, nil}\n\t\tif Route, ok := P.RemoteRoutes[RouteTemplate.String()]; ok {\n\t\t\tnetlink.RouteDel(Route.InstalledRoute)\n\t\t\tDebug(2, \"DelRoute\", Route)\n\t\t}\n\t} else {\n\t\tDebug(2, \"Routing Packet\", Type, len(Packet))\n\t}\n}", "title": "" }, { "docid": "107b7bcba04f1f1ee6468ba9ba71b297", "score": "0.45571882", "text": "func (om *DefaultOdpManager) Update(apiKey, apiHost string, segmentsToCheck []string) {\n\tif !om.enabled {\n\t\treturn\n\t}\n\n\t// flush old events using old odp publicKey (if exists) before updating odp key.\n\t// NOTE: It should be rare but possible that odp public key is changed for the same datafile (sdkKey).\n\t// Try to send all old events with the previous public key.\n\t// If it fails to flush all the old events here (network error), remaining events will be discarded.\n\n\tom.EventManager.FlushEvents(om.OdpConfig.GetAPIKey(), om.OdpConfig.GetAPIHost())\n\tif om.OdpConfig.Update(apiKey, apiHost, segmentsToCheck) {\n\t\t// reset segments cache when odp integration or segmentsToCheck are changed\n\t\tom.SegmentManager.Reset()\n\t}\n}", "title": "" }, { "docid": "bf4e828e52686ff4d814e9b490511e22", "score": "0.45484808", "text": "func (s *Scan) UpdateFingerprint() {\n\tf := &s.Fingerprint\n\tif s.Request != nil {\n\t\tif f.Origin == 0 {\n\t\t\tf.Origin = hash(getOrigin(s.Request.URL))\n\t\t}\n\t\tif f.URL == 0 {\n\t\t\tf.URL = hash(s.Request.URL.String())\n\t\t}\n\t\tif f.Request == 0 {\n\t\t\tf.Request = hash(s.Request.URL.String() + \"\\n\" + s.RequestBody)\n\t\t}\n\t\t// if f.RequestFull == 0 {\n\t\t// TODO\n\t\t// }\n\t}\n\n\tif f.ResponseSimilarity == 0 {\n\t\tif r := strings.NewReader(s.ResponseBody); s.ResponseBody != \"\" && r != nil {\n\t\t\tf.ResponseSimilarity = distance.Fingerprint(r, 3)\n\t\t\ts.Logm(\"Fingerprint\", \"Computed\")\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "ca057b10d08cc2fa9de03d7f967820c3", "score": "0.4548032", "text": "func (o *DMember) UpdateP(exec boil.Executor, whitelist ...string) {\n\terr := o.Update(exec, whitelist...)\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n}", "title": "" }, { "docid": "c70a9fad840c94d0c9dfa8081d7ff2d3", "score": "0.4546224", "text": "func (a *ApiApiService) UpdateIp(ctx _context.Context, ipId string) ApiUpdateIpRequest {\n\treturn ApiUpdateIpRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tipId: ipId,\n\t}\n}", "title": "" }, { "docid": "5223b3a9ad1d4e717137fee7a08e3de5", "score": "0.45455867", "text": "func (c *bondingCollector) Update(ch chan<- prometheus.Metric) error {\n\tstatusfile := sysFilePath(\"class/net\")\n\tbondingStats, err := readBondingStats(statusfile)\n\tif err != nil {\n\t\tif errors.Is(err, os.ErrNotExist) {\n\t\t\tlevel.Debug(c.logger).Log(\"msg\", \"Not collecting bonding, file does not exist\", \"file\", statusfile)\n\t\t\treturn ErrNoData\n\t\t}\n\t\treturn err\n\t}\n\tfor master, status := range bondingStats {\n\t\tch <- c.slaves.mustNewConstMetric(float64(status[0]), master)\n\t\tch <- c.active.mustNewConstMetric(float64(status[1]), master)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b54d1b83f4f58086673b50be9171452c", "score": "0.45440936", "text": "func updatepwnBoard(ip string){\n\tfor {\n\t\ttime.Sleep(15 * time.Second)\n\n\t\turl := \"http://pwnboard.win/generic\"\n\n \t// Create the struct\n \tdata := PwnBoard{\n \tIPs: ip,\n \tType: \"sexyPotat0\",\n \t}\n\n \t// Marshal the data\n \tsendit, err := json.Marshal(data)\n \tif err != nil {\n \treturn\n \t}\n\n \t// Send the post to pwnboard\n \tresp, err := http.Post(url, \"application/json\", bytes.NewBuffer(sendit))\n \tif err != nil {\n \treturn\n \t}\n\n\t\tdefer resp.Body.Close()\n\t}\n}", "title": "" }, { "docid": "eff79324d88e7a22733a15875ca7f75d", "score": "0.45428136", "text": "func UpdateChainNeighbors(w http.ResponseWriter, r *http.Request) {\n\t// Get active goredis pods\n\tpods, err := chain.GetPodsList()\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\"error\": err}).Error(\"failed getting pods from cluster\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tchannel := make(chan neighborResult, len(pods)-1)\n\n\t// Scatter Goroutines pattern to\n\t// Send update neighbor request\n\t// to all pods except the TAIL\n\tfor index := 0; index < cap(channel); index++ {\n\t\tpod, neighbor := pods[index], pods[index+1]\n\t\tgo func() {\n\t\t\terr := chain.UpdatePodNeighbor(pod, neighbor)\n\t\t\tchannel <- neighborResult{pod, neighbor, err}\n\t\t}()\n\t}\n\n\t// Gather Goroutines\n\tfor index := 0; index < cap(channel); index++ {\n\t\tres := <-channel\n\t\tif res.err != nil {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"error\": res.err,\n\t\t\t\t\"pod\": res.pod,\n\t\t\t\t\"neighbor\": res.neighbor,\n\t\t\t}).Error(\"failed updating neighbor\")\n\t\t\tcontinue\n\t\t}\n\t}\n\n\tlog.WithFields(log.Fields{\n\t\t\"pods\": pods,\n\t}).Debug(\"successfull UpdateChainNeighbors\")\n\n\tw.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "9bfb8068d8f81bfe3af91cdf6e1a8454", "score": "0.45421746", "text": "func (pq *graph) update(v *node) {\n\n\theap.Fix(pq, v.index)\n}", "title": "" }, { "docid": "370eebfb7306fb7d523a340b0f4ac214", "score": "0.45346764", "text": "func (db *PortsMap) Update(key string, m models.Data) error {\n\tdb.Lock.Lock()\n\tdefer db.Lock.Unlock()\n\tif _, exists := db.Ports[key]; !exists {\n\t\terMsg := fmt.Sprintf(\"Port not found with key %s\", key)\n\t\tlog.Println(erMsg)\n\t\treturn errors.New(erMsg)\n\t}\n\tdb.Ports[key] = m\n\treturn nil\n}", "title": "" }, { "docid": "b738d0dec1499829c51c000c34c7205f", "score": "0.45273146", "text": "func Update(client *golangsdk.ServiceClient, id string, opts UpdateOptsBuilder) (r UpdateResult) {\n\tb, err := opts.ToVpcPeeringUpdateMap()\n\tif err != nil {\n\t\tr.Err = err\n\t\treturn\n\t}\n\t_, r.Err = client.Put(resourceURL(client, id), b, &r.Body, &golangsdk.RequestOpts{\n\t\tOkCodes: []int{200},\n\t})\n\treturn\n}", "title": "" }, { "docid": "b95faf3bba63c27831a8f809bdef7d5c", "score": "0.45225307", "text": "func (a *avgBuffer) Update(ctx *sql.Context, row sql.Row) error {\n\tv, err := a.expr.Eval(ctx, row)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif v == nil {\n\t\treturn nil\n\t}\n\n\ta.sum.PerformSum(v)\n\ta.rows += 1\n\n\treturn nil\n}", "title": "" }, { "docid": "ebef14b77c8d6ff55bc9153c343a1eb8", "score": "0.4516578", "text": "func (o *Peer) Update(ctx context.Context, exec boil.ContextExecutor, columns boil.Columns) (int64, error) {\n\tif !boil.TimestampsAreSkipped(ctx) {\n\t\tcurrTime := time.Now().In(boil.GetLocation())\n\n\t\to.UpdatedAt = currTime\n\t}\n\n\tvar err error\n\tif err = o.doBeforeUpdateHooks(ctx, exec); err != nil {\n\t\treturn 0, err\n\t}\n\tkey := makeCacheKey(columns, nil)\n\tpeerUpdateCacheMut.RLock()\n\tcache, cached := peerUpdateCache[key]\n\tpeerUpdateCacheMut.RUnlock()\n\n\tif !cached {\n\t\twl := columns.UpdateColumnSet(\n\t\t\tpeerAllColumns,\n\t\t\tpeerPrimaryKeyColumns,\n\t\t)\n\t\twl = strmangle.SetComplement(wl, peerGeneratedColumns)\n\n\t\tif !columns.IsWhitelist() {\n\t\t\twl = strmangle.SetComplement(wl, []string{\"created_at\"})\n\t\t}\n\t\tif len(wl) == 0 {\n\t\t\treturn 0, errors.New(\"models: unable to update peers, could not build whitelist\")\n\t\t}\n\n\t\tcache.query = fmt.Sprintf(\"UPDATE \\\"peers\\\" SET %s WHERE %s\",\n\t\t\tstrmangle.SetParamNames(\"\\\"\", \"\\\"\", 1, wl),\n\t\t\tstrmangle.WhereClause(\"\\\"\", \"\\\"\", len(wl)+1, peerPrimaryKeyColumns),\n\t\t)\n\t\tcache.valueMapping, err = queries.BindMapping(peerType, peerMapping, append(wl, peerPrimaryKeyColumns...))\n\t\tif err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t}\n\n\tvalues := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), cache.valueMapping)\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, cache.query)\n\t\tfmt.Fprintln(writer, values)\n\t}\n\tvar result sql.Result\n\tresult, err = exec.ExecContext(ctx, cache.query, values...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to update peers row\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by update for peers\")\n\t}\n\n\tif !cached {\n\t\tpeerUpdateCacheMut.Lock()\n\t\tpeerUpdateCache[key] = cache\n\t\tpeerUpdateCacheMut.Unlock()\n\t}\n\n\treturn rowsAff, o.doAfterUpdateHooks(ctx, exec)\n}", "title": "" }, { "docid": "9313500f26d642e82e12062e39d3a01e", "score": "0.45154944", "text": "func (ip *ImagePath) Update() *ImagePathUpdateOne {\n\treturn (&ImagePathClient{config: ip.config}).UpdateOne(ip)\n}", "title": "" }, { "docid": "0f0b918604ce1ffff1f77cd6d45432c8", "score": "0.45136878", "text": "func (self *Miner)updateAddresses(conn net.Conn, port string){\n var ipaddress = fmt.Sprint(conn.RemoteAddr())\n ipaddress = ipaddress[:strings.Index(ipaddress,\":\")]+\":\"+port\n self.connected_lock.Lock()\n found := false\n for i:=0;i<len(self.Connected);i++{\n if self.Connected[i]==ipaddress{\n found = true\n break\n }\n }\n if !found{\n self.Connected = append(self.Connected,ipaddress)\n fmt.Println(\"Added node \",ipaddress)\n }\n self.connected_lock.Unlock()\n}", "title": "" }, { "docid": "93edec4cb6e2cbc1d33124642acead51", "score": "0.45131254", "text": "func (c *PingDetectorClient) Update() *PingDetectorUpdate {\n\tmutation := newPingDetectorMutation(c.config, OpUpdate)\n\treturn &PingDetectorUpdate{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "title": "" }, { "docid": "596e2b02e7e93d33a8dd1744ae0aed9c", "score": "0.45125586", "text": "func (c *bgpCollector) Update(ch chan<- prometheus.Metric) error {\n\treturn collectBGP(ch, c.afi, c.logger, c.descriptions)\n}", "title": "" }, { "docid": "2da249204b09bc4d9631d7a81bef38de", "score": "0.45083755", "text": "func (pm *PaymentMethod) Update(s *Stripe, params Params) error {\n\tvar err error\n\n\tpm, err = postPaymentMethod(s, pm.Endpoint(), params)\n\treturn err\n}", "title": "" }, { "docid": "4d1103182963850ec8d6bf62f565c6c7", "score": "0.44989607", "text": "func (s *TrafficStats) Update(entry LogEntry) {\n\ts.SectionHits[s.parseSection(entry.ReqPath)]++\n\ts.MethodHits[entry.ReqMethod]++\n\ts.StatusClassHits[s.parseStatusClass(entry.StatusCode)]++\n\ts.Bytes += entry.Bytes\n\ts.TotalReqs++\n}", "title": "" }, { "docid": "41aa73e13e24569cb14d0a3c41441fb6", "score": "0.4497497", "text": "func UpdateOperandBindInfo(f *framework.Framework, ns string) (*v1alpha1.OperandBindInfo, error) {\n\tfmt.Println(\"--- UPDATE: OperandBindInfo Instance\")\n\tbi := &v1alpha1.OperandBindInfo{}\n\tif err := utilwait.PollImmediate(config.WaitForRetry, config.WaitForTimeout, func() (done bool, err error) {\n\t\terr = RetrieveOperandBindInfo(f, bi, ns)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\tsecretCm := bi.Spec.Bindings[\"public\"]\n\t\tsecretCm.Configmap = \"jenkins-operator-base-configuration-example\"\n\t\tbi.Spec.Bindings[\"public\"] = secretCm\n\t\tif err := f.Client.Update(goctx.TODO(), bi); err != nil {\n\t\t\tfmt.Println(\" --- Waiting for OperandBindInfo instance stable ...\")\n\t\t\treturn false, nil\n\t\t}\n\t\treturn true, nil\n\t}); err != nil {\n\t\treturn nil, err\n\t}\n\treturn bi, nil\n}", "title": "" }, { "docid": "8dde71164e0d85a03b9acaf188fba7cf", "score": "0.44964722", "text": "func (nc *client) UpdateIPBlock(IPBlock *models.IPBlock) (*models.IPBlock, error) {\n\tparams := pm.NewUpdateIPBlockParams().WithIPBlock(IPBlock).WithBlockID(IPBlock.ID)\n\n\tres, err := nc.client.PoolManagement.UpdateIPBlock(params, nc.auth)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn res.Payload, nil\n}", "title": "" }, { "docid": "67804c3208e29b2669205f628cd4ec1b", "score": "0.44958436", "text": "func (o *Balance) UpdateGP(whitelist ...string) {\n\tif err := o.Update(boil.GetDB(), whitelist...); err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n}", "title": "" }, { "docid": "de18ba921d1a120472fd79f8cb92439f", "score": "0.4494991", "text": "func (c *Client) ModifyDBInstanceVipVport(request *ModifyDBInstanceVipVportRequest) (response *ModifyDBInstanceVipVportResponse, err error) {\n if request == nil {\n request = NewModifyDBInstanceVipVportRequest()\n }\n response = NewModifyDBInstanceVipVportResponse()\n err = c.Send(request, response)\n return\n}", "title": "" }, { "docid": "45d6cce50d80370edf34ff646c05e2be", "score": "0.44935787", "text": "func (g *xiaomiGateway) Update() (*device.LightState, error) {\n\treturn nil, nil\n}", "title": "" }, { "docid": "36ab692a2e541020b86b5f07ba1fa807", "score": "0.4488274", "text": "func (provider *DNSProvider) updateIP(domain, subDomain, currentIP string) error {\n\tvalues := url.Values{}\n\n\tif subDomain != utils.RootDomain {\n\t\tvalues.Add(\"hostname\", fmt.Sprintf(\"%s.%s\", subDomain, domain))\n\t} else {\n\t\tvalues.Add(\"hostname\", domain)\n\t}\n\tvalues.Add(\"password\", provider.configuration.Password)\n\tvalues.Add(\"myip\", currentIP)\n\n\tclient := utils.GetHTTPClient(provider.configuration)\n\n\treq, _ := http.NewRequest(\"POST\", URL, strings.NewReader(values.Encode()))\n\tresp, err := client.Do(req)\n\n\tif err != nil {\n\t\tlog.Error(\"Request error:\", err)\n\t\treturn err\n\t}\n\n\tbody, _ := io.ReadAll(resp.Body)\n\tif resp.StatusCode == http.StatusOK {\n\t\tlog.Infof(\"Update IP success: %s\", string(body))\n\t} else {\n\t\tlog.Infof(\"Update IP failed: %s\", string(body))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cafab3705c48d8a705e8f3f8e11f976b", "score": "0.44859138", "text": "func Update(v interface{}, field string, val interface{}) (err error) {\r\n\treturn update(reflect.ValueOf(v), field, val, true)\r\n}", "title": "" }, { "docid": "4799b5e76560b608f2f604cfa39285e6", "score": "0.4482554", "text": "func (u *__Blocked_Updater) Update(db XODB) (int, error) {\n\tvar err error\n\n\tvar updateArgs []interface{}\n\tvar sqlUpdateArr []string\n\t/*for up, newVal := range u.updates {\n\t sqlUpdateArr = append(sqlUpdateArr, up)\n\t updateArgs = append(updateArgs, newVal)\n\t}*/\n\tfor _, up := range u.updates {\n\t\tsqlUpdateArr = append(sqlUpdateArr, up.col)\n\t\tupdateArgs = append(updateArgs, up.val)\n\t}\n\tsqlUpdate := strings.Join(sqlUpdateArr, \",\")\n\n\tsqlWherrs, whereArgs := whereClusesToSql(u.wheres, u.whereSep)\n\n\tvar allArgs []interface{}\n\tallArgs = append(allArgs, updateArgs...)\n\tallArgs = append(allArgs, whereArgs...)\n\n\tsqlstr := `UPDATE sun.blocked SET ` + sqlUpdate\n\n\tif len(strings.Trim(sqlWherrs, \" \")) > 0 { //2 for safty\n\t\tsqlstr += \" WHERE \" + sqlWherrs\n\t}\n\n\tif LogTableSqlReq.Blocked {\n\t\tXOLog(sqlstr, allArgs)\n\t}\n\tres, err := db.Exec(sqlstr, allArgs...)\n\tif err != nil {\n\t\tif LogTableSqlReq.Blocked {\n\t\t\tXOLogErr(err)\n\t\t}\n\t\treturn 0, err\n\t}\n\n\tnum, err := res.RowsAffected()\n\tif err != nil {\n\t\tif LogTableSqlReq.Blocked {\n\t\t\tXOLogErr(err)\n\t\t}\n\t\treturn 0, err\n\t}\n\n\treturn int(num), nil\n}", "title": "" }, { "docid": "0045990685560e98ef95269182ac3ff2", "score": "0.44778022", "text": "func (o *Link) UpdateP(exec boil.Executor, whitelist ...string) {\n\terr := o.Update(exec, whitelist...)\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n}", "title": "" }, { "docid": "ed49eec3ef73e7a877e97a78b7563fcd", "score": "0.44763333", "text": "func (v *Vlan) Update() *VlanUpdateOne {\n\treturn (&VlanClient{config: v.config}).UpdateOne(v)\n}", "title": "" }, { "docid": "070c42c60484d26c3e46da237ca17486", "score": "0.44718412", "text": "func (q *BirdRoutePublisher) Update(networks []net.IPNet, args map[string]interface{}) error {\n\tq.Lock()\n\tdefer q.Unlock()\n\tlog.Printf(\"Starting bgp update at %s -> %s:%s with %d networks\", q.LocalAS, q.NeighborIP, q.NeighborAS, len(networks))\n\n\tq.Args = args\n\tq.Networks = networks\n\ttemplate, err := template.ParseFiles(q.templateFileName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// open file\n\tfile, err := os.OpenFile(q.birdConfigName, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0644)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer file.Close()\n\n\t// execute into file\n\terr = template.Execute(file, q)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// process sighup\n\tif q.pidFile != \"\" {\n\t\tpid, err := q.pidFromFile()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed to read pid file %s, err=(%s)\", q.pidFile, err)\n\t\t}\n\n\t\tprocess, err := os.FindProcess(pid)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed to find process with pid %d, err=(%s)\", pid, err)\n\t\t}\n\n\t\terr = process.Signal(unix.SIGHUP)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed to send SIGHUP to %d, err=(%s)\", pid, err)\n\t\t}\n\t}\n\n\tlog.Printf(\"Finished bgp update\")\n\treturn nil\n}", "title": "" }, { "docid": "7e7680bafb3f5eec9a77205dfaf59b02", "score": "0.4468104", "text": "func (o *Race) UpdateP(exec boil.Executor, whitelist ...string) {\n\terr := o.Update(exec, whitelist...)\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n}", "title": "" }, { "docid": "de3f65bcf9f46f6e6ee1e7eca60374b3", "score": "0.44657043", "text": "func (c *RoutingNumberClient) Update() *RoutingNumberUpdate {\n\tmutation := newRoutingNumberMutation(c.config, OpUpdate)\n\treturn &RoutingNumberUpdate{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "title": "" }, { "docid": "c56eac8fe12dd379e504953af7bae2d7", "score": "0.4463873", "text": "func NewUpdate(edgeID string, index int, edge EdgeInterface) *UpdateEdgeInterfaceAPI {\n\tthis := new(UpdateEdgeInterfaceAPI)\n\tthis.BaseAPI = api.NewBaseAPI(http.MethodPut, \"/api/4.0/edges/\"+edgeID+\"/interfaces/\"+strconv.Itoa(index), edge, nil)\n\treturn this\n}", "title": "" }, { "docid": "3708b37fbc5a4e0fe42e2f4fd795a504", "score": "0.446189", "text": "func (*nopSchemator) UpdateField(ctx context.Context, index, field string, fieldVal []byte) error {\n\treturn nil\n}", "title": "" }, { "docid": "483e183b28bce90a12d66458343b7aea", "score": "0.44534403", "text": "func (n *NotenSatzController) Update(w http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\n}", "title": "" }, { "docid": "3b94614dd38c0e5a08bcd8c159655e9d", "score": "0.44529575", "text": "func (c *FakeStaticIPs) Update(staticIP *ipkeeperv1.StaticIP) (result *ipkeeperv1.StaticIP, err error) {\n\tobj, err := c.Fake.\n\t\tInvokes(testing.NewUpdateAction(staticipsResource, c.ns, staticIP), &ipkeeperv1.StaticIP{})\n\n\tif obj == nil {\n\t\treturn nil, err\n\t}\n\treturn obj.(*ipkeeperv1.StaticIP), err\n}", "title": "" }, { "docid": "273123a0e06cef37d85b2ba3518d194a", "score": "0.4452956", "text": "func (c *cache) Update(pokemon pokemon.Pokemon) {\n\tc.mutex.Lock()\n\tc.pokeCache[pokemon.Name] = pokemon\n\tc.mutex.Unlock()\n}", "title": "" }, { "docid": "64126522cb2bb53359b63884b22ca2c9", "score": "0.44512913", "text": "func (g *Graph) UpdateWeight(source Node, destination Node, weight int) *Graph {\n\tneighbourlistsource := g.GetNeighbours(source)\n\tfor i := 0; i < len(neighbourlistsource); i++ {\n\t\t//Iterate until we find the destination...\n\t\tif neighbourlistsource[i].Neighbour_Node == destination {\n\t\t\t//Check to make sure the weight is not greater than\n\t\t\t//the capacity.\n\t\t\tif Abs(weight) <= Abs(neighbourlistsource[i].Capacity) {\n\t\t\t\t//Update the connection with the new weight.\n\t\t\t\tupdatedconnect := Neighbour{destination, weight, neighbourlistsource[i].Capacity}\n\t\t\t\tg.Nodemap[source][i] = updatedconnect\n\t\t\t}\n\t\t}\n\t}\n\t//Repeat the same process for the destination, but take the residual.\n\tneighbourlistdest := g.GetNeighbours(destination)\n\tfor i := 0; i < len(neighbourlistdest); i++ {\n\t\tif neighbourlistdest[i].Neighbour_Node == source {\n\t\t\tif Abs(weight) <= Abs(neighbourlistdest[i].Capacity) {\n\t\t\t\tupdatedconnect := Neighbour{source, -weight, neighbourlistdest[i].Capacity}\n\t\t\t\tg.Nodemap[destination][i] = updatedconnect\n\t\t\t}\n\t\t}\n\t}\n\t// Both connections have been updated, and we return.\n\treturn g\n}", "title": "" } ]
d5ab08b95f72d9312648860d53e2501a
TransferRubberCertAndShippingBill updates the holder of the rubber certificate and shipping bill
[ { "docid": "6c46781387a0e429a100214b178f132d", "score": "0.79179585", "text": "func (s *SmartContract) TransferRubberCertAndShippingBill(ctx contractapi.TransactionContextInterface, rubberBatchNumber string, billNumber string, newBillHolder string) (error, error) {\n\trubberCert, err := s.QueryGeneratedRubberCert(ctx, rubberBatchNumber)\n\t\n\tif err != nil {\n\t\treturn err, nil\n\t}\n\n\tbill, err2 := s.QueryGeneratedShippingBill(ctx, rubberBatchNumber, billNumber)\n\n\tif err2!= nil {\n\t\treturn nil, err2\n\t}\n\n\tif rubberCert.RubberCertHolder != bill.BillHolder {\n\t\treturn nil, fmt.Errorf(\"Invalid certificate holder of %s\", rubberBatchNumber)\n\t}\n\n\trubberCert.RubberCertHolder = newBillHolder\n\tbill.BillHolder = newBillHolder\n\n\trubberCertAsBytes, _ := json.Marshal(rubberCert)\n\tbillAsBytes, _ := json.Marshal(bill)\n\n\treturn ctx.GetStub().PutState(rubberBatchNumber, rubberCertAsBytes), ctx.GetStub().PutState(billNumber, billAsBytes)\n}", "title": "" } ]
[ { "docid": "27ce3dbeaa23d569e53a98ebe72d8cd1", "score": "0.75855243", "text": "func (s *SmartContract) TransferRubberCertAndShippingBillAndApprovalCert(ctx contractapi.TransactionContextInterface, rubberBatchNumber string, billNumber string, approvalCertNumber string, newApprovalHolder string) error {\n\trubberCert, err := s.QueryGeneratedRubberCert(ctx, rubberBatchNumber)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbill, err2 := s.QueryGeneratedShippingBill(ctx, rubberBatchNumber, billNumber)\n\n\tif err2 != nil {\n\t\treturn err2\n\t}\n\n\tapprovalCert, err3:= s.QueryGeneratedApprovalCert(ctx, rubberBatchNumber, billNumber, approvalCertNumber)\n\n\tif err3 != nil {\n\t\treturn err3\n\t}\n\n\trubberCert.RubberCertHolder = newApprovalHolder\n\tbill.BillHolder = newApprovalHolder\n\tapprovalCert.ApprovalCertHolder = newApprovalHolder\n\n\trubberCertAsBytes, _ := json.Marshal(rubberCert)\n\tbillAsBytesNew, _ := json.Marshal(bill)\n\tapprovalCertAsBytes, _ := json.Marshal(approvalCert)\n\n\n\terr4 := ctx.GetStub().PutState(rubberBatchNumber ,rubberCertAsBytes)\n\n\treturnErr := new(error)\n\tif err4 != nil {\n\t\treturnErr = &err4\n\t}\n\n\terr5 := ctx.GetStub().PutState(billNumber ,billAsBytesNew)\n\n\tif err5 != nil && err4 != nil{\n\t\treturnErr = &err5\n\t}\n\n\terr6 := ctx.GetStub().PutState(approvalCertNumber ,approvalCertAsBytes)\n\n\tif err6 != nil && err5 != nil && err4 != nil {\n\t\treturnErr = &err6\n\t}\n\n\treturn *returnErr\n}", "title": "" }, { "docid": "95720c46ba5594b9c407712f90100405", "score": "0.66611975", "text": "func (s *SmartContract) TransferRubberCert(ctx contractapi.TransactionContextInterface, rubberBatchNumber string, newRubberCertHolder string) error {\n\trubberCert, err := s.QueryGeneratedRubberCert(ctx, rubberBatchNumber)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif rubberCert.RubberCertHolder != \"indonesian farm\" {\n\t\treturn fmt.Errorf(\"Invalid certificate holder of %s\", rubberBatchNumber)\n\t}\n\n\trubberCert.RubberCertHolder = newRubberCertHolder\n\n\trubberCertAsBytes, _ := json.Marshal(rubberCert)\n\n\treturn ctx.GetStub().PutState(rubberBatchNumber, rubberCertAsBytes)\n}", "title": "" }, { "docid": "c8b5087358607e508090c5ae7de3c08a", "score": "0.59083974", "text": "func (k Keeper) transferToBasket(ctx context.Context, sender sdk.AccAddress, amt regenmath.Dec, basketID uint64, batch *baseapi.Batch, exponent uint32) error {\n\t// update user balance, subtracting from their tradable balance\n\tuserBal, err := k.baseStore.BatchBalanceTable().Get(ctx, sender, batch.Key)\n\tif err != nil {\n\t\treturn ecocredit.ErrInsufficientCredits.Wrapf(\"could not get batch %s balance for %s\", batch.Denom, sender.String())\n\t}\n\ttradable, err := regenmath.NewPositiveDecFromString(userBal.TradableAmount)\n\tif err != nil {\n\t\treturn err\n\t}\n\tnewTradable, err := regenmath.SafeSubBalance(tradable, amt)\n\tif err != nil {\n\t\treturn ecocredit.ErrInsufficientCredits.Wrapf(\"cannot put %v credits into the basket with a balance of %v: %s\", amt, tradable, err.Error())\n\t}\n\tuserBal.TradableAmount = newTradable.String()\n\tif err = k.baseStore.BatchBalanceTable().Update(ctx, userBal); err != nil {\n\t\treturn err\n\t}\n\n\t// update basket balance with amount sent, adding to the basket's balance.\n\tvar bal *api.BasketBalance\n\tbal, err = k.stateStore.BasketBalanceTable().Get(ctx, basketID, batch.Denom)\n\tif err != nil {\n\t\tif ormerrors.IsNotFound(err) {\n\t\t\tbal = &api.BasketBalance{\n\t\t\t\tBasketId: basketID,\n\t\t\t\tBatchDenom: batch.Denom,\n\t\t\t\tBalance: amt.String(),\n\t\t\t\tBatchStartDate: batch.StartDate,\n\t\t\t}\n\t\t} else {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tnewBalance, err := regenmath.NewPositiveFixedDecFromString(bal.Balance, exponent)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tnewBalance, err = newBalance.Add(amt)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tbal.Balance = newBalance.String()\n\t}\n\n\treturn k.stateStore.BasketBalanceTable().Save(ctx, bal)\n}", "title": "" }, { "docid": "cec0688996baa316b794c0bc9ba5e80e", "score": "0.57371145", "text": "func (t *SupplyChainChaincode) transferShipment(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\n\tif len(args) < 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 2\")\n\t}\n\t//var shipmentStatus string\n\tshipmentID := args[0]\n\tpayload := args[1]\n\tfmt.Println(\"- start updation \", shipmentID, payload)\n\n\tshipmentAsBytes, err := stub.GetState(shipmentID)\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to get shipmentID:\" + err.Error())\n\t} else if shipmentAsBytes == nil {\n\t\treturn shim.Error(\"shipmentID does not exist\")\n\t}\n\n\tvar _tempShipment Shipment\n\t//surgicalkitToTransfer := surgicalkit{}\n\terr1 := json.Unmarshal(shipmentAsBytes, &_tempShipment) //unmarshal it aka JSON.parse()\n\tif err1 != nil {\n\t\treturn shim.Error(err1.Error())\n\t}\n\t//_tempShipment.shipmentID = shipmentID //change the owner\n\t//_tempShipment.Payload \t = Payload\n\t//var j = []byte(_tempShipment)\n\t// a map shipment to decode the JSON structure into\n\t//c := make(map[string]interface{})\n\n\t// unmarschal JSON\n\t// json.Unmarshal(j, &c)\n\t// for s, v := range c {\n\t// \tswitch vv :=v.(type) {\n\t// \t\tcase string :\n\t// \t\t\t\t\tif(s==\"st\"){\n\t// \t\t\t\t\t\tfmt.Println(\"status field found in payload--\"+vv)\n\t// \t\t\t\t\t\tshipmentStatus = vv\n\t// \t\t\t\t\t}\n\t// \t}\n\t// }\n\t//fmt.Println(\"shipmentStatus------\"+shipmentStatus)\n\n\t// if shipmentStatus == \"tampered\" {\n\t// \tsurgicalkitToTransfer.Compliant = false\n\t// }else{\n\t// \tsurgicalkitToTransfer.Compliant = true\n\t// }\n\tpurchaseOrderID := _tempShipment.PurchaseOrder.PurchaseOrderID\n\t_tempPurchase := &PurchaseOrder{PurchaseOrderID: _tempShipment.PurchaseOrder.PurchaseOrderID, State: _tempShipment.PurchaseOrder.State}\n\t_tempPurchaseJsonAsBytes, err2 := json.Marshal(_tempPurchase)\n\tif err2 != nil {\n\t\treturn shim.Error(err2.Error())\n\t}\n\tfmt.Println(\"transfer ower-purchaseOrder-%v+\", string(_tempPurchaseJsonAsBytes))\n\t// === Save shipment to state ===\n\terr3 := stub.PutState(purchaseOrderID, []byte(_tempPurchaseJsonAsBytes))\n\tif err3 != nil {\n\t\treturn shim.Error(err3.Error())\n\t}\n\t_tempShipmentJSONasBytes, _ := json.Marshal(_tempShipment)\n\terr4 := stub.PutState(shipmentID, _tempShipmentJSONasBytes) //rewrite the shipment\n\tif err4 != nil {\n\t\treturn shim.Error(err4.Error())\n\t}\n\tfmt.Println(\"transfer ower-shipement-%v+\", string(_tempShipmentJSONasBytes))\n\tfmt.Println(\"- end shipement transfer(success)\")\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "815fcd104650dad044cef9654c99e913", "score": "0.5551153", "text": "func (t *Tiger) transferToRecFeeAddr(tokenName string,fee bn.Number) {\n\n\taccount := t.sdk.Helper().AccountHelper().AccountOf(t.sdk.Message().Contract().Account())\n\n\tinfos := t._recFeeInfo()\n\tfor _, info := range infos {\n\t\taccount.TransferByName(tokenName, info.RecFeeAddr, fee.MulI(info.RecFeeRatio).DivI(PERMILLE))\n\t}\n}", "title": "" }, { "docid": "9bebbde6c93b43b3b63d922a9ac43b5d", "score": "0.5443223", "text": "func (s *SmartContract) refuelFee(APIstub shim.ChaincodeStubInterface, args []string) sc.Response {\n\n\tif len(args) != 2 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 2\")\n\t}\n\n Bnum := args[0]\n Btype := args[1]\n \tqueryString_b := fmt.Sprintf(\"{\\\"selector\\\":{\\\"BOwner\\\":\\\"Operator\\\",\\\"Type\\\":\\\"%s\\\"}}\", Btype)\n \tqueryString_c := fmt.Sprintf(\"{\\\"selector\\\":{\\\"COwner\\\":\\\"Supplier\\\"}}\")\n \t\n \tresultsIterator_b, err_b := APIstub.GetQueryResult(queryString_b)\n \tresultsIterator_c, err := APIstub.GetQueryResult(queryString_c)\n if err_b != nil {\n\t\treturn shim.Error(err_b.Error())\n\t}\n\n \tif err_c != nil {\n\t\treturn shim.Error(err_c.Error())\n\t}\n\n\tboxes := list.New()\n\tcoins := list.New()\n i := 0\n t := time.Now()\n\tfor i < Bnum {\n \n if(!resultsIterator_b.HasNext()){\n \treturn shim.Error(\"Insufficient Box, only %d boxe(s) has been pledged\",i)\n }\n\n if(!resultsIterator_c.HasNext()){\n \treturn shim.Error(\"Insufficient Money, only %d boxe(s) has been pledged\",i)\n }\n\t queryResponse_b, err_b := resultsIterator_b.Next()\n\t\tqueryResponse_c, err_c := resultsIterator_c.Next()\n\t\t\n\t\tif err_b != nil {\n\t\t\treturn nil, err_b\n\t\t}\n\t\tif err_c != nil {\n\t\t\treturn nil, err_c\n\t\t}\n // change the owner of box\n key_b = queryResponse_b.Key\n value_b = queryResponse_b.Value\n\n\t\tvalue_b.Start = t.String()\n\t\tvalue_b.End = t.AddDate(0,1,0)\n\t\tvalue_b.Owner = \"Supplier\"\n \tboxAsBytes, _ = json.Marshal(value_b)\n\n PutState(key_b, boxAsBytes)\n //change the owner of coins\n key_c = queryResponse_c.Key\n value_c = queryResponse_c.Value\n\t\tvalue_c.Owner = \"Operator\"\n \tcoinAsBytes, _ = json.Marshal(value_c)\n\n PutState(key_b, coinAsBytes) \n\t\ti ++\n\t}\n\t\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "6530c3d9f3641926cc61230299dfa03f", "score": "0.5259699", "text": "func (t *ManagePayment) updateBalance(stub shim.ChaincodeStubInterface, transferAmt string) ([]byte, error) {\r\n\t\r\n\tvar accountIndex AccountInfo\r\n\tvar err error\r\n\tfmt.Println(\"start updateBalance\")\r\n\t\r\n\ttransferAmount, _ := strconv.ParseFloat(transferAmt, 64)\r\n\tfmt.Println(\"In updateBalance with transferAmount::\")\r\n\tfmt.Println(transferAmount)\r\n\r\n\t//Get State\r\n\taccountAsBytes, err := stub.GetState(AccountIndexStr)\t\t\t//get the var from chaincode state\r\n\tif err != nil {\r\n\t\terrMsg := \"{ \\\"message\\\" : \\\"Error while fetching Accounts.\\\", \\\"code\\\" : \\\"503\\\"}\"\r\n\t\terr = stub.SetEvent(\"errEvent\", []byte(errMsg))\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t} \r\n\t\treturn nil, nil\r\n\t}\r\n\tjson.Unmarshal(accountAsBytes, &accountIndex)\r\n\taccountBuyerBal, _ := strconv.ParseFloat(accountIndex.BuyerAccountBalance, 64)\r\n\taccountSellerBal, _ := strconv.ParseFloat(accountIndex.SellerAccountBalance, 64)\r\n\tbuyerAccountBalance\t:= accountBuyerBal - transferAmount\r\n\tsellerAccountBalance := accountSellerBal + transferAmount\r\n\tfmt.Println(\"In updateBalance after balance calculation::\")\r\n\tfmt.Println(buyerAccountBalance)\r\n\tfmt.Println(sellerAccountBalance)\r\n\t\r\n\t//build the Account json string manually\r\n\taccount := `{`+\r\n\t\t`\"buyerAccountNumber\" : \"` + BuyerAccountNumber + `\", `+\r\n\t\t`\"buyerAccountBalance\" : \"` + strconv.FormatFloat(buyerAccountBalance, 'f', 2, 64) + `\", `+\r\n\t\t`\"sellerAccountNumber\" : \"` + SellerAccountNumber + `\", `+\r\n\t\t`\"sellerAccountBalance\" : \"` + strconv.FormatFloat(sellerAccountBalance, 'f', 2, 64) + `\" `+\r\n\t\t`}`\r\n\tfmt.Println(\"In updateBalance account to commit::\" + account)\r\n\r\n\terr = stub.PutState(AccountIndexStr, []byte(account))\t\t\t//store Account with id as key\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\t\r\n\tfmt.Println(\"end updateBalance\")\r\n\treturn nil, nil\t\t\t\t\t\t\t\t\t\t\t\t\t//send it onward\r\n}", "title": "" }, { "docid": "29674c63c74c2e92972a74409225ba16", "score": "0.52110904", "text": "func (db *paymentDatastore) SendReceiptToBusiness(r ReceiptRequest, viewLink string) error {\n\tamount := shared.FormatFloatAmount(r.Amount)\n\n\tvar customerName string\n\tif r.ContactBusinessName != nil && len(*r.ContactBusinessName) > 0 {\n\t\tcustomerName = *r.ContactBusinessName\n\t} else if r.ContactFirstName != nil && r.ContactLastName != nil {\n\t\tcustomerName = (*r.ContactFirstName + \" \" + *r.ContactLastName)\n\t}\n\n\tnotes := strings.Replace(*r.Notes, \"\\n\", \"<br>\", -1)\n\tr.Notes = &notes\n\n\tsubject := fmt.Sprintf(services.BusinessReceiptSubject, amount, customerName)\n\tif viewLink != \"\" {\n\t\tbody := fmt.Sprintf(services.BusinessReceiptEmailWithInvoiceViewLink, r.BusinessName, amount, customerName, r.PaymentDate, *r.Notes, amount, viewLink, amount, r.BusinessName)\n\n\t\temail := sendgrid.EmailRequest{\n\t\t\tSenderEmail: os.Getenv(\"WISE_INVOICE_EMAIL\"),\n\t\t\tSenderName: os.Getenv(\"WISE_SUPPORT_NAME\"),\n\t\t\tReceiverEmail: r.BusinessEmail,\n\t\t\tReceiverName: r.BusinessName,\n\t\t\tSubject: subject,\n\t\t\tBody: body,\n\t\t}\n\n\t\t_, err := sendgrid.NewSendGridServiceWithout().SendEmail(email)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t}\n\tbody := fmt.Sprintf(services.BusinessReceiptEmail, r.BusinessName, amount, customerName, r.PaymentDate, *r.Notes, amount, amount, r.BusinessName)\n\n\ta := sendgrid.EmailAttachment{\n\t\tAttachment: *r.Content,\n\t\tContentType: \"application/pdf\",\n\t\tFileName: \"Receipt - \" + r.ReceiptNumber + \".pdf\",\n\t\tContentID: \"Receipt\",\n\t}\n\n\temail := sendgrid.EmailAttachmentRequest{\n\t\tSenderEmail: os.Getenv(\"WISE_INVOICE_EMAIL\"),\n\t\tSenderName: os.Getenv(\"WISE_SUPPORT_NAME\"),\n\t\tReceiverEmail: r.BusinessEmail,\n\t\tReceiverName: r.BusinessName,\n\t\tSubject: subject,\n\t\tBody: body,\n\t\tAttachment: []sendgrid.EmailAttachment{a},\n\t}\n\n\t_, err := sendgrid.NewSendGridServiceWithout().SendAttachmentEmail(email)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "349450da11a4260efa0d4d670542e562", "score": "0.5190618", "text": "func (t *CardTransactionChaincode) transfer_template_to_shop(stub shim.ChaincodeStubInterface, v Card, caller string, caller_affiliation int, recipient_name string, recipient_affiliation int) ([]byte, error) {\r\n\r\n\r\n\tif v.Kakaid\t== \"\" {\t\t\t\t\t//If key part of the card is empty it has not been fully manufacturered so cannot be sent\r\n\t\t\t\t\tfmt.Printf(\"SHOP_TO_CONSUMER: Car not fully defined\")\r\n\t\t\t\t\treturn nil, errors.New(\"Car not fully defined\")\r\n\t}\r\n\t\r\n\tif \t\tv.Status\t\t\t\t== STATE_TEMPLATE\t&& \r\n\t\t\tv.Owner\t\t\t\t\t== caller\t\t&& \r\n\t\t\tcaller_affiliation\t\t== KAKACENTER\t&&\r\n\t\t\trecipient_affiliation\t== SHOP\t\t\t&& \r\n\t\t\tv.Scrapped == false\t\t\t\t\t\t\t{\r\n\t\t\t\r\n\t\t\t\t\tv.Owner = recipient_name\r\n\t\t\t\t\tv.Status = STATE_SHOP\r\n\r\n\t\t\t\t\ttimestamp := time.Now().Unix()\r\n\t\t\t\t\ttm := time.Unix(timestamp, 0)\r\n\t\t\t\t\tv.Releasedate = tm.Format(\"2006-01-02 03:04:05 PM\") // str to timestmap: tm2, _ := time.Parse(\"01/02/2006\", releasedate)\r\n\t\t\t\t\tv.Getdate = v.Releasedate\r\n\t} else {\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\treturn nil, errors.New(\"Permission denied\")\r\n\t}\r\n\t\r\n\t_, err := t.save_template(stub, v, v.Kakaid)\r\n\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tif err != nil { fmt.Printf(\"SHOP_TO_CONSUMER: Error saving changes: %s\", err); return nil, errors.New(\"Error saving changes\") }\r\n\t\r\n\treturn nil, nil\r\n\t\r\n}", "title": "" }, { "docid": "735e98e8db1e16c8e95ccffff2f97ff9", "score": "0.5115191", "text": "func (t *CardTransactionChaincode) transfer_mp_consumer_to_consumer(stub shim.ChaincodeStubInterface, money int, point int, caller string, sc Card, receiver string, tc Card) ([]byte, error) {\r\nfmt.Printf(\"start transfer_mp_consumer_to_consumer\")\r\n\tif sc.Money < money || sc.Point < point{\r\n\t\tfmt.Printf(\"money or point is not enough\")\r\n\t\treturn nil, errors.New(\"card asset is not enough\")\r\n\t}\r\nfmt.Printf(\"test 1\")\r\n\tcaller_affiliation , _ := t.check_affiliation(stub, caller)\r\n\tfmt.Printf(\"test 2\")\r\n\treceiver_affiliation , _ := t.check_affiliation(stub, receiver)\r\n\tfmt.Printf(\"test 3\")\r\n\r\n\tif\t\tsc.Status\t\t\t\t== STATE_CONSUMER_OWNERSHIP\t&&\r\n\t\t\tsc.Owner \t\t\t\t== caller\t\t\t\t\t&& \r\n\t\t\tsc.Scrapped \t\t\t== false\t\t\t\t\t&& \r\n\t\t\tsc.Expired \t\t\t== false\t\t\t\t\t&& \r\n\r\n\t\t\ttc.Status\t\t\t\t== STATE_CONSUMER_OWNERSHIP\t&&\r\n\t\t\ttc.Owner \t\t\t\t== receiver\t\t\t\t\t&& \r\n\t\t\tsc.Scrapped \t\t\t== false\t\t\t\t\t&& \r\n\t\t\tsc.Expired \t\t\t== false\t\t\t\t\t&&\r\n\r\n\t\t\tsc.Shopid \t\t\t\t== tc.Shopid \t\t\t\t\t&&\r\n\r\n\t\t\tcaller_affiliation\t\t== CONSUMER\t\t\t&& \r\n\t\t\treceiver_affiliation\t== CONSUMER\t\t\t{\r\n\t\t\r\n\t\t\t\tfmt.Printf(\"add and substract\")\r\n\t\t\t\ttc.Money = tc.Money + money\r\n\t\t\t\tsc.Money = sc.Money - money\r\n\t\t\t\ttc.Point = tc.Point + point\r\n\t\t\t\tsc.Point = sc.Point - point\r\n\t\t\t\t//add event to triger the shop db update\r\n\t\r\n\t} else {\r\n\t\t\tfmt.Printf(\"Permission denied----------------------------\")\r\n\t\t\treturn nil, errors.New(\"Permission denied\")\r\n\t}\r\n\t\r\n\tfmt.Printf(\"---------------save_card sc---------------------------\")\r\n _, err1 := t.save_card(stub, sc)\r\n fmt.Printf(\"---------------save_card tc---------------------------\")\r\n _, err2 := t.save_card(stub, tc)\r\n\t\tfmt.Printf(\"---------------save_card ok---------------------------\")\t\t\r\n\t\tif err1 != nil || err2 != nil { fmt.Printf(\"transactionCard_consumer_to_consumer: Error saving changes: %s\", err1); return nil, errors.New(\"Error saving changes\") }\r\n\t\r\n\treturn nil, nil\r\n\t\r\n}", "title": "" }, { "docid": "bcc31dfa3a125d8d67b91d87a40db603", "score": "0.5114851", "text": "func (t *SimpleChaincode) transferPaper(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\t/*\t\t0\n\t\tjson\n\t \t{\n\t\t\t \"CUSIP\": \"\",\n\t\t\t \"fromCompany\":\"\",\n\t\t\t \"toCompany\":\"\",\n\t\t\t \"quantity\": 1\n\t\t}\n\t*/\n\t//need one arg\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting commercial paper record\")\n\t}\n\n\tvar tr Transaction\n\n\tfmt.Println(\"Unmarshalling Transaction\")\n\terr := json.Unmarshal([]byte(args[0]), &tr)\n\tif err != nil {\n\t\tfmt.Println(\"Error Unmarshalling Transaction\")\n\t\treturn nil, errors.New(\"Invalid commercial paper issue\")\n\t}\n\n\tfmt.Println(\"Getting State on CP \" + tr.CUSIP)\n\tcpBytes, err := stub.GetState(cpPrefix + tr.CUSIP)\n\tif err != nil {\n\t\tfmt.Println(\"CUSIP not found\")\n\t\treturn nil, errors.New(\"CUSIP not found \" + tr.CUSIP)\n\t}\n\n\tvar cp CP\n\tfmt.Println(\"Unmarshalling CP \" + tr.CUSIP)\n\terr = json.Unmarshal(cpBytes, &cp)\n\tif err != nil {\n\t\tfmt.Println(\"Error unmarshalling cp \" + tr.CUSIP)\n\t\treturn nil, errors.New(\"Error unmarshalling cp \" + tr.CUSIP)\n\t}\n\n\tvar fromCompany Account\n\tfmt.Println(\"Getting State on fromCompany \" + tr.FromCompany)\n\tfromCompanyBytes, err := stub.GetState(accountPrefix + tr.FromCompany)\n\tif err != nil {\n\t\tfmt.Println(\"Account not found \" + tr.FromCompany)\n\t\treturn nil, errors.New(\"Account not found \" + tr.FromCompany)\n\t}\n\n\tfmt.Println(\"Unmarshalling FromCompany \")\n\terr = json.Unmarshal(fromCompanyBytes, &fromCompany)\n\tif err != nil {\n\t\tfmt.Println(\"Error unmarshalling account \" + tr.FromCompany)\n\t\treturn nil, errors.New(\"Error unmarshalling account \" + tr.FromCompany)\n\t}\n\n\tvar toCompany Account\n\tfmt.Println(\"Getting State on ToCompany \" + tr.ToCompany)\n\ttoCompanyBytes, err := stub.GetState(accountPrefix + tr.ToCompany)\n\tif err != nil {\n\t\tfmt.Println(\"Account not found \" + tr.ToCompany)\n\t\treturn nil, errors.New(\"Account not found \" + tr.ToCompany)\n\t}\n\n\tfmt.Println(\"Unmarshalling tocompany\")\n\terr = json.Unmarshal(toCompanyBytes, &toCompany)\n\tif err != nil {\n\t\tfmt.Println(\"Error unmarshalling account \" + tr.ToCompany)\n\t\treturn nil, errors.New(\"Error unmarshalling account \" + tr.ToCompany)\n\t}\n\n\t// Check for all the possible errors\n\townerFound := false\n\tquantity := 0\n\tfor _, owner := range cp.Owners {\n\t\tif owner.Company == tr.FromCompany {\n\t\t\townerFound = true\n\t\t\tquantity = owner.Quantity\n\t\t}\n\t}\n\n\t// If fromCompany doesn't own this paper\n\tif ownerFound == false {\n\t\tfmt.Println(\"The company \" + tr.FromCompany + \"doesn't own any of this paper\")\n\t\treturn nil, errors.New(\"The company \" + tr.FromCompany + \"doesn't own any of this paper\")\n\t} else {\n\t\tfmt.Println(\"The FromCompany does own this paper\")\n\t}\n\n\t// If fromCompany doesn't own enough quantity of this paper\n\tif quantity < tr.Quantity {\n\t\tfmt.Println(\"The company \" + tr.FromCompany + \"doesn't own enough of this paper\")\n\t\treturn nil, errors.New(\"The company \" + tr.FromCompany + \"doesn't own enough of this paper\")\n\t} else {\n\t\tfmt.Println(\"The FromCompany owns enough of this paper\")\n\t}\n\n\tamountToBeTransferred := float64(tr.Quantity) * cp.Par\n\tamountToBeTransferred -= (amountToBeTransferred) * (cp.Discount / 100.0) * (float64(cp.Maturity) / 360.0)\n\n\t// If toCompany doesn't have enough cash to buy the papers\n\tif toCompany.CashBalance < amountToBeTransferred {\n\t\tfmt.Println(\"The company \" + tr.ToCompany + \"doesn't have enough cash to purchase the papers\")\n\t\treturn nil, errors.New(\"The company \" + tr.ToCompany + \"doesn't have enough cash to purchase the papers\")\n\t} else {\n\t\tfmt.Println(\"The ToCompany has enough money to be transferred for this paper\")\n\t}\n\n\ttoCompany.CashBalance -= amountToBeTransferred\n\tfromCompany.CashBalance += amountToBeTransferred\n\n\ttoOwnerFound := false\n\tfor key, owner := range cp.Owners {\n\t\tif owner.Company == tr.FromCompany {\n\t\t\tfmt.Println(\"Reducing Quantity from the FromCompany\")\n\t\t\tcp.Owners[key].Quantity -= tr.Quantity\n\t\t\t//\t\t\towner.Quantity -= tr.Quantity\n\t\t}\n\t\tif owner.Company == tr.ToCompany {\n\t\t\tfmt.Println(\"Increasing Quantity from the ToCompany\")\n\t\t\ttoOwnerFound = true\n\t\t\tcp.Owners[key].Quantity += tr.Quantity\n\t\t\t//\t\t\towner.Quantity += tr.Quantity\n\t\t}\n\t}\n\n\tif toOwnerFound == false {\n\t\tvar newOwner Owner\n\t\tfmt.Println(\"As ToOwner was not found, appending the owner to the CP\")\n\t\tnewOwner.Quantity = tr.Quantity\n\t\tnewOwner.Company = tr.ToCompany\n\t\tcp.Owners = append(cp.Owners, newOwner)\n\t}\n\n\tfromCompany.AssetsIds = append(fromCompany.AssetsIds, tr.CUSIP)\n\n\t// Write everything back\n\t// To Company\n\ttoCompanyBytesToWrite, err := json.Marshal(&toCompany)\n\tif err != nil {\n\t\tfmt.Println(\"Error marshalling the toCompany\")\n\t\treturn nil, errors.New(\"Error marshalling the toCompany\")\n\t}\n\tfmt.Println(\"Put state on toCompany\")\n\terr = stub.PutState(accountPrefix+tr.ToCompany, toCompanyBytesToWrite)\n\tif err != nil {\n\t\tfmt.Println(\"Error writing the toCompany back\")\n\t\treturn nil, errors.New(\"Error writing the toCompany back\")\n\t}\n\n\t// From company\n\tfromCompanyBytesToWrite, err := json.Marshal(&fromCompany)\n\tif err != nil {\n\t\tfmt.Println(\"Error marshalling the fromCompany\")\n\t\treturn nil, errors.New(\"Error marshalling the fromCompany\")\n\t}\n\tfmt.Println(\"Put state on fromCompany\")\n\terr = stub.PutState(accountPrefix+tr.FromCompany, fromCompanyBytesToWrite)\n\tif err != nil {\n\t\tfmt.Println(\"Error writing the fromCompany back\")\n\t\treturn nil, errors.New(\"Error writing the fromCompany back\")\n\t}\n\n\t// cp\n\tcpBytesToWrite, err := json.Marshal(&cp)\n\tif err != nil {\n\t\tfmt.Println(\"Error marshalling the cp\")\n\t\treturn nil, errors.New(\"Error marshalling the cp\")\n\t}\n\tfmt.Println(\"Put state on CP\")\n\terr = stub.PutState(cpPrefix+tr.CUSIP, cpBytesToWrite)\n\tif err != nil {\n\t\tfmt.Println(\"Error writing the cp back\")\n\t\treturn nil, errors.New(\"Error writing the cp back\")\n\t}\n\n\tfmt.Println(\"Successfully completed Invoke\")\n\treturn nil, nil\n}", "title": "" }, { "docid": "e088ab950cd9e0849afb0b380f4d4d68", "score": "0.49694505", "text": "func BankPatch(c echo.Context) error {\n\tdefer c.Request().Body.Close()\n\terr := validatePermission(c, \"core_bank_patch\")\n\tif err != nil {\n\t\treturn returnInvalidResponse(http.StatusForbidden, err, fmt.Sprintf(\"%s\", err))\n\t}\n\n\tbankID, _ := strconv.ParseUint(c.Param(\"bank_id\"), 10, 64)\n\n\tbank := models.Bank{}\n\tbankPayload := BankPayload{}\n\terr = bank.FindbyID(bankID)\n\tif err != nil {\n\t\tNLog(\"warning\", \"BankPatch\", map[string]interface{}{\"message\": fmt.Sprintf(\"error finding bank %v\", bankID), \"error\": err}, c.Get(\"user\").(*jwt.Token), \"\", false)\n\n\t\treturn returnInvalidResponse(http.StatusNotFound, err, fmt.Sprintf(\"Bank %v tidak ditemukan\", bankID))\n\t}\n\torigin := bank\n\n\tpayloadRules := govalidator.MapData{\n\t\t\"name\": []string{},\n\t\t\"image\": []string{},\n\t\t\"type\": []string{\"valid_id:bank_types\"},\n\t\t\"address\": []string{},\n\t\t\"province\": []string{},\n\t\t\"city\": []string{},\n\t\t\"services\": []string{\"valid_id:services\"},\n\t\t\"products\": []string{\"valid_id:products\"},\n\t\t\"pic\": []string{},\n\t\t\"phone\": []string{},\n\t}\n\n\tvalidate := validateRequestPayload(c, payloadRules, &bankPayload)\n\tif validate != nil {\n\t\tNLog(\"warning\", \"BankPatch\", map[string]interface{}{\"message\": \"error validation\", \"error\": validate}, c.Get(\"user\").(*jwt.Token), \"\", false)\n\n\t\treturn returnInvalidResponse(http.StatusUnprocessableEntity, validate, \"Hambatan validasi\")\n\t}\n\n\tif len(bankPayload.Name) > 0 {\n\t\tbank.Name = bankPayload.Name\n\t}\n\tif bankPayload.Type > 0 {\n\t\tbank.Type = bankPayload.Type\n\t}\n\tif len(bankPayload.Address) > 0 {\n\t\tbank.Address = bankPayload.Address\n\t}\n\tif len(bankPayload.Province) > 0 {\n\t\tbank.Province = bankPayload.Province\n\t}\n\tif len(bankPayload.City) > 0 {\n\t\tbank.City = bankPayload.City\n\t}\n\tif len(bankPayload.Services) > 0 {\n\t\tbank.Services = pq.Int64Array(bankPayload.Services)\n\t}\n\tif len(bankPayload.Products) > 0 {\n\t\tbank.Products = pq.Int64Array(bankPayload.Products)\n\t}\n\tif len(bankPayload.PIC) > 0 {\n\t\tbank.PIC = bankPayload.PIC\n\t}\n\tif len(bankPayload.Phone) > 0 {\n\t\tbank.Phone = bankPayload.Phone\n\t}\n\tif len(bankPayload.Image) > 0 {\n\t\tunbased, _ := base64.StdEncoding.DecodeString(bankPayload.Image)\n\t\tfilename := \"agt\" + strconv.FormatInt(time.Now().Unix(), 10)\n\t\turl, err := asira.App.S3.UploadJPEG(unbased, filename)\n\t\tif err != nil {\n\t\t\treturn returnInvalidResponse(http.StatusInternalServerError, err, \"Gagal membuat bank baru\")\n\t\t}\n\n\t\ti := strings.Split(bank.Image, \"/\")\n\t\tdelImage := i[len(i)-1]\n\t\terr = asira.App.S3.DeleteObject(delImage)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"failed to delete image %v from s3 bucket\", delImage)\n\t\t}\n\n\t\tbank.Image = url\n\t}\n\n\terr = middlewares.SubmitKafkaPayload(bank, \"bank_update\")\n\tif err != nil {\n\t\tNLog(\"error\", \"BankPatch\", map[string]interface{}{\"message\": fmt.Sprintf(\"error submitting bank %v\", bank.ID), \"error\": err, \"bank\": bank}, c.Get(\"user\").(*jwt.Token), \"\", false)\n\n\t\treturn returnInvalidResponse(http.StatusInternalServerError, err, fmt.Sprintf(\"Gagal update bank %v\", bankID))\n\t}\n\n\tNAudittrail(origin, bank, c.Get(\"user\").(*jwt.Token), \"bank type\", fmt.Sprint(bank.ID), \"update\")\n\n\treturn c.JSON(http.StatusOK, bank)\n}", "title": "" }, { "docid": "91bcfa4ec6cef0086225e7bbd4f4b516", "score": "0.4944126", "text": "func (t *SimpleChaincode) transfer_balance(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\r\n\tvar err error\r\n\tvar newAmountA, newAmountB float64\r\n\t// 0 1 2\r\n\t// \"accountA\", \"accountB\", \"100.20\"\r\n\tif len(args) < 3 {\r\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 3\")\r\n\t}\r\n\t\r\n\tfmt.Println(\"- start transfer_balance\")\r\n\tfmt.Println(args[0] + \" to \" + args[1])\r\n\r\n\tamount,err := strconv.ParseFloat(args[2], 64)\r\n\tif err != nil {\r\n\t\treturn nil, errors.New(\"3rd argument must be a numeric string\")\r\n\t}\r\n\r\n\taccountAAsBytes, err := stub.GetState(args[0])\r\n\tif err != nil {\r\n\t\treturn nil, errors.New(\"Failed to get the first account\")\r\n\t}\r\n\tresA := Account{}\r\n\tjson.Unmarshal(accountAAsBytes, &resA)\t\t\t\t\t\t\t\t\t\t//un stringify it aka JSON.parse()\r\n\t\r\n\taccountBAsBytes, err := stub.GetState(args[1])\r\n\tif err != nil {\r\n\t\treturn nil, errors.New(\"Failed to get the second account\")\r\n\t}\r\n\tresB := Account{}\r\n\tjson.Unmarshal(accountBAsBytes, &resB)\t\t\t\t\t\t\t\t\t\t\t\r\n\t\r\n\tBalanceA,err := strconv.ParseFloat(resA.Balance, 64)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\tBalanceB,err := strconv.ParseFloat(resB.Balance, 64)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\tif (BalanceA - amount) < 0 {\r\n\t\treturn nil, errors.New(args[0] + \" doesn't have enough balance to complete transaction\")\r\n\t}\r\n\r\n\tnewAmountA = BalanceA - amount\r\n\tnewAmountB = BalanceB + amount\r\n\tnewAmountStrA := strconv.FormatFloat(newAmountA, 'E', -1, 64)\r\n\tnewAmountStrB := strconv.FormatFloat(newAmountB, 'E', -1, 64)\r\n\r\n\tresA.Balance = newAmountStrA\r\n\tresB.Balance = newAmountStrB\r\n\r\n\tjsonAAsBytes, _ := json.Marshal(resA)\r\n\terr = stub.PutState(args[0], jsonAAsBytes)\t\t\t\t\t\t\t\t\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\tjsonBAsBytes, _ := json.Marshal(resB)\r\n\terr = stub.PutState(args[1], jsonBAsBytes)\t\t\t\t\t\t\t\t\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\t\r\n\tfmt.Println(\"- end transfer_balance\")\r\n\treturn nil, nil\r\n}", "title": "" }, { "docid": "079b29ecd4103cb9a9b325862df381d1", "score": "0.4940143", "text": "func (client BaseClient) UpdateBankAccountMethodSender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req,\n autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))\n }", "title": "" }, { "docid": "80b4123bb9b83bb7a1fe5171dc668a1a", "score": "0.49270132", "text": "func (db *paymentDatastore) SendCardReaderReceiptToBusiness(r ReceiptRequest) error {\n\tamount := shared.FormatFloatAmount(r.Amount)\n\n\tnotes := strings.Replace(*r.Notes, \"\\n\", \"<br>\", -1)\n\tr.Notes = &notes\n\n\tsubject := fmt.Sprintf(services.BusinessCardReaderReceiptSubject, amount)\n\tbody := fmt.Sprintf(services.BusinessCardReaderReceiptEmail, r.BusinessName, amount, r.PaymentDate, *r.Notes, amount, amount, r.BusinessName)\n\n\ta := sendgrid.EmailAttachment{\n\t\tAttachment: *r.Content,\n\t\tContentType: \"application/pdf\",\n\t\tFileName: \"Receipt - \" + r.ReceiptNumber + \".pdf\",\n\t\tContentID: \"Receipt\",\n\t}\n\n\temail := sendgrid.EmailAttachmentRequest{\n\t\tSenderEmail: os.Getenv(\"WISE_INVOICE_EMAIL\"),\n\t\tSenderName: os.Getenv(\"WISE_SUPPORT_NAME\"),\n\t\tReceiverEmail: r.BusinessEmail,\n\t\tReceiverName: r.BusinessName,\n\t\tSubject: subject,\n\t\tBody: body,\n\t\tAttachment: []sendgrid.EmailAttachment{a},\n\t}\n\n\t_, err := sendgrid.NewSendGridServiceWithout().SendAttachmentEmail(email)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1da1f779359f9635b53a7f87b23b9e95", "score": "0.49248654", "text": "func (w *Wallet) Transfer(rootDomainRef insolar.Reference, amountStr string, toMember *insolar.Reference) (interface{}, error) {\n\n\tamount, ok := new(big.Int).SetString(amountStr, 10)\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"can't parse input amount\")\n\t}\n\tzero, _ := new(big.Int).SetString(\"0\", 10)\n\tif amount.Cmp(zero) < 1 {\n\t\treturn nil, fmt.Errorf(\"amount must be larger then zero\")\n\t}\n\n\trd := rootdomain.GetObject(rootDomainRef)\n\tccRef, err := rd.GetCostCenter()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get cost center reference: %s\", err.Error())\n\t}\n\n\tcc := costcenter.GetObject(ccRef)\n\tfeeStr, err := cc.CalcFee(amountStr)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to calculate fee for amount: %s\", err.Error())\n\t}\n\tfee, _ := new(big.Int).SetString(feeStr, 10)\n\n\tamountWithFee := new(big.Int).Add(fee, amount)\n\n\tbalance, ok := new(big.Int).SetString(w.Balance, 10)\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"can't parse wallet balance\")\n\t}\n\n\tmemberWallet, err := proxyMember.GetObject(*toMember).GetWallet()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get member wallet: %s\", err.Error())\n\t}\n\n\tnewBalance, err := safemath.Sub(balance, amountWithFee)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"not enough balance for transfer: %s\", err.Error())\n\t}\n\tw.Balance = newBalance.String()\n\n\tfwRef, err := cc.GetFeeWalletRef()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get fee wallet reference: %s\", err.Error())\n\t}\n\n\tfeeWallet := wallet.GetObject(fwRef)\n\n\tacceptFeeErr := feeWallet.Accept(feeStr)\n\tif acceptFeeErr != nil {\n\t\tnewBalance, err = safemath.Add(balance, amountWithFee)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"failed to add amount back to balance: %s\", err.Error())\n\t\t}\n\t\tw.Balance = newBalance.String()\n\t\treturn nil, fmt.Errorf(\"failed to transfer fee: %s\", acceptFeeErr.Error())\n\t}\n\n\ttoWallet := wallet.GetObject(memberWallet)\n\tacceptErr := toWallet.Accept(amount.String())\n\tif acceptErr == nil {\n\t\treturn member.TransferResponse{Fee: feeStr}, nil\n\t}\n\n\tnewBalance, err = safemath.Add(balance, amountWithFee)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to add amount back to balance: %s\", err.Error())\n\t}\n\tw.Balance = newBalance.String()\n\n\terr = feeWallet.RollBack(feeStr)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to roll back fee: %s\", err.Error())\n\t}\n\n\treturn nil, fmt.Errorf(\"failed to accept balance to wallet: %s\", acceptErr.Error())\n}", "title": "" }, { "docid": "349d9cd82d46581f5e8a93da9fecfd4e", "score": "0.49125192", "text": "func (t *SupplierChaincode) addBalanceinBuyer(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar err error\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"wrong number of arguments\")\n\t}\n\tvalAsbytes, err := stub.GetState(args[0])\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tacc := buyer{}\n\terr = json.Unmarshal(valAsbytes, &acc)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\taddedAmount, _ := strconv.ParseFloat(args[1], 64)\n\tacc.BuyerBalance += addedAmount\n\tjsonAsbytes, err := json.Marshal(acc)\n\t//str := `{\"buyerId\":\"` + acc.BuyerId + `\",\"buyerName\":\"` + acc.BuyerName + `\",\"buyerBalance\":` + strconv.FormatFloat(acc.BuyerBalance, 'f', -1, 32) + `,\"goodsRecieved\":\"` + acc.GoodsRecieved + `\"}`\n\terr = stub.PutState(args[0], jsonAsbytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "9c4c570083a9fe5d170cbdbb87dbe205", "score": "0.49025595", "text": "func (s *SmartContract) GenerateRubberCert(ctx contractapi.TransactionContextInterface, rubberBatchNumber string, rubberType string, hardness string, tensileStrength int, rubberCertHolder string, weight int, buyer string, date string) error {\n\trubberCert := RubberCert{\n\t\tType: rubberType,\n\t\tHardness: hardness,\n\t\tTensileStrength: tensileStrength,\n\t\tRubberCertHolder: rubberCertHolder,\n\t\tWeight: weight,\n\t\tBuyer: buyer,\n\t\tDate: date,\n\t}\n\n\trubberCertAsBytes, _ := json.Marshal(rubberCert)\n\n\treturn ctx.GetStub().PutState(rubberBatchNumber, rubberCertAsBytes)\n}", "title": "" }, { "docid": "6dc487438e5f2eb407b6bb32471db8eb", "score": "0.48977113", "text": "func (t *SupplierChaincode) SendProfitsToSupplier(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"wrong number of arguments\")\n\t}\n\tsupplierAcc := supplier{}\n\tsupplierAsbytes, err := stub.GetState(args[0])\n\terr = json.Unmarshal(supplierAsbytes, &supplierAcc)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbankAcc := bank{}\n\tbankAsbytes, err := stub.GetState(args[1])\n\terr = json.Unmarshal(bankAsbytes, &bankAcc)\n\ttemp := bankAcc.LoanedAmount + (bankAcc.LoanedAmount*bankAcc.Loans[0].Interest)/100\n\tif temp < bankAcc.AmountRecieved {\n\t\tbankAcc.BankBalance -= bankAcc.AmountRecieved - temp\n\t\tsupplierAcc.SupplierBalance += bankAcc.AmountRecieved - temp\n\t\tsupplierAcc.Loans[0].Status = \"completed\"\n\t\tbankAcc.Loans[0].Status = \"completed\"\n\t\tbankAcc.AmountRecieved -= temp\n\t\tjsonBank, _ := json.Marshal(bankAcc)\n\t\tjsonSupplier, _ := json.Marshal(supplierAcc)\n\n\t\terr = stub.PutState(args[1], jsonBank)\n\t\terr = stub.PutState(args[0], jsonSupplier)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn nil, nil\n\n}", "title": "" }, { "docid": "31a65e0c52c3aae8aaf5143899c7758a", "score": "0.4893325", "text": "func (t *CarChaincode) transfer(stub shim.ChaincodeStubInterface, username string, args []string) pb.Response {\n\tvin := args[0]\n\tnewCarOwnerUsername := args[1]\n\n\tif vin == \"\" {\n\t\treturn shim.Error(\"'transfer' expects a non-empty VIN to do the transfer\")\n\t}\n\n\tif newCarOwnerUsername == \"\" {\n\t\treturn shim.Error(\"'transfer' expects a non-empty car receiver username to do the transfer\")\n\t}\n\n\t// fetch the car from the ledger\n\t// this already checks for ownership\n\tcar, err := t.getCar(stub, username, vin)\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to fetch car with vin '\" + vin + \"' from ledger\")\n\t}\n\n\t// check if car is not confirmed anymore\n\tif IsConfirmed(&car) {\n\t\treturn shim.Error(\"The car is still confirmed. It has to be revoked first in order to do the transfer\")\n\t}\n\n\t// transfer:\n\t// change of ownership in the car certificate\n\tcar.Certificate.Username = newCarOwnerUsername\n\n\t// write car with udpated certificate back to ledger\n\tcarAsBytes, _ := json.Marshal(car)\n\terr = stub.PutState(vin, carAsBytes)\n\tif err != nil {\n\t\treturn shim.Error(\"Error writing car\")\n\t}\n\n\t// get the old car owner\n\toldOwner, err := t.getUser(stub, username)\n\n\t// go through all his cars\n\t// and remove the car we just transferred\n\tcars := oldOwner.Cars\n\tvar newCarList []string\n\tfor i, carVin := range cars {\n\t\tnewCarList = append(newCarList, carVin)\n\t\tif carVin == car.Vin {\n\t\t\t// remove car from new list\n\t\t\tnewCarList = newCarList[:i]\n\t\t}\n\t}\n\n\t// save the new car list without the transferred\n\t// car to the old owner\n\toldOwner.Cars = newCarList\n\n\t// write the old owner back to state\n\terr = t.saveUser(stub, oldOwner)\n\tif err != nil {\n\t\treturn shim.Error(\"Error writing old owner\")\n\t}\n\n\t// get the receiver of the car\n\t// (new car owner)\n\tnewOwner, err := t.getUser(stub, newCarOwnerUsername)\n\n\tif err != nil {\n\t\tfmt.Println(\"New car owner (receiver) does not exist. Creating this user.\")\n\t\tuserResponse := t.createUser(stub, newCarOwnerUsername)\n\t\tnewOwner = User{}\n\t\terr = json.Unmarshal(userResponse.Payload, &newOwner)\n\t\tif err != nil {\n\t\t\treturn shim.Error(\"Error creating new car owner\")\n\t\t}\n\t}\n\n\t// attach the car to the receiver (new car owner)\n\tnewOwner.Cars = append(newOwner.Cars, car.Vin)\n\n\n\t// write back the new owner (reveiver) to state\n\terr = t.saveUser(stub, newOwner)\n\tif err != nil {\n\t\treturn shim.Error(\"Error writing new car owner (receiver)\")\n\t}\n\n\t// get the car index\n\tcarIndex, err := t.getCarIndex(stub)\n\tif err != nil {\n\t\treturn shim.Error(\"Error fetching car index\")\n\t}\n\n\t// update the car index to represent\n\t// the new ownership rights\n\tcarIndex[car.Vin] = newOwner.Name\n\n\t// write the car index back to ledger\n\tindexAsBytes, _ := json.Marshal(carIndex)\n\terr = stub.PutState(carIndexStr, indexAsBytes)\n\tif err != nil {\n\t\treturn shim.Error(\"Error writing car index\")\n\t}\n\n\t// car transfer successfull,\n\t// return the car\n\treturn shim.Success(carAsBytes)\n}", "title": "" }, { "docid": "ece72cb333d7ab8c66349c8445c9c1d0", "score": "0.4892355", "text": "func (k Keeper) Put(ctx context.Context, req *types.MsgPut) (*types.MsgPutResponse, error) {\n\townerAddr, err := sdk.AccAddressFromBech32(req.Owner)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// get the basket\n\tbasket, err := k.stateStore.BasketTable().GetByBasketDenom(ctx, req.BasketDenom)\n\tif err != nil {\n\t\tif ormerrors.IsNotFound(err) {\n\t\t\treturn nil, sdkerrors.ErrNotFound.Wrapf(\"basket %s not found\", req.BasketDenom)\n\t\t}\n\t\treturn nil, err\n\t}\n\n\t// get the credit type\n\tcreditType, err := k.baseStore.CreditTypeTable().Get(ctx, basket.CreditTypeAbbrev)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// keep track of the total amount of tokens to give to the depositor\n\tamountReceived := sdk.NewInt(0)\n\tsdkCtx := sdk.UnwrapSDKContext(ctx)\n\townerString := ownerAddr.String()\n\tmoduleAddrString := k.moduleAddress.String()\n\tfor _, credit := range req.Credits {\n\t\t// get credit batch\n\t\tbatch, err := k.baseStore.BatchTable().GetByDenom(ctx, credit.BatchDenom)\n\t\tif err != nil {\n\t\t\treturn nil, sdkerrors.ErrInvalidRequest.Wrapf(\"could not get batch %s: %s\", credit.BatchDenom, err.Error())\n\t\t}\n\n\t\t// validate that the credit batch adheres to the basket's specifications\n\t\tif err := k.canBasketAcceptCredit(ctx, basket, batch); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\t// get the amount of credits in dec\n\t\tamt, err := regenmath.NewPositiveFixedDecFromString(credit.Amount, creditType.Precision)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\t// update the user and basket balances\n\t\tif err = k.transferToBasket(ctx, ownerAddr, amt, basket.Id, batch, creditType.Precision); err != nil {\n\t\t\tif sdkerrors.ErrInsufficientFunds.Is(err) {\n\t\t\t\treturn nil, ecocredit.ErrInsufficientCredits\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\t\t// get the amount of basket tokens to give to the depositor\n\t\ttokens, err := creditAmountToBasketCoin(amt, creditType.Precision, basket.BasketDenom)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\t// update the total amount received so far\n\t\tamountReceived = amountReceived.Add(tokens.Amount)\n\n\t\tif err = sdkCtx.EventManager().EmitTypedEvent(&basetypes.EventTransfer{\n\t\t\tSender: ownerString,\n\t\t\tRecipient: moduleAddrString, // basket submodule\n\t\t\tBatchDenom: credit.BatchDenom,\n\t\t\tTradableAmount: credit.Amount,\n\t\t}); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tsdkCtx.GasMeter().ConsumeGas(ecocredit.GasCostPerIteration, \"ecocredit/basket/MsgPut credit iteration\")\n\t}\n\n\t// mint and send tokens to depositor\n\tcoinsToSend := sdk.Coins{sdk.NewCoin(basket.BasketDenom, amountReceived)}\n\tif err = k.bankKeeper.MintCoins(sdkCtx, basketsub.BasketSubModuleName, coinsToSend); err != nil {\n\t\treturn nil, err\n\t}\n\tif err = k.bankKeeper.SendCoinsFromModuleToAccount(sdkCtx, basketsub.BasketSubModuleName, ownerAddr, coinsToSend); err != nil {\n\t\treturn nil, err\n\t}\n\n\tamountReceivedString := amountReceived.String()\n\n\tif err = sdkCtx.EventManager().EmitTypedEvent(&types.EventPut{\n\t\tOwner: ownerString,\n\t\tBasketDenom: basket.BasketDenom,\n\t\tCredits: req.Credits, // deprecated\n\t\tAmount: amountReceivedString, // deprecated\n\t}); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &types.MsgPutResponse{AmountReceived: amountReceivedString}, nil\n}", "title": "" }, { "docid": "698742256b1511f7480c10b8ac21fcd4", "score": "0.48905975", "text": "func (t *SimpleChaincode) transferProduct(stub shim.ChaincodeStubInterface, args []string) pb.Response {\r\n\r\n\tvar err error\r\n\r\n\t//Update Batch data\r\n\tbAsBytes, err := stub.GetState(args[0])\r\n\t\r\n\tvar bch MilkProduct\r\n\terr = json.Unmarshal(bAsBytes, &bch)\r\n\tif err != nil {\r\n\t\treturn shim.Error(err.Error())\r\n\t}\r\n\tif(bch.BatchStatus != \"In Process\"){\r\n\t\treturn shim.Error(err.Error())\r\n\t}\r\n\r\n\tbch.BatchStatus=\"TP\"\r\n\tvar tx Transaction\r\n\ttx.Farm=bch.Farm\r\n\ttx.Fat=bch.Fat\r\n\ttx.Protein=bch.Protein\r\n\ttx.Juicines=bch.Juicines\r\n\ttx.Lead=bch.Lead\r\n\ttx.NoOfBottles, err=strconv.Atoi(args[1])\r\n\ttx.TransName=args[2]\r\n\ttx.Status=\"TP\"\r\n\ttx.TransTime=time.Now().UTC().String()\r\n\ttx.Owner=tx.TransName\r\n\ttx.TPstatus=\"in-transist\"\r\n\tbch.Owner=tx.TransName\r\n\r\n\tbch.Transactions = append(bch.Transactions, tx)\r\n\r\n\t//Commit updates batch to ledger\r\n\tbtAsBytes, _ := json.Marshal(bch)\r\n\terr = stub.PutState(bch.BatchId, btAsBytes)\t\r\n\tif err != nil {\r\n\t\treturn shim.Error(err.Error())\r\n\t}\t\r\n\r\n\treturn shim.Success(nil)\r\n}", "title": "" }, { "docid": "b4bb3f3620e470d740a808605f986e45", "score": "0.48144352", "text": "func (s *Service) BalanceStep(c *gin.Context) {\n\t// FIXME(adonese): we need to check for `is_password_otp` = true\n\ttype data struct {\n\t\tebs_fields.ConsumerBalanceFields\n\t\tMobile string `json:\"mobile,omitempty\"`\n\t}\n\turl := s.NoebsConfig.ConsumerIP + ebs_fields.ConsumerBalanceEndpoint // EBS simulator endpoint url goes here.\n\n\tvar req data\n\tc.ShouldBindWith(&req, binding.JSON)\n\tuser, _ := ebs_fields.NewUserWithCards(req.Mobile, s.Db)\n\tvar isMatched bool\n\tif user.Cards == nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"message\": \"no matching card was found\", \"code\": \"card_not_matched\"})\n\t\treturn\n\t}\n\tfor _, card := range user.Cards {\n\t\tif req.Pan == card.Pan {\n\t\t\tisMatched = true\n\t\t\treq.ExpDate = card.Expiry\n\t\t}\n\t}\n\tif !isMatched {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"message\": \"no matching card was found\", \"code\": \"card_not_matched\"})\n\t\treturn\n\t}\n\n\t// make transaction to ebs here\n\tmobile := req.Mobile\n\treq.Mobile = \"\"\n\treq.ApplicationId = s.NoebsConfig.ConsumerID\n\tjsonBuffer, err := json.Marshal(req)\n\tif err != nil {\n\t\t// there's an error in parsing the struct. Server error.\n\t\ter := ebs_fields.ErrorDetails{Details: nil, Code: http.StatusBadRequest, Message: \"Unable to parse the request\", Status: ebs_fields.ParsingError}\n\t\tc.AbortWithStatusJSON(http.StatusBadRequest, ebs_fields.ErrorResponse{ErrorDetails: er})\n\t\treturn\n\t}\n\n\t// the only part left is fixing EBS errors. Formalizing them per se.\n\t_, _, ebsErr := ebs_fields.EBSHttpClient(url, jsonBuffer)\n\tif ebsErr != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"message\": \"Invalid credentials\", \"code\": \"transaction_failed\"})\n\t\treturn\n\t}\n\n\t// generate a jwt here\n\ttoken, err := s.Auth.GenerateJWT(mobile)\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\tc.Writer.Header().Set(\"Authorization\", token)\n\tc.JSON(http.StatusOK, gin.H{\"result\": \"ok\", \"authorization\": token})\n\n}", "title": "" }, { "docid": "843b0e58e7d3afb6af2870712138acff", "score": "0.4810825", "text": "func (a *Accounting) settle(peer swarm.Address, balance *accountingPeer) error {\n\tnow := a.timeNow().Unix()\n\ttimeElapsed := now - balance.refreshTimestamp\n\n\toldBalance, err := a.Balance(peer)\n\tif err != nil {\n\t\tif !errors.Is(err, ErrPeerNoBalance) {\n\t\t\treturn fmt.Errorf(\"failed to load balance: %w\", err)\n\t\t}\n\t}\n\n\t// compute the debt including debt created by incoming payments\n\tcompensatedBalance, err := a.CompensatedBalance(peer)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tpaymentAmount := new(big.Int).Neg(compensatedBalance)\n\t// Don't do anything if there is no actual debt or no time passed since last refreshment attempt\n\t// This might be the case if the peer owes us and the total reserve for a peer exceeds the payment threshold.\n\tif paymentAmount.Cmp(big.NewInt(0)) > 0 && timeElapsed > 0 {\n\t\tshadowBalance, err := a.shadowBalance(peer)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tacceptedAmount, timestamp, err := a.refreshFunction(context.Background(), peer, paymentAmount, shadowBalance)\n\t\tif err != nil {\n\t\t\ta.metrics.AccountingDisconnectsEnforceRefreshCount.Inc()\n\t\t\t_ = a.blocklist(peer, 1)\n\t\t\treturn fmt.Errorf(\"refresh failure: %w\", err)\n\t\t}\n\n\t\tbalance.refreshTimestamp = timestamp\n\n\t\toldBalance = new(big.Int).Add(oldBalance, acceptedAmount)\n\n\t\ta.logger.Tracef(\"registering refreshment sent to peer %v with amount %d, new balance is %d\", peer, acceptedAmount, oldBalance)\n\n\t\terr = a.store.Put(peerBalanceKey(peer), oldBalance)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"settle: failed to persist balance: %w\", err)\n\t\t}\n\n\t\terr = a.decreaseOriginatedBalanceTo(peer, oldBalance)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"settle: failed to decrease originated balance: %w\", err)\n\t\t}\n\t}\n\n\tif a.payFunction != nil && !balance.paymentOngoing {\n\n\t\tdifference := now - balance.lastSettlementFailureTimestamp\n\t\tif difference > failedSettlementInterval {\n\n\t\t\t// if there is no monetary settlement happening, check if there is something to settle\n\t\t\t// compute debt excluding debt created by incoming payments\n\t\t\toriginatedBalance, err := a.OriginatedBalance(peer)\n\t\t\tif err != nil {\n\t\t\t\tif !errors.Is(err, ErrPeerNoBalance) {\n\t\t\t\t\treturn fmt.Errorf(\"failed to load originated balance to settle: %w\", err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tpaymentAmount := new(big.Int).Neg(originatedBalance)\n\t\t\t// if the remaining debt is still larger than some minimum amount, trigger monetary settlement\n\t\t\tif paymentAmount.Cmp(a.minimumPayment) >= 0 {\n\t\t\t\tbalance.paymentOngoing = true\n\t\t\t\t// add settled amount to shadow reserve before sending it\n\t\t\t\tbalance.shadowReservedBalance.Add(balance.shadowReservedBalance, paymentAmount)\n\t\t\t\ta.wg.Add(1)\n\t\t\t\tgo a.payFunction(context.Background(), peer, paymentAmount)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "5f18950dec681a7a9c8adcfbe78691d0", "score": "0.4796215", "text": "func (b *Bloco1) Balance(investor int, token string)(interface{}) {\n\t\n\n\tmessage := map[string]interface{}{\n\t\t\"investor\": investor }\n\n\n\t\tvar response interface{}\n\n\t\tbuf := new(bytes.Buffer)\n\t\tjson.NewEncoder(buf).Encode(message)\n\n\t\tu, _ := url.ParseRequestURI( b.resourceURL)\n\t\tu.Path =\"trading/myorders\"\n\t\turlStr := u.String() // \"https://api.com/user/\"\n\t\n\t\tclient := &http.Client{}\n\t\tr, err := http.NewRequest(\"POST\", urlStr, buf ) // URL-encoded payload\n\t\tif err != nil {\n\t\t\t//log.Fatalln(err)\n\t\t\t//fmt.Printf(\"Ooops\");\n\t\t\tjson.Unmarshal([]byte(`{\"error\":true}`), &response) \n\t\t\treturn response;\n\t\t}\n\nr.Header.Add(\"Authorization\", \"Bearer \"+token)\nr.Header.Add(\"Content-Type\", \"application/json\")\n\nresp, err := client.Do(r)\n\t\tif err != nil {\n\t\t//log.Fatalln(err)\n\t\t//fmt.Printf(\"Ooops\");\n\t\tjson.Unmarshal([]byte(`{\"error\":true}`), &response);\n\t\treturn response;\n\t}\n\n\tdefer resp.Body.Close()\n\n\t\n\n\tbuf2 := new(bytes.Buffer)\n buf2.ReadFrom(resp.Body)\n newStr := buf2.String()\n \n\t//fmt.Printf(newStr)\n\n\terr = json.Unmarshal([]byte(newStr), &response)\n\tif err != nil {\n\t\t//log.Fatalln(err)\n\t\t//fmt.Printf(\"ERROR!\");\n\t\tjson.Unmarshal([]byte(`{\"error\":true}`), &response) \n\t}\n\n\t\n\treturn response;\n\n}", "title": "" }, { "docid": "7cb2f56ba08f173321ba034e0d8fa294", "score": "0.47925797", "text": "func (t *energyToken) updateRetailer(stub shim.ChaincodeStubInterface, args []string) pb.Response {\r\n\tif len(args) != 8 {\r\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 7.\")\r\n\t}\r\n\r\n\tR_C_registration_id := args[0]\r\n\tType_of_plant := args[1]\r\n\tInstallation_month := args[2]\r\n\tRegistration_timestamp := args[3]\r\n\t_Required_energy_token := args[4]\r\n\tStart_date := args[5]\r\n\tEnd_date := args[6]\r\n Regulator := args[7]\r\n\t/*current_time := time.Now().Local()\r\n\tR_C_registration_id := Participant_id + current_time.Format(\"20060102150405\")\r\n */\r\n\tRequired_energy_token, _err := strconv.Atoi(_Required_energy_token)\r\n if _err != nil {\r\n\t\treturn shim.Error(_err.Error())\r\n\t}\r\n\r\n\t//Remaining_token := Required_energy_token \r\n\tif value, err := stub.GetState(R_C_registration_id); err != nil || value == nil {\r\n\treturn shim.Error(\"Read: invalid ID supplied.\")\r\n\t} else {\r\n\t\tres := Register_R_C{}\r\n\t\tjson.Unmarshal(value, &res)\r\n\t fmt.Print(\"res(Prosumer_Registration_id1): \")\r\n\t\tfmt.Println(res)\r\n\r\n\r\n\tinput := &Register_R_C{res.R_C_registration_id, res.Participant_id, Type_of_plant, Installation_month, Registration_timestamp, Required_energy_token, res.Remaining_token, Start_date, End_date,res.Wallet,Regulator}\r\n\r\n\tinputJSONasBytes, err := json.Marshal(input)\r\n\tif err != nil {\r\n\t\treturn shim.Error(err.Error())\r\n\t}\r\n\r\n\tif err := stub.PutState(R_C_registration_id, inputJSONasBytes); err != nil {\r\n\t\treturn shim.Error(err.Error())\r\n\t\t} else {\r\n\t\tfmt.Print(\"Block added\")\r\n\t}\r\n\treturn shim.Success(inputJSONasBytes)\r\n }\r\n}", "title": "" }, { "docid": "11fc558ce0a01ae5ef13a83f06bd1f1e", "score": "0.47786537", "text": "func (client BaseClient) UpdateCreditCardMethodSender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req,\n autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))\n }", "title": "" }, { "docid": "187810b672b8ca80d62521288d95a82c", "score": "0.47459877", "text": "func (a *Client) TransferBundle(ctx context.Context, params *TransferBundleParams) (*TransferBundleCreated, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewTransferBundleParams()\n\t}\n\tgetParams := NewTransferBundleParams()\n\tgetParams.Context = ctx\n\tparams.Context = ctx\n\tif params.XKillbillComment == nil && a.defaults.XKillbillComment() != nil {\n\t\tparams.XKillbillComment = a.defaults.XKillbillComment()\n\t}\n\tgetParams.XKillbillComment = params.XKillbillComment\n\tif params.XKillbillCreatedBy == \"\" && a.defaults.XKillbillCreatedBy() != nil {\n\t\tparams.XKillbillCreatedBy = *a.defaults.XKillbillCreatedBy()\n\t}\n\tgetParams.XKillbillCreatedBy = params.XKillbillCreatedBy\n\tif params.XKillbillReason == nil && a.defaults.XKillbillReason() != nil {\n\t\tparams.XKillbillReason = a.defaults.XKillbillReason()\n\t}\n\tgetParams.XKillbillReason = params.XKillbillReason\n\tif params.WithProfilingInfo == nil && a.defaults.KillbillWithProfilingInfo() != nil {\n\t\tparams.WithProfilingInfo = a.defaults.KillbillWithProfilingInfo()\n\t}\n\n\tif params.WithStackTrace == nil && a.defaults.KillbillWithStackTrace() != nil {\n\t\tparams.WithStackTrace = a.defaults.KillbillWithStackTrace()\n\t}\n\tgetParams.WithStackTrace = params.WithStackTrace\n\n\top := &runtime.ClientOperation{\n\t\tID: \"transferBundle\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/1.0/kb/bundles/{bundleId}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &TransferBundleReader{formats: a.formats},\n\t\tAuthInfo: a.authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcreatedResult := result.(*TransferBundleCreated)\n\tlocation := kbcommon.ParseLocationHeader(createdResult.HttpResponse.GetHeader(\"Location\"))\n\tif !params.ProcessLocationHeader || location == \"\" {\n\t\treturn createdResult, nil\n\t}\n\n\tgetResult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"transferBundle\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: location,\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: getParams,\n\t\tReader: &TransferBundleReader{formats: a.formats},\n\t\tAuthInfo: a.authInfo,\n\t\tContext: getParams.Context,\n\t\tClient: getParams.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn getResult.(*TransferBundleCreated), nil\n\n}", "title": "" }, { "docid": "dc71643203bfb555d56b15e5a322b810", "score": "0.47105968", "text": "func (db *KVAutobus) sendOwnership() error {\n\tpayload := fmt.Sprintf(\"{%q: %q}\", db.collection, db.owner)\n\tdvid.Infof(\"Sending billing info to %s:\\n%s\\n\", db, payload)\n\n\turl := fmt.Sprintf(\"%s/kvautobus/api/billing/\", db.host)\n\tresp, err := db.client.Post(url, \"application/json\", strings.NewReader(payload))\n\tif err != nil {\n\t\treturn err\n\t}\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn fmt.Errorf(\"Bad status code returned (%d) from POST to billing map: %s\", resp.StatusCode, url)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8775ed19a3acbefd8221f542b154d208", "score": "0.46964267", "text": "func (t *CarChaincode) sell(stub shim.ChaincodeStubInterface, seller string, args []string) pb.Response {\n\tprice := args[0]\n\tpriceAsInt, _ := strconv.Atoi(args[0])\n\tvin := args[1]\n\tbuyer := args[2]\n\n\t// price input sanitation\n\tif price == \"\" || priceAsInt < 0 {\n\t\treturn shim.Error(\"'sell' expects a non-empty, positive price\")\n\t}\n\n\t//////////////////////////////////////////////////////////\n\t// BUYER //\n\t//////////////////////////////////////////////////////////\n\n\t// fetch buyer and balance\n\tbuyerAsUser, err := t.getUser(stub, buyer)\n\tif err != nil {\n\t\t// buyer does not exist yet\n\t\t// create and give her some credits to buy cars\n\t\tuserResponse := t.createUser(stub, buyer)\n\t\tbuyerAsUser = User{}\n\t\terr = json.Unmarshal(userResponse.Payload, &buyerAsUser)\n\t\tif err != nil {\n\t\t\treturn shim.Error(\"Error creating new buyer\")\n\t\t}\n\t}\n\n\t// check buyer balance\n\tif buyerAsUser.Balance < priceAsInt {\n\t\treturn shim.Error(\"Buyer has not enough credits\")\n\t}\n\n\t// update buyer balance\n\tbuyerAsUser, err = t.setBalance(stub, buyer, buyerAsUser.Balance-priceAsInt)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tfmt.Printf(\"Balance of user %s (buyer) updated, is now: %n\\n\", buyer, buyerAsUser.Balance)\n\n\t//////////////////////////////////////////////////////////\n\t// SELLER //\n\t//////////////////////////////////////////////////////////\n\n\t// fetch seller and balance\n\tsellerAsUser, err := t.getUser(stub, seller)\n\tif err != nil {\n\t\t// Temporary fix for tests (ToDo: Fix User creation in tests)\n\t\tfmt.Printf(\"Error fetching old car owner. Creating new one.\")\n\t\tuserAsBytes := t.createUser(stub, seller)\n\t\terr := json.Unmarshal(userAsBytes.Payload, &sellerAsUser)\n\t\tif err != nil {\n\t\t\treturn shim.Error(\"Error unmarshaling user payload.\")\n\t\t}\n\t\t// return shim.Error(\"Error fetching seller\")\n\t}\n\n\t// update sellers balance\n\tsellerAsUser, err = t.setBalance(stub, seller, sellerAsUser.Balance+priceAsInt)\n\tif err != nil {\n\t\t// undo successful 'buyer' transaction\n\t\tbuyerAsUser, err = t.setBalance(stub, buyer, buyerAsUser.Balance+priceAsInt)\n\t\tif err != nil {\n\t\t\treturn shim.Error(\"State corrupted\")\n\t\t}\n\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tfmt.Printf(\"Balance of user %s (seller) updated, is now: %n\\n\", seller, sellerAsUser.Balance)\n\n\t//////////////////////////////////////////////////////////\n\t// WRITING USER CHANGES TO LEDGER //\n\t//////////////////////////////////////////////////////////\n\n\t// Writing updated buyer back to ledger\n\terr = t.saveUser(stub, buyerAsUser)\n\tif err != nil {\n\t\treturn shim.Error(\"Error saving updated buyer!\")\n\t}\n\n\t// writing updated seller back to ledger\n\terr = t.saveUser(stub, sellerAsUser)\n\tif err != nil {\n\t\treturn shim.Error(\"Error saving updated seller!\")\n\t}\n\n\t//////////////////////////////////////////////////////////\n\t// CAR //\n\t//////////////////////////////////////////////////////////\n\n\t// remove price from args\n\targs = args[1:]\n\n\t// transfer car\n\tresponse := t.transfer(stub, seller, args)\n\tcar := Car{}\n\terr = json.Unmarshal(response.Payload, &car)\n\tif err != nil {\n\t\t// undo SELLER and BUYER balance updates if unsucessfull\n\t\t// is there a 'hfc transaction' for automation of this scenario?\n\t\tbuyerAsUser, err = t.setBalance(stub, buyer, buyerAsUser.Balance+priceAsInt)\n\t\tif err != nil {\n\t\t\treturn shim.Error(\"State corrupted\")\n\t\t}\n\n\t\tsellerAsUser, err = t.setBalance(stub, seller, sellerAsUser.Balance-priceAsInt)\n\t\tif err != nil {\n\t\t\treturn shim.Error(\"State corrupted\")\n\t\t}\n\n\t\treturn shim.Error(\"Error transferring car, transaction not successfull\")\n\t}\n\n\t//////////////////////////////////////////////////////////\n\t// WRITING CAR CHANGES TO LEDGER //\n\t//////////////////////////////////////////////////////////\n\n\t// write updated car back to ledger\n\tcarAsBytes, _ := json.Marshal(car)\n\terr = stub.PutState(vin, carAsBytes)\n\tif err != nil {\n\t\treturn shim.Error(\"Error writing updated car to ledger\")\n\t}\n\n\treturn shim.Success(response.Payload)\n}", "title": "" }, { "docid": "a5f87fdc664aa55ebee536bd34732a7d", "score": "0.4679049", "text": "func (s *SmartContract) GenerateShippingBill(ctx contractapi.TransactionContextInterface, rubberBatchNumber string, billNumber string, shippingCost int, address string, estimatedDeliveryDate string) error {\n\trubberCert, err := s.QueryGeneratedRubberCert(ctx, rubberBatchNumber)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif rubberCert.RubberCertHolder != \"rubber shipper\" {\n\t\treturn fmt.Errorf(\"Invalid certificate holder of %s\", rubberBatchNumber)\n\t}\n\n\trubberCertHolder := rubberCert.RubberCertHolder\n\n\tbill := ShippingBill{\n\t\tShippingCost: shippingCost,\n\t\tAddress: address,\n\t\tEstimatedDeliveryDate: estimatedDeliveryDate,\n\t\tBillHolder: rubberCertHolder,\n\t}\n\n\tbillAsBytes, _ := json.Marshal(bill)\n\n\treturn ctx.GetStub().PutState(billNumber, billAsBytes)\n}", "title": "" }, { "docid": "7d31a2ae4d9a1992a7bbe75af87736d6", "score": "0.46753365", "text": "func AdminUpdateBalance(se Servicer) httprouter.Handle {\n\treturn func(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\t\tvar rlt *pp.EmptyRes\n\t\tfor {\n\t\t\t// get dst_pubkey\n\t\t\tdstPk := r.FormValue(\"dst\")\n\t\t\tif dstPk == \"\" {\n\t\t\t\terr := errors.New(\"dst pubkey is empty\")\n\t\t\t\tlogger.Error(err.Error())\n\t\t\t\trlt = pp.MakeErrRes(err)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\t// validate the dst_pubkey\n\t\t\tif _, err := cipher.PubKeyFromHex(dstPk); err != nil {\n\t\t\t\tlogger.Error(err.Error())\n\t\t\t\trlt = pp.MakeErrRes(errors.New(\"invalid dst pubkey\"))\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\t// get coin type.\n\t\t\tcp := r.FormValue(\"coin_type\")\n\t\t\tif cp == \"\" {\n\t\t\t\terr := errors.New(\"coin_type is empty\")\n\t\t\t\tlogger.Error(err.Error())\n\t\t\t\trlt = pp.MakeErrRes(err)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\t// get amt\n\t\t\tamt := r.FormValue(\"amt\")\n\t\t\tif amt == \"\" {\n\t\t\t\terr := errors.New(\"amt is empty\")\n\t\t\t\tlogger.Error(err.Error())\n\t\t\t\trlt = pp.MakeErrRes(err)\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tamount, err := strconv.ParseUint(amt, 10, 64)\n\t\t\tif err != nil {\n\t\t\t\tlogger.Error(err.Error())\n\t\t\t\trlt = pp.MakeErrRes(err)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\ta, err := account.GetActive()\n\t\t\tif err != nil {\n\t\t\t\tlogger.Error(err.Error())\n\t\t\t\trlt = pp.MakeErrRes(err)\n\t\t\t\tbreak\n\t\t\t}\n\t\t\treq := pp.UpdateCreditReq{\n\t\t\t\tPubkey: pp.PtrString(a.Pubkey),\n\t\t\t\tCoinType: pp.PtrString(cp),\n\t\t\t\tAmount: pp.PtrUint64(amount),\n\t\t\t\tDst: pp.PtrString(dstPk),\n\t\t\t}\n\n\t\t\tres := pp.UpdateCreditRes{}\n\t\t\tif err := sknet.EncryGet(se.GetServAddr(), \"/admin/update/credit\", req, &res); err != nil {\n\t\t\t\tlogger.Error(err.Error())\n\t\t\t\trlt = pp.MakeErrResWithCode(pp.ErrCode_ServerError)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tsendJSON(w, res)\n\t\t\treturn\n\t\t}\n\t\tsendJSON(w, rlt)\n\t}\n}", "title": "" }, { "docid": "36ff15741fca79023d60214480088422", "score": "0.46578574", "text": "func (me *EASYPAISA_IMPL) CreateMoneyTransferToBank(\r\n\tbody *models_pkg.MoneyTransferToBankRequest) (*models_pkg.MoneyTransferToBankResponse, error) {\r\n\t//the base uri for api requests\r\n\t_queryBuilder := configuration_pkg.GetBaseURI(configuration_pkg.DEFAULT, me.config)\r\n\r\n\t//prepare query string for API call\r\n\t_queryBuilder = _queryBuilder + \"/transferBank/v0/mm/transactions\"\r\n\r\n\t//variable to hold errors\r\n\tvar err error = nil\r\n\t//validate and preprocess url\r\n\t_queryBuilder, err = apihelper_pkg.CleanUrl(_queryBuilder)\r\n\tif err != nil {\r\n\t\t//error in url validation or cleaning\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\t//prepare headers for the outgoing request\r\n\theaders := map[string]interface{}{\r\n\t\t\"user-agent\": \"APIMATIC 2.0\",\r\n\t\t\"accept\": \"application/json\",\r\n\t\t\"content-type\": \"application/json; charset=utf-8\",\r\n\t\t\"x-api-key\": \"TelenorAPIGW\",\r\n\t\t\"X-User-Credential-1\": \"OTIzNDU4NDk2Mzg0OjEyMTIx\",\r\n\t\t\"X-Channel\": \"apollo\",\r\n\t}\r\n\r\n\t//prepare API request\r\n\t_request := unirest.Post(_queryBuilder, headers, body)\r\n\t//and invoke the API call request to fetch the response\r\n\t_response, err := unirest.AsString(_request)\r\n\tif err != nil {\r\n\t\t//error in API invocation\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\t//error handling using HTTP status codes\r\n\tif (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n\t\terr = apihelper_pkg.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n\t}\r\n\tif err != nil {\r\n\t\t//error detected in status code validation\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\t//returning the response\r\n\tvar retVal *models_pkg.MoneyTransferToBankResponse = &models_pkg.MoneyTransferToBankResponse{}\r\n\terr = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n\tif err != nil {\r\n\t\t//error in parsing\r\n\t\treturn nil, err\r\n\t}\r\n\treturn retVal, nil\r\n\r\n}", "title": "" }, { "docid": "8cdaee5b7b32facd896edf317d15e898", "score": "0.46435118", "text": "func (c *Core) reFee(dcrWallet *xcWallet, dc *dexConnection) {\n\n\t// Return if the coin is already in blockWaiters.\n\tregFeeAssetID, _ := dex.BipSymbolID(regFeeAssetSymbol)\n\tif c.existsWaiter(coinIDString(regFeeAssetID, dc.acct.feeCoin)) {\n\t\treturn\n\t}\n\n\t// Get the database account info.\n\tacctInfo, err := c.db.Account(dc.acct.host)\n\tif err != nil {\n\t\tc.log.Errorf(\"reFee %s - error retrieving account info: %v\", dc.acct.host, err)\n\t\treturn\n\t}\n\t// A couple sanity checks.\n\tif !bytes.Equal(acctInfo.FeeCoin, dc.acct.feeCoin) {\n\t\tc.log.Errorf(\"reFee %s - fee coin mismatch. %x != %x\", dc.acct.host, acctInfo.FeeCoin, dc.acct.feeCoin)\n\t\treturn\n\t}\n\tif acctInfo.Paid {\n\t\tc.log.Errorf(\"reFee %s - account for %x already marked paid\", dc.acct.host, dc.acct.feeCoin)\n\t\treturn\n\t}\n\t// Get the coin for the fee.\n\tconfs, _, err := dcrWallet.Confirmations(c.ctx, acctInfo.FeeCoin)\n\tif err != nil {\n\t\tc.log.Errorf(\"reFee %s - error getting coin confirmations: %v\", dc.acct.host, err)\n\t\treturn\n\t}\n\tdc.cfgMtx.RLock()\n\trequiredConfs := uint32(dc.cfg.RegFeeConfirms)\n\tdc.cfgMtx.RUnlock()\n\n\tif confs >= requiredConfs {\n\t\terr := c.notifyFee(dc, acctInfo.FeeCoin)\n\t\tif err != nil {\n\t\t\tc.log.Errorf(\"reFee %s - notifyfee error: %v\", dc.acct.host, err)\n\t\t\tdetails := fmt.Sprintf(\"Error encountered while paying fees to %s: %v\", dc.acct.host, err)\n\t\t\tc.notify(newFeePaymentNote(SubjectFeePaymentError, details, db.ErrorLevel, dc.acct.host))\n\t\t} else {\n\t\t\tc.log.Infof(\"Fee paid at %s\", dc.acct.host)\n\t\t\tdetails := fmt.Sprintf(\"You may now trade at %s.\", dc.acct.host)\n\t\t\tc.notify(newFeePaymentNote(SubjectAccountRegistered, details, db.Success, dc.acct.host))\n\t\t\t// dc.acct.pay() and c.authDEX????\n\t\t\tdc.acct.markFeePaid()\n\t\t\terr = c.authDEX(dc)\n\t\t\tif err != nil {\n\t\t\t\tc.log.Errorf(\"fee paid, but failed to authenticate connection to %s: %v\", dc.acct.host, err)\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tc.verifyRegistrationFee(dcrWallet.AssetID, dc, acctInfo.FeeCoin, confs)\n}", "title": "" }, { "docid": "ef818379d5e68d4de2fa8c9c74b7e00a", "score": "0.46320355", "text": "func (ci *PubChainInstance) updateBridgeTx(txID string, amount *big.Int, direction direction) *bridgeTx {\n\tci.pendingAccountLocker.Lock()\n\tdefer ci.pendingAccountLocker.Unlock()\n\tthisAccount, ok := ci.pendingAccounts[txID]\n\tif !ok {\n\t\tci.logger.Warn().Msg(\"fail to get the stored tx from pool\")\n\t\treturn nil\n\t}\n\tif thisAccount.direction != direction {\n\t\tci.logger.Warn().Msg(\"the tx direction is not consistent\")\n\t\treturn nil\n\t}\n\tthisAccount.fee.Amount = thisAccount.fee.Amount.Add(types.NewIntFromBigInt(amount))\n\terr := thisAccount.Verify()\n\tif err != nil {\n\t\tci.pendingAccounts[txID] = thisAccount\n\t\tci.logger.Warn().Msgf(\"the account cannot be processed on joltify chain this round\")\n\t\treturn nil\n\t}\n\t// since this tx is processed,we do not need to store it any longer\n\tdelete(ci.pendingAccounts, txID)\n\treturn thisAccount\n}", "title": "" }, { "docid": "d8199fe522acf36b52479427c75ff5ee", "score": "0.4614107", "text": "func (t *TestObject) transfer(balance bn.Number) *TestObject {\n\tt.obj.sdk.Message().Sender().Transfer(t.obj.sdk.Message().Contract().Account().Address(), balance)\n\treturn t\n}", "title": "" }, { "docid": "f1a5d625f7514ded951d93d4dbdabfa1", "score": "0.46094605", "text": "func rCryptNewBTC(w http.ResponseWriter, r *http.Request, db *bolt.DB, conf CoreConf) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tif HSTSENABLED == true {\n\t\tw.Header().Set(\"Strict-Transport-Security\", \"max-age=\"+strconv.FormatInt(HSTSEXPIRY, 10)+\"; includeSubdomains\")\n\t}\n\n\tresponse := APIRegisterResponse{StatusCode: 200, Version: APIVERSION, Success: true}\n\n\tif r.Method == \"POST\" {\n\t\t//md5Hash := GetMD5Hash(string(time.Now().Unix()))\n\t\tvar account Account\n\t\tvar clientRequest ClientRequest\n\n\t\tdecoder := json.NewDecoder(r.Body)\n\t\terr := decoder.Decode(&clientRequest)\n\n\t\t//Check the users challenge\n\t\t_, challengeErr := CheckChallenge(clientRequest.Challenge, clientRequest.UserID, clientRequest.ChallengeID, db)\n\n\t\tif challengeErr == nil {\n\n\t\t\t//Retrieve the users account\n\t\t\taccountErr := db.View(func(tx *bolt.Tx) error {\n\t\t\t\tb := tx.Bucket([]byte(\"users\"))\n\t\t\t\taccountJSON := b.Get(itob(clientRequest.UserID))\n\n\t\t\t\terr = json.Unmarshal(accountJSON, &account)\n\t\t\t\treturn err\n\t\t\t})\n\n\t\t\tif accountErr == nil {\n\n\t\t\t\t//Get a new address\n\t\t\t\taccount.BTCAddr, err = getBTCAddr(conf.BTCAddr, conf.BTCUser, conf.BTCPass, true)\n\n\t\t\t\t//This is not ideal, we should probably bomb out instead\n\t\t\t\tif err != nil {\n\t\t\t\t\taccount.BTCAddr = \"Not Available\"\n\t\t\t\t}\n\n\t\t\t\terr = db.Update(func(tx *bolt.Tx) error {\n\t\t\t\t\tb := tx.Bucket([]byte(\"users\"))\n\t\t\t\t\tid, _ := b.NextSequence()\n\t\t\t\t\taccount.UserID = uint64(id)\n\n\t\t\t\t\t// Marshal user data into bytes.\n\t\t\t\t\tbuf, err := json.Marshal(account)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\n\t\t\t\t\t//Store the user account\n\t\t\t\t\treturn b.Put(itob(account.UserID), buf)\n\t\t\t\t})\n\n\t\t\t\tif err == nil {\n\t\t\t\t\tresponse.Message = \"A new bitcoin address has been successfully generated\"\n\t\t\t\t\tresponse.UserID = account.UserID\n\t\t\t\t\tresponse.BTCAddr = account.BTCAddr\n\n\t\t\t\t} else {\n\t\t\t\t\tresponse.StatusCode = http.StatusInternalServerError\n\t\t\t\t\tresponse.Success = false\n\t\t\t\t\tresponse.Message = \"There was an issue generating a new bitcoin address\"\n\t\t\t\t\tlog.Print(err.Error())\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tresponse.StatusCode = http.StatusBadRequest\n\t\t\t\tresponse.Success = false\n\t\t\t\tresponse.Message = \"There was an issue retrieving your account\"\n\t\t\t\tlog.Print(accountErr.Error())\n\n\t\t\t}\n\t\t} else {\n\t\t\tresponse.StatusCode = http.StatusUnauthorized\n\t\t\tresponse.Success = false\n\t\t\tresponse.Message = \"Authentication Failed\"\n\t\t\tlog.Print(challengeErr.Error())\n\t\t}\n\t} else {\n\t\tresponse.StatusCode = http.StatusBadRequest\n\t\tresponse.Success = false\n\t\tresponse.Message = \"Invalid method (/1/register only accepts POST)\"\n\t}\n\n\tjs, err := json.Marshal(response)\n\tif err == nil {\n\t\tw.WriteHeader(response.StatusCode)\n\t\tw.Write(js)\n\t} else {\n\t\thttp.Error(w, err.Error(), 500)\n\t}\n}", "title": "" }, { "docid": "861e98ab71328f810ff5214c50f420fd", "score": "0.45965114", "text": "func (t *SupplierChaincode) PayToBank(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar err error\n\tif len(args) != 3 {\n\t\treturn nil, errors.New(\"wrong number of arguments\")\n\t}\n\tbuyerId := args[0]\n\tbankId := args[1]\n\tamountToPay, _ := strconv.ParseFloat(args[2], 64)\n\n\tbuyerAsbytes, err := stub.GetState(buyerId)\n\tbankAsbytes, err := stub.GetState(bankId)\n\n\tbuyerAcc := buyer{}\n\tbankAcc := bank{}\n\terr = json.Unmarshal(buyerAsbytes, &buyerAcc)\n\terr = json.Unmarshal(bankAsbytes, &bankAcc)\n\tbuyerAcc.PendingPay -= amountToPay\n\tbuyerAcc.BuyerBalance -= amountToPay\n\tbankAcc.BankBalance += amountToPay\n\tbankAcc.AmountRecieved += amountToPay\n\tbuyerjson, _ := json.Marshal(buyerAcc)\n\tbankjson, _ := json.Marshal(bankAcc)\n\n\terr = stub.PutState(buyerId, buyerjson)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = stub.PutState(bankId, bankjson)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "a6fd318d3942f19cd35cd1977e61ea73", "score": "0.45876375", "text": "func (_KyberFeeHandlerV2 *KyberFeeHandlerV2Transactor) SetBRRData(opts *bind.TransactOpts, _burnBps *big.Int, _rewardBps *big.Int, _rebateBps *big.Int) (*types.Transaction, error) {\n\treturn _KyberFeeHandlerV2.contract.Transact(opts, \"setBRRData\", _burnBps, _rewardBps, _rebateBps)\n}", "title": "" }, { "docid": "15927a4d123c122c80103aab14097d4d", "score": "0.4557006", "text": "func TestTransferToReserveThenSupport(t *testing.T) {\n\n\t//ownerEthBal, _ := deployed.EtherTokenContract.BalanceOf(nil, context.AuthOwner.From)\n\tresEthBal, _ := deployed.EtherTokenContract.BalanceOf(nil, deployed.ReserveAddress)\n\n\t// got the 100\n\tif resEthBal.Cmp(zeroEth()) != 0 {\n\t\tt.Errorf(\"Expected reserve of 0 Eth, got: %v\", resEthBal)\n\t}\n\n\tt.Logf(\"Current Reserve balance: %v\", test.Commafy(resEthBal))\n\tt.Logf(\"Number supporters: %d\", len(supporters))\n\n\t//for name, supporter := range supporters {\n\tfor name, supporter := range supporters {\n\n\t\tetBal, _ := deployed.EtherTokenContract.BalanceOf(nil, supporter.From)\n\t\tif etBal.Cmp(big.NewInt(0)) != 0 {\n\t\t\tt.Errorf(\"Expected ether token balance of 0, got: %v\", etBal)\n\t\t}\n\t\t_, depErr := deployed.EtherTokenContract.Deposit(test.GetTxOpts(supporter,\n\t\t\toneHundredEth(), big.NewInt(test.ONE_GWEI*2), 100000))\n\t\ttest.IfNotNil(t, depErr, \"Error depositing ETH\")\n\t\tcontext.Blockchain.Commit()\n\n\t\t// snapshot current balances\n\t\tetBalNow, _ := deployed.EtherTokenContract.BalanceOf(nil, supporter.From)\n\t\tif etBalNow.Cmp(oneHundredEth()) != 0 {\n\t\t\tt.Errorf(\"Expected ether token balance of 100 eth, got: %v\", etBalNow)\n\t\t}\n\t\tmtBal, _ := deployed.MarketTokenContract.BalanceOf(nil, supporter.From)\n\t\tif mtBal.Cmp(big.NewInt(0)) != 0 {\n\t\t\tt.Errorf(\"Expected market token balance of 0, got: %v\", mtBal)\n\t\t}\n\t\tt.Logf(\"%s current market token balance: %v\", name, mtBal)\n\n\t\tsPrice, _ := deployed.ReserveContract.GetSupportPrice(nil)\n\t\tt.Logf(\"Current support price: %v\", test.Commafy(sPrice))\n\n\t\t_, approveErr := deployed.EtherTokenContract.Approve(test.GetTxOpts(supporter, nil,\n\t\t\tbig.NewInt(test.ONE_GWEI*2), 100000), deployed.ReserveAddress, oneHundredEth()) // up to 100 ETH\n\t\ttest.IfNotNil(t, approveErr, fmt.Sprintf(\"Error approving market contract to spend: %v\", approveErr))\n\t\tcontext.Blockchain.Commit()\n\n\t\tallowed, _ := deployed.EtherTokenContract.Allowance(nil, supporter.From, deployed.ReserveAddress)\n\t\tif allowed.Cmp(oneHundredEth()) != 0 {\n\t\t\tt.Errorf(\"Expected allowance of 100 ETH, got: %v\", allowed)\n\t\t}\n\n\t\t_, sErr := deployed.ReserveContract.Support(test.GetTxOpts(supporter, nil,\n\t\t\tbig.NewInt(test.ONE_GWEI*2), 250000), oneHundredEth())\n\t\ttest.IfNotNil(t, sErr, \"Error supporting\")\n\t\tcontext.Blockchain.Commit()\n\n\t\t// check current market token balance\n\t\tmtBalNow, _ := deployed.MarketTokenContract.BalanceOf(nil, supporter.From)\n\t\tif mtBalNow.Cmp(mtBal) != 1 {\n\t\t\tt.Errorf(\"Expected %v to be > %v\", mtBalNow, mtBal)\n\t\t}\n\t\tt.Logf(\"%s market token balance post 100 ETH support: %v\", name, test.Commafy(mtBalNow))\n\n\t\t// market token total supply should be updated\n\t\tmtSup, _ := deployed.MarketTokenContract.TotalSupply(nil)\n\t\tt.Logf(\"Market token total supply post %s support of 100 ETH: %v\", name, test.Commafy(mtSup))\n\n\t\t// Get new reserve balance\n\t\tresEthBal, _ = deployed.EtherTokenContract.BalanceOf(nil, deployed.ReserveAddress)\n\t\t// reserve should be updated\n\t\tt.Logf(\"Reserve balance post %s support of 100 ETH: %v\", name, test.Commafy(resEthBal))\n\n\t\tsPriceNow, _ := deployed.ReserveContract.GetSupportPrice(nil)\n\t\tt.Logf(\"Support Price post %s support of 100 ETH: %v\", name, test.Commafy(sPriceNow))\n\t}\n}", "title": "" }, { "docid": "75f8b4e623762503a59505ab089d7163", "score": "0.45393816", "text": "func (s *Server) Transfer(w http.ResponseWriter, r *http.Request) {\n\t//Struct that defines input values for this request so we can bind it\n\ttype TransferData struct {\n\t\tAmount int `json:\"amount\"`\n\t\tEmail string `json:\"email\"`\n\t}\n\n\t//Assigned needed models\n\ttransferData := TransferData{}\n\tuser := models.User{}\n\twallet := models.Wallet{}\n\t// wallettransaction := models.WalletTransaction{}\n\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tutilities.ERROR(w, http.StatusUnprocessableEntity, err, \"Sorry, An error occured!\")\n\t}\n\n\terr = json.Unmarshal(body, &transferData)\n\tif err != nil {\n\t\tutilities.ERROR(w, http.StatusUnprocessableEntity, err, \"Sorry, An error occured!\")\n\t\treturn\n\t}\n\n\t//Perform validation on TransferData inputs\n\ttransferData.Email = html.EscapeString(strings.TrimSpace(transferData.Email))\n\n\tif transferData.Amount == 0 {\n\t\tutilities.ERROR(w, http.StatusUnauthorized, errors.New(\"Amount Required\"), \"\")\n\t\treturn\n\t}\n\tif transferData.Email == \"\" {\n\t\tutilities.ERROR(w, http.StatusUnauthorized, errors.New(\"Email Required\"), \"\")\n\t\treturn\n\t}\n\n\t//Get Logged in UserID\n\tuserID, err := auth.ExtractTokenID(r)\n\tif err != nil {\n\t\tutilities.ERROR(w, http.StatusUnauthorized, errors.New(\"Unauthorized\"), \"Invalid Token\")\n\t\treturn\n\t}\n\n\t//Get Recipient's User Object\n\trecipientUser, err := user.FindUserByEmail(transferData.Email, s.DB)\n\tif err != nil {\n\t\tutilities.ERROR(w, http.StatusUnprocessableEntity, err, \"\")\n\t\treturn\n\t}\n\n\t//Fund Wallet\n\ttransactionHistory, err := wallet.Transfer(userID, recipientUser.ID, transferData.Amount, s.DB)\n\tif err != nil {\n\t\tutilities.ERROR(w, http.StatusBadRequest, err, \"\")\n\t\treturn\n\t}\n\n\tutilities.JSON(w, http.StatusOK, transactionHistory, \"Transfer was successfull\")\n}", "title": "" }, { "docid": "4ad660fd865f0ef2d7d8774bf7a5d39c", "score": "0.4538255", "text": "func ProcessUserWithdrawals(coin string) (bool, error) {\n\n // Checkout withdrawals\n // TODO: Gather multiple small withdrawals.\n wths := account.CheckoutWithdrawals(coin, 1)\n if len(wths) == 0 {\n return false, nil\n }\n wthIds := Map(wths, \"Id\")\n amounts := map[string]uint64{}\n amountSum := uint64(0)\n for _, wth := range wths {\n if wth.Amount <= 0 { panic(NewError(\"Invalid send amount %v\", wth.Amount)) }\n amounts[wth.ToAddress] += uint64(wth.Amount)\n amountSum += uint64(wth.Amount)\n }\n\n // figure out which payments to use.\n signedTx, payments, minerFees, chgAddress, err := ComputeWithdrawalTransaction(coin, amounts)\n if err != nil {\n account.StallWithdrawals(wthIds)\n return false, err\n }\n paymentIds := Map(payments, \"Id\")\n\n // save withdrawal info for bookkeeping.\n wthTx := SaveWithdrawalTx(&WithdrawalTx{\n Coin: coin,\n Type: WITHDRAWAL_TX_TYPE_WITHDRAWAL,\n Amount: amountSum,\n MinerFee: minerFees,\n ChgAddress: chgAddress,\n RawTx: signedTx,\n TxId: bitcoin.ComputeTxId(signedTx),\n })\n\n // checkout those payments.\n bitcoin.CheckoutPaymentsToSpend(paymentIds, wthTx.Id)\n\n // TODO: the Tx should go out to our partners who sign them for us.\n // TODO: receive the signed Tx.\n\n // deduct change amount from system user's \"change\" wallet.\n // this creates a negative balance, which will revert to zero\n // when the change is received.\n if chgAddress != \"\" {\n changeAmount := amounts[chgAddress]\n err := db.DoBeginSerializable(func(tx *db.ModelTx) {\n account.UpdateBalanceByWallet(tx, 0, account.WALLET_CHANGE, coin, -int64(changeAmount), false)\n })\n if err != nil { panic(err) }\n }\n\n // broadcast transaction.\n rpc.SendRawTransaction(coin, signedTx)\n\n // update payments as spent.\n bitcoin.MarkPaymentsAsSpent(paymentIds, wthTx.Id)\n\n // update withdrawals as complete.\n account.CompleteWithdrawals(wths, wthTx.Id)\n\n return true, nil\n}", "title": "" }, { "docid": "f02f984c0d72f0941ca4def965b62063", "score": "0.45328662", "text": "func Transfer(db vmPtr.StateDB, sender, recipient bgmcommon.Address, amount *big.Int) {\n\tdbPtr.SubBalance(sender, amount)\n\tdbPtr.AddBalance(recipient, amount)\n}", "title": "" }, { "docid": "868bb96f48ce1d40831085ce0f5384a9", "score": "0.45313776", "text": "func Stress(t *testkit.TestEnvironment) error {\n\t// Dispatch/forward non-client roles to defaults.\n\tif t.Role != \"client\" {\n\t\treturn testkit.HandleDefaultRole(t)\n\t}\n\n\t// This is a client role.\n\tt.RecordMessage(\"running payments client\")\n\n\tvar (\n\t\t// lanes to open; vouchers will be distributed across these lanes in round-robin fashion\n\t\tlaneCount = t.IntParam(\"lane_count\")\n\t\t// increments in which to send payment vouchers\n\t\tincrements = big.Mul(big.NewInt(int64(t.IntParam(\"increments\"))), abi.TokenPrecision)\n\t)\n\n\tctx := context.Background()\n\tcl, err := testkit.PrepareClient(t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// are we the receiver or a sender?\n\tmode := \"sender\"\n\tif t.GroupSeq == 1 {\n\t\tmode = \"receiver\"\n\t}\n\n\tt.RecordMessage(\"acting as %s\", mode)\n\n\tvar clients []*testkit.ClientAddressesMsg\n\tsctx, cancel := context.WithCancel(ctx)\n\tclientsCh := make(chan *testkit.ClientAddressesMsg)\n\tt.SyncClient.MustSubscribe(sctx, testkit.ClientsAddrsTopic, clientsCh)\n\tfor i := 0; i < t.TestGroupInstanceCount; i++ {\n\t\tclients = append(clients, <-clientsCh)\n\t}\n\tcancel()\n\n\tswitch mode {\n\tcase \"receiver\":\n\t\t// one receiver, everyone else is a sender.\n\t\t<-t.SyncClient.MustBarrier(ctx, SendersDoneState, t.TestGroupInstanceCount-1).C\n\n\tcase \"sender\":\n\t\t// we're going to lock up all our funds into this one payment channel.\n\t\trecv := clients[0]\n\t\tbalance, err := cl.FullApi.WalletBalance(ctx, cl.Wallet.Address)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to acquire wallet balance: %w\", err)\n\t\t}\n\n\t\tt.RecordMessage(\"my balance: %d\", balance)\n\t\tt.RecordMessage(\"creating payment channel; from=%s, to=%s, funds=%d\", cl.Wallet.Address, recv.WalletAddr, balance)\n\n\t\tpid := os.Getpid()\n\t\tt.RecordMessage(\"sender pid: %d\", pid)\n\n\t\ttime.Sleep(20 * time.Second)\n\n\t\tchannel, err := cl.FullApi.PaychGet(ctx, cl.Wallet.Address, recv.WalletAddr, balance)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to create payment channel: %w\", err)\n\t\t}\n\n\t\tif addr := channel.Channel; addr != address.Undef {\n\t\t\treturn fmt.Errorf(\"expected an Undef channel address, got: %s\", addr)\n\t\t}\n\n\t\tt.RecordMessage(\"payment channel created; msg_cid=%s\", channel.ChannelMessage)\n\t\tt.RecordMessage(\"waiting for payment channel message to appear on chain\")\n\n\t\t// wait for the channel creation message to appear on chain.\n\t\t_, err = cl.FullApi.StateWaitMsg(ctx, channel.ChannelMessage, 2)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed while waiting for payment channel creation msg to appear on chain: %w\", err)\n\t\t}\n\n\t\t// need to wait so that the channel is tracked.\n\t\t// the full API waits for build.MessageConfidence (=1 in tests) before tracking the channel.\n\t\t// we wait for 2 confirmations, so we have the assurance the channel is tracked.\n\n\t\tt.RecordMessage(\"reloading paych; now it should have an address\")\n\t\tchannel, err = cl.FullApi.PaychGet(ctx, cl.Wallet.Address, recv.WalletAddr, big.Zero())\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to reload payment channel: %w\", err)\n\t\t}\n\n\t\tt.RecordMessage(\"channel address: %s\", channel.Channel)\n\t\tt.RecordMessage(\"allocating lanes; count=%d\", laneCount)\n\n\t\t// allocate as many lanes as required\n\t\tvar lanes []uint64\n\t\tfor i := 0; i < laneCount; i++ {\n\t\t\tlane, err := cl.FullApi.PaychAllocateLane(ctx, channel.Channel)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"failed to allocate lane: %w\", err)\n\t\t\t}\n\t\t\tlanes = append(lanes, lane)\n\t\t}\n\n\t\tt.RecordMessage(\"lanes allocated; count=%d\", laneCount)\n\t\tt.RecordMessage(\"sending payments in round-robin fashion across lanes; increments=%d\", increments)\n\n\t\t// start sending payments\n\t\tzero := big.Zero()\n\n\tOuter:\n\t\tfor remaining := balance; remaining.GreaterThan(zero); {\n\t\t\tfor _, lane := range lanes {\n\t\t\t\tvoucher, err := cl.FullApi.PaychVoucherCreate(ctx, channel.Channel, increments, lane)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"failed to create voucher: %w\", err)\n\t\t\t\t}\n\t\t\t\tt.RecordMessage(\"payment voucher created; lane=%d, nonce=%d, amount=%d\", voucher.Lane, voucher.Nonce, voucher.Amount)\n\n\t\t\t\tcid, err := cl.FullApi.PaychVoucherSubmit(ctx, channel.Channel, voucher)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"failed to submit voucher: %w\", err)\n\t\t\t\t}\n\t\t\t\tt.RecordMessage(\"payment voucher submitted; msg_cid=%s, lane=%d, nonce=%d, amount=%d\", cid, voucher.Lane, voucher.Nonce, voucher.Amount)\n\n\t\t\t\tremaining = types.BigSub(remaining, increments)\n\t\t\t\tt.RecordMessage(\"remaining balance: %d\", remaining)\n\t\t\t\tif remaining.LessThanEqual(zero) {\n\t\t\t\t\t// we have no more funds remaining.\n\t\t\t\t\tbreak Outer\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tt.RecordMessage(\"finished sending all payment vouchers\")\n\n\t\tt.SyncClient.MustSignalEntry(ctx, SendersDoneState)\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "dba7490771be0ac340773d5c11a31057", "score": "0.45222172", "text": "func (client BaseClient) UpdateWalletMethodSender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req,\n autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))\n }", "title": "" }, { "docid": "569c7eb5582e26889d7f4f588714cc15", "score": "0.45155695", "text": "func (s *Simulator) sendTxsToAndFro() {\n\ttransferAmount := 1\n\tFromID := uint64(2)\n\tToID := uint64(3)\n\n\tif s.toSwap {\n\t\ttempID := FromID\n\t\tFromID = ToID\n\t\tToID = tempID\n\t\ts.toSwap = !s.toSwap\n\t}\n\n\tfor i := 0; i < 3; i++ {\n\t\tlatestFromAcc, err := s.DB.GetAccountByID(FromID)\n\t\tif err != nil {\n\t\t\ts.Logger.Error(\"unable to fetch latest account\", \"error\", err)\n\t\t\treturn\n\t\t}\n\t\t_, _, nonce, token, err := s.LoadedBazooka.DecodeAccount(latestFromAcc.Data)\n\t\tif err != nil {\n\t\t\ts.Logger.Error(\"unable to decode account\", \"error\", err)\n\t\t\treturn\n\t\t}\n\t\ttxBytes, err := s.LoadedBazooka.EncodeTransferTx(int64(FromID), int64(ToID), int64(token.Uint64()), int64(nonce.Uint64())+1, int64(transferAmount), 1)\n\t\tif err != nil {\n\t\t\ts.Logger.Error(\"unable to encode tx\", \"error\", err)\n\t\t\treturn\n\t\t}\n\t\ttxCore := core.NewPendingTx(FromID, ToID, core.TX_TRANSFER_TYPE, \"0x1ad4773ace8ee65b8f1d94a3ca7adba51ee2ca0bdb550907715b3b65f1e3ad9f69e610383dc9ceb8a50c882da4b1b98b96500bdf308c1bdce2187cb23b7d736f1b\", txBytes)\n\n\t\terr = s.DB.InsertTx(&txCore)\n\t\tif err != nil {\n\t\t\ts.Logger.Error(\"unable to insert tx\", \"error\", err)\n\t\t\treturn\n\t\t}\n\t\ts.Logger.Info(\"Sent a tx!\", \"TxHash\", txCore.TxHash, \"From\", txCore.From, \"To\", txCore.To)\n\n\t\tif txCore.From == uint64(2) {\n\t\t\ts.toSwap = true\n\t\t}\n\t}\n}", "title": "" }, { "docid": "63dea99705f2dd9e98c043eefde2a77e", "score": "0.45086703", "text": "func (t *TradeWorkflowChaincode) acceptShipmentAndIssueBL(stub shim.ChaincodeStubInterface, creatorOrg string, creatorCertIssuer string, args []string) pb.Response {\n\tvar shipmentLocationKey, blKey, tradeKey string\n\tvar shipmentLocationBytes, tradeAgreementBytes, billOfLadingBytes, exporterBytes, carrierBytes, beneficiaryBytes []byte\n\tvar billOfLading *BillOfLading\n\tvar tradeAgreement *TradeAgreement\n\tvar err error\n\n\t// Access control: Only an Carrier Org member can invoke this transaction\n\tif !t.testMode && !authenticateCarrierOrg(creatorOrg, creatorCertIssuer) {\n\t\treturn shim.Error(\"Caller not a member of Carrier Org. Access denied.\")\n\t}\n\n\tif len(args) != 5 {\n\t\terr = errors.New(fmt.Sprintf(\"Incorrect number of arguments. Expecting 5: {Trade ID, B/L ID, Expiration Date, Source Port, Destination Port}. Found %d\", len(args)))\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// Lookup shipment location from the ledger\n\tshipmentLocationKey, err = getShipmentLocationKey(stub, args[0])\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tshipmentLocationBytes, err = stub.GetState(shipmentLocationKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tif len(shipmentLocationBytes) == 0 {\n\t\tfmt.Printf(\"Shipment for trade %s has not been prepared yet\", args[0])\n\t\treturn shim.Error(\"Shipment not prepared yet\")\n\t}\n\tif string(shipmentLocationBytes) != SOURCE {\n\t\tfmt.Printf(\"Shipment for trade %s has passed the preparation stage\", args[0])\n\t\treturn shim.Error(\"Shipment past the preparation stage\")\n\t}\n\n\t// Lookup trade agreement from the ledger\n\ttradeKey, err = getTradeKey(stub, args[0])\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\ttradeAgreementBytes, err = stub.GetState(tradeKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tif len(tradeAgreementBytes) == 0 {\n\t\terr = errors.New(fmt.Sprintf(\"No record found for trade ID %s\", args[0]))\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// Unmarshal the JSON\n\terr = json.Unmarshal(tradeAgreementBytes, &tradeAgreement)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// Lookup exporter\n\texporterBytes, err = stub.GetState(expKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// Lookup carrier\n\tcarrierBytes, err = stub.GetState(carKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// Lookup importer's bank (beneficiary of the title to goods after paymen tis made)\n\tbeneficiaryBytes, err = stub.GetState(ibKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// Create and record a B/L\n\tbillOfLading = &BillOfLading{args[1], args[2], string(exporterBytes), string(carrierBytes), tradeAgreement.DescriptionOfGoods,\n\t\t\t\t tradeAgreement.Amount, string(beneficiaryBytes), args[3], args[4]}\n\tbillOfLadingBytes, err = json.Marshal(billOfLading)\n\tif err != nil {\n\t\treturn shim.Error(\"Error marshaling bill of lading structure\")\n\t}\n\n\t// Write the state to the ledger\n\tblKey, err = getBLKey(stub, args[0])\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\terr = stub.PutState(blKey, billOfLadingBytes)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tfmt.Printf(\"Bill of Lading for trade %s recorded\\n\", args[0])\n\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "809376034f6a09810b61d421073bd0f8", "score": "0.45075744", "text": "func responsePPOBPayment(jsonIso PPOBPaymentRequest) PPOBPaymentResponse {\n\tvar response PPOBPaymentResponse\n\n\t// Client setup for custom http request\n\tclient := &http.Client{}\n\tvar baseURL = \"https://chipsakti-mock.herokuapp.com\"\n\tamount := strconv.Itoa(jsonIso.Amount)\n\n\t// Set data to be encoded\n\tvar param = url.Values{}\n\tparam.Set(\"transaction_id\", jsonIso.TransactionID)\n\tparam.Set(\"partner_id\", jsonIso.PartnerID)\n\tparam.Set(\"product_code\", jsonIso.ProductCode)\n\tparam.Set(\"customer_no\", jsonIso.CustomerNo)\n\tparam.Set(\"reff_id\", jsonIso.ReffID)\n\tparam.Set(\"amount\", amount)\n\tparam.Set(\"merchant_code\", jsonIso.MerchantCode)\n\tparam.Set(\"request_time\", jsonIso.RequestTime)\n\tparam.Set(\"signature\", jsonIso.Signature)\n\n\tlog.Printf(\"Send request to https://chipsakti-mock.herokuapp.com/payment\\n\")\n\n\t// Request to Biller\n\tvar payload = bytes.NewBufferString(param.Encode())\n\treq, err := http.NewRequest(\"POST\", baseURL+\"/payment\", payload)\n\treq.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to sent request to https://chipsakti-mock.herokuapp.com/payment. Error: %v\\n\", err)\n\t}\n\n\t// Check response from Biller\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to get response from https://chipsakti-mock.herokuapp.com/payment. Error: %v\\n\", err)\n\t}\n\n\tdefer resp.Body.Close()\n\n\tlog.Printf(\"Receive response from https://chipsakti-mock.herokuapp.com/payment\\n\")\n\n\t// Read response from Biller\n\tbody, _ := ioutil.ReadAll(resp.Body)\n\tjson.Unmarshal(body, &response)\n\n\treturn response\n}", "title": "" }, { "docid": "ecb0059c28432f30ba98202ba58235b0", "score": "0.44944784", "text": "func BalanceUpdateForPFS(w rest.ResponseWriter, r *rest.Request) {\n\tvar resp *dto.APIResponse\n\tdefer func() {\n\t\tlog.Trace(fmt.Sprintf(\"Restful Api Call ----> BalanceUpdateForPFS ,err=%s\", resp.ToFormatString()))\n\t\twritejson(w, resp)\n\t}()\n\tch := r.PathParam(\"channel\")\n\tchannelIdentifier := common.HexToHash(ch)\n\tif channelIdentifier == utils.EmptyHash {\n\t\tresp = dto.NewExceptionAPIResponse(rerr.ErrArgumentError)\n\t\treturn\n\t}\n\tresult, err := API.BalanceProofForPFS(channelIdentifier)\n\tresp = dto.NewAPIResponse(err, result)\n}", "title": "" }, { "docid": "e3b36bf3a8cf59c02b75b626dcb7416b", "score": "0.44880044", "text": "func _helpTestCreatorCoinBuySell(\n\tt *testing.T,\n\tcreatorCoinTests []*_CreatorCoinTestData,\n\tbitCloutFounderReward bool) {\n\n\t// These are block heights where bitclout forked.\n\tSalomonFixBlockHeight = 0\n\tBitCloutFounderRewardBlockHeight = 0\n\tif !bitCloutFounderReward {\n\t\tBitCloutFounderRewardBlockHeight = 1e9\n\t}\n\n\t// Set up a blockchain\n\tassert := assert.New(t)\n\trequire := require.New(t)\n\t_, _ = assert, require\n\n\tchain, params, db := NewLowDifficultyBlockchain()\n\tmempool, miner := NewTestMiner(t, chain, params, true /*isSender*/)\n\tfeeRateNanosPerKB := uint64(11)\n\t_, _ = mempool, miner\n\n\t// Create a paramUpdater for this test\n\tparams.ParamUpdaterPublicKeys[MakePkMapKey(paramUpdaterPkBytes)] = true\n\n\t// Give paramUpdater some mony\n\t_, _, _ = _doBasicTransferWithViewFlush(\n\t\tt, chain, db, params, moneyPkString, paramUpdaterPub,\n\t\tmoneyPrivString, 6*NanosPerUnit /*amount to send*/, feeRateNanosPerKB /*feerate*/)\n\n\t// Send money to people from moneyPk\n\t_, _, _ = _doBasicTransferWithViewFlush(\n\t\tt, chain, db, params, moneyPkString, m0Pub,\n\t\tmoneyPrivString, 6*NanosPerUnit /*amount to send*/, feeRateNanosPerKB /*feerate*/)\n\t_, _, _ = _doBasicTransferWithViewFlush(\n\t\tt, chain, db, params, moneyPkString, m1Pub,\n\t\tmoneyPrivString, 6*NanosPerUnit /*amount to send*/, feeRateNanosPerKB /*feerate*/)\n\t_, _, _ = _doBasicTransferWithViewFlush(\n\t\tt, chain, db, params, moneyPkString, m2Pub,\n\t\tmoneyPrivString, 6*NanosPerUnit /*amount to send*/, feeRateNanosPerKB /*feerate*/)\n\t_, _, _ = _doBasicTransferWithViewFlush(\n\t\tt, chain, db, params, moneyPkString, m3Pub,\n\t\tmoneyPrivString, 6*NanosPerUnit /*amount to send*/, feeRateNanosPerKB /*feerate*/)\n\t_, _, _ = _doBasicTransferWithViewFlush(\n\t\tt, chain, db, params, moneyPkString, m4Pub,\n\t\tmoneyPrivString, 6*NanosPerUnit /*amount to send*/, feeRateNanosPerKB /*feerate*/)\n\t_, _, _ = _doBasicTransferWithViewFlush(\n\t\tt, chain, db, params, moneyPkString, m5Pub,\n\t\tmoneyPrivString, 6*NanosPerUnit /*amount to send*/, feeRateNanosPerKB /*feerate*/)\n\t_, _, _ = _doBasicTransferWithViewFlush(\n\t\tt, chain, db, params, moneyPkString, m6Pub,\n\t\tmoneyPrivString, 6*NanosPerUnit /*amount to send*/, feeRateNanosPerKB /*feerate*/)\n\n\tm0StartNanos := _getBalance(t, chain, nil, m0Pub)\n\tm1StartNanos := _getBalance(t, chain, nil, m1Pub)\n\tm2StartNanos := _getBalance(t, chain, nil, m2Pub)\n\tm3StartNanos := _getBalance(t, chain, nil, m3Pub)\n\tm4StartNanos := _getBalance(t, chain, nil, m4Pub)\n\tm5StartNanos := _getBalance(t, chain, nil, m5Pub)\n\tm6StartNanos := _getBalance(t, chain, nil, m6Pub)\n\n\ttestUtxoOps := [][]*UtxoOperation{}\n\ttestTxns := []*MsgBitCloutTxn{}\n\t_checkTestData := func(\n\t\ttestData *_CreatorCoinTestData, message string, utxoView *UtxoView, mempool *BitCloutMempool) {\n\n\t\t// If we were instructed to skip these checks then skip them.\n\t\tif testData.SkipChecks {\n\t\t\treturn\n\t\t}\n\n\t\t// If a mempool object is provided then just check balances and return\n\t\tif mempool != nil {\n\t\t\t// BitClout balances\n\t\t\tif _getBalance(t, chain, mempool, m0Pub) != 6*NanosPerUnit && testData.m0BitCloutBalance != 0 {\n\t\t\t\tassert.Equalf(int64(testData.m0BitCloutBalance),\n\t\t\t\t\tint64(_getBalance(t, chain, mempool, m0Pub)), \"MempoolIncrementalBalanceCheck: m0 BitClout balance: %v\", message)\n\t\t\t}\n\t\t\tif _getBalance(t, chain, mempool, m1Pub) != 6*NanosPerUnit && testData.m1BitCloutBalance != 0 {\n\t\t\t\tassert.Equalf(int64(testData.m1BitCloutBalance),\n\t\t\t\t\tint64(_getBalance(t, chain, mempool, m1Pub)), \"MempoolIncrementalBalanceCheck: m1 BitClout balance: %v\", message)\n\t\t\t}\n\t\t\tif _getBalance(t, chain, mempool, m2Pub) != 6*NanosPerUnit && testData.m2BitCloutBalance != 0 {\n\t\t\t\tassert.Equalf(int64(testData.m2BitCloutBalance),\n\t\t\t\t\tint64(_getBalance(t, chain, mempool, m2Pub)), \"MempoolIncrementalBalanceCheck: m2 BitClout balance: %v\", message)\n\t\t\t}\n\t\t\tif _getBalance(t, chain, mempool, m3Pub) != 6*NanosPerUnit && testData.m3BitCloutBalance != 0 {\n\t\t\t\tassert.Equalf(int64(testData.m3BitCloutBalance),\n\t\t\t\t\tint64(_getBalance(t, chain, mempool, m3Pub)), \"MempoolIncrementalBalanceCheck: m3 BitClout balance: %v\", message)\n\t\t\t}\n\t\t\tif _getBalance(t, chain, mempool, m4Pub) != 6*NanosPerUnit && testData.m4BitCloutBalance != 0 {\n\t\t\t\tassert.Equalf(int64(testData.m4BitCloutBalance),\n\t\t\t\t\tint64(_getBalance(t, chain, mempool, m4Pub)), \"MempoolIncrementalBalanceCheck: m4 BitClout balance: %v\", message)\n\t\t\t}\n\t\t\tif _getBalance(t, chain, mempool, m5Pub) != 6*NanosPerUnit && testData.m5BitCloutBalance != 0 {\n\t\t\t\tassert.Equalf(int64(testData.m5BitCloutBalance),\n\t\t\t\t\tint64(_getBalance(t, chain, mempool, m5Pub)), \"MempoolIncrementalBalanceCheck: m5 BitClout balance: %v\", message)\n\t\t\t}\n\t\t\tif _getBalance(t, chain, mempool, m6Pub) != 6*NanosPerUnit && testData.m6BitCloutBalance != 0 {\n\t\t\t\tassert.Equalf(int64(testData.m6BitCloutBalance),\n\t\t\t\t\tint64(_getBalance(t, chain, mempool, m6Pub)), \"MempoolIncrementalBalanceCheck: m6 BitClout balance: %v\", message)\n\t\t\t}\n\n\t\t\treturn\n\t\t}\n\n\t\t// If no UtxoView is passed, use a new one to run our checks.\n\t\tif utxoView == nil {\n\t\t\tvar err error\n\t\t\tutxoView, err = NewUtxoView(db, params, nil)\n\t\t\trequire.NoError(err)\n\t\t}\n\n\t\t// Profile fields\n\t\tcreatorPkBytes, _, _ := Base58CheckDecode(testData.ProfilePublicKeyBase58Check)\n\t\tcreatorProfile := utxoView.GetProfileEntryForPublicKey(creatorPkBytes)\n\t\trequire.NotNil(creatorProfile)\n\n\t\tassert.Equalf(int64(testData.CoinsInCirculationNanos),\n\t\t\tint64(creatorProfile.CoinsInCirculationNanos), \"CoinsInCirculationNanos: %v\", message)\n\t\tassert.Equalf(int64(testData.BitCloutLockedNanos),\n\t\t\tint64(creatorProfile.BitCloutLockedNanos), \"BitCloutLockedNanos: %v\", message)\n\t\tassert.Equalf(int64(testData.CoinWatermarkNanos),\n\t\t\tint64(creatorProfile.CoinWatermarkNanos), \"CoinWatermarkNanos: %v\", message)\n\n\t\t// Coin balances, also used for figuring out how many holders hold a creator.\n\t\t// m0\n\t\tactualNumberOfHolders := uint64(0)\n\t\tm0BalanceEntry, _, _ := utxoView._getBalanceEntryForHODLerPubKeyAndCreatorPubKey(m0PkBytes, creatorPkBytes)\n\t\tif m0BalanceEntry != nil && !m0BalanceEntry.isDeleted {\n\t\t\tassert.Equalf(int64(testData.m0CCBalance),\n\t\t\t\tint64(m0BalanceEntry.BalanceNanos), \"m0CCBalance: %v\", message)\n\t\t\tif m0BalanceEntry.BalanceNanos > 0 {\n\t\t\t\tactualNumberOfHolders += 1\n\t\t\t}\n\t\t\tassert.Equal(testData.m0HasPurchased, m0BalanceEntry.HasPurchased)\n\t\t} else {\n\t\t\tassert.Equalf(int64(testData.m0CCBalance),\n\t\t\t\tint64(0), \"m0CCBalance: %v\", message)\n\t\t\tassert.Equal(testData.m0HasPurchased, false)\n\t\t}\n\t\t// m1\n\t\tm1BalanceEntry, _, _ := utxoView._getBalanceEntryForHODLerPubKeyAndCreatorPubKey(m1PkBytes, creatorPkBytes)\n\t\tif m1BalanceEntry != nil && !m1BalanceEntry.isDeleted {\n\t\t\tassert.Equalf(int64(testData.m1CCBalance),\n\t\t\t\tint64(m1BalanceEntry.BalanceNanos), \"m1CCBalance: %v\", message)\n\t\t\tif m1BalanceEntry.BalanceNanos > 0 {\n\t\t\t\tactualNumberOfHolders += 1\n\t\t\t}\n\t\t\tassert.Equal(testData.m1HasPurchased, m1BalanceEntry.HasPurchased)\n\t\t} else {\n\t\t\tassert.Equalf(int64(testData.m1CCBalance),\n\t\t\t\tint64(0), \"m1CCBalance: %v\", message)\n\t\t\tassert.Equal(testData.m1HasPurchased, false)\n\t\t}\n\t\t// m2\n\t\tm2BalanceEntry, _, _ := utxoView._getBalanceEntryForHODLerPubKeyAndCreatorPubKey(m2PkBytes, creatorPkBytes)\n\t\tif m2BalanceEntry != nil && !m2BalanceEntry.isDeleted {\n\t\t\tassert.Equalf(int64(testData.m2CCBalance),\n\t\t\t\tint64(m2BalanceEntry.BalanceNanos), \"%v\", message)\n\t\t\tif m2BalanceEntry.BalanceNanos > 0 {\n\t\t\t\tactualNumberOfHolders += 1\n\t\t\t}\n\t\t\tassert.Equal(testData.m2HasPurchased, m2BalanceEntry.HasPurchased)\n\t\t} else {\n\t\t\tassert.Equalf(int64(testData.m2CCBalance),\n\t\t\t\tint64(0), \"m2CCBalance: %v\", message)\n\t\t\tassert.Equal(testData.m2HasPurchased, false)\n\t\t}\n\t\t// m3\n\t\tm3BalanceEntry, _, _ := utxoView._getBalanceEntryForHODLerPubKeyAndCreatorPubKey(m3PkBytes, creatorPkBytes)\n\t\tif m3BalanceEntry != nil && !m3BalanceEntry.isDeleted {\n\t\t\tassert.Equalf(int64(testData.m3CCBalance),\n\t\t\t\tint64(m3BalanceEntry.BalanceNanos), \"%v\", message)\n\t\t\tif m3BalanceEntry.BalanceNanos > 0 {\n\t\t\t\tactualNumberOfHolders += 1\n\t\t\t}\n\t\t\tassert.Equal(testData.m3HasPurchased, m3BalanceEntry.HasPurchased)\n\t\t} else {\n\t\t\tassert.Equalf(int64(testData.m3CCBalance),\n\t\t\t\tint64(0), \"m3CCBalance: %v\", message)\n\t\t\tassert.Equal(testData.m3HasPurchased, false)\n\t\t}\n\t\t// m4\n\t\tm4BalanceEntry, _, _ := utxoView._getBalanceEntryForHODLerPubKeyAndCreatorPubKey(m4PkBytes, creatorPkBytes)\n\t\tif m4BalanceEntry != nil && !m4BalanceEntry.isDeleted {\n\t\t\tassert.Equalf(int64(testData.m4CCBalance),\n\t\t\t\tint64(m4BalanceEntry.BalanceNanos), \"%v\", message)\n\t\t\tif m4BalanceEntry.BalanceNanos > 0 {\n\t\t\t\tactualNumberOfHolders += 1\n\t\t\t}\n\t\t\tassert.Equal(testData.m4HasPurchased, m4BalanceEntry.HasPurchased)\n\t\t} else {\n\t\t\tassert.Equalf(int64(testData.m4CCBalance),\n\t\t\t\tint64(0), \"m4CCBalance: %v\", message)\n\t\t\tassert.Equal(testData.m4HasPurchased, false)\n\t\t}\n\t\t// m5\n\t\tm5BalanceEntry, _, _ := utxoView._getBalanceEntryForHODLerPubKeyAndCreatorPubKey(m5PkBytes, creatorPkBytes)\n\t\tif m5BalanceEntry != nil && !m5BalanceEntry.isDeleted {\n\t\t\tassert.Equalf(int64(testData.m5CCBalance),\n\t\t\t\tint64(m5BalanceEntry.BalanceNanos), \"%v\", message)\n\t\t\tif m5BalanceEntry.BalanceNanos > 0 {\n\t\t\t\tactualNumberOfHolders += 1\n\t\t\t}\n\t\t\tassert.Equal(testData.m5HasPurchased, m5BalanceEntry.HasPurchased)\n\t\t} else {\n\t\t\tassert.Equalf(int64(testData.m5CCBalance),\n\t\t\t\tint64(0), \"m5CCBalance: %v\", message)\n\t\t\tassert.Equal(testData.m5HasPurchased, false)\n\t\t}\n\t\t// m6\n\t\tm6BalanceEntry, _, _ := utxoView._getBalanceEntryForHODLerPubKeyAndCreatorPubKey(m6PkBytes, creatorPkBytes)\n\t\tif m6BalanceEntry != nil && !m6BalanceEntry.isDeleted {\n\t\t\tassert.Equalf(int64(testData.m6CCBalance),\n\t\t\t\tint64(m6BalanceEntry.BalanceNanos), \"%v\", message)\n\t\t\tif m6BalanceEntry.BalanceNanos > 0 {\n\t\t\t\tactualNumberOfHolders += 1\n\t\t\t}\n\t\t\tassert.Equal(testData.m6HasPurchased, m6BalanceEntry.HasPurchased)\n\t\t} else {\n\t\t\tassert.Equalf(int64(testData.m6CCBalance),\n\t\t\t\tint64(0), \"m6CCBalance: %v\", message)\n\t\t\tassert.Equal(testData.m6HasPurchased, false)\n\t\t}\n\n\t\t// creatorNumberOfHolders must equal creatorProfile.NumberOfHolders\n\t\tassert.Equalf(actualNumberOfHolders, creatorProfile.NumberOfHolders,\n\t\t\t\"Actual number of creators != creatorProfile.NumberOfHolders: %v\", message)\n\n\t\t// Coins in m0+m1+m2+m3+m4+m5+m6 must equal the circulating supply\n\t\tassert.Equalf(\n\t\t\tint64(testData.m0CCBalance+testData.m1CCBalance+testData.m2CCBalance+testData.m3CCBalance+\n\t\t\t\ttestData.m4CCBalance+testData.m5CCBalance+testData.m6CCBalance),\n\t\t\tint64(creatorProfile.CoinsInCirculationNanos),\n\t\t\t\"m0+m1+m2+m3+m4+m5+m6 != CoinsInCirculationNanos: %v\", message)\n\n\t\t// BitClout balances\n\t\tif _getBalanceWithView(t, utxoView, m0Pub) != 6*NanosPerUnit && testData.m0BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m0BitCloutBalance),\n\t\t\t\tint64(_getBalanceWithView(t, utxoView, m0Pub)), \"m0 BitClout balance: %v\", message)\n\t\t}\n\t\tif _getBalanceWithView(t, utxoView, m1Pub) != 6*NanosPerUnit && testData.m1BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m1BitCloutBalance),\n\t\t\t\tint64(_getBalanceWithView(t, utxoView, m1Pub)), \"m1 BitClout balance: %v\", message)\n\t\t}\n\t\tif _getBalanceWithView(t, utxoView, m2Pub) != 6*NanosPerUnit && testData.m2BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m2BitCloutBalance),\n\t\t\t\tint64(_getBalanceWithView(t, utxoView, m2Pub)), \"m2 BitClout balance: %v\", message)\n\t\t}\n\t\tif _getBalanceWithView(t, utxoView, m3Pub) != 6*NanosPerUnit && testData.m3BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m3BitCloutBalance),\n\t\t\t\tint64(_getBalanceWithView(t, utxoView, m3Pub)), \"m3 BitClout balance: %v\", message)\n\t\t}\n\t\tif _getBalanceWithView(t, utxoView, m4Pub) != 6*NanosPerUnit && testData.m4BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m4BitCloutBalance),\n\t\t\t\tint64(_getBalanceWithView(t, utxoView, m4Pub)), \"m4 BitClout balance: %v\", message)\n\t\t}\n\t\tif _getBalanceWithView(t, utxoView, m5Pub) != 6*NanosPerUnit && testData.m5BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m5BitCloutBalance),\n\t\t\t\tint64(_getBalanceWithView(t, utxoView, m5Pub)), \"m5 BitClout balance: %v\", message)\n\t\t}\n\t\tif _getBalanceWithView(t, utxoView, m6Pub) != 6*NanosPerUnit && testData.m6BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m6BitCloutBalance),\n\t\t\t\tint64(_getBalanceWithView(t, utxoView, m6Pub)), \"m6 BitClout balance: %v\", message)\n\t\t}\n\n\t\tfor ii, profilePubStr := range testData.ProfilesToCheckPublicKeysBase58Check {\n\t\t\t// Look up the profile for the public key.\n\t\t\tprofilePkBytes, _, _ := Base58CheckDecode(profilePubStr)\n\t\t\tprofileEntry := utxoView.GetProfileEntryForPublicKey(profilePkBytes)\n\t\t\tif testData.ProfilesToCheckUsernames[ii] == \"\" {\n\t\t\t\tif profileEntry != nil && !profileEntry.isDeleted {\n\t\t\t\t\trequire.Fail(\"Profile for pub key %v should not exist but does: index %v: %v\", profilePubStr, ii, message)\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t} else {\n\t\t\t\trequire.NotNil(profileEntry, \"Profile for pub key %v does not exist: index %v: %v\", profilePubStr, ii, message)\n\t\t\t}\n\t\t\trequire.Equalf(profilePkBytes, profileEntry.PublicKey, \"Profile public keys don't match: index %v: %v\", ii, message)\n\t\t\trequire.Equalf(string(profileEntry.Username), testData.ProfilesToCheckUsernames[ii], \"Profile usernames don't match: index %v: %v\", ii, message)\n\t\t\trequire.Equalf(string(profileEntry.Description), testData.ProfilesToCheckDescriptions[ii], \"Profile descripptions don't match: index %v: %v\", ii, message)\n\t\t\trequire.Equalf(string(profileEntry.ProfilePic), testData.ProfilesToCheckProfilePic[ii], \"Profile profile pics don't match: index %v: %v\", ii, message)\n\t\t}\n\n\t\tfor ii, userPubStr := range testData.FollowPublicKeysToCheck {\n\t\t\t// Look up the profile for the public key.\n\t\t\tuserPkBytes, _, _ := Base58CheckDecode(userPubStr)\n\n\t\t\tuserIsFollowing := testData.FollowPublicKeysUserIsFollowing[ii]\n\t\t\tfollowingUser := testData.FollowPublicKeysFollowingThisUser[ii]\n\n\t\t\t// Look up the public keys that are following this user.\n\t\t\t{\n\t\t\t\tfollowEntries, err := utxoView.GetFollowEntriesForPublicKey(\n\t\t\t\t\tuserPkBytes, true /*followingPublicKey*/)\n\t\t\t\trequire.NoError(err)\n\n\t\t\t\trequire.Equal(len(followEntries), len(followingUser))\n\n\t\t\t\tfor _, followEntry := range followEntries {\n\t\t\t\t\tfollowPk := utxoView.GetPublicKeyForPKID(followEntry.FollowerPKID)\n\t\t\t\t\tif _, exists := followingUser[PkToString(followPk, params)]; !exists {\n\t\t\t\t\t\trequire.Fail(fmt.Sprintf(\"Pub key %v should be following user %v but is not: %v %v\",\n\t\t\t\t\t\t\tPkToString(followPk, params), userPubStr, ii, message))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\t// Look up the public keys this user is following\n\t\t\t{\n\t\t\t\tfollowEntries, err := utxoView.GetFollowEntriesForPublicKey(\n\t\t\t\t\tuserPkBytes, false /*followingPublicKey*/)\n\t\t\t\trequire.NoError(err)\n\n\t\t\t\trequire.Equal(len(followEntries), len(userIsFollowing))\n\n\t\t\t\tfor _, followEntry := range followEntries {\n\t\t\t\t\tfollowPk := utxoView.GetPublicKeyForPKID(followEntry.FollowedPKID)\n\t\t\t\t\tif _, exists := userIsFollowing[PkToString(followPk, params)]; !exists {\n\t\t\t\t\t\trequire.Fail(fmt.Sprintf(\"Pub key %v should be in the users this one is following %v but is not: %v %v\",\n\t\t\t\t\t\t\tPkToString(followPk, params), userPubStr, ii, message))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tpostHashes := []*BlockHash{}\n\tfor testIndex, testData := range creatorCoinTests {\n\t\tfmt.Printf(\"Applying test index: %v\\n\", testIndex)\n\n\t\t// If this is a profile swap, then execute that.\n\t\tvar utxoOps []*UtxoOperation\n\t\tvar txn *MsgBitCloutTxn\n\t\tvar err error\n\t\tif testData.TxnType == TxnTypeSwapIdentity {\n\t\t\tutxoOps, txn, _, err = _swapIdentity(\n\t\t\t\tt, chain, db, params, feeRateNanosPerKB,\n\t\t\t\tparamUpdaterPub,\n\t\t\t\tparamUpdaterPriv,\n\t\t\t\ttestData.FromPublicKey, testData.ToPublicKey)\n\t\t\trequire.NoError(err)\n\t\t} else if testData.TxnType == TxnTypeUpdateProfile {\n\t\t\t// Create a profile using the testData params\n\t\t\tprofilePkBytes, _, _ := Base58CheckDecode(testData.ProfilePublicKeyBase58Check)\n\t\t\tutxoOps, txn, _, err = _updateProfile(\n\t\t\t\tt, chain, db, params,\n\t\t\t\tfeeRateNanosPerKB /*feerate*/, testData.UpdaterPublicKeyBase58Check,\n\t\t\t\ttestData.UpdaterPrivateKeyBase58Check, profilePkBytes, testData.ProfileUsername,\n\t\t\t\ttestData.ProfileDescription, testData.ProfilePic,\n\t\t\t\ttestData.ProfileCreatorBasisPoints, /*CreatorBasisPoints*/\n\t\t\t\t12500 /*stakeMultipleBasisPoints*/, testData.ProfileIsHidden /*isHidden*/)\n\t\t\trequire.NoError(err)\n\t\t} else if testData.TxnType == TxnTypeFollow {\n\t\t\tutxoOps, txn, _, err = _doFollowTxn(\n\t\t\t\tt, chain, db, params, feeRateNanosPerKB /*feeRateNanosPerKB*/, testData.UpdaterPublicKeyBase58Check,\n\t\t\t\tPkToString(testData.FollowedPublicKey, params),\n\t\t\t\ttestData.UpdaterPrivateKeyBase58Check, testData.IsUnfollow /*isUnfollow*/)\n\t\t\trequire.NoError(err)\n\t\t} else if testData.TxnType == TxnTypeSubmitPost {\n\n\t\t\tvar postHashToModify []byte\n\t\t\tif testData.PostHashToModifyIndex >= 0 {\n\t\t\t\tpostHashToModify = postHashes[testData.PostHashToModifyIndex][:]\n\t\t\t}\n\t\t\tvar parentPostHash []byte\n\t\t\tif testData.ParentPostHashIndex >= 0 {\n\t\t\t\tparentPostHash = postHashes[testData.ParentPostHashIndex][:]\n\t\t\t}\n\n\t\t\tutxoOps, txn, _, err = _doSubmitPostTxn(\n\t\t\t\tt, chain, db, params, feeRateNanosPerKB,\n\t\t\t\ttestData.UpdaterPublicKeyBase58Check, testData.UpdaterPrivateKeyBase58Check,\n\t\t\t\tpostHashToModify,\n\t\t\t\tparentPostHash,\n\t\t\t\ttestData.SubmitPostBody,\n\t\t\t\tmake(map[string][]byte),\n\t\t\t\ttestData.PostIsHidden)\n\t\t\trequire.NoError(err)\n\n\t\t\t// If this transaction was not modifying an existing post then\n\t\t\t// add its post hash to the list.\n\t\t\tif len(postHashToModify) == 0 {\n\t\t\t\tpostHashes = append(postHashes, txn.Hash())\n\t\t\t}\n\n\t\t} else if testData.TxnType == TxnTypeCreatorCoinTransfer {\n\t\t\tvar diamondPostHash *BlockHash\n\t\t\tif testData.DiamondLevel > 0 {\n\t\t\t\tdiamondPostHash = postHashes[testData.DiamondPostHashIndex]\n\t\t\t}\n\t\t\t// If we have a DiamondPostHash then do a diamond txn\n\t\t\tif diamondPostHash != nil {\n\t\t\t\tutxoOps, txn, _, err = _doCreatorCoinTransferTxnWithDiamonds(\n\t\t\t\t\tt, chain, db, params, feeRateNanosPerKB,\n\t\t\t\t\ttestData.UpdaterPublicKeyBase58Check, testData.UpdaterPrivateKeyBase58Check,\n\t\t\t\t\ttestData.ReceiverPublicKeyBase58Check,\n\t\t\t\t\tdiamondPostHash,\n\t\t\t\t\ttestData.DiamondLevel)\n\t\t\t\trequire.NoError(err)\n\t\t\t} else {\n\t\t\t\t// Apply the txn according to the test spec\n\t\t\t\tutxoOps, txn, _, err = _doCreatorCoinTransferTxn(\n\t\t\t\t\tt, chain, db, params, feeRateNanosPerKB,\n\t\t\t\t\ttestData.UpdaterPublicKeyBase58Check, testData.UpdaterPrivateKeyBase58Check,\n\t\t\t\t\ttestData.ProfilePublicKeyBase58Check,\n\t\t\t\t\ttestData.ReceiverPublicKeyBase58Check,\n\t\t\t\t\ttestData.CreatorCoinToTransferNanos)\n\t\t\t\trequire.NoError(err)\n\t\t\t}\n\n\t\t} else {\n\t\t\t// When TxnType is 0 aka \"unset,\" we assume we're doing a CreatorCoin txn.\n\n\t\t\t// Apply the txn according to the test spec\n\t\t\tutxoOps, txn, _, err = _creatorCoinTxn(\n\t\t\t\tt, chain, db, params, feeRateNanosPerKB,\n\t\t\t\ttestData.UpdaterPublicKeyBase58Check, testData.UpdaterPrivateKeyBase58Check, /*updater*/\n\t\t\t\ttestData.ProfilePublicKeyBase58Check, /*profile*/\n\t\t\t\ttestData.OperationType, /*buy/sell*/\n\t\t\t\ttestData.BitCloutToSellNanos, /*BitCloutToSellNanos*/\n\t\t\t\ttestData.CreatorCoinToSellNanos, /*CreatorCoinToSellNanos*/\n\t\t\t\ttestData.BitCloutToAddNanos, /*BitCloutToAddNanos*/\n\t\t\t\ttestData.MinBitCloutExpectedNanos, /*MinBitCloutExpectedNanos*/\n\t\t\t\ttestData.MinCreatorCoinExpectedNanos /*MinCreatorCoinExpectedNanos*/)\n\t\t\trequire.NoError(err)\n\t\t}\n\n\t\t// Append the txn we just created to our list\n\t\ttestTxns = append(testTxns, txn)\n\t\ttestUtxoOps = append(testUtxoOps, utxoOps)\n\n\t\t// Check the txn according to the test spec.\n\t\t_checkTestData(testData, fmt.Sprintf(\"SimpleConnect: Index: %v\", testIndex), nil, nil)\n\t}\n\n\t// The sum of all the balances shouldn't exceed what we started with.\n\tassert.Less(\n\t\tint64(_getBalance(t, chain, nil, m0Pub)+_getBalance(t, chain, nil, m1Pub)+\n\t\t\t_getBalance(t, chain, nil, m2Pub)+_getBalance(t, chain, nil, m3Pub)+\n\t\t\t_getBalance(t, chain, nil, m4Pub)+_getBalance(t, chain, nil, m5Pub)+\n\t\t\t_getBalance(t, chain, nil, m6Pub)),\n\t\tint64(m0StartNanos+m1StartNanos+m2StartNanos+m3StartNanos+m4StartNanos+m5StartNanos+m6StartNanos))\n\n\t// Disconnect each txn and rerun the checks in the reverse direction\n\tfor iterIndex := range creatorCoinTests {\n\t\ttestIndex := len(creatorCoinTests) - 1 - iterIndex\n\t\ttestData := creatorCoinTests[testIndex]\n\t\tcurrentTxn := testTxns[testIndex]\n\t\tcurrentUtxoOps := testUtxoOps[testIndex]\n\n\t\t// Check that the state lines up with the test data\n\t\tfmt.Printf(\"Running checks before disconnecting test index: %v\\n\", testIndex)\n\t\t_checkTestData(testData, fmt.Sprintf(\"SimpleDisconnect: Index: %v\", testIndex), nil, nil)\n\n\t\t// Disconnect the transaction\n\t\tutxoView, err := NewUtxoView(db, params, nil)\n\t\trequire.NoError(err)\n\t\tblockHeight := chain.blockTip().Height + 1\n\t\tfmt.Printf(\"Disconnecting test index: %v\\n\", testIndex)\n\t\trequire.NoError(utxoView.DisconnectTransaction(\n\t\t\tcurrentTxn, currentTxn.Hash(), currentUtxoOps, blockHeight))\n\t\tfmt.Printf(\"Disconnected test index: %v\\n\", testIndex)\n\t\trequire.NoErrorf(utxoView.FlushToDb(), \"SimpleDisconnect: Index: %v\", testIndex)\n\t}\n\n\t// Verify the BitClout balances are back to where they started after disconnecting all the txns.\n\tassert.Equalf(int64(m0StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m0Pub)), \"m0 BitClout balance after SimpleDisconnect is incorrect\")\n\tassert.Equalf(int64(m1StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m1Pub)), \"m1 BitClout balance after SimpleDisconnect is incorrect\")\n\tassert.Equalf(int64(m2StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m2Pub)), \"m2 BitClout balance after SimpleDisconnect is incorrect\")\n\tassert.Equalf(int64(m3StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m3Pub)), \"m3 BitClout balance after SimpleDisconnect is incorrect\")\n\tassert.Equalf(int64(m4StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m4Pub)), \"m4 BitClout balance after SimpleDisconnect is incorrect\")\n\tassert.Equalf(int64(m5StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m5Pub)), \"m5 BitClout balance after SimpleDisconnect is incorrect\")\n\tassert.Equalf(int64(m6StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m6Pub)), \"m6 BitClout balance after SimpleDisconnect is incorrect\")\n\n\t// Connect all the txns to a single UtxoView without flushing\n\t{\n\t\t// Create a new UtxoView to check on the state of things\n\t\tutxoView, err := NewUtxoView(db, params, nil)\n\t\trequire.NoError(err)\n\t\tfor testIndex, testData := range creatorCoinTests {\n\t\t\tfmt.Printf(\"Applying test index: %v\\n\", testIndex)\n\t\t\ttxn := testTxns[testIndex]\n\t\t\tblockHeight := chain.blockTip().Height + 1\n\t\t\ttxnSize := getTxnSize(*txn)\n\t\t\t_, _, _, _, err :=\n\t\t\t\tutxoView.ConnectTransaction(\n\t\t\t\t\ttxn, txn.Hash(), txnSize, blockHeight, true /*verifySignature*/, false /*ignoreUtxos*/)\n\t\t\trequire.NoError(err)\n\t\t\t_checkTestData(testData, fmt.Sprintf(\"SimpleConnect: Index: %v\", testIndex), utxoView, nil)\n\t\t}\n\n\t\t// Now flush at the end.\n\t\trequire.NoError(utxoView.FlushToDb())\n\n\t\t// Check that the state matches the final testData.\n\t\ttestIndex := len(creatorCoinTests) - 1\n\t\ttestData := creatorCoinTests[testIndex]\n\t\t_checkTestData(testData, fmt.Sprintf(\"OnebigFlush: %v\", testIndex), nil, nil)\n\t}\n\n\t// Disconnect all the txns on a single view and flush at the end\n\t{\n\t\t// Create a new UtxoView to check on the state of things\n\t\tutxoView, err := NewUtxoView(db, params, nil)\n\t\trequire.NoError(err)\n\t\tblockHeight := chain.blockTip().Height + 1\n\t\tfor iterIndex := range creatorCoinTests {\n\t\t\ttestIndex := len(creatorCoinTests) - 1 - iterIndex\n\t\t\tfmt.Printf(\"Disconnecting test index: %v\\n\", testIndex)\n\t\t\ttxn := testTxns[testIndex]\n\t\t\trequire.NoError(utxoView.DisconnectTransaction(\n\t\t\t\ttxn, txn.Hash(), testUtxoOps[testIndex], blockHeight))\n\n\t\t\t// Check that the testData lines up\n\t\t\tif testIndex > 0 {\n\t\t\t\ttestData := creatorCoinTests[testIndex-1]\n\t\t\t\t_checkTestData(testData, fmt.Sprintf(\"OneBigFlush: %v\", testIndex), utxoView, nil)\n\t\t\t}\n\t\t}\n\n\t\t// Now flush at the end.\n\t\trequire.NoError(utxoView.FlushToDb())\n\n\t\t// Verify the BitClout balances are back to where they started after disconnecting all the txns.\n\t\tassert.Equalf(int64(m0StartNanos),\n\t\t\tint64(_getBalance(t, chain, nil, m0Pub)), \"m0 BitClout balance after BatchDisconnect is incorrect\")\n\t\tassert.Equalf(int64(m1StartNanos),\n\t\t\tint64(_getBalance(t, chain, nil, m1Pub)), \"m1 BitClout balance after BatchDisconnect is incorrect\")\n\t\tassert.Equalf(int64(m2StartNanos),\n\t\t\tint64(_getBalance(t, chain, nil, m2Pub)), \"m2 BitClout balance after BatchDisconnect is incorrect\")\n\t\tassert.Equalf(int64(m3StartNanos),\n\t\t\tint64(_getBalance(t, chain, nil, m3Pub)), \"m3 BitClout balance after BatchDisconnect is incorrect\")\n\t\tassert.Equalf(int64(m4StartNanos),\n\t\t\tint64(_getBalance(t, chain, nil, m4Pub)), \"m4 BitClout balance after BatchDisconnect is incorrect\")\n\t\tassert.Equalf(int64(m5StartNanos),\n\t\t\tint64(_getBalance(t, chain, nil, m5Pub)), \"m5 BitClout balance after BatchDisconnect is incorrect\")\n\t\tassert.Equalf(int64(m6StartNanos),\n\t\t\tint64(_getBalance(t, chain, nil, m6Pub)), \"m6 BitClout balance after BatchDisconnect is incorrect\")\n\t}\n\n\t// Running all the transactions through the mempool should work and result\n\t// in all of them being added.\n\t{\n\t\tfor ii, currentTxn := range testTxns {\n\t\t\tmempoolTxsAdded, err := mempool.processTransaction(\n\t\t\t\tcurrentTxn, true /*allowUnconnectedTxn*/, true /*rateLimit*/, 0, /*peerID*/\n\t\t\t\ttrue /*verifySignatures*/)\n\t\t\trequire.NoErrorf(err, \"mempool index %v\", ii)\n\t\t\trequire.Equal(1, len(mempoolTxsAdded))\n\n\t\t\t// This will check the balances according to the mempool\n\t\t\t_checkTestData(creatorCoinTests[ii], fmt.Sprintf(\"MempoolIncrementalBalances: %v\", ii), nil, mempool)\n\t\t}\n\t}\n\n\t// Remove all the transactions from the mempool.\n\tfor _, burnTxn := range testTxns {\n\t\tmempool.inefficientRemoveTransaction(burnTxn)\n\t}\n\n\t// The balances should be reset after removing transactions from the mempool.\n\tassert.Equalf(int64(m0StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m0Pub)), \"m0 BitClout balance after BatchDisconnect is incorrect\")\n\tassert.Equalf(int64(m1StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m1Pub)), \"m1 BitClout balance after BatchDisconnect is incorrect\")\n\tassert.Equalf(int64(m2StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m2Pub)), \"m2 BitClout balance after BatchDisconnect is incorrect\")\n\tassert.Equalf(int64(m3StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m3Pub)), \"m3 BitClout balance after BatchDisconnect is incorrect\")\n\tassert.Equalf(int64(m4StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m4Pub)), \"m4 BitClout balance after BatchDisconnect is incorrect\")\n\tassert.Equalf(int64(m5StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m5Pub)), \"m5 BitClout balance after BatchDisconnect is incorrect\")\n\tassert.Equalf(int64(m6StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m6Pub)), \"m6 BitClout balance after BatchDisconnect is incorrect\")\n\n\t// Re-add all of the transactions to the mempool so we can mine them into a block.\n\t{\n\t\tfor _, burnTxn := range testTxns {\n\t\t\tmempoolTxsAdded, err := mempool.processTransaction(\n\t\t\t\tburnTxn, true /*allowUnconnectedTxn*/, true /*rateLimit*/, 0, /*peerID*/\n\t\t\t\ttrue /*verifySignatures*/)\n\t\t\trequire.NoError(err)\n\t\t\trequire.Equal(1, len(mempoolTxsAdded))\n\t\t}\n\t}\n\n\t// Mine a block with all the mempool transactions.\n\t//\n\t// All the txns should be in the mempool already so mining a block should put\n\t// all those transactions in it. Note we need to mine two blocks since the first\n\t// one just makes the BitClout chain time-current.\n\tfinalBlock1, err := miner.MineAndProcessSingleBlock(0 /*threadIndex*/, mempool)\n\trequire.NoError(err)\n\t_ = finalBlock1\n\tfinalBlock2, err := miner.MineAndProcessSingleBlock(0 /*threadIndex*/, mempool)\n\trequire.NoError(err)\n\trequire.Equal(0, len(mempool.poolMap))\n\n\t// Add one for the block reward. Now we have a meaty block.\n\trequire.Equal(len(finalBlock1.Txns), 1)\n\trequire.Equal(len(finalBlock2.Txns), len(creatorCoinTests)+1)\n\n\t// The balances after mining the block should match the last testData\n\t{\n\t\t// Check that the state matches the final testData.\n\t\ttestIndex := len(creatorCoinTests) - 1\n\t\ttestData := creatorCoinTests[testIndex]\n\t\t// BitClout balances\n\t\tif _getBalance(t, chain, nil, m0Pub) != 6*NanosPerUnit && testData.m0BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m0BitCloutBalance),\n\t\t\t\tint64(_getBalance(t, chain, nil, m0Pub)), \"BlockConnect: m0 BitClout balance: %v\", testIndex)\n\t\t}\n\t\tif _getBalance(t, chain, nil, m1Pub) != 6*NanosPerUnit && testData.m1BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m1BitCloutBalance),\n\t\t\t\tint64(_getBalance(t, chain, nil, m1Pub)), \"BlockConnect: m1 BitClout balance: %v\", testIndex)\n\t\t}\n\t\tif _getBalance(t, chain, nil, m2Pub) != 6*NanosPerUnit && testData.m2BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m2BitCloutBalance),\n\t\t\t\tint64(_getBalance(t, chain, nil, m2Pub)), \"BlockConnect: m2 BitClout balance: %v\", testIndex)\n\t\t}\n\t\tif _getBalance(t, chain, nil, m3Pub) != 6*NanosPerUnit && testData.m3BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m3BitCloutBalance),\n\t\t\t\tint64(_getBalance(t, chain, nil, m3Pub)), \"BlockConnect: m3 BitClout balance: %v\", testIndex)\n\t\t}\n\t\tif _getBalance(t, chain, nil, m4Pub) != 6*NanosPerUnit && testData.m4BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m4BitCloutBalance),\n\t\t\t\tint64(_getBalance(t, chain, nil, m4Pub)), \"BlockConnect: m4 BitClout balance: %v\", testIndex)\n\t\t}\n\t\tif _getBalance(t, chain, nil, m5Pub) != 6*NanosPerUnit && testData.m5BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m5BitCloutBalance),\n\t\t\t\tint64(_getBalance(t, chain, nil, m5Pub)), \"BlockConnect: m5 BitClout balance: %v\", testIndex)\n\t\t}\n\t\tif _getBalance(t, chain, nil, m6Pub) != 6*NanosPerUnit && testData.m5BitCloutBalance != 0 {\n\t\t\tassert.Equalf(int64(testData.m6BitCloutBalance),\n\t\t\t\tint64(_getBalance(t, chain, nil, m6Pub)), \"BlockConnect: m6 BitClout balance: %v\", testIndex)\n\t\t}\n\n\t}\n\n\t// Roll back the blocks and make sure we don't hit any errors.\n\tdisconnectSingleBlock := func(blockToDisconnect *MsgBitCloutBlock, utxoView *UtxoView) {\n\t\t// Fetch the utxo operations for the block we're detaching. We need these\n\t\t// in order to be able to detach the block.\n\t\thash, err := blockToDisconnect.Header.Hash()\n\t\trequire.NoError(err)\n\t\tutxoOps, err := GetUtxoOperationsForBlock(db, hash)\n\t\trequire.NoError(err)\n\n\t\t// Compute the hashes for all the transactions.\n\t\ttxHashes, err := ComputeTransactionHashes(blockToDisconnect.Txns)\n\t\trequire.NoError(err)\n\t\trequire.NoError(utxoView.DisconnectBlock(blockToDisconnect, txHashes, utxoOps))\n\t}\n\t{\n\t\tutxoView, err := NewUtxoView(db, params, nil)\n\t\trequire.NoError(err)\n\n\t\tdisconnectSingleBlock(finalBlock2, utxoView)\n\t\tdisconnectSingleBlock(finalBlock1, utxoView)\n\n\t\t// Flushing the view after applying and rolling back should work.\n\t\trequire.NoError(utxoView.FlushToDb())\n\t}\n\n\t// The BitClout blaances should line up with what they were initially after\n\t// disconnecting the blocks.\n\tassert.Equalf(int64(m0StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m0Pub)), \"m0 BitClout balance after BlockDisconnect is incorrect\")\n\tassert.Equalf(int64(m1StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m1Pub)), \"m1 BitClout balance after BlockDisconnect is incorrect\")\n\tassert.Equalf(int64(m2StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m2Pub)), \"m2 BitClout balance after BlockDisconnect is incorrect\")\n\tassert.Equalf(int64(m3StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m3Pub)), \"m3 BitClout balance after BlockDisconnect is incorrect\")\n\tassert.Equalf(int64(m5StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m5Pub)), \"m5 BitClout balance after BlockDisconnect is incorrect\")\n\tassert.Equalf(int64(m6StartNanos),\n\t\tint64(_getBalance(t, chain, nil, m6Pub)), \"m6 BitClout balance after BlockDisconnect is incorrect\")\n}", "title": "" }, { "docid": "2c0b7b58d847c351515f75a224a4482b", "score": "0.4485594", "text": "func (server *OpencxServer) SetupFundBack(pubkey *koblitz.PublicKey, currCoinType uint32, channelCapacity int64) (err error) {\n\n\t// now check for all the settlement layers again... since lightning itself is a settlement layer\n\t// maybe we should abstract\n\tfor param, _ := range server.SettlementEngines {\n\t\tif param.HDCoinType != currCoinType {\n\t\t\tvar pWallet qln.UWallet\n\t\t\tvar found bool\n\t\t\tif pWallet, found = server.ExchangeNode.SubWallet[param.HDCoinType]; !found {\n\t\t\t\terr = fmt.Errorf(\"Don't have wallet for coin, how did this happen?\")\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tvar allUtxos []*portxo.PorTxo\n\t\t\tif allUtxos, err = pWallet.UtxoDump(); err != nil {\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tvar totalValue int64\n\t\t\tfor _, utxo := range allUtxos {\n\t\t\t\ttotalValue += utxo.Value\n\t\t\t}\n\t\t\tlogging.Infof(\"Total value in coin %s: %d\", param.Name, totalValue)\n\t\t\tvar txid string\n\t\t\t// Send with 0 balance on their side\n\t\t\tlogging.Debugf(\"Creating channel with %x for %d %s coins.\", pubkey.SerializeCompressed(), channelCapacity, param.Name)\n\t\t\tif txid, err = server.CreateChannel(pubkey, 0, channelCapacity, param); err != nil {\n\t\t\t\tlogging.Errorf(\"Creating %s channel not successful\", param.Name)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tlogging.Debugf(\"Outpoint hash for fund back channel: %s\\n\", txid)\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "0e05b46beba42b716b1d284bd2885ea6", "score": "0.44775015", "text": "func Transfer(s signerRPCClient, address, amount string, config *TransactionConfig) (string, error) {\n\treturn TransferContext(context.Background(), s, address, amount, config)\n}", "title": "" }, { "docid": "7b6635a15c259c90efc99515b6350159", "score": "0.4476066", "text": "func (t *ManageShipment) updateShipment(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\t//updateShipment('faa_ShipmentNumber')\n\tvar jsonResp string\n\tvar err error\n\tfmt.Println(\"Updating Shipment status\")\n\tif len(args) != 1{\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 1.\")\n\t}\n\t// set shipmentId\n\tshipmentId := args[0]\n\tShipmentAsBytes, err := stub.GetState(shipmentId)\t\t\t\t\t\t\t\t\t//get the Shipment for the specified ShipmentId from chaincode state\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + shipmentId + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\tfmt.Print(\"ShipmentAsBytes in update Shipment\")\n\tfmt.Println(ShipmentAsBytes);\n\tres := Shipment{}\n\tjson.Unmarshal(ShipmentAsBytes, &res)\n\tif res.ShipmentID == shipmentId{\n\t\tfmt.Println(\"Shipment found with shipmentId : \" + shipmentId)\n\t\tfmt.Println(res);\n\t\tres.Status = \"Consumed\"\n\t}\n\t\n\t//build the Shipment json string manually\n\tinput := \t`{`+\n\t\t`\"shipmentId\": \"` + res.ShipmentID + `\" , `+\n\t\t`\"description\": \"` + res.Description + `\" , `+ \n\t\t`\"sender\": \"` + res.Sender + `\" , `+\n\t\t`\"senderType\": \"` + res.SenderType + `\" , `+\n\t\t`\"receiver\": \"` + res.Receiver + `\" , `+\n\t\t`\"receiverType\": \"` + res.ReceiverType + `\" , `+\n\t\t`\"FAA_formNumber\": \"` + res.FAA_FormNumber + `\" , `+\n\t\t`\"quantity\": \"` + res.Quantity + `\" , `+ \n\t\t`\"shipmentDate\": \"` + res.ShipmentDate + `\" , `+ \n\t\t`\"status\": \"` + res.Status + `\", `+\n\t\t`\"ship_frm_country\": \"`+res.Ship_frm_country+ `\" , `+ \n\t\t`\"ship_frm_city\": \"`+res.Ship_frm_city+ `\" , `+\n\t\t`\"ship_to_country\": \"`+res.Ship_to_country+ `\" , `+\n\t\t`\"ship_to_city\": \"`+res.Ship_to_city+ `\" , `+\n\t\t`\"truck_details\": \"`+res.Truck_details+`\" , `+\n\t\t`\"logistics_agency_details\": \"`+res.Logistics_agency_details+`\" , `+\n\t\t`\"air_ship_way_bill_details\": \"`+res.Air_ship_way_bill_details+`\" , `+\n\t\t`\"flight_vessel_details\": \"`+res.Flight_vessel_details+`\" , `+\n\t\t`\"departing_port\": \"`+res.Departing_port+`\" , `+\n\t\t`\"arriving_port\": \"`+res.Arriving_port+`\" , `+\n\t\t`\"scheduled_departure_date_ts\": \"`+res.Scheduled_departure_date_ts+`\" , `+\n\t\t`\"actual_arrival_date_ts\": \"`+res.Actual_arrival_date_ts+`\" , `+\n\t\t`\"vendor_name\": \"`+res.Vendor_name+`\" , `+\n\t\t`\"file_hash\": \"`+res.File_hash+`\" , `+\n\t\t`\"tier_type\": \"`+res.Tier_type+`\" `+\n\n\t\n\t\n\t `}`\n\t\t\n\terr = stub.PutState(shipmentId, []byte(input))\t\t\t\t\t\t\t\t\t//store Shipment with id as key\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfmt.Println(\"Shipment status updated successfully.\")\n\treturn nil, nil\n}", "title": "" }, { "docid": "9235f41cc6637c4b2ddfd138c4ec5f1f", "score": "0.44718546", "text": "func createTransfer(w http.ResponseWriter, r *http.Request) {\n\tvar newTrans transfer\n\n\tvars := mux.Vars(r)\n\t//log.Println(\"Create Transfer for cert \",vars)\n\tid := vars[\"id\"] // id of certificate to be transferred\n\tlog.Println(\"Attempt to create Transfer for cert \", id)\n\n\tbody, err := ioutil.ReadAll(r.Body)\n\n\tif err != nil {\n\t\tlog.Println(\"Error creating transfer\", err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tw.Write([]byte(\"Error creating transfer\"))\n\t\treturn\n\t}\n\n\t//unmarshal content of request body as a transfer\n\terr = json.Unmarshal(body, &newTrans)\n\n\t//bad json data\n\tif err != nil {\n\t\tlog.Println(\"Error creating transfer\", err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(\"Error creating transfer, bad JSON data\"))\n\t\treturn\n\t}\n\n\tlog.Println(\"New transfer:\", newTrans)\n\n\t//auth user\n\townerID, pass, _ := r.BasicAuth()\n\tuser, valid := authenticate(ownerID, pass)\n\tif !valid {\n\t\tlog.Println(\"Unauthorized\")\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tw.Write([]byte(\"401: Incorrect user credentials\"))\n\t\treturn\n\t}\n\n\t//execute transfer\n\tcreateTransferStatus := addTransferToCert(id, newTrans, user)\n\t//if user does not own cert\n\tif createTransferStatus == 2 {\n\t\tlog.Println(\"Unauthorized\")\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tw.Write([]byte(\"401: Unauthorized to create transfer, user does not own certificate\"))\n\t\treturn\n\t}\n\t//if cert not found\n\tif createTransferStatus == 3 {\n\t\tlog.Println(\"Certificate not found\")\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\tw.Write([]byte(\"404: Certificate not found\"))\n\t\treturn\n\t}\n\n\t//create and write http response\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\tw.WriteHeader(http.StatusCreated)\n\tcreatedData, _ := json.Marshal(newTrans)\n\tw.Write(createdData)\n\treturn\n\n}", "title": "" }, { "docid": "3a6707d17e140ce7c701a474fc3c2ac9", "score": "0.44701484", "text": "func (_Vbnb *VbnbTransactor) RepayBorrowBehalf(opts *bind.TransactOpts, borrower common.Address) (*types.Transaction, error) {\n\treturn _Vbnb.contract.Transact(opts, \"repayBorrowBehalf\", borrower)\n}", "title": "" }, { "docid": "45780a7b6881c91cda2684fe0dc59cda", "score": "0.44684488", "text": "func (sc *LoanBuyerContract) Put(ctx contractapi.TransactionContextInterface, loanbuyerID int, loanbuyername string, buyercategory string, adminuserID int, hqaddress string, location string, locationlat string, locationlong string)\t(err error) {\n\n\tif loanbuyerID == 0 {\n\t\terr = errors.New(\"Loan Buyer ID can not be empty\")\n\t\treturn\n\t}\n\t\n\tobj := new(LoanBuyerObj)\n\tobj.LoanBuyerID = loanbuyerID\n\tobj.LoanBuyerName = loanbuyername\n\tobj.BuyerCategory = buyercategory\n\tobj.AdminUserID = adminuserID\n\tobj.HqAddress = hqaddress\n\tobj.Location = location\n\tobj.LocationLat = locationlat\n\tobj.LocationLong = locationlong\n\n\tif obj.Created, err = GetTimestamp(ctx); err != nil {\n\t\treturn\n\t}\n\n\tif obj.Createdby, err = GetCallerID(ctx); err != nil {\n\t\treturn\n\t}\n\n\tkey := strconv.Itoa(loanbuyerID)\n\tobjBytes, _ := json.Marshal(obj)\t\n\terr = ctx.GetStub().PutState(key, []byte(objBytes))\n return \n}", "title": "" }, { "docid": "cbe8cf9179cbc8fe0b40fe286c5c831b", "score": "0.44612202", "text": "func addTransferToCert(id string, newTrans transfer, user user) int {\n\tfor i, element := range certs {\n\t\tif element.ID == id {\n\t\t\tif element.OwnerID == user.ID { //this user owns the cert\n\t\t\t\tcerts[i].Transfer = newTrans //element != pointer to object in certs\n\t\t\t\tunacceptedTransfers = append(unacceptedTransfers, &certs[i])\n\t\t\t\treturn 1\n\t\t\t}\n\t\t\treturn 2\n\n\t\t}\n\t}\n\treturn 3\n}", "title": "" }, { "docid": "fa70ad609f3c471120310ff1b11ed16c", "score": "0.4457651", "text": "func (_KyberFeeHandlerV2 *KyberFeeHandlerV2Raw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _KyberFeeHandlerV2.Contract.KyberFeeHandlerV2Transactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "e11189130f8529eb45b7b6a464f7bd61", "score": "0.44525182", "text": "func transferBanka(b *Banka, id1 int, id2 int, kolicina float64) {\r\n\t// ulazimo u kriticnu sekciju\r\n\tb.dovoljnoNovca.L.Lock()\r\n\t// ispisujemo podatke o trazenom transferu\r\n\tfmt.Printf(\"Klijent %d (stanje: %f) zeli da prebaci %f na racun klijenta %d (stanje: %f)\\n\", id1, b.klijenti[id1].stanje, kolicina, id2, b.klijenti[id2].stanje)\r\n\t// sve dok klijent ne ispunjava uslov, stavljamo ga u red cekanja\r\n\tfor kolicina > b.klijenti[id1].stanje {\r\n\t\t// tekuca gorutina se suspenduje, tj. stavlja u red cekanja\r\n\t\t// red cekanja je FIFO struktura\r\n\t\t// poziv Wait automatski otkljucava kriticnu sekciju\r\n\t\t// zbog toga se Wait sme pozivati samo u okviru kriticne sekcije\r\n\t\tb.dovoljnoNovca.Wait()\r\n\t}\r\n\t// ako klijent ispunjava uslov, obavljamo transfer\r\n\tb.klijenti[id1].stanje -= kolicina\r\n\tb.klijenti[id2].stanje += kolicina\r\n\tfmt.Printf(\"Klijent %d (stanje: %f) je prebacio %f na racun klijenta %d (stanje: %f)\\n\", id1, b.klijenti[id1].stanje, kolicina, id2, b.klijenti[id2].stanje)\r\n\t// ispisujemo ukupno stanje u banci\r\n\t// ne sme da postoji curenje novca\r\n\tb.total()\r\n\t// izlazimo iz kriticne sekcije\r\n\tb.dovoljnoNovca.L.Unlock()\r\n\t/*\r\n\t\tkada je obavljen tranfer, signaliziramo svim klijentima\r\n\t\tkoji su bili blokirani zbog nedostatka novca\r\n\t\tda ponovo pokusaju sa svojim zahtevom\r\n\t\tjer se mozda nekom od njih u prethodnom transferu uplatio novac\r\n\t*/\r\n\tb.dovoljnoNovca.Broadcast()\r\n\t// funkcija Broadcast signalizira svima iz reda cekanja\r\n\t// funkcija Signal signalizira prvoj ubacenoj gorutini u red cekanja\r\n\t// tj. onoj koja najduze ceka u redu\r\n}", "title": "" }, { "docid": "3e75547787f94f6603a153fc8713ee9c", "score": "0.44500968", "text": "func (b Billing) save() error {\n\t_, err := db.Exec(\"INSERT INTO billings (time_stamp, user, debit, credit) VALUES (?, ?, ?, ?)\",\n\t\tb.TimeStamp, b.User, b.Debit, b.Credit)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not save Billing info for user<%s>: %v\", b.User, err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3ec1aa24ca3e9354dc5266ae3fd7f6d8", "score": "0.4444419", "text": "func (e *Fcoin) Withdraw(coin *coin.Coin, quantity float64, addr, tag string) bool {\n\tif e.API_KEY == \"\" || e.API_SECRET == \"\" {\n\t\tlog.Printf(\"Fcoin API Key or Secret Key are nil.\")\n\t\treturn false\n\t}\n\n\tjsonResponse := JsonResponse{}\n\tstrRequest := \"/broker/otc/assets/transfer/out\"\n\n\tmapParams := make(map[string]string)\n\tmapParams[\"Currency\"] = e.GetSymbol(coin.Code)\n\tmapParams[\"Amount\"] = fmt.Sprintf(\"%f\", quantity)\n\t//mapParams[\"Address\"] = addr\n\t//mapParams[\"PaymentId\"] = coin.Code\n\n\tjsonSubmitWithdraw := e.ApiKeyPost(mapParams, strRequest)\n\tlog.Printf(\"jsonSubmitWithdraw: %+v\", jsonSubmitWithdraw)\n\tif err := json.Unmarshal([]byte(jsonSubmitWithdraw), &jsonResponse); err != nil {\n\t\tlog.Printf(\"Fcoin Withdraw Json Unmarshal failed: %v %v\", err, jsonSubmitWithdraw)\n\t\treturn false\n\t} else if jsonResponse.Status != 0 {\n\t\tlog.Printf(\"Fcoin Withdraw failed: %v Message: %v\", jsonResponse.Status, jsonResponse.Message)\n\t\treturn false\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "5f416c004ef945c21f6cfa35428d009e", "score": "0.44402397", "text": "func (t *ManageShipment) createShipment(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n \t//createShipment('shipmentId','description','sender','receiver''sender_type','receiver_type','FAA_formNumber','quantity','shipmentDate','chaincodeURL'....)\n \t//(....'ship_frm_country','ship_frm_city','ship_to_country','ship_to_city','truck_details'....)\n \t//(....'logistics_agency_details','air/ship_way_bill_details','flight/vessel_details'....)\n \t//(....'departing_port','arriving_port','scheduled_departure_date_ts','actual_arrival_date_ts')\n \t//(....'vendor_name','tier_type','ipfs_hash')\n \t//totan no of new arguments=25\n \t\n \tvar err error\n \tvar valIndex Form\n \tif len(args) != 25 {\n \t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 24\")\n \t}\n \tfmt.Println(\"Creating a new Shipment\")\n \tif len(args[0]) <= 0 {\n \t\treturn nil, errors.New(\"1st argument must be a non-empty string\")\n \t}\n \tif len(args[1]) <= 0 {\n \t\treturn nil, errors.New(\"2nd argument must be a non-empty string\")\n \t}\n \tif len(args[2]) <= 0 {\n \t\treturn nil, errors.New(\"3rd argument must be a non-empty string\")\n \t}\n \tif len(args[3]) <= 0 {\n \t\treturn nil, errors.New(\"4th argument must be a non-empty string\")\n \t}\n \tif len(args[4]) <= 0 {\n \t\treturn nil, errors.New(\"5th argument must be a non-empty string\")\n \t}\n \tif len(args[5]) <= 0 {\n \t\treturn nil, errors.New(\"6th argument must be a non-empty string\")\n \t}\n \tif len(args[6]) <= 0 {\n \t\treturn nil, errors.New(\"7th argument must be a non-empty string\")\n \t}\n \tif len(args[7]) <= 0 {\n \t\treturn nil, errors.New(\"8th argument must be a non-empty string\")\n \t}\n \tif len(args[8]) <= 0 {\n \t\treturn nil, errors.New(\"9th argument must be a non-empty string\")\n \t}\n \tif len(args[9]) <= 0 {\n \t\treturn nil, errors.New(\"10th argument must be a non-empty string\")\n \t}\n \tif len(args[10]) <= 0 {\n \t\treturn nil, errors.New(\"11th argument must be a non-empty string\")\n \t}\n \tif len(args[11]) <= 0 {\n \t\treturn nil, errors.New(\"12th argument must be a non-empty string\")\n \t}\n \tif len(args[12]) <= 0 {\n \t\treturn nil, errors.New(\"13th argument must be a non-empty string\")\n \t}\n \tif len(args[13]) <= 0 {\n \t\treturn nil, errors.New(\"14th argument must be a non-empty string\")\n \t}\n \tif len(args[14]) <= 0 {\n \t\treturn nil, errors.New(\"15th argument must be a non-empty string\")\n \t}\n \tif len(args[15]) <= 0 {\n \t\treturn nil, errors.New(\"16th argument must be a non-empty string\")\n \t}\n \tif len(args[16]) <= 0 {\n \t\treturn nil, errors.New(\"17th argument must be a non-empty string\")\n \t}\n \tif len(args[17]) <= 0 {\n \t\treturn nil, errors.New(\"18th argument must be a non-empty string\")\n \t}\n \tif len(args[18]) <= 0 {\n \t\treturn nil, errors.New(\"19th argument must be a non-empty string\")\n \t}\n \tif len(args[19]) <= 0 {\n \t\treturn nil, errors.New(\"20th argument must be a non-empty string\")\n \t}\n \tif len(args[20]) <= 0 {\n \t\treturn nil, errors.New(\"21th argument must be a non-empty string\")\n \t}\n \tif len(args[21]) <= 0 {\n \t\treturn nil, errors.New(\"22th argument must be a non-empty string\")\n \t}\n \tif len(args[22]) <= 0 {\n \t\treturn nil, errors.New(\"23th argument must be a non-empty string\")\n \t}\n \tif len(args[23]) <= 0 {\n \t\treturn nil, errors.New(\"24th argument must be a non-empty string\")\n \t}\n \tif len(args[24]) <= 0 {\n \t\treturn nil, errors.New(\"25th argument must be a non-empty string\")\n \t}\n \t\n \t\n \t\n \t\n \tshipmentId := args[0]\n \tdescription := args[1]\n \tsender := args[2]\n \tsenderType := args[3]\n \treceiver := args[4] \n \treceiverType := args[5] \n \tFAA_formNumber := args[6]\n \tquantity := args[7]\n \tshipmentDate := args[8]\n \tstatus := \"Created\"\n \tchaincodeURL := args[9]\n \tship_frm_country:=args[10]\n \tship_frm_city:=args[11]\n \tship_to_country:=args[12]\n \tship_to_city:=args[13]\n \ttruck_details:=args[14]\n \tlogistics_agency_details:=args[15]\n \tair_ship_way_bill_details:=args[16]\n \tflight_vessel_details:=args[17]\n \tdeparting_port:=args[18]\n \tarriving_port:=args[19]\n \tscheduled_departure_date_ts:=args[20]\n \tactual_arrival_date_ts:=args[21]\n \tvendor_name:=args[22]\n \ttier_type:=args[23]\n \tfile_hash:=args[24]\n \t\n \t\n \t\n \t// Adding Rule for senderType and receiverType\n \tif(senderType == \"Tier-3\" && receiverType != \"Tier-2\"){\n \t\treturn nil,errors.New(\"Tier-3 can send shipment to Tier-2 only\")\n \t}else if(senderType == \"Tier-2\" && receiverType != \"Tier-1\"){\n \t\treturn nil,errors.New(\"Tier-2 can send shipment to Tier-1 only\")\n \t}else if(senderType == \"Tier-1\" && receiverType != \"OEM\"){\n \t\treturn nil,errors.New(\"Tier-1 can send shipment to OEM only\")\n \t}\n \tfmt.Print(\"senderType: \")\n \tfmt.Println(senderType)\n \tfmt.Print(\"receiverType: \")\n \tfmt.Println(receiverType)\n \n \t// calculating available quantity by fetching total approved quantity and quantity from 'manageForm' chaincode\n \tf := \"getForm_byID\"\n \tqueryArgs := util.ToChaincodeArgs(f, FAA_formNumber)\n \tvalueAsBytes, err := stub.QueryChaincode(chaincodeURL, queryArgs)\n \tif err != nil {\n \t\terrStr := fmt.Sprintf(\"Failed to query chaincode. Got error: %s\", err.Error())\n \t\tfmt.Printf(errStr)\n \t\treturn nil, errors.New(errStr)\n \t} \t\n \tfmt.Print(\"valueAsBytes : \")\n \tfmt.Println(valueAsBytes)\n \tjson.Unmarshal(valueAsBytes, &valIndex)\n \tfmt.Print(\"valIndex: \")\n \tfmt.Println(valIndex)\n \t\n \tqty,err := strconv.Atoi(quantity)\n \tif err != nil {\n \t\tfmt.Sprintf(\"Error while converting string 'quantity' to int : %s\", err.Error())\n \t\treturn nil, errors.New(\"Error while converting string 'quantity' to int \")\n \t}\n \tfmt.Print(\"qty: \")\n \tfmt.Println(qty)\n \t// Fetch quantity from form\n \tformQty,err := strconv.Atoi(valIndex.Quantity)\n \tif err != nil {\n \t\treturn nil, errors.New(\"Error while converting string 'form quantity' to int \")\n \t}\n \tfmt.Print(\"formQty: \")\n \tfmt.Println(formQty)\n \t// Fetch Total approved quantity from form\n \t/*approvedQty,err := strconv.Atoi(valIndex.Total_approvedQty)\n \tif err != nil {\n \t\treturn nil, errors.New(\"Error while converting string 'approvedQty' to int \")\n \t}*/\n \n \t//Shipped quantity cannot be greater than Form’s quantity\n \tif(qty > formQty){\n \t\treturn nil,errors.New(\"Shipped quantity cannot be greater than Form’s quantity\")\n \t}\t\n \n \t// fetching shipments from chaincode\n \tShipmentAsBytes, err := stub.GetState(shipmentId) \n \tif err != nil {\n \t\treturn nil, errors.New(\"Failed to get Shipment ID\")\n \t}\n \tfmt.Print(\"ShipmentAsBytes: \")\n \tfmt.Println(ShipmentAsBytes)\n \tres := Shipment{}\n \tjson.Unmarshal(ShipmentAsBytes, &res)\n \tfmt.Print(\"res: \")\n \tfmt.Println(res)\n \t\n \t// Shipments marked “Consumed” cannot be used for creating new Forms\n \tif res.Status == \"Consumed\"{\n \t\tfmt.Println(\"This Shipment is already consumed. New form cannot be created\")\n \t\treturn nil,errors.New(\"New form cannot be created as this Shipment is already consumed.\")\n \t}\n \t\n \t//build the Shipment json string manually\n \tinput := \t`{`+\n \t\t`\"shipmentId\": \"` + shipmentId + `\" , `+\n \t\t`\"description\": \"` + description + `\" , `+ \n \t\t`\"sender\": \"` + sender + `\" , `+\n \t\t`\"senderType\": \"` + senderType + `\" , `+\n \t\t`\"receiver\": \"` + receiver + `\" , `+\n \t\t`\"receiverType\": \"` + receiverType + `\" , `+\n \t\t`\"FAA_formNumber\": \"` + FAA_formNumber + `\" , `+\n \t\t`\"quantity\": \"` + quantity + `\" , `+ \n \t\t`\"shipmentDate\": \"` + shipmentDate + `\" , `+ \n \t\t`\"status\": \"` + status + `\" , `+ \n \t\t`\"ship_frm_country\": \"`+ship_frm_country+ `\" , `+ \n \t\t`\"ship_frm_city\": \"`+ship_frm_city+ `\" , `+\n \t\t`\"ship_to_country\": \"`+ship_to_country+ `\" , `+\n \t\t`\"ship_to_city\": \"`+ship_to_city+ `\" , `+\n \t\t`\"truck_details\": \"`+truck_details+`\" , `+\n \t\t`\"logistics_agency_details\": \"`+logistics_agency_details+`\" , `+\n \t\t`\"air_ship_way_bill_details\": \"`+air_ship_way_bill_details+`\" , `+\n \t\t`\"flight_vessel_details\": \"`+flight_vessel_details+`\" , `+\n \t\t`\"departing_port\": \"`+departing_port+`\" , `+\n \t\t`\"arriving_port\": \"`+arriving_port+`\" , `+\n \t\t`\"scheduled_departure_date_ts\": \"`+scheduled_departure_date_ts+`\" , `+\n \t\t`\"actual_arrival_date_ts\": \"`+actual_arrival_date_ts+`\" , `+\n \t\t`\"vendor_name\": \"`+vendor_name+`\" , `+\n \t\t`\"file_hash\": \"`+file_hash+`\" , `+\n \t\t`\"tier_type\": \"`+tier_type+`\" `+\n \n \t `}`\n \t\n \tfmt.Println(\"input: \" + input)\n \tfmt.Print(\"input in bytes array: \")\n \tfmt.Println([]byte(input))\n \terr = stub.PutState(shipmentId, []byte(input))\t\t\t\t\t\t\t\t\t//store Shipment with FAA_FormNumber as key\n \tif err != nil {\n \t\treturn nil, err\n \t}\n \t//get the Shipment index\n \tShipmentIndexAsBytes, err := stub.GetState(ShipmentIndexStr)\n \tif err != nil {\n \t\treturn nil, errors.New(\"Failed to get Shipment index\")\n \t}\n \tvar ShipmentIndex []string\n \tfmt.Print(\"ShipmentIndexAsBytes: \")\n \tfmt.Println(ShipmentIndexAsBytes)\n \t\n \tjson.Unmarshal(ShipmentIndexAsBytes, &ShipmentIndex)\t\t\t\t\t\t\t//un stringify it aka JSON.parse()\n \tfmt.Print(\"ShipmentIndex after unmarshal..before append: \")\n \tfmt.Println(ShipmentIndex)\n \t//append\n \tShipmentIndex = append(ShipmentIndex, shipmentId)\t\t\t\t\t\t\t\t\t//add Shipment transID to index list\n \tfmt.Println(\"! Shipment index after appending shipmentId: \", ShipmentIndex)\n \tjsonAsBytes, _ := json.Marshal(ShipmentIndex)\n \tfmt.Print(\"jsonAsBytes: \")\n \tfmt.Println(jsonAsBytes)\n \terr = stub.PutState(ShipmentIndexStr, jsonAsBytes)\t\t\t\t\t\t//store name of Shipment\n \tif err != nil {\n \t\treturn nil, err\n \t}\n \t\n \t\n \t\n \t\n \t//get the Shipment index\n \tif tier_type==\"Tier-3\"{\n \t\t\n \t\tTier3ShipmentIndexAsBytes, err := stub.GetState(Tier3ShipmentIndexStr)\n \t\tif err != nil {\n \t\t\treturn nil, errors.New(\"Failed to get Shipment index\")\n \t\t}\n \t\tvar Tier3ShipmentIndex []string\n \t\tfmt.Print(\"Tier3ShipmentIndexAsBytes: \")\n \t\tfmt.Println(Tier3ShipmentIndexAsBytes)\n \n \t\tjson.Unmarshal(Tier3ShipmentIndexAsBytes, &Tier3ShipmentIndex)\t\t\t\t\t\t\t//un stringify it aka JSON.parse()\n \t\tfmt.Print(\"Tier3ShipmentIndex after unmarshal..before append: \")\n \t\tfmt.Println(Tier3ShipmentIndex)\n \t\t//append\n \t\tTier3ShipmentIndex = append(Tier3ShipmentIndex, shipmentId)\t\t\t\t\t\t\t\t\t//add Shipment transID to index list\n \t\tfmt.Println(\"!Tier3 Shipment index after appending shipmentId: \", Tier3ShipmentIndex)\n \t\tjsonAsBytes, _ := json.Marshal(Tier3ShipmentIndex)\n \t\tfmt.Print(\"jsonAsBytes: \")\n \t\tfmt.Println(jsonAsBytes)\n \t\terr = stub.PutState(Tier3ShipmentIndexStr, jsonAsBytes)\t\t\t\t\t\t//store name of Shipment\n \t\tif err != nil {\n \t\t\treturn nil, err\n \t\t}\n \t}\n \t\n \tif tier_type==\"Tier-2\"{\n \t\t\n \t\tTier2ShipmentIndexAsBytes, err := stub.GetState(Tier2ShipmentIndexStr)\n \t\tif err != nil {\n \t\t\treturn nil, errors.New(\"Failed to get Tier2 Shipment index\")\n \t\t}\n \t\tvar Tier2ShipmentIndex []string\n \t\tfmt.Print(\"Tier2ShipmentIndexAsBytes: \")\n \t\tfmt.Println(Tier2ShipmentIndexAsBytes)\n \n \t\tjson.Unmarshal(Tier2ShipmentIndexAsBytes, &Tier2ShipmentIndex)\t\t\t\t\t\t\t//un stringify it aka JSON.parse()\n \t\tfmt.Print(\"Tier2ShipmentIndex after unmarshal..before append: \")\n \t\tfmt.Println(Tier2ShipmentIndex)\n \t\t//append\n \t\tTier2ShipmentIndex = append(Tier2ShipmentIndex, shipmentId)\t\t\t\t\t\t\t\t\t//add Shipment transID to index list\n \t\tfmt.Println(\"!Tier2 Shipment index after appending shipmentId: \", Tier2ShipmentIndex)\n \t\tjsonAsBytes, _ := json.Marshal(Tier2ShipmentIndex)\n \t\tfmt.Print(\"jsonAsBytes: \")\n \t\tfmt.Println(jsonAsBytes)\n \t\terr = stub.PutState(Tier2ShipmentIndexStr, jsonAsBytes)\t\t\t\t\t\t//store name of Shipment\n \t\tif err != nil {\n \t\t\treturn nil, err\n \t\t}\n \t}\n \t\n \tif tier_type==\"Tier-1\"{\n \t\t\n \t\tTier1ShipmentIndexAsBytes, err := stub.GetState(Tier1ShipmentIndexStr)\n \t\tif err != nil {\n \t\t\treturn nil, errors.New(\"Failed to get Tier1 Shipment index\")\n \t\t}\n \t\tvar Tier1ShipmentIndex []string\n \t\tfmt.Print(\"Tier1ShipmentIndexAsBytes: \")\n \t\tfmt.Println(Tier1ShipmentIndexAsBytes)\n \n \t\tjson.Unmarshal(Tier1ShipmentIndexAsBytes, &Tier1ShipmentIndex)\t\t\t\t\t\t\t//un stringify it aka JSON.parse()\n \t\tfmt.Print(\"Tier1ShipmentIndex after unmarshal..before append: \")\n \t\tfmt.Println(Tier1ShipmentIndex)\n \t\t//append\n \t\tTier1ShipmentIndex = append(Tier1ShipmentIndex, shipmentId)\t\t\t\t\t\t\t\t\t//add Shipment transID to index list\n \t\tfmt.Println(\"!Tier1 Shipment index after appending shipmentId: \", Tier1ShipmentIndex)\n \t\tjsonAsBytes, _ := json.Marshal(Tier1ShipmentIndex)\n \t\tfmt.Print(\"jsonAsBytes: \")\n \t\tfmt.Println(jsonAsBytes)\n \t\terr = stub.PutState(Tier1ShipmentIndexStr, jsonAsBytes)\t\t\t\t\t\t//store name of Shipment\n \t\tif err != nil {\n \t\t\treturn nil, err\n \t\t}\n \t}\n \t\n \tif tier_type==\"OEM\"{\n \t\t\n \t\tOemShipmentIndexAsBytes, err := stub.GetState(OemShipmentIndexStr)\n \t\tif err != nil {\n \t\t\treturn nil, errors.New(\"Failed to get OEM Shipment index\")\n \t\t}\n \t\tvar OemShipmentIndex []string\n \t\tfmt.Print(\"OemShipmentIndexAsBytes: \")\n \t\tfmt.Println(OemShipmentIndexAsBytes)\n \n \t\tjson.Unmarshal(OemShipmentIndexAsBytes, &OemShipmentIndex)\t\t\t\t\t\t\t//un stringify it aka JSON.parse()\n \t\tfmt.Print(\"OemShipmentIndex after unmarshal..before append: \")\n \t\tfmt.Println(OemShipmentIndex)\n \t\t//append\n \t\tOemShipmentIndex = append(OemShipmentIndex, shipmentId)\t\t\t\t\t\t\t\t\t//add Shipment transID to index list\n \t\tfmt.Println(\"!Oem Shipment index after appending shipmentId: \", OemShipmentIndex)\n \t\tjsonAsBytes, _ := json.Marshal(OemShipmentIndex)\n \t\tfmt.Print(\"jsonAsBytes: \")\n \t\tfmt.Println(jsonAsBytes)\n \t\terr = stub.PutState(OemShipmentIndexStr, jsonAsBytes)\t\t\t\t\t\t//store name of Shipment\n \t\tif err != nil {\n \t\t\treturn nil, err\n \t\t}\n \t}\n\tfmt.Println(\"Shipment created successfully.\")\n\t\t// calculate quantity left after shipment creation\n\tvar remainingQty int\n\tremainingQty = formQty - qty\n\n\tfmt.Print(\"remainingQty : \")\n\tfmt.Println(remainingQty)\n\t// Forms should be updated to reflect the actual quantity left after shipment\n\tfunction := \"update_Form\"\n\tinvokeArgs := util.ToChaincodeArgs(function, FAA_formNumber,strconv.Itoa(remainingQty),senderType)\n\tvalAsBytes, err := stub.InvokeChaincode(chaincodeURL, invokeArgs)\n\tif err != nil {\n\t\terrStr := fmt.Sprintf(\"Failed to query chaincode. Got error: %s\", err.Error())\n\t\tfmt.Printf(errStr)\n\t\treturn nil, errors.New(errStr)\n\t}\n\tfmt.Print(\"valAsBytes : \")\n\tfmt.Println(valAsBytes)\n\tfmt.Printf(\"Form updated successfully after successful Shipment creation.\")\n\treturn nil, nil\n}", "title": "" }, { "docid": "5d8e4dfe7fc33dee9c56bc42ada177fb", "score": "0.44390404", "text": "func (ctrl BillingController) Update(w http.ResponseWriter, r *http.Request) {\n\tlogStartInfo(ctrl.Name, funcName(), time.Now())\n\n\tsession, err := Authenticate(r)\n\tif err != nil {\n\t\tresponseError(w, http.StatusInternalServerError, fmt.Sprintf(\"Error while updating billing: %v\", err))\n\t\treturn\n\t}\n\tbillingID := pat.Param(r, \"id\")\n\tbilling := &model.Billing{ID: billingID}\n\tif err := utility.ReadRequestData(r, billing); err != nil {\n\t\tresponseError(w, http.StatusInternalServerError, fmt.Sprintf(\"Error while updating billing: %v\", err))\n\t\treturn\n\t}\n\tif err := billing.UpdateAll(session.TenantID); err != nil {\n\t\tresponseError(w, http.StatusInternalServerError, fmt.Sprintf(\"Error while updating billing: %v\", err))\n\t\treturn\n\t}\n\tfmt.Fprintf(w, \"%s\", utility.ToJSON(billing))\n}", "title": "" }, { "docid": "69a5406daec870f2668b6a34a7654136", "score": "0.4436093", "text": "func BorrowerChangePassword(c echo.Context) error {\n\tdefer c.Request().Body.Close()\n\n\tLogTag := \"BorrowerChangePassword\"\n\n\tuser := c.Get(\"user\")\n\ttoken := user.(*jwt.Token)\n\tclaims := token.Claims.(jwt.MapClaims)\n\tborrowerID, _ := strconv.ParseUint(claims[\"jti\"].(string), 10, 64)\n\n\t//get password from users entity/table\n\tuserBorrower := models.User{}\n\terr = userBorrower.FindbyBorrowerID(borrowerID)\n\tif err != nil {\n\t\tNLog(\"error\", LogTag, map[string]interface{}{\n\t\t\tNLOGMSG: \"not valid borrower personal\",\n\t\t\tNLOGERR: err,\n\t\t\t\"borrower_id\": borrowerID}, c.Get(\"user\").(*jwt.Token), \"\", false, \"borrower\")\n\n\t\treturn returnInvalidResponse(http.StatusForbidden, err, \"Akun bukan borrower personal\")\n\t}\n\n\tpayloadRules := govalidator.MapData{\n\t\t\"password\": []string{},\n\t}\n\n\tvalidate := validateRequestPayload(c, payloadRules, &userBorrower)\n\tif validate != nil {\n\t\tNLog(\"warning\", LogTag, map[string]interface{}{\n\t\t\tNLOGMSG: \"error validation\",\n\t\t\tNLOGERR: validate}, c.Get(\"user\").(*jwt.Token), \"\", false, \"borrower\")\n\n\t\treturn returnInvalidResponse(http.StatusUnprocessableEntity, validate, \"validation error\")\n\t}\n\n\tpasswordByte, err := bcrypt.GenerateFromPassword([]byte(userBorrower.Password), bcrypt.DefaultCost)\n\tif err != nil {\n\t\tNLog(\"warning\", LogTag, map[string]interface{}{\n\t\t\tNLOGMSG: \"error generate passoword\",\n\t\t\tNLOGERR: err}, c.Get(\"user\").(*jwt.Token), \"\", false, \"borrower\")\n\n\t\treturn err\n\t}\n\n\t//update to new password\n\tuserBorrower.Password = string(passwordByte)\n\terr = userBorrower.Save()\n\tif err != nil {\n\t\tNLog(\"error\", LogTag, map[string]interface{}{\n\t\t\tNLOGMSG: \"Failed update borrower password\",\n\t\t\tNLOGERR: err,\n\t\t\tNLOGQUERY: asira.App.DB.QueryExpr(),\n\t\t\t\"borrower_user\": userBorrower}, c.Get(\"user\").(*jwt.Token), \"\", false, \"borrower\")\n\n\t\treturn returnInvalidResponse(http.StatusUnprocessableEntity, err, \"Ubah Password Gagal\")\n\t}\n\n\tNAudittrail(models.Loan{}, userBorrower, token, \"borrower\", fmt.Sprint(userBorrower.ID), \"borrower change password\", \"borrower\")\n\n\tresponseBody := map[string]interface{}{\n\t\t\"status\": true,\n\t\t\"message\": \"Ubah Passord berhasil\",\n\t}\n\treturn c.JSON(http.StatusOK, responseBody)\n}", "title": "" }, { "docid": "96af7f44a36ae5488f30ddee7814df86", "score": "0.44360402", "text": "func run(auth_token string, wallet string, serial_hash string, usdx string, hub string, pkey string) {\n // Get hub address\n hub_addr, _ := api.GetHubAddr(hub)\n\n for true {\n // Make sure ether balance is high enough to send a transaction.\n // NOTE: We won't be sending a transaction, but we need to make sure if\n // the tx gets played by the hub, it will go through\n gas, gasPrice := rpc.DefaultGas(hub)\n needed := gas.Uint64()*gasPrice.Uint64()\n check_ether(needed, wallet, serial_hash, auth_token, hub)\n\n\n // 1. Ping the hub and ask if there are any unpaid bills. This will return\n // amounts and ids for the bills.\n bills, err := api.GetBills(serial_hash, hub, auth_token)\n if err != nil {\n fmt.Printf(\"\\x1b[91m%s ERROR: Failed to get unpaid bills (%e)\\x1b[0m\\n\", DateStr(), err)\n log.Println(\"Encountered error getting bills (%s)\", err)\n } else {\n // 2. Total the unpaid bills and sign a message that will move that many\n // tokens to the address provided by the hub.\n var unpaid_sum float64\n var unpaid_bill_ids []int\n for _, bill := range *bills {\n unpaid_sum += bill.Amount\n unpaid_bill_ids = append(unpaid_bill_ids, bill.BillId)\n }\n if unpaid_sum > 0 {\n // ascii colors: http://misc.flogisoft.com/_media/bash/colors_format/colors_and_formatting.sh.png\n fmt.Printf(\"%s Unpaid amount: \\x1b[91m$%.6f\\x1b[0m\\n\", DateStr(), unpaid_sum)\n\n // 3. Get USDX balance\n decimals := float64(rpc.TokenDecimals(wallet, usdx))\n balance := float64(rpc.TokenBalance(wallet, usdx))\n var usd_balance = math.Ceil(balance/(math.Pow(10, decimals)))\n fmt.Printf(\"%s USDX balance: \\x1b[32m$%.6f\\x1b[0m\\n\", DateStr() , usd_balance)\n\n if usd_balance >= unpaid_sum {\n // Round to the nearest USDX atomic unit\n var to_pay = math.Ceil(unpaid_sum*math.Pow(10, decimals))\n\n to_pay_hex := fmt.Sprintf(\"%x\", int64(to_pay))\n data := fmt.Sprintf(\"0xa9059cbb%s%s\", rpc.Zfill(hub_addr), rpc.Zfill(to_pay_hex))\n tx := rpc.DefaultRawTx(wallet, usdx, data, pkey, hub)\n ids, err := api.PayBills(unpaid_bill_ids, tx, hub, auth_token)\n if err != nil {\n fmt.Printf(\"\\x1b[91m%s ERROR: Failed to pay bills.\\x1b[0m\\n\", DateStr())\n } else {\n fmt.Printf(\"\\x1b[32m%s Successfully paid %d bills.\\x1b[0m\\n\", DateStr(), len(ids))\n }\n } else {\n fmt.Printf(\"\\x1b[91m%s ERROR: Insufficient balance to pay bills.\\x1b[0m\\n\", DateStr())\n }\n }\n\n\n }\n\n // Wait 10 seconds and execute again\n time.Sleep(time.Second*10)\n }\n}", "title": "" }, { "docid": "15f501d86513585d5b0f77c4293e72dd", "score": "0.44340393", "text": "func (_DoubleSigningSlasher *DoubleSigningSlasherRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _DoubleSigningSlasher.Contract.DoubleSigningSlasherTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "5353b5862fa678b62dd0512c621b7411", "score": "0.44334626", "text": "func testPsbtChanFunding(net *lntest.NetworkHarness, t *harnessTest) {\n\tctxb := context.Background()\n\tconst chanSize = lnd.MaxBtcFundingAmount\n\n\t// First, we'll create two new nodes that we'll use to open channels\n\t// between for this test. Dave gets some coins that will be used to\n\t// fund the PSBT, just to make sure that Carol has an empty wallet.\n\tcarol, err := net.NewNode(\"carol\", nil)\n\tutil.RequireNoErr(t.t, err)\n\tdefer shutdownAndAssert(net, t, carol)\n\n\tdave, err := net.NewNode(\"dave\", nil)\n\tutil.RequireNoErr(t.t, err)\n\tdefer shutdownAndAssert(net, t, dave)\n\terr = net.SendCoins(ctxb, btcutil.UnitsPerCoin(), dave)\n\tif err != nil {\n\t\tt.Fatalf(\"unable to send coins to dave: %v\", err)\n\t}\n\n\t// Before we start the test, we'll ensure both sides are connected so\n\t// the funding flow can be properly executed.\n\tctxt, cancel := context.WithTimeout(ctxb, defaultTimeout)\n\tdefer cancel()\n\terr = net.EnsureConnected(ctxt, carol, dave)\n\tutil.RequireNoErr(t.t, err)\n\terr = net.EnsureConnected(ctxt, carol, net.Alice)\n\tutil.RequireNoErr(t.t, err)\n\n\t// At this point, we can begin our PSBT channel funding workflow. We'll\n\t// start by generating a pending channel ID externally that will be used\n\t// to track this new funding type.\n\tvar pendingChanID [32]byte\n\t_, errr := rand.Read(pendingChanID[:])\n\trequire.NoError(t.t, errr)\n\n\t// We'll also test batch funding of two channels so we need another ID.\n\tvar pendingChanID2 [32]byte\n\t_, errr = rand.Read(pendingChanID2[:])\n\trequire.NoError(t.t, errr)\n\n\t// Now that we have the pending channel ID, Carol will open the channel\n\t// by specifying a PSBT shim. We use the NoPublish flag here to avoid\n\t// publishing the whole batch TX too early.\n\tctxt, cancel = context.WithTimeout(ctxb, defaultTimeout)\n\tdefer cancel()\n\tchanUpdates, tempPsbt, err := openChannelPsbt(\n\t\tctxt, carol, dave, lntest.OpenChannelParams{\n\t\t\tAmt: chanSize,\n\t\t\tFundingShim: &lnrpc.FundingShim{\n\t\t\t\tShim: &lnrpc.FundingShim_PsbtShim{\n\t\t\t\t\tPsbtShim: &lnrpc.PsbtShim{\n\t\t\t\t\t\tPendingChanId: pendingChanID[:],\n\t\t\t\t\t\tNoPublish: true,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t)\n\tutil.RequireNoErr(t.t, err)\n\n\t// Let's add a second channel to the batch. This time between Carol and\n\t// Alice. We will publish the batch TX once this channel funding is\n\t// complete.\n\tctxt, cancel = context.WithTimeout(ctxb, defaultTimeout)\n\tdefer cancel()\n\tchanUpdates2, psbtBytes2, err := openChannelPsbt(\n\t\tctxt, carol, net.Alice, lntest.OpenChannelParams{\n\t\t\tAmt: chanSize,\n\t\t\tFundingShim: &lnrpc.FundingShim{\n\t\t\t\tShim: &lnrpc.FundingShim_PsbtShim{\n\t\t\t\t\tPsbtShim: &lnrpc.PsbtShim{\n\t\t\t\t\t\tPendingChanId: pendingChanID2[:],\n\t\t\t\t\t\tNoPublish: false,\n\t\t\t\t\t\tBasePsbt: tempPsbt,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t)\n\tutil.RequireNoErr(t.t, err)\n\n\t// We'll now ask Dave's wallet to fund the PSBT for us. This will return\n\t// a packet with inputs and outputs set but without any witness data.\n\t// This is exactly what we need for the next step.\n\tctxt, cancel = context.WithTimeout(ctxb, defaultTimeout)\n\tdefer cancel()\n\tfundReq := &walletrpc.FundPsbtRequest{\n\t\tTemplate: &walletrpc.FundPsbtRequest_Psbt{\n\t\t\tPsbt: psbtBytes2,\n\t\t},\n\t\tFees: &walletrpc.FundPsbtRequest_SatPerVbyte{\n\t\t\tSatPerVbyte: 2,\n\t\t},\n\t}\n\tfundResp, errr := dave.WalletKitClient.FundPsbt(ctxt, fundReq)\n\trequire.NoError(t.t, errr)\n\n\t// We have a PSBT that has no witness data yet, which is exactly what we\n\t// need for the next step: Verify the PSBT with the funding intents.\n\t_, errr = carol.FundingStateStep(ctxb, &lnrpc.FundingTransitionMsg{\n\t\tTrigger: &lnrpc.FundingTransitionMsg_PsbtVerify{\n\t\t\tPsbtVerify: &lnrpc.FundingPsbtVerify{\n\t\t\t\tPendingChanId: pendingChanID[:],\n\t\t\t\tFundedPsbt: fundResp.FundedPsbt,\n\t\t\t},\n\t\t},\n\t})\n\trequire.NoError(t.t, errr)\n\t_, errr = carol.FundingStateStep(ctxb, &lnrpc.FundingTransitionMsg{\n\t\tTrigger: &lnrpc.FundingTransitionMsg_PsbtVerify{\n\t\t\tPsbtVerify: &lnrpc.FundingPsbtVerify{\n\t\t\t\tPendingChanId: pendingChanID2[:],\n\t\t\t\tFundedPsbt: fundResp.FundedPsbt,\n\t\t\t},\n\t\t},\n\t})\n\trequire.NoError(t.t, errr)\n\n\t// Now we'll ask Dave's wallet to sign the PSBT so we can finish the\n\t// funding flow.\n\tctxt, cancel = context.WithTimeout(ctxb, defaultTimeout)\n\tdefer cancel()\n\tfinalizeReq := &walletrpc.FinalizePsbtRequest{\n\t\tFundedPsbt: fundResp.FundedPsbt,\n\t}\n\tfinalizeRes, errr := dave.WalletKitClient.FinalizePsbt(ctxt, finalizeReq)\n\trequire.NoError(t.t, errr)\n\n\t// We've signed our PSBT now, let's pass it to the intent again.\n\t_, errr = carol.FundingStateStep(ctxb, &lnrpc.FundingTransitionMsg{\n\t\tTrigger: &lnrpc.FundingTransitionMsg_PsbtFinalize{\n\t\t\tPsbtFinalize: &lnrpc.FundingPsbtFinalize{\n\t\t\t\tPendingChanId: pendingChanID[:],\n\t\t\t\tSignedPsbt: finalizeRes.SignedPsbt,\n\t\t\t},\n\t\t},\n\t})\n\trequire.NoError(t.t, errr)\n\n\t// Consume the \"channel pending\" update. This waits until the funding\n\t// transaction was fully compiled.\n\tctxt, cancel = context.WithTimeout(ctxb, defaultTimeout)\n\tdefer cancel()\n\tupdateResp, err := receiveChanUpdate(ctxt, chanUpdates)\n\tutil.RequireNoErr(t.t, err)\n\tupd, ok := updateResp.Update.(*lnrpc.OpenStatusUpdate_ChanPending)\n\trequire.True(t.t, ok)\n\tchanPoint := &lnrpc.ChannelPoint{\n\t\tFundingTxid: &lnrpc.ChannelPoint_FundingTxidBytes{\n\t\t\tFundingTxidBytes: upd.ChanPending.Txid,\n\t\t},\n\t\tOutputIndex: upd.ChanPending.OutputIndex,\n\t}\n\n\t// No transaction should have been published yet.\n\tmempool, err := net.Miner.Node.GetRawMempool()\n\tutil.RequireNoErr(t.t, err)\n\trequire.Equal(t.t, 0, len(mempool))\n\n\t// Let's progress the second channel now. This time we'll use the raw\n\t// wire format transaction directly.\n\tutil.RequireNoErr(t.t, err)\n\t_, errr = carol.FundingStateStep(ctxb, &lnrpc.FundingTransitionMsg{\n\t\tTrigger: &lnrpc.FundingTransitionMsg_PsbtFinalize{\n\t\t\tPsbtFinalize: &lnrpc.FundingPsbtFinalize{\n\t\t\t\tPendingChanId: pendingChanID2[:],\n\t\t\t\tFinalRawTx: finalizeRes.RawFinalTx,\n\t\t\t},\n\t\t},\n\t})\n\trequire.NoError(t.t, errr)\n\n\t// Consume the \"channel pending\" update for the second channel. This\n\t// waits until the funding transaction was fully compiled and in this\n\t// case published.\n\tctxt, cancel = context.WithTimeout(ctxb, defaultTimeout)\n\tdefer cancel()\n\tupdateResp2, err := receiveChanUpdate(ctxt, chanUpdates2)\n\tutil.RequireNoErr(t.t, err)\n\tupd2, ok := updateResp2.Update.(*lnrpc.OpenStatusUpdate_ChanPending)\n\trequire.True(t.t, ok)\n\tchanPoint2 := &lnrpc.ChannelPoint{\n\t\tFundingTxid: &lnrpc.ChannelPoint_FundingTxidBytes{\n\t\t\tFundingTxidBytes: upd2.ChanPending.Txid,\n\t\t},\n\t\tOutputIndex: upd2.ChanPending.OutputIndex,\n\t}\n\n\t// Great, now we can mine a block to get the transaction confirmed, then\n\t// wait for the new channel to be propagated through the network.\n\tvar finalTx wire.MsgTx\n\terr = finalTx.Deserialize(bytes.NewReader(finalizeRes.RawFinalTx))\n\tutil.RequireNoErr(t.t, err)\n\n\ttxHash := finalTx.TxHash()\n\tblock := mineBlocks(t, net, 6, 1)[0]\n\tassertTxInBlock(t, block, &txHash)\n\tctxt, cancel = context.WithTimeout(ctxb, defaultTimeout)\n\tdefer cancel()\n\terr = carol.WaitForNetworkChannelOpen(ctxt, chanPoint)\n\tutil.RequireNoErr(t.t, err)\n\terr = carol.WaitForNetworkChannelOpen(ctxt, chanPoint2)\n\tutil.RequireNoErr(t.t, err)\n\n\t// With the channel open, ensure that it is counted towards Carol's\n\t// total channel balance.\n\tbalReq := &lnrpc.ChannelBalanceRequest{}\n\tctxt, cancel = context.WithTimeout(ctxb, defaultTimeout)\n\tdefer cancel()\n\tbalRes, errr := carol.ChannelBalance(ctxt, balReq)\n\trequire.NoError(t.t, errr)\n\trequire.NotEqual(t.t, int64(0), balRes.LocalBalance.Sat)\n\n\t// Next, to make sure the channel functions as normal, we'll make some\n\t// payments within the channel.\n\tpayAmt := btcutil.Amount(100000)\n\tinvoice := &lnrpc.Invoice{\n\t\tMemo: \"new chans\",\n\t\tValue: int64(payAmt),\n\t}\n\tctxt, _ = context.WithTimeout(ctxb, defaultTimeout)\n\tresp, errr := dave.AddInvoice(ctxt, invoice)\n\trequire.NoError(t.t, errr)\n\tctxt, _ = context.WithTimeout(ctxb, defaultTimeout)\n\terr = completePaymentRequests(\n\t\tctxt, carol, carol.RouterClient, []string{resp.PaymentRequest},\n\t\ttrue,\n\t)\n\tutil.RequireNoErr(t.t, err)\n\n\t// To conclude, we'll close the newly created channel between Carol and\n\t// Dave. This function will also block until the channel is closed and\n\t// will additionally assert the relevant channel closing post\n\t// conditions.\n\tctxt, cancel = context.WithTimeout(ctxb, channelCloseTimeout)\n\tdefer cancel()\n\tcloseChannelAndAssert(ctxt, t, net, carol, chanPoint, false)\n}", "title": "" }, { "docid": "9979cf2699057525fab1971b579455a8", "score": "0.4424672", "text": "func (a *Accounting) settle(ctx context.Context, peer swarm.Address, balance *accountingPeer) error {\n\toldBalance, err := a.Balance(peer)\n\tif err != nil {\n\t\tif !errors.Is(err, ErrPeerNoBalance) {\n\t\t\treturn fmt.Errorf(\"failed to load balance: %w\", err)\n\t\t}\n\t}\n\n\t// Don't do anything if there is no actual debt.\n\t// This might be the case if the peer owes us and the total reserve for a\n\t// peer exceeds the payment treshold.\n\tif oldBalance >= 0 {\n\t\treturn nil\n\t}\n\n\t// check safety of the following -1 * int64 conversion, all negative int64 have positive int64 equals except MinInt64\n\tif oldBalance == math.MinInt64 {\n\t\treturn ErrOverflow\n\t}\n\n\t// This is safe because of the earlier check for oldbalance < 0 and the check for != MinInt64\n\tpaymentAmount := uint64(-oldBalance)\n\tnextBalance := 0\n\n\t// Try to save the next balance first.\n\t// Otherwise we might pay and then not be able to save, forcing us to pay\n\t// again after restart.\n\terr = a.store.Put(peerBalanceKey(peer), nextBalance)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to persist balance: %w\", err)\n\t}\n\n\terr = a.settlement.Pay(ctx, peer, paymentAmount)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"settlement for amount %d failed: %w\", paymentAmount, err)\n\t\t// If the payment didn't succeed we should restore the old balance in\n\t\t// the state store.\n\t\tif storeErr := a.store.Put(peerBalanceKey(peer), oldBalance); storeErr != nil {\n\t\t\ta.logger.Errorf(\"failed to restore balance after failed settlement for peer %v: %v\", peer, storeErr)\n\t\t}\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "87082fca933c1d7ada35f020928716dc", "score": "0.44139954", "text": "func TestTransferFromSavingsGoal(t *testing.T) {\n\tclient, mux, _, teardown := setup()\n\tdefer teardown()\n\n\tgoalUID := \"d8770f9d-4ee9-4cc1-86e1-83c26bcfcc4f\"\n\ttxnUID := \"28dff346-dd48-426f-96df-d7f33d29c379\"\n\tmockResp := `{\"transferUid\":\"28dff346-dd48-426f-96df-d7f33d29c379\",\"success\":true,\"errors\":[]}`\n\n\tmockAmount := Amount{Currency: \"GBP\", MinorUnits: 1050}\n\tmockReq := withdrawalRequest{Amount: mockAmount}\n\n\tmux.HandleFunc(\"/api/v1/savings-goals/\", func(w http.ResponseWriter, r *http.Request) {\n\t\tcheckMethod(t, r, \"PUT\")\n\n\t\tvar wr = withdrawalRequest{}\n\t\terr := json.NewDecoder(r.Body).Decode(&wr)\n\t\tif err != nil {\n\t\t\tt.Fatal(\"should send a request that the API can parse\", cross, err)\n\t\t}\n\n\t\tif !reflect.DeepEqual(mockReq, wr) {\n\t\t\tt.Error(\"should send a top-up request that matches the mock\", cross)\n\t\t}\n\n\t\tresource := path.Base(path.Dir(r.URL.Path))\n\t\tif resource != \"withdraw-money\" {\n\t\t\tt.Error(\"should make a request to withdraw-money\", cross, resource)\n\t\t}\n\n\t\treqUID, err := uuid.Parse(path.Base(r.URL.Path))\n\t\tif err != nil {\n\t\t\tt.Error(\"should send a top-up request with a valid UID\", cross, reqUID)\n\t\t}\n\n\t\tw.WriteHeader(http.StatusOK)\n\t\tfmt.Fprintln(w, mockResp)\n\t})\n\n\tid, resp, err := client.TransferFromSavingsGoal(context.Background(), goalUID, mockAmount)\n\tif err != nil {\n\t\tt.Fatal(\"should be able to make the request\", cross, err)\n\t}\n\n\twant := &savingsGoalTransferResponse{}\n\tjson.Unmarshal([]byte(mockResp), want)\n\n\tif got, want := resp.StatusCode, http.StatusOK; got != want {\n\t\tt.Errorf(\"should receive a %d status code %s %d\", want, cross, got)\n\t}\n\n\tif got, want := id, txnUID; got != want {\n\t\tt.Fatal(\"should be receive the UID assigned to the transaction\", cross, got)\n\t}\n}", "title": "" }, { "docid": "df23be1f59fcfb4f2d0aa48a70add123", "score": "0.4411134", "text": "func (gateway *CoreGateway) CreateBilling(br BillingRequest) (resp BillingResponse, respError ResponseError, err error) {\n\theaders := map[string]string{\n\t\t\"Content-Type\": \"application/json\",\n\t}\n\n\tbrByte, err := json.Marshal(br)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdata := Encrypt(string(brByte), gateway.Client.ClientID, gateway.Client.ClientSecret)\n\n\treq := Request{\n\t\tClientID: gateway.Client.ClientID,\n\t\tData: data,\n\t}\n\n\treqByte, err := json.Marshal(req)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar res map[string]interface{}\n\n\terr = gateway.Call(\"POST\", \"\", headers, strings.NewReader(string(reqByte)), &res)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tif res[\"status\"].(string) == StatusSuccess {\n\t\tdataRespStr, errDecrypt := Decrypt(res[\"data\"].(string), gateway.Client.ClientID, gateway.Client.ClientSecret)\n\t\tif errDecrypt != nil {\n\t\t\terr = errDecrypt\n\t\t\treturn\n\t\t}\n\n\t\tvar dataResp BillingData\n\n\t\tjson.Unmarshal([]byte(dataRespStr), &dataResp)\n\t\tresp = BillingResponse{\n\t\t\tres[\"status\"].(string),\n\t\t\tdataResp,\n\t\t}\n\t} else {\n\t\trespError.Status = res[\"status\"].(string)\n\t\trespError.Message = res[\"message\"].(string)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "850fe98ab48396d4445ab9a47e7ab7de", "score": "0.4409165", "text": "func (_RenExBalances *RenExBalancesTransactorSession) TransferBalanceWithFee(_traderFrom common.Address, _traderTo common.Address, _token common.Address, _value *big.Int, _fee *big.Int, _feePayee common.Address) (*types.Transaction, error) {\n\treturn _RenExBalances.Contract.TransferBalanceWithFee(&_RenExBalances.TransactOpts, _traderFrom, _traderTo, _token, _value, _fee, _feePayee)\n}", "title": "" }, { "docid": "d4703ef520f3b1ee74097b85b0f19da8", "score": "0.44079608", "text": "func (this *Report) roundBal() {\n\tthis.Balance.Assets.Sta = math.Round(this.Balance.Assets.Sta*decimals) / decimals\n\tthis.Balance.Liabls.Sta = math.Round(this.Balance.Liabls.Sta*decimals) / decimals\n\tthis.Balance.Equity.Sta = math.Round(this.Balance.Equity.Sta*decimals) / decimals\n\n\tthis.Profit.Revenue.Sta = math.Round(this.Profit.Revenue.Sta*decimals) / decimals\n\tthis.Profit.Expense.Sta = math.Round(this.Profit.Expense.Sta*decimals) / decimals\n\tthis.Profit.Profit.Sta = math.Round(this.Profit.Profit.Sta*decimals) / decimals\n\n\tthis.Balance.Assets.End = math.Round(this.Balance.Assets.End*decimals) / decimals\n\tthis.Balance.Liabls.End = math.Round(this.Balance.Liabls.End*decimals) / decimals\n\tthis.Balance.Equity.End = math.Round(this.Balance.Equity.End*decimals) / decimals\n\n\tthis.Profit.Revenue.End = math.Round(this.Profit.Revenue.End*decimals) / decimals\n\tthis.Profit.Expense.End = math.Round(this.Profit.Expense.End*decimals) / decimals\n\tthis.Profit.Profit.End = math.Round(this.Profit.Profit.End*decimals) / decimals\n\n\tthis.Balance.Assets.Dif = math.Round(this.Balance.Assets.Dif*decimals) / decimals\n\tthis.Balance.Liabls.Dif = math.Round(this.Balance.Liabls.Dif*decimals) / decimals\n\tthis.Balance.Equity.Dif = math.Round(this.Balance.Equity.Dif*decimals) / decimals\n\n\tthis.Profit.Revenue.Dif = math.Round(this.Profit.Revenue.Dif*decimals) / decimals\n\tthis.Profit.Expense.Dif = math.Round(this.Profit.Expense.Dif*decimals) / decimals\n\tthis.Profit.Profit.Dif = math.Round(this.Profit.Profit.Dif*decimals) / decimals\n\n\tthis.Balance.Retained.Dif = math.Round(this.Balance.Retained.Dif*decimals) / decimals\n\tthis.Balance.Retained.End = math.Round(this.Balance.Retained.End*decimals) / decimals\n}", "title": "" }, { "docid": "b63f951106834a6bd12ed1dbfbf1eb9d", "score": "0.4406361", "text": "func (_DoubleSigningSlasher *DoubleSigningSlasherTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _DoubleSigningSlasher.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "ef43b180cc6e593ae2e480df8dd0c1f2", "score": "0.44045907", "text": "func bookCab(c *gin.Context) {\r\n\r\n\tbody := c.Request.Body\r\n\tdecoder := json.NewDecoder(body)\r\n\tvar param bookings\r\n\tvar cabDetails cabs\r\n\tdecodeErr := decoder.Decode(&param)\r\n\tif decodeErr != nil {\r\n\t\tfmt.Println(decodeErr.Error())\r\n\t\treturn\r\n\t}\r\n\r\n\tif param.CabID == 0 {\r\n\t\tc.JSON(http.StatusNotFound, gin.H{\"status\": http.StatusBadRequest, \"message\": \"Please provide valid cab Id!\"})\r\n\t\treturn\r\n\t}\r\n\r\n\tdb.Where(\"id = ?\", param.CabID).Find(&cabDetails)\r\n\r\n\tif cabDetails.DriverName == \"\" {\r\n\t\tc.JSON(http.StatusNotFound, gin.H{\"status\": http.StatusBadRequest, \"message\": \"sdasdasPlease provide valid cab Id!\"})\r\n\t\treturn\r\n\t}\r\n\r\n\tbooking := bookings{UserID: param.UserID, CabID: param.CabID, BookedAt: time.Now(), FromLoc: param.FromLoc, ToLoc: param.ToLoc, Status: \"booked\"}\r\n\tdb.Save(&booking)\r\n\r\n\tdb.Model(&cabDetails).Update(\"status\", \"booked\")\r\n\r\n\tc.JSON(http.StatusCreated, gin.H{\"status\": http.StatusCreated, \"message\": \"Cab booked successfully!\", \"driver_number\": cabDetails.DriverNumber, \"driver_name\": cabDetails.DriverName, \"cab_number\": cabDetails.CabNumber, \"bookingId\": booking.ID})\r\n\r\n}", "title": "" }, { "docid": "4a71c59a0968eedbe522c11d6fae4156", "score": "0.4401739", "text": "func\t_transfer(ptr *UserInfos, to string, amount uint64) {\n\t(*ptr).Amount -= amount\n}", "title": "" }, { "docid": "356c03dc82a70065bae9c041c80edb8a", "score": "0.43940863", "text": "func generateAccount(localLotusAP string, token string, superAcct string, num int) ([]string, []string, error) {\n\t// Get API\n\tvar api apistruct.FullNodeStruct\n\theaders := http.Header{\"Authorization\": []string{\"Bearer \" + token}}\n\tcloser, err := jsonrpc.NewMergeClient(context.Background(), localLotusAP, \"Filecoin\", []interface{}{&api.Internal, &api.CommonStruct.Internal}, headers)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tdefer closer()\n\n\tmainAddress, err := address.NewFromString(superAcct)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tprivateKeys := make([]string, 0)\n\taddresses := make([]string, 0)\n\tcids := make([]cid2.Cid, 0)\n\n\t// Send messages\n\tfor i := 0; i < num; i++ {\n\t\tprivKey, pubKey, err := generateKeyPair()\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\t\tprivKeyStr := hex.EncodeToString(privKey)\n\n\t\taddress1, err := address.NewSecp256k1Address(pubKey)\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\n\t\t// Get amount\n\t\tamt, err := types.ParseFIL(\"100\")\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\n\t\tmsg := &types.Message{\n\t\t\tTo: address1,\n\t\t\tFrom: mainAddress,\n\t\t\tValue: types.BigInt(amt),\n\t\t\tMethod: 0,\n\t\t}\n\t\tsignedMsg, err := fillMsg(mainAddress, &api, msg)\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\n\t\t// Send request to lotus\n\t\tcid, err := api.MpoolPush(context.Background(), signedMsg)\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\t\tcids = append(cids, cid)\n\n\t\t// Add to result\n\t\tprivateKeys = append(privateKeys, privKeyStr)\n\t\taddresses = append(addresses, address1.String())\n\t}\n\n\t// Finally check receipts\n\tfor _, cid := range cids {\n\t\treceipt := waitReceipt(&cid, &api)\n\t\tif receipt.ExitCode != 0 {\n\t\t\treturn nil, nil, errors.New(\"Transaction fail to execute\")\n\t\t}\n\t}\n\n\treturn privateKeys, addresses, nil\n}", "title": "" }, { "docid": "34882feb70ad0fafddab2e553efdc84a", "score": "0.4392685", "text": "func (_RenExBalances *RenExBalancesSession) TransferBalanceWithFee(_traderFrom common.Address, _traderTo common.Address, _token common.Address, _value *big.Int, _fee *big.Int, _feePayee common.Address) (*types.Transaction, error) {\n\treturn _RenExBalances.Contract.TransferBalanceWithFee(&_RenExBalances.TransactOpts, _traderFrom, _traderTo, _token, _value, _fee, _feePayee)\n}", "title": "" }, { "docid": "a85940d700758d37cea05ca49a7486ec", "score": "0.439174", "text": "func (ccp *CreditCardPayment) PayuCreditCard() (err error) {\n\n\tdefer (func() {\n\t\tr := recover()\n\n\t\tif r != nil {\n\t\t\terr = errors.New(\"Bad entity data\")\n\t\t}\n\t})()\n\n\tlanguageCode := \"ES\"\n\n\tpayerData := ccp.ExtraData[\"payer\"].(map[string]interface{})\n\n\torderData := ccp.ExtraData[\"order\"].(map[string]interface{})\n\n\tbillingAddress := payerData[\"billing_address\"].(payuBillingAddress)\n\tbillingAddress.Country = ccp.Country\n\n\tshippingAddress := payuShippingAddress{\n\t\tStreet1: billingAddress.Street1,\n\t\tStreet2: billingAddress.Street1,\n\t\tCity: billingAddress.Street1,\n\t\tCountry: billingAddress.Country,\n\t}\n\n\t//Buyer\n\tbuyer := payuBuyer{\n\t\tFullName: payerData[\"full_name\"].(string),\n\t\tEmailAddress: payerData[\"email\"].(string),\n\t\tContactPhone: payerData[\"contact_phone\"].(string),\n\t\tDniNumber: payerData[\"dni_number\"].(string),\n\t\tShippingAddress: shippingAddress,\n\t}\n\n\ttaxValue := payuTaxValue{\n\t\tCurrency: ccp.Currency,\n\t\tValue: ccp.Price,\n\t}\n\n\tadditionalValues := payuAdditionalValues{TaxValue: taxValue}\n\n\torder := payuOrder{\n\t\tAccountID: orderData[\"account_id\"].(string),\n\t\tReferenceCode: orderData[\"reference_code\"].(string),\n\t\tDescription: \"\", //TODO: description order by products\n\t\tLanguage: languageCode,\n\t\tSignature: orderData[\"signature\"].(string),\n\t\tNotifyURL: orderData[\"notify_url\"].(string),\n\t\tAdditionalValues: additionalValues,\n\t\tBuyer: buyer, // orderData[\"billing_address\"].(payuBillingAddress)\n\t}\n\n\t////\n\t//Payer\n\tpayer := payuPayer{\n\t\tFullName: payerData[\"full_name\"].(string),\n\t\tEmailAddress: payerData[\"email\"].(string),\n\t\tContactphone: payerData[\"contact_phone\"].(string),\n\t\tDniNumber: payerData[\"dni_number\"].(string),\n\t\tBirthdate: payerData[\"birthdate\"].(string),\n\t\tBillingAddress: billingAddress,\n\t}\n\n\textraParameters := payuExtraParameters{InstallamentsNumber: 1}\n\n\ttransaction := payuTransaction{\n\t\tOrder: order,\n\t\tPayer: payer,\n\t\tExtraParameters: extraParameters,\n\t\tCreditCardTokenID: ccp.Token,\n\t\tType: \"AUTHORIZATION\",\n\t\tPaymentMethod: payerData[\"payment_method\"].(string),\n\t\tPaymentCountry: ccp.Country,\n\t\tDeviceSessionID: payerData[\"device_session_id\"].(string),\n\t\tIPAddress: payerData[\"ip_address\"].(string),\n\t\tCookie: payerData[\"cookie\"].(string),\n\t\tUserAgent: payerData[\"user_agent\"].(string),\n\t}\n\n\tpayuRequest := &payuRequestData{\n\t\tLanguage: languageCode,\n\t\tCommand: \"SUBMIT_TRANSACTION\",\n\t\tMerchant: payu,\n\t\tTransaction: transaction,\n\t\tTest: false,\n\t}\n\n\tpayuRequestJSON, err := json.Marshal(payuRequest)\n\n\tif err != nil {\n\t\treturn\n\t}\n\n\tclient := &http.Client{}\n\n\tresponse, err := client.Post(\"\", \"\", bytes.NewReader(payuRequestJSON)) //TODO: agregar urls de payu\n\n\tif err != nil {\n\t\treturn\n\t}\n\n\tif response.StatusCode != http.StatusOK {\n\n\t\terr = errors.New(\"Payment Failed\")\n\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "020789b25c73d30af166a84fcdb76274", "score": "0.43895745", "text": "func (client *Client) Transfer(arguments ...args.Argument) error {\n\trequired := []string{\"address\", \"amount\", \"currency\"}\n\tresp, err := client.postReq(\"transfer\", \"Transfer\", required, arguments...)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error making the request: %s\", err)\n\t}\n\tvar iResp InstantResponse\n\tjson.Unmarshal(resp, &iResp)\n\tif iResp.Status == \"error\" {\n\t\treturn fmt.Errorf(\"error from the server side: %s\", iResp.Message)\n\t}\n\treturn nil\n\n}", "title": "" }, { "docid": "2bfea7bb355983f39cb5fcc99b0721fc", "score": "0.43854004", "text": "func (t *TradeWorkflowChaincode) prepareShipment(stub shim.ChaincodeStubInterface, creatorOrg string, creatorCertIssuer string, args []string) pb.Response {\n\tvar elKey, shipmentLocationKey string\n\tvar shipmentLocationBytes, exportLicenseBytes []byte\n\tvar exportLicense *ExportLicense\n\tvar err error\n\n\t// Access control: Only an Exporter Org member can invoke this transaction\n\tif !t.testMode && !authenticateExporterOrg(creatorOrg, creatorCertIssuer) {\n\t\treturn shim.Error(\"Caller not a member of Exporter Org. Access denied.\")\n\t}\n\n\tif len(args) != 1 {\n\t\terr = errors.New(fmt.Sprintf(\"Incorrect number of arguments. Expecting 1: {Trade ID}. Found %d\", len(args)))\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// Lookup shipment location from the ledger\n\tshipmentLocationKey, err = getShipmentLocationKey(stub, args[0])\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tshipmentLocationBytes, err = stub.GetState(shipmentLocationKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tif len(shipmentLocationBytes) != 0 {\n\t\tif string(shipmentLocationBytes) == SOURCE {\n\t\t\tfmt.Printf(\"Shipment for trade %s has already been prepared\", args[0])\n\t\t\treturn shim.Success(nil)\n\t\t} else {\n\t\t\tfmt.Printf(\"Shipment for trade %s has passed the preparation stage\", args[0])\n\t\t\treturn shim.Error(\"Shipment past the preparation stage\")\n\t\t}\n\t}\n\n\t// Lookup E/L from the ledger\n\telKey, err = getELKey(stub, args[0])\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\texportLicenseBytes, err = stub.GetState(elKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// Unmarshal the JSON\n\terr = json.Unmarshal(exportLicenseBytes, &exportLicense)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// Verify that the E/L has already been issued\n\tif exportLicense.Status != ISSUED {\n\t\tfmt.Printf(\"E/L for trade %s has not been issued\", args[0])\n\t\treturn shim.Error(\"E/L not issued yet\")\n\t}\n\n\tshipmentLocationKey, err = getShipmentLocationKey(stub, args[0])\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\t// Write the state to the ledger\n\terr = stub.PutState(shipmentLocationKey, []byte(SOURCE))\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tfmt.Printf(\"Shipment preparation for trade %s recorded\\n\", args[0])\n\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "a329e35592256eb187d81f9b733e3291", "score": "0.438167", "text": "func (st *State) transferBalance(rt Runtime, fromAddr addr.Address, toAddr addr.Address, amount abi.TokenAmount) {\n\tAssert(amount.GreaterThanEqual(big.Zero()))\n\n\tet, err := adt.AsBalanceTable(adt.AsStore(rt), st.EscrowTable)\n\tif err != nil {\n\t\trt.Abortf(exitcode.ErrIllegalState, \"loading escrow table: %s\", err)\n\t}\n\tlt, err := adt.AsBalanceTable(adt.AsStore(rt), st.LockedTable)\n\tif err != nil {\n\t\trt.Abortf(exitcode.ErrIllegalState, \"loading locked balance table: %s\", err)\n\t}\n\n\tif err := et.MustSubtract(fromAddr, amount); err != nil {\n\t\trt.Abortf(exitcode.ErrIllegalState, \"subtract from escrow: %v\", err)\n\t}\n\n\tif err := lt.MustSubtract(fromAddr, amount); err != nil {\n\t\trt.Abortf(exitcode.ErrIllegalState, \"subtract from locked: %v\", err)\n\t}\n\n\tif err := et.Add(toAddr, amount); err != nil {\n\t\trt.Abortf(exitcode.ErrIllegalState, \"add to escrow: %v\", err)\n\t}\n\n\tltc, err := lt.Root()\n\tif err != nil {\n\t\trt.Abortf(exitcode.ErrIllegalState, \"failed to flush locked table: %s\", err)\n\t}\n\tetc, err := et.Root()\n\tif err != nil {\n\t\trt.Abortf(exitcode.ErrIllegalState, \"failed to flush escrow table: %s\", err)\n\t}\n\n\tst.LockedTable = ltc\n\tst.EscrowTable = etc\n}", "title": "" }, { "docid": "9337aeb639d349857eea701f48b27d93", "score": "0.4375376", "text": "func (_GlobalInbox *GlobalInboxTransactor) TransferPayment(opts *bind.TransactOpts, originalOwner common.Address, newOwner common.Address, nodeHash [32]byte, messageIndex *big.Int) (*types.Transaction, error) {\n\treturn _GlobalInbox.contract.Transact(opts, \"transferPayment\", originalOwner, newOwner, nodeHash, messageIndex)\n}", "title": "" }, { "docid": "c1c7f3b1ae4f9a9f1c2f91250a883d3b", "score": "0.43736723", "text": "func Transfer(db vm.StateDB, sender, recipient common.Address, amount *big.Int) {\n\tdb.SubBalance(sender, amount)\n\tdb.AddBalance(recipient, amount)\n}", "title": "" }, { "docid": "055bb7b51a424bb9f356fa04e3b70b92", "score": "0.4363324", "text": "func (ws WalletService) Transfer(ctx context.Context, walletFrom, walletTo int, amount decimal.Decimal) (int, error) {\n\t// Update source wallet 'balance' column\n\t_, updateSourceErr := ws.db.ExecContext(ctx, \"update wallets set balance=balance-$1 where id=$2\", amount, walletFrom)\n\tif updateSourceErr != nil {\n\t\treturn 0, fmt.Errorf(\"error source wallet debit: %s\", updateSourceErr)\n\t}\n\n\t// Update target wallet 'balance' column\n\t_, updateTargetErr := ws.db.ExecContext(ctx, \"update wallets set balance=balance+$1 where id=$2\", amount, walletTo)\n\tif updateTargetErr != nil {\n\t\treturn 0, fmt.Errorf(\"error target wallet transfer: %s\", updateTargetErr)\n\t}\n\n\treturn walletFrom, nil\n}", "title": "" }, { "docid": "87c9fb1f9021c10808fd1951addbb486", "score": "0.4356197", "text": "func main() {\n\tshirtItem := newItem(\"foyon shirt\")\n\tob1 := &Customer{\n\t\tId: \"foyon0806@gmail.com\",\n\t}\n\n\tob2 := &Customer{\n\t\tId: \"foyon0806@outlook.com\",\n\t}\n\n\tshirtItem.register(ob1)\n\tshirtItem.register(ob2)\n\n\tshirtItem.updateSt()\n\n}", "title": "" }, { "docid": "1a1ff29d26907319522ed6e32059cefc", "score": "0.43533507", "text": "func (_RenExBalances *RenExBalancesTransactor) TransferBalanceWithFee(opts *bind.TransactOpts, _traderFrom common.Address, _traderTo common.Address, _token common.Address, _value *big.Int, _fee *big.Int, _feePayee common.Address) (*types.Transaction, error) {\n\treturn _RenExBalances.contract.Transact(opts, \"transferBalanceWithFee\", _traderFrom, _traderTo, _token, _value, _fee, _feePayee)\n}", "title": "" }, { "docid": "e802c75fdb54368a6c9dc56dd168f244", "score": "0.4350662", "text": "func (_Vbnb *VbnbTransactor) RepayBorrow(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Vbnb.contract.Transact(opts, \"repayBorrow\")\n}", "title": "" }, { "docid": "fc12e703bcacde2bc3a044f7924aafb2", "score": "0.43442765", "text": "func (ainfo *accountInfo) processDeposit(amt uint64){\nainfo.Balance+=amt\n}", "title": "" }, { "docid": "dda70f9cc47b03cfb1cc3c62d277d8b9", "score": "0.43434328", "text": "func (w *WalletKit) FundPsbt(_ context.Context,\n\treq *FundPsbtRequest) (*FundPsbtResponse, error) {\n\n\tvar (\n\t\terr error\n\t\tpacket *psbt.Packet\n\t\tfeeAtomsPerKB chainfee.AtomPerKByte\n\t\tlocks []*utxoLock\n\t\trawPsbt bytes.Buffer\n\t)\n\n\t// There are two ways a user can specify what we call the template (a\n\t// list of inputs and outputs to use in the PSBT): Either as a PSBT\n\t// packet directly or as a special RPC message. Find out which one the\n\t// user wants to use, they are mutually exclusive.\n\tswitch {\n\t// The template is specified as a PSBT. All we have to do is parse it.\n\tcase req.GetPsbt() != nil:\n\t\tr := bytes.NewReader(req.GetPsbt())\n\t\tpacket, err = psbt.NewFromRawBytes(r, false)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not parse PSBT: %v\", err)\n\t\t}\n\n\t// The template is specified as a RPC message. We need to create a new\n\t// PSBT and copy the RPC information over.\n\tcase req.GetRaw() != nil:\n\t\ttpl := req.GetRaw()\n\t\tif len(tpl.Outputs) == 0 {\n\t\t\treturn nil, fmt.Errorf(\"no outputs specified\")\n\t\t}\n\n\t\ttxOut := make([]*wire.TxOut, 0, len(tpl.Outputs))\n\t\tfor addrStr, amt := range tpl.Outputs {\n\t\t\taddr, err := stdaddr.DecodeAddress(\n\t\t\t\taddrStr, w.cfg.ChainParams,\n\t\t\t)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"error parsing address \"+\n\t\t\t\t\t\"%s for network %s: %v\", addrStr,\n\t\t\t\t\tw.cfg.ChainParams.Name, err)\n\t\t\t}\n\t\t\tscriptVersion, pkScript := addr.PaymentScript()\n\t\t\ttxOut = append(txOut, &wire.TxOut{\n\t\t\t\tValue: int64(amt),\n\t\t\t\tPkScript: pkScript,\n\t\t\t\tVersion: scriptVersion,\n\t\t\t})\n\t\t}\n\n\t\ttxIn := make([]*wire.OutPoint, len(tpl.Inputs))\n\t\tfor idx, in := range tpl.Inputs {\n\t\t\top, err := unmarshallOutPoint(in)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"error parsing \"+\n\t\t\t\t\t\"outpoint: %v\", err)\n\t\t\t}\n\t\t\ttxIn[idx] = op\n\t\t}\n\n\t\tsequences := make([]uint32, len(txIn))\n\t\tpacket, err = psbt.New(txIn, txOut, 2, 0, sequences)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not create PSBT: %v\", err)\n\t\t}\n\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"transaction template missing, need \" +\n\t\t\t\"to specify either PSBT or raw TX template\")\n\t}\n\n\t// Determine the desired transaction fee.\n\tswitch {\n\t// Estimate the fee by the target number of blocks to confirmation.\n\tcase req.GetTargetConf() != 0:\n\t\ttargetConf := req.GetTargetConf()\n\t\tif targetConf < 2 {\n\t\t\treturn nil, fmt.Errorf(\"confirmation target must be \" +\n\t\t\t\t\"greater than 1\")\n\t\t}\n\n\t\tfeeAtomsPerKB, err = w.cfg.FeeEstimator.EstimateFeePerKB(\n\t\t\ttargetConf,\n\t\t)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not estimate fee: %v\",\n\t\t\t\terr)\n\t\t}\n\n\t// Convert the fee to sat/kW from the specified sat/vByte.\n\tcase req.GetAtomsPerByte() != 0:\n\t\tfeeAtomsPerKB = chainfee.AtomPerKByte(\n\t\t\treq.GetAtomsPerByte() * 1000,\n\t\t)\n\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"fee definition missing, need to \" +\n\t\t\t\"specify either target_conf or set_per_vbyte\")\n\t}\n\n\t// The RPC parsing part is now over. Several of the following operations\n\t// require us to hold the global coin selection lock so we do the rest\n\t// of the tasks while holding the lock. The result is a list of locked\n\t// UTXOs.\n\tchangeIndex := int32(-1)\n\terr = w.cfg.CoinSelectionLocker.WithCoinSelectLock(func() error {\n\t\t// In case the user did specify inputs, we need to make sure\n\t\t// they are known to us, still unspent and not yet locked.\n\t\tif len(packet.UnsignedTx.TxIn) > 0 {\n\t\t\t// Get a list of all unspent witness outputs.\n\t\t\tutxos, err := w.cfg.Wallet.ListUnspentWitness(\n\t\t\t\tdefaultMinConf, defaultMaxConf, req.Account,\n\t\t\t)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// Validate all inputs against our known list of UTXOs\n\t\t\t// now.\n\t\t\terr = verifyInputsUnspent(packet.UnsignedTx.TxIn, utxos)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\t// We made sure the input from the user is as sane as possible.\n\t\t// We can now ask the wallet to fund the TX. This will not yet\n\t\t// lock any coins but might still change the wallet DB by\n\t\t// generating a new change address.\n\t\tchangeIndex, err = w.cfg.Wallet.FundPsbt(packet, feeAtomsPerKB)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"wallet couldn't fund PSBT: %v\", err)\n\t\t}\n\n\t\t// Make sure we can properly serialize the packet. If this goes\n\t\t// wrong then something isn't right with the inputs and we\n\t\t// probably shouldn't try to lock any of them.\n\t\terr = packet.Serialize(&rawPsbt)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error serializing funded PSBT: %v\",\n\t\t\t\terr)\n\t\t}\n\n\t\t// Now we have obtained a set of coins that can be used to fund\n\t\t// the TX. Let's lock them to be sure they aren't spent by the\n\t\t// time the PSBT is published. This is the action we do here\n\t\t// that could cause an error. Therefore if some of the UTXOs\n\t\t// cannot be locked, the rollback of the other's locks also\n\t\t// happens in this function. If we ever need to do more after\n\t\t// this function, we need to extract the rollback needs to be\n\t\t// extracted into a defer.\n\t\tlocks, err = lockInputs(w.cfg.Wallet, packet)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"could not lock inputs: %v\", err)\n\t\t}\n\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Convert the lock leases to the RPC format.\n\trpcLocks := make([]*UtxoLease, len(locks))\n\tfor idx, lock := range locks {\n\t\trpcLocks[idx] = &UtxoLease{\n\t\t\tId: lock.lockID[:],\n\t\t\tOutpoint: &lnrpc.OutPoint{\n\t\t\t\tTxidBytes: lock.outpoint.Hash[:],\n\t\t\t\tTxidStr: lock.outpoint.Hash.String(),\n\t\t\t\tOutputIndex: lock.outpoint.Index,\n\t\t\t},\n\t\t\tExpiration: uint64(lock.expiration.Unix()),\n\t\t}\n\t}\n\n\treturn &FundPsbtResponse{\n\t\tFundedPsbt: rawPsbt.Bytes(),\n\t\tChangeOutputIndex: changeIndex,\n\t\tLockedUtxos: rpcLocks,\n\t}, nil\n}", "title": "" }, { "docid": "e450c4d192d0524699f9650e168cbca6", "score": "0.4339617", "text": "func (t *ManagePayment) updatePayment(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\r\n\tvar jsonResp string\r\n\tvar err error\r\n\tfmt.Println(\"running updatePayment()\")\r\n\r\n\tif len(args) != 13 {\r\n\t\terrMsg := \"{ \\\"message\\\" : \\\"Incorrect number of arguments. Expecting 13 arguments.\\\", \\\"code\\\" : \\\"503\\\"}\"\r\n\t\terr = stub.SetEvent(\"errEvent\", []byte(errMsg))\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t} \r\n\t\treturn nil, nil\r\n\t}\r\n\t//set paymentId\r\n\tpaymentId := args[0]\r\n\tpaymentAsBytes, err := stub.GetState(paymentId)\t\t\t\t\t\t\t\t\t//get the var from chaincode state\r\n\tif err != nil {\r\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + paymentId + \"\\\"}\"\r\n\t\treturn nil, errors.New(jsonResp)\r\n\t}\r\n\tfmt.Print(\"paymentAsBytes in update payment\")\r\n\tfmt.Println(paymentAsBytes);\r\n\tres := Payment{}\r\n\tjson.Unmarshal(paymentAsBytes, &res)\r\n\tif res.PaymentID == paymentId{\r\n\t\tfmt.Println(\"Payment found with id : \" + paymentId)\r\n\t\tfmt.Println(res);\r\n\r\n\t\tres.AgreementID = args[1]\r\n\t\tres.BuyerName = args[2]\r\n\t\tres.SellerName = args[3]\r\n\t\tres.BuyerAccount = args[4]\r\n\t\tres.SellerAccount = args[5]\r\n\t\tres.AmountTransferred = args[6]\r\n\t\tres.PaymentCUDate = args[7]\r\n\t\tres.PaymentStatus = args[8]\r\n\t\tres.PaymentDeadlineDate = args[9]\r\n\t\tres.BuyerBank_sign = args[10]\r\n\t\tres.BB_name = args[11]\r\n\t\tres.SB_name = args[12]\r\n\t}else{\r\n\t\terrMsg := \"{ \\\"message\\\" : \\\"\"+ paymentId+ \" Not Found.\\\", \\\"code\\\" : \\\"503\\\"}\"\r\n\t\terr = stub.SetEvent(\"errEvent\", []byte(errMsg))\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t} \r\n\t\treturn nil, nil\r\n\t}\r\n\t\r\n\t//build the Payment json string manually\r\n\torder := `{`+\r\n\t\t`\"paymentId\" : \"` + res.PaymentID + `\", `+\r\n\t\t`\"agreementId\" : \"` + res.AgreementID + `\", `+\r\n\t\t`\"buyerName\" : \"` + res.BuyerName + `\", `+\r\n\t\t`\"sellerName\" : \"` + res.SellerName + `\", `+\r\n\t\t`\"buyerAccount\" : \"` + res.BuyerAccount + `\", `+\r\n\t\t`\"sellerAccount\" : \"` + res.SellerAccount + `\", `+\r\n\t\t`\"amountTransferred\" : \"` + res.AmountTransferred + `\", `+\r\n\t\t`\"paymentCUDate\" : \"` + res.PaymentCUDate + `\", `+\r\n\t\t`\"paymentStatus\" : \"` + res.PaymentStatus + `\", `+\r\n\t\t`\"paymentDeadlineDate\" : \"` + res.PaymentDeadlineDate + `\", `+\r\n\t\t`\"buyerBank_sign\" : \"` + res.BuyerBank_sign + `\", `+\r\n\t\t`\"bb_name\" : \"` + res.BB_name + `\", `+\r\n\t\t`\"sb_name\" : \"` + res.SB_name + `\"`+\r\n\t\t`}`\r\n\r\n\tif res.BuyerBank_sign == \"true\"{\r\n\t\tfmt.Println(\"Buyer Bank sign is true with amount to be transferred :: \" + res.AmountTransferred)\r\n\t\tt.updateBalance(stub, res.AmountTransferred)\r\n\t}\r\n\r\n\terr = stub.PutState(paymentId, []byte(order))\t\t\t\t\t\t\t\t\t//store Payment with id as key\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\ttosend := \"{ \\\"paymentID\\\" : \\\"\"+paymentId+\"\\\", \\\"message\\\" : \\\"Payment updated succcessfully\\\", \\\"code\\\" : \\\"200\\\"}\"\r\n\terr = stub.SetEvent(\"evtsender\", []byte(tosend))\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t} \t\r\n\tfmt.Println(\"end updatePayment()\")\r\n\treturn nil, nil\r\n}", "title": "" }, { "docid": "1d5cce7a858d8dc3c60b7aec7936a9ae", "score": "0.43352866", "text": "func testSwapContract() ([]byte, dcrutil.Address, dcrutil.Address) {\n\tlockTime := time.Now().Add(time.Hour * 8).Unix()\n\tsecretKey := randomBytes(32)\n\t_, receiverPKH := genPubkey()\n\t_, senderPKH := genPubkey()\n\tcontract, err := txscript.NewScriptBuilder().\n\t\tAddOps([]byte{\n\t\t\ttxscript.OP_IF,\n\t\t\ttxscript.OP_SIZE,\n\t\t}).AddInt64(32).\n\t\tAddOps([]byte{\n\t\t\ttxscript.OP_EQUALVERIFY,\n\t\t\ttxscript.OP_SHA256,\n\t\t}).AddData(secretKey).\n\t\tAddOps([]byte{\n\t\t\ttxscript.OP_EQUALVERIFY,\n\t\t\ttxscript.OP_DUP,\n\t\t\ttxscript.OP_HASH160,\n\t\t}).AddData(receiverPKH).\n\t\tAddOp(txscript.OP_ELSE).\n\t\tAddInt64(lockTime).AddOps([]byte{\n\t\ttxscript.OP_CHECKLOCKTIMEVERIFY,\n\t\ttxscript.OP_DROP,\n\t\ttxscript.OP_DUP,\n\t\ttxscript.OP_HASH160,\n\t}).AddData(senderPKH).\n\t\tAddOps([]byte{\n\t\t\ttxscript.OP_ENDIF,\n\t\t\ttxscript.OP_EQUALVERIFY,\n\t\t\ttxscript.OP_CHECKSIG,\n\t\t}).Script()\n\tif err != nil {\n\t\tfmt.Printf(\"testSwapContract error: %v\\n\", err)\n\t}\n\treceiverAddr, _ := dcrutil.NewAddressPubKeyHash(receiverPKH, chainParams, dcrec.STEcdsaSecp256k1)\n\trefundAddr, _ := dcrutil.NewAddressPubKeyHash(senderPKH, chainParams, dcrec.STEcdsaSecp256k1)\n\treturn contract, receiverAddr, refundAddr\n}", "title": "" }, { "docid": "d34fbe4da7a9f9f40723d3c93cb8398a", "score": "0.43329868", "text": "func (k Keeper) ReleaseStakingCoins(ctx sdk.Context, farmer sdk.AccAddress, unstakingCoins sdk.Coins) error {\n\tif err := k.bankKeeper.SendCoins(ctx, k.GetStakingReservePoolAcc(ctx), farmer, unstakingCoins); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3eeea2fe9f9a5479610e74a9564e9d13", "score": "0.4328896", "text": "func setBid(client pb.FHEClient, keyPair KeyPair, targetAccount string, account string, limit int, credit int) {\n\tparams := common.GetParams()\n\n\tpk := bfv.PublicKey{}\n\tpk.UnmarshalBinary(keyPair.PublicKey)\n\tencryptorPk := bfv.NewEncryptorFromPk(params, &pk)\n\n\tlimitCiphertextBytes := common.EncryptInt(encryptorPk, limit)\n\tcreditCiphertextBytes := common.EncryptInt(encryptorPk, credit)\n\n\tctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)\n\tdefer cancel()\n\t_, err := client.SetBid(ctx, &pb.BidRequest{\n\t\tTargetAccount: targetAccount,\n\t\tAccount: account,\n\t\tLimitPriceCipherText: limitCiphertextBytes,\n\t\tCreditCipherText: creditCiphertextBytes,\n\t})\n\tif err != nil {\n\t\tlog.Fatalf(\"%v.SetBid(_) = _, %v: \", client, err)\n\t}\n\treturn\n}", "title": "" }, { "docid": "50151886ff548a87f2d19dfb5f266630", "score": "0.4322265", "text": "func (w *WalletChaincode) accountTransfer(stub shim.ChaincodeStubInterface, args []string)([]byte, error){\n\tvar err error\n\tif len(args) != 4 {\n\t\twtLogger.Debug(\"incorrect number of arguments for accountTransfer. Expecting 4\")\n\t\treturn nil, errors.New(\"incorrect number of arguments for accountTransfer. Expecting 4\")\n\t}\n\tif len(args[0])==0 || len(args[1])==0 || len(args[2])==0 || len(args[3])==0 {\n\t\twtLogger.Errorf(\"incorrect arguments. expecting not empty\")\n\t\treturn nil, errors.New(\"incorrect arguments. expecting not empty\")\n\t}\n\n\tvar txuuid string = args[0]\n\tvar payeruuid string = args[1]\n\tvar payeeuuid string = args[2]\n\tvar payamount int64\n\tif payamount, err = strconv.ParseInt(args[3], 10, 64); err != nil {\n\t\twtLogger.Errorf(\"failed to parse transfer amount %s as int64\", args[3])\n\t\treturn nil, fmt.Errorf(\"failed to parse transfer amount %s as int64\", args[3])\n\t}\n\n\tvar payer *Account = new(Account)\n\tvar payee *Account = new(Account)\n\tif !payer.IsAccountExist(stub, payeruuid) {\n\t\twtLogger.Errorf(\"payer with accountuuid %s not exists\", payeruuid)\n\t\treturn nil, fmt.Errorf(\"payer with accountuuid %s not exists\", payeeuuid)\n\t}\n\tif !payee.IsAccountExist(stub, payeeuuid){\n\t\twtLogger.Errorf(\"payee with accountuuid %s not exists\", payeeuuid)\n\t\treturn nil, fmt.Errorf(\"payee with accountuuid %s not exists\", payeeuuid)\n\t}\n\n\n\tif payer.Amount < payamount {\n\t\twtLogger.Errorf(\"payer's account only have %d, not enough to pay %d\", payer.Amount, payamount)\n\t\treturn nil, fmt.Errorf(\"payer's account only have %d, not enough to pay %d\", payer.Amount, payamount)\n\t}\n\n\tpayer.Amount -= payamount\n\tpayee.Amount += payamount\n\tif err = payer.putAccount(stub); err != nil {\n\t\twtLogger.Errorf(\"failed to modify payer's account: %v\", err)\n\t\treturn nil, fmt.Errorf(\"failed to modify payer's account: %v\", err)\n\t}\n\n\tif err = payee.putAccount(stub); err != nil {\n\t\twtLogger.Errorf(\"failed to modify payee's account: %v\", err)\n\t\tpayer.Amount += payamount\n\t\tpayer.putAccount(stub)\n\t\treturn nil, fmt.Errorf(\"failed to modify payee's account: %v\", err)\n\t}\n\n\tvar tx *Transaction = new(Transaction)\n\ttx.TxUUID = txuuid\n\ttx.Payeruuid = payeruuid\n\ttx.Payeeuuid = payeeuuid\n\ttx.BC_txuuid = stub.GetTxID()\n\ttx.TxTime = time.Now().Format(DATETIME_FORMAT)\n\ttx.Status = \"fin\"\n\n\tif err = tx.PutTransaction(stub); err != nil {\n\t\twtLogger.Fatalf(\"failed to put transaction %#v into ledger: %v\", *tx, err)\n\t\tpayer.Amount += payamount\n\t\tpayee.Amount -= payamount\n\t\tpayer.putAccount(stub)\n\t\tpayee.putAccount(stub)\n\t\treturn nil, fmt.Errorf(\"failed to put transaction %#v into ledger: %v\", *tx, err)\n\t}\n\twtLogger.Debugf(\"succeeded in transfer %d money from payer %s to payee %s\", payamount, payeruuid, payeeuuid)\n\treturn nil, nil\n}", "title": "" }, { "docid": "05b208d81775e5008667e07d199abca4", "score": "0.43203536", "text": "func (a *Client) SetBlueprinterBlessings(params *SetBlueprinterBlessingsParams, authInfo runtime.ClientAuthInfoWriter) (*SetBlueprinterBlessingsOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewSetBlueprinterBlessingsParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"set-blueprinter-blessings\",\n\t\tMethod: \"PUT\",\n\t\tPathPattern: \"/platform/infrastructure/blueprinter/roles/{blueprinter_role_id}/blessings\",\n\t\tProducesMediaTypes: []string{\"\"},\n\t\tConsumesMediaTypes: []string{\"\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &SetBlueprinterBlessingsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*SetBlueprinterBlessingsOK), nil\n\n}", "title": "" }, { "docid": "c594f0a476194191cc689de10230c3ec", "score": "0.43196416", "text": "func (_KyberFeeHandlerV2 *KyberFeeHandlerV2TransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _KyberFeeHandlerV2.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "ef46aa451e205027b9b87ea8be4207fa", "score": "0.4311791", "text": "func (s *SmartContract) RegisterDelegation(ctx contractapi.TransactionContextInterface, pck string, grandor string, recipient string, subdel string, issue string, expiry string) error {\r\n\t\r\n\t//getting the service data from the world state \r\n\tservice, err := s.IsService(ctx, grandor)\r\n\t\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\r\n\trecipientcheck,err := s.IsService(ctx, recipient)\r\n\t\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\t\r\n\tif grandor == recipient {\r\n\t\treturn fmt.Errorf(\"Cannot Self-Delegate\")\r\n\t}\r\n\t\r\n\t//if issue > expiry {\r\n\t//\treturn fmt.Errorf(\"Delegation Issue and Expiry times should be checked again\")\r\n\t//}\r\n\t\r\n\texpiryint64, _ := strconv.ParseUint(expiry, 10, 64)\r\n\ttimenow := uint64(time.Now().Unix())\r\n\tif timenow > expiryint64 {\r\n\t\treturn fmt.Errorf(\"Cannot create a Delegation which is already Expired\")\r\n\t}\r\n\t\r\n\t//if everything above is ok we procceed with the checking and creation of the Delegation \r\n\tif service.Type == \"S\" && service.Registered == true && recipientcheck.Registered == true {\r\n\t\t\r\n\t//turning string to uint8\r\n\ttempsubdel, err := strconv.ParseUint(subdel, 10, 8) \r\n\r\n\tif err != nil {\r\n\t\tfmt.Printf(\"Error\")\r\n\t\t}\r\n\r\n\tsubdel1 :=uint8(tempsubdel)\r\n\r\n\t//turning string to uint64\r\n\tissue1, err := strconv.ParseUint(issue, 10, 64)\r\n\r\n\tif \terr != nil {\r\n\t\tfmt.Printf(\"Error\")\r\n\t\t}\r\n\r\n\texpiry1, err := strconv.ParseUint(expiry, 10, 64)\r\n\r\n\tif err != nil {\r\n\t\tfmt.Printf(\"Error\")\r\n\t\t}\r\n\t\t\r\n\tif issue1 > expiry1 {\r\n\t\treturn fmt.Errorf(\"Delegation Issue and Expiry times should be checked again, Issue cannot be after the expiry\")\r\n\t}\r\n\r\n\tvar finalrevokers []string\r\n\tfinalrevokers = append(finalrevokers,grandor)\r\n\tfinalrevokers = append(finalrevokers,recipient)\r\n\r\n\tvar tempdelegationchain []string\r\n\ttempdelegationchain = append(tempdelegationchain,pck)\r\n\r\n\t//we pass the data to the struct and then we save to the world state \r\n\tdelegation := Delegation{\r\n\t\tPck:\t\t\t\tpck,\t \t\r\n\t\tGrandor:\t\t\tgrandor, \t\t\t \r\n\t\tRecipient: \t\trecipient, \t \r\n\t\tSubdel: \t\tsubdel1, \t \r\n\t\tIssue: \t\t\t\tissue1, \r\n\t\tExpiry: \t\t\texpiry1, \r\n\t\tSuspended:\t\t\tfalse,\r\n\t\tRevoked:\t\t\tfalse,\r\n\t\tRevokers: \t\t\tfinalrevokers,\r\n\t\tDelegationChain:\ttempdelegationchain,\r\n\t\tType:\t\t\t\t\"D\",\r\n\t}\r\n\r\n\tdelegationAsBytes, _ := json.Marshal(delegation)\r\n\r\n\treturn ctx.GetStub().PutState(pck, delegationAsBytes)\r\n\t\r\n\t} else {\r\n\t\treturn fmt.Errorf(\"Grandor Or Reciepient Error\")\r\n\t\t \r\n\t}\r\n}", "title": "" }, { "docid": "ab64cdfcb6f36ef849aa42874599a4fc", "score": "0.43076426", "text": "func (p *proxyrunner) httpbckput(w http.ResponseWriter, r *http.Request) {\n\tapitems, err := p.checkRESTItems(w, r, 1, true, cmn.Version, cmn.Buckets)\n\tif err != nil {\n\t\treturn\n\t}\n\tbucket := apitems[0]\n\tbckProvider := r.URL.Query().Get(cmn.URLParamBckProvider)\n\tbmd, bckIsLocal := p.validateBucket(w, r, bucket, bckProvider)\n\tif bmd == nil {\n\t\treturn\n\t}\n\t// This request has to be handled by primary proxy\n\tif p.forwardCP(w, r, &cmn.ActionMsg{}, \"httpbckput\", nil) {\n\t\treturn\n\t}\n\n\t// Setting bucket props using URL query strings\n\tif len(apitems) > 1 {\n\t\tif apitems[1] != cmn.ActSetProps {\n\t\t\ts := fmt.Sprintf(\"Invalid request [%s] - expecting '%s'\", apitems[1], cmn.ActSetProps)\n\t\t\tp.invalmsghdlr(w, r, s)\n\t\t\treturn\n\t\t}\n\n\t\tquery := r.URL.Query()\n\t\tquery.Del(cmn.URLParamBckProvider)\n\t\tkvs := cmn.NewSimpleKVsFromQuery(query)\n\n\t\terr := p.updateBucketProps(bucket, bckIsLocal, kvs)\n\t\tif _, ok := err.(*cmn.ErrorCloudBucketDoesNotExist); ok {\n\t\t\tp.invalmsghdlr(w, r, err.Error(), http.StatusNotFound)\n\t\t\treturn\n\t\t}\n\t\tif err != nil {\n\t\t\tp.invalmsghdlr(w, r, err.Error())\n\t\t}\n\n\t\treturn\n\t}\n\n\t// otherwise, handle the general case: unmarshal into cmn.BucketProps and treat accordingly\n\t// Note: this use case is for setting all bucket props\n\tnprops := cmn.DefaultBucketProps(bckIsLocal)\n\tmsg := cmn.ActionMsg{Value: nprops}\n\tif err = cmn.ReadJSON(w, r, &msg); err != nil {\n\t\ts := fmt.Sprintf(\"Failed to unmarshal: %v\", err)\n\t\tp.invalmsghdlr(w, r, s)\n\t\treturn\n\t}\n\n\tif msg.Action != cmn.ActSetProps && msg.Action != cmn.ActResetProps {\n\t\ts := fmt.Sprintf(\"Invalid cmn.ActionMsg [%v] - expecting '%s' or '%s' action\", msg, cmn.ActSetProps, cmn.ActResetProps)\n\t\tp.invalmsghdlr(w, r, s)\n\t\treturn\n\t}\n\n\tp.bmdowner.Lock()\n\tclone := p.bmdowner.get().clone()\n\tconfig := cmn.GCO.Get()\n\n\tbprops, exists := clone.Get(bucket, bckIsLocal)\n\tif !exists {\n\t\tcmn.Assert(!bckIsLocal)\n\n\t\texistsInCloud, err := p.doesCloudBucketExist(bucket)\n\t\tif err != nil {\n\t\t\tp.bmdowner.Unlock()\n\t\t\tp.invalmsghdlr(w, r, err.Error())\n\t\t\treturn\n\t\t}\n\t\tif !existsInCloud {\n\t\t\tp.bmdowner.Unlock()\n\t\t\tp.invalmsghdlr(w, r, fmt.Sprintf(\"Bucket %s does not exist.\", bucket), http.StatusNotFound)\n\t\t\treturn\n\t\t}\n\t\tbprops = cmn.DefaultBucketProps(bckIsLocal)\n\t\tclone.add(bucket, false /* bucket is local */, bprops)\n\t}\n\n\tswitch msg.Action {\n\tcase cmn.ActSetProps:\n\t\ttargetCnt := p.smapowner.Get().CountTargets()\n\t\tif err := nprops.Validate(bckIsLocal, targetCnt, p.urlOutsideCluster); err != nil {\n\t\t\tp.bmdowner.Unlock()\n\t\t\tp.invalmsghdlr(w, r, err.Error(), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\t// forbid changing EC properties if EC is already enabled (for now)\n\t\tif bprops.EC.Enabled && nprops.EC.Enabled &&\n\t\t\t(bprops.EC.ParitySlices != nprops.EC.ParitySlices ||\n\t\t\t\tbprops.EC.DataSlices != nprops.EC.DataSlices ||\n\t\t\t\tbprops.EC.ObjSizeLimit != nprops.EC.ObjSizeLimit) {\n\t\t\tp.bmdowner.Unlock()\n\t\t\tp.invalmsghdlr(w, r, \"Cannot change EC configuration after it is enabled\",\n\t\t\t\thttp.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t\tbprops.CopyFrom(nprops)\n\tcase cmn.ActResetProps:\n\t\tbprops = cmn.DefaultBucketProps(bckIsLocal)\n\t}\n\tclone.set(bucket, bckIsLocal, bprops)\n\tif err := p.savebmdconf(clone, config); err != nil {\n\t\tglog.Error(err)\n\t}\n\tp.bmdowner.put(clone)\n\tp.bmdowner.Unlock()\n\n\tmsgInt := p.newActionMsgInternal(&msg, nil, clone)\n\tp.metasyncer.sync(true, revspair{clone, msgInt})\n}", "title": "" }, { "docid": "f2c0d7c590631b9653026c6967080f22", "score": "0.43075576", "text": "func updatePAYMTConcerned(tx *sql.Tx, pay PAYMT, reqsrc *REQRSC) error {\n\n\tstmt, err := tx.Prepare(`UPDATE user AS u JOIN project AS p ON u.id = p.user_id SET cash= cash + ?, sell_count = sell_count + 1 WHERE p.id = ?`)\n\tif err != nil {\n\t\treturn errors.New(\"[ERR] failed to prepare statement in updatePAYMTConcern\")\n\t}\n\tdefer stmt.Close()\n\n\t_, err = stmt.Exec(pay.Amount, reqsrc.Pid)\n\tif err != nil {\n\t\treturn errors.New(\"[ERR] failed to execute insert sale information in InsertSaleList\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "62fe8bf1a06a0f94246a63f63ac3f1d3", "score": "0.43015152", "text": "func (p *Poloniex) TransferBalance(currency string, amount float64, from string, to string) (tb TransferBalance, err error) {\r\n\tparams := url.Values{}\r\n\tparams.Add(\"currency\", currency)\r\n\tparams.Add(\"amount\", toString(amount))\r\n\tparams.Add(\"fromAccount\", from)\r\n\tparams.Add(\"toAccount\", to)\r\n\tfmt.Printf(\"%+v\", params)\r\n\terr = p.private(\"transferBalance\", params, &tb)\r\n\treturn\r\n}", "title": "" } ]
5b6e6da316f5e51dedb4b455d54cba16
YetAnotherShapeMojomType returns the UserDefinedType that describes the Mojom type of YetAnotherShape. To obtain the UserDefinedType for Mojom types recursively contained in the returned UserDefinedType, look in the map returned by the function GetAllMojomTypeDefinitions().
[ { "docid": "09d1339278f12d5a559155376d9877d4", "score": "0.87258667", "text": "func YetAnotherShapeMojomType() mojom_types.UserDefinedType {\n\treturn GetAllMojomTypeDefinitions()[\"TYPE_KEY:imported.YetAnotherShape\"]\n}", "title": "" } ]
[ { "docid": "c830dc7eab973a21627aee210881765c", "score": "0.85082865", "text": "func AnotherShapeMojomType() mojom_types.UserDefinedType {\n\treturn GetAllMojomTypeDefinitions()[\"TYPE_KEY:imported.AnotherShape\"]\n}", "title": "" }, { "docid": "72565af8adbf84ce693618b6343f5b96", "score": "0.834204", "text": "func (*YetAnotherShape) MojomType() mojom_types.UserDefinedType {\n\treturn YetAnotherShapeMojomType()\n}", "title": "" }, { "docid": "c914b8844c0997a2b6e4e5f4bbb5e0a0", "score": "0.8057482", "text": "func (*AnotherShape) MojomType() mojom_types.UserDefinedType {\n\treturn AnotherShapeMojomType()\n}", "title": "" }, { "docid": "2ec93824d9d7a99b3f6dfe0cabe3be66", "score": "0.72100645", "text": "func (*Shape) MojomType() mojom_types.UserDefinedType {\n\treturn ShapeMojomType()\n}", "title": "" }, { "docid": "4e83a240559f7ad0f7fbdd12fec1984f", "score": "0.6926491", "text": "func (*YetAnotherShape) AllMojomTypes() map[string]mojom_types.UserDefinedType {\n\treturn GetAllMojomTypeDefinitions()\n}", "title": "" }, { "docid": "6a0fa5607123863670417dad1d841af2", "score": "0.6905654", "text": "func (*AnotherShape) AllMojomTypes() map[string]mojom_types.UserDefinedType {\n\treturn GetAllMojomTypeDefinitions()\n}", "title": "" }, { "docid": "09ac0092470ee2ecd5df9085b0fdb8f4", "score": "0.6814339", "text": "func ShapeMojomType() mojom_types.UserDefinedType {\n\treturn GetAllMojomTypeDefinitions()[\"TYPE_KEY:imported.Shape\"]\n}", "title": "" }, { "docid": "251126fb7da2825ff3f9ad2029d94e2c", "score": "0.6032029", "text": "func (*Shape) AllMojomTypes() map[string]mojom_types.UserDefinedType {\n\treturn GetAllMojomTypeDefinitions()\n}", "title": "" }, { "docid": "4f8cf2ad8cac3c09cfd087fbcd24bc50", "score": "0.5965829", "text": "func (*Point) MojomType() mojom_types.UserDefinedType {\n\treturn PointMojomType()\n}", "title": "" }, { "docid": "fa09e784b86a643ebd95f5f2a1181828", "score": "0.52716964", "text": "func (*ImportedInterface_Request) MojomType() mojom_types.UserDefinedType {\n\treturn ImportedInterfaceMojomType()\n}", "title": "" }, { "docid": "4dfb186e51edeb5cb3c5a6456945e850", "score": "0.51974547", "text": "func PointMojomType() mojom_types.UserDefinedType {\n\treturn GetAllMojomTypeDefinitions()[\"TYPE_KEY:imported.Point\"]\n}", "title": "" }, { "docid": "96f6bd5220841ea7553a897a31083301", "score": "0.5110408", "text": "func (*Point) AllMojomTypes() map[string]mojom_types.UserDefinedType {\n\treturn GetAllMojomTypeDefinitions()\n}", "title": "" }, { "docid": "674bfa989f72f4865e99d970897563b7", "score": "0.4780584", "text": "func (o *TamMilestoneAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "title": "" }, { "docid": "0334abc7e28f28f5b7542b4a13accb14", "score": "0.47154945", "text": "func ImportedInterfaceMojomType() mojom_types.UserDefinedType {\n\treturn GetAllMojomTypeDefinitions()[\"TYPE_KEY:imported.ImportedInterface\"]\n}", "title": "" }, { "docid": "a597f756b22d08caa1e60bebe2479f8b", "score": "0.46652234", "text": "func (o *TamMilestoneAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "eb1648bdd5baddf2ac53b9e2dc5ffaee", "score": "0.46411896", "text": "func (k *Key) ObjectType() reflect.Type {\n\tif k.otyp != nil {\n\t\treturn k.otyp\n\t}\n\tif !rtypes.Factory.HasKey(k.class) {\n\t\treturn nil\n\t}\n\tk.otyp = rtypes.Factory.Get(k.class)().Type()\n\treturn k.otyp\n}", "title": "" }, { "docid": "5edc4e4b8a9b288ba90da423d615623e", "score": "0.4533977", "text": "func (this *IsAtom) Type() value.Type { return value.BOOLEAN }", "title": "" }, { "docid": "56f7d6adfff0be2f24d23824963c0a24", "score": "0.45251268", "text": "func (o *TamMilestoneAllOf) HasMilestoneType() bool {\n\tif o != nil && o.MilestoneType != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "fb5f50d4fad8e9ed6a0bc7cdd7882b06", "score": "0.45006746", "text": "func (m *MetaDefinition) UnmarshalJSON(raw []byte) error {\n\t// AO0\n\tvar aO0 MoBaseMo\n\tif err := swag.ReadJSON(raw, &aO0); err != nil {\n\t\treturn err\n\t}\n\tm.MoBaseMo = aO0\n\n\t// AO1\n\tvar dataAO1 struct {\n\t\tAccessPrivileges []*MetaAccessPrivilege `json:\"AccessPrivileges\"`\n\n\t\tAncestorClasses []string `json:\"AncestorClasses\"`\n\n\t\tIsConcrete *bool `json:\"IsConcrete,omitempty\"`\n\n\t\tMetaType string `json:\"MetaType,omitempty\"`\n\n\t\tName string `json:\"Name,omitempty\"`\n\n\t\tNamespace string `json:\"Namespace,omitempty\"`\n\n\t\tParentClass string `json:\"ParentClass,omitempty\"`\n\n\t\tProperties []*MetaPropDefinition `json:\"Properties\"`\n\n\t\tRelationships []*MetaRelationshipDefinition `json:\"Relationships\"`\n\n\t\tRestPath string `json:\"RestPath,omitempty\"`\n\n\t\tVersion string `json:\"Version,omitempty\"`\n\t}\n\tif err := swag.ReadJSON(raw, &dataAO1); err != nil {\n\t\treturn err\n\t}\n\n\tm.AccessPrivileges = dataAO1.AccessPrivileges\n\n\tm.AncestorClasses = dataAO1.AncestorClasses\n\n\tm.IsConcrete = dataAO1.IsConcrete\n\n\tm.MetaType = dataAO1.MetaType\n\n\tm.Name = dataAO1.Name\n\n\tm.Namespace = dataAO1.Namespace\n\n\tm.ParentClass = dataAO1.ParentClass\n\n\tm.Properties = dataAO1.Properties\n\n\tm.Relationships = dataAO1.Relationships\n\n\tm.RestPath = dataAO1.RestPath\n\n\tm.Version = dataAO1.Version\n\n\treturn nil\n}", "title": "" }, { "docid": "95c5cfb379398d756e5752ecfd41943d", "score": "0.4500639", "text": "func (m *MoBaseComplexType) UnmarshalJSON(raw []byte) error {\n\t// AO0\n\tvar dataAO0 struct {\n\t\tObjectType string `json:\"ObjectType,omitempty\"`\n\t}\n\tif err := swag.ReadJSON(raw, &dataAO0); err != nil {\n\t\treturn err\n\t}\n\n\tm.ObjectType = dataAO0.ObjectType\n\n\treturn nil\n}", "title": "" }, { "docid": "4f1f0e36b2108a094219824e5716b141", "score": "0.44832978", "text": "func (o *WorkflowMoReferenceProperty) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "df2ab607a44f263d4f6f9db89f30e94e", "score": "0.4476648", "text": "func (me Named) OfType(typeRef *TypeRef) (nt NamedTyped) {\n\tnt.Named, nt.Type = me, typeRef\n\treturn\n}", "title": "" }, { "docid": "8c82374b5384f2347bc7e783fc71d8c8", "score": "0.4472606", "text": "func (m *moduleGenerator) genDiscriminatedType(resolvedSchema *openapi.Schema, isOutput bool) (*pschema.TypeSpec, bool, error) {\n\tif resolvedSchema.Discriminator == \"\" {\n\t\treturn nil, false, nil\n\t}\n\n\tdiscriminator := resolvedSchema.Discriminator\n\tif _, ok := resolvedSchema.Properties[discriminator]; !ok {\n\t\treturn nil, false, nil\n\t}\n\n\tprop := resolvedSchema.Properties[discriminator]\n\tif prop.ReadOnly && !isOutput {\n\t\treturn nil, false, nil\n\t}\n\n\tvar oneOf []pschema.TypeSpec\n\tmapping := map[string]string{}\n\tsubtypes, err := resolvedSchema.FindSubtypes()\n\tif err != nil {\n\t\treturn nil, false, err\n\t}\n\tfor _, subtype := range subtypes {\n\t\ttyp, err := m.genTypeSpec(\"\", subtype, resolvedSchema.ReferenceContext, isOutput)\n\t\tif err != nil {\n\t\t\treturn nil, false, err\n\t\t}\n\t\toneOf = append(oneOf, *typ)\n\t\tsubtypeSchema, err := resolvedSchema.ResolveSchema(subtype)\n\t\tif err != nil {\n\t\t\treturn nil, false, err\n\t\t}\n\t\tdiscriminatorValue := getDiscriminatorValue(subtypeSchema)\n\t\tmapping[discriminatorValue] = typ.Ref\n\t}\n\n\tswitch len(oneOf) {\n\tcase 0:\n\t\t// Type specifies a discriminator but doesn't have actual subtypes. Ignore the discriminator in this case.\n\t\treturn nil, false, nil\n\tcase 1:\n\t\t// There is just one subtype specified: use it as a definite type.\n\t\treturn &oneOf[0], true, nil\n\tdefault:\n\t\tsdkDiscriminator := discriminator\n\t\tif clientName, ok := prop.Extensions.GetString(extensionClientName); ok {\n\t\t\tsdkDiscriminator = clientName\n\t\t}\n\t\tsdkDiscriminator = ToLowerCamel(sdkDiscriminator)\n\n\t\t// Union type for two or more types.\n\t\treturn &pschema.TypeSpec{\n\t\t\tOneOf: oneOf,\n\t\t\tDiscriminator: &pschema.DiscriminatorSpec{\n\t\t\t\tPropertyName: sdkDiscriminator,\n\t\t\t\tMapping: mapping,\n\t\t\t},\n\t\t}, true, nil\n\t}\n}", "title": "" }, { "docid": "a21f91f8d4de25d023194ecccd45afdd", "score": "0.44523308", "text": "func (js *jsonSchema) HandleAdvancedType() {\n\tparent, isSingleInherit := js.T.SingleInheritance()\n\tswitch {\n\tcase js.T.IsMultipleInheritance():\n\t\tparents, _ := js.T.MultipleInheritance()\n\t\tjs.Inherit(getParentsObjs(parents))\n\tcase js.T.IsAlias():\n\t\tjs.Alias = jsAlias{\n\t\t\tType: js.T.TypeString(),\n\t\t\tBuiltin: js.T.IsBuiltin(),\n\t\t}\n\tcase isSingleInherit:\n\t\tjs.Inherit(getParentsObjs([]string{parent}))\n\t}\n}", "title": "" }, { "docid": "0d92b92c8f5fc163e148bf3b5d4600ee", "score": "0.44486168", "text": "func (o *WorkflowMoReferenceProperty) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "title": "" }, { "docid": "f8af6e87da3d4a3514e4c03a09dd297b", "score": "0.44474128", "text": "func (*OBB) ShapeType() int {\n\treturn obbShapeType\n}", "title": "" }, { "docid": "428c21c97f2e82a28aa7ab0f6e225e48", "score": "0.44439387", "text": "func (o *WorkflowInternalPropertiesAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "title": "" }, { "docid": "a8fa330765131452c60e5ca8962e1ee9", "score": "0.4423794", "text": "func (v *OpenApiType) UnmarshalEasyJSON(l *jlexer.Lexer) {\n\teasyjson60d9767dDecodeGithubComLutomasSwagger2MdTypes(l, v)\n}", "title": "" }, { "docid": "f9142c6fdd52657d042d7bfe6998b08f", "score": "0.44172287", "text": "func (o *ViewReaction) HasObjectType() bool {\n\tif o != nil && o.ObjectType != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "0003ae7be45e4214326e0eaf21b3c38e", "score": "0.44122946", "text": "func (o *TamMilestoneAllOf) GetMilestoneTypeOk() (*string, bool) {\n\tif o == nil || o.MilestoneType == nil {\n\t\treturn nil, false\n\t}\n\treturn o.MilestoneType, true\n}", "title": "" }, { "docid": "aaf1b7f46fd1ca1167c28fa079daa5df", "score": "0.43750125", "text": "func (o *KubernetesAddonConfigurationAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "a852158c5a973a0bd6af920d1f7a1ea7", "score": "0.43645135", "text": "func (o *WorkflowInternalPropertiesAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "a8794e61c584e927b571840035906787", "score": "0.43582255", "text": "func (n *Namespace) TypeForSchema(schemaJson []byte) (avro.AvroType, error) {\n\tvar schema interface{}\n\tif err := json.Unmarshal(schemaJson, &schema); err != nil {\n\t\treturn nil, err\n\t}\n\n\tfield, err := n.decodeTypeDefinition(\"topLevel\", \"\", schema)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tn.Roots = append(n.Roots, &avro.FileRoot{field})\n\n\treturn field, nil\n}", "title": "" }, { "docid": "371613a9fb639eedddd319ea9807fdd5", "score": "0.4352517", "text": "func (builder defaultExamplesBuilder) BuildShape(ref *ShapeRef, shapes map[string]interface{}, isMap bool) string {\n\torder := make([]string, len(shapes))\n\tfor k := range shapes {\n\t\torder = append(order, k)\n\t}\n\tsort.Strings(order)\n\n\tret := \"\"\n\tfor _, name := range order {\n\t\tif name == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\tshape := shapes[name]\n\n\t\t// If the shape isn't a map, we want to export the value, since every field\n\t\t// defined in our shapes are exported.\n\t\tif len(name) > 0 && !isMap && strings.ToLower(name[0:1]) == name[0:1] {\n\t\t\tname = strings.Title(name)\n\t\t}\n\n\t\tmemName := name\n\t\tif isMap {\n\t\t\tmemName = fmt.Sprintf(\"%q\", memName)\n\t\t}\n\n\t\tswitch v := shape.(type) {\n\t\tcase map[string]interface{}:\n\t\t\tret += builder.BuildComplex(name, memName, ref, v)\n\t\tcase []interface{}:\n\t\t\tret += builder.BuildList(name, memName, ref, v)\n\t\tdefault:\n\t\t\tret += builder.BuildScalar(name, memName, ref, v)\n\t\t}\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "aa6b554ae8d1f3888f7164f4d64f0153", "score": "0.43218556", "text": "func fillMultitype(multi *schemaJSONProperty, objects *objectsSchema) error {\n\tprops := make(map[string]*schemaJSONProperty)\n\n\tif multi.AllOf != nil {\n\t\tfor _, v := range multi.AllOf {\n\t\t\toProps := make(map[string]schemaJSONProperty)\n\n\t\t\tswitch {\n\t\t\t// if allOf elem is builtin - find reference object and\n\t\t\tcase IsBuiltin(v):\n\t\t\t\tif def, ok := objects.Definitions[nameFRef(v.Ref)]; ok {\n\t\t\t\t\toProps = def.GetProperties()\n\t\t\t\t\tif len(oProps) == 0 {\n\t\t\t\t\t\tfillMultitype(&def, objects)\n\t\t\t\t\t\toProps = def.GetProperties()\n\t\t\t\t\t}\n\n\t\t\t\t\tfor kk := range oProps {\n\t\t\t\t\t\tval := oProps[kk]\n\t\t\t\t\t\tsetStripPrefix(&val, multi.stripPrefix)\n\t\t\t\t\t\toProps[kk] = val\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\treturn fmt.Errorf(\"could not find '%s' in objects dictionary\", nameFRef(v.Ref))\n\t\t\t\t}\n\n\t\t\tcase IsObject(v):\n\t\t\t\toProps = v.GetProperties()\n\t\t\t\tfor kk := range oProps {\n\t\t\t\t\tval := oProps[kk]\n\t\t\t\t\tsetStripPrefix(&val, multi.stripPrefix)\n\t\t\t\t\toProps[kk] = val\n\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor kk, vv := range oProps {\n\t\t\t\tval := vv\n\t\t\t\tprops[kk] = &val\n\t\t\t}\n\t\t}\n\n\t\tif len(props) > 0 {\n\t\t\tmulti.Properties = props\n\t\t}\n\t}\n\n\tif multi.OneOf != nil {\n\t\tfor _, v := range multi.OneOf {\n\t\t\tif v.GetType() == schemaTypeBuiltin {\n\t\t\t\tprops[nameFRef(v.Ref)] = v\n\t\t\t} else if v.GetType() == schemaTypeObject {\n\t\t\t\tfor kk, vv := range v.GetProperties() {\n\t\t\t\t\tval := vv\n\t\t\t\t\tsetStripPrefix(&val, multi.stripPrefix)\n\t\t\t\t\tprops[kk] = &val\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif len(props) > 0 {\n\t\t\tmulti.Properties = props\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "579c77f40a15ea1b47d63b825da7d753", "score": "0.432144", "text": "func (mp MultiPolygon) GeoJSONType() string {\n\treturn \"MultiPolygon\"\n}", "title": "" }, { "docid": "d651fc4e822665c4f0d5ccddc7c49b16", "score": "0.43116075", "text": "func (o *FirmwareDistributableMetaAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "title": "" }, { "docid": "0f23afb63b92a411cf575c888bcaa1d3", "score": "0.42940113", "text": "func (o *CollisionShape2D) GetShape() Shape2DImplementer {\n\t//log.Println(\"Calling CollisionShape2D.GetShape()\")\n\n\t// Build out the method's arguments\n\tptrArguments := make([]gdnative.Pointer, 0, 0)\n\n\t// Get the method bind\n\tmethodBind := gdnative.NewMethodBind(\"CollisionShape2D\", \"get_shape\")\n\n\t// Call the parent method.\n\t// Shape2D\n\tretPtr := gdnative.NewEmptyObject()\n\tgdnative.MethodBindPtrCall(methodBind, o.GetBaseObject(), ptrArguments, retPtr)\n\n\t// If we have a return type, convert it from a pointer into its actual object.\n\tret := newShape2DFromPointer(retPtr)\n\n\t// Check to see if we already have an instance of this object in our Go instance registry.\n\tif instance, ok := InstanceRegistry.Get(ret.GetBaseObject().ID()); ok {\n\t\treturn instance.(Shape2DImplementer)\n\t}\n\n\t// Check to see what kind of class this is and create it. This is generally used with\n\t// GetNode().\n\tclassName := ret.GetClass()\n\tif className != \"Shape2D\" {\n\t\tactualRet := getActualClass(className, ret.GetBaseObject())\n\t\treturn actualRet.(Shape2DImplementer)\n\t}\n\n\treturn &ret\n}", "title": "" }, { "docid": "3abef1b4f885ac0ad6fb37127a70bb5c", "score": "0.4291912", "text": "func (it *Optional) Type() graph.Type { return graph.Optional }", "title": "" }, { "docid": "260060c3ac2ebbe5441943578b4f3702", "score": "0.4290981", "text": "func (maybeSelf MaybeDef) Type() reflect.Type {\n\tif maybeSelf.IsNil() {\n\t\treturn reflect.TypeOf(nil)\n\t}\n\treturn reflect.TypeOf(maybeSelf.ref)\n}", "title": "" }, { "docid": "8e16cf359cbcf69e38766463a70f933a", "score": "0.4260955", "text": "func (o *FirmwareDistributableMetaAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "b75017d54a9deb9ac668378ac4ec28e9", "score": "0.42577407", "text": "func (this *IsObject) Type() value.Type { return value.BOOLEAN }", "title": "" }, { "docid": "809ad464524b54650c0e3a7057f55e9e", "score": "0.42554754", "text": "func parseObjectTypeDefinition(lexer *Lexer) (*ObjectTypeDefinition, error) {\n var objectTypeDefinition ObjectTypeDefinition\n var err error\n\n // LineNum\n objectTypeDefinition.LineNum = lexer.GetLineNum()\n // Description? finished at parseTypeSystemDefinition()\n // \"type\"\n lexer.NextTokenIs(TOKEN_TYPE)\n // Name\n if objectTypeDefinition.Name, err = parseName(lexer); err != nil {\n return nil, err\n }\n // ImplementsInterfaces?\n if lexer.LookAhead() == TOKEN_IMPLEMENTS {\n if objectTypeDefinition.ImplementsInterfaces, err = parseImplementsInterfaces(lexer); err != nil {\n return nil, err\n }\n }\n // Directives?\n if lexer.LookAhead() == TOKEN_AT {\n if objectTypeDefinition.Directives, err = parseDirectives(lexer); err != nil {\n return nil, err\n }\n }\n // FieldsDefinition?\n if lexer.LookAhead() == TOKEN_LEFT_BRACE {\n if objectTypeDefinition.FieldsDefinition, err = parseFieldsDefinition(lexer); err != nil {\n return nil, err\n }\n }\n return &objectTypeDefinition, nil\n}", "title": "" }, { "docid": "bf0ac03497dc6739668f69d8803be8e3", "score": "0.42497456", "text": "func (o *KubernetesAddonConfigurationAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "title": "" }, { "docid": "68b49c3ca5d5a1f6a0a8c1e6581cedde", "score": "0.4228688", "text": "func (w *ZipWriter) UseShapeType(t ShapeType) error {\n\tif w.GeometryType != NULL {\n\t\treturn errors.New(\"ShapeType already initialized\")\n\t}\n\tw.GeometryType = t\n\treturn nil\n}", "title": "" }, { "docid": "9d613dae483a08b39fd30d9a62389914", "score": "0.42253706", "text": "func (o *WorkflowTemplateFunctionMeta) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "e719a7cb44a4036b823938cb7b6329a7", "score": "0.42245078", "text": "func GetShapeType(index int) ShapeType {\n\tvar result ShapeType\n\n\tif index < bodiesCount {\n\t\tresult = bodies[index].Shape.Type\n\t} else {\n\t\traylib.TraceLog(raylib.LogDebug, \"[PHYSAC] physics body index is out of bounds\")\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "eb30c74df2305d24bf7d5eaaade294a1", "score": "0.4222363", "text": "func (v *TypeDeclared) UnmarshalEasyJSON(l *jlexer.Lexer) {\n\teasyjson27e9271dDecodeGithubComMailruEasyjsonTests(l, v)\n}", "title": "" }, { "docid": "d5854460f8c5ba962907bf7e82d60346", "score": "0.42081946", "text": "func MakeOneOfDiscriminantRequired() *Stage {\n\treturn NewStage(\n\t\tMakeOneOfDiscriminantRequiredStageId,\n\t\t\"Fix one of types to a discriminator which is not omitempty/optional\",\n\t\tfunc(ctx context.Context, state *State) (*State, error) {\n\t\t\tupdatedDefs := make(astmodel.TypeDefinitionSet)\n\t\t\tfor _, def := range state.Definitions() {\n\t\t\t\tisOneOf := astmodel.OneOfFlag.IsOn(def.Type())\n\t\t\t\tisARM := def.Name().IsARMType()\n\t\t\t\tif !isOneOf || !isARM {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tupdated, err := makeOneOfDiscriminantTypeRequired(def, state.Definitions())\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\tupdatedDefs.AddTypes(updated)\n\t\t\t}\n\n\t\t\treturn state.WithDefinitions(state.Definitions().OverlayWith(updatedDefs)), nil\n\t\t})\n}", "title": "" }, { "docid": "9aed409f351f38748be2830252f0396b", "score": "0.41936016", "text": "func (o *KubernetesRouteAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "c19313639152ccf1ba6289aa2ee0d1be", "score": "0.41916382", "text": "func (o *ViewReaction) GetObjectTypeOk() (*string, bool) {\n\tif o == nil || o.ObjectType == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ObjectType, true\n}", "title": "" }, { "docid": "125a7b3514891b17e338a529de3c750b", "score": "0.4191203", "text": "func PlanOneOfDiffTypes(ctx context.Context, helper gen.Helper, schema *gen.Schema) (gen.Plan, error) {\n\t_, schemas, err := loadSchemaList(ctx, helper, schema, schema.OneOf)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(schemas) == 0 {\n\t\treturn nil, fmt.Errorf(\"no oneOf schemas: %w\", gen.ErrContinue)\n\t}\n\tseen := make(map[gen.JSONType]bool)\n\tfor _, s := range schemas {\n\t\ttyp, err := helper.DetectSimpleType(ctx, s)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to detect simple type for %v: %w\", s, err)\n\t\t}\n\t\tif typ == gen.JSONInteger {\n\t\t\ttyp = gen.JSONNumber // we cannot be guaranteed to distinguish between floats and ints, so treat same\n\t\t}\n\t\tif seen[typ] {\n\t\t\treturn nil, fmt.Errorf(\"type %v seen too many times: %w\", typ, gen.ErrContinue)\n\t\t}\n\t\tseen[typ] = true\n\t}\n\ttInfo := helper.TypeInfoHinted(schema, gen.JSONObject)\n\tif tInfo.Unknown() {\n\t\treturn nil, fmt.Errorf(\"schema type is unknown: %w\", gen.ErrContinue)\n\t}\n\n\ts := &StructPlan{TypeInfo: tInfo, ID: schema.ID}\n\ts.Comment = schema.Annotations.GetString(\"description\")\n\n\tf := StructField{Name: \"Value\", Type: gen.TypeInfo{Name: \"interface{}\"}}\n\n\tvar (\n\t\ttrait marshalOneOfTrait\n\t\tcheckedSubSchema bool\n\t)\n\tfor _, subSchema := range schemas {\n\t\tinfo, err := helper.TypeInfo(subSchema)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif !info.BuiltIn() {\n\t\t\tif err := helper.Dep(ctx, subSchema); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\n\t\tjType, err := helper.DetectSimpleType(ctx, subSchema)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to choose simple type for %v: %w\", subSchema, err)\n\t\t}\n\t\tswitch jType {\n\t\tcase gen.JSONObject:\n\t\t\ttrait.Object = info\n\t\tcase gen.JSONArray:\n\t\t\ttrait.Array = info\n\t\tcase gen.JSONString:\n\t\t\ttrait.Primitives = append(trait.Primitives, \"string\")\n\t\tcase gen.JSONNumber:\n\t\t\ttrait.Primitives = append(trait.Primitives, \"float64\")\n\t\tcase gen.JSONInteger:\n\t\t\ttrait.Primitives = append(trait.Primitives, \"int64\")\n\t\tcase gen.JSONBoolean:\n\t\t\ttrait.Primitives = append(trait.Primitives, \"bool\")\n\t\tcase gen.JSONNull:\n\t\t\ttrait.Nil = true\n\t\t}\n\n\t\tfor _, v := range validator.Validators(subSchema) {\n\t\t\tif v.Name == validator.SubschemaValidator.Name {\n\t\t\t\tif checkedSubSchema {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tcheckedSubSchema = true\n\t\t\t}\n\t\t\tf.FieldValidators = append(f.FieldValidators, v)\n\t\t}\n\t}\n\ts.Traits = []Trait{trait}\n\ts.Fields = []StructField{f}\n\treturn s, nil\n}", "title": "" }, { "docid": "db8a1a5883225a365cc0e1e3e2e555ab", "score": "0.41858974", "text": "func (o *WorkflowConstraintsAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "6d1b937807642c3485faf8dfd19c117d", "score": "0.41855675", "text": "func IsComplex(schema spec.Schema) bool {\n\t_, _, k := GetDefinitionVersionKind(schema)\n\treturn len(k) > 0\n}", "title": "" }, { "docid": "f581b99d278d40849d5a34b1112a1db0", "score": "0.41761044", "text": "func (o *SessionAbstractSessionAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "98a975b4140932cceca1c520d3e2a50b", "score": "0.4175975", "text": "func MakeShape(name string, object2world, world2object *Transform,\n\treverseOrientation bool, paramSet *ParamSet) Shape {\n\tvar s Shape = nil\n\n\tif strings.Compare(name, \"sphere\") == 0 {\n\t\ts = CreateSphereShape(object2world, world2object, reverseOrientation, paramSet)\n\t} else if strings.Compare(name, \"cylinder\") == 0 {\n\t\ts = CreateCylinderShape(object2world, world2object, reverseOrientation, paramSet)\n\t} else if strings.Compare(name, \"disk\") == 0 {\n\t\ts = CreateDiskShape(object2world, world2object, reverseOrientation, paramSet)\n\t} else if strings.Compare(name, \"cone\") == 0 {\n\t\ts = CreateConeShape(object2world, world2object, reverseOrientation, paramSet)\n\t} else if strings.Compare(name, \"paraboloid\") == 0 {\n\t\ts = CreateParaboloidShape(object2world, world2object, reverseOrientation, paramSet)\n\t} else if strings.Compare(name, \"hyperboloid\") == 0 {\n\t\ts = CreateHyperboloidShape(object2world, world2object, reverseOrientation, paramSet)\n\t} else if strings.Compare(name, \"trianglemesh\") == 0 {\n\t\ts = CreateTriangleMeshShape(object2world, world2object, reverseOrientation, paramSet, graphicsState.floatTextures)\n\t} else if strings.Compare(name, \"heightfield\") == 0 {\n\t\ts = CreateHeightfieldShape(object2world, world2object, reverseOrientation, paramSet)\n\t} else if strings.Compare(name, \"loopsubdiv\") == 0 {\n\t\ts = CreateLoopSubdivShape(object2world, world2object, reverseOrientation, paramSet)\n\t} else if strings.Compare(name, \"nurbs\") == 0 {\n\t\ts = CreateNURBSShape(object2world, world2object, reverseOrientation, paramSet)\n\t} else {\n\t\tWarning(\"Shape \\\"%s\\\" unknown.\", name)\n\t}\n\treturn s\n}", "title": "" }, { "docid": "c64b675d3f9f738f2d4a3aaff8ac7059", "score": "0.41747394", "text": "func (o *NiatelemetryInterfaceElementAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "title": "" }, { "docid": "2c77ac0fe9a609dbe7818087d532b6d9", "score": "0.41744772", "text": "func (b *BaseCollider) ZYShape() resolv.Shape { return b.zyshape }", "title": "" }, { "docid": "92922d191ad26a39beb4c3d0c427bfb4", "score": "0.41710964", "text": "func (builder *CodecBuilder) AddConcrete(\n\toneOfType reflect.Type, bsonType bsontype.Type, binaryType byte,\n) error {\n\tif err := builder.validateValueWrapperType(oneOfType); err != nil {\n\t\treturn err\n\t}\n\n\ttypeKey := newBsonTypeKey(bsonType, binaryType)\n\n\texistingType, ok := builder.decodeMap[typeKey]\n\tif bsonType == bsontype.EmbeddedDocument {\n\t\t// Get the de-referenced struct type of the wrapper\n\t\tinnerType := structTypeFromOneOfWrapperType(oneOfType)\n\t\t// Make a key from the fully qualified type path and add it to our embedded\n\t\t// struct types\n\t\tdocTypeKey := embeddedDocKeyFromType(innerType)\n\t\t// Store the oneOf type wrapper for this type\n\t\tbuilder.embeddedDocTypeMap[docTypeKey] = oneOfType.Elem()\n\t} else if ok {\n\t\treturn fmt.Errorf(\n\t\t\t\"bson type '%v' is already registered to oneof type '%v'\",\n\t\t\tbsonType,\n\t\t\texistingType,\n\t\t)\n\t}\n\n\t// Store the struct type for the one-of wrapper\n\tbuilder.decodeMap[typeKey] = oneOfType.Elem()\n\n\t// Add the concrete type to the oneof so we can register it as a wrapper.\n\twrapperCodec, err := wrapper.NewWrapperCodec(\n\t\treflect.New(oneOfType.Elem()).Interface(),\n\t)\n\tif err != nil {\n\t\treturn fmt.Errorf(\n\t\t\t\"error building wrapper codec for concrete oneof type '%v': %w\",\n\t\t\toneOfType,\n\t\t\terr,\n\t\t)\n\t}\n\n\tconcreteCodecInfo := &ConcreteTypeCodecInfo{\n\t\tConcreteType: oneOfType,\n\t\tCodec: wrapperCodec,\n\t}\n\tbuilder.concreteTypeCodecs = append(builder.concreteTypeCodecs, concreteCodecInfo)\n\n\treturn nil\n}", "title": "" }, { "docid": "171c8fe76fb5a938de95ef078a731297", "score": "0.41653296", "text": "func (o *WorkflowTaskMetadata) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "8863698748e803df26b56435d3004808", "score": "0.416242", "text": "func (o *NiatelemetryInterfaceElementAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "639a83c0bbe7f50aab88ea2c5e8bbecd", "score": "0.41580904", "text": "func (*ImportedInterface_Request) AllMojomTypes() map[string]mojom_types.UserDefinedType {\n\treturn GetAllMojomTypeDefinitions()\n}", "title": "" }, { "docid": "c9b7705a4411601b31eae9b4a0be07f8", "score": "0.4151979", "text": "func (o *TechsupportmanagementTechSupportBundleAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "ef3e63e03a17243475c525739e8c4f9d", "score": "0.41460913", "text": "func (t *GQLtype) isType() TypeFlag_ {\n\t//\n\t// Object types have nested types i.e. each field has a *Type attribute\n\t// the *Type.AST can itself be another object or a scalar (system or user defined)\n\t// Scalars do not have a *Type attribute as they represent the leaf node in a tree of types.\n\t//\n\n\tswitch t.Name.String() {\n\t//\n\t// system scalar types\n\t//\n\tcase token.ID:\n\t\treturn ID\n\tcase token.INT:\n\t\treturn INT\n\tcase token.FLOAT:\n\t\treturn FLOAT\n\tcase token.STRING, token.RAWSTRING:\n\t\treturn STRING\n\tcase token.BOOLEAN:\n\t\treturn BOOLEAN\n\tcase token.NULL:\n\t\treturn NULL\n\t// case token.ID:\n\t// \treturn ID\n\t// case token.Time: // could implement new scalar time at this level or embedded in Scalar_ like user defined scales would be.\n\t// return TIME\n\tdefault:\n\t\t//\n\t\t// application defined types\n\t\t//\n\t\tif t.AST != nil {\n\t\t\tswitch t.AST.(type) {\n\t\t\tcase *Object_:\n\t\t\t\treturn OBJECT\n\t\t\tcase *Interface_:\n\t\t\t\treturn INTERFACE\n\t\t\tcase *Enum_:\n\t\t\t\treturn ENUM\n\t\t\tcase *EnumValue_:\n\t\t\t\treturn ENUMVALUE\n\t\t\tcase *Input_:\n\t\t\t\treturn INPUT\n\t\t\tcase *Union_:\n\t\t\t\treturn UNION\n\t\t\tcase *Scalar_:\n\t\t\t\treturn SCALAR\n\t\t\t\t// case *List_: // []InputValue_, is not a GQLType, nor is InputValue_\n\t\t\t\t// \treturn LIST\n\t\t\t}\n\t\t\t//\n\t\t\treturn ILLEGAL\n\t\t}\n\t}\n\treturn ILLEGAL\n}", "title": "" }, { "docid": "5e1771eb71a6999f5b37c25d6d45fbe1", "score": "0.4142904", "text": "func (o *TechsupportmanagementTechSupportBundleAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "title": "" }, { "docid": "298f7146f4fe996fb2489727c9f85050", "score": "0.41318655", "text": "func (o *TamMilestoneAllOf) GetMilestoneType() string {\n\tif o == nil || o.MilestoneType == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.MilestoneType\n}", "title": "" }, { "docid": "0a1cb94f8f1a3f2c8add37711a6edf60", "score": "0.41260034", "text": "func (d *Definitions) IsComplex(s spec.Schema) bool {\n\t_, _, k := GetDefinitionVersionKind(s)\n\treturn len(k) > 0\n}", "title": "" }, { "docid": "0257c2dcdf6e6a5f11388f9301250fee", "score": "0.41248202", "text": "func (o *HyperflexServerModelEntryAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "8c156c56fbd60678dc1c08a824073186", "score": "0.41228643", "text": "func yangToJSONType(t yang.TypeKind) reflect.Type {\n\tswitch t {\n\tcase yang.Yint8, yang.Yint16, yang.Yint32,\n\t\tyang.Yuint8, yang.Yuint16, yang.Yuint32:\n\t\treturn reflect.TypeOf(float64(0))\n\tcase yang.Ybinary, yang.Ydecimal64, yang.Yenum, yang.Yidentityref, yang.Yint64, yang.Yuint64, yang.Ystring:\n\t\treturn reflect.TypeOf(string(\"\"))\n\tcase yang.Ybool:\n\t\treturn reflect.TypeOf(bool(false))\n\tcase yang.Yempty:\n\t\treturn reflect.TypeOf([]interface{}{})\n\tcase yang.Yunion:\n\t\treturn reflect.TypeOf(nil)\n\tdefault:\n\t\t// TODO(mostrowski): handle bitset.\n\t\tlog.Errorf(\"unexpected type %v in yangToJSONType\", t)\n\t}\n\treturn reflect.TypeOf(nil)\n}", "title": "" }, { "docid": "acb09df19c9e4d820f54df6875dc9b94", "score": "0.4111652", "text": "func (o *Object) hydrateType() {\n\tif o.Polygon != nil {\n\t\to.objectType = PolygonObj\n\t\treturn\n\t}\n\n\tif o.PolyLine != nil {\n\t\to.objectType = PolylineObj\n\t\treturn\n\t}\n\n\tif o.Ellipse != nil {\n\t\to.objectType = EllipseObj\n\t\treturn\n\t}\n\n\tif o.Point != nil {\n\t\to.objectType = PointObj\n\t\treturn\n\t}\n\n\tif o.GID != 0 {\n\t\to.objectType = TileObj\n\t\treturn\n\t}\n\n\to.objectType = RectangleObj\n}", "title": "" }, { "docid": "ddd8dc101bf7477934c99ace67e7d4ef", "score": "0.4107576", "text": "func (f *RelationalModelDefinition) PopulateFromModeledType() {\n\tif f.BuiltFrom == nil {\n\t\treturn\n\t}\n\tfor _, utd := range f.BuiltFrom {\n\t\tobj := utd.ToObject()\n\t\tobj.IterateAttributes(func(name string, att *design.AttributeDefinition) error {\n\t\t\trf, ok := f.RelationalFields[codegen.Goify(name, true)]\n\t\t\tif ok {\n\t\t\t\t// We already have a mapping for this field. What to do?\n\t\t\t\tif rf.Datatype != \"\" {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\t\t// we may have seen the field but don't know its type\n\t\t\t\t// TODO(BJK) refactor this into separate func later\n\t\t\t\tswitch att.Type.Kind() {\n\t\t\t\tcase design.BooleanKind:\n\t\t\t\t\trf.Datatype = Boolean\n\t\t\t\tcase design.IntegerKind:\n\t\t\t\t\trf.Datatype = Integer\n\t\t\t\tcase design.NumberKind:\n\t\t\t\t\trf.Datatype = BigDecimal\n\t\t\t\tcase design.StringKind:\n\t\t\t\t\trf.Datatype = String\n\t\t\t\tcase design.DateTimeKind:\n\t\t\t\t\trf.Datatype = Timestamp\n\t\t\t\tcase design.MediaTypeKind:\n\t\t\t\t\t// Embedded MediaType\n\t\t\t\t\t// Skip for now?\n\t\t\t\t\treturn nil\n\n\t\t\t\tdefault:\n\t\t\t\t\tdslengine.ReportError(\"Unsupported type: %#v %s\", att.Type.Kind(), att.Type.Name())\n\t\t\t\t}\n\t\t\t\tif !utd.IsRequired(name) {\n\t\t\t\t\trf.Nullable = true\n\t\t\t\t}\n\t\t\t}\n\n\t\t\trf = &RelationalFieldDefinition{}\n\t\t\trf.Parent = f\n\t\t\trf.FieldName = codegen.Goify(name, true)\n\n\t\t\tif strings.HasSuffix(rf.FieldName, \"Id\") {\n\t\t\t\trf.FieldName = strings.TrimSuffix(rf.FieldName, \"Id\")\n\t\t\t\trf.FieldName = rf.FieldName + \"ID\"\n\t\t\t}\n\t\t\tswitch att.Type.Kind() {\n\t\t\tcase design.BooleanKind:\n\t\t\t\trf.Datatype = Boolean\n\t\t\tcase design.IntegerKind:\n\t\t\t\trf.Datatype = Integer\n\t\t\tcase design.NumberKind:\n\t\t\t\trf.Datatype = BigDecimal\n\t\t\tcase design.StringKind:\n\t\t\t\trf.Datatype = String\n\t\t\tcase design.DateTimeKind:\n\t\t\t\trf.Datatype = Timestamp\n\t\t\tcase design.MediaTypeKind:\n\t\t\t\t// Embedded MediaType\n\t\t\t\t// Skip for now?\n\t\t\t\treturn nil\n\n\t\t\tdefault:\n\t\t\t\tdslengine.ReportError(\"Unsupported type: %#v %s\", att.Type.Kind(), att.Type.Name())\n\t\t\t}\n\t\t\tif !utd.IsRequired(name) {\n\t\t\t\trf.Nullable = true\n\t\t\t}\n\t\t\t// might need this later?\n\t\t\trf.a = att\n\t\t\tf.RelationalFields[rf.FieldName] = rf\n\n\t\t\taddAttributeToModel(name, att, f)\n\n\t\t\treturn nil\n\t\t})\n\t}\n\treturn\n}", "title": "" }, { "docid": "6bf10079d10f87be945b089a9011c4cb", "score": "0.41006446", "text": "func (f *Field) JSType() string {\n\treturn string(goTypeToJS(f))\n}", "title": "" }, { "docid": "0dbfee036cf85859aa0be2a099e3e933", "score": "0.40983105", "text": "func (this *SchemaManager) createPrototypeComplexType(schema *XML_Schemas.XSD_Schema, complexType *XML_Schemas.XSD_ComplexType) *EntityPrototype {\r\n\tprototype := NewEntityPrototype()\r\n\r\n\tif complexType.IsAbstract {\r\n\t\tprototype.IsAbstract = true\r\n\t}\r\n\r\n\tif len(complexType.Name) > 0 {\r\n\t\t// Here if the prototype exist on the list of prototype I will not recreate it\r\n\t\tif val, ok := this.prototypes[schema.Id+\".\"+complexType.Name]; ok {\r\n\t\t\treturn val\r\n\t\t}\r\n\r\n\t\tprototype.TypeName = schema.Id + \".\" + complexType.Name\r\n\t\tfor i := 0; i < len(complexType.Annotations); i++ {\r\n\t\t\tprototype.Documentation += this.parseAnnotation(complexType.Annotations[i])\r\n\t\t}\r\n\t\t// Append the prototype to the map...\r\n\t\tthis.prototypes[prototype.TypeName] = prototype\r\n\t}\r\n\r\n\tif val, ok := this.prototypes[schema.Id+\".\"+complexType.Name]; ok {\r\n\t\tprototype = val\r\n\t}\r\n\r\n\t// The attributes...\r\n\tfor i := 0; i < len(complexType.Attributes); i++ {\r\n\t\tthis.appendPrototypeAttribute(schema, prototype, &complexType.Attributes[i])\r\n\t}\r\n\r\n\t// In local group only...\r\n\tfor i := 0; i < len(complexType.AttributeGroups); i++ {\r\n\t\tthis.appendPrototypeAttributeGroup(schema, prototype, &complexType.AttributeGroups[i])\r\n\t}\r\n\r\n\tfor i := 0; i < len(complexType.AnyAttributes); i++ {\r\n\t\tthis.appendPrototypeAnyAttribute(schema, prototype, &complexType.AnyAttributes[i])\r\n\t}\r\n\r\n\t// The content of the complex type can be\r\n\tif complexType.ComplexContent != nil {\r\n\t\tif complexType.ComplexContent.Extension != nil {\r\n\t\t\tthis.appendPrototypeExtention(schema, prototype, complexType.ComplexContent.Extension, complexType.ComplexContent, nil)\r\n\t\t} else if complexType.ComplexContent.Restriction != nil {\r\n\t\t\tthis.appendPrototypeRestriction(schema, prototype, complexType.ComplexContent.Restriction, nil, complexType.ComplexContent, nil)\r\n\t\t}\r\n\r\n\t} else if complexType.SimpleContent != nil {\r\n\t\tif complexType.SimpleContent.Extension != nil {\r\n\t\t\tthis.appendPrototypeExtention(schema, prototype, complexType.SimpleContent.Extension, nil, complexType.SimpleContent)\r\n\t\t} else if complexType.SimpleContent.Restriction != nil {\r\n\t\t\tthis.appendPrototypeRestriction(schema, prototype, complexType.SimpleContent.Restriction, nil, nil, complexType.SimpleContent)\r\n\t\t}\r\n\t} else {\r\n\t\tif complexType.Group != nil {\r\n\t\t\tthis.appendPrototypeGroup(schema, prototype, complexType.Group, complexType.Group.MinOccurs, complexType.Group.MaxOccurs)\r\n\t\t} else if complexType.All != nil {\r\n\t\t\tthis.appendPrototypeAll(schema, prototype, complexType.All, complexType.All.MinOccurs, complexType.All.MaxOccurs)\r\n\t\t} else if complexType.Choice != nil {\r\n\t\t\tthis.appendPrototypeChoice(schema, prototype, complexType.Choice, complexType.Choice.MinOccurs, complexType.Choice.MaxOccurs)\r\n\t\t} else if complexType.Sequence != nil {\r\n\t\t\tthis.appendPrototypeSequence(schema, prototype, complexType.Sequence, complexType.Sequence.MinOccurs, complexType.Sequence.MaxOccurs)\r\n\t\t}\r\n\t}\r\n\r\n\treturn prototype\r\n}", "title": "" }, { "docid": "fd7ff50f7b95536c2277604400c04f07", "score": "0.40925753", "text": "func (md *Metadata) AddUserDefinedType(typ *types.T) {\n\tif !typ.UserDefined() {\n\t\treturn\n\t}\n\tif md.userDefinedTypes == nil {\n\t\tmd.userDefinedTypes = make(map[oid.Oid]struct{})\n\t}\n\tif _, ok := md.userDefinedTypes[typ.Oid()]; !ok {\n\t\tmd.userDefinedTypes[typ.Oid()] = struct{}{}\n\t\tmd.userDefinedTypesSlice = append(md.userDefinedTypesSlice, typ)\n\t}\n}", "title": "" }, { "docid": "85367e4f731f2fc13eac2fd626ee6409", "score": "0.4086382", "text": "func (o *WorkflowConstraintsAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "title": "" }, { "docid": "848a07af1addab74847935cdeaa2ae9d", "score": "0.408021", "text": "func getAstFieldType(binder *config.Binder, schema *ast.Schema, cfg *config.Config, field *ast.FieldDefinition) (\n\ttypes.Type, error) {\n\tvar typ types.Type\n\tvar err error\n\n\tfieldDef := schema.Types[field.Type.Name()]\n\tif cfg.Models.UserDefined(field.Type.Name()) {\n\t\ttyp, err = binder.FindTypeFromName(cfg.Models[field.Type.Name()].Model[0])\n\t\tif err != nil {\n\t\t\treturn typ, err\n\t\t}\n\t} else {\n\t\tswitch fieldDef.Kind {\n\t\tcase ast.Scalar:\n\t\t\t// no user defined model, referencing a default scalar\n\t\t\ttyp = types.NewNamed(\n\t\t\t\ttypes.NewTypeName(0, cfg.Model.Pkg(), \"string\", nil),\n\t\t\t\tnil,\n\t\t\t\tnil,\n\t\t\t)\n\n\t\tcase ast.Interface, ast.Union:\n\t\t\t// no user defined model, referencing a generated interface type\n\t\t\ttyp = types.NewNamed(\n\t\t\t\ttypes.NewTypeName(0, cfg.Model.Pkg(), gqlgenTemplates.ToGo(field.Type.Name()), nil),\n\t\t\t\ttypes.NewInterfaceType([]*types.Func{}, []types.Type{}),\n\t\t\t\tnil,\n\t\t\t)\n\n\t\tcase ast.Enum:\n\t\t\t// no user defined model, must reference a generated enum\n\t\t\ttyp = types.NewNamed(\n\t\t\t\ttypes.NewTypeName(0, cfg.Model.Pkg(), gqlgenTemplates.ToGo(field.Type.Name()), nil),\n\t\t\t\tnil,\n\t\t\t\tnil,\n\t\t\t)\n\n\t\tcase ast.Object, ast.InputObject:\n\t\t\t// no user defined model, must reference a generated struct\n\t\t\ttyp = types.NewNamed(\n\t\t\t\ttypes.NewTypeName(0, cfg.Model.Pkg(), gqlgenTemplates.ToGo(field.Type.Name()), nil),\n\t\t\t\ttypes.NewStruct(nil, nil),\n\t\t\t\tnil,\n\t\t\t)\n\n\t\tdefault:\n\t\t\tpanic(fmt.Errorf(\"unknown ast type %s\", fieldDef.Kind))\n\t\t}\n\t}\n\n\treturn typ, err\n}", "title": "" }, { "docid": "c8d4b126a9f28f67f272f96dc9bf8086", "score": "0.4076131", "text": "func (o *WorkflowEnumEntryAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "b41966803f0e1abe612cb72088497902", "score": "0.40758795", "text": "func (o *HyperflexServerModelEntryAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "title": "" }, { "docid": "1c811698eb635b14aae278f6fc17ab22", "score": "0.407452", "text": "func (o *WorkflowOperationTypePostDeployment) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "4dabc777f8295f68b779a3f654f3d97d", "score": "0.40718803", "text": "func OneOfType(types []dgo.Type) dgo.Type {\n\tl := len(types)\n\tswitch l {\n\tcase 0:\n\t\t// One of no types doesn't represent any values at all\n\t\treturn notAnyType\n\tcase 1:\n\t\treturn types[0]\n\t}\n\tts := make([]dgo.Value, l)\n\tfor i := range types {\n\t\tts[i] = types[i]\n\t}\n\treturn &oneOfType{slice: ts, frozen: true}\n}", "title": "" }, { "docid": "7f09d5cf17bb8693ea114ba7cd52d250", "score": "0.40676412", "text": "func (o SchemaComparisonValidationResultTypeResponseOutput) ObjectType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v SchemaComparisonValidationResultTypeResponse) string { return v.ObjectType }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b48305bf44481aef84cedb0f742cb3a2", "score": "0.40671015", "text": "func (me XsdGoPkgHasAttr_Type_TxsdFeColorMatrixTypeType_Matrix) TypeDefault() TxsdFeColorMatrixTypeType {\n\treturn TxsdFeColorMatrixTypeType(\"matrix\")\n}", "title": "" }, { "docid": "f21867b64e2febe46cdf2ce73c1268bc", "score": "0.40644208", "text": "func (o *ConnectorTargetSpecificationAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "907161c5c1cbbbbabc5b45f10beed96c", "score": "0.4060773", "text": "func (me TxsdFeColorMatrixTypeType) IsMatrix() bool { return me == \"matrix\" }", "title": "" }, { "docid": "c75d82e4acf037988425d4f00a0723c6", "score": "0.406022", "text": "func (o *SessionAbstractSessionAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "title": "" }, { "docid": "365dd754257e4a1086bf74e5f91108fa", "score": "0.40439326", "text": "func (o SchemaPackageOutput) SchematizedParsingType() SchemaPackageSchematizedParsingTypePtrOutput {\n\treturn o.ApplyT(func(v SchemaPackage) *SchemaPackageSchematizedParsingType { return v.SchematizedParsingType }).(SchemaPackageSchematizedParsingTypePtrOutput)\n}", "title": "" }, { "docid": "715395927b7941d26c18ee2b8b10c3f4", "score": "0.4039036", "text": "func (o *WorkflowTemplateFunctionMeta) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "title": "" }, { "docid": "8241c6316d1c2daa67c278e5dca2e138", "score": "0.40385234", "text": "func (o *StorageHitachiRemoteReplication) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "e81bae869fe1f635a4bade9629e13379", "score": "0.4037509", "text": "func (o *NotificationAggregationSettingsAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "e4ea1d9d7aecd2501c72c1cc48e2ef46", "score": "0.40360427", "text": "func (o *ConnectorTargetSpecificationAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "title": "" }, { "docid": "e6c56371bc35ccebc298ee56878d8a82", "score": "0.40317357", "text": "func (b *Boolean) Type() ObjectType {\n\treturn BOOLEAN_OBJ\n}", "title": "" }, { "docid": "3074b4645f261e735ac1b654a81511b5", "score": "0.40291423", "text": "func (o *SessionAbstractSession) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "f4345f9d34841b1541944e43aea990d8", "score": "0.40243828", "text": "func (o *KubernetesStatefulSetStatus) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "90ef04dc07b444079a385266c4a71d59", "score": "0.40173954", "text": "func (o SchemaPackagePtrOutput) SchematizedParsingType() SchemaPackageSchematizedParsingTypePtrOutput {\n\treturn o.ApplyT(func(v *SchemaPackage) *SchemaPackageSchematizedParsingType {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SchematizedParsingType\n\t}).(SchemaPackageSchematizedParsingTypePtrOutput)\n}", "title": "" }, { "docid": "eca8842161a59e0e82b7c557c9e7e890", "score": "0.4012895", "text": "func (o *StorageHitachiArrayAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "13b8c89dce60ec2c7c8142c8647fcb2d", "score": "0.40112156", "text": "func (o *CloudAwsOrganizationalUnitAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "1b049b7729c67c47b65cc26610d56036", "score": "0.40100363", "text": "func (o *HyperflexHypervisorHost) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "74414a1d2f7a9b149a533ef5e28ef804", "score": "0.40037286", "text": "func (o *HyperflexCluster) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "title": "" }, { "docid": "d2c8449b76aa8966994ef900696f5816", "score": "0.40025315", "text": "func (m *OMany2one) UnmarshalJSON(b []byte) error {\n\tvar i interface{}\n\tif err := json.Unmarshal(b, &i); err != nil {\n\t\treturn err\n\t}\n\tswitch i.(type) {\n\tcase []interface{}:\n\t\tslice := i.([]interface{})\n\t\t*m = OMany2one{\n\t\t\tID: slice[0].(int),\n\t\t\tName: slice[1].(string),\n\t\t}\n\tcase bool:\n\t\t*m = OMany2one{}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3ccb0f9d3e60467ce45256fb1f0ff2ec", "score": "0.39995995", "text": "func (fd FieldDefinition) Type() FieldType {\n\tfType := C.OGR_Fld_GetType(fd.cval)\n\treturn FieldType(fType)\n}", "title": "" } ]
709133072483afe279332728ce4c233e
RequireCalls gets all the calls that were made to Require. Check the length with: len(mockedAuthHandler.RequireCalls())
[ { "docid": "4c5209cdc489063fa8e374be0254bca4", "score": "0.8827019", "text": "func (mock *AuthHandlerMock) RequireCalls() []struct {\n\tRequired auth.Permissions\n\tHandler http.HandlerFunc\n} {\n\tvar calls []struct {\n\t\tRequired auth.Permissions\n\t\tHandler http.HandlerFunc\n\t}\n\tmock.lockRequire.RLock()\n\tcalls = mock.calls.Require\n\tmock.lockRequire.RUnlock()\n\treturn calls\n}", "title": "" } ]
[ { "docid": "909c1a744c6ac91af809d1df19be4dbd", "score": "0.659268", "text": "func (mock *PrompterMock) AuthTokenCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tmock.lockAuthToken.RLock()\n\tcalls = mock.calls.AuthToken\n\tmock.lockAuthToken.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "8ff585288b699ed8ff248ab73722a199", "score": "0.6580596", "text": "func (mock *IHealthCheckMock) HandlerCalls() []struct {\n\tW http.ResponseWriter\n\tReq *http.Request\n} {\n\tvar calls []struct {\n\t\tW http.ResponseWriter\n\t\tReq *http.Request\n\t}\n\tmock.lockHandler.RLock()\n\tcalls = mock.calls.Handler\n\tmock.lockHandler.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "919ec4e5e50baa9a8ea1d3c5ac745276", "score": "0.6475825", "text": "func (mock *UserStoreMock) GetCalls() []struct {\n\t\tId int\n\t} {\n\tvar calls []struct {\n\t\tId int\n\t}\n\tlockUserStoreMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockUserStoreMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "7a91ebf50c1275325d37d30771b80c12", "score": "0.6473113", "text": "func (mock *ThreeScaleInterfaceMock) GetUserCalls() []struct {\n\tUsername string\n\tAccessToken string\n} {\n\tvar calls []struct {\n\t\tUsername string\n\t\tAccessToken string\n\t}\n\tmock.lockGetUser.RLock()\n\tcalls = mock.calls.GetUser\n\tmock.lockGetUser.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "ee172baee6fb9234fd4fdeff818cbf72", "score": "0.6468677", "text": "func (mmLoginClient *mKeycloakMockLoginClient) Calls() []*KeycloakMockLoginClientParams {\n\tmmLoginClient.mutex.RLock()\n\n\targCopy := make([]*KeycloakMockLoginClientParams, len(mmLoginClient.callArgs))\n\tcopy(argCopy, mmLoginClient.callArgs)\n\n\tmmLoginClient.mutex.RUnlock()\n\n\treturn argCopy\n}", "title": "" }, { "docid": "f1bbadee783ef8e2e9df69c5c4d5d12e", "score": "0.6454713", "text": "func (mock *httpRequesterMock) DoCalls() []struct {\n\tR *http.Request\n} {\n\tvar calls []struct {\n\t\tR *http.Request\n\t}\n\tlockhttpRequesterMockDo.RLock()\n\tcalls = mock.calls.Do\n\tlockhttpRequesterMockDo.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "8f0f69dc7765f5f2f350c7ddb9d0a61c", "score": "0.6444469", "text": "func (mock *InitialiserMock) DoGetHealthCheckCalls() []struct {\n\tCfg *config.Config\n\tBuildTime string\n\tGitCommit string\n\tVersion string\n} {\n\tvar calls []struct {\n\t\tCfg *config.Config\n\t\tBuildTime string\n\t\tGitCommit string\n\t\tVersion string\n\t}\n\tmock.lockDoGetHealthCheck.RLock()\n\tcalls = mock.calls.DoGetHealthCheck\n\tmock.lockDoGetHealthCheck.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "75b36d37bdc049d6e11042779b02f1aa", "score": "0.64402497", "text": "func (mock *RCHTTPClienterMock) GetCalls() []struct {\n\tCtx context.Context\n\tURL string\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tURL string\n\t}\n\tlockRCHTTPClienterMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockRCHTTPClienterMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "ad4bf10af65f1292b3263db4aa6cdde7", "score": "0.6437756", "text": "func (mock *GitWebHookReceiverClientMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n\tOptions v1b.GetOptions\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t\tOptions v1b.GetOptions\n\t}\n\tlockGitWebHookReceiverClientMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockGitWebHookReceiverClientMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "1acebb6012a6e6afdc1450bfcf4e69a4", "score": "0.6412557", "text": "func (mock *SessionServiceMock) MiddlewareCalls() []struct {\n\tIn1 http.Handler\n} {\n\tvar calls []struct {\n\t\tIn1 http.Handler\n\t}\n\tlockSessionServiceMockMiddleware.RLock()\n\tcalls = mock.calls.Middleware\n\tlockSessionServiceMockMiddleware.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "1e3905737e11f0e00a71afa3c80c61ca", "score": "0.64065963", "text": "func (mock *ProviderMock) GetUserCalls() []struct {\n\tEmail string\n} {\n\tvar calls []struct {\n\t\tEmail string\n\t}\n\tmock.lockGetUser.RLock()\n\tcalls = mock.calls.GetUser\n\tmock.lockGetUser.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "157aa4f2957c9ae84a25eacfa0151cdc", "score": "0.6390988", "text": "func (mock *RouterClientMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n\tOptions v1b.GetOptions\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t\tOptions v1b.GetOptions\n\t}\n\tlockRouterClientMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockRouterClientMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "8dbddd5ca6fd3ecfae4b148442208b34", "score": "0.63768035", "text": "func (mock *ThreeScaleInterfaceMock) GetUsersCalls() []struct {\n\tAccessToken string\n} {\n\tvar calls []struct {\n\t\tAccessToken string\n\t}\n\tmock.lockGetUsers.RLock()\n\tcalls = mock.calls.GetUsers\n\tmock.lockGetUsers.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "df1bfa8d92b6ab3b080023c5ff3ff8ba", "score": "0.6365896", "text": "func (mock *IProjectManagerMock) GetCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tmock.lockGet.RLock()\n\tcalls = mock.calls.Get\n\tmock.lockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "fff2c3d3c57f8a5fbbd39aa74923baa1", "score": "0.63648975", "text": "func (mock *DeploymentClientMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n\tOptions v1b.GetOptions\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t\tOptions v1b.GetOptions\n\t}\n\tlockDeploymentClientMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockDeploymentClientMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "5f2f78fbf7dd39bb2876760b452b2ff7", "score": "0.6361079", "text": "func (mock *FooClientMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n\tOptions v1.GetOptions\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t\tOptions v1.GetOptions\n\t}\n\tlockFooClientMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockFooClientMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "ad28452f2a11392a8defcb1453c6b09c", "score": "0.6350952", "text": "func (mock *UseCaseMock) GetCalls() []struct {\n\tCtx context.Context\n\tLog *zerolog.Logger\n\tID string\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tLog *zerolog.Logger\n\t\tID string\n\t}\n\tmock.lockGet.RLock()\n\tcalls = mock.calls.Get\n\tmock.lockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "43fe2a0cd353e6df93e966dcc3b7a050", "score": "0.632407", "text": "func (mock *ProviderMock) LoginCalls() []struct {\n\tEmail string\n\tPassword string\n} {\n\tvar calls []struct {\n\t\tEmail string\n\t\tPassword string\n\t}\n\tmock.lockLogin.RLock()\n\tcalls = mock.calls.Login\n\tmock.lockLogin.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "4d35015c62013ddbf5e6bb053d2f8c75", "score": "0.6265989", "text": "func (mock *IDatasetClientMock) GetCalls() []struct {\n\tCtx context.Context\n\tUserAuthToken string\n\tServiceAuthToken string\n\tCollectionID string\n\tDatasetID string\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tUserAuthToken string\n\t\tServiceAuthToken string\n\t\tCollectionID string\n\t\tDatasetID string\n\t}\n\tmock.lockGet.RLock()\n\tcalls = mock.calls.Get\n\tmock.lockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "35743b043bc1f18c93bdf17b1a7b54dc", "score": "0.62561184", "text": "func (mock *RCHTTPClienterMock) DoCalls() []struct {\n\tCtx context.Context\n\tReq *http.Request\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tReq *http.Request\n\t}\n\tlockRCHTTPClienterMockDo.RLock()\n\tcalls = mock.calls.Do\n\tlockRCHTTPClienterMockDo.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "84070eec9b01449fa23fb77bf886bb41", "score": "0.6254072", "text": "func (mock *RioInfoClientMock) GetCalls() []struct {\n\tName string\n\tOptions v1b.GetOptions\n} {\n\tvar calls []struct {\n\t\tName string\n\t\tOptions v1b.GetOptions\n\t}\n\tlockRioInfoClientMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockRioInfoClientMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "4a89a937edc5bdf912da80c0dd6e7632", "score": "0.6235544", "text": "func (mock *PipelineSettingControllerMock) ListerCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tlockPipelineSettingControllerMockLister.RLock()\n\tcalls = mock.calls.Lister\n\tlockPipelineSettingControllerMockLister.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "6f244dcd219696dc18aeec7d79cee829", "score": "0.62198323", "text": "func (mock *GitWebHookReceiverControllerMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n\tOptions v1b.GetOptions\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t\tOptions v1b.GetOptions\n\t}\n\tlockGitWebHookReceiverControllerMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockGitWebHookReceiverControllerMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "6ba39ff28403894443e147d4a26e63c1", "score": "0.6215426", "text": "func (mock *SpecMock) LoadCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tmock.lockLoad.RLock()\n\tcalls = mock.calls.Load\n\tmock.lockLoad.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "879424a428b2963fda69c57f5e57b3b8", "score": "0.62106216", "text": "func (mock *IHealthCheckMock) StartCalls() []struct {\n\tCtx context.Context\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t}\n\tmock.lockStart.RLock()\n\tcalls = mock.calls.Start\n\tmock.lockStart.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "53d5b71ed7306a1af26ac1ca7f9e029c", "score": "0.6206625", "text": "func (mock *ClusterRoleBindingListerMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t}\n\tlockClusterRoleBindingListerMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockClusterRoleBindingListerMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "0cc68bfd56f9cf5ab9e3063734339821", "score": "0.62049675", "text": "func (mock *ThreeScaleInterfaceMock) AddAuthenticationProviderCalls() []struct {\n\tData map[string]string\n\tAccessToken string\n} {\n\tvar calls []struct {\n\t\tData map[string]string\n\t\tAccessToken string\n\t}\n\tmock.lockAddAuthenticationProvider.RLock()\n\tcalls = mock.calls.AddAuthenticationProvider\n\tmock.lockAddAuthenticationProvider.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "aa2c5314cae3a7003eb00ce0ef141f63", "score": "0.6190077", "text": "func (mock *ProjectMonitorGraphControllerMock) ListerCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tlockProjectMonitorGraphControllerMockLister.RLock()\n\tcalls = mock.calls.Lister\n\tlockProjectMonitorGraphControllerMockLister.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "aecd697a4aff67b1c30cfe879ac4453d", "score": "0.6181087", "text": "func (mock *GitWebHookReceiverCacheMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t}\n\tlockGitWebHookReceiverCacheMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockGitWebHookReceiverCacheMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "71a4e524b1d01cd2e2e757ed2df8f136", "score": "0.61772496", "text": "func (mock *FooControllerMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n\tOptions v1.GetOptions\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t\tOptions v1.GetOptions\n\t}\n\tlockFooControllerMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockFooControllerMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "1152d4ec27773d435a13938d3ed55d23", "score": "0.6177028", "text": "func (mock *UserStoreMock) CountCalls() []struct {\n\t} {\n\tvar calls []struct {\n\t}\n\tlockUserStoreMockCount.RLock()\n\tcalls = mock.calls.Count\n\tlockUserStoreMockCount.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "b044bed256eb2d39bb97fcb4a72aa7b4", "score": "0.6155227", "text": "func (mock *QueryParamValidatorMock) ValidateCalls() []struct {\n\tCtx context.Context\n\tName string\n\tValue string\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tName string\n\t\tValue string\n\t}\n\tmock.lockValidate.RLock()\n\tcalls = mock.calls.Validate\n\tmock.lockValidate.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "6c3a37ec926dd6fc2c512537731662c5", "score": "0.61522025", "text": "func (mock *PermissionsCheckerMock) HasPermissionCalls() []struct {\n\tCtx context.Context\n\tEntityData permsdk.EntityData\n\tPermission string\n\tAttributes map[string]string\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tEntityData permsdk.EntityData\n\t\tPermission string\n\t\tAttributes map[string]string\n\t}\n\tmock.lockHasPermission.RLock()\n\tcalls = mock.calls.HasPermission\n\tmock.lockHasPermission.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "50eeb2fed76d0e13f1ac78d619adb9b4", "score": "0.61412686", "text": "func (mock *RouterControllerMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n\tOptions v1b.GetOptions\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t\tOptions v1b.GetOptions\n\t}\n\tlockRouterControllerMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockRouterControllerMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "eecd3cbe6811da4f2cff2be35560a2c4", "score": "0.61357313", "text": "func (mock *APIClientMock) ReadCalls() []struct {\n\tPath string\n} {\n\tvar calls []struct {\n\t\tPath string\n\t}\n\tmock.lockRead.RLock()\n\tcalls = mock.calls.Read\n\tmock.lockRead.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "37970c5b0f88360fae42ebcaba8d780c", "score": "0.61280423", "text": "func (mock *AlertMock) GetCalls() []struct {\n\tName string\n} {\n\tvar calls []struct {\n\t\tName string\n\t}\n\tmock.lockGet.RLock()\n\tcalls = mock.calls.Get\n\tmock.lockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "762dd1cf6ae879f4241ac4734320849d", "score": "0.6122576", "text": "func (mock *RioInfoCacheMock) GetCalls() []struct {\n\tName string\n} {\n\tvar calls []struct {\n\t\tName string\n\t}\n\tlockRioInfoCacheMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockRioInfoCacheMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "cf1cd11ca3429d942e83d14bfafbb3ad", "score": "0.61114144", "text": "func (mock *NodePoolListerMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t}\n\tlockNodePoolListerMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockNodePoolListerMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "bb19d5cabd0542af89bdfb079f1cd119", "score": "0.6105768", "text": "func (mock *UseCaseMock) GetAccountsCalls() []struct {\n\tCtx context.Context\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t}\n\tmock.lockGetAccounts.RLock()\n\tcalls = mock.calls.GetAccounts\n\tmock.lockGetAccounts.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "fa4ef141cf2a29c2a4ea7f75f0f4011b", "score": "0.6097916", "text": "func (mock *NodePoolControllerMock) ListerCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tlockNodePoolControllerMockLister.RLock()\n\tcalls = mock.calls.Lister\n\tlockNodePoolControllerMockLister.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "20fc6bd897385ff0b1b6bfa59cca2b8f", "score": "0.6097611", "text": "func (mock *StoreMock) LoadCalls() []struct {\n\tFmFeed string\n\tMax int\n\tSkipJunk bool\n} {\n\tvar calls []struct {\n\t\tFmFeed string\n\t\tMax int\n\t\tSkipJunk bool\n\t}\n\tmock.lockLoad.RLock()\n\tcalls = mock.calls.Load\n\tmock.lockLoad.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "bdd959431d1e446d14b16c771854f8e9", "score": "0.609691", "text": "func (mock *ThreeScaleInterfaceMock) GetAuthenticationProvidersCalls() []struct {\n\tAccessToken string\n} {\n\tvar calls []struct {\n\t\tAccessToken string\n\t}\n\tmock.lockGetAuthenticationProviders.RLock()\n\tcalls = mock.calls.GetAuthenticationProviders\n\tmock.lockGetAuthenticationProviders.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "45edead6fb1a354410bbc63680e60e69", "score": "0.6083477", "text": "func (mock *PipelineSettingListerMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t}\n\tlockPipelineSettingListerMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockPipelineSettingListerMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "75b1843eaf82d6ed61bcc7782fad820b", "score": "0.6080371", "text": "func (mock *elasticacheClientMock) DescribeUsersRequestCalls() []struct {\n\tDescribeUsersInput *elasticache.DescribeUsersInput\n} {\n\tvar calls []struct {\n\t\tDescribeUsersInput *elasticache.DescribeUsersInput\n\t}\n\tmock.lockDescribeUsersRequest.RLock()\n\tcalls = mock.calls.DescribeUsersRequest\n\tmock.lockDescribeUsersRequest.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "92bc22faa477e80f48d338652126360e", "score": "0.60732687", "text": "func (mock *SessionServiceMock) GetUserCalls() []struct {\n\tCtx context.Context\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t}\n\tlockSessionServiceMockGetUser.RLock()\n\tcalls = mock.calls.GetUser\n\tlockSessionServiceMockGetUser.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "db44e9729c571bcce2d3f6b27cf6276c", "score": "0.6066009", "text": "func (mock *UserHandlerMock) FindUserByLoginAndPasswordCalls() []struct {\n\tLogin string\n\tPassword string\n} {\n\tvar calls []struct {\n\t\tLogin string\n\t\tPassword string\n\t}\n\tlockUserHandlerMockFindUserByLoginAndPassword.RLock()\n\tcalls = mock.calls.FindUserByLoginAndPassword\n\tlockUserHandlerMockFindUserByLoginAndPassword.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "a98b3e06aa17e78caa2776f495459b90", "score": "0.6062164", "text": "func (mock *PreferenceControllerMock) ListerCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tlockPreferenceControllerMockLister.RLock()\n\tcalls = mock.calls.Lister\n\tlockPreferenceControllerMockLister.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "43db452dd6ac57f1f5ac48191429161e", "score": "0.60566175", "text": "func (mock *FooCacheMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t}\n\tlockFooCacheMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockFooCacheMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "4e4b5cc057ec611a2e9dd20747133ea0", "score": "0.60538405", "text": "func (mock *APIClientMock) HealthCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tmock.lockHealth.RLock()\n\tcalls = mock.calls.Health\n\tmock.lockHealth.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "0e065facecf87e6df001691e64530040", "score": "0.6052709", "text": "func (mock *PrompterMock) PasswordCalls() []struct {\n\tS string\n} {\n\tvar calls []struct {\n\t\tS string\n\t}\n\tmock.lockPassword.RLock()\n\tcalls = mock.calls.Password\n\tmock.lockPassword.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "ce7817acd3e6a9e9334a6a5cba273fff", "score": "0.6052296", "text": "func (m *RequestMock) AllMocksCalled() bool {\n\n\tif !m.AffinityRefFinished() {\n\t\treturn false\n\t}\n\n\tif !m.GetCallTypeFinished() {\n\t\treturn false\n\t}\n\n\tif !m.IsAPIRequestFinished() {\n\t\treturn false\n\t}\n\n\tif !m.IsCreationRequestFinished() {\n\t\treturn false\n\t}\n\n\tif !m.IsDetachedFinished() {\n\t\treturn false\n\t}\n\n\tif !m.ReasonRefFinished() {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "14eb855bc04b39267b2cf4fa010cee43", "score": "0.60493773", "text": "func (mock *RouterCacheMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t}\n\tlockRouterCacheMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockRouterCacheMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "c24aa466c880030f2d1a98e30960c29d", "score": "0.60484266", "text": "func (mock *StorerMock) GetRecipesCalls() []struct {\n\tCtx context.Context\n\tOffset int\n\tLimit int\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tOffset int\n\t\tLimit int\n\t}\n\tmock.lockGetRecipes.RLock()\n\tcalls = mock.calls.GetRecipes\n\tmock.lockGetRecipes.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "5751ba7612c46932bd0f14d40ed8e8e2", "score": "0.60468864", "text": "func (mock *LockerMock) LockCalls() []struct {\n\tName string\n\tUniqueID string\n\tDuration time.Duration\n} {\n\tvar calls []struct {\n\t\tName string\n\t\tUniqueID string\n\t\tDuration time.Duration\n\t}\n\tlockLockerMockLock.RLock()\n\tcalls = mock.calls.Lock\n\tlockLockerMockLock.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "6e939ee8960ae444493d5b873f76d20d", "score": "0.6046563", "text": "func (mock *SessionServiceMock) LoginCalls() []struct {\n\tCtx context.Context\n\tUser *gqlmeetup.User\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tUser *gqlmeetup.User\n\t}\n\tlockSessionServiceMockLogin.RLock()\n\tcalls = mock.calls.Login\n\tlockSessionServiceMockLogin.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "f3e6364a87fc1e6bc8cf22a388fe92ff", "score": "0.60454124", "text": "func (mock *RCHTTPClienterMock) HeadCalls() []struct {\n\tCtx context.Context\n\tURL string\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tURL string\n\t}\n\tlockRCHTTPClienterMockHead.RLock()\n\tcalls = mock.calls.Head\n\tlockRCHTTPClienterMockHead.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "1180eb410540eddd5ebf7897ca3b79a7", "score": "0.6043791", "text": "func (mock *IPubSubPublishResultMock) GetCalls() []struct {\n\tCtx context.Context\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t}\n\tmock.lockGet.RLock()\n\tcalls = mock.calls.Get\n\tmock.lockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "022150a6207b2810cc475d5006721f38", "score": "0.60434294", "text": "func (mock *PrompterMock) RunCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tlockPrompterMockRun.RLock()\n\tcalls = mock.calls.Run\n\tlockPrompterMockRun.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "65283c070fa61a9211474b1359132067", "score": "0.6040275", "text": "func (mock *PipelineSettingInterfaceMock) AddHandlerCalls() []struct {\n\tCtx context.Context\n\tName string\n\tSync v3.PipelineSettingHandlerFunc\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tName string\n\t\tSync v3.PipelineSettingHandlerFunc\n\t}\n\tlockPipelineSettingInterfaceMockAddHandler.RLock()\n\tcalls = mock.calls.AddHandler\n\tlockPipelineSettingInterfaceMockAddHandler.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "fcb801e077866716d367e69e0c62c85a", "score": "0.6039829", "text": "func (mock *DeploymentControllerMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n\tOptions v1b.GetOptions\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t\tOptions v1b.GetOptions\n\t}\n\tlockDeploymentControllerMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockDeploymentControllerMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "909bd38d2f77dffad14250871beedf39", "score": "0.6038049", "text": "func (mock *NodePoolInterfaceMock) GetCalls() []struct {\n\tName string\n\tOpts metav1.GetOptions\n} {\n\tvar calls []struct {\n\t\tName string\n\t\tOpts metav1.GetOptions\n\t}\n\tlockNodePoolInterfaceMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockNodePoolInterfaceMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "52833629d9103a408b1794706fd7e5a0", "score": "0.6036887", "text": "func (mock *PreferenceListerMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t}\n\tlockPreferenceListerMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockPreferenceListerMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "7fb0a1a44a2895acd521cfc60ef1d0f0", "score": "0.60356736", "text": "func (mock *ClusterRoleBindingInterfaceMock) GetCalls() []struct {\n\tName string\n\tOpts metav1.GetOptions\n} {\n\tvar calls []struct {\n\t\tName string\n\t\tOpts metav1.GetOptions\n\t}\n\tlockClusterRoleBindingInterfaceMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockClusterRoleBindingInterfaceMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "1ec0be89d12997a584d7df71861d76f2", "score": "0.6006631", "text": "func (mock *DefaultApiMock) GetRegistryCalls() []struct {\n\tCtx _context.Context\n\tRegistryId int32\n} {\n\tvar calls []struct {\n\t\tCtx _context.Context\n\t\tRegistryId int32\n\t}\n\tmock.lockGetRegistry.RLock()\n\tcalls = mock.calls.GetRegistry\n\tmock.lockGetRegistry.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "659a7e30d008c8d0c992dd40ab1a1627", "score": "0.6005963", "text": "func (mock *ClusterRoleBindingControllerMock) ListerCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tlockClusterRoleBindingControllerMockLister.RLock()\n\tcalls = mock.calls.Lister\n\tlockClusterRoleBindingControllerMockLister.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "7c1516c1660328592cfc3d9ed6d6bdfd", "score": "0.6004981", "text": "func (mmGetById *mUserRepositoryMockGetById) Calls() []*UserRepositoryMockGetByIdParams {\n\tmmGetById.mutex.RLock()\n\n\targCopy := make([]*UserRepositoryMockGetByIdParams, len(mmGetById.callArgs))\n\tcopy(argCopy, mmGetById.callArgs)\n\n\tmmGetById.mutex.RUnlock()\n\n\treturn argCopy\n}", "title": "" }, { "docid": "7f6bc09ce66db961e92685ba0da4fb1a", "score": "0.60012", "text": "func (mock *AlertMock) RunApiHandlerCalls() []struct {\n\tRw http.ResponseWriter\n\tReq *http.Request\n} {\n\tvar calls []struct {\n\t\tRw http.ResponseWriter\n\t\tReq *http.Request\n\t}\n\tmock.lockRunApiHandler.RLock()\n\tcalls = mock.calls.RunApiHandler\n\tmock.lockRunApiHandler.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "be61613c74a3d43aa1bd5794d26da53d", "score": "0.5995128", "text": "func (mock *DeploymentCacheMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t}\n\tlockDeploymentCacheMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockDeploymentCacheMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "19edfd85edf2b69392251b3fe6dda2c1", "score": "0.5987784", "text": "func (mock *RioInfoControllerMock) GetCalls() []struct {\n\tName string\n\tOptions v1b.GetOptions\n} {\n\tvar calls []struct {\n\t\tName string\n\t\tOptions v1b.GetOptions\n\t}\n\tlockRioInfoControllerMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockRioInfoControllerMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "99ce711d97b238f110e0ef9989f0bd84", "score": "0.5985663", "text": "func (mock *DeviceMock) IsMigEnabledCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tmock.lockIsMigEnabled.RLock()\n\tcalls = mock.calls.IsMigEnabled\n\tmock.lockIsMigEnabled.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "f1d97f3d387b164055db6a25b3d8bc6a", "score": "0.5982655", "text": "func (mock *ClusterRoleBindingInterfaceMock) AddHandlerCalls() []struct {\n\tCtx context.Context\n\tName string\n\tSync v11.ClusterRoleBindingHandlerFunc\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tName string\n\t\tSync v11.ClusterRoleBindingHandlerFunc\n\t}\n\tlockClusterRoleBindingInterfaceMockAddHandler.RLock()\n\tcalls = mock.calls.AddHandler\n\tlockClusterRoleBindingInterfaceMockAddHandler.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "fe192a50f413f2fa6d76db32204ed37e", "score": "0.5980677", "text": "func (mock *PipelineSettingControllerMock) SyncCalls() []struct {\n\tCtx context.Context\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t}\n\tlockPipelineSettingControllerMockSync.RLock()\n\tcalls = mock.calls.Sync\n\tlockPipelineSettingControllerMockSync.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "67b9e0633822b436793f119f75fef9b5", "score": "0.5969182", "text": "func (mock *PermissionsCheckerMock) HealthCheckCalls() []struct {\n\tCtx context.Context\n\tState *health.CheckState\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tState *health.CheckState\n\t}\n\tmock.lockHealthCheck.RLock()\n\tcalls = mock.calls.HealthCheck\n\tmock.lockHealthCheck.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "6da3cfba621c508756513e0e57ae6a09", "score": "0.59510624", "text": "func (mock *IDatasetClientMock) GetVersionCalls() []struct {\n\tCtx context.Context\n\tUserAuthToken string\n\tServiceAuthToken string\n\tDownloadServiceAuthToken string\n\tCollectionID string\n\tDatasetID string\n\tEdition string\n\tVersion string\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tUserAuthToken string\n\t\tServiceAuthToken string\n\t\tDownloadServiceAuthToken string\n\t\tCollectionID string\n\t\tDatasetID string\n\t\tEdition string\n\t\tVersion string\n\t}\n\tmock.lockGetVersion.RLock()\n\tcalls = mock.calls.GetVersion\n\tmock.lockGetVersion.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "0502b6ecf6e901481f67e7dec6d61417", "score": "0.5938069", "text": "func (mock *elasticacheClientMock) DescribeUsersCalls() []struct {\n\tDescribeUsersInput *elasticache.DescribeUsersInput\n} {\n\tvar calls []struct {\n\t\tDescribeUsersInput *elasticache.DescribeUsersInput\n\t}\n\tmock.lockDescribeUsers.RLock()\n\tcalls = mock.calls.DescribeUsers\n\tmock.lockDescribeUsers.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "bf3c28eace0fa82edfe2daa9ee4cf8a3", "score": "0.59351826", "text": "func (mock *PipelineSettingInterfaceMock) GetCalls() []struct {\n\tName string\n\tOpts v1.GetOptions\n} {\n\tvar calls []struct {\n\t\tName string\n\t\tOpts v1.GetOptions\n\t}\n\tlockPipelineSettingInterfaceMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockPipelineSettingInterfaceMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "81e2ee95e8be5fceac591a6f254eabb2", "score": "0.59250915", "text": "func (mock *ClusterCatalogControllerMock) ListerCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tlockClusterCatalogControllerMockLister.RLock()\n\tcalls = mock.calls.Lister\n\tlockClusterCatalogControllerMockLister.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "747c9719027394765970b26e98e4de21", "score": "0.5921918", "text": "func (mmGet *mUpstreamClientMockGet) Calls() []*UpstreamClientMockGetParams {\n\tmmGet.mutex.RLock()\n\n\targCopy := make([]*UpstreamClientMockGetParams, len(mmGet.callArgs))\n\tcopy(argCopy, mmGet.callArgs)\n\n\tmmGet.mutex.RUnlock()\n\n\treturn argCopy\n}", "title": "" }, { "docid": "188418cf5b759e6d7de92af6d920bccd", "score": "0.5920573", "text": "func (mock *ClusterMonitorGraphControllerMock) ListerCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tlockClusterMonitorGraphControllerMockLister.RLock()\n\tcalls = mock.calls.Lister\n\tlockClusterMonitorGraphControllerMockLister.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "c86753c70a69910a1c8cea3dd431df60", "score": "0.59187895", "text": "func (mock *ProjectMonitorGraphListerMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t}\n\tlockProjectMonitorGraphListerMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockProjectMonitorGraphListerMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "751ba4bb03d74187e8a9655592ef2588", "score": "0.5914724", "text": "func (mock *NodePoolInterfaceMock) AddHandlerCalls() []struct {\n\tCtx context.Context\n\tName string\n\tSync v31.NodePoolHandlerFunc\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tName string\n\t\tSync v31.NodePoolHandlerFunc\n\t}\n\tlockNodePoolInterfaceMockAddHandler.RLock()\n\tcalls = mock.calls.AddHandler\n\tlockNodePoolInterfaceMockAddHandler.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "22883947c112b8f89f5a7311a71212cf", "score": "0.5910858", "text": "func (mock *PermissionsCheckerMock) CloseCalls() []struct {\n\tCtx context.Context\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t}\n\tmock.lockClose.RLock()\n\tcalls = mock.calls.Close\n\tmock.lockClose.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "a857847fd16fcb737603d40406ca1f18", "score": "0.59060264", "text": "func (mock *ClusterSettingControllerMock) ListerCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tlockClusterSettingControllerMockLister.RLock()\n\tcalls = mock.calls.Lister\n\tlockClusterSettingControllerMockLister.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "0a54a05b2cacbbcf008bf8a0c30d69c4", "score": "0.59033215", "text": "func (mock *ProjectMonitorGraphInterfaceMock) AddHandlerCalls() []struct {\n\tCtx context.Context\n\tName string\n\tSync v31.ProjectMonitorGraphHandlerFunc\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tName string\n\t\tSync v31.ProjectMonitorGraphHandlerFunc\n\t}\n\tlockProjectMonitorGraphInterfaceMockAddHandler.RLock()\n\tcalls = mock.calls.AddHandler\n\tlockProjectMonitorGraphInterfaceMockAddHandler.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "98f87275683a0966304d77d01d5ebd43", "score": "0.59003234", "text": "func (mock *ProjectMonitorGraphInterfaceMock) GetCalls() []struct {\n\tName string\n\tOpts metav1.GetOptions\n} {\n\tvar calls []struct {\n\t\tName string\n\t\tOpts metav1.GetOptions\n\t}\n\tlockProjectMonitorGraphInterfaceMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockProjectMonitorGraphInterfaceMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "055b1780bda0c259221ef2c85f2da791", "score": "0.589995", "text": "func (mock *StoreMock) LoadCalls() []struct {\n\tID string\n} {\n\tvar calls []struct {\n\t\tID string\n\t}\n\tmock.lockLoad.RLock()\n\tcalls = mock.calls.Load\n\tmock.lockLoad.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "1ca1a587a3893bd61a0351da803b39d9", "score": "0.5899724", "text": "func (mock *ClusterCatalogListerMock) GetCalls() []struct {\n\tNamespace string\n\tName string\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tName string\n\t}\n\tlockClusterCatalogListerMockGet.RLock()\n\tcalls = mock.calls.Get\n\tlockClusterCatalogListerMockGet.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "f908d450598fe2859d4ef6f68dcdabcf", "score": "0.5898735", "text": "func (mmBegin *mAccessorMockBegin) Calls() []*AccessorMockBeginParams {\n\tmmBegin.mutex.RLock()\n\n\targCopy := make([]*AccessorMockBeginParams, len(mmBegin.callArgs))\n\tcopy(argCopy, mmBegin.callArgs)\n\n\tmmBegin.mutex.RUnlock()\n\n\treturn argCopy\n}", "title": "" }, { "docid": "f039f335ecee625bed898e0bb5b57cd0", "score": "0.58924526", "text": "func (mock *ThreeScaleInterfaceMock) AddUserCalls() []struct {\n\tUsername string\n\tEmail string\n\tPassword string\n\tAccessToken string\n} {\n\tvar calls []struct {\n\t\tUsername string\n\t\tEmail string\n\t\tPassword string\n\t\tAccessToken string\n\t}\n\tmock.lockAddUser.RLock()\n\tcalls = mock.calls.AddUser\n\tmock.lockAddUser.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "1ca0d12b2efbcd6248560064bc0f6b96", "score": "0.58906794", "text": "func (mmWaitOpened *mAccessorMockWaitOpened) Calls() []*AccessorMockWaitOpenedParams {\n\tmmWaitOpened.mutex.RLock()\n\n\targCopy := make([]*AccessorMockWaitOpenedParams, len(mmWaitOpened.callArgs))\n\tcopy(argCopy, mmWaitOpened.callArgs)\n\n\tmmWaitOpened.mutex.RUnlock()\n\n\treturn argCopy\n}", "title": "" }, { "docid": "dcb5763405727450ff448122cbf81eec", "score": "0.588907", "text": "func (mock *DpElasticSearcherMock) CountCalls() []struct {\n\tCtx context.Context\n\tCount client.Count\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tCount client.Count\n\t}\n\tmock.lockCount.RLock()\n\tcalls = mock.calls.Count\n\tmock.lockCount.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "6016dc9b2bd63eb49583c54a44909b86", "score": "0.58876175", "text": "func (mock *ClusterCatalogInterfaceMock) AddHandlerCalls() []struct {\n\tCtx context.Context\n\tName string\n\tSync v31.ClusterCatalogHandlerFunc\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tName string\n\t\tSync v31.ClusterCatalogHandlerFunc\n\t}\n\tlockClusterCatalogInterfaceMockAddHandler.RLock()\n\tcalls = mock.calls.AddHandler\n\tlockClusterCatalogInterfaceMockAddHandler.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "e90aad56ba8fe31198dcc9716dd52273", "score": "0.58830184", "text": "func (mock *PreferenceInterfaceMock) AddHandlerCalls() []struct {\n\tCtx context.Context\n\tName string\n\tSync v31.PreferenceHandlerFunc\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tName string\n\t\tSync v31.PreferenceHandlerFunc\n\t}\n\tlockPreferenceInterfaceMockAddHandler.RLock()\n\tcalls = mock.calls.AddHandler\n\tlockPreferenceInterfaceMockAddHandler.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "365da91b61666e4d4e255304b44f05c5", "score": "0.5857642", "text": "func (mock *IClientMock) CheckerCalls() []struct {\n\tCtx context.Context\n\tState *healthcheck.CheckState\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tState *healthcheck.CheckState\n\t}\n\tlockIClientMockChecker.RLock()\n\tcalls = mock.calls.Checker\n\tlockIClientMockChecker.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "6e0fe6b2257df90545d501fc2a3418c6", "score": "0.5857013", "text": "func (mock *GitWebHookReceiverClientMock) ListCalls() []struct {\n\tNamespace string\n\tOpts v1b.ListOptions\n} {\n\tvar calls []struct {\n\t\tNamespace string\n\t\tOpts v1b.ListOptions\n\t}\n\tlockGitWebHookReceiverClientMockList.RLock()\n\tcalls = mock.calls.List\n\tlockGitWebHookReceiverClientMockList.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "45c85c469fcd8499ef909b6c48ea4df0", "score": "0.58513564", "text": "func (mock *DefaultApiMock) GetRegistriesCalls() []struct {\n\tCtx _context.Context\n} {\n\tvar calls []struct {\n\t\tCtx _context.Context\n\t}\n\tmock.lockGetRegistries.RLock()\n\tcalls = mock.calls.GetRegistries\n\tmock.lockGetRegistries.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "8cbf06e8642347f9a3fba46d0110bb9d", "score": "0.58489525", "text": "func (mock *FooControllerMock) OnRemoveCalls() []struct {\n\tCtx context.Context\n\tName string\n\tSync v1alpha1.FooHandler\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tName string\n\t\tSync v1alpha1.FooHandler\n\t}\n\tlockFooControllerMockOnRemove.RLock()\n\tcalls = mock.calls.OnRemove\n\tlockFooControllerMockOnRemove.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "699eb93411de980826972730bd9d7ccd", "score": "0.584666", "text": "func (m *RequestMock) CheckMocksCalled() {\n\tm.Finish()\n}", "title": "" }, { "docid": "40f41ecbf138ab14fc53af5117b0ca09", "score": "0.584465", "text": "func (mock *ClusterSettingInterfaceMock) AddHandlerCalls() []struct {\n\tCtx context.Context\n\tName string\n\tSync v3.ClusterSettingHandlerFunc\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tName string\n\t\tSync v3.ClusterSettingHandlerFunc\n\t}\n\tlockClusterSettingInterfaceMockAddHandler.RLock()\n\tcalls = mock.calls.AddHandler\n\tlockClusterSettingInterfaceMockAddHandler.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "d00c702e93532256da0f3a93dd1c35f6", "score": "0.5843453", "text": "func (mock *IProducerMock) InitialiseCalls() []struct {\n\tCtx context.Context\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t}\n\tmock.lockInitialise.RLock()\n\tcalls = mock.calls.Initialise\n\tmock.lockInitialise.RUnlock()\n\treturn calls\n}", "title": "" } ]
053e2b75f2d995d26703e19b18257b08
testTaprootSignOutputRawKeySpendBip86 tests that a tapscript address can also be spent using the key spend path through the SignOutputRaw RPC using a BIP0086 key spend only commitment.
[ { "docid": "a9281e2f830b056797bbd69ea90ad7bb", "score": "0.8611033", "text": "func testTaprootSignOutputRawKeySpendBip86(ctxt context.Context,\n\tt *harnessTest, alice *lntest.HarnessNode, net *lntest.NetworkHarness) {\n\n\t// For the next step, we need a public key. Let's use a special family\n\t// for this.\n\tkeyDesc, err := alice.WalletKitClient.DeriveNextKey(\n\t\tctxt, &walletrpc.KeyReq{KeyFamily: testTaprootKeyFamily},\n\t)\n\trequire.NoError(t.t, err)\n\n\tinternalKey, err := btcec.ParsePubKey(keyDesc.RawKeyBytes)\n\trequire.NoError(t.t, err)\n\n\t// We want to make sure we can still use a tweaked key, even if it ends\n\t// up being essentially double tweaked because of the taproot root hash.\n\tdummyKeyTweak := sha256.Sum256([]byte(\"this is a key tweak\"))\n\tinternalKey = input.TweakPubKeyWithTweak(internalKey, dummyKeyTweak[:])\n\n\t// Our taproot key is a BIP0086 key spend only construction that just\n\t// commits to the internal key and no root hash.\n\ttaprootKey := txscript.ComputeTaprootKeyNoScript(internalKey)\n\n\t// Send some coins to the generated tapscript address.\n\tp2trOutpoint, p2trPkScript := sendToTaprootOutput(\n\t\tctxt, t, net, alice, taprootKey, testAmount,\n\t)\n\n\t// Spend the output again, this time back to a p2wkh address.\n\tp2wkhAddr, p2wkhPkScript := newAddrWithScript(\n\t\tctxt, t.t, alice, lnrpc.AddressType_WITNESS_PUBKEY_HASH,\n\t)\n\n\t// Create fee estimation for a p2tr input and p2wkh output.\n\tfeeRate := chainfee.SatPerKWeight(12500)\n\testimator := input.TxWeightEstimator{}\n\testimator.AddTaprootKeySpendInput(txscript.SigHashDefault)\n\testimator.AddP2WKHOutput()\n\testimatedWeight := int64(estimator.Weight())\n\trequiredFee := feeRate.FeeForWeight(estimatedWeight)\n\n\ttx := wire.NewMsgTx(2)\n\ttx.TxIn = []*wire.TxIn{{\n\t\tPreviousOutPoint: p2trOutpoint,\n\t}}\n\tvalue := int64(testAmount - requiredFee)\n\ttx.TxOut = []*wire.TxOut{{\n\t\tPkScript: p2wkhPkScript,\n\t\tValue: value,\n\t}}\n\n\tvar buf bytes.Buffer\n\trequire.NoError(t.t, tx.Serialize(&buf))\n\n\tutxoInfo := []*signrpc.TxOut{{\n\t\tPkScript: p2trPkScript,\n\t\tValue: testAmount,\n\t}}\n\tsignResp, err := alice.SignerClient.SignOutputRaw(\n\t\tctxt, &signrpc.SignReq{\n\t\t\tRawTxBytes: buf.Bytes(),\n\t\t\tSignDescs: []*signrpc.SignDescriptor{{\n\t\t\t\tOutput: utxoInfo[0],\n\t\t\t\tInputIndex: 0,\n\t\t\t\tKeyDesc: keyDesc,\n\t\t\t\tSingleTweak: dummyKeyTweak[:],\n\t\t\t\tSighash: uint32(txscript.SigHashDefault),\n\t\t\t\tSignMethod: signMethodBip86,\n\t\t\t}},\n\t\t\tPrevOutputs: utxoInfo,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\ttx.TxIn[0].Witness = wire.TxWitness{\n\t\tsignResp.RawSigs[0],\n\t}\n\n\t// Serialize, weigh and publish the TX now, then make sure the\n\t// coins are sent and confirmed to the final sweep destination address.\n\tpublishTxAndConfirmSweep(\n\t\tctxt, t, net, alice, tx, estimatedWeight,\n\t\t&chainrpc.SpendRequest{\n\t\t\tOutpoint: &chainrpc.Outpoint{\n\t\t\t\tHash: p2trOutpoint.Hash[:],\n\t\t\t\tIndex: p2trOutpoint.Index,\n\t\t\t},\n\t\t\tScript: p2trPkScript,\n\t\t},\n\t\tp2wkhAddr.String(),\n\t)\n}", "title": "" } ]
[ { "docid": "4a2bbe22ed06c3b6fb3f7cce5daf12d9", "score": "0.7621507", "text": "func testTaprootComputeInputScriptKeySpendBip86(ctxt context.Context,\n\tt *harnessTest, alice *lntest.HarnessNode, net *lntest.NetworkHarness) {\n\n\t// We'll start the test by sending Alice some coins, which she'll use to\n\t// send to herself on a p2tr output.\n\tnet.SendCoins(t.t, btcutil.SatoshiPerBitcoin, alice)\n\n\t// Let's create a p2tr address now.\n\tp2trAddr, p2trPkScript := newAddrWithScript(\n\t\tctxt, t.t, alice, lnrpc.AddressType_TAPROOT_PUBKEY,\n\t)\n\n\t// Send the coins from Alice's wallet to her own, but to the new p2tr\n\t// address.\n\t_, err := alice.SendCoins(ctxt, &lnrpc.SendCoinsRequest{\n\t\tAddr: p2trAddr.String(),\n\t\tAmount: testAmount,\n\t})\n\trequire.NoError(t.t, err)\n\n\ttxid, err := waitForTxInMempool(net.Miner.Client, defaultTimeout)\n\trequire.NoError(t.t, err)\n\n\t// Wait until bob has seen the tx and considers it as owned.\n\tp2trOutputIndex := getOutputIndex(t, net.Miner, txid, p2trAddr.String())\n\top := &lnrpc.OutPoint{\n\t\tTxidBytes: txid[:],\n\t\tOutputIndex: uint32(p2trOutputIndex),\n\t}\n\tassertWalletUnspent(t, alice, op)\n\n\tp2trOutpoint := wire.OutPoint{\n\t\tHash: *txid,\n\t\tIndex: uint32(p2trOutputIndex),\n\t}\n\n\t// Mine a block to clean up the mempool.\n\tmineBlocks(t, net, 1, 1)\n\n\t// We'll send the coins back to a p2wkh address.\n\tp2wkhAddr, p2wkhPkScript := newAddrWithScript(\n\t\tctxt, t.t, alice, lnrpc.AddressType_WITNESS_PUBKEY_HASH,\n\t)\n\n\t// Create fee estimation for a p2tr input and p2wkh output.\n\tfeeRate := chainfee.SatPerKWeight(12500)\n\testimator := input.TxWeightEstimator{}\n\testimator.AddTaprootKeySpendInput(txscript.SigHashDefault)\n\testimator.AddP2WKHOutput()\n\testimatedWeight := int64(estimator.Weight())\n\trequiredFee := feeRate.FeeForWeight(estimatedWeight)\n\n\ttx := wire.NewMsgTx(2)\n\ttx.TxIn = []*wire.TxIn{{\n\t\tPreviousOutPoint: p2trOutpoint,\n\t}}\n\tvalue := int64(testAmount - requiredFee)\n\ttx.TxOut = []*wire.TxOut{{\n\t\tPkScript: p2wkhPkScript,\n\t\tValue: value,\n\t}}\n\n\tvar buf bytes.Buffer\n\trequire.NoError(t.t, tx.Serialize(&buf))\n\n\tutxoInfo := []*signrpc.TxOut{{\n\t\tPkScript: p2trPkScript,\n\t\tValue: testAmount,\n\t}}\n\tsignResp, err := alice.SignerClient.ComputeInputScript(\n\t\tctxt, &signrpc.SignReq{\n\t\t\tRawTxBytes: buf.Bytes(),\n\t\t\tSignDescs: []*signrpc.SignDescriptor{{\n\t\t\t\tOutput: utxoInfo[0],\n\t\t\t\tInputIndex: 0,\n\t\t\t\tSighash: uint32(txscript.SigHashDefault),\n\t\t\t}},\n\t\t\tPrevOutputs: utxoInfo,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\ttx.TxIn[0].Witness = signResp.InputScripts[0].Witness\n\n\t// Serialize, weigh and publish the TX now, then make sure the\n\t// coins are sent and confirmed to the final sweep destination address.\n\tpublishTxAndConfirmSweep(\n\t\tctxt, t, net, alice, tx, estimatedWeight,\n\t\t&chainrpc.SpendRequest{\n\t\t\tOutpoint: &chainrpc.Outpoint{\n\t\t\t\tHash: p2trOutpoint.Hash[:],\n\t\t\t\tIndex: p2trOutpoint.Index,\n\t\t\t},\n\t\t\tScript: p2trPkScript,\n\t\t},\n\t\tp2wkhAddr.String(),\n\t)\n}", "title": "" }, { "docid": "78f63ccbdf31ddbb5aace8bd8480e061", "score": "0.7558601", "text": "func testTaprootSignOutputRawKeySpendRootHash(ctxt context.Context,\n\tt *harnessTest, alice *lntest.HarnessNode, net *lntest.NetworkHarness) {\n\n\t// For the next step, we need a public key. Let's use a special family\n\t// for this.\n\tkeyDesc, err := alice.WalletKitClient.DeriveNextKey(\n\t\tctxt, &walletrpc.KeyReq{KeyFamily: testTaprootKeyFamily},\n\t)\n\trequire.NoError(t.t, err)\n\n\tinternalKey, err := btcec.ParsePubKey(keyDesc.RawKeyBytes)\n\trequire.NoError(t.t, err)\n\n\t// We want to make sure we can still use a tweaked key, even if it ends\n\t// up being essentially double tweaked because of the taproot root hash.\n\tdummyKeyTweak := sha256.Sum256([]byte(\"this is a key tweak\"))\n\tinternalKey = input.TweakPubKeyWithTweak(internalKey, dummyKeyTweak[:])\n\n\t// Let's create a taproot script output now. This is a hash lock with a\n\t// simple preimage of \"foobar\".\n\tleaf1 := testScriptHashLock(t.t, []byte(\"foobar\"))\n\n\trootHash := leaf1.TapHash()\n\ttaprootKey := txscript.ComputeTaprootOutputKey(internalKey, rootHash[:])\n\n\t// Send some coins to the generated tapscript address.\n\tp2trOutpoint, p2trPkScript := sendToTaprootOutput(\n\t\tctxt, t, net, alice, taprootKey, testAmount,\n\t)\n\n\t// Spend the output again, this time back to a p2wkh address.\n\tp2wkhAddr, p2wkhPkScript := newAddrWithScript(\n\t\tctxt, t.t, alice, lnrpc.AddressType_WITNESS_PUBKEY_HASH,\n\t)\n\n\t// Create fee estimation for a p2tr input and p2wkh output.\n\tfeeRate := chainfee.SatPerKWeight(12500)\n\testimator := input.TxWeightEstimator{}\n\testimator.AddTaprootKeySpendInput(txscript.SigHashDefault)\n\testimator.AddP2WKHOutput()\n\testimatedWeight := int64(estimator.Weight())\n\trequiredFee := feeRate.FeeForWeight(estimatedWeight)\n\n\ttx := wire.NewMsgTx(2)\n\ttx.TxIn = []*wire.TxIn{{\n\t\tPreviousOutPoint: p2trOutpoint,\n\t}}\n\tvalue := int64(testAmount - requiredFee)\n\ttx.TxOut = []*wire.TxOut{{\n\t\tPkScript: p2wkhPkScript,\n\t\tValue: value,\n\t}}\n\n\tvar buf bytes.Buffer\n\trequire.NoError(t.t, tx.Serialize(&buf))\n\n\tutxoInfo := []*signrpc.TxOut{{\n\t\tPkScript: p2trPkScript,\n\t\tValue: testAmount,\n\t}}\n\tsignResp, err := alice.SignerClient.SignOutputRaw(\n\t\tctxt, &signrpc.SignReq{\n\t\t\tRawTxBytes: buf.Bytes(),\n\t\t\tSignDescs: []*signrpc.SignDescriptor{{\n\t\t\t\tOutput: utxoInfo[0],\n\t\t\t\tInputIndex: 0,\n\t\t\t\tKeyDesc: keyDesc,\n\t\t\t\tSingleTweak: dummyKeyTweak[:],\n\t\t\t\tSighash: uint32(txscript.SigHashDefault),\n\t\t\t\tTapTweak: rootHash[:],\n\t\t\t\tSignMethod: signMethodRootHash,\n\t\t\t}},\n\t\t\tPrevOutputs: utxoInfo,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\ttx.TxIn[0].Witness = wire.TxWitness{\n\t\tsignResp.RawSigs[0],\n\t}\n\n\t// Serialize, weigh and publish the TX now, then make sure the\n\t// coins are sent and confirmed to the final sweep destination address.\n\tpublishTxAndConfirmSweep(\n\t\tctxt, t, net, alice, tx, estimatedWeight,\n\t\t&chainrpc.SpendRequest{\n\t\t\tOutpoint: &chainrpc.Outpoint{\n\t\t\t\tHash: p2trOutpoint.Hash[:],\n\t\t\t\tIndex: p2trOutpoint.Index,\n\t\t\t},\n\t\t\tScript: p2trPkScript,\n\t\t},\n\t\tp2wkhAddr.String(),\n\t)\n}", "title": "" }, { "docid": "093150b01795fbbe397c77b09eaa4e7e", "score": "0.75379837", "text": "func testTaprootSignOutputRawScriptSpend(ctxt context.Context, t *harnessTest,\n\talice *lntest.HarnessNode, net *lntest.NetworkHarness) {\n\n\t// For the next step, we need a public key. Let's use a special family\n\t// for this.\n\tkeyDesc, err := alice.WalletKitClient.DeriveNextKey(\n\t\tctxt, &walletrpc.KeyReq{KeyFamily: testTaprootKeyFamily},\n\t)\n\trequire.NoError(t.t, err)\n\n\tleafSigningKey, err := btcec.ParsePubKey(keyDesc.RawKeyBytes)\n\trequire.NoError(t.t, err)\n\n\t// Let's create a taproot script output now. This is a hash lock with a\n\t// simple preimage of \"foobar\".\n\tleaf1 := testScriptHashLock(t.t, []byte(\"foobar\"))\n\n\t// Let's add a second script output as well to test the partial reveal.\n\tleaf2 := testScriptSchnorrSig(t.t, leafSigningKey)\n\n\tinclusionProof := leaf1.TapHash()\n\ttapscript := input.TapscriptPartialReveal(\n\t\tdummyInternalKey, leaf2, inclusionProof[:],\n\t)\n\ttaprootKey, err := tapscript.TaprootKey()\n\trequire.NoError(t.t, err)\n\n\t// Send some coins to the generated tapscript address.\n\tp2trOutpoint, p2trPkScript := sendToTaprootOutput(\n\t\tctxt, t, net, alice, taprootKey, testAmount,\n\t)\n\n\t// Spend the output again, this time back to a p2wkh address.\n\tp2wkhAddr, p2wkhPkScript := newAddrWithScript(\n\t\tctxt, t.t, alice, lnrpc.AddressType_WITNESS_PUBKEY_HASH,\n\t)\n\n\t// Create fee estimation for a p2tr input and p2wkh output.\n\tfeeRate := chainfee.SatPerKWeight(12500)\n\testimator := input.TxWeightEstimator{}\n\testimator.AddTapscriptInput(\n\t\tinput.TaprootSignatureWitnessSize, tapscript,\n\t)\n\testimator.AddP2WKHOutput()\n\testimatedWeight := int64(estimator.Weight())\n\trequiredFee := feeRate.FeeForWeight(estimatedWeight)\n\n\ttx := wire.NewMsgTx(2)\n\ttx.TxIn = []*wire.TxIn{{\n\t\tPreviousOutPoint: p2trOutpoint,\n\t}}\n\tvalue := int64(testAmount - requiredFee)\n\ttx.TxOut = []*wire.TxOut{{\n\t\tPkScript: p2wkhPkScript,\n\t\tValue: value,\n\t}}\n\n\tvar buf bytes.Buffer\n\trequire.NoError(t.t, tx.Serialize(&buf))\n\n\tutxoInfo := []*signrpc.TxOut{{\n\t\tPkScript: p2trPkScript,\n\t\tValue: testAmount,\n\t}}\n\n\t// Before we actually sign, we want to make sure that we get an error\n\t// when we try to sign for a Taproot output without specifying all UTXO\n\t// information.\n\t_, err = alice.SignerClient.SignOutputRaw(\n\t\tctxt, &signrpc.SignReq{\n\t\t\tRawTxBytes: buf.Bytes(),\n\t\t\tSignDescs: []*signrpc.SignDescriptor{{\n\t\t\t\tOutput: utxoInfo[0],\n\t\t\t\tInputIndex: 0,\n\t\t\t\tKeyDesc: keyDesc,\n\t\t\t\tSighash: uint32(txscript.SigHashDefault),\n\t\t\t\tWitnessScript: leaf2.Script,\n\t\t\t\tSignMethod: signMethodTapscript,\n\t\t\t}},\n\t\t},\n\t)\n\trequire.Error(t.t, err)\n\trequire.Contains(\n\t\tt.t, err.Error(), \"error signing taproot output, transaction \"+\n\t\t\t\"input 0 is missing its previous outpoint information\",\n\t)\n\n\t// We also want to make sure we get an error when we don't specify the\n\t// correct signing method.\n\t_, err = alice.SignerClient.SignOutputRaw(\n\t\tctxt, &signrpc.SignReq{\n\t\t\tRawTxBytes: buf.Bytes(),\n\t\t\tSignDescs: []*signrpc.SignDescriptor{{\n\t\t\t\tOutput: utxoInfo[0],\n\t\t\t\tInputIndex: 0,\n\t\t\t\tKeyDesc: keyDesc,\n\t\t\t\tSighash: uint32(txscript.SigHashDefault),\n\t\t\t\tWitnessScript: leaf2.Script,\n\t\t\t}},\n\t\t\tPrevOutputs: utxoInfo,\n\t\t},\n\t)\n\trequire.Error(t.t, err)\n\trequire.Contains(\n\t\tt.t, err.Error(), \"selected sign method witness_v0 is not \"+\n\t\t\t\"compatible with given pk script 5120\",\n\t)\n\n\t// Do the actual signing now.\n\tsignResp, err := alice.SignerClient.SignOutputRaw(\n\t\tctxt, &signrpc.SignReq{\n\t\t\tRawTxBytes: buf.Bytes(),\n\t\t\tSignDescs: []*signrpc.SignDescriptor{{\n\t\t\t\tOutput: utxoInfo[0],\n\t\t\t\tInputIndex: 0,\n\t\t\t\tKeyDesc: keyDesc,\n\t\t\t\tSighash: uint32(txscript.SigHashDefault),\n\t\t\t\tWitnessScript: leaf2.Script,\n\t\t\t\tSignMethod: signMethodTapscript,\n\t\t\t}},\n\t\t\tPrevOutputs: utxoInfo,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\t// We can now assemble the witness stack.\n\tcontrolBlockBytes, err := tapscript.ControlBlock.ToBytes()\n\trequire.NoError(t.t, err)\n\n\ttx.TxIn[0].Witness = wire.TxWitness{\n\t\tsignResp.RawSigs[0],\n\t\tleaf2.Script,\n\t\tcontrolBlockBytes,\n\t}\n\n\t// Serialize, weigh and publish the TX now, then make sure the\n\t// coins are sent and confirmed to the final sweep destination address.\n\tpublishTxAndConfirmSweep(\n\t\tctxt, t, net, alice, tx, estimatedWeight,\n\t\t&chainrpc.SpendRequest{\n\t\t\tOutpoint: &chainrpc.Outpoint{\n\t\t\t\tHash: p2trOutpoint.Hash[:],\n\t\t\t\tIndex: p2trOutpoint.Index,\n\t\t\t},\n\t\t\tScript: p2trPkScript,\n\t\t},\n\t\tp2wkhAddr.String(),\n\t)\n}", "title": "" }, { "docid": "4cef1cab41b721026e259b1c60661145", "score": "0.7465855", "text": "func testTaprootSendCoinsKeySpendBip86(ctxt context.Context,\n\tt *harnessTest, alice *lntest.HarnessNode, net *lntest.NetworkHarness) {\n\n\t// We'll start the test by sending Alice some coins, which she'll use to\n\t// send to herself on a p2tr output.\n\tnet.SendCoins(t.t, btcutil.SatoshiPerBitcoin, alice)\n\n\t// Let's create a p2tr address now.\n\tp2trResp, err := alice.NewAddress(ctxt, &lnrpc.NewAddressRequest{\n\t\tType: lnrpc.AddressType_TAPROOT_PUBKEY,\n\t})\n\trequire.NoError(t.t, err)\n\n\t// Assert this is a segwit v1 address that starts with bcrt1p.\n\trequire.Contains(\n\t\tt.t, p2trResp.Address, net.Miner.ActiveNet.Bech32HRPSegwit+\"1p\",\n\t)\n\n\t// Send the coins from Alice's wallet to her own, but to the new p2tr\n\t// address.\n\t_, err = alice.SendCoins(ctxt, &lnrpc.SendCoinsRequest{\n\t\tAddr: p2trResp.Address,\n\t\tAmount: 0.5 * btcutil.SatoshiPerBitcoin,\n\t})\n\trequire.NoError(t.t, err)\n\n\ttxid, err := waitForTxInMempool(net.Miner.Client, defaultTimeout)\n\trequire.NoError(t.t, err)\n\n\t// Wait until bob has seen the tx and considers it as owned.\n\tp2trOutputIndex := getOutputIndex(t, net.Miner, txid, p2trResp.Address)\n\top := &lnrpc.OutPoint{\n\t\tTxidBytes: txid[:],\n\t\tOutputIndex: uint32(p2trOutputIndex),\n\t}\n\tassertWalletUnspent(t, alice, op)\n\n\t// Mine a block to clean up the mempool.\n\tmineBlocks(t, net, 1, 1)\n\n\t// Let's sweep the whole wallet to a new p2tr address, making sure we\n\t// can sign transactions with v0 and v1 inputs.\n\tp2trResp, err = alice.NewAddress(ctxt, &lnrpc.NewAddressRequest{\n\t\tType: lnrpc.AddressType_TAPROOT_PUBKEY,\n\t})\n\trequire.NoError(t.t, err)\n\n\t_, err = alice.SendCoins(ctxt, &lnrpc.SendCoinsRequest{\n\t\tAddr: p2trResp.Address,\n\t\tSendAll: true,\n\t})\n\trequire.NoError(t.t, err)\n\n\t// Make sure the coins sent to the address are confirmed correctly,\n\t// including the confirmation notification.\n\tconfirmAddress(ctxt, t, net, alice, p2trResp.Address)\n}", "title": "" }, { "docid": "421fcdeab92e4737e4ff7039f3138d89", "score": "0.74084264", "text": "func testTaprootMuSig2KeySpendBip86(ctxt context.Context, t *harnessTest,\n\talice *lntest.HarnessNode, net *lntest.NetworkHarness) {\n\n\t// We're not going to commit to a script. So our taproot tweak will be\n\t// empty and just specify the necessary flag.\n\ttaprootTweak := &signrpc.TaprootTweakDesc{\n\t\tKeySpendOnly: true,\n\t}\n\n\tkeyDesc1, keyDesc2, keyDesc3, allPubKeys := deriveSigningKeys(\n\t\tctxt, t, alice,\n\t)\n\t_, taprootKey, sessResp1, sessResp2, sessResp3 := createMuSigSessions(\n\t\tctxt, t, alice, taprootTweak, keyDesc1, keyDesc2, keyDesc3,\n\t\tallPubKeys,\n\t)\n\n\t// Send some coins to the generated tapscript address.\n\tp2trOutpoint, p2trPkScript := sendToTaprootOutput(\n\t\tctxt, t, net, alice, taprootKey, testAmount,\n\t)\n\n\t// Spend the output again, this time back to a p2wkh address.\n\tp2wkhAddr, p2wkhPkScript := newAddrWithScript(\n\t\tctxt, t.t, alice, lnrpc.AddressType_WITNESS_PUBKEY_HASH,\n\t)\n\n\t// Create fee estimation for a p2tr input and p2wkh output.\n\tfeeRate := chainfee.SatPerKWeight(12500)\n\testimator := input.TxWeightEstimator{}\n\testimator.AddTaprootKeySpendInput(txscript.SigHashDefault)\n\testimator.AddP2WKHOutput()\n\testimatedWeight := int64(estimator.Weight())\n\trequiredFee := feeRate.FeeForWeight(estimatedWeight)\n\n\ttx := wire.NewMsgTx(2)\n\ttx.TxIn = []*wire.TxIn{{\n\t\tPreviousOutPoint: p2trOutpoint,\n\t}}\n\tvalue := int64(testAmount - requiredFee)\n\ttx.TxOut = []*wire.TxOut{{\n\t\tPkScript: p2wkhPkScript,\n\t\tValue: value,\n\t}}\n\n\tvar buf bytes.Buffer\n\trequire.NoError(t.t, tx.Serialize(&buf))\n\n\tutxoInfo := []*signrpc.TxOut{{\n\t\tPkScript: p2trPkScript,\n\t\tValue: testAmount,\n\t}}\n\n\t// We now need to create the raw sighash of the transaction, as that\n\t// will be the message we're signing collaboratively.\n\tprevOutputFetcher := txscript.NewCannedPrevOutputFetcher(\n\t\tutxoInfo[0].PkScript, utxoInfo[0].Value,\n\t)\n\tsighashes := txscript.NewTxSigHashes(tx, prevOutputFetcher)\n\n\tsigHash, err := txscript.CalcTaprootSignatureHash(\n\t\tsighashes, txscript.SigHashDefault, tx, 0, prevOutputFetcher,\n\t)\n\trequire.NoError(t.t, err)\n\n\t// Now that we have the transaction prepared, we need to start with the\n\t// signing. We simulate all three parties here, so we need to do\n\t// everything three times. But because we're going to use session 1 to\n\t// combine everything, we don't need its response, as it will store its\n\t// own signature.\n\t_, err = alice.SignerClient.MuSig2Sign(\n\t\tctxt, &signrpc.MuSig2SignRequest{\n\t\t\tSessionId: sessResp1.SessionId,\n\t\t\tMessageDigest: sigHash,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\tsignResp2, err := alice.SignerClient.MuSig2Sign(\n\t\tctxt, &signrpc.MuSig2SignRequest{\n\t\t\tSessionId: sessResp2.SessionId,\n\t\t\tMessageDigest: sigHash,\n\t\t\tCleanup: true,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\tsignResp3, err := alice.SignerClient.MuSig2Sign(\n\t\tctxt, &signrpc.MuSig2SignRequest{\n\t\t\tSessionId: sessResp3.SessionId,\n\t\t\tMessageDigest: sigHash,\n\t\t\tCleanup: true,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\t// Luckily only one of the signers needs to combine the signature, so\n\t// let's do that now.\n\tcombineReq1, err := alice.SignerClient.MuSig2CombineSig(\n\t\tctxt, &signrpc.MuSig2CombineSigRequest{\n\t\t\tSessionId: sessResp1.SessionId,\n\t\t\tOtherPartialSignatures: [][]byte{\n\t\t\t\tsignResp2.LocalPartialSignature,\n\t\t\t\tsignResp3.LocalPartialSignature,\n\t\t\t},\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\trequire.Equal(t.t, true, combineReq1.HaveAllSignatures)\n\trequire.NotEmpty(t.t, combineReq1.FinalSignature)\n\n\tsig, err := schnorr.ParseSignature(combineReq1.FinalSignature)\n\trequire.NoError(t.t, err)\n\trequire.True(t.t, sig.Verify(sigHash, taprootKey))\n\n\ttx.TxIn[0].Witness = wire.TxWitness{\n\t\tcombineReq1.FinalSignature,\n\t}\n\n\t// Serialize, weigh and publish the TX now, then make sure the\n\t// coins are sent and confirmed to the final sweep destination address.\n\tpublishTxAndConfirmSweep(\n\t\tctxt, t, net, alice, tx, estimatedWeight,\n\t\t&chainrpc.SpendRequest{\n\t\t\tOutpoint: &chainrpc.Outpoint{\n\t\t\t\tHash: p2trOutpoint.Hash[:],\n\t\t\t\tIndex: p2trOutpoint.Index,\n\t\t\t},\n\t\t\tScript: p2trPkScript,\n\t\t},\n\t\tp2wkhAddr.String(),\n\t)\n}", "title": "" }, { "docid": "9f56677001b66f26e9d706792f65e8ae", "score": "0.6465727", "text": "func testTaprootMuSig2CombinedLeafKeySpend(ctxt context.Context, t *harnessTest,\n\talice *lntest.HarnessNode, net *lntest.NetworkHarness) {\n\n\t// We're using the combined MuSig2 key in a script leaf. So we need to\n\t// derive the combined key first, before we can build the script.\n\tkeyDesc1, keyDesc2, keyDesc3, allPubKeys := deriveSigningKeys(\n\t\tctxt, t, alice,\n\t)\n\tcombineResp, err := alice.SignerClient.MuSig2CombineKeys(\n\t\tctxt, &signrpc.MuSig2CombineKeysRequest{\n\t\t\tAllSignerPubkeys: allPubKeys,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\tcombinedPubKey, err := schnorr.ParsePubKey(combineResp.CombinedKey)\n\trequire.NoError(t.t, err)\n\n\t// We're going to commit to a script and spend the output using the\n\t// script. This is just an OP_CHECKSIG with the combined MuSig2 public\n\t// key.\n\tleaf := testScriptSchnorrSig(t.t, combinedPubKey)\n\ttapscript := input.TapscriptPartialReveal(dummyInternalKey, leaf, nil)\n\ttaprootKey, err := tapscript.TaprootKey()\n\trequire.NoError(t.t, err)\n\n\t// Send some coins to the generated tapscript address.\n\tp2trOutpoint, p2trPkScript := sendToTaprootOutput(\n\t\tctxt, t, net, alice, taprootKey, testAmount,\n\t)\n\n\t// Spend the output again, this time back to a p2wkh address.\n\tp2wkhAddr, p2wkhPkScript := newAddrWithScript(\n\t\tctxt, t.t, alice, lnrpc.AddressType_WITNESS_PUBKEY_HASH,\n\t)\n\n\t// Create fee estimation for a p2tr input and p2wkh output.\n\tfeeRate := chainfee.SatPerKWeight(12500)\n\testimator := input.TxWeightEstimator{}\n\testimator.AddTapscriptInput(\n\t\tinput.TaprootSignatureWitnessSize, tapscript,\n\t)\n\testimator.AddP2WKHOutput()\n\testimatedWeight := int64(estimator.Weight())\n\trequiredFee := feeRate.FeeForWeight(estimatedWeight)\n\n\ttx := wire.NewMsgTx(2)\n\ttx.TxIn = []*wire.TxIn{{\n\t\tPreviousOutPoint: p2trOutpoint,\n\t}}\n\tvalue := int64(testAmount - requiredFee)\n\ttx.TxOut = []*wire.TxOut{{\n\t\tPkScript: p2wkhPkScript,\n\t\tValue: value,\n\t}}\n\n\tvar buf bytes.Buffer\n\trequire.NoError(t.t, tx.Serialize(&buf))\n\n\tutxoInfo := []*signrpc.TxOut{{\n\t\tPkScript: p2trPkScript,\n\t\tValue: testAmount,\n\t}}\n\n\t// Do the actual signing now.\n\t_, _, sessResp1, sessResp2, sessResp3 := createMuSigSessions(\n\t\tctxt, t, alice, nil, keyDesc1, keyDesc2, keyDesc3, allPubKeys,\n\t)\n\trequire.NoError(t.t, err)\n\n\t// We now need to create the raw sighash of the transaction, as that\n\t// will be the message we're signing collaboratively.\n\tprevOutputFetcher := txscript.NewCannedPrevOutputFetcher(\n\t\tutxoInfo[0].PkScript, utxoInfo[0].Value,\n\t)\n\tsighashes := txscript.NewTxSigHashes(tx, prevOutputFetcher)\n\n\tsigHash, err := txscript.CalcTapscriptSignaturehash(\n\t\tsighashes, txscript.SigHashDefault, tx, 0, prevOutputFetcher,\n\t\tleaf,\n\t)\n\trequire.NoError(t.t, err)\n\n\t// Now that we have the transaction prepared, we need to start with the\n\t// signing. We simulate all three parties here, so we need to do\n\t// everything three times. But because we're going to use session 1 to\n\t// combine everything, we don't need its response, as it will store its\n\t// own signature.\n\t_, err = alice.SignerClient.MuSig2Sign(\n\t\tctxt, &signrpc.MuSig2SignRequest{\n\t\t\tSessionId: sessResp1.SessionId,\n\t\t\tMessageDigest: sigHash,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\tsignResp2, err := alice.SignerClient.MuSig2Sign(\n\t\tctxt, &signrpc.MuSig2SignRequest{\n\t\t\tSessionId: sessResp2.SessionId,\n\t\t\tMessageDigest: sigHash,\n\t\t\tCleanup: true,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\t// Before we have all partial signatures, we shouldn't get a final\n\t// signature back.\n\tcombineSigResp, err := alice.SignerClient.MuSig2CombineSig(\n\t\tctxt, &signrpc.MuSig2CombineSigRequest{\n\t\t\tSessionId: sessResp1.SessionId,\n\t\t\tOtherPartialSignatures: [][]byte{\n\t\t\t\tsignResp2.LocalPartialSignature,\n\t\t\t},\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\trequire.False(t.t, combineSigResp.HaveAllSignatures)\n\trequire.Empty(t.t, combineSigResp.FinalSignature)\n\n\tsignResp3, err := alice.SignerClient.MuSig2Sign(\n\t\tctxt, &signrpc.MuSig2SignRequest{\n\t\t\tSessionId: sessResp3.SessionId,\n\t\t\tMessageDigest: sigHash,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\t// We manually clean up session 3, just to make sure that works as well.\n\t_, err = alice.SignerClient.MuSig2Cleanup(\n\t\tctxt, &signrpc.MuSig2CleanupRequest{\n\t\t\tSessionId: sessResp3.SessionId,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\t// A second call to that cleaned up session should now fail with a\n\t// specific error.\n\t_, err = alice.SignerClient.MuSig2Sign(\n\t\tctxt, &signrpc.MuSig2SignRequest{\n\t\t\tSessionId: sessResp3.SessionId,\n\t\t\tMessageDigest: sigHash,\n\t\t},\n\t)\n\trequire.Error(t.t, err)\n\trequire.Contains(t.t, err.Error(), \"not found\")\n\n\t// Luckily only one of the signers needs to combine the signature, so\n\t// let's do that now.\n\tcombineReq1, err := alice.SignerClient.MuSig2CombineSig(\n\t\tctxt, &signrpc.MuSig2CombineSigRequest{\n\t\t\tSessionId: sessResp1.SessionId,\n\t\t\tOtherPartialSignatures: [][]byte{\n\t\t\t\tsignResp3.LocalPartialSignature,\n\t\t\t},\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\trequire.Equal(t.t, true, combineReq1.HaveAllSignatures)\n\trequire.NotEmpty(t.t, combineReq1.FinalSignature)\n\n\tsig, err := schnorr.ParseSignature(combineReq1.FinalSignature)\n\trequire.NoError(t.t, err)\n\trequire.True(t.t, sig.Verify(sigHash, combinedPubKey))\n\n\t// We can now assemble the witness stack.\n\tcontrolBlockBytes, err := tapscript.ControlBlock.ToBytes()\n\trequire.NoError(t.t, err)\n\n\ttx.TxIn[0].Witness = wire.TxWitness{\n\t\tcombineReq1.FinalSignature,\n\t\tleaf.Script,\n\t\tcontrolBlockBytes,\n\t}\n\n\t// Serialize, weigh and publish the TX now, then make sure the\n\t// coins are sent and confirmed to the final sweep destination address.\n\tpublishTxAndConfirmSweep(\n\t\tctxt, t, net, alice, tx, estimatedWeight,\n\t\t&chainrpc.SpendRequest{\n\t\t\tOutpoint: &chainrpc.Outpoint{\n\t\t\t\tHash: p2trOutpoint.Hash[:],\n\t\t\t\tIndex: p2trOutpoint.Index,\n\t\t\t},\n\t\t\tScript: p2trPkScript,\n\t\t},\n\t\tp2wkhAddr.String(),\n\t)\n}", "title": "" }, { "docid": "3752d49965aea655e47107c624540540", "score": "0.6310718", "text": "func testTaprootMuSig2ScriptSpend(ctxt context.Context, t *harnessTest,\n\talice *lntest.HarnessNode, net *lntest.NetworkHarness) {\n\n\t// We're going to commit to a script and spend the output using the\n\t// script. This is a hash lock with a simple preimage of \"foobar\". We\n\t// need to know this upfront so, we can specify the taproot tweak with\n\t// the root hash when creating the Musig2 signing session.\n\tleaf1 := testScriptHashLock(t.t, []byte(\"foobar\"))\n\trootHash := leaf1.TapHash()\n\ttaprootTweak := &signrpc.TaprootTweakDesc{\n\t\tScriptRoot: rootHash[:],\n\t}\n\n\tkeyDesc1, keyDesc2, keyDesc3, allPubKeys := deriveSigningKeys(\n\t\tctxt, t, alice,\n\t)\n\tinternalKey, taprootKey, _, _, _ := createMuSigSessions(\n\t\tctxt, t, alice, taprootTweak, keyDesc1, keyDesc2, keyDesc3,\n\t\tallPubKeys,\n\t)\n\n\t// Because we know the internal key and the script we want to spend, we\n\t// can now create the tapscript struct that's used for assembling the\n\t// control block and fee estimation.\n\ttapscript := input.TapscriptFullTree(internalKey, leaf1)\n\n\t// Send some coins to the generated tapscript address.\n\tp2trOutpoint, p2trPkScript := sendToTaprootOutput(\n\t\tctxt, t, net, alice, taprootKey, testAmount,\n\t)\n\n\t// Spend the output again, this time back to a p2wkh address.\n\tp2wkhAddr, p2wkhPkScript := newAddrWithScript(\n\t\tctxt, t.t, alice, lnrpc.AddressType_WITNESS_PUBKEY_HASH,\n\t)\n\n\t// Create fee estimation for a p2tr input and p2wkh output.\n\tfeeRate := chainfee.SatPerKWeight(12500)\n\testimator := input.TxWeightEstimator{}\n\testimator.AddTapscriptInput(\n\t\tlen([]byte(\"foobar\"))+len(leaf1.Script)+1, tapscript,\n\t)\n\testimator.AddP2WKHOutput()\n\testimatedWeight := int64(estimator.Weight())\n\trequiredFee := feeRate.FeeForWeight(estimatedWeight)\n\n\ttx := wire.NewMsgTx(2)\n\ttx.TxIn = []*wire.TxIn{{\n\t\tPreviousOutPoint: p2trOutpoint,\n\t}}\n\tvalue := int64(testAmount - requiredFee)\n\ttx.TxOut = []*wire.TxOut{{\n\t\tPkScript: p2wkhPkScript,\n\t\tValue: value,\n\t}}\n\n\t// We can now assemble the witness stack.\n\tcontrolBlockBytes, err := tapscript.ControlBlock.ToBytes()\n\trequire.NoError(t.t, err)\n\n\ttx.TxIn[0].Witness = wire.TxWitness{\n\t\t[]byte(\"foobar\"),\n\t\tleaf1.Script,\n\t\tcontrolBlockBytes,\n\t}\n\n\t// Serialize, weigh and publish the TX now, then make sure the\n\t// coins are sent and confirmed to the final sweep destination address.\n\tpublishTxAndConfirmSweep(\n\t\tctxt, t, net, alice, tx, estimatedWeight,\n\t\t&chainrpc.SpendRequest{\n\t\t\tOutpoint: &chainrpc.Outpoint{\n\t\t\t\tHash: p2trOutpoint.Hash[:],\n\t\t\t\tIndex: p2trOutpoint.Index,\n\t\t\t},\n\t\t\tScript: p2trPkScript,\n\t\t},\n\t\tp2wkhAddr.String(),\n\t)\n}", "title": "" }, { "docid": "6bb6d16ffabcfb90b484d170c86def98", "score": "0.61978024", "text": "func testTaprootMuSig2KeySpendRootHash(ctxt context.Context, t *harnessTest,\n\talice *lntest.HarnessNode, net *lntest.NetworkHarness) {\n\n\t// We're going to commit to a script as well. This is a hash lock with a\n\t// simple preimage of \"foobar\". We need to know this upfront so, we can\n\t// specify the taproot tweak with the root hash when creating the Musig2\n\t// signing session.\n\tleaf1 := testScriptHashLock(t.t, []byte(\"foobar\"))\n\trootHash := leaf1.TapHash()\n\ttaprootTweak := &signrpc.TaprootTweakDesc{\n\t\tScriptRoot: rootHash[:],\n\t}\n\n\tkeyDesc1, keyDesc2, keyDesc3, allPubKeys := deriveSigningKeys(\n\t\tctxt, t, alice,\n\t)\n\t_, taprootKey, sessResp1, sessResp2, sessResp3 := createMuSigSessions(\n\t\tctxt, t, alice, taprootTweak, keyDesc1, keyDesc2, keyDesc3,\n\t\tallPubKeys,\n\t)\n\n\t// Send some coins to the generated tapscript address.\n\tp2trOutpoint, p2trPkScript := sendToTaprootOutput(\n\t\tctxt, t, net, alice, taprootKey, testAmount,\n\t)\n\n\t// Spend the output again, this time back to a p2wkh address.\n\tp2wkhAddr, p2wkhPkScript := newAddrWithScript(\n\t\tctxt, t.t, alice, lnrpc.AddressType_WITNESS_PUBKEY_HASH,\n\t)\n\n\t// Create fee estimation for a p2tr input and p2wkh output.\n\tfeeRate := chainfee.SatPerKWeight(12500)\n\testimator := input.TxWeightEstimator{}\n\testimator.AddTaprootKeySpendInput(txscript.SigHashDefault)\n\testimator.AddP2WKHOutput()\n\testimatedWeight := int64(estimator.Weight())\n\trequiredFee := feeRate.FeeForWeight(estimatedWeight)\n\n\ttx := wire.NewMsgTx(2)\n\ttx.TxIn = []*wire.TxIn{{\n\t\tPreviousOutPoint: p2trOutpoint,\n\t}}\n\tvalue := int64(testAmount - requiredFee)\n\ttx.TxOut = []*wire.TxOut{{\n\t\tPkScript: p2wkhPkScript,\n\t\tValue: value,\n\t}}\n\n\tvar buf bytes.Buffer\n\trequire.NoError(t.t, tx.Serialize(&buf))\n\n\tutxoInfo := []*signrpc.TxOut{{\n\t\tPkScript: p2trPkScript,\n\t\tValue: testAmount,\n\t}}\n\n\t// We now need to create the raw sighash of the transaction, as that\n\t// will be the message we're signing collaboratively.\n\tprevOutputFetcher := txscript.NewCannedPrevOutputFetcher(\n\t\tutxoInfo[0].PkScript, utxoInfo[0].Value,\n\t)\n\tsighashes := txscript.NewTxSigHashes(tx, prevOutputFetcher)\n\n\tsigHash, err := txscript.CalcTaprootSignatureHash(\n\t\tsighashes, txscript.SigHashDefault, tx, 0, prevOutputFetcher,\n\t)\n\trequire.NoError(t.t, err)\n\n\t// Now that we have the transaction prepared, we need to start with the\n\t// signing. We simulate all three parties here, so we need to do\n\t// everything three times. But because we're going to use session 1 to\n\t// combine everything, we don't need its response, as it will store its\n\t// own signature.\n\t_, err = alice.SignerClient.MuSig2Sign(\n\t\tctxt, &signrpc.MuSig2SignRequest{\n\t\t\tSessionId: sessResp1.SessionId,\n\t\t\tMessageDigest: sigHash,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\tsignResp2, err := alice.SignerClient.MuSig2Sign(\n\t\tctxt, &signrpc.MuSig2SignRequest{\n\t\t\tSessionId: sessResp2.SessionId,\n\t\t\tMessageDigest: sigHash,\n\t\t\tCleanup: true,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\tsignResp3, err := alice.SignerClient.MuSig2Sign(\n\t\tctxt, &signrpc.MuSig2SignRequest{\n\t\t\tSessionId: sessResp3.SessionId,\n\t\t\tMessageDigest: sigHash,\n\t\t\tCleanup: true,\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\n\t// Luckily only one of the signers needs to combine the signature, so\n\t// let's do that now.\n\tcombineReq1, err := alice.SignerClient.MuSig2CombineSig(\n\t\tctxt, &signrpc.MuSig2CombineSigRequest{\n\t\t\tSessionId: sessResp1.SessionId,\n\t\t\tOtherPartialSignatures: [][]byte{\n\t\t\t\tsignResp2.LocalPartialSignature,\n\t\t\t\tsignResp3.LocalPartialSignature,\n\t\t\t},\n\t\t},\n\t)\n\trequire.NoError(t.t, err)\n\trequire.Equal(t.t, true, combineReq1.HaveAllSignatures)\n\trequire.NotEmpty(t.t, combineReq1.FinalSignature)\n\n\tsig, err := schnorr.ParseSignature(combineReq1.FinalSignature)\n\trequire.NoError(t.t, err)\n\trequire.True(t.t, sig.Verify(sigHash, taprootKey))\n\n\ttx.TxIn[0].Witness = wire.TxWitness{\n\t\tcombineReq1.FinalSignature,\n\t}\n\n\t// Serialize, weigh and publish the TX now, then make sure the\n\t// coins are sent and confirmed to the final sweep destination address.\n\tpublishTxAndConfirmSweep(\n\t\tctxt, t, net, alice, tx, estimatedWeight,\n\t\t&chainrpc.SpendRequest{\n\t\t\tOutpoint: &chainrpc.Outpoint{\n\t\t\t\tHash: p2trOutpoint.Hash[:],\n\t\t\t\tIndex: p2trOutpoint.Index,\n\t\t\t},\n\t\t\tScript: p2trPkScript,\n\t\t},\n\t\tp2wkhAddr.String(),\n\t)\n}", "title": "" }, { "docid": "3b225649ce45bed9bd04b507a7d97d54", "score": "0.61612356", "text": "func spendTaprootKey(txIn *wire.TxIn, pkScript []byte,\n\tinputValue int64, chainParams *chaincfg.Params, secrets SecretsSource,\n\ttx *wire.MsgTx, hashCache *txscript.TxSigHashes, idx int) error {\n\n\t// First obtain the key pair associated with this p2tr address. If the\n\t// pkScript is incorrect or derived from a different internal key or\n\t// with a script root, we simply won't find a corresponding private key\n\t// here.\n\t_, addrs, _, err := txscript.ExtractPkScriptAddrs(pkScript, chainParams)\n\tif err != nil {\n\t\treturn err\n\t}\n\tprivKey, _, err := secrets.GetKey(addrs[0])\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// We can now generate a valid witness which will allow us to spend this\n\t// output.\n\twitnessScript, err := txscript.TaprootWitnessSignature(\n\t\ttx, hashCache, idx, inputValue, pkScript,\n\t\ttxscript.SigHashDefault, privKey,\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttxIn.Witness = witnessScript\n\n\treturn nil\n}", "title": "" }, { "docid": "701ce7d81fede93e5b5685a0d90ed3c8", "score": "0.6101561", "text": "func testTaproot(net *lntest.NetworkHarness, t *harnessTest) {\n\tctxb := context.Background()\n\tctxt, cancel := context.WithTimeout(ctxb, 2*defaultTimeout)\n\tdefer cancel()\n\n\ttestTaprootSendCoinsKeySpendBip86(ctxt, t, net.Alice, net)\n\ttestTaprootComputeInputScriptKeySpendBip86(ctxt, t, net.Alice, net)\n\ttestTaprootSignOutputRawScriptSpend(ctxt, t, net.Alice, net)\n\ttestTaprootSignOutputRawKeySpendBip86(ctxt, t, net.Alice, net)\n\ttestTaprootSignOutputRawKeySpendRootHash(ctxt, t, net.Alice, net)\n\ttestTaprootMuSig2KeySpendBip86(ctxt, t, net.Alice, net)\n\ttestTaprootMuSig2KeySpendRootHash(ctxt, t, net.Alice, net)\n\ttestTaprootMuSig2ScriptSpend(ctxt, t, net.Alice, net)\n\ttestTaprootMuSig2CombinedLeafKeySpend(ctxt, t, net.Alice, net)\n}", "title": "" }, { "docid": "05e9e309189b848a312a3f310cd3f5cd", "score": "0.5819282", "text": "func TestAdaptorSigTxs(t *testing.T) {\n\tprivKeyData, _ := hex.DecodeString(\"0102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F00\")\n\tprivKey := secp256k1.PrivKeyFromBytes(privKeyData)\n\tpubKey := privKey.PubKey()\n\n\t// Generate a Pay To Schnorr Alt PubKey Hash address.\n\tnet := chaincfg.TestNet3Params()\n\tpubKeyHash := dcrutil.Hash160(pubKey.SerializeCompressed())\n\taddr, err := dcrutil.NewAddressPubKeyHash(pubKeyHash, net, dcrec.STSchnorrSecp256k1)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tt.Logf(\"P2SAPKH Address: %s\", addr.Address())\n\tpkScript, err := txscript.PayToAddrScript(addr)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tconst scriptVerifyFlags = txscript.ScriptDiscourageUpgradableNops | // standardness\n\t\ttxscript.ScriptVerifyCleanStack | // consensus\n\t\ttxscript.ScriptVerifyCheckLockTimeVerify | // consensus\n\t\ttxscript.ScriptVerifyCheckSequenceVerify | // consensus (lnfeatures)\n\t\ttxscript.ScriptVerifySHA256 // consensus (lnfeatures)\n\n\t// Prepare the transaction that spends from that address.\n\temptyPkhPkscript := [25]byte{\n\t\t0: 0x76,\n\t\t1: 0xa9,\n\t\t2: 0x14,\n\t\t23: 0x88,\n\t\t24: 0xac,\n\t}\n\tprevOutHash, err := chainhash.NewHashFromStr(\"b82c5ba434098875e663e0dbb76df6e19afedb58096b750e888922bb58ca5c60\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tprevOutpoint := &wire.OutPoint{\n\t\tHash: *prevOutHash,\n\t\tIndex: 1,\n\t\tTree: wire.TxTreeRegular,\n\t}\n\tspendTx := &wire.MsgTx{\n\t\tTxIn: []*wire.TxIn{\n\t\t\t&wire.TxIn{\n\t\t\t\tPreviousOutPoint: *prevOutpoint,\n\t\t\t},\n\t\t},\n\t\tTxOut: []*wire.TxOut{\n\t\t\t&wire.TxOut{\n\t\t\t\tValue: 100000,\n\t\t\t\tPkScript: emptyPkhPkscript[:],\n\t\t\t},\n\t\t},\n\t}\n\n\t// Calculate the transaction hash that needs signing.\n\tsigHash, err := txscript.CalcSignatureHash(pkScript, txscript.SigHashAll,\n\t\tspendTx, 0, nil)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Sign via the adaptor sig method.\n\tsig, _, err := sign(privKey, sigHash, newMockNoncer())\n\tif err != nil {\n\t\tt.Fatalf(\"unexpected error: %v\", err)\n\t}\n\tpkData := pubKey.SerializeCompressed()\n\n\t// Verify the signature is correct.\n\tvalid := sig.Verify(sigHash, pubKey)\n\tif !valid {\n\t\tt.Fatal(\"sig verification failed\")\n\t}\n\n\t// Fill-in the signature data.\n\tschnorrSig := sig.Serialize()\n\tschnorrSig = append(schnorrSig, byte(txscript.SigHashAll))\n\tsigScript, err := txscript.NewScriptBuilder().AddData(schnorrSig).AddData(pkData).Script()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tspendTx.TxIn[0].SignatureScript = sigScript\n\n\t// The script for this transaction should be valid.\n\tvm, err := txscript.NewEngine(pkScript, spendTx, 0, scriptVerifyFlags,\n\t\t0, nil)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\terr = vm.Execute()\n\tif err != nil {\n\t\tt.Fatalf(\"script execution failed: %v\", err)\n\t}\n\n\t// Log the full spend transaction data.\n\ttxBytes, _ := spendTx.Bytes()\n\tt.Logf(\"Spend transaction:\\n%x\", txBytes)\n}", "title": "" }, { "docid": "47e347a676dbfb9f4fbd0dfbc6c9a250", "score": "0.55909675", "text": "func payToWitnessTaprootScript(rawKey []byte) ([]byte, error) {\n\treturn NewScriptBuilder().AddOp(OP_1).AddData(rawKey).Script()\n}", "title": "" }, { "docid": "e9cde581c4c8294c8431c4090984eeaf", "score": "0.5582119", "text": "func TestCoinbase(t *testing.T) {\n\tcp, _ := vmutil.DefaultCoinbaseProgram()\n\tretire, _ := vmutil.RetireProgram([]byte{})\n\tCbTx := types.MapTx(&types.TxData{\n\t\tSerializedSize: 1,\n\t\tInputs: []*types.TxInput{\n\t\t\ttypes.NewCoinbaseInput(nil),\n\t\t},\n\t\tOutputs: []*types.TxOutput{\n\t\t\ttypes.NewTxOutput(*consensus.BTMAssetID, 888, cp),\n\t\t},\n\t})\n\n\tcases := []struct {\n\t\tblock *bc.Block\n\t\ttxIndex int\n\t\tGasValid bool\n\t\terr error\n\t}{\n\t\t{\n\t\t\tblock: &bc.Block{\n\t\t\t\tBlockHeader: &bc.BlockHeader{Height: 666},\n\t\t\t\tTransactions: []*bc.Tx{CbTx},\n\t\t\t},\n\t\t\ttxIndex: 0,\n\t\t\tGasValid: true,\n\t\t\terr: nil,\n\t\t},\n\t\t{\n\t\t\tblock: &bc.Block{\n\t\t\t\tBlockHeader: &bc.BlockHeader{Height: 666},\n\t\t\t\tTransactions: []*bc.Tx{\n\t\t\t\t\tCbTx,\n\t\t\t\t\ttypes.MapTx(&types.TxData{\n\t\t\t\t\t\tSerializedSize: 1,\n\t\t\t\t\t\tInputs: []*types.TxInput{\n\t\t\t\t\t\t\ttypes.NewCoinbaseInput(nil),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tOutputs: []*types.TxOutput{\n\t\t\t\t\t\t\ttypes.NewTxOutput(*consensus.BTMAssetID, 888, cp),\n\t\t\t\t\t\t},\n\t\t\t\t\t}),\n\t\t\t\t},\n\t\t\t},\n\t\t\ttxIndex: 1,\n\t\t\tGasValid: false,\n\t\t\terr: ErrWrongCoinbaseTransaction,\n\t\t},\n\t\t{\n\t\t\tblock: &bc.Block{\n\t\t\t\tBlockHeader: &bc.BlockHeader{Height: 666},\n\t\t\t\tTransactions: []*bc.Tx{\n\t\t\t\t\tCbTx,\n\t\t\t\t\ttypes.MapTx(&types.TxData{\n\t\t\t\t\t\tSerializedSize: 1,\n\t\t\t\t\t\tInputs: []*types.TxInput{\n\t\t\t\t\t\t\ttypes.NewCoinbaseInput(nil),\n\t\t\t\t\t\t\ttypes.NewSpendInput([][]byte{}, *newHash(8), *consensus.BTMAssetID, 100000000, 0, cp),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tOutputs: []*types.TxOutput{\n\t\t\t\t\t\t\ttypes.NewTxOutput(*consensus.BTMAssetID, 888, cp),\n\t\t\t\t\t\t\ttypes.NewTxOutput(*consensus.BTMAssetID, 90000000, cp),\n\t\t\t\t\t\t},\n\t\t\t\t\t}),\n\t\t\t\t},\n\t\t\t},\n\t\t\ttxIndex: 1,\n\t\t\tGasValid: false,\n\t\t\terr: ErrWrongCoinbaseTransaction,\n\t\t},\n\t\t{\n\t\t\tblock: &bc.Block{\n\t\t\t\tBlockHeader: &bc.BlockHeader{Height: 666},\n\t\t\t\tTransactions: []*bc.Tx{\n\t\t\t\t\tCbTx,\n\t\t\t\t\ttypes.MapTx(&types.TxData{\n\t\t\t\t\t\tSerializedSize: 1,\n\t\t\t\t\t\tInputs: []*types.TxInput{\n\t\t\t\t\t\t\ttypes.NewSpendInput([][]byte{}, *newHash(8), *consensus.BTMAssetID, 100000000, 0, cp),\n\t\t\t\t\t\t\ttypes.NewCoinbaseInput(nil),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tOutputs: []*types.TxOutput{\n\t\t\t\t\t\t\ttypes.NewTxOutput(*consensus.BTMAssetID, 888, cp),\n\t\t\t\t\t\t\ttypes.NewTxOutput(*consensus.BTMAssetID, 90000000, cp),\n\t\t\t\t\t\t},\n\t\t\t\t\t}),\n\t\t\t\t},\n\t\t\t},\n\t\t\ttxIndex: 1,\n\t\t\tGasValid: false,\n\t\t\terr: ErrWrongCoinbaseTransaction,\n\t\t},\n\t\t{\n\t\t\tblock: &bc.Block{\n\t\t\t\tBlockHeader: &bc.BlockHeader{Height: 666},\n\t\t\t\tTransactions: []*bc.Tx{\n\t\t\t\t\ttypes.MapTx(&types.TxData{\n\t\t\t\t\t\tSerializedSize: 1,\n\t\t\t\t\t\tInputs: []*types.TxInput{\n\t\t\t\t\t\t\ttypes.NewCoinbaseInput(nil),\n\t\t\t\t\t\t\ttypes.NewSpendInput([][]byte{}, *newHash(8), *consensus.BTMAssetID, 100000000, 0, cp),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tOutputs: []*types.TxOutput{\n\t\t\t\t\t\t\ttypes.NewTxOutput(*consensus.BTMAssetID, 888, cp),\n\t\t\t\t\t\t\ttypes.NewTxOutput(*consensus.BTMAssetID, 90000000, cp),\n\t\t\t\t\t\t},\n\t\t\t\t\t}),\n\t\t\t\t},\n\t\t\t},\n\t\t\ttxIndex: 0,\n\t\t\tGasValid: true,\n\t\t\terr: nil,\n\t\t},\n\t\t{\n\t\t\tblock: &bc.Block{\n\t\t\t\tBlockHeader: &bc.BlockHeader{Height: 666},\n\t\t\t\tTransactions: []*bc.Tx{\n\t\t\t\t\ttypes.MapTx(&types.TxData{\n\t\t\t\t\t\tSerializedSize: 1,\n\t\t\t\t\t\tInputs: []*types.TxInput{\n\t\t\t\t\t\t\ttypes.NewCoinbaseInput(nil),\n\t\t\t\t\t\t\ttypes.NewSpendInput([][]byte{}, *newHash(8), *consensus.BTMAssetID, 100000000, 0, retire),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tOutputs: []*types.TxOutput{\n\t\t\t\t\t\t\ttypes.NewTxOutput(*consensus.BTMAssetID, 888, cp),\n\t\t\t\t\t\t\ttypes.NewTxOutput(*consensus.BTMAssetID, 90000000, cp),\n\t\t\t\t\t\t},\n\t\t\t\t\t}),\n\t\t\t\t},\n\t\t\t},\n\t\t\ttxIndex: 0,\n\t\t\tGasValid: false,\n\t\t\terr: vm.ErrReturn,\n\t\t},\n\t}\n\n\tfor i, c := range cases {\n\t\tgasStatus, err := ValidateTx(c.block.Transactions[c.txIndex], c.block)\n\n\t\tif rootErr(err) != c.err {\n\t\t\tt.Errorf(\"#%d got error %s, want %s\", i, err, c.err)\n\t\t}\n\t\tif c.GasValid != gasStatus.GasValid {\n\t\t\tt.Errorf(\"#%d got GasValid %t, want %t\", i, gasStatus.GasValid, c.GasValid)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "af2efa43146802d9f56ef758fd981baa", "score": "0.551537", "text": "func TestSignTransaction(t *testing.T) {\n\tif testing.Short() {\n\t\tt.SkipNow()\n\t}\n\twt, err := createWalletTester(t.Name(), modules.ProdDependencies)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer wt.closeWt()\n\n\t// get an output to spend and its unlock conditions\n\toutputs, err := wt.wallet.UnspentOutputs()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tuc, err := wt.wallet.UnlockConditions(outputs[0].UnlockHash)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// create a transaction that sends an output to the void\n\ttxn := types.Transaction{\n\t\tSiacoinInputs: []types.SiacoinInput{{\n\t\t\tParentID: types.SiacoinOutputID(outputs[0].ID),\n\t\t\tUnlockConditions: uc,\n\t\t}},\n\t\tSiacoinOutputs: []types.SiacoinOutput{{\n\t\t\tValue: outputs[0].Value,\n\t\t\tUnlockHash: types.UnlockHash{},\n\t\t}},\n\t\tTransactionSignatures: []types.TransactionSignature{{\n\t\t\tParentID: crypto.Hash(outputs[0].ID),\n\t\t\tCoveredFields: types.CoveredFields{WholeTransaction: true},\n\t\t}},\n\t}\n\n\t// sign the transaction\n\terr = wt.wallet.SignTransaction(&txn, nil)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\t// txn should now have a signature\n\tif len(txn.TransactionSignatures[0].Signature) == 0 {\n\t\tt.Fatal(\"transaction was not signed\")\n\t}\n\n\t// the resulting transaction should be valid; submit it to the tpool and\n\t// mine a block to confirm it\n\theight, _ := wt.wallet.Height()\n\terr = txn.StandaloneValid(height)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\terr = wt.tpool.AcceptTransactionSet([]types.Transaction{txn})\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\terr = wt.addBlockNoPayout()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// the wallet should no longer list the resulting output as spendable\n\toutputs, err = wt.wallet.UnspentOutputs()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tif len(outputs) != 1 {\n\t\tt.Fatal(\"expected one output\")\n\t}\n\tif outputs[0].ID == types.OutputID(txn.SiacoinInputs[0].ParentID) {\n\t\tt.Fatal(\"spent output still listed as spendable\")\n\t}\n}", "title": "" }, { "docid": "9c24e5b02bdaa621a6ccecea239dc3f2", "score": "0.54682505", "text": "func (b *Bitcoin) SignRawTransactionWithKey(tx *wire.MsgTx, privKeysWIF []string, prevtxs []PrevTx) (*wire.MsgTx, bool, error) {\n\t// if b.Version() >= ctype.BTCVer17 {\n\n\t// hex tx\n\thexTx, err := b.ToHex(tx)\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"fail to call btc.ToHex(tx)\")\n\t}\n\n\tinput1, err := json.Marshal(hexTx)\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"fail to call json.Marchal(txHex)\")\n\t}\n\n\t// private keys\n\tinput2, err := json.Marshal(privKeysWIF)\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"fail to call json.Marchal(privKeysWIF)\")\n\t}\n\n\t// prevtxs\n\tinput3, err := json.Marshal(prevtxs)\n\tif err != nil {\n\t\treturn nil, false, errors.Errorf(\"fail to call json.Marchal(prevtxs)\")\n\t}\n\n\t// call api `signrawtransactionwithkey`\n\trawResult, err := b.Client.RawRequest(\"signrawtransactionwithkey\", []json.RawMessage{input1, input2, input3})\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"fail to call json.RawRequest(signrawtransactionwithkey)\")\n\t}\n\n\tsignRawTxResult := SignRawTransactionResult{}\n\terr = json.Unmarshal(rawResult, &signRawTxResult)\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"fail to call json.Unmarshal(rawResult)\")\n\t}\n\t// Note: if signature is not completed yet, error would occur\n\t// - ignore error if retured msgTx is not blank、and returned hex is changed from given hex as parameter\n\t//\tabove error would be like `Signature must be zero for failed CHECK(MULTI)SIG operation`\n\tif len(signRawTxResult.Errors) != 0 {\n\t\tif signRawTxResult.Hex == \"\" || hexTx == signRawTxResult.Hex {\n\t\t\tgrok.Value(signRawTxResult)\n\t\t\treturn nil, false, errors.Errorf(\"result of `signrawtransactionwithwallet` includes error: %s\", signRawTxResult.Errors[0].Error)\n\t\t}\n\t\tb.logger.Warn(\"result of `signrawtransactionwithwallet` includes error\", zap.Any(\"errors\", signRawTxResult.Errors))\n\t}\n\n\tmsgTx, err := b.ToMsgTx(signRawTxResult.Hex)\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"fail to call btc.ToMsgTx(hex)\")\n\t}\n\n\treturn msgTx, signRawTxResult.Complete, nil\n}", "title": "" }, { "docid": "e8202a2d5a4efa2c9544da7b31104ccc", "score": "0.53553224", "text": "func sendToTaprootOutput(ctx context.Context, t *harnessTest,\n\tnet *lntest.NetworkHarness, node *lntest.HarnessNode,\n\ttaprootKey *btcec.PublicKey, amt int64) (wire.OutPoint, []byte) {\n\n\ttapScriptAddr, err := btcutil.NewAddressTaproot(\n\t\tschnorr.SerializePubKey(taprootKey), harnessNetParams,\n\t)\n\trequire.NoError(t.t, err)\n\tp2trPkScript, err := txscript.PayToAddrScript(tapScriptAddr)\n\trequire.NoError(t.t, err)\n\n\t// Send some coins to the generated tapscript address.\n\t_, err = node.SendCoins(ctx, &lnrpc.SendCoinsRequest{\n\t\tAddr: tapScriptAddr.String(),\n\t\tAmount: amt,\n\t})\n\trequire.NoError(t.t, err)\n\n\t// Wait until the TX is found in the mempool.\n\ttxid, err := waitForTxInMempool(net.Miner.Client, minerMempoolTimeout)\n\trequire.NoError(t.t, err)\n\n\tp2trOutputIndex := getOutputIndex(\n\t\tt, net.Miner, txid, tapScriptAddr.String(),\n\t)\n\tp2trOutpoint := wire.OutPoint{\n\t\tHash: *txid,\n\t\tIndex: uint32(p2trOutputIndex),\n\t}\n\n\t// Clear the mempool.\n\tmineBlocks(t, net, 1, 1)\n\n\treturn p2trOutpoint, p2trPkScript\n}", "title": "" }, { "docid": "ee9e73c57a984e2fbe9081dfb1457bcb", "score": "0.533866", "text": "func testScriptSchnorrSig(t *testing.T,\n\tpubKey *btcec.PublicKey) txscript.TapLeaf {\n\n\tbuilder := txscript.NewScriptBuilder()\n\tbuilder.AddData(schnorr.SerializePubKey(pubKey))\n\tbuilder.AddOp(txscript.OP_CHECKSIG)\n\tscript2, err := builder.Script()\n\trequire.NoError(t, err)\n\treturn txscript.NewBaseTapLeaf(script2)\n}", "title": "" }, { "docid": "c256d0694b00f593689cc3043e4474c7", "score": "0.53363943", "text": "func TestBase58(t *testing.T) {\n\tfmt.Println(\"===> TestBase58 <===\")\n\tplaintext := \"Hello I am a string!\"\n\tencoded := cryptosdk.Base58Encode([]byte(plaintext), len(plaintext))\n\tfmt.Printf(\"Encoded: %T %v\\n\", encoded, encoded)\n\tdecoded := cryptosdk.Base58Decode(encoded)\n\tdecodedStr := string(decoded)\n\tfmt.Printf(\"Decoded: %T %v\\n\", decodedStr, decodedStr)\n\n\tif plaintext != decodedStr {\n\t\tt.Errorf(\"Plaintext and decoded strings are different: Plaintext=%v Decoded=%v\", plaintext, decodedStr)\n\t}\n\n}", "title": "" }, { "docid": "d1c2c6a3fbd589a94f30748626b1b7a9", "score": "0.5305439", "text": "func TestCreateRawTransaction(t *testing.T) {\n\t// t.SkipNow()\n\txr := testutil.GetXRP()\n\n\ttype args struct {\n\t\tsernderAccount string\n\t\treceiverAccount string\n\t\tamount float64\n\t\tinstructions *pb.Instructions\n\t}\n\ttype want struct {\n\t\tisErr bool\n\t}\n\ttests := []struct {\n\t\tname string\n\t\targs args\n\t\twant want\n\t}{\n\t\t{\n\t\t\tname: \"happy path 1\",\n\t\t\targs: args{\n\t\t\t\tsernderAccount: \"rKXvsrd5H6MQNVpYgdeffFYjfGq4VdDogd\",\n\t\t\t\treceiverAccount: \"rpBzBQ6aWJhuatJCkQgfE3VJT67ukBQopf\",\n\t\t\t\tamount: 50,\n\t\t\t\tinstructions: &pb.Instructions{\n\t\t\t\t\tMaxLedgerVersionOffset: xrp.MaxLedgerVersionOffset,\n\t\t\t\t},\n\t\t\t},\n\t\t\twant: want{false},\n\t\t},\n\t\t//{\n\t\t//\tname: \"happy path 2\",\n\t\t//\targs: args{\n\t\t//\t\tsernderAccount: \"rEoRcMBfg7VUryw5xSyw883bXU74T8eoYj\",\n\t\t//\t\treceiverAccount: \"raWG2eo1tEXwN4HtGFJCagvukC2nBuiHxC\",\n\t\t//\t\tamount: 0,\n\t\t//\t},\n\t\t//\twant: want{false},\n\t\t//},\n\t}\n\n\tfor _, tt := range tests {\n\t\tt.Run(tt.name, func(t *testing.T) {\n\t\t\t// PrepareTransaction\n\t\t\ttxJSON, _, err := xr.CreateRawTransaction(tt.args.sernderAccount, tt.args.receiverAccount, tt.args.amount, tt.args.instructions)\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\t\t\tgrok.Value(txJSON)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "100448eb6373733f6f9f7480d9e8703e", "score": "0.5288004", "text": "func keyToBtc() string {\n\n\tprivKey := getInput()\n\n\tpub := privToPub(privKey, true)\n\n\thashKey1 := sha256.Sum256(pub)\n\n\thashKey2 := append([]byte{0}, sumRipemd160(hashKey1[:])...)\n\n\thashKey3 := sha256.Sum256(hashKey2[:])\n\n\thashKey4 := sha256.Sum256(hashKey3[:])\n\n\tchecksum := hashKey4[:4]\n\n\thash := append(hashKey2, checksum...)\n\n\taddress := base58.Encode(hash)\n\n\treturn address\n\n}", "title": "" }, { "docid": "cf96b7671655a9868408cb90626cbe9a", "score": "0.52230763", "text": "func TestPushedData(t *testing.T) {\n\tt.Parallel()\n\n\tvar tests = []struct {\n\t\tscript string\n\t\tout [][]byte\n\t\tvalid bool\n\t}{\n\t\t{\n\t\t\t\"0 IF 0 ELSE 2 ENDIF\",\n\t\t\t[][]byte{nil, nil},\n\t\t\ttrue,\n\t\t},\n\t\t{\n\t\t\t\"16777216 10000000\",\n\t\t\t[][]byte{\n\t\t\t\t{0x00, 0x00, 0x00, 0x01}, // 16777216\n\t\t\t\t{0x80, 0x96, 0x98, 0x00}, // 10000000\n\t\t\t},\n\t\t\ttrue,\n\t\t},\n\t\t{\n\t\t\t\"DUP HASH160 '17VZNX1SN5NtKa8UQFxwQbFeFc3iqRYhem' EQUALVERIFY CHECKSIG\",\n\t\t\t[][]byte{\n\t\t\t\t// 17VZNX1SN5NtKa8UQFxwQbFeFc3iqRYhem\n\t\t\t\t{\n\t\t\t\t\t0x31, 0x37, 0x56, 0x5a, 0x4e, 0x58, 0x31, 0x53, 0x4e, 0x35,\n\t\t\t\t\t0x4e, 0x74, 0x4b, 0x61, 0x38, 0x55, 0x51, 0x46, 0x78, 0x77,\n\t\t\t\t\t0x51, 0x62, 0x46, 0x65, 0x46, 0x63, 0x33, 0x69, 0x71, 0x52,\n\t\t\t\t\t0x59, 0x68, 0x65, 0x6d,\n\t\t\t\t},\n\t\t\t},\n\t\t\ttrue,\n\t\t},\n\t\t{\n\t\t\t\"PUSHDATA4 1000 EQUAL\",\n\t\t\tnil,\n\t\t\tfalse,\n\t\t},\n\t}\n\n\tfor i, test := range tests {\n\t\tscript := mustParseShortForm(test.script)\n\t\tdata, err := txscript.PushedData(script)\n\t\tif test.valid && err != nil {\n\t\t\tt.Errorf(\"TestPushedData failed test #%d: %v\\n\", i, err)\n\t\t\tcontinue\n\t\t} else if !test.valid && err == nil {\n\t\t\tt.Errorf(\"TestPushedData failed test #%d: test should \"+\n\t\t\t\t\"be invalid\\n\", i)\n\t\t\tcontinue\n\t\t}\n\t\tif !reflect.DeepEqual(data, test.out) {\n\t\t\tt.Errorf(\"TestPushedData failed test #%d: want: %x \"+\n\t\t\t\t\"got: %x\\n\", i, test.out, data)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0871e6e10cde681d088bb43de200abae", "score": "0.5222922", "text": "func TestTx(t *testing.T) {\n\tpver := ProtocolVersion\n\n\t// Block 100000 hash.\n\thashStr := \"000000016845a9f945079aa52680def9eafd5ea39c86dfdb5ef5630d18e3e74f\"\n\thash, err := chainhash.NewHashFromStr(hashStr)\n\tif err != nil {\n\t\tt.Errorf(\"NewHashFromStr: %v\", err)\n\t}\n\n\t// Ensure the command is expected value.\n\twantCmd := \"tx\"\n\tmsg := NewMsgTx(1)\n\tif cmd := msg.Command(); cmd != wantCmd {\n\t\tt.Errorf(\"NewMsgAddr: wrong command - got %v want %v\",\n\t\t\tcmd, wantCmd)\n\t}\n\n\t// Ensure max payload is expected value for latest protocol version.\n\twantPayload := uint32(1000 * 4000)\n\tmaxPayload := msg.MaxPayloadLength(pver)\n\tif maxPayload != wantPayload {\n\t\tt.Errorf(\"MaxPayloadLength: wrong max payload length for \"+\n\t\t\t\"protocol version %d - got %v, want %v\", pver,\n\t\t\tmaxPayload, wantPayload)\n\t}\n\n\t// Ensure we get the same transaction output point data back out.\n\t// NOTE: This is a block hash and made up index, but we're only\n\t// testing package functionality.\n\tprevOutIndex := uint32(1)\n\tprevOut := NewOutPoint(hash, prevOutIndex)\n\tif !prevOut.Hash.IsEqual(hash) {\n\t\tt.Errorf(\"NewOutPoint: wrong hash - got %v, want %v\",\n\t\t\tspew.Sprint(&prevOut.Hash), spew.Sprint(hash))\n\t}\n\tif prevOut.Index != prevOutIndex {\n\t\tt.Errorf(\"NewOutPoint: wrong index - got %v, want %v\",\n\t\t\tprevOut.Index, prevOutIndex)\n\t}\n\tprevOutStr := fmt.Sprintf(\"%s:%d\", hash.String(), prevOutIndex)\n\tif s := prevOut.String(); s != prevOutStr {\n\t\tt.Errorf(\"OutPoint.String: unexpected result - got %v, \"+\n\t\t\t\"want %v\", s, prevOutStr)\n\t}\n\n\t// Ensure we get the same transaction input back out.\n\tsigScript := []byte{0x04, 0x31, 0xdc, 0x00, 0x1b, 0x01, 0x62}\n\n\ttxIn := NewTxIn(prevOut, sigScript)\n\tif !reflect.DeepEqual(&txIn.PreviousOutPoint, prevOut) {\n\t\tt.Errorf(\"NewTxIn: wrong prev outpoint - got %v, want %v\",\n\t\t\tspew.Sprint(&txIn.PreviousOutPoint),\n\t\t\tspew.Sprint(prevOut))\n\t}\n\tif !bytes.Equal(txIn.SignatureScript, sigScript) {\n\t\tt.Errorf(\"NewTxIn: wrong signature script - got %v, want %v\",\n\t\t\tspew.Sdump(txIn.SignatureScript),\n\t\t\tspew.Sdump(sigScript))\n\t}\n\n\t// Ensure we get the same transaction output back out.\n\ttxValue := int64(5000000000)\n\tpkScript := []byte{\n\t\t0x41, // OP_DATA_65\n\t\t0x04, 0xd6, 0x4b, 0xdf, 0xd0, 0x9e, 0xb1, 0xc5,\n\t\t0xfe, 0x29, 0x5a, 0xbd, 0xeb, 0x1d, 0xca, 0x42,\n\t\t0x81, 0xbe, 0x98, 0x8e, 0x2d, 0xa0, 0xb6, 0xc1,\n\t\t0xc6, 0xa5, 0x9d, 0xc2, 0x26, 0xc2, 0x86, 0x24,\n\t\t0xe1, 0x81, 0x75, 0xe8, 0x51, 0xc9, 0x6b, 0x97,\n\t\t0x3d, 0x81, 0xb0, 0x1c, 0xc3, 0x1f, 0x04, 0x78,\n\t\t0x34, 0xbc, 0x06, 0xd6, 0xd6, 0xed, 0xf6, 0x20,\n\t\t0xd1, 0x84, 0x24, 0x1a, 0x6a, 0xed, 0x8b, 0x63,\n\t\t0xa6, // 65-byte signature\n\t\t0xac, // OP_CHECKSIG\n\t}\n\ttxOut := NewTxOut(txValue, pkScript)\n\tif txOut.Value != txValue {\n\t\tt.Errorf(\"NewTxOut: wrong pk script - got %v, want %v\",\n\t\t\ttxOut.Value, txValue)\n\n\t}\n\tif !bytes.Equal(txOut.PkScript, pkScript) {\n\t\tt.Errorf(\"NewTxOut: wrong pk script - got %v, want %v\",\n\t\t\tspew.Sdump(txOut.PkScript),\n\t\t\tspew.Sdump(pkScript))\n\t}\n\n\t// Ensure transaction inputs are added properly.\n\tmsg.AddTxIn(txIn)\n\tif !reflect.DeepEqual(msg.TxIn[0], txIn) {\n\t\tt.Errorf(\"AddTxIn: wrong transaction input added - got %v, want %v\",\n\t\t\tspew.Sprint(msg.TxIn[0]), spew.Sprint(txIn))\n\t}\n\n\t// Ensure transaction outputs are added properly.\n\tmsg.AddTxOut(txOut)\n\tif !reflect.DeepEqual(msg.TxOut[0], txOut) {\n\t\tt.Errorf(\"AddTxIn: wrong transaction output added - got %v, want %v\",\n\t\t\tspew.Sprint(msg.TxOut[0]), spew.Sprint(txOut))\n\t}\n\n\t// Ensure the copy produced an identical transaction message.\n\tnewMsg := msg.Copy()\n\tif !reflect.DeepEqual(newMsg, msg) {\n\t\tt.Errorf(\"Copy: mismatched tx messages - got %v, want %v\",\n\t\t\tspew.Sdump(newMsg), spew.Sdump(msg))\n\t}\n}", "title": "" }, { "docid": "8e56aa416ecfa0d01224c4a5ac7a3d96", "score": "0.52192336", "text": "func (tx *Tx) IsSpendingTaproot() bool {\n\tfor _, in := range tx.Inputs {\n\t\tif in.SpendsP2TR() {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "8c2cfb90547bfbb3c52ce9b7d641a10f", "score": "0.5191716", "text": "func TestTx(t *testing.T) {\n\tpver := ProtocolVersion\n\n\t// Block 100000 hash.\n\thashStr := \"3ba27aa200b1cecaad478d2b00432346c3f1f3986da1afd33e506\"\n\thash, err := chainhash.NewHashFromStr(hashStr)\n\tif err != nil {\n\t\tt.Errorf(\"NewHashFromStr: %v\", err)\n\t}\n\n\t// Ensure the command is expected value.\n\twantCmd := \"tx\"\n\tmsg := NewMsgTx()\n\tif cmd := msg.Command(); cmd != wantCmd {\n\t\tt.Errorf(\"NewMsgAddr: wrong command - got %v want %v\",\n\t\t\tcmd, wantCmd)\n\t}\n\n\t// Ensure max payload is expected value for latest protocol version.\n\t// Num addresses (varInt) + max allowed addresses.\n\twantPayload := uint32(1310720)\n\tmaxPayload := msg.MaxPayloadLength(pver)\n\tif maxPayload != wantPayload {\n\t\tt.Errorf(\"MaxPayloadLength: wrong max payload length for \"+\n\t\t\t\"protocol version %d - got %v, want %v\", pver,\n\t\t\tmaxPayload, wantPayload)\n\t}\n\n\t// Ensure max payload length is not more than MaxMessagePayload.\n\tif maxPayload > MaxMessagePayload {\n\t\tt.Fatalf(\"MaxPayloadLength: payload length (%v) for protocol \"+\n\t\t\t\"version %d exceeds MaxMessagePayload (%v).\", maxPayload, pver,\n\t\t\tMaxMessagePayload)\n\t}\n\n\t// Ensure max payload is expected value for protocol version 3.\n\twantPayload = uint32(1000000)\n\tmaxPayload = msg.MaxPayloadLength(3)\n\tif maxPayload != wantPayload {\n\t\tt.Errorf(\"MaxPayloadLength: wrong max payload length for \"+\n\t\t\t\"protocol version %d - got %v, want %v\", 3,\n\t\t\tmaxPayload, wantPayload)\n\t}\n\n\t// Ensure we get the same transaction output point data back out.\n\t// NOTE: This is a block hash and made up index, but we're only\n\t// testing package functionality.\n\tprevOutIndex := uint32(1)\n\tprevOut := NewOutPoint(hash, prevOutIndex, TxTreeRegular)\n\tif !prevOut.Hash.IsEqual(hash) {\n\t\tt.Errorf(\"NewOutPoint: wrong hash - got %v, want %v\",\n\t\t\tspew.Sprint(&prevOut.Hash), spew.Sprint(hash))\n\t}\n\tif prevOut.Index != prevOutIndex {\n\t\tt.Errorf(\"NewOutPoint: wrong index - got %v, want %v\",\n\t\t\tprevOut.Index, prevOutIndex)\n\t}\n\tprevOutStr := fmt.Sprintf(\"%s:%d\", hash.String(), prevOutIndex)\n\tif s := prevOut.String(); s != prevOutStr {\n\t\tt.Errorf(\"OutPoint.String: unexpected result - got %v, \"+\n\t\t\t\"want %v\", s, prevOutStr)\n\t}\n\n\t// Ensure we get the same transaction input back out.\n\tsigScript := []byte{0x04, 0x31, 0xdc, 0x00, 0x1b, 0x01, 0x62}\n\ttxIn := NewTxIn(prevOut, 5000000000, sigScript)\n\tif !reflect.DeepEqual(&txIn.PreviousOutPoint, prevOut) {\n\t\tt.Errorf(\"NewTxIn: wrong prev outpoint - got %v, want %v\",\n\t\t\tspew.Sprint(&txIn.PreviousOutPoint),\n\t\t\tspew.Sprint(prevOut))\n\t}\n\tif !bytes.Equal(txIn.SignatureScript, sigScript) {\n\t\tt.Errorf(\"NewTxIn: wrong signature script - got %v, want %v\",\n\t\t\tspew.Sdump(txIn.SignatureScript),\n\t\t\tspew.Sdump(sigScript))\n\t}\n\n\t// Ensure we get the same transaction output back out.\n\ttxValue := txIn.ValueIn - 1000\n\tpkScript := []byte{\n\t\t0x41, // OP_DATA_65\n\t\t0x04, 0xd6, 0x4b, 0xdf, 0xd0, 0x9e, 0xb1, 0xc5,\n\t\t0xfe, 0x29, 0x5a, 0xbd, 0xeb, 0x1d, 0xca, 0x42,\n\t\t0x81, 0xbe, 0x98, 0x8e, 0x2d, 0xa0, 0xb6, 0xc1,\n\t\t0xc6, 0xa5, 0x9d, 0xc2, 0x26, 0xc2, 0x86, 0x24,\n\t\t0xe1, 0x81, 0x75, 0xe8, 0x51, 0xc9, 0x6b, 0x97,\n\t\t0x3d, 0x81, 0xb0, 0x1c, 0xc3, 0x1f, 0x04, 0x78,\n\t\t0x34, 0xbc, 0x06, 0xd6, 0xd6, 0xed, 0xf6, 0x20,\n\t\t0xd1, 0x84, 0x24, 0x1a, 0x6a, 0xed, 0x8b, 0x63,\n\t\t0xa6, // 65-byte signature\n\t\t0xac, // OP_CHECKSIG\n\t}\n\ttxOut := NewTxOut(txValue, pkScript)\n\tif txOut.Value != txValue {\n\t\tt.Errorf(\"NewTxOut: wrong pk script - got %v, want %v\",\n\t\t\ttxOut.Value, txValue)\n\t}\n\tif !bytes.Equal(txOut.PkScript, pkScript) {\n\t\tt.Errorf(\"NewTxOut: wrong pk script - got %v, want %v\",\n\t\t\tspew.Sdump(txOut.PkScript),\n\t\t\tspew.Sdump(pkScript))\n\t}\n\n\t// Ensure transaction inputs are added properly.\n\tmsg.AddTxIn(txIn)\n\tif !reflect.DeepEqual(msg.TxIn[0], txIn) {\n\t\tt.Errorf(\"AddTxIn: wrong transaction input added - got %v, want %v\",\n\t\t\tspew.Sprint(msg.TxIn[0]), spew.Sprint(txIn))\n\t}\n\n\t// Ensure transaction outputs are added properly.\n\tmsg.AddTxOut(txOut)\n\tif !reflect.DeepEqual(msg.TxOut[0], txOut) {\n\t\tt.Errorf(\"AddTxIn: wrong transaction output added - got %v, want %v\",\n\t\t\tspew.Sprint(msg.TxOut[0]), spew.Sprint(txOut))\n\t}\n\n\t// Ensure the copy produced an identical transaction message.\n\tnewMsg := msg.Copy()\n\tif !reflect.DeepEqual(newMsg, msg) {\n\t\tt.Errorf(\"Copy: mismatched tx messages - got %v, want %v\",\n\t\t\tspew.Sdump(newMsg), spew.Sdump(msg))\n\t}\n}", "title": "" }, { "docid": "f4b809dd2df77b97ef2ea865c7411a62", "score": "0.51505876", "text": "func SignRawTransaction(prvkeyStr, rawTxStr string) (string, error) {\n\tprvkey, err := hex.DecodeString(prvkeyStr)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tvar rawtx RawTransaction\n\tif err := json.Unmarshal([]byte(rawTxStr), &rawtx); err != nil {\n\t\treturn \"\", err\n\t}\n\n\t//copy from sendRawTransaction\n\trawtxn, _ := common.HexStringToBytes(rawtx.TxData)\n\tvar txn transaction.Transaction\n\tif err := txn.Deserialize(bytes.NewReader(rawtxn)); err != nil {\n\t\treturn \"\", errors.New(\"invalid raw transaction\")\n\t}\n\n\tsigner := OKSigner(prvkey)\n\n\toldTxStore := transaction.TxStore\n\tdefer func() { transaction.TxStore = oldTxStore }()\n\ttransaction.TxStore, err = makeOKMockLedgerStore(rawtx.InputTx)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tctx := contract.NewContractContext(&txn)\n\tif err := sign(signer, ctx); err != nil {\n\t\treturn \"\", err\n\t}\n\ttxn.SetPrograms(ctx.GetPrograms())\n\n\tvar buffer bytes.Buffer\n\ttxn.Serialize(&buffer)\n\treturn common.BytesToHexString(buffer.Bytes()), nil\n}", "title": "" }, { "docid": "85296d14784affbf867d04620db8f7c1", "score": "0.51170623", "text": "func TestIsPayToScriptHash(t *testing.T) {\n\tt.Parallel()\n\n\tfor _, test := range scriptClassTests {\n\t\tscript := mustParseShortForm(test.script)\n\t\tshouldBe := (test.class == txscript.ScriptHashTy)\n\t\tp2sh := txscript.IsPayToScriptHash(script)\n\t\tif p2sh != shouldBe {\n\t\t\tt.Errorf(\"%s: epxected p2sh %v, got %v\", test.name,\n\t\t\t\tshouldBe, p2sh)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4a7420f8811dfb8437e81e7584405c1f", "score": "0.5116699", "text": "func TestPackBitmarkTransferTwo(t *testing.T) {\n\n\townerOneAddress := makeAddress(&ownerOne.publicKey)\n\townerTwoAddress := makeAddress(&ownerTwo.publicKey)\n\n\tvar link transaction.Link\n\t_, err := fmt.Sscan(\"BMK00bfd865e4c76c6c56babffe4c275578d6410818634afc20bde0ee5a1e312c901\", &link)\n\tif nil != err {\n\t\tt.Errorf(\"hex to link error: %v\", err)\n\t\treturn\n\t}\n\n\tr := transaction.BitmarkTransfer{\n\t\tLink: link,\n\t\tOwner: ownerTwoAddress,\n\t}\n\n\texpected := []byte{\n\t\t0x03, 0x20, 0x01, 0xc9, 0x12, 0xe3, 0xa1, 0xe5,\n\t\t0x0e, 0xde, 0x0b, 0xc2, 0xaf, 0x34, 0x86, 0x81,\n\t\t0x10, 0x64, 0x8d, 0x57, 0x75, 0xc2, 0xe4, 0xff,\n\t\t0xab, 0x6b, 0xc5, 0xc6, 0x76, 0x4c, 0x5e, 0x86,\n\t\t0xfd, 0x0b, 0x21, 0x13, 0xa1, 0x36, 0x32, 0xd5,\n\t\t0x42, 0x5a, 0xed, 0x3a, 0x6b, 0x62, 0xe2, 0xbb,\n\t\t0x6d, 0xe4, 0xc9, 0x59, 0x48, 0x41, 0xc1, 0x5b,\n\t\t0x70, 0x15, 0x69, 0xec, 0x99, 0x99, 0xdc, 0x20,\n\t\t0x1c, 0x35, 0xf7, 0xb3,\n\t}\n\n\texpectedTxId := transaction.Link{\n\t\t0x6c, 0x5c, 0x0e, 0x43, 0xf5, 0x98, 0x06, 0xe5,\n\t\t0x19, 0x79, 0x3d, 0xd6, 0x16, 0x48, 0x73, 0x18,\n\t\t0x43, 0x06, 0x8a, 0x00, 0x93, 0xdb, 0x7b, 0x07,\n\t\t0x76, 0x6f, 0x7f, 0x7f, 0x2d, 0x18, 0xb9, 0x19,\n\t}\n\n\t// manually sign the record and attach signature to \"expected\"\n\tsignature := ed25519.Sign(&ownerOne.privateKey, expected)\n\tr.Signature = signature[:]\n\tl := util.ToVarint64(uint64(len(signature)))\n\texpected = append(expected, l...)\n\texpected = append(expected, signature[:]...)\n\n\t// test the packer\n\tpacked, err := r.Pack(ownerOneAddress)\n\tif nil != err {\n\t\tt.Errorf(\"pack error: %v\", err)\n\t}\n\n\t// if either of above fail we will have the message _without_ a signature\n\tif !bytes.Equal(packed, expected) {\n\t\tt.Errorf(\"pack record: %x expected: %x\", packed, expected)\n\t\tt.Errorf(\"*** GENERATED Packed:\\n%s\", formatBytes(\"expected\", packed))\n\t\treturn\n\t}\n\n\t// check txId\n\ttxId := packed.MakeLink()\n\n\tif txId != expectedTxId {\n\t\tt.Errorf(\"pack txId: %#v expected: %x\", txId, expectedTxId)\n\t\tt.Errorf(\"*** GENERATED txId:\\n%s\", formatBytes(\"expectedTxId\", txId.Bytes()))\n\t\treturn\n\t}\n\n\t// test the unpacker\n\tunpacked, err := packed.Unpack()\n\tif nil != err {\n\t\tt.Errorf(\"unpack error: %v\", err)\n\t\treturn\n\t}\n\n\tbmt, ok := unpacked.(*transaction.BitmarkTransfer)\n\tif !ok {\n\t\tt.Errorf(\"did not unpack to BitmarkTransfer\")\n\t\treturn\n\t}\n\n\t// display a JSON version for information\n\titem := struct {\n\t\tHexTxId string\n\t\tTxId transaction.Link\n\t\tBitmarkTransfer *transaction.BitmarkTransfer\n\t}{\n\t\ttxId.String(),\n\t\ttxId,\n\t\tbmt,\n\t}\n\tb, err := json.MarshalIndent(item, \"\", \" \")\n\tif nil != err {\n\t\tt.Errorf(\"json error: %v\", err)\n\t\treturn\n\t}\n\n\tt.Logf(\"Bitmark Transfer: JSON: %s\", b)\n\n\t// check that structure is preserved through Pack/Unpack\n\t// note reg is a pointer here\n\tif !reflect.DeepEqual(r, *bmt) {\n\t\tt.Errorf(\"different, original: %v recovered: %v\", r, *bmt)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "b0f6d19771c1b40758f44fd4cbbfae14", "score": "0.51096183", "text": "func TestSignOpReturnData(t *testing.T) {\r\n\tt.Parallel()\r\n\r\n\tvar (\r\n\t\t// Testing private methods\r\n\t\ttests = []struct {\r\n\t\t\tinputPrivateKey string\r\n\t\t\tinputAlgorithm Algorithm\r\n\t\t\tinputData [][]byte\r\n\t\t\texpectedSignature string\r\n\t\t\texpectedOutput string\r\n\t\t\texpectedAipNil bool\r\n\t\t\texpectedOutNil bool\r\n\t\t\texpectedError bool\r\n\t\t}{\r\n\t\t\t{\r\n\t\t\t\t\"80699541455b59a8a8a33b85892319de8b8e8944eb8b48e9467137825ae192e59f01\",\r\n\t\t\t\tBitcoinECDSA,\r\n\t\t\t\t[][]byte{[]byte(exampleMessage)},\r\n\t\t\t\t\"GwJif5FKr6rPpKYghZ7F7Rmaw00q5nWo6NiJOuje+6WBOM6qd8MlVnbWr2mrrA+aaDatHxavR8JTckpSfx1RJ1o=\",\r\n\t\t\t\t\"006a0c74657374206d65737361676522313550636948473232534e4c514a584d6f53556157566937575371633768436676610d424954434f494e5f45434453412131553151733836707847724e55796a37673752346d386b3879346b6d78766f756f4c5847774a696635464b72367250704b5967685a374637526d6177303071356e576f364e694a4f756a652b3657424f4d367164384d6c566e625772326d7272412b61614461744878617652384a54636b7053667831524a316f3d\",\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"\",\r\n\t\t\t\tBitcoinECDSA,\r\n\t\t\t\t[][]byte{[]byte(exampleMessage)},\r\n\t\t\t\t\"\",\r\n\t\t\t\t\"\",\r\n\t\t\t\tfalse,\r\n\t\t\t\ttrue,\r\n\t\t\t\ttrue,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"80699541455b59a8a8a33b85892319de8b8e8944eb8b48e9467137825ae192e59f01\",\r\n\t\t\t\tPaymail,\r\n\t\t\t\t[][]byte{[]byte(exampleMessage)},\r\n\t\t\t\t\"GwJif5FKr6rPpKYghZ7F7Rmaw00q5nWo6NiJOuje+6WBOM6qd8MlVnbWr2mrrA+aaDatHxavR8JTckpSfx1RJ1o=\",\r\n\t\t\t\t\"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\",\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t},\r\n\t\t}\r\n\t)\r\n\r\n\t// Run tests\r\n\tfor idx, test := range tests {\r\n\t\tif out, _, a, err := SignOpReturnData(test.inputPrivateKey, test.inputAlgorithm, test.inputData); err != nil && !test.expectedError {\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%v] inputted and error not expected but got: %s\", idx, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputData, err.Error())\r\n\t\t} else if err == nil && test.expectedError {\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%v] inputted and error was expected\", idx, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputData)\r\n\t\t} else if a == nil && !test.expectedAipNil {\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%v] inputted and nil was not expected (aip)\", idx, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputData)\r\n\t\t} else if a != nil && test.expectedAipNil {\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%v] inputted and nil was expected (aip)\", idx, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputData)\r\n\t\t} else if out == nil && !test.expectedOutNil {\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%v] inputted and nil was not expected (out)\", idx, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputData)\r\n\t\t} else if out != nil && test.expectedOutNil {\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%v] inputted and nil was expected (out)\", idx, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputData)\r\n\t\t} else if a != nil && a.Signature != test.expectedSignature {\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%v] inputted and expected signature [%s] but got [%s]\", idx, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputData, test.expectedSignature, a.Signature)\r\n\t\t} else if out != nil && out.GetLockingScriptHexString() != test.expectedOutput {\r\n\t\t\tt.Logf(\"out %s\", out.String())\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%v] inputted and expected output [%s] but got [%s]\", idx, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputData, test.expectedOutput, out.GetLockingScriptHexString())\r\n\t\t}\r\n\t}\r\n}", "title": "" }, { "docid": "676f0b38f3ad2d3606c9ea9e27a610d4", "score": "0.5096155", "text": "func TestSignTransaction3(t *testing.T) {\n\tpythonRawTx := \"0xf868819284b2d05e008255f09443700db832e9ac990d36d6279a846608643c904e843b9aca008026a0444f6cd588830bc975643241e6df545dccf5815c00ee8bde4e686722761b8954a06abec148bf44975c6ed6336cba57a9f5101d1cb5c199a12567d65de2ea8d7d43\"\n\ttx := eth.Transaction{\n\t\tNonce: eth.QuantityFromUInt64(146),\n\t\tGasPrice: eth.QuantityFromUInt64(3000000000),\n\t\tGas: eth.QuantityFromUInt64(22000),\n\t\tTo: eth.MustAddress(\"0x43700db832E9Ac990D36d6279A846608643c904E\"),\n\t\tValue: eth.QuantityFromUInt64(1000000000),\n\t\tInput: *eth.MustData(\"0x\"),\n\t}\n\n\tsigned, err := tx.Sign(\"fad9c8855b740a0b7ed4c221dbad0f33a83a49cad6b3fe8d5817ac83d38b6a19\", 1)\n\trequire.NoError(t, err)\n\n\tpythonRawTx = strings.ToLower(pythonRawTx)\n\tsigned = strings.ToLower(signed)\n\trequire.Equal(t, signed, pythonRawTx)\n}", "title": "" }, { "docid": "743500d451f6117554585f0bb5b0cd95", "score": "0.50713813", "text": "func (s *Server) SignOutputRaw(ctx context.Context, in *SignReq) (*SignResp, er.R) {\n\n\tswitch {\n\t// If the client doesn't specify a transaction, then there's nothing to\n\t// sign, so we'll exit early.\n\tcase len(in.RawTxBytes) == 0:\n\t\treturn nil, er.Errorf(\"a transaction to sign MUST be \" +\n\t\t\t\"passed in\")\n\n\t// If the client doesn't tell us *how* to sign the transaction, then we\n\t// can't sign anything, so we'll exit early.\n\tcase len(in.SignDescs) == 0:\n\t\treturn nil, er.Errorf(\"at least one SignDescs MUST be \" +\n\t\t\t\"passed in\")\n\t}\n\n\t// Now that we know we have an actual transaction to decode, we'll\n\t// deserialize it into something that we can properly utilize.\n\tvar (\n\t\ttxToSign wire.MsgTx\n\t\terr error\n\t)\n\ttxReader := bytes.NewReader(in.RawTxBytes)\n\tif err := txToSign.Deserialize(txReader); err != nil {\n\t\treturn nil, er.Errorf(\"unable to decode tx: %v\", err)\n\t}\n\n\tsigHashCache := txscript.NewTxSigHashes(&txToSign)\n\n\tlog.Debugf(\"Generating sigs for %v inputs: \", len(in.SignDescs))\n\n\t// With the transaction deserialized, we'll now convert sign descs so\n\t// we can feed it into the actual signer.\n\tsignDescs := make([]*input.SignDescriptor, 0, len(in.SignDescs))\n\tfor _, signDesc := range in.SignDescs {\n\t\tkeyDesc := signDesc.KeyDesc\n\n\t\t// The caller can either specify the key using the raw pubkey,\n\t\t// or the description of the key. We'll still attempt to parse\n\t\t// both if both were provided however, to ensure the underlying\n\t\t// SignOutputRaw has as much information as possible.\n\t\tvar (\n\t\t\ttargetPubKey *btcec.PublicKey\n\t\t\tkeyLoc keychain.KeyLocator\n\t\t)\n\n\t\t// If this method doesn't return nil, then we know that user is\n\t\t// attempting to include a raw serialized pub key.\n\t\tif keyDesc.GetRawKeyBytes() != nil {\n\t\t\ttargetPubKey, err = parseRawKeyBytes(\n\t\t\t\tkeyDesc.GetRawKeyBytes(),\n\t\t\t)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\n\t\t// Similarly, if they specified a key locator, then we'll parse\n\t\t// that as well.\n\t\tif keyDesc.GetKeyLoc() != nil {\n\t\t\tprotoLoc := keyDesc.GetKeyLoc()\n\t\t\tkeyLoc = keychain.KeyLocator{\n\t\t\t\tFamily: keychain.KeyFamily(\n\t\t\t\t\tprotoLoc.KeyFamily,\n\t\t\t\t),\n\t\t\t\tIndex: uint32(protoLoc.KeyIndex),\n\t\t\t}\n\t\t}\n\n\t\t// If a witness script isn't passed, then we can't proceed, as\n\t\t// in the p2wsh case, we can't properly generate the sighash.\n\t\tif len(signDesc.WitnessScript) == 0 {\n\t\t\t// TODO(roasbeef): if regualr p2wkh, then at times\n\t\t\t// internally we allow script to go by\n\t\t\treturn nil, er.Errorf(\"witness script MUST be \" +\n\t\t\t\t\"specified\")\n\t\t}\n\n\t\t// If the users provided a double tweak, then we'll need to\n\t\t// parse that out now to ensure their input is properly signed.\n\t\tvar tweakPrivKey *btcec.PrivateKey\n\t\tif len(signDesc.DoubleTweak) != 0 {\n\t\t\ttweakPrivKey, _ = btcec.PrivKeyFromBytes(\n\t\t\t\tbtcec.S256(), signDesc.DoubleTweak,\n\t\t\t)\n\t\t}\n\n\t\t// Finally, with verification and parsing complete, we can\n\t\t// construct the final sign descriptor to generate the proper\n\t\t// signature for this input.\n\t\tsignDescs = append(signDescs, &input.SignDescriptor{\n\t\t\tKeyDesc: keychain.KeyDescriptor{\n\t\t\t\tKeyLocator: keyLoc,\n\t\t\t\tPubKey: targetPubKey,\n\t\t\t},\n\t\t\tSingleTweak: signDesc.SingleTweak,\n\t\t\tDoubleTweak: tweakPrivKey,\n\t\t\tWitnessScript: signDesc.WitnessScript,\n\t\t\tOutput: &wire.TxOut{\n\t\t\t\tValue: signDesc.Output.Value,\n\t\t\t\tPkScript: signDesc.Output.PkScript,\n\t\t\t},\n\t\t\tHashType: params.SigHashType(signDesc.Sighash),\n\t\t\tSigHashes: sigHashCache,\n\t\t\tInputIndex: int(signDesc.InputIndex),\n\t\t})\n\t}\n\n\t// Now that we've mapped all the proper sign descriptors, we can\n\t// request signatures for each of them, passing in the transaction to\n\t// be signed.\n\tnumSigs := len(in.SignDescs)\n\tresp := &SignResp{\n\t\tRawSigs: make([][]byte, numSigs),\n\t}\n\tfor i, signDesc := range signDescs {\n\t\tsig, err := s.cfg.Signer.SignOutputRaw(&txToSign, signDesc)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"unable to generate sig for input \"+\n\t\t\t\t\"#%v: %v\", i, err)\n\n\t\t\treturn nil, err\n\t\t}\n\n\t\tresp.RawSigs[i] = sig.Serialize()\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "cac315a06ed03329e85aea4323ebe6aa", "score": "0.506466", "text": "func TestPackBitmarkTransferOne(t *testing.T) {\n\n\tissuerAddress := makeAddress(&issuer.publicKey)\n\townerOneAddress := makeAddress(&ownerOne.publicKey)\n\n\tvar link transaction.Link\n\t_, err := fmt.Sscan(\"BMK07504b27872a4c2505318b31ceee477fac73f4bacb2f83e8a6fd7dde85e4897f6\", &link)\n\tif nil != err {\n\t\tt.Errorf(\"hex to link error: %v\", err)\n\t\treturn\n\t}\n\n\tr := transaction.BitmarkTransfer{\n\t\tLink: link,\n\t\tOwner: ownerOneAddress,\n\t}\n\n\texpected := []byte{\n\t\t0x03, 0x20, 0xf6, 0x97, 0x48, 0x5e, 0xe8, 0xdd,\n\t\t0xd7, 0x6f, 0x8a, 0x3e, 0xf8, 0xb2, 0xac, 0x4b,\n\t\t0x3f, 0xc7, 0xfa, 0x77, 0xe4, 0xee, 0x1c, 0xb3,\n\t\t0x18, 0x53, 0x50, 0xc2, 0xa4, 0x72, 0x78, 0xb2,\n\t\t0x04, 0x75, 0x21, 0x13, 0x27, 0x64, 0x0e, 0x4a,\n\t\t0xab, 0x92, 0xd8, 0x7b, 0x4a, 0x6a, 0x2f, 0x30,\n\t\t0xb8, 0x81, 0xf4, 0x49, 0x29, 0xf8, 0x66, 0x04,\n\t\t0x3a, 0x84, 0x1c, 0x38, 0x14, 0xb1, 0x66, 0xb8,\n\t\t0x89, 0x44, 0xb0, 0x92,\n\t}\n\n\texpectedTxId := transaction.Link{\n\t\t0x01, 0xc9, 0x12, 0xe3, 0xa1, 0xe5, 0x0e, 0xde,\n\t\t0x0b, 0xc2, 0xaf, 0x34, 0x86, 0x81, 0x10, 0x64,\n\t\t0x8d, 0x57, 0x75, 0xc2, 0xe4, 0xff, 0xab, 0x6b,\n\t\t0xc5, 0xc6, 0x76, 0x4c, 0x5e, 0x86, 0xfd, 0x0b,\n\t}\n\n\t// manually sign the record and attach signature to \"expected\"\n\tsignature := ed25519.Sign(&issuer.privateKey, expected)\n\tr.Signature = signature[:]\n\tl := util.ToVarint64(uint64(len(signature)))\n\texpected = append(expected, l...)\n\texpected = append(expected, signature[:]...)\n\n\t// test the packer\n\tpacked, err := r.Pack(issuerAddress)\n\tif nil != err {\n\t\tt.Errorf(\"pack error: %v\", err)\n\t}\n\n\t// if either of above fail we will have the message _without_ a signature\n\tif !bytes.Equal(packed, expected) {\n\t\tt.Errorf(\"pack record: %x expected: %x\", packed, expected)\n\t\tt.Errorf(\"*** GENERATED Packed:\\n%s\", formatBytes(\"expected\", packed))\n\t\treturn\n\t}\n\n\t// check txId\n\ttxId := packed.MakeLink()\n\n\tif txId != expectedTxId {\n\t\tt.Errorf(\"pack txId: %#v expected: %x\", txId, expectedTxId)\n\t\tt.Errorf(\"*** GENERATED txId:\\n%s\", formatBytes(\"expectedTxId\", txId.Bytes()))\n\t\treturn\n\t}\n\n\t// test the unpacker\n\tunpacked, err := packed.Unpack()\n\tif nil != err {\n\t\tt.Errorf(\"unpack error: %v\", err)\n\t\treturn\n\t}\n\n\tbmt, ok := unpacked.(*transaction.BitmarkTransfer)\n\tif !ok {\n\t\tt.Errorf(\"did not unpack to BitmarkTransfer\")\n\t\treturn\n\t}\n\n\t// display a JSON version for information\n\titem := struct {\n\t\tHexTxId string\n\t\tTxId transaction.Link\n\t\tBitmarkTransfer *transaction.BitmarkTransfer\n\t}{\n\t\ttxId.String(),\n\t\ttxId,\n\t\tbmt,\n\t}\n\tb, err := json.MarshalIndent(item, \"\", \" \")\n\tif nil != err {\n\t\tt.Errorf(\"json error: %v\", err)\n\t\treturn\n\t}\n\n\tt.Logf(\"Bitmark Transfer: JSON: %s\", b)\n\n\t// check that structure is preserved through Pack/Unpack\n\t// note reg is a pointer here\n\tif !reflect.DeepEqual(r, *bmt) {\n\t\tt.Errorf(\"different, original: %v recovered: %v\", r, *bmt)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "a48d5cc8c90ca815d2274a415d44bf95", "score": "0.50604206", "text": "func TestTxHash(t *testing.T) {\n\t// Hash of first transaction from block 113875.\n\thashStr := \"c1d8974a0fbf004ad6999da3dbf39b94eb8e8cbaf0ee3aca790876525a618d19\"\n\twantHash, err := chainhash.NewHashFromStr(hashStr)\n\tif err != nil {\n\t\tt.Errorf(\"NewHashFromStr: %v\", err)\n\t\treturn\n\t}\n\n\t// First transaction from block 113875.\n\tmsgTx := NewMsgTx(1)\n\ttxIn := TxIn{\n\t\tPreviousOutPoint: OutPoint{\n\t\t\tHash: chainhash.Hash{},\n\t\t\tIndex: 0xffffffff,\n\t\t},\n\t\tSignatureScript: []byte{0x03, 0xd3, 0xbc, 0x01, 0x00, 0x5a, 0x2d, 0x4e, 0x4f, 0x4d, 0x50, 0x21, 0x20, 0x68, 0x74, 0x74, 0x70, 0x73, 0x3a, 0x2f, 0x2f, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x6a, 0x6f, 0x73, 0x68, 0x75, 0x61, 0x79, 0x61, 0x62, 0x75, 0x74, 0x2f, 0x7a, 0x2d, 0x6e, 0x6f, 0x6d, 0x70},\n\t\tSequence: 0xffffffff,\n\t}\n\ttxOut := TxOut{\n\t\tValue: 1143750000,\n\t\tPkScript: []byte{\n\t\t\t0x76, 0xa9, 0x14, 0x8e, 0x03, 0x7e, 0xaf, 0x85, 0x68, 0x18, 0x1b, 0x46, 0x00, 0x83, 0x4b, 0x6a, 0x8d, 0xf4, 0xe1, 0xae, 0x04, 0x92, 0xbf, 0x88, 0xac,\n\t\t},\n\t}\n\ttxOut2 := TxOut{\n\t\tValue: 106250000,\n\t\tPkScript: []byte{\n\t\t\t0xa9, 0x14, 0x50, 0x29, 0x50, 0x8c, 0xb3, 0xc3, 0x1c, 0xc2, 0x06, 0x58, 0x9e, 0x37, 0x34, 0xaa, 0x53, 0x90, 0xf9, 0xac, 0x4c, 0x7e, 0x87,\n\t\t},\n\t}\n\tmsgTx.AddTxIn(&txIn)\n\tmsgTx.AddTxOut(&txOut)\n\tmsgTx.AddTxOut(&txOut2)\n\tmsgTx.LockTime = 0\n\n\t// Ensure the hash produced is expected.\n\ttxHash := msgTx.TxHash()\n\tif !txHash.IsEqual(wantHash) {\n\t\tt.Errorf(\"TxHash: wrong hash - got %v, want %v\",\n\t\t\tspew.Sprint(txHash), spew.Sprint(wantHash))\n\t}\n}", "title": "" }, { "docid": "bb0e09bfb19b595e0a92f31d4695abd5", "score": "0.50493675", "text": "func walletsigncmd(cmd *cobra.Command, args []string) {\n\tif len(args) < 1 {\n\t\tcmd.UsageFunc()(cmd)\n\t\tos.Exit(exitCodeUsage)\n\t}\n\n\ttxn, err := parseTxn(args[0])\n\tif err != nil {\n\t\tdie(\"Could not decode transaction:\", err)\n\t}\n\n\tvar toSign []crypto.Hash\n\tfor _, arg := range args[1:] {\n\t\tindex, err := strconv.ParseUint(arg, 10, 32)\n\t\tif err != nil {\n\t\t\tdie(\"Invalid signature index\", index, \"(must be an non-negative integer)\")\n\t\t} else if index >= uint64(len(txn.TransactionSignatures)) {\n\t\t\tdie(\"Invalid signature index\", index, \"(transaction only has\", len(txn.TransactionSignatures), \"signatures)\")\n\t\t}\n\t\ttoSign = append(toSign, txn.TransactionSignatures[index].ParentID)\n\t}\n\n\t// try API first\n\twspr, err := httpClient.WalletSignPost(txn, toSign)\n\tif err == nil {\n\t\ttxn = wspr.Transaction\n\t} else {\n\t\t// if siad is running, but the wallet is locked, assume the user\n\t\t// wanted to sign with siad\n\t\tif strings.Contains(err.Error(), modules.ErrLockedWallet.Error()) {\n\t\t\tdie(\"Signing via API failed: siad is running, but the wallet is locked.\")\n\t\t}\n\n\t\t// siad is not running; fallback to offline keygen\n\t\twalletsigncmdoffline(&txn, toSign)\n\t}\n\n\tif walletRawTxn {\n\t\tbase64.NewEncoder(base64.StdEncoding, os.Stdout).Write(encoding.Marshal(txn))\n\t} else {\n\t\tjson.NewEncoder(os.Stdout).Encode(txn)\n\t}\n\tfmt.Println()\n}", "title": "" }, { "docid": "1147d2b63b325901eed75a927c7dada8", "score": "0.5033675", "text": "func TestTxHash(t *testing.T) {\n\t// Hash of first transaction from block 113875.\n\thashStr := \"4538fc1618badd058ee88fd020984451024858796be0a1ed111877f887e1bd53\"\n\twantHash, err := chainhash.NewHashFromStr(hashStr)\n\tif err != nil {\n\t\tt.Errorf(\"NewHashFromStr: %v\", err)\n\t\treturn\n\t}\n\n\tmsgTx := NewMsgTx()\n\ttxIn := TxIn{\n\t\tPreviousOutPoint: OutPoint{\n\t\t\tHash: chainhash.Hash{},\n\t\t\tIndex: 0xffffffff,\n\t\t\tTree: TxTreeRegular,\n\t\t},\n\t\tSequence: 0xffffffff,\n\t\tValueIn: 5000000000,\n\t\tBlockHeight: 0x3F3F3F3F,\n\t\tBlockIndex: 0x2E2E2E2E,\n\t\tSignatureScript: []byte{0x04, 0x31, 0xdc, 0x00, 0x1b, 0x01, 0x62},\n\t}\n\ttxOut := TxOut{\n\t\tValue: 5000000000,\n\t\tVersion: 0xf0f0,\n\t\tPkScript: []byte{\n\t\t\t0x41, // OP_DATA_65\n\t\t\t0x04, 0xd6, 0x4b, 0xdf, 0xd0, 0x9e, 0xb1, 0xc5,\n\t\t\t0xfe, 0x29, 0x5a, 0xbd, 0xeb, 0x1d, 0xca, 0x42,\n\t\t\t0x81, 0xbe, 0x98, 0x8e, 0x2d, 0xa0, 0xb6, 0xc1,\n\t\t\t0xc6, 0xa5, 0x9d, 0xc2, 0x26, 0xc2, 0x86, 0x24,\n\t\t\t0xe1, 0x81, 0x75, 0xe8, 0x51, 0xc9, 0x6b, 0x97,\n\t\t\t0x3d, 0x81, 0xb0, 0x1c, 0xc3, 0x1f, 0x04, 0x78,\n\t\t\t0x34, 0xbc, 0x06, 0xd6, 0xd6, 0xed, 0xf6, 0x20,\n\t\t\t0xd1, 0x84, 0x24, 0x1a, 0x6a, 0xed, 0x8b, 0x63,\n\t\t\t0xa6, // 65-byte signature\n\t\t\t0xac, // OP_CHECKSIG\n\t\t},\n\t}\n\tmsgTx.AddTxIn(&txIn)\n\tmsgTx.AddTxOut(&txOut)\n\tmsgTx.LockTime = 0\n\tmsgTx.Expiry = 0\n\n\t// Ensure the hash produced is expected.\n\ttxHash := msgTx.TxHash()\n\tif !txHash.IsEqual(wantHash) {\n\t\tt.Errorf(\"TxHash: wrong hash - got %v, want %v\",\n\t\t\tspew.Sprint(txHash), spew.Sprint(wantHash))\n\t}\n}", "title": "" }, { "docid": "c468432379e0284638a96acbb8a8c674", "score": "0.5012381", "text": "func TestHandlesTSpends(t *testing.T) {\n\tt.Parallel()\n\n\t// Pi private key to use when signing tspends.\n\tpiKey, err := hex.DecodeString(\"62deae1ab2b1ebd96a28c80e870aee325bed359e83d8db2464ef999e616a9eef\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tpiPubKey := secp256k1.PrivKeyFromBytes(piKey).PubKey().SerializeCompressed()\n\n\t// Use the mainnet parameters but replace the Pi key to a simnet one so\n\t// we can sign the tspends.\n\tnet := chaincfg.MainNetParams()\n\tnet.PiKeys = [][]byte{piPubKey, piPubKey}\n\tharness, _, err := newPoolHarness(net)\n\tif err != nil {\n\t\tt.Fatalf(\"unable to create test pool: %v\", err)\n\t}\n\ttc := &testContext{t, harness}\n\n\t// Useful constants.\n\ttvi := net.TreasuryVoteInterval\n\tmul := net.TreasuryVoteIntervalMultiplier\n\n\t// Setup the harness for the test and activate the treasury agenda and\n\t// set the chain height to an appropriate height to add tspends.\n\tharness.SetTreasuryAgendaActive(true)\n\tnextHeight := net.StakeValidationHeight + int64(tvi) - net.StakeValidationHeight%int64(tvi)\n\tharness.chain.SetHeight(nextHeight - 1)\n\n\t// Helper to assert that the TSpendHashes() function returns the\n\t// correct tspends.\n\tassertTSpendHashes := func(tspends []*dcrutil.Tx) {\n\t\tt.Helper()\n\t\ttspendHashes := harness.txPool.TSpendHashes()\n\t\ttspendHashesMap := make(map[chainhash.Hash]struct{}, len(tspendHashes))\n\t\tfor i := 0; i < len(tspendHashes); i++ {\n\t\t\ttspendHashesMap[tspendHashes[i]] = struct{}{}\n\t\t}\n\t\tfor i := 0; i < len(tspends); i++ {\n\t\t\th := tspends[i].MsgTx().TxHash()\n\t\t\tif _, ok := tspendHashesMap[h]; !ok {\n\t\t\t\tt.Fatalf(\"added tspend %d was not returned in TSpendHashes()\", i)\n\t\t\t}\n\t\t\tdelete(tspendHashesMap, h)\n\t\t}\n\t\tif len(tspendHashesMap) > 0 {\n\t\t\tt.Fatalf(\"TSpendHashes() returned extraneous data: %v\", tspendHashesMap)\n\t\t}\n\t}\n\n\t// Helper that adds and asserts the given tspend was added to the\n\t// mempool.\n\tacceptTSpend := func(tx *dcrutil.Tx) {\n\t\tt.Helper()\n\t\t_, err = harness.txPool.ProcessTransaction(tx, true, true, 0)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"ProcessTransaction: failed to accept valid tspend %v\", err)\n\t\t}\n\t\ttestPoolMembership(tc, tx, false, true)\n\t}\n\n\t// Helper that attempts to add and asserts the given tspend is rejected\n\t// with the given error.\n\trejectTSpend := func(tx *dcrutil.Tx, wantErr error) {\n\t\tt.Helper()\n\t\t_, err = harness.txPool.ProcessTransaction(tx, true, true, 0)\n\t\tif !errors.Is(err, wantErr) {\n\t\t\tt.Fatalf(\"Unexpected error while processing rejected tspend. \"+\n\t\t\t\t\"want %v, got %#v\", wantErr, err)\n\t\t}\n\t\ttestPoolMembership(tc, tx, false, false)\n\t}\n\n\t// Calculate an expiry for the tests such that voting starts at the\n\t// next block (which happens to be SVH).\n\texpiry := standalone.CalcTSpendExpiry(nextHeight-int64(tvi), tvi, mul)\n\ttspendAmount := int64(1e8)\n\ttspendFee := int64(2550)\n\n\t// Create a few valid tspends that can enter the mempool. We'll create\n\t// one more than the maximum allowed to test for the correct limit.\n\tconst maxTSpends = 7\n\tconst nbTSpends = maxTSpends + 1\n\ttspends := make([]*dcrutil.Tx, 0, nbTSpends)\n\tfor i := 0; i < nbTSpends; i++ {\n\t\tmsgTx := createTSpend(t, expiry, tspendAmount, tspendFee, piKey)\n\t\ttspends = append(tspends, dcrutil.NewTx(msgTx))\n\t}\n\n\t// Before adding any tspends, TSpendHashes() should not have any\n\t// hashes.\n\tassertTSpendHashes(nil)\n\n\t// Add the maximum amount of tspends the mempool can hold.\n\tfor _, tx := range tspends[:maxTSpends] {\n\t\tacceptTSpend(tx)\n\t}\n\n\t// TSpendHashes() should return the hashes of all tspends so far.\n\tassertTSpendHashes(tspends[:maxTSpends])\n\n\t// The next tspend should be rejected due to exceeding the number of\n\t// maximum tspends in the mempool.\n\trejectTSpend(tspends[maxTSpends], ErrTooManyTSpends)\n\n\t// Remove the first tspend from the mempool and assert TSpendHashes()\n\t// is working as intended.\n\tharness.txPool.RemoveTransaction(tspends[0], true)\n\ttestPoolMembership(tc, tspends[0], false, false)\n\tassertTSpendHashes(tspends[1:maxTSpends])\n\n\t// Add the new tspend.\n\tacceptTSpend(tspends[maxTSpends])\n\tassertTSpendHashes(tspends[1 : maxTSpends+1])\n\n\t// Remove all tspends from the mempool and ensure TSpendHashes() is\n\t// empty again.\n\tfor _, tx := range tspends[1 : maxTSpends+1] {\n\t\tharness.txPool.RemoveTransaction(tx, true)\n\t\ttestPoolMembership(tc, tx, false, false)\n\t}\n\tassertTSpendHashes(nil)\n\n\t// Attempt to add a tspend that was already mined on an ancestor block.\n\t// This should fail.\n\tharness.chain.SetTSpendMinedOnAncestor(tspends[0].MsgTx().TxHash(), true)\n\trejectTSpend(tspends[0], ErrTSpendMinedOnAncestor)\n\n\t// Attempt to add a tspend with an incorrect expiry (not tvi+2). This\n\t// should fail.\n\ttx := tspends[1].MsgTx()\n\ttx.Expiry++\n\ttx.TxIn[0].SignatureScript, err = sign.TSpendSignatureScript(tx, piKey)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\trejectTSpend(tspends[1], ErrTSpendInvalidExpiry)\n\n\t// Attempt to add a tspend with an expiry in the past. This should\n\t// fail.\n\ttx = tspends[1].MsgTx()\n\ttx.Expiry = uint32(tvi)\n\ttx.TxIn[0].SignatureScript, err = sign.TSpendSignatureScript(tx, piKey)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\trejectTSpend(tspends[1], ErrExpired)\n\n\t// Attempt to add a tspend with an expiry in the distant future. This\n\t// should fail. Mempool considers a tspend in the \"distant future\" if\n\t// the block height where it's supposed to start voting is greater than\n\t// twice the total voting interval. To generate such a height we just\n\t// add two tvi*mul interval to the current expiry (which starts voting\n\t// in the next block).\n\ttx = tspends[1].MsgTx()\n\ttx.Expiry = expiry + uint32(tvi*mul*2)\n\ttx.TxIn[0].SignatureScript, err = sign.TSpendSignatureScript(tx, piKey)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\trejectTSpend(tspends[1], ErrTSpendInvalidExpiry)\n\n\t// Attempt to add a tspend with an invalid signature. This should fail.\n\t// Since tspends have sigscripts with a fixed format, we reach in and\n\t// break the signature directly.\n\ttx = tspends[2].MsgTx()\n\ttx.TxIn[0].SignatureScript[1] = ^tx.TxIn[0].SignatureScript[1]\n\trejectTSpend(tspends[2], blockchain.ErrInvalidPiSignature)\n\n\t// Attempt to add a tspend with a valid signature not from a pi key for\n\t// the current network. This should fail.\n\tnonPiKey, err := hex.DecodeString(\"ffff1ab2b1ebd96a28c80e870aee325bed359e83d8db2464ef999e616a0000\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\ttx = tspends[3].MsgTx()\n\ttx.TxIn[0].SignatureScript, err = sign.TSpendSignatureScript(tx, nonPiKey)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\trejectTSpend(tspends[3], blockchain.ErrUnknownPiKey)\n\n\t// Assert the OnTSpendReceived listener is called when a tspend enters\n\t// the mempool.\n\tvar callbackReceived bool\n\ttspendToAdd := tspends[4]\n\tharness.txPool.cfg.OnTSpendReceived = func(tx *dcrutil.Tx) {\n\t\tcallbackReceived = true\n\t\tif tx.MsgTx().TxHash() != tspendToAdd.MsgTx().TxHash() {\n\t\t\tt.Fatalf(\"Received wrong tx in callback. want=%s got=%s\",\n\t\t\t\ttspendToAdd.MsgTx().TxHash(), tx.MsgTx().TxHash())\n\t\t}\n\t}\n\tacceptTSpend(tspends[4])\n\tif !callbackReceived {\n\t\tt.Fatalf(\"OnTSpendReceived callback was not called\")\n\t}\n\tharness.txPool.cfg.OnTSpendReceived = nil\n\n\t// Assert the tspend can enter the mempool up until the last block it\n\t// can be mined. Given we know the expiry for the tspend, figure out\n\t// when voting ends and advance the fake chain to just before that\n\t// height. The tspend can be mined on the block the vote ends, which is\n\t// a TVI block.\n\t_, endVote, err := standalone.CalcTSpendWindow(expiry, tvi, mul)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tharness.chain.SetHeight(int64(endVote - 1))\n\tacceptTSpend(tspends[5])\n}", "title": "" }, { "docid": "d3d9feb9b164025bbf6db1899abb6a52", "score": "0.49770433", "text": "func TestCheckTransactionStandard(t *testing.T) {\n\t// Create some dummy, but otherwise standard, data for transactions.\n\tprevOutHash, err := common.NewHashFromStr(\"01\")\n\tif err != nil {\n\t\tt.Fatalf(\"NewShaHashFromStr: unexpected error: %v\", err)\n\t}\n\tdummyPrevOut := protos.OutPoint{Hash: *prevOutHash, Index: 1}\n\tdummySigScript := bytes.Repeat([]byte{0x00}, 65)\n\tdummyTxIn := protos.TxIn{\n\t\tPreviousOutPoint: dummyPrevOut,\n\t\tSignatureScript: dummySigScript,\n\t\tSequence: protos.MaxTxInSequenceNum,\n\t}\n\taddrHash := [20]byte{0x01}\n\taddr, err := common.NewAddressWithId(common.PubKeyHashAddrID,addrHash[:])\n\tif err != nil {\n\t\tt.Fatalf(\"NewAddressPubKeyHash: unexpected error: %v\", err)\n\t}\n\tdummyPkScript, err := txscript.PayToAddrScript(addr)\n\tif err != nil {\n\t\tt.Fatalf(\"PayToAddrScript: unexpected error: %v\", err)\n\t}\n\tdummyTxOut := protos.TxOut{\n\t\tValue: 100000000,\n\t\tPkScript: dummyPkScript,\n\t}\n\n\ttests := []struct {\n\t\tname string\n\t\ttx protos.MsgTx\n\t\theight int32\n\t\tisStandard bool\n\t\tcode protos.RejectCode\n\t}{\n\t\t{\n\t\t\tname: \"Typical pay-to-pubkey-hash transaction\",\n\t\t\ttx: protos.MsgTx{\n\t\t\t\tVersion: 1,\n\t\t\t\tTxIn: []*protos.TxIn{&dummyTxIn},\n\t\t\t\tTxOut: []*protos.TxOut{&dummyTxOut},\n\t\t\t\tLockTime: 0,\n\t\t\t},\n\t\t\theight: 300000,\n\t\t\tisStandard: true,\n\t\t},\n\t\t{\n\t\t\tname: \"Transaction version too high\",\n\t\t\ttx: protos.MsgTx{\n\t\t\t\tVersion: protos.TxVersion + 1,\n\t\t\t\tTxIn: []*protos.TxIn{&dummyTxIn},\n\t\t\t\tTxOut: []*protos.TxOut{&dummyTxOut},\n\t\t\t\tLockTime: 0,\n\t\t\t},\n\t\t\theight: 300000,\n\t\t\tisStandard: false,\n\t\t\tcode: protos.RejectNonstandard,\n\t\t},\n\t\t{\n\t\t\tname: \"Transaction is not finalized\",\n\t\t\ttx: protos.MsgTx{\n\t\t\t\tVersion: 1,\n\t\t\t\tTxIn: []*protos.TxIn{{\n\t\t\t\t\tPreviousOutPoint: dummyPrevOut,\n\t\t\t\t\tSignatureScript: dummySigScript,\n\t\t\t\t\tSequence: 0,\n\t\t\t\t}},\n\t\t\t\tTxOut: []*protos.TxOut{&dummyTxOut},\n\t\t\t\tLockTime: 300001,\n\t\t\t},\n\t\t\theight: 300000,\n\t\t\tisStandard: false,\n\t\t\tcode: protos.RejectNonstandard,\n\t\t},\n\t\t{\n\t\t\tname: \"Transaction size is too large\",\n\t\t\ttx: protos.MsgTx{\n\t\t\t\tVersion: 1,\n\t\t\t\tTxIn: []*protos.TxIn{&dummyTxIn},\n\t\t\t\tTxOut: []*protos.TxOut{{\n\t\t\t\t\tValue: 0,\n\t\t\t\t\tPkScript: bytes.Repeat([]byte{0x00},\n\t\t\t\t\t\t(maxStandardTxSize/4)+1),\n\t\t\t\t}},\n\t\t\t\tLockTime: 0,\n\t\t\t},\n\t\t\theight: 300000,\n\t\t\tisStandard: false,\n\t\t\tcode: protos.RejectNonstandard,\n\t\t},\n\t\t{\n\t\t\tname: \"Signature script size is too large\",\n\t\t\ttx: protos.MsgTx{\n\t\t\t\tVersion: 1,\n\t\t\t\tTxIn: []*protos.TxIn{{\n\t\t\t\t\tPreviousOutPoint: dummyPrevOut,\n\t\t\t\t\tSignatureScript: bytes.Repeat([]byte{0x00},\n\t\t\t\t\t\tmaxStandardSigScriptSize+1),\n\t\t\t\t\tSequence: protos.MaxTxInSequenceNum,\n\t\t\t\t}},\n\t\t\t\tTxOut: []*protos.TxOut{&dummyTxOut},\n\t\t\t\tLockTime: 0,\n\t\t\t},\n\t\t\theight: 300000,\n\t\t\tisStandard: false,\n\t\t\tcode: protos.RejectNonstandard,\n\t\t},\n\t\t{\n\t\t\tname: \"Signature script that does more than push data\",\n\t\t\ttx: protos.MsgTx{\n\t\t\t\tVersion: 1,\n\t\t\t\tTxIn: []*protos.TxIn{{\n\t\t\t\t\tPreviousOutPoint: dummyPrevOut,\n\t\t\t\t\tSignatureScript: []byte{\n\t\t\t\t\t\ttxscript.OP_CHECKSIGVERIFY},\n\t\t\t\t\tSequence: protos.MaxTxInSequenceNum,\n\t\t\t\t}},\n\t\t\t\tTxOut: []*protos.TxOut{&dummyTxOut},\n\t\t\t\tLockTime: 0,\n\t\t\t},\n\t\t\theight: 300000,\n\t\t\tisStandard: false,\n\t\t\tcode: protos.RejectNonstandard,\n\t\t},\n\t\t{\n\t\t\tname: \"Valid but non standard public key script\",\n\t\t\ttx: protos.MsgTx{\n\t\t\t\tVersion: 1,\n\t\t\t\tTxIn: []*protos.TxIn{&dummyTxIn},\n\t\t\t\tTxOut: []*protos.TxOut{{\n\t\t\t\t\tValue: 100000000,\n\t\t\t\t\tPkScript: []byte{txscript.OP_TRUE},\n\t\t\t\t}},\n\t\t\t\tLockTime: 0,\n\t\t\t},\n\t\t\theight: 300000,\n\t\t\tisStandard: false,\n\t\t\tcode: protos.RejectNonstandard,\n\t\t},\n\t}\n\n\tpastMedianTime := time.Now().Unix()\n\tfor _, test := range tests {\n\t\t// Ensure standardness is as expected.\n\t\terr := checkTransactionStandard(asiutil.NewTx(&test.tx),\n\t\t\ttest.height, pastMedianTime, 1)\n\t\tif err == nil && test.isStandard {\n\t\t\t// Test passes since function returned standard for a\n\t\t\t// transaction which is intended to be standard.\n\t\t\tcontinue\n\t\t}\n\t\tif err == nil && !test.isStandard {\n\t\t\tt.Errorf(\"checkTransactionStandard (%s): standard when \"+\n\t\t\t\t\"it should not be\", test.name)\n\t\t\tcontinue\n\t\t}\n\t\tif err != nil && test.isStandard {\n\t\t\tt.Errorf(\"checkTransactionStandard (%s): nonstandard \"+\n\t\t\t\t\"when it should not be: %v\", test.name, err)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Ensure error type is a TxRuleError inside of a RuleError.\n\t\trerr, ok := err.(RuleError)\n\t\tif !ok {\n\t\t\tt.Errorf(\"checkTransactionStandard (%s): unexpected \"+\n\t\t\t\t\"error type - got %T\", test.name, err)\n\t\t\tcontinue\n\t\t}\n\t\ttxrerr, ok := rerr.Err.(TxRuleError)\n\t\tif !ok {\n\t\t\tt.Errorf(\"checkTransactionStandard (%s): unexpected \"+\n\t\t\t\t\"error type - got %T\", test.name, rerr.Err)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Ensure the reject code is the expected one.\n\t\tif txrerr.RejectCode != test.code {\n\t\t\tt.Errorf(\"checkTransactionStandard (%s): unexpected \"+\n\t\t\t\t\"error code - got %v, want %v\", test.name,\n\t\t\t\ttxrerr.RejectCode, test.code)\n\t\t\tcontinue\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c6c627f4625d72731f3973cf89d3f3a9", "score": "0.49184704", "text": "func TestGetPreciseSigOps(t *testing.T) {\n\tt.Parallel()\n\n\ttests := []struct {\n\t\tname string\n\t\tscriptSig []byte\n\t\tnSigOps int\n\t\terr error\n\t}{\n\t\t{\n\t\t\tname: \"scriptSig doesn't parse\",\n\t\t\tscriptSig: []byte{txscript.OP_PUSHDATA1, 2},\n\t\t\terr: txscript.ErrStackShortScript,\n\t\t},\n\t\t{\n\t\t\tname: \"scriptSig isn't push only\",\n\t\t\tscriptSig: []byte{txscript.OP_1, txscript.OP_DUP},\n\t\t\tnSigOps: 0,\n\t\t},\n\t\t{\n\t\t\tname: \"scriptSig length 0\",\n\t\t\tscriptSig: nil,\n\t\t\tnSigOps: 0,\n\t\t},\n\t\t{\n\t\t\tname: \"No script at the end\",\n\t\t\t// No script at end but still push only.\n\t\t\tscriptSig: []byte{txscript.OP_1, txscript.OP_1},\n\t\t\tnSigOps: 0,\n\t\t},\n\t\t{\n\t\t\tname: \"pushed script doesn't parse\",\n\t\t\tscriptSig: []byte{txscript.OP_DATA_2,\n\t\t\t\ttxscript.OP_PUSHDATA1, 2},\n\t\t\terr: txscript.ErrStackShortScript,\n\t\t},\n\t}\n\n\t// The signature in the p2sh script is nonsensical for the tests since\n\t// this script will never be executed. What matters is that it matches\n\t// the right pattern.\n\tpkScript := mustParseShortForm(\"HASH160 DATA_20 0x433ec2ac1ffa1b7b7d0\" +\n\t\t\"27f564529c57197f9ae88 EQUAL\")\n\tfor _, test := range tests {\n\t\tcount := txscript.GetPreciseSigOpCount(test.scriptSig, pkScript,\n\t\t\ttrue)\n\t\tif count != test.nSigOps {\n\t\t\tt.Errorf(\"%s: expected count of %d, got %d\", test.name,\n\t\t\t\ttest.nSigOps, count)\n\n\t\t}\n\t}\n}", "title": "" }, { "docid": "aaf6470421fc5b12afd42ba1cc53ac99", "score": "0.49030185", "text": "func TestIOTRegistryChaincode(t *testing.T) {\n\t//declaring and initializing variables for all tests\n\tbst := new(IOTRegistry)\n\tstub := shim.NewMockStub(\"IOTRegistry\", bst)\n\n\tnonceBytes1, err := hex.DecodeString(\"1f7b169c846f218ab552fa82fbf86758\")\n\tif err != nil {\n\t\tt.Errorf(\"error decoding nonce hex string in TestIOTRegistryChaincode: %v\", err)\n\t}\n\tnonceBytes2, err := hex.DecodeString(\"bf5c97d2d2a313e4f95957818a7b3edc\")\n\tif err != nil {\n\t\tt.Errorf(\"error decoding nonce hex string in TestIOTRegistryChaincode: %v\", err)\n\t}\n\tnonceBytes3, err := hex.DecodeString(\"a492f2b8a67697c4f91d9b9332e82347\")\n\tif err != nil {\n\t\tt.Errorf(\"error decoding nonce hex string in TestIOTRegistryChaincode: %v\", err)\n\t}\n\tnonceBytes4, err := hex.DecodeString(\"83de17bd7a25e0a9f6813976eadf26de\")\n\tif err != nil {\n\t\tt.Errorf(\"error decoding nonce hex string in TestIOTRegistryChaincode: %v\", err)\n\t}\n\tvar registryTestsSuccess = []registryTest{\n\t\t{ /*private key 1*/ \"94d7fe7308a452fdf019a0424d9c48ba9b66bdbca565c6fa3b1bf9c646ebac20\",\n\t\t\t/*public key 1*/ \"02ca4a8c7dc5090f924cde2264af240d76f6d58a5d2d15c8c5f59d95c70bd9e4dc\",\n\t\t\t\"Alice\", \"test data\", nonceBytes1, \"test spec\", []string{\"Foo\", \"Bar\"}},\n\n\t\t{ /*private key 2*/ \"246d4fa59f0baa3329d3908659936ac2ac9c3539dc925977759cffe3c6316e19\",\n\t\t\t/*public key 2*/ \"03442b817ad2154766a8f5192fc5a7506b7e52cdbf4fcf8e1bc33764698443c3c9\",\n\t\t\t\"Gerald\", \"test data 1\", nonceBytes2, \"test spec 2\", []string{\"one\", \"two\", \"three\"}},\n\n\t\t{ /*private key 3*/ \"166cc93d9eadb573b329b5993b9671f1521679cea90fe52e398e66c1d6373abf\",\n\t\t\t/*public key 3*/ \"02242a1c19bc831cd95a9e5492015043250cbc17d0eceb82612ce08736b8d753a6\",\n\t\t\t\"Bob\", \"test data 2\", nonceBytes3, \"test spec 3\", []string{\"ident4\", \"ident5\", \"ident6\"}},\n\n\t\t{ /*private key 4*/ \"01b756f231c72747e024ceee41703d9a7e3ab3e68d9b73d264a0196bd90acedf\",\n\t\t\t/*public key 4*/ \"020f2b95263c4b3be740b7b3fda4c2f4113621c1a7a360713a2540eeb808519cd6\",\n\t\t\t\"Cassandra\", \"test data 3\", nonceBytes4, \"test spec 4\", []string{\"ident7\", \"ident8\", \"ident9\"}},\n\t}\n\tfor _, test := range registryTestsSuccess {\n\t\terr := registerOwner(t, stub, test.ownerName, test.data, test.privateKeyString, test.pubKeyString)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"%v\\n\", err)\n\t\t\treturn\n\t\t}\n\t\tindex := test.ownerName\n\t\terr = checkQuery(t, stub, \"owner\", index, test)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"%v\\n\", err)\n\t\t}\n\t\terr = registerThing(t, stub, test.nonceBytes, test.identities, test.ownerName, test.specName, test.data, test.privateKeyString)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"%v\\n\", err)\n\t\t}\n\n\t\tindex = hex.EncodeToString(test.nonceBytes)\n\t\terr = checkQuery(t, stub, \"thing\", index, test)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"%v\\n\", err)\n\t\t}\n\t\terr = registerSpec(t, stub, test.specName, test.ownerName, test.data, test.privateKeyString)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"%v\\n\", err)\n\t\t}\n\t\tindex = test.specName\n\t\terr = checkQuery(t, stub, \"spec\", index, test)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"%v\\n\", err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b2b948a56bc9ffc7fa32f859a8a861d0", "score": "0.48974487", "text": "func Test_Validate_UnspentTransactionOutputAddressMatchesSignature(t *testing.T) {\n\n\t// create inputs\n\tvar transaction = &Transaction{\n\t\tID: \"260bb98233c75fad443812c04174f5aeb5e43183ff27877f7f873f9978f8e017\",\n\t\tInputs: []*TransactionInput{\n\t\t\t{\n\t\t\t\tOutputID: \"OutputID\",\n\t\t\t\tOutputIndex: 5,\n\t\t\t\tSignature: \"696e76616c69642d7369676e6174757265\",\n\t\t\t},\n\t\t},\n\t\tOutputs: []*TransactionOutput{\n\t\t\t{\n\t\t\t\tAddress: \"address\",\n\t\t\t\tAmount: 100,\n\t\t\t},\n\t\t},\n\t}\n\tvar unspentTransactionOutputs = []*UnspentTransactionOutput{\n\t\t{\n\t\t\tOutputID: \"OutputID\",\n\t\t\tOutputIndex: 5,\n\t\t\tAddress: testPublicKey,\n\t\t\tAmount: 100,\n\t\t},\n\t}\n\n\t// validate\n\tresult, _ := transaction.IsValid(unspentTransactionOutputs)\n\n\t// result should false\n\tif result {\n\t\tt.Errorf(\"transaction is invalid so result should be false\")\n\t}\n}", "title": "" }, { "docid": "91e472b8e1e1f09a66baf32e7ddcbcef", "score": "0.48961246", "text": "func (cst *consensusSetTester) testSpendSiacoinsBlock() error {\n\t// Create a random destination address for the output in the transaction.\n\tvar destAddr types.UnlockHash\n\t_, err := rand.Read(destAddr[:])\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Create a block containing a transaction with a valid siacoin output.\n\ttxnValue := types.NewCurrency64(1200)\n\ttxnBuilder := cst.wallet.StartTransaction()\n\terr = txnBuilder.FundSiacoins(txnValue)\n\tif err != nil {\n\t\treturn err\n\t}\n\toutputIndex := txnBuilder.AddSiacoinOutput(types.SiacoinOutput{Value: txnValue, UnlockHash: destAddr})\n\ttxnSet, err := txnBuilder.Sign(true)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = cst.tpool.AcceptTransactionSet(txnSet)\n\tif err != nil {\n\t\treturn err\n\t}\n\toutputID := txnSet[len(txnSet)-1].SiacoinOutputID(int(outputIndex))\n\n\t// Mine and apply the block to the consensus set.\n\t_, err = cst.miner.AddBlock()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Find the destAddr among the outputs.\n\tvar found bool\n\tcst.cs.db.forEachSiacoinOutputs(func(id types.SiacoinOutputID, output types.SiacoinOutput) {\n\t\tif id == outputID {\n\t\t\tif found {\n\t\t\t\terr = errors.New(\"output found twice\")\n\t\t\t}\n\t\t\tif output.Value.Cmp(txnValue) != 0 {\n\t\t\t\terr = errors.New(\"output has wrong value\")\n\t\t\t}\n\t\t\tfound = true\n\t\t}\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !found {\n\t\treturn errors.New(\"could not find created siacoin output\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "131467f9cdea9ff48d037b5dd9b4f284", "score": "0.4884693", "text": "func rawTxInSigner(btcTx *wire.MsgTx, idx int, subScript []byte, hashType txscript.SigHashType, btcKey *btcec.PrivateKey, val uint64) ([]byte, error) {\n\tbchTx, err := translateTx(btcTx)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"btc->bch wire.MsgTx translation error: %v\", err)\n\t}\n\n\tbchKey, _ := bchec.PrivKeyFromBytes(bchec.S256(), btcKey.Serialize())\n\n\treturn bchscript.RawTxInECDSASignature(bchTx, idx, subScript, bchscript.SigHashType(uint32(hashType)), bchKey, int64(val))\n}", "title": "" }, { "docid": "41ccb2b247ac745716731831a18e1594", "score": "0.48833886", "text": "func isWitnessTaprootScript(script []byte) bool {\n\treturn extractWitnessV1KeyBytes(script) != nil\n}", "title": "" }, { "docid": "7d826828f6233d8e4286fb65b49e4f17", "score": "0.48733038", "text": "func TestSign(t *testing.T) {\r\n\tt.Parallel()\r\n\r\n\tvar (\r\n\t\t// Testing private methods\r\n\t\ttests = []struct {\r\n\t\t\tinputPrivateKey string\r\n\t\t\tinputAlgorithm Algorithm\r\n\t\t\tinputMessage string\r\n\t\t\texpectedSignature string\r\n\t\t\texpectedNil bool\r\n\t\t\texpectedError bool\r\n\t\t}{\r\n\t\t\t{\r\n\t\t\t\t\"0499f8239bfe10eb0f5e53d543635a423c96529dd85fa4bad42049a0b435ebdd\",\r\n\t\t\t\tBitcoinECDSA,\r\n\t\t\t\texampleMessage,\r\n\t\t\t\t\"HOpsJCCkmIOBs8HJIn3Od7aa/SLycQSsZ5QuLvaSlKobYvxpkE5Lcb4fAFLXp1h5pJTEHtm/SZICybovE8AcpiM=\",\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"80699541455b59a8a8a33b85892319de8b8e8944eb8b48e9467137825ae192e59f01\",\r\n\t\t\t\tPaymail,\r\n\t\t\t\texampleMessage,\r\n\t\t\t\t\"GwJif5FKr6rPpKYghZ7F7Rmaw00q5nWo6NiJOuje+6WBOM6qd8MlVnbWr2mrrA+aaDatHxavR8JTckpSfx1RJ1o=\",\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"\",\r\n\t\t\t\tBitcoinECDSA,\r\n\t\t\t\texampleMessage,\r\n\t\t\t\t\"\",\r\n\t\t\t\tfalse,\r\n\t\t\t\ttrue,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"\",\r\n\t\t\t\tPaymail,\r\n\t\t\t\texampleMessage,\r\n\t\t\t\t\"\",\r\n\t\t\t\tfalse,\r\n\t\t\t\ttrue,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"80699541455b59a8a8a33b85892319de8b8e8944eb8b48e9467137825ae192e59f01\",\r\n\t\t\t\tBitcoinECDSA,\r\n\t\t\t\t\"\",\r\n\t\t\t\t\"G0ttfuC/XKY60ZRFmb12lARUJUekPJ1nD/f0WvJ94bJxT5U3SFHgHaJvAo1r/tVe1E0pMX+IuUxfOWckXdIS7wI=\",\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"00000\",\r\n\t\t\t\tBitcoinECDSA,\r\n\t\t\t\t\"\",\r\n\t\t\t\t\"\",\r\n\t\t\t\tfalse,\r\n\t\t\t\ttrue,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"00000\",\r\n\t\t\t\tPaymail,\r\n\t\t\t\t\"\",\r\n\t\t\t\t\"\",\r\n\t\t\t\tfalse,\r\n\t\t\t\ttrue,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"e83385af76b2b1997326b567461fb73dd9c27eab9e1e86d26779f4650c5f2b75\",\r\n\t\t\t\tBitcoinECDSA,\r\n\t\t\t\texampleMessage,\r\n\t\t\t\t\"G2m+m3KyHeoWcJF7Sj09bzF+td7QjVw+baFJJ3VCTG4qfaMGXtx8roWprfXi5qP7NihY5lkfWCKCngnodWmG104=\",\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"e83385af76b2b1997326b567461fb73dd9c27eab9e1e86d26779f4650c5f2b75\",\r\n\t\t\t\tBitcoinSignedMessage,\r\n\t\t\t\texampleMessage,\r\n\t\t\t\t\"G2m+m3KyHeoWcJF7Sj09bzF+td7QjVw+baFJJ3VCTG4qfaMGXtx8roWprfXi5qP7NihY5lkfWCKCngnodWmG104=\",\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"e83385af76b2b1997326b567461fb73dd9c27eab9e1e86d26779f4650c5f2b75\",\r\n\t\t\t\tPaymail,\r\n\t\t\t\texampleMessage,\r\n\t\t\t\t\"G2m+m3KyHeoWcJF7Sj09bzF+td7QjVw+baFJJ3VCTG4qfaMGXtx8roWprfXi5qP7NihY5lkfWCKCngnodWmG104=\",\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"73646673676572676164666764666761646667616466\",\r\n\t\t\t\tBitcoinECDSA,\r\n\t\t\t\texampleMessage,\r\n\t\t\t\t\"HIRS8UIWLYMwQUaiIDpe0ivhUqQVyHJg1kgOd/rviQJZWe2EFEI7PQblLaZofG+MjLCMbQLxzlV7DOAuFIdxNUc=\",\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"73646673676572676164666764666761646667616466\",\r\n\t\t\t\tBitcoinSignedMessage,\r\n\t\t\t\texampleMessage,\r\n\t\t\t\t\"HIRS8UIWLYMwQUaiIDpe0ivhUqQVyHJg1kgOd/rviQJZWe2EFEI7PQblLaZofG+MjLCMbQLxzlV7DOAuFIdxNUc=\",\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t},\r\n\t\t\t{\r\n\t\t\t\t\"73646673676572676164666764666761646667616466\",\r\n\t\t\t\tPaymail,\r\n\t\t\t\texampleMessage,\r\n\t\t\t\t\"HIRS8UIWLYMwQUaiIDpe0ivhUqQVyHJg1kgOd/rviQJZWe2EFEI7PQblLaZofG+MjLCMbQLxzlV7DOAuFIdxNUc=\",\r\n\t\t\t\tfalse,\r\n\t\t\t\tfalse,\r\n\t\t\t},\r\n\t\t}\r\n\t)\r\n\r\n\t// Run tests\r\n\tfor testNo, test := range tests {\r\n\t\tif a, err := Sign(test.inputPrivateKey, test.inputAlgorithm, test.inputMessage); err != nil && !test.expectedError {\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%s] inputted and error not expected but got: %s\", testNo, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputMessage, err.Error())\r\n\t\t} else if err == nil && test.expectedError {\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%s] inputted and error was expected\", testNo, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputMessage)\r\n\t\t} else if a == nil && !test.expectedNil {\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%s] inputted and nil was not expected (aip)\", testNo, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputMessage)\r\n\t\t} else if a != nil && test.expectedNil {\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%s] inputted and nil was expected (aip)\", testNo, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputMessage)\r\n\t\t} else if a != nil && a.Signature != test.expectedSignature {\r\n\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%s] inputted and expected [%s] but got [%s]\", testNo, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputMessage, test.expectedSignature, a.Signature)\r\n\t\t} else if a != nil && err == nil {\r\n\t\t\t// Test validation - THIS WILL NOT WORK BECAUSE DATA IS NOT SET\r\n\t\t\tif _, err = a.Validate(); err != nil {\r\n\t\t\t\tt.Errorf(\"%d %s Failed: [%s] [%s] [%s] inputted and validation failed: %s\", testNo, t.Name(), test.inputPrivateKey, test.inputAlgorithm, test.inputMessage, err.Error())\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n}", "title": "" }, { "docid": "35f59d6bda74a0fce4ef052d1f7d4e96", "score": "0.48620838", "text": "func (this *WalletGroup) BtcSigntx(ctx *gin.Context) {\n\tret := NewPublciError()\n\tdefer func() {\n\t\tctx.JSON(http.StatusOK, ret.GetResult())\n\t}()\n\ttype Param struct {\n\t\tUid int32 `form:\"uid\" json:\"uid\" binding:\"required\"` // 用户 id\n\t\tTokenId int32 `form:\"token_id\" json:\"token_id\" binding:\"required\"` // 币种ID\n\t\tAddress string `form:\"address\" json:\"address\" binding:\"required\"` // 要发送给的地址\n\t\tAmount string `form:\"amount\" json:\"amount\" binding:\"required\"` //交易总量\n\t\tApplyid int32 `form:\"apply_id\" json:\"amount\" binding:\"required\"` //申请提币id\n\t}\n\tvar param Param\n\tif err := ctx.ShouldBind(&param); err != nil {\n\t\tfmt.Println(err.Error())\n\t\tlog.Errorln(err.Error())\n\t\tret.SetErrCode(ERRCODE_PARAM, GetErrorMessage(ERRCODE_PARAM))\n\t\treturn\n\t}\n\trsp, err := rpc.InnerService.WalletSevice.CallBtcSigntx(&proto.BtcSigntxRequest{\n\t\tUid: param.Uid,\n\t\tTokenid: param.TokenId,\n\t\tAddress: param.Address,\n\t\tAmount: param.Amount,\n\t\tApplyid: param.Applyid,\n\t})\n\tif err != nil {\n\t\tlog.Errorln(err.Error())\n\t\tret.SetErrCode(ERRCODE_UNKNOWN, GetErrorMessage(ERRCODE_UNKNOWN))\n\t\treturn\n\t} else {\n\t\tfmt.Println(rsp.Data)\n\t\t//ret.SetDataValue(\"\"rsp.Data)\n\t\tret.SetDataSection(\"txhash\", rsp.Data)\n\t\tret.SetErrCode(rsp.Code, GetErrorMessage(rsp.Code))\n\t}\n\n}", "title": "" }, { "docid": "ecc6a1fcca15d4d30bb6a2821fe90401", "score": "0.484814", "text": "func TestUtxoViewpointCoInputOfDoubleSpend(t *testing.T) {\n\tdag, teardownFunc, err := chainSetup(\"utxoviewpoint_coinputofdoublespend\",\n\t\t&chaincfg.SimNetParams)\n\tif err != nil {\n\t\tt.Errorf(\"Failed to setup dag instance: %v\", err)\n\t\treturn\n\t}\n\tdefer teardownFunc()\n\n\t// Since we're not dealing with the real block dag, set the coinbase\n\t// maturity to 1.\n\tdag.TstSetCoinbaseMaturity(1)\n\n\tblock1 := createMsgBlockForTest(1,\n\t\ttime.Now().Unix() - 1000,\n\t\t[]*wire.MsgBlock{chaincfg.SimNetParams.GenesisBlock},\n\t\tnil)\n\taddBlockForTest(dag, block1, t)\n\n\tblock2 := createMsgBlockForTest(2,\n\t\ttime.Now().Unix() - 900,\n\t\t[]*wire.MsgBlock{block1},\n\t\tnil)\n\taddBlockForTest(dag, block2, t)\n\n\tblock3 := createMsgBlockForTest(3,\n\t\ttime.Now().Unix() - 800,\n\t\t[]*wire.MsgBlock{block2},\n\t\tnil)\n\taddBlockForTest(dag, block3, t)\n\n\n\tcbTx := block1.Transactions[0]\n\tcbTxHash := cbTx.TxHash()\n\tcbOutpoint := wire.NewOutPoint(&cbTxHash, uint32(0))\n\n\tcbTx2 := block2.Transactions[0]\n\tcbTx2Hash := cbTx2.TxHash()\n\tcbOutpoint2 := wire.NewOutPoint(&cbTx2Hash, uint32(0))\n\n\ttx := createSpendTxForTest([]*wire.OutPoint{cbOutpoint}, soterutil.Amount(1000), soterutil.Amount(10))\n\n\t// block A using cb tx\n\tblockA := createMsgBlockForTest(4,\n\t\ttime.Now().Unix() - 700,\n\t\t[]*wire.MsgBlock{block3},\n\t\t[]*wire.MsgTx{tx})\n\taddBlockForTest(dag, blockA, t)\n\n\ttx2 := createSpendTxForTest([]*wire.OutPoint{cbOutpoint, cbOutpoint2}, soterutil.Amount(5000), soterutil.Amount(10))\n\t//tx2Hash := tx2.TxHash()\n\t// block B using cb tx\n\tblockB := createMsgBlockForTest(4,\n\t\ttime.Now().Unix() - 600,\n\t\t[]*wire.MsgBlock{block3},\n\t\t[]*wire.MsgTx{tx2})\n\n\t_, err = addBlockForTest(dag, blockB, t)\n\tif err != nil {\n\t\tt.Errorf(\"Error adding block B: %v\\n\", err)\n\t\treturn\n\t}\n\n\torder := []chainhash.Hash{\n\t\tchaincfg.SimNetParams.GenesisBlock.BlockHash(),\n\t\tblock1.BlockHash(),\n\t\tblock2.BlockHash(),\n\t\tblockA.BlockHash(),\n\t\tblockB.BlockHash()}\n\n\tnewView := NewUtxoViewpoint()\n\n\tfor _, hash := range order {\n\t\tsoterBlock, err := dag.BlockByHash(&hash)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"BlockByHash error: %v\", err)\n\t\t\treturn\n\t\t}\n\t\terr = newView.connectTransactionsForSorting(soterBlock, nil, dag.chainParams)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Connect transactions for sorting error: %v\", err)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// double spend tx should not go through,\n\t// input should be unspent\n\tentryCB2 := newView.LookupEntry(*cbOutpoint2)\n\tif entryCB2 == nil {\n\t\tt.Errorf(\"CB from block 2 output should exist in view\")\n\t} else if entryCB2.IsSpent() || entryCB2.IsIgnored() {\n\t\tt.Errorf(\"CB from block 2 not spent and should be spendable in view\")\n\t}\n}", "title": "" }, { "docid": "03ac186ddd86eb8d4a49261169ef4fba", "score": "0.48478258", "text": "func TestParse_ParseEthKeystorePathValidFile(t *testing.T) {\n\tassert := assert.New(t)\n\ttempDir := t.TempDir()\n\n\t//Test without 0x in address\n\tvar addr = \"0000000000000000000000000000000000000001\"\n\tvar fname = \"UTC--2023-01-05T00-46-15.503776013Z--\" + addr\n\tfile1, err := os.CreateTemp(tempDir, fname)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer os.Remove(fname)\n\tfile1.WriteString(\"{\\\"address\\\":\\\"\" + addr + \"\\\",\\\"crypto\\\":{\\\"cipher\\\":\\\"1\\\",\\\"ciphertext\\\":\\\"1\\\",\\\"cipherparams\\\":{\\\"iv\\\":\\\"1\\\"},\\\"kdf\\\":\\\"scrypt\\\",\\\"kdfparams\\\":{\\\"dklen\\\":32,\\\"n\\\":1,\\\"p\\\":1,\\\"r\\\":8,\\\"salt\\\":\\\"1\\\"},\\\"mac\\\":\\\"1\\\"},\\\"id\\\":\\\"1\\\",\\\"version\\\":3}\")\n\n\tvar keystoreInfo keystorePath\n\tkeystoreInfo, _ = parseEthKeystorePath(file1.Name())\n\n\tassert.Empty(keystoreInfo.path)\n\tassert.NotEmpty(keystoreInfo.address)\n\tassert.True(ethcommon.BytesToAddress(ethcommon.FromHex(addr)) == keystoreInfo.address)\n\tassert.True(err == nil)\n\n\t//Test with 0x in address\n\tvar hexAddr = \"0x0000000000000000000000000000000000000001\"\n\tvar fname2 = \"UTC--2023-01-05T00-46-15.503776013Z--\" + hexAddr\n\tfile2, err := os.CreateTemp(tempDir, fname2)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer os.Remove(fname2)\n\tfile2.WriteString(\"{\\\"address\\\":\\\"\" + addr + \"\\\",\\\"crypto\\\":{\\\"cipher\\\":\\\"1\\\",\\\"ciphertext\\\":\\\"1\\\",\\\"cipherparams\\\":{\\\"iv\\\":\\\"1\\\"},\\\"kdf\\\":\\\"scrypt\\\",\\\"kdfparams\\\":{\\\"dklen\\\":32,\\\"n\\\":1,\\\"p\\\":1,\\\"r\\\":8,\\\"salt\\\":\\\"1\\\"},\\\"mac\\\":\\\"1\\\"},\\\"id\\\":\\\"1\\\",\\\"version\\\":3}\")\n\n\tkeystoreInfo, _ = parseEthKeystorePath(file1.Name())\n\tassert.Empty(keystoreInfo.path)\n\tassert.NotEmpty(keystoreInfo.address)\n\tassert.True(ethcommon.BytesToAddress(ethcommon.FromHex(addr)) == keystoreInfo.address)\n\tassert.True(err == nil)\n}", "title": "" }, { "docid": "7ea5812d8e34ef0ea493aba9722714ff", "score": "0.48435894", "text": "func (cst *consensusSetTester) testSpendSiafundsBlock() error {\n\t// Create a destination for the siafunds.\n\tvar destAddr types.UnlockHash\n\t_, err := rand.Read(destAddr[:])\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Find the siafund output that is 'anyone can spend' (output exists only\n\t// in the testing setup).\n\tvar srcID types.SiafundOutputID\n\tvar srcValue types.Currency\n\tanyoneSpends := types.UnlockConditions{}.UnlockHash()\n\tcst.cs.db.forEachSiafundOutputs(func(id types.SiafundOutputID, sfo types.SiafundOutput) {\n\t\tif sfo.UnlockHash == anyoneSpends {\n\t\t\tsrcID = id\n\t\t\tsrcValue = sfo.Value\n\t\t}\n\t})\n\n\t// Create a transaction that spends siafunds.\n\ttxn := types.Transaction{\n\t\tSiafundInputs: []types.SiafundInput{{\n\t\t\tParentID: srcID,\n\t\t\tUnlockConditions: types.UnlockConditions{},\n\t\t}},\n\t\tSiafundOutputs: []types.SiafundOutput{\n\t\t\t{\n\t\t\t\tValue: srcValue.Sub(types.NewCurrency64(1)),\n\t\t\t\tUnlockHash: types.UnlockConditions{}.UnlockHash(),\n\t\t\t},\n\t\t\t{\n\t\t\t\tValue: types.NewCurrency64(1),\n\t\t\t\tUnlockHash: destAddr,\n\t\t\t},\n\t\t},\n\t}\n\tsfoid0 := txn.SiafundOutputID(0)\n\tsfoid1 := txn.SiafundOutputID(1)\n\tcst.tpool.AcceptTransactionSet([]types.Transaction{txn})\n\n\t// Mine a block containing the txn.\n\t_, err = cst.miner.AddBlock()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Check that the input got consumed, and that the outputs got created.\n\texists := cst.cs.db.inSiafundOutputs(srcID)\n\tif exists {\n\t\treturn errors.New(\"siafund output was not properly consumed\")\n\t}\n\texists = cst.cs.db.inSiafundOutputs(sfoid0)\n\tif !exists {\n\t\treturn errors.New(\"siafund output was not properly created\")\n\t}\n\tsfo := cst.cs.db.getSiafundOutputs(sfoid0)\n\tif sfo.Value.Cmp(srcValue.Sub(types.NewCurrency64(1))) != 0 {\n\t\treturn errors.New(\"created siafund has wrong value\")\n\t}\n\tif sfo.UnlockHash != anyoneSpends {\n\t\treturn errors.New(\"siafund output sent to wrong unlock hash\")\n\t}\n\texists = cst.cs.db.inSiafundOutputs(sfoid1)\n\tif !exists {\n\t\treturn errors.New(\"second siafund output was not properly created\")\n\t}\n\tsfo = cst.cs.db.getSiafundOutputs(sfoid1)\n\tif sfo.Value.Cmp(types.NewCurrency64(1)) != 0 {\n\t\treturn errors.New(\"second siafund output has wrong value\")\n\t}\n\tif sfo.UnlockHash != destAddr {\n\t\treturn errors.New(\"second siafund output sent to wrong addr\")\n\t}\n\n\t// Put a file contract into the blockchain that will add values to siafund\n\t// outputs.\n\tvar siafundPool types.Currency\n\terr = cst.cs.db.Update(func(tx *bolt.Tx) error {\n\t\tsiafundPool = getSiafundPool(tx)\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\toldSiafundPool := siafundPool\n\tpayout := types.NewCurrency64(400e6)\n\tfc := types.FileContract{\n\t\tWindowStart: cst.cs.height() + 2,\n\t\tWindowEnd: cst.cs.height() + 4,\n\t\tPayout: payout,\n\t}\n\toutputSize := payout.Sub(fc.Tax())\n\tfc.ValidProofOutputs = []types.SiacoinOutput{{Value: outputSize}}\n\tfc.MissedProofOutputs = []types.SiacoinOutput{{Value: outputSize}}\n\n\t// Create and fund a transaction with a file contract.\n\ttxnBuilder := cst.wallet.StartTransaction()\n\terr = txnBuilder.FundSiacoins(payout)\n\tif err != nil {\n\t\treturn err\n\t}\n\ttxnBuilder.AddFileContract(fc)\n\ttxnSet, err := txnBuilder.Sign(true)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = cst.tpool.AcceptTransactionSet(txnSet)\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = cst.miner.AddBlock()\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = cst.cs.db.Update(func(tx *bolt.Tx) error {\n\t\tsiafundPool = getSiafundPool(tx)\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tif siafundPool.Cmp(types.NewCurrency64(15600e3).Add(oldSiafundPool)) != 0 {\n\t\treturn errors.New(\"siafund pool did not update correctly\")\n\t}\n\n\t// Create a transaction that spends siafunds.\n\tvar claimDest types.UnlockHash\n\t_, err = rand.Read(claimDest[:])\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar srcClaimStart types.Currency\n\tcst.cs.db.forEachSiafundOutputs(func(id types.SiafundOutputID, sfo types.SiafundOutput) {\n\t\tif sfo.UnlockHash == anyoneSpends {\n\t\t\tsrcID = id\n\t\t\tsrcValue = sfo.Value\n\t\t\tsrcClaimStart = sfo.ClaimStart\n\t\t}\n\t})\n\ttxn = types.Transaction{\n\t\tSiafundInputs: []types.SiafundInput{{\n\t\t\tParentID: srcID,\n\t\t\tUnlockConditions: types.UnlockConditions{},\n\t\t\tClaimUnlockHash: claimDest,\n\t\t}},\n\t\tSiafundOutputs: []types.SiafundOutput{\n\t\t\t{\n\t\t\t\tValue: srcValue.Sub(types.NewCurrency64(1)),\n\t\t\t\tUnlockHash: types.UnlockConditions{}.UnlockHash(),\n\t\t\t},\n\t\t\t{\n\t\t\t\tValue: types.NewCurrency64(1),\n\t\t\t\tUnlockHash: destAddr,\n\t\t\t},\n\t\t},\n\t}\n\tsfoid1 = txn.SiafundOutputID(1)\n\tcst.tpool.AcceptTransactionSet([]types.Transaction{txn})\n\t_, err = cst.miner.AddBlock()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Find the siafund output and check that it has the expected number of\n\t// siafunds.\n\terr = cst.cs.db.Update(func(tx *bolt.Tx) error {\n\t\tsiafundPool = getSiafundPool(tx)\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tfound := false\n\texpectedBalance := siafundPool.Sub(srcClaimStart).Div(types.NewCurrency64(10e3)).Mul(srcValue)\n\tcst.cs.db.forEachDelayedSiacoinOutputsHeight(cst.cs.height()+types.MaturityDelay, func(id types.SiacoinOutputID, output types.SiacoinOutput) {\n\t\tif output.UnlockHash == claimDest {\n\t\t\tfound = true\n\t\t\tif output.Value.Cmp(expectedBalance) != 0 {\n\t\t\t\t// err is scoped outside this func\n\t\t\t\terr = errors.New(\"siafund output has the wrong balance\")\n\t\t\t}\n\t\t}\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !found {\n\t\treturn errors.New(\"could not find siafund claim output\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c80efd98d2488983999667479a29df5e", "score": "0.48424208", "text": "func TestPrivateValidBase58(t *testing.T) {\nloop:\n\tfor index, test := range testPrivateKey {\n\t\tprv, err := account.PrivateKeyFromBase58(test.base58PrivateKey)\n\t\tif nil != err {\n\t\t\tt.Errorf(\"%d: from base58 error: %s\", index, err)\n\t\t\tcontinue loop\n\t\t}\n\t\tif prv.KeyType() != test.algorithm {\n\t\t\tt.Errorf(\"%d: from base58 type: %d expected: %d\", index, prv.KeyType(), test.algorithm)\n\t\t}\n\t\tif !bytes.Equal(prv.PrivateKeyBytes(), test.privateKey) {\n\t\t\tt.Errorf(\"%d: from base58 pubkey: %x expected %x\", index, prv.PrivateKeyBytes(), test.privateKey)\n\t\t}\n\t\tif prv.String() != test.base58PrivateKey {\n\t\t\tt.Errorf(\"%d: to base58: got: %s expected %s\", index, prv, test.base58PrivateKey)\n\t\t}\n\n\t\t// test unmarshal JSON\n\t\tj := `\"` + test.base58PrivateKey + `\"`\n\t\tvar a account.PrivateKey\n\t\terr = json.Unmarshal([]byte(j), &a)\n\t\tif nil != err {\n\t\t\tt.Errorf(\"%d: from JSON string error: %s\", index, err)\n\t\t\tcontinue loop\n\t\t}\n\t\tt.Logf(\"%d: from JSON: %#v\", index, a)\n\n\t\tbuffer, _ := json.Marshal(a)\n\t\tt.Logf(\"%d: privateKey to JSON: %s\", index, buffer)\n\t\tif j != string(buffer) {\n\t\t\tt.Errorf(\"%d: marshal JSON:failed: expected %s actual: %s\", index, j, buffer)\n\t\t}\n\n\t}\n}", "title": "" }, { "docid": "1fd2eced5f014376c17830ff4d6915d0", "score": "0.48414165", "text": "func SignRawTransaction(c context.Context, passphrase string, rawTxHexString string) (string, error) {\n\t// Convert the hex string to a byte array\n\ttxBytes, err := hex.DecodeString(rawTxHexString)\n\tif err != nil {\n\t\tlog.FluentfContext(consts.LOGERROR, c, \"Error in DecodeString(): %s\", err.Error())\n\t\treturn \"\", err\n\t}\n\n\t//\tlog.Printf(\"Unsigned tx: %s\", rawTxHexString)\n\n\t// Deserialise the transaction\n\ttx, err := btcutil.NewTxFromBytes(txBytes)\n\tif err != nil {\n\t\tlog.FluentfContext(consts.LOGERROR, c, \"Error in NewTxFromBytes(): %s\", err.Error())\n\t\treturn \"\", err\n\t}\n\t//\tlog.Printf(\"Deserialised ok!: %+v\", tx)\n\n\tmsgTx := tx.MsgTx()\n\tredeemTx := wire.NewMsgTx() // Create a new transaction and copy the details from the tx that was serialised. For some reason BTCD can't sign in place transactions\n\t//\tlog.Printf(\"MsgTx: %+v\", msgTx)\n\t//\tlog.Printf(\"Number of txes in: %d\\n\", len(msgTx.TxIn))\n\tfor i := 0; i <= len(msgTx.TxIn)-1; i++ {\n\t\t//\t\tlog.Printf(\"MsgTx.TxIn[%d]:\\n\", i)\n\t\t//\t\tlog.Printf(\"TxIn[%d].PreviousOutPoint.Hash: %s\\n\", i, msgTx.TxIn[i].PreviousOutPoint.Hash)\n\t\t//\t\tlog.Printf(\"TxIn[%d].PreviousOutPoint.Index: %d\\n\", i, msgTx.TxIn[i].PreviousOutPoint.Index)\n\t\t//\t\tlog.Printf(\"TxIn[%d].SignatureScript: %s\\n\", i, hex.EncodeToString(msgTx.TxIn[i].SignatureScript))\n\t\tscript := msgTx.TxIn[i].SignatureScript\n\n\t\t// Following block is for debugging only\n\t\t//\t\tdisasm, err := txscript.DisasmString(script)\n\t\t//\t\tif err != nil {\n\t\t//\t\t\treturn \"\", err\n\t\t//\t\t}\n\t\t//\t\tlog.Printf(\"TxIn[%d] Script Disassembly: %s\", i, disasm)\n\n\t\t// Extract and print details from the script.\n\t\t// next line is for debugging only\n\t\t//\t\tscriptClass, addresses, reqSigs, err := txscript.ExtractPkScriptAddrs(script, &chaincfg.MainNetParams)\n\t\tscriptClass, _, _, err := txscript.ExtractPkScriptAddrs(script, &chaincfg.MainNetParams)\n\t\tif err != nil {\n\t\t\tlog.FluentfContext(consts.LOGERROR, c, \"Error in ExtractPkScriptAddrs(): %s\", err.Error())\n\t\t\treturn \"\", err\n\t\t}\n\n\t\t// This function only supports pubkeyhash signing at this time (ie not multisig or P2SH)\n\t\t//\t\tlog.Printf(\"TxIn[%d] Script Class: %s\\n\", i, scriptClass)\n\t\tif scriptClass.String() != \"pubkeyhash\" {\n\t\t\treturn \"\", errors.New(\"Counterparty_SignRawTransaction() currently only supports pubkeyhash script signing. However, the script type in the TX to sign was: \" + scriptClass.String())\n\t\t}\n\n\t\t//\t\tlog.Printf(\"TxIn[%d] Addresses: %s\\n\", i, addresses)\n\t\t//\t\tlog.Printf(\"TxIn[%d] Required Signatures: %d\\n\", i, reqSigs)\n\n\t\t// Build txIn for new redeeming transaction\n\t\tprevOut := wire.NewOutPoint(&msgTx.TxIn[i].PreviousOutPoint.Hash, msgTx.TxIn[i].PreviousOutPoint.Index)\n\t\ttxIn := wire.NewTxIn(prevOut, nil)\n\t\tredeemTx.AddTxIn(txIn)\n\t}\n\n\t// Copy TxOuts from serialised tx\n\tfor _, txOut := range msgTx.TxOut {\n\t\tout := txOut\n\t\tredeemTx.AddTxOut(out)\n\t}\n\n\t// Callback to look up the signing key\n\tlookupKey := func(a btcutil.Address) (*btcec.PrivateKey, bool, error) {\n\t\taddress := a.String()\n\n\t\t//\t\tlog.Printf(\"Looking up the private key for: %s\\n\", address)\n\t\tprivateKeyString, err := counterpartycrypto.GetPrivateKey(passphrase, address)\n\t\tif err != nil {\n\t\t\tlog.FluentfContext(consts.LOGERROR, c, \"Error in counterpartycrypto.GetPrivateKey(): %s\", err.Error())\n\t\t\treturn nil, false, nil\n\t\t}\n\t\t//\t\tlog.Printf(\"Private key retrieved!\\n\")\n\n\t\tprivateKeyBytes, err := hex.DecodeString(privateKeyString)\n\t\tif err != nil {\n\t\t\tlog.FluentfContext(consts.LOGERROR, c, \"Error in DecodeString(): %s\", err.Error())\n\t\t\treturn nil, false, nil\n\t\t}\n\n\t\tprivKey, _ := btcec.PrivKeyFromBytes(btcec.S256(), privateKeyBytes)\n\n\t\treturn privKey, true, nil\n\t}\n\n\t// Range over TxIns and sign\n\tfor i, _ := range redeemTx.TxIn {\n\t\t// Get the sigscript\n\t\t// Notice that the script database parameter is nil here since it isn't\n\t\t// used. It must be specified when pay-to-script-hash transactions are\n\t\t// being signed.\n\t\tsigScript, err := txscript.SignTxOutput(&chaincfg.MainNetParams, redeemTx, i, msgTx.TxIn[i].SignatureScript, txscript.SigHashAll, txscript.KeyClosure(lookupKey), nil, nil)\n\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\n\t\t// Copy the signed sigscript into the redeeming tx\n\t\tredeemTx.TxIn[i].SignatureScript = sigScript\n\t\t//\t\tlog.Println(hex.EncodeToString(sigScript))\n\t}\n\n\t// Prove that the transaction has been validly signed by executing the\n\t// script pair.\n\t//\tlog.Println(\"Checking signature(s)\")\n\tflags := txscript.ScriptBip16 | txscript.ScriptVerifyDERSignatures | txscript.ScriptStrictMultiSig | txscript.ScriptDiscourageUpgradableNops | txscript.ScriptVerifyLowS | txscript.ScriptVerifyCleanStack | txscript.ScriptVerifyMinimalData | txscript.ScriptVerifySigPushOnly | txscript.ScriptVerifyStrictEncoding\n\tvar buildError string\n\tfor i, _ := range redeemTx.TxIn {\n\t\tvm, err := txscript.NewEngine(msgTx.TxIn[i].SignatureScript, redeemTx, i, flags)\n\t\tif err != nil {\n\t\t\tbuildError += \"NewEngine() error: \" + err.Error() + \",\"\n\t\t}\n\n\t\tif err := vm.Execute(); err != nil {\n\t\t\tbuildError += \"TxIn[\" + strconv.Itoa(i) + \"]: \" + err.Error() + \", \"\n\t\t} else {\n\t\t\t// Signature verified\n\t\t\t//\t\t\tlog.Printf(\"TxIn[%d] ok!\\n\", i)\n\t\t}\n\t}\n\tif len(buildError) > 0 {\n\t\treturn \"\", errors.New(buildError)\n\t}\n\t//\tlog.Println(\"Transaction successfully signed\")\n\n\t// Encode the struct into BTC bytes wire format\n\tvar byteBuffer bytes.Buffer\n\tencodeError := redeemTx.BtcEncode(&byteBuffer, wire.ProtocolVersion)\n\tif encodeError != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Encode bytes to hex string\n\tpayloadBytes := byteBuffer.Bytes()\n\tpayloadHexString := hex.EncodeToString(payloadBytes)\n\t//\tlog.Printf(\"Signed and encoded transaction: %s\\n\", payloadHexString)\n\n\treturn payloadHexString, nil\n}", "title": "" }, { "docid": "c5b2ec2efe54098c54541a98783389c7", "score": "0.48404956", "text": "func TestPackBitmarkIssue(t *testing.T) {\n\n\tissuerAddress := makeAddress(&issuer.publicKey)\n\n\tvar asset transaction.AssetIndex\n\t_, err := fmt.Sscan(\"BMA04473fb34cc05ed9599935a0098ce060dfa546f40932dd7b40d35f8fe5cd6a4ff26f3dbf8ffc86ee8eb6480facfd83f3e20d69bf1e764a59256cf79b89531de37\", &asset)\n\tif nil != err {\n\t\tt.Errorf(\"hex to link error: %v\", err)\n\t\treturn\n\t}\n\n\tr := transaction.BitmarkIssue{\n\t\tAssetIndex: asset,\n\t\tOwner: issuerAddress,\n\t\tNonce: 99,\n\t}\n\n\texpected := []byte{\n\t\t0x02, 0x40, 0x37, 0xde, 0x31, 0x95, 0xb8, 0x79,\n\t\t0xcf, 0x56, 0x92, 0xa5, 0x64, 0xe7, 0xf1, 0x9b,\n\t\t0xd6, 0x20, 0x3e, 0x3f, 0xd8, 0xcf, 0xfa, 0x80,\n\t\t0x64, 0xeb, 0xe8, 0x6e, 0xc8, 0xff, 0xf8, 0xdb,\n\t\t0xf3, 0x26, 0xff, 0xa4, 0xd6, 0x5c, 0xfe, 0xf8,\n\t\t0x35, 0x0d, 0xb4, 0xd7, 0x2d, 0x93, 0x40, 0x6f,\n\t\t0x54, 0xfa, 0x0d, 0x06, 0xce, 0x98, 0x00, 0x5a,\n\t\t0x93, 0x99, 0x95, 0xed, 0x05, 0xcc, 0x34, 0xfb,\n\t\t0x73, 0x44, 0x21, 0x13, 0x9f, 0xc4, 0x86, 0xa2,\n\t\t0x53, 0x4f, 0x17, 0xe3, 0x67, 0x07, 0xfa, 0x4b,\n\t\t0x95, 0x3e, 0x3b, 0x34, 0x00, 0xe2, 0x72, 0x9f,\n\t\t0x65, 0x61, 0x16, 0xdd, 0x7b, 0x01, 0x8d, 0xf3,\n\t\t0x46, 0x98, 0xbd, 0xc2, 0x63,\n\t}\n\n\texpectedTxId := transaction.Link{\n\t\t0xf6, 0x97, 0x48, 0x5e, 0xe8, 0xdd, 0xd7, 0x6f,\n\t\t0x8a, 0x3e, 0xf8, 0xb2, 0xac, 0x4b, 0x3f, 0xc7,\n\t\t0xfa, 0x77, 0xe4, 0xee, 0x1c, 0xb3, 0x18, 0x53,\n\t\t0x50, 0xc2, 0xa4, 0x72, 0x78, 0xb2, 0x04, 0x75,\n\t}\n\n\t// manually sign the record and attach signature to \"expected\"\n\tsignature := ed25519.Sign(&issuer.privateKey, expected)\n\tr.Signature = signature[:]\n\tl := util.ToVarint64(uint64(len(signature)))\n\texpected = append(expected, l...)\n\texpected = append(expected, signature[:]...)\n\n\t// test the packer\n\tpacked, err := r.Pack(issuerAddress)\n\tif nil != err {\n\t\tt.Errorf(\"pack error: %v\", err)\n\t}\n\n\t// if either of above fail we will have the message _without_ a signature\n\tif !bytes.Equal(packed, expected) {\n\t\tt.Errorf(\"pack record: %x expected: %x\", packed, expected)\n\t\tt.Errorf(\"*** GENERATED Packed:\\n%s\", formatBytes(\"expected\", packed))\n\t\treturn\n\t}\n\n\t// check txId\n\ttxId := packed.MakeLink()\n\n\tif txId != expectedTxId {\n\t\tt.Errorf(\"pack tx id: %#v expected: %x\", txId, expectedTxId)\n\t\tt.Errorf(\"*** GENERATED tx id:\\n%s\", formatBytes(\"expectedTxId\", txId.Bytes()))\n\t\treturn\n\t}\n\n\t// test the unpacker\n\tunpacked, err := packed.Unpack()\n\tif nil != err {\n\t\tt.Errorf(\"unpack error: %v\", err)\n\t\treturn\n\t}\n\n\tbmt, ok := unpacked.(*transaction.BitmarkIssue)\n\tif !ok {\n\t\tt.Errorf(\"did not unpack to BitmarkIssue\")\n\t\treturn\n\t}\n\n\t// display a JSON version for information\n\titem := struct {\n\t\tHexTxId string\n\t\tTxId transaction.Link\n\t\tBitmarkIssue *transaction.BitmarkIssue\n\t}{\n\t\ttxId.String(),\n\t\ttxId,\n\t\tbmt,\n\t}\n\tb, err := json.MarshalIndent(item, \"\", \" \")\n\tif nil != err {\n\t\tt.Errorf(\"json error: %v\", err)\n\t\treturn\n\t}\n\n\tt.Logf(\"Bitmark Issue: JSON: %s\", b)\n\n\t// check that structure is preserved through Pack/Unpack\n\t// note reg is a pointer here\n\tif !reflect.DeepEqual(r, *bmt) {\n\t\tt.Errorf(\"different, original: %v recovered: %v\", r, *bmt)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "9fc15f953cc9a1d637b7dcfe593875e1", "score": "0.4836162", "text": "func TestUTXOViewpointSimpleDoubleSpend(t *testing.T) {\n\n\tdag, teardownFunc, err := chainSetup(\"utxoviewpoint_simpledoublespend\",\n\t\t&chaincfg.SimNetParams)\n\tif err != nil {\n\t\tt.Errorf(\"Failed to setup dag instance: %v\", err)\n\t\treturn\n\t}\n\tdefer teardownFunc()\n\n\t// Since we're not dealing with the real block dag, set the coinbase\n\t// maturity to 1.\n\tdag.TstSetCoinbaseMaturity(1)\n\n\tblock1 := createMsgBlockForTest(1,\n\t\ttime.Now().Unix() - 1000,\n\t\t[]*wire.MsgBlock{chaincfg.SimNetParams.GenesisBlock},\n\t\tnil)\n\taddBlockForTest(dag, block1, t)\n\n\tblock2 := createMsgBlockForTest(2,\n\t\ttime.Now().Unix() - 900,\n\t\t[]*wire.MsgBlock{block1},\n\t\tnil)\n\taddBlockForTest(dag, block2, t)\n\n\tcbTx := block1.Transactions[0]\n\tcbTxHash := cbTx.TxHash()\n\toutpoint := wire.NewOutPoint(&cbTxHash, uint32(0))\n\toutpoints := []*wire.OutPoint{outpoint}\n\n\ttx := createSpendTxForTest(outpoints, soterutil.Amount(1000), soterutil.Amount(10))\n\n\t// block A using cb tx\n\tblockA := createMsgBlockForTest(3,\n\t\ttime.Now().Unix(),\n\t\t[]*wire.MsgBlock{block2},\n\t\t[]*wire.MsgTx{tx})\n\taddBlockForTest(dag, blockA, t)\n\n\ttx2 := createSpendTxForTest(outpoints, soterutil.Amount(5000), soterutil.Amount(10))\n\n\t// block B using cb tx\n\tblockB := createMsgBlockForTest(3,\n\t\ttime.Now().Unix(),\n\t\t[]*wire.MsgBlock{block2},\n\t\t[]*wire.MsgTx{tx2})\n\n\t_, err = addBlockForTest(dag, blockB, t)\n\tif err != nil {\n\t\tt.Errorf(\"Error adding block B: %v\\n\", err)\n\t\treturn\n\t}\n\n\t// A before B\n\torder := []chainhash.Hash{\n\t\t\tchaincfg.SimNetParams.GenesisBlock.BlockHash(),\n\t\t\tblock1.BlockHash(),\n\t\t\tblock2.BlockHash(),\n\t\t\tblockA.BlockHash(),\n\t\t\tblockB.BlockHash()}\n\n\tnewView := NewUtxoViewpoint()\n\n\tfor _, hash := range order {\n\t\tsoterBlock, err := dag.BlockByHash(&hash)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"BlockByHash error: %v\", err)\n\t\t\treturn\n\t\t}\n\t\terr = newView.connectTransactionsForSorting(soterBlock, nil, dag.chainParams)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Connect transactions for sorting error: %v\", err)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// output tx from blockA should be in view as spendable\n\ttxHash := tx.TxHash()\n\tblockAOutpoint := wire.NewOutPoint(&txHash, 0)\n\tentryA := newView.LookupEntry(*blockAOutpoint)\n\tif entryA == nil {\n\t\tt.Errorf(\"Block A tx output should exist in view\")\n\t} else if entryA.IsSpent() || entryA.IsIgnored() {\n\t\tt.Errorf(\"Block A tx output should be spendable in view\")\n\t}\n\n\t// output tx from blockB should be in view as ignored\n\ttx2Hash := tx2.TxHash()\n\tblockBOutpoint := wire.NewOutPoint(&tx2Hash, 0)\n\tentryB := newView.LookupEntry(*blockBOutpoint)\n\tif entryB == nil {\n\t\tt.Errorf(\"Block B tx output should exist in view\")\n\t} else if !entryB.IsIgnored() {\n\t\tt.Errorf(\"Block B tx output should be ignored\")\n\t}\n\n\t// B before A\n\torder = []chainhash.Hash{\n\t\tchaincfg.SimNetParams.GenesisBlock.BlockHash(),\n\t\tblock1.BlockHash(),\n\t\tblock2.BlockHash(),\n\t\tblockB.BlockHash(),\n\t\tblockA.BlockHash()}\n\n\tnewView = NewUtxoViewpoint()\n\n\tfor _, hash := range order {\n\t\tsoterBlock, err := dag.BlockByHash(&hash)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"BlockByHash error: %v\", err)\n\t\t\treturn\n\t\t}\n\t\terr = newView.connectTransactionsForSorting(soterBlock, nil, dag.chainParams)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Connect transactions for sorting error: %v\", err)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// output tx from blockB should be in view as spendable\n\tentryB = newView.LookupEntry(*blockBOutpoint)\n\tif entryB == nil {\n\t\tt.Errorf(\"Block B tx output should exist in view\")\n\t} else if entryB.IsSpent() || entryB.IsIgnored() {\n\t\tt.Errorf(\"Block B tx output should be spendable in view\")\n\t}\n\n\t// output tx from blockA should be in view as ignored\n\tentryA = newView.LookupEntry(*blockAOutpoint)\n\tif entryA == nil {\n\t\tt.Errorf(\"Block A tx output should exist in view\")\n\t} else if !entryA.IsIgnored() {\n\t\tt.Errorf(\"Block A tx output should be ignored\")\n\t}\n}", "title": "" }, { "docid": "14c9cfd8b1d23e182d28fa73dad65135", "score": "0.48297969", "text": "func TestGetByKey(t *testing.T) {\n\ttf.UnitTest(t)\n\tdstP := initDSTParams()\n\n\tctx := context.Background()\n\tinitStoreTest(ctx, t, dstP)\n\tchain := newChainStore(dstP)\n\trequirePutTestChain(t, chain, dstP)\n\n\tgotGTS := requireGetTipSet(ctx, t, chain, dstP.genTS.Key())\n\tgotGTSSR := requireGetTipSetStateRoot(ctx, t, chain, dstP.genTS.Key())\n\n\tgot1TS := requireGetTipSet(ctx, t, chain, dstP.link1.Key())\n\tgot1TSSR := requireGetTipSetStateRoot(ctx, t, chain, dstP.link1.Key())\n\n\tgot2TS := requireGetTipSet(ctx, t, chain, dstP.link2.Key())\n\tgot2TSSR := requireGetTipSetStateRoot(ctx, t, chain, dstP.link2.Key())\n\n\tgot3TS := requireGetTipSet(ctx, t, chain, dstP.link3.Key())\n\tgot3TSSR := requireGetTipSetStateRoot(ctx, t, chain, dstP.link3.Key())\n\n\tgot4TS := requireGetTipSet(ctx, t, chain, dstP.link4.Key())\n\tgot4TSSR := requireGetTipSetStateRoot(ctx, t, chain, dstP.link4.Key())\n\tassert.Equal(t, dstP.genTS, gotGTS)\n\tassert.Equal(t, dstP.link1, got1TS)\n\tassert.Equal(t, dstP.link2, got2TS)\n\tassert.Equal(t, dstP.link3, got3TS)\n\tassert.Equal(t, dstP.link4, got4TS)\n\n\tassert.Equal(t, dstP.genStateRoot, gotGTSSR)\n\tassert.Equal(t, dstP.link1State, got1TSSR)\n\tassert.Equal(t, dstP.link2State, got2TSSR)\n\tassert.Equal(t, dstP.link3State, got3TSSR)\n\tassert.Equal(t, dstP.link4State, got4TSSR)\n}", "title": "" }, { "docid": "bc7af6271f5f3873b12a4c60963fa606", "score": "0.4826814", "text": "func rawTxInSigner(btcTx *wire.MsgTx, idx int, subScript []byte, hashType txscript.SigHashType,\n\tbtcKey *btcec.PrivateKey, vals []int64, _ [][]byte) ([]byte, error) {\n\n\tbchTx, err := translateTx(btcTx)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"btc->bch wire.MsgTx translation error: %v\", err)\n\t}\n\n\tbchKey, _ := bchec.PrivKeyFromBytes(bchec.S256(), btcKey.Serialize())\n\n\treturn bchtxscript.RawTxInECDSASignature(bchTx, idx, subScript, bchtxscript.SigHashType(uint32(hashType)), bchKey, vals[idx])\n}", "title": "" }, { "docid": "e1fe253524d35b5251fef05a5c2daf31", "score": "0.4823241", "text": "func TestOPB01(t *testing.T) {\n\tpayload := &ExecutionPayload{\n\t\tExtraData: make([]byte, 32),\n\t}\n\tvar buf bytes.Buffer\n\t_, err := payload.MarshalSSZ(&buf)\n\trequire.NoError(t, err)\n\tdata := buf.Bytes()\n\n\t// transactions offset is set between indices 504 and 508\n\tcopy(data[504:508], make([]byte, 4))\n\n\tvar unmarshalled ExecutionPayload\n\terr = unmarshalled.UnmarshalSSZ(uint32(len(data)), bytes.NewReader(data))\n\trequire.Equal(t, ErrBadTransactionOffset, err)\n}", "title": "" }, { "docid": "883f1f87be972c99e0e634a9d7b20de9", "score": "0.48169118", "text": "func TestMinerPayoutHandling(t *testing.T) {\n\tif testing.Short() {\n\t\tt.SkipNow()\n\t}\n\tcst, err := createConsensusSetTester(\"TestMinerPayoutHandling\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer cst.closeCst()\n\n\t// Create a block with the wrong miner payout structure - testing can be\n\t// light here because there is heavier testing in the 'types' package,\n\t// where the logic is defined.\n\tblock, _, target, err := cst.miner.BlockForWork()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tblock.MinerPayouts = append(block.MinerPayouts, types.SiacoinOutput{Value: types.NewCurrency64(1)})\n\tsolvedBlock, _ := cst.miner.SolveBlock(block, target)\n\terr = cst.cs.acceptBlock(solvedBlock)\n\tif err != ErrBadMinerPayouts {\n\t\tt.Fatalf(\"expected %v, got %v\", ErrBadMinerPayouts, err)\n\t}\n}", "title": "" }, { "docid": "8bd5c0770df993a964d15a475160a66d", "score": "0.4806886", "text": "func (device *Device) BTCSign(\n\tcoin messages.BTCCoin,\n\tscriptType messages.BTCScriptType,\n\tbip44Account uint32,\n\tinputs []*messages.BTCSignInputRequest,\n\toutputs []*messages.BTCSignOutputRequest,\n\tversion uint32,\n\tlocktime uint32,\n) ([][]byte, error) {\n\tsignatures := make([][]byte, len(inputs))\n\tnext, err := device.queryBtcSign(&messages.Request{\n\t\tRequest: &messages.Request_BtcSignInit{\n\t\t\tBtcSignInit: &messages.BTCSignInitRequest{\n\t\t\t\tCoin: coin,\n\t\t\t\tScriptType: scriptType,\n\t\t\t\tBip44Account: bip44Account,\n\t\t\t\tVersion: version,\n\t\t\t\tNumInputs: uint32(len(inputs)),\n\t\t\t\tNumOutputs: uint32(len(outputs)),\n\t\t\t\tLocktime: locktime,\n\t\t\t}}})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor {\n\t\tswitch next.Type {\n\t\tcase messages.BTCSignNextResponse_INPUT:\n\t\t\tinputIndex := next.Index\n\t\t\tnext, err = device.queryBtcSign(&messages.Request{\n\t\t\t\tRequest: &messages.Request_BtcSignInput{\n\t\t\t\t\tBtcSignInput: inputs[inputIndex],\n\t\t\t\t}})\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tif next.HasSignature {\n\t\t\t\tsignatures[inputIndex] = next.Signature\n\t\t\t}\n\t\tcase messages.BTCSignNextResponse_OUTPUT:\n\t\t\toutputIndex := next.Index\n\t\t\tnext, err = device.queryBtcSign(&messages.Request{\n\t\t\t\tRequest: &messages.Request_BtcSignOutput{\n\t\t\t\t\tBtcSignOutput: outputs[outputIndex],\n\t\t\t\t}})\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\tcase messages.BTCSignNextResponse_DONE:\n\t\t\treturn signatures, nil\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3db7444556f8e08a45e75d790eafcd26", "score": "0.47999513", "text": "func checkprikaddr(serializedKey string) error{\n\t\t//var keys map[string]*btcutil.WIF\n\tif serializedKey != \"\" {\n\t\tkey := serializedKey\n\t\t\twif, err := btcutil.DecodeWIF(key)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t/*\n\t\t\taddr, err := btcutil.NewAddressPubKey(wif.SerializePubKey(),\n\t\t\t\tactiveNet.Params)\n\t\t*/\n\t\t//sgj --6\n\t\tbtchashAddr, pubKey, err := keyToAddr(wif.PrivKey, activeNet.Params)\n\tfmt.Printf(\"address's ECPubKey(),get PubKeyHash' Address is :%v \\n\", btchashAddr)\n\t//输出:私钥;公钥;公钥hash(地址)\n\t\t\t//5KD3sSntucZFRzDNUJusRjEhVDADir1xfDQqFxqoi7djDX5k81b\n\t\t\tfmt.Printf(\"==checkprikaddr(),,param serializedKey is :%s,wif.PrivKey is %v, btchashAddr is :%v,pubKey is :%v\\n\",serializedKey,wif.PrivKey,btchashAddr,pubKey)\n\t\n\t\t\t//2) times:\n\t\t\t\taddr, err := btcutil.NewAddressPubKey(wif.SerializePubKey(),\n\t\t\t\tactiveNet.Params)\n\t\tfmt.Printf(\"==sgjwatching==exec signRawTransaction()--6666, generted addr is :%v,cmd PrivKeys is:%v\\n\",addr.EncodeAddress(),serializedKey)\n\t\t\twif.CompressPubKey = true\n\t\t\t//2) times:\n\t\t\t\taddr, err = btcutil.NewAddressPubKey(wif.SerializePubKey(),\n\t\t\t\tactiveNet.Params)\n\t\tfmt.Printf(\"==sgjwatching==exec signRawTransaction()-7777, generted addr is :%v,cmd PrivKeys is:%v\\n\",addr.EncodeAddress(),serializedKey)\n\t\t\t\t\t\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "df0ea39786f8db302aaa7d1eabb41cf8", "score": "0.47880334", "text": "func TestSignatureSerialize(t *testing.T) {\n\ttests := []struct {\n\t\tname string\n\t\tecsig *Signature\n\t\texpected []byte\n\t}{\n\t\t// signature from bitcoin blockchain tx\n\t\t// 0437cd7f8525ceed2324359c2d0ba26006d92d85\n\t\t{\n\t\t\t\"valid 1 - r and s most significant bits are zero\",\n\t\t\t&Signature{\n\t\t\t\tR: fromHex(\"4e45e16932b8af514961a1d3a1a25fdf3f4f7732e9d624c6c61548ab5fb8cd41\"),\n\t\t\t\tS: fromHex(\"181522ec8eca07de4860a4acdd12909d831cc56cbbac4622082221a8768d1d09\"),\n\t\t\t},\n\t\t\t[]byte{\n\t\t\t\t0x30, 0x44, 0x02, 0x20, 0x4e, 0x45, 0xe1, 0x69,\n\t\t\t\t0x32, 0xb8, 0xaf, 0x51, 0x49, 0x61, 0xa1, 0xd3,\n\t\t\t\t0xa1, 0xa2, 0x5f, 0xdf, 0x3f, 0x4f, 0x77, 0x32,\n\t\t\t\t0xe9, 0xd6, 0x24, 0xc6, 0xc6, 0x15, 0x48, 0xab,\n\t\t\t\t0x5f, 0xb8, 0xcd, 0x41, 0x02, 0x20, 0x18, 0x15,\n\t\t\t\t0x22, 0xec, 0x8e, 0xca, 0x07, 0xde, 0x48, 0x60,\n\t\t\t\t0xa4, 0xac, 0xdd, 0x12, 0x90, 0x9d, 0x83, 0x1c,\n\t\t\t\t0xc5, 0x6c, 0xbb, 0xac, 0x46, 0x22, 0x08, 0x22,\n\t\t\t\t0x21, 0xa8, 0x76, 0x8d, 0x1d, 0x09,\n\t\t\t},\n\t\t},\n\t\t// signature from bitcoin blockchain tx\n\t\t// cb00f8a0573b18faa8c4f467b049f5d202bf1101d9ef2633bc611be70376a4b4\n\t\t{\n\t\t\t\"valid 2 - r most significant bit is one\",\n\t\t\t&Signature{\n\t\t\t\tR: fromHex(\"0082235e21a2300022738dabb8e1bbd9d19cfb1e7ab8c30a23b0afbb8d178abcf3\"),\n\t\t\t\tS: fromHex(\"24bf68e256c534ddfaf966bf908deb944305596f7bdcc38d69acad7f9c868724\"),\n\t\t\t},\n\t\t\t[]byte{\n\t\t\t\t0x30, 0x45, 0x02, 0x21, 0x00, 0x82, 0x23, 0x5e,\n\t\t\t\t0x21, 0xa2, 0x30, 0x00, 0x22, 0x73, 0x8d, 0xab,\n\t\t\t\t0xb8, 0xe1, 0xbb, 0xd9, 0xd1, 0x9c, 0xfb, 0x1e,\n\t\t\t\t0x7a, 0xb8, 0xc3, 0x0a, 0x23, 0xb0, 0xaf, 0xbb,\n\t\t\t\t0x8d, 0x17, 0x8a, 0xbc, 0xf3, 0x02, 0x20, 0x24,\n\t\t\t\t0xbf, 0x68, 0xe2, 0x56, 0xc5, 0x34, 0xdd, 0xfa,\n\t\t\t\t0xf9, 0x66, 0xbf, 0x90, 0x8d, 0xeb, 0x94, 0x43,\n\t\t\t\t0x05, 0x59, 0x6f, 0x7b, 0xdc, 0xc3, 0x8d, 0x69,\n\t\t\t\t0xac, 0xad, 0x7f, 0x9c, 0x86, 0x87, 0x24,\n\t\t\t},\n\t\t},\n\t\t// signature from bitcoin blockchain tx\n\t\t// fda204502a3345e08afd6af27377c052e77f1fefeaeb31bdd45f1e1237ca5470\n\t\t{\n\t\t\t\"valid 3 - s most significant bit is one\",\n\t\t\t&Signature{\n\t\t\t\tR: fromHex(\"1cadddc2838598fee7dc35a12b340c6bde8b389f7bfd19a1252a17c4b5ed2d71\"),\n\t\t\t\tS: new(big.Int).Add(fromHex(\"00c1a251bbecb14b058a8bd77f65de87e51c47e95904f4c0e9d52eddc21c1415ac\"), S256().N),\n\t\t\t},\n\t\t\t[]byte{\n\t\t\t\t0x30, 0x45, 0x02, 0x20, 0x1c, 0xad, 0xdd, 0xc2,\n\t\t\t\t0x83, 0x85, 0x98, 0xfe, 0xe7, 0xdc, 0x35, 0xa1,\n\t\t\t\t0x2b, 0x34, 0x0c, 0x6b, 0xde, 0x8b, 0x38, 0x9f,\n\t\t\t\t0x7b, 0xfd, 0x19, 0xa1, 0x25, 0x2a, 0x17, 0xc4,\n\t\t\t\t0xb5, 0xed, 0x2d, 0x71, 0x02, 0x21, 0x00, 0xc1,\n\t\t\t\t0xa2, 0x51, 0xbb, 0xec, 0xb1, 0x4b, 0x05, 0x8a,\n\t\t\t\t0x8b, 0xd7, 0x7f, 0x65, 0xde, 0x87, 0xe5, 0x1c,\n\t\t\t\t0x47, 0xe9, 0x59, 0x04, 0xf4, 0xc0, 0xe9, 0xd5,\n\t\t\t\t0x2e, 0xdd, 0xc2, 0x1c, 0x14, 0x15, 0xac,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\t\"valid 4 - s is bigger than half order\",\n\t\t\t&Signature{\n\t\t\t\tR: fromHex(\"a196ed0e7ebcbe7b63fe1d8eecbdbde03a67ceba4fc8f6482bdcb9606a911404\"),\n\t\t\t\tS: fromHex(\"971729c7fa944b465b35250c6570a2f31acbb14b13d1565fab7330dcb2b3dfb1\"),\n\t\t\t},\n\t\t\t[]byte{\n\t\t\t\t0x30, 0x45, 0x02, 0x21, 0x00, 0xa1, 0x96, 0xed,\n\t\t\t\t0x0e, 0x7e, 0xbc, 0xbe, 0x7b, 0x63, 0xfe, 0x1d,\n\t\t\t\t0x8e, 0xec, 0xbd, 0xbd, 0xe0, 0x3a, 0x67, 0xce,\n\t\t\t\t0xba, 0x4f, 0xc8, 0xf6, 0x48, 0x2b, 0xdc, 0xb9,\n\t\t\t\t0x60, 0x6a, 0x91, 0x14, 0x04, 0x02, 0x20, 0x68,\n\t\t\t\t0xe8, 0xd6, 0x38, 0x05, 0x6b, 0xb4, 0xb9, 0xa4,\n\t\t\t\t0xca, 0xda, 0xf3, 0x9a, 0x8f, 0x5d, 0x0b, 0x9f,\n\t\t\t\t0xe3, 0x2b, 0x9b, 0x9b, 0x77, 0x49, 0xdc, 0x14,\n\t\t\t\t0x5f, 0x2d, 0xb0, 0x1d, 0x82, 0x61, 0x90,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\t\"zero signature\",\n\t\t\t&Signature{\n\t\t\t\tR: big.NewInt(0),\n\t\t\t\tS: big.NewInt(0),\n\t\t\t},\n\t\t\t[]byte{0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00},\n\t\t},\n\t}\n\n\tfor i, test := range tests {\n\t\tresult := test.ecsig.Serialize()\n\t\tif !bytes.Equal(result, test.expected) {\n\t\t\tt.Errorf(\"Serialize #%d (%s) unexpected result:\\n\"+\n\t\t\t\t\"got: %x\\nwant: %x\", i, test.name, result,\n\t\t\t\ttest.expected)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "583779eaa29412e1b4c708289608319c", "score": "0.47873297", "text": "func TestIsUnspendable(t *testing.T) {\n\tt.Parallel()\n\n\ttests := []struct {\n\t\tname string\n\t\tpkScript []byte\n\t\texpected bool\n\t}{\n\t\t{\n\t\t\t// Unspendable\n\t\t\tpkScript: []byte{0x6a, 0x04, 0x74, 0x65, 0x73, 0x74},\n\t\t\texpected: true,\n\t\t},\n\t\t{\n\t\t\t// Spendable\n\t\t\tpkScript: []byte{0x76, 0xa9, 0x14, 0x29, 0x95, 0xa0,\n\t\t\t\t0xfe, 0x68, 0x43, 0xfa, 0x9b, 0x95, 0x45,\n\t\t\t\t0x97, 0xf0, 0xdc, 0xa7, 0xa4, 0x4d, 0xf6,\n\t\t\t\t0xfa, 0x0b, 0x5c, 0x88, 0xac},\n\t\t\texpected: false,\n\t\t},\n\t}\n\n\tfor i, test := range tests {\n\t\tres := txscript.IsUnspendable(test.pkScript)\n\t\tif res != test.expected {\n\t\t\tt.Errorf(\"TestIsUnspendable #%d failed: got %v want %v\",\n\t\t\t\ti, res, test.expected)\n\t\t\tcontinue\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2abaabc62469675dfb634184b6a0ae73", "score": "0.47813487", "text": "func isStakePubkeyHashScript(script []byte) bool {\n\topcode := stakeOpcode(script)\n\tif opcode == 0 {\n\t\treturn false\n\t}\n\treturn extractStakePubKeyHash(script, opcode) != nil\n}", "title": "" }, { "docid": "10679f1ac6df6242f18dd2a0ce5522c7", "score": "0.4763397", "text": "func (b *Bitcoin) SignRawTransaction(tx *wire.MsgTx, prevtxs []PrevTx) (*wire.MsgTx, bool, error) {\n\t// hex tx\n\thexTx, err := b.ToHex(tx)\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"fail to call btc.ToHex(tx)\")\n\t}\n\n\tinput1, err := json.Marshal(hexTx)\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"fail to call json.Marchal(hexTx)\")\n\t}\n\n\t// prevtxs\n\tinput2, err := json.Marshal(prevtxs)\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"fail to call json.Marchal(prevtxs)\")\n\t}\n\n\t// call api `signrawtransactionwithwallet`\n\trawResult, err := b.Client.RawRequest(\"signrawtransactionwithwallet\", []json.RawMessage{input1, input2})\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"fail to call json.RawRequest(signrawtransactionwithwallet)\")\n\t}\n\tsignRawTxResult := SignRawTransactionResult{}\n\terr = json.Unmarshal(rawResult, &signRawTxResult)\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"fail to call json.Unmarshal(rawResult)\")\n\t}\n\tif len(signRawTxResult.Errors) != 0 {\n\t\tgrok.Value(signRawTxResult)\n\t\treturn nil, false, errors.Errorf(\"result of `signrawtransactionwithwallet` includes error: %s\", signRawTxResult.Errors[0].Error)\n\t}\n\n\tmsgTx, err := b.ToMsgTx(signRawTxResult.Hex)\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"fail to call btc.ToMsgTx(hex)\")\n\t}\n\n\t// Debug to compare tx before and after\n\tif !signRawTxResult.Complete {\n\t\tb.logger.Debug(\"sign is not completed yet\")\n\t\tb.debugCompareTx(tx, msgTx)\n\t}\n\n\treturn msgTx, signRawTxResult.Complete, nil\n}", "title": "" }, { "docid": "0ba4e0060dfa6df56eab6710ff6c228e", "score": "0.47488353", "text": "func TestSpendSiacoinsBlock(t *testing.T) {\n\tcst, err := createConsensusSetTester(\"TestSpendSiacoinsBlock\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer cst.closeCst()\n\terr = cst.testSpendSiacoinsBlock()\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n}", "title": "" }, { "docid": "c19cb0b4f75dd31f65c7654c52677729", "score": "0.47477728", "text": "func TestIsPushOnlyScript(t *testing.T) {\n\tt.Parallel()\n\n\ttest := struct {\n\t\tname string\n\t\tscript []byte\n\t\texpected bool\n\t}{\n\t\tname: \"does not parse\",\n\t\tscript: mustParseShortForm(\"0x046708afdb0fe5548271967f1a67130\" +\n\t\t\t\"b7105cd6a828e03909a67962e0ea1f61d\"),\n\t\texpected: false,\n\t}\n\n\tif txscript.IsPushOnlyScript(test.script) != test.expected {\n\t\tt.Errorf(\"IsPushOnlyScript (%s) wrong result\\ngot: %v\\nwant: \"+\n\t\t\t\"%v\", test.name, true, test.expected)\n\t}\n}", "title": "" }, { "docid": "0742d3dba264df18bc2176f097333ffd", "score": "0.47232297", "text": "func assertTaprootDeliveryUsed(net *lntest.NetworkHarness,\n\tt *harnessTest, closingTxid *chainhash.Hash) bool {\n\n\ttx, err := net.Miner.Client.GetRawTransaction(closingTxid)\n\trequire.NoError(t.t, err, \"unable to get closing tx\")\n\n\tfor _, txOut := range tx.MsgTx().TxOut {\n\t\tif !txscript.IsPayToTaproot(txOut.PkScript) {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "5874b18c4e3f4f7c838d107929b26159", "score": "0.4704431", "text": "func TestOutdatedBotRegisterationTransactionBinaryFormat(t *testing.T) {\n\t// define tfchain-specific transaction versions\n\ttypes.RegisterTransactionVersion(TransactionVersionBotRegistration, BotRegistrationTransactionController{\n\t\tRegistry: nil,\n\t\tOneCoin: config.GetCurrencyUnits().OneCoin,\n\t})\n\tdefer types.RegisterTransactionVersion(TransactionVersionBotRegistration, nil)\n\n\tb, err := hex.DecodeString(`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`)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tvar tx types.Transaction\n\terr = siabin.Unmarshal(b, &tx)\n\tif err == nil {\n\t\tt.Fatal(\"expected error, but managed to unmarshal Tx:\", tx)\n\t}\n\tmsg := err.Error()\n\tif !strings.Contains(msg, \"could not decode type types.Transaction\") {\n\t\tt.Fatal(\"unexpected error, expected type-decode error, but received:\", err)\n\t}\n}", "title": "" }, { "docid": "c19c5672bc2759b28a585e6f5c305ed7", "score": "0.47005323", "text": "func TestTxSerialize(t *testing.T) {\n\tnoTx := NewMsgTx()\n\tnoTx.Version = 1\n\tnoTxEncoded := []byte{\n\t\t0x01, 0x00, 0x00, 0x00, // Version\n\t\t0x00, // Varint for number of input transactions\n\t\t0x00, // Varint for number of output transactions\n\t\t0x00, 0x00, 0x00, 0x00, // Lock time\n\t\t0x00, 0x00, 0x00, 0x00, // Expiry\n\t\t0x00, // Varint for number of input signatures\n\t}\n\n\ttests := []struct {\n\t\tin *MsgTx // Message to encode\n\t\tout *MsgTx // Expected decoded message\n\t\tbuf []byte // Serialized data\n\t\tpkScriptLocs []int // Expected output script locations\n\t}{\n\t\t// No transactions.\n\t\t{\n\t\t\tnoTx,\n\t\t\tnoTx,\n\t\t\tnoTxEncoded,\n\t\t\tnil,\n\t\t},\n\n\t\t// Multiple transactions.\n\t\t{\n\t\t\tmultiTx,\n\t\t\tmultiTx,\n\t\t\tmultiTxEncoded,\n\t\t\tmultiTxPkScriptLocs,\n\t\t},\n\t}\n\n\tt.Logf(\"Running %d tests\", len(tests))\n\tfor i, test := range tests {\n\t\t// Serialize the transaction.\n\t\tbuf := bytes.NewBuffer(make([]byte, 0, test.in.SerializeSize()))\n\t\terr := test.in.Serialize(buf)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Serialize #%d error %v\", i, err)\n\t\t\tcontinue\n\t\t}\n\t\tif !bytes.Equal(buf.Bytes(), test.buf) {\n\t\t\tt.Errorf(\"Serialize #%d\\n got: %s want: %s\", i,\n\t\t\t\tspew.Sdump(buf.Bytes()), spew.Sdump(test.buf))\n\t\t\tcontinue\n\t\t}\n\n\t\t// Test SerializeSize.\n\t\tsz := test.in.SerializeSize()\n\t\tactualSz := len(buf.Bytes())\n\t\tif sz != actualSz {\n\t\t\tt.Errorf(\"Wrong serialize size #%d\\n got: %d want: %d\", i,\n\t\t\t\tsz, actualSz)\n\t\t}\n\n\t\t// Deserialize the transaction.\n\t\tvar tx MsgTx\n\t\trbuf := bytes.NewReader(test.buf)\n\t\terr = tx.Deserialize(rbuf)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Deserialize #%d error %v\", i, err)\n\t\t\tcontinue\n\t\t}\n\t\tif !reflect.DeepEqual(&tx, test.out) {\n\t\t\tt.Errorf(\"Deserialize #%d\\n got: %s want: %s\", i,\n\t\t\t\tspew.Sdump(&tx), spew.Sdump(test.out))\n\t\t\tcontinue\n\t\t}\n\n\t\t// Ensure the public key script locations are accurate.\n\t\tpkScriptLocs := test.in.PkScriptLocs()\n\t\tif !reflect.DeepEqual(pkScriptLocs, test.pkScriptLocs) {\n\t\t\tt.Errorf(\"PkScriptLocs #%d\\n got: %s want: %s\", i,\n\t\t\t\tspew.Sdump(pkScriptLocs),\n\t\t\t\tspew.Sdump(test.pkScriptLocs))\n\t\t\tcontinue\n\t\t}\n\t\tfor j, loc := range pkScriptLocs {\n\t\t\twantPkScript := test.in.TxOut[j].PkScript\n\t\t\tgotPkScript := test.buf[loc : loc+len(wantPkScript)]\n\t\t\tif !bytes.Equal(gotPkScript, wantPkScript) {\n\t\t\t\tt.Errorf(\"PkScriptLocs #%d:%d\\n unexpected \"+\n\t\t\t\t\t\"script got: %s want: %s\", i, j,\n\t\t\t\t\tspew.Sdump(gotPkScript),\n\t\t\t\t\tspew.Sdump(wantPkScript))\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a56d9eedad16d6fd04635a96476f0d50", "score": "0.46993157", "text": "func DecodeRawTx(rawData string, chainID uint32) (tx *types.Transaction, sig []byte, pubkey crypto.PublicKey, err error) {\n\t//remove Hex prefix and decode string to byte\n\trawData = strings.Replace(rawData, \"0x\", \"\", -1)\n\trawData = strings.Replace(rawData, \"0X\", \"\", -1)\n\tvar dataInString []byte\n\tdataInString, err = hex.DecodeString(rawData)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// decode raw data into rlp tx\n\ttx = &types.Transaction{}\n\terr = rlp.DecodeBytes(dataInString, tx)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// extract signature and recover pubkey\n\tv, r, s := tx.RawSignatureValues()\n\trecID := uint32(v.Int64()) - 2*chainID - 8\n\tsig = make([]byte, 64, 65)\n\trSize := len(r.Bytes())\n\tcopy(sig[32-rSize:32], r.Bytes())\n\tsSize := len(s.Bytes())\n\tcopy(sig[64-sSize:], s.Bytes())\n\tsig = append(sig, byte(recID))\n\n\t// recover public key\n\trawHash := types.NewEIP155Signer(big.NewInt(int64(chainID))).Hash(tx)\n\tpubkey, err = crypto.RecoverPubkey(rawHash[:], sig)\n\treturn\n}", "title": "" }, { "docid": "ebdc84da15b6585639fa1ad47543f220", "score": "0.46992946", "text": "func TestUTXOViewpointChildOfDoubleSpend(t *testing.T) {\n\tdag, teardownFunc, err := chainSetup(\"utxoviewpoint_childofdoublespend\",\n\t\t&chaincfg.SimNetParams)\n\tif err != nil {\n\t\tt.Errorf(\"Failed to setup dag instance: %v\", err)\n\t\treturn\n\t}\n\tdefer teardownFunc()\n\n\t// Since we're not dealing with the real block dag, set the coinbase\n\t// maturity to 1.\n\tdag.TstSetCoinbaseMaturity(1)\n\n\tblock1 := createMsgBlockForTest(1,\n\t\ttime.Now().Unix() - 1000,\n\t\t[]*wire.MsgBlock{chaincfg.SimNetParams.GenesisBlock},\n\t\tnil)\n\taddBlockForTest(dag, block1, t)\n\n\tblock2 := createMsgBlockForTest(2,\n\t\ttime.Now().Unix() - 900,\n\t\t[]*wire.MsgBlock{block1},\n\t\tnil)\n\taddBlockForTest(dag, block2, t)\n\n\tcbTx := block1.Transactions[0]\n\tcbTxHash := cbTx.TxHash()\n\toutpoint := wire.NewOutPoint(&cbTxHash, uint32(0))\n\toutpoints := []*wire.OutPoint{outpoint}\n\n\ttx := createSpendTxForTest(outpoints, soterutil.Amount(1000), soterutil.Amount(10))\n\n\t// block A using cb tx\n\tblockA := createMsgBlockForTest(3,\n\t\ttime.Now().Unix() - 800,\n\t\t[]*wire.MsgBlock{block2},\n\t\t[]*wire.MsgTx{tx})\n\taddBlockForTest(dag, blockA, t)\n\n\ttx2 := createSpendTxForTest(outpoints, soterutil.Amount(5000), soterutil.Amount(10))\n\ttx2Hash := tx2.TxHash()\n\t// block B using cb tx\n\tblockB := createMsgBlockForTest(3,\n\t\ttime.Now().Unix() - 700,\n\t\t[]*wire.MsgBlock{block2},\n\t\t[]*wire.MsgTx{tx2})\n\n\t_, err = addBlockForTest(dag, blockB, t)\n\tif err != nil {\n\t\tt.Errorf(\"Error adding block B: %v\\n\", err)\n\t\treturn\n\t}\n\n\t// block C using double spend from B\n\tblockBOutpoint := wire.NewOutPoint(&tx2Hash, uint32(0))\n\ttx3 := createSpendTxForTest([]*wire.OutPoint{blockBOutpoint}, soterutil.Amount(1000), soterutil.Amount(10))\n\tblockC := createMsgBlockForTest(4,\n\t\ttime.Now().Unix() - 600,\n\t\t[]*wire.MsgBlock{blockB},\n\t\t[]*wire.MsgTx{tx3})\n\n\t_, err = addBlockForTest(dag, blockC, t)\n\tif err != nil {\n\t\tt.Errorf(\"Error adding block C: %v\\n\", err)\n\t\treturn\n\t}\n\n\t// A before B\n\torder := []chainhash.Hash{\n\t\tchaincfg.SimNetParams.GenesisBlock.BlockHash(),\n\t\tblock1.BlockHash(),\n\t\tblock2.BlockHash(),\n\t\tblockA.BlockHash(),\n\t\tblockB.BlockHash(),\n\t\tblockC.BlockHash()}\n\n\tnewView := NewUtxoViewpoint()\n\n\tfor _, hash := range order {\n\t\tsoterBlock, err := dag.BlockByHash(&hash)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"BlockByHash error: %v\", err)\n\t\t\treturn\n\t\t}\n\t\terr = newView.connectTransactionsForSorting(soterBlock, nil, dag.chainParams)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Connect transactions for sorting error: %v\", err)\n\t\t\treturn\n\t\t}\n\t}\n\n\tentryB := newView.LookupEntry(*blockBOutpoint)\n\tif entryB == nil {\n\t\tt.Errorf(\"Block B tx output should exist in view\")\n\t} else if !entryB.IsIgnored() {\n\t\tt.Errorf(\"Block B tx output should be ignored\")\n\t}\n\n\ttx3Hash := tx3.TxHash()\n\tblockCOutpoint := wire.NewOutPoint(&tx3Hash, 0)\n\tentryC := newView.LookupEntry(*blockCOutpoint)\n\tif entryC == nil {\n\t\tt.Errorf(\"Block C tx output should exist in view\")\n\t} else if !entryC.IsIgnored() {\n\t\tt.Errorf(\"Block C tx output should be ignored\")\n\t}\n\n\t//TODO: B before A\n}", "title": "" }, { "docid": "0e4aa41c02a575fde658f299ed49bec2", "score": "0.469701", "text": "func TestContractExecutionTxTakeAll(t *testing.T) {\n\tassert := assert.New(t)\n\n\tvar damt1, damt2 btcutil.Amount = 1, 0\n\tb, _, dID, deal, err := setupContractorsUntilPubkeyExchange(damt1, damt2)\n\tif !assert.NoError(err) {\n\t\tassert.FailNow(err.Error())\n\t}\n\n\t_, C := test.RandKeys()\n\tb.Contract.Oracle.Commitments[dID] = C\n\n\ttx, err := b.Contract.ContractExecutionTx(b.party, deal, dID)\n\n\tassert.NoError(err)\n\tassert.Len(tx.TxOut, 1)\n\tfee := btcutil.Amount(closingTxSize) // fee rate is 1 satoshi / byte in test\n\tassert.Equal(int64(damt1+fee), tx.TxOut[0].Value)\n}", "title": "" }, { "docid": "6a90750ab4f0f3ea4e09450b98e627b9", "score": "0.46930662", "text": "func buildSigProgram(tpl *Template, index uint32) ([]byte, error) {\n\tif !tpl.AllowAdditional {\n\t\th := tpl.Hash(index)\n\t\tbuilder := vmutil.NewBuilder()\n\t\tbuilder.AddData(h.Bytes())\n\t\tbuilder.AddOp(vm.OP_TXSIGHASH).AddOp(vm.OP_EQUAL)\n\n\t\treturn builder.Build()\n\t}\n\tconstraints := make([]constraint, 0, 3+len(tpl.Transaction.Outputs))\n\tid := tpl.Transaction.Tx.InputIDs[index]\n\tif sp, err := tpl.Transaction.Tx.Spend(id); err == nil {\n\t\tconstraints = append(constraints, outputIDConstraint(*sp.SpentOutputId))\n\t}\n\n\tfor i, out := range tpl.Transaction.Outputs {\n\t\tc := &payConstraint{\n\t\t\tIndex: i,\n\t\t\tAssetAmount: out.AssetAmount,\n\t\t\tProgram: out.ControlProgram,\n\t\t}\n\t\tconstraints = append(constraints, c)\n\t}\n\tvar program []byte\n\tfor i, c := range constraints {\n\t\tprogram = append(program, c.code()...)\n\t\tif i < len(constraints)-1 { // leave the final bool on top of the stack\n\t\t\tprogram = append(program, byte(vm.OP_VERIFY))\n\t\t}\n\t}\n\treturn program, nil\n}", "title": "" }, { "docid": "5ffd2fb65533d99a9cc7967c7c58fa6e", "score": "0.469074", "text": "func signFromTxID(device *firmware.Device, txID string) {\n\ttx := getTx(txID)\n\tinputs := []*firmware.BTCTxInput{}\n\toutputs := []*messages.BTCSignOutputRequest{}\n\n\tconst HARDENED = 0x80000000\n\n\tunhex := func(s string) []byte {\n\t\tb, err := hex.DecodeString(s)\n\t\terrpanic(err)\n\t\treturn b\n\t}\n\n\treverse := func(bs []byte) []byte {\n\t\tresult := make([]byte, len(bs))\n\t\tfor i, b := range bs {\n\t\t\tresult[len(bs)-1-i] = b\n\t\t}\n\t\treturn result\n\t}\n\n\tfor _, inp := range tx.Inputs {\n\t\tprevtx := getTx(inp.TxHash)\n\n\t\tprevInputs := []*messages.BTCPrevTxInputRequest{}\n\t\tfor _, prevInp := range prevtx.Inputs {\n\t\t\tprevInputs = append(prevInputs, &messages.BTCPrevTxInputRequest{\n\t\t\t\tPrevOutHash: reverse(unhex(prevInp.TxHash)),\n\t\t\t\tPrevOutIndex: prevInp.Index,\n\t\t\t\tSignatureScript: unhex(prevInp.SignatureScript),\n\t\t\t\tSequence: prevInp.Sequence,\n\t\t\t})\n\t\t}\n\n\t\tprevOutputs := []*messages.BTCPrevTxOutputRequest{}\n\t\tfor _, prevOutp := range prevtx.Outputs {\n\t\t\tprevOutputs = append(prevOutputs, &messages.BTCPrevTxOutputRequest{\n\t\t\t\tValue: prevOutp.Value,\n\t\t\t\tPubkeyScript: unhex(prevOutp.PubKeyScript),\n\t\t\t})\n\t\t}\n\n\t\tinputs = append(inputs, &firmware.BTCTxInput{\n\t\t\tInput: &messages.BTCSignInputRequest{\n\t\t\t\tPrevOutHash: reverse(unhex(inp.TxHash)),\n\t\t\t\tPrevOutIndex: inp.Index,\n\t\t\t\tPrevOutValue: inp.Value,\n\t\t\t\tSequence: inp.Sequence,\n\t\t\t\tKeypath: []uint32{84 + HARDENED, 1 + HARDENED, 0 + HARDENED, 0, 0},\n\t\t\t},\n\t\t\tPrevTx: &firmware.BTCPrevTx{\n\t\t\t\tVersion: prevtx.Transaction.Version,\n\t\t\t\tInputs: prevInputs,\n\t\t\t\tOutputs: prevOutputs,\n\t\t\t\tLocktime: prevtx.Transaction.Locktime,\n\t\t\t},\n\t\t})\n\t}\n\tfor _, outp := range tx.Outputs {\n\t\toutputs = append(outputs, &messages.BTCSignOutputRequest{\n\t\t\tOurs: false,\n\t\t\t// TODO: parse pubkey script\n\t\t\tType: messages.BTCOutputType_P2WSH,\n\t\t\tHash: []byte(\"11111111111111111111111111111111\"),\n\t\t\tValue: outp.Value,\n\t\t})\n\t}\n\t_, err := device.BTCSign(\n\t\tmessages.BTCCoin_TBTC,\n\t\t[]*messages.BTCScriptConfigWithKeypath{\n\t\t\t{\n\t\t\t\tScriptConfig: firmware.NewBTCScriptConfigSimple(messages.BTCScriptConfig_P2WPKH),\n\t\t\t\tKeypath: []uint32{84 + HARDENED, 1 + HARDENED, 0 + HARDENED},\n\t\t\t},\n\t\t},\n\t\t&firmware.BTCTx{\n\t\t\tVersion: tx.Transaction.Version,\n\t\t\tInputs: inputs,\n\t\t\tOutputs: outputs,\n\t\t\tLocktime: tx.Transaction.Locktime,\n\t\t},\n\t)\n\terrpanic(err)\n}", "title": "" }, { "docid": "c33df442dbf3b41338e7d5c28795ab87", "score": "0.46872917", "text": "func TestBCChainApplication_DeliverTx(t *testing.T) {\n\t//app := initChain()\n\t//var cases = []struct {\n\t//}{}\n\t//for _, c := range cases {\n\t//\tbreq := createBeginBlockRequest()\n\t//\tdreq := createDeliverTxRequest()\n\t//\tereq := createEndBlockRequest()\n\t//\n\t//\tbres := app.BeginBlock(*breq)\n\t//\tutest.AssertEquals(bres.Code, types2.CodeOK)\n\t//\t//todo assert more ...\n\t//\tdres := app.DeliverTx(dreq.Tx)\n\t//\tutest.AssertEquals(dres.Code, types2.CodeOK)\n\t//\t//todo assert more ...\n\t//\n\t//\t//todo create more delivertx\n\t//\t//...\n\t//\n\t//\t//End block\n\t//\teres := app.EndBlock(*ereq)\n\t//\t//todo assert more ...\n\t//\tcres := app.Commit()\n\t//\n\t//}\n\n}", "title": "" }, { "docid": "6652ec68865dee410e50ae0ab4c2a2ad", "score": "0.4679526", "text": "func StartSignTaproot(result *keygen.TaprootResult, signers []party.ID, messageHash []byte) protocol.StartFunc {\n\tpublicKey, err := curve.Secp256k1{}.LiftX(result.PublicKey)\n\tnormalResult := &keygen.Result{\n\t\tGroup: curve.Secp256k1{},\n\t\tID: result.ID,\n\t\tThreshold: result.Threshold,\n\t\tPrivateShare: result.PrivateShare,\n\t\tPublicKey: publicKey,\n\t\tVerificationShares: result.VerificationShares,\n\t}\n\treturn startSignCommon(true, err, normalResult, signers, messageHash)\n}", "title": "" }, { "docid": "bbc56846eaf229c5d0c991af5bf6fba8", "score": "0.4675204", "text": "func testScriptHashLock(t *testing.T, preimage []byte) txscript.TapLeaf {\n\tbuilder := txscript.NewScriptBuilder()\n\tbuilder.AddOp(txscript.OP_DUP)\n\tbuilder.AddOp(txscript.OP_HASH160)\n\tbuilder.AddData(btcutil.Hash160(preimage))\n\tbuilder.AddOp(txscript.OP_EQUALVERIFY)\n\tscript1, err := builder.Script()\n\trequire.NoError(t, err)\n\treturn txscript.NewBaseTapLeaf(script1)\n}", "title": "" }, { "docid": "4cee254f5f648cd3b2023b8d08dc4a06", "score": "0.46743572", "text": "func TestTxSerializePrefix(t *testing.T) {\n\tnoTx := NewMsgTx()\n\tnoTx.SerType = TxSerializeNoWitness\n\tnoTx.Version = 1\n\tnoTxEncoded := []byte{\n\t\t0x01, 0x00, 0x01, 0x00, // Version\n\t\t0x00, // Varint for number of input transactions\n\t\t0x00, // Varint for number of output transactions\n\t\t0x00, 0x00, 0x00, 0x00, // Lock time\n\t\t0x00, 0x00, 0x00, 0x00, // Expiry\n\t}\n\n\ttests := []struct {\n\t\tin *MsgTx // Message to encode\n\t\tout *MsgTx // Expected decoded message\n\t\tbuf []byte // Serialized data\n\t\tpkScriptLocs []int // Expected output script locations\n\t}{\n\t\t// No transactions.\n\t\t{\n\t\t\tnoTx,\n\t\t\tnoTx,\n\t\t\tnoTxEncoded,\n\t\t\tnil,\n\t\t},\n\n\t\t// Multiple transactions.\n\t\t{\n\t\t\tmultiTxPrefix,\n\t\t\tmultiTxPrefix,\n\t\t\tmultiTxPrefixEncoded,\n\t\t\tmultiTxPkScriptLocs,\n\t\t},\n\t}\n\n\tt.Logf(\"Running %d tests\", len(tests))\n\tfor i, test := range tests {\n\t\t// Serialize the transaction.\n\t\tbuf := bytes.NewBuffer(make([]byte, 0, test.in.SerializeSize()))\n\t\terr := test.in.Serialize(buf)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Serialize #%d error %v\", i, err)\n\t\t\tcontinue\n\t\t}\n\t\tif !bytes.Equal(buf.Bytes(), test.buf) {\n\t\t\tt.Errorf(\"Serialize #%d\\n got: %s want: %s\", i,\n\t\t\t\tspew.Sdump(buf.Bytes()), spew.Sdump(test.buf))\n\t\t\tcontinue\n\t\t}\n\n\t\t// Test SerializeSize.\n\t\tsz := test.in.SerializeSize()\n\t\tactualSz := len(buf.Bytes())\n\t\tif sz != actualSz {\n\t\t\tt.Errorf(\"Wrong serialize size #%d\\n got: %d want: %d\", i,\n\t\t\t\tsz, actualSz)\n\t\t}\n\n\t\t// Deserialize the transaction.\n\t\tvar tx MsgTx\n\t\trbuf := bytes.NewReader(test.buf)\n\t\terr = tx.Deserialize(rbuf)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Deserialize #%d error %v\", i, err)\n\t\t\tcontinue\n\t\t}\n\t\tif !reflect.DeepEqual(&tx, test.out) {\n\t\t\tt.Errorf(\"Deserialize #%d\\n got: %s want: %s\", i,\n\t\t\t\tspew.Sdump(&tx), spew.Sdump(test.out))\n\t\t\tcontinue\n\t\t}\n\n\t\t// Ensure the public key script locations are accurate.\n\t\tpkScriptLocs := test.in.PkScriptLocs()\n\t\tif !reflect.DeepEqual(pkScriptLocs, test.pkScriptLocs) {\n\t\t\tt.Errorf(\"PkScriptLocs #%d\\n got: %s want: %s\", i,\n\t\t\t\tspew.Sdump(pkScriptLocs),\n\t\t\t\tspew.Sdump(test.pkScriptLocs))\n\t\t\tcontinue\n\t\t}\n\t\tfor j, loc := range pkScriptLocs {\n\t\t\twantPkScript := test.in.TxOut[j].PkScript\n\t\t\tgotPkScript := test.buf[loc : loc+len(wantPkScript)]\n\t\t\tif !bytes.Equal(gotPkScript, wantPkScript) {\n\t\t\t\tt.Errorf(\"PkScriptLocs #%d:%d\\n unexpected \"+\n\t\t\t\t\t\"script got: %s want: %s\", i, j,\n\t\t\t\t\tspew.Sdump(gotPkScript),\n\t\t\t\t\tspew.Sdump(wantPkScript))\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "78520a3232017d59af06f315a5177c72", "score": "0.46557283", "text": "func (c *Client) WalletProcessPsbt(\n\tpsbt string, sign *bool, sighashType SigHashType, bip32Derivs *bool,\n) (*btcjson.WalletProcessPsbtResult, error) {\n\treturn c.WalletProcessPsbtAsync(psbt, sign, sighashType, bip32Derivs).Receive()\n}", "title": "" }, { "docid": "9b1b7468db549d2a67a2d0834fd50720", "score": "0.46528855", "text": "func TestCTCCastBitToBinary(t *testing.T) {\n\tstore := testkit.CreateMockStore(t)\n\ttk := testkit.NewTestKit(t, store)\n\ttk.MustExec(\"set global tidb_enable_row_level_checksum = 1\")\n\ttk.MustExec(\"use test\")\n\n\t// For point 1:\n\ttk.MustExec(\"drop table if exists t\")\n\ttk.MustExec(\"create table t(a binary(10) default 't')\")\n\ttk.MustQuery(\"show create table t\").Check(testkit.Rows(\"t CREATE TABLE `t` (\\n `a` binary(10) DEFAULT 't\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0'\\n) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_bin\"))\n\n\t// For point 2 with binary:\n\ttk.MustExec(\"drop table if exists t\")\n\ttk.MustExec(\"create table t(a bit(13) not null) collate utf8mb4_general_ci\")\n\ttk.MustExec(\"insert into t values ( 4047 )\")\n\ttk.MustExec(\"alter table t change column a a binary(248) collate binary default 't'\")\n\ttk.MustQuery(\"show create table t\").Check(testkit.Rows(\"t CREATE TABLE `t` (\\n `a` binary(248) DEFAULT 't\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0\\\\0'\\n) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci\"))\n\ttk.MustQuery(\"select * from t\").Check(testkit.Rows(\"4047\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\"))\n\n\t// For point 2 with varbinary:\n\ttk.MustExec(\"drop table if exists t\")\n\ttk.MustExec(\"create table t(a bit(13) not null) collate utf8mb4_general_ci\")\n\ttk.MustExec(\"insert into t values ( 4047 )\")\n\ttk.MustExec(\"alter table t change column a a varbinary(248) collate binary default 't'\")\n\ttk.MustQuery(\"show create table t\").Check(testkit.Rows(\"t CREATE TABLE `t` (\\n `a` varbinary(248) DEFAULT 't'\\n) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci\"))\n\ttk.MustQuery(\"select * from t\").Check(testkit.Rows(\"4047\"))\n}", "title": "" }, { "docid": "488c2f750c568889359dfc03b7765e17", "score": "0.46462533", "text": "func TestUnitSignatureEncoding(t *testing.T) {\n\t// Create a dummy key pair.\n\tvar sk SecretKey\n\tsk[0] = 4\n\tsk[32] = 5\n\tpk := sk.PublicKey()\n\n\t// Marshal and unmarshal the public key.\n\tmarshalledPK := encoding.Marshal(pk)\n\tvar unmarshalledPK PublicKey\n\terr := encoding.Unmarshal(marshalledPK, &unmarshalledPK)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Test the public keys for equality.\n\tif pk != unmarshalledPK {\n\t\tt.Error(\"pubkey not the same after marshalling and unmarshalling\")\n\t}\n\n\t// Create a signature using the secret key.\n\tvar signedData Hash\n\tfastrand.Read(signedData[:])\n\tsig := SignHash(signedData, sk)\n\n\t// Marshal and unmarshal the signature.\n\tmarshalledSig := encoding.Marshal(sig)\n\tvar unmarshalledSig Signature\n\terr = encoding.Unmarshal(marshalledSig, &unmarshalledSig)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Test signatures for equality.\n\tif sig != unmarshalledSig {\n\t\tt.Error(\"signature not same after marshalling and unmarshalling\")\n\t}\n\n}", "title": "" }, { "docid": "22419db6a1de32014c75dceadd58239b", "score": "0.46436533", "text": "func TestBroadcastEncodeForSigning(t *testing.T) {\n\texpires := time.Unix(0x495fab29, 0) // 2009-01-03 12:15:05 -0600 CST)\n\tenc := make([]byte, 128)\n\n\tm := make([]byte, 32)\n\ta := make([]byte, 8)\n\ttagBytes := make([]byte, 32)\n\ttag, err := hash.NewSha(tagBytes)\n\tif err != nil {\n\t\tt.Fatalf(\"could not make a sha hash %s\", err)\n\t}\n\tmsgTagged, _ := TstNewBroadcast(t, 83928, expires, 1, tag, enc, 3, 1, 1, pubKey1, pubKey2,\n\t\tpow.Data{1024, 1024},\n\t\t1, m, a, nil)\n\n\ttests := []struct {\n\t\tin *Broadcast // Message to encode\n\t\tbuf []byte // Wire encoding\n\t}{\n\t\t// Latest protocol version with multiple object vectors.\n\t\t{\n\t\t\tmsgTagged,\n\t\t\tbroadcastEncodedForSigning,\n\t\t},\n\t}\n\n\tt.Logf(\"Running %d tests\", len(tests))\n\tfor i, test := range tests {\n\t\t// Encode the message to wire.format.\n\t\tvar buf bytes.Buffer\n\t\terr := test.in.encodeForSigning(&buf)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Encode #%d error %v\", i, err)\n\t\t\tcontinue\n\t\t}\n\t\tif !bytes.Equal(buf.Bytes(), test.buf) {\n\t\t\tt.Errorf(\"encodeForSigning #%d\\n got: %s want: %s\", i,\n\t\t\t\tspew.Sdump(buf.Bytes()), spew.Sdump(test.buf))\n\t\t\tcontinue\n\t\t}\n\t}\n}", "title": "" }, { "docid": "be7746b1cf45389160eb8ffd6ebb60cc", "score": "0.46427575", "text": "func TestIsUnspendable(t *testing.T) {\n\ttests := []struct {\n\t\tpkScript []byte\n\t\texpected bool\n\t}{\n\t\t{\n\t\t\t// Unspendable\n\t\t\tpkScript: []byte{0x6a, 0x04, 0x74, 0x65, 0x73, 0x74},\n\t\t\texpected: true,\n\t\t},\n\t\t{\n\t\t\t// Spendable\n\t\t\tpkScript: []byte{0x76, 0xa9, 0x14, 0x29, 0x95, 0xa0,\n\t\t\t\t0xfe, 0x68, 0x43, 0xfa, 0x9b, 0x95, 0x45,\n\t\t\t\t0x97, 0xf0, 0xdc, 0xa7, 0xa4, 0x4d, 0xf6,\n\t\t\t\t0xfa, 0x0b, 0x5c, 0x88, 0xac},\n\t\t\texpected: false,\n\t\t},\n\t}\n\n\tfor i, test := range tests {\n\t\tres := IsUnspendable(test.pkScript)\n\t\tif res != test.expected {\n\t\t\tt.Errorf(\"TestIsUnspendable #%d failed: got %v want %v\",\n\t\t\t\ti, res, test.expected)\n\t\t\tcontinue\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a7b989386436a12e76cd86f1ef1a2d26", "score": "0.46402526", "text": "func (_BondingManager *BondingManagerCaller) TranscoderTotalStake(opts *bind.CallOpts, _transcoder common.Address) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _BondingManager.contract.Call(opts, &out, \"transcoderTotalStake\", _transcoder)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "91b6bc370f58f2b5f0abeb068cbbcb72", "score": "0.46334165", "text": "func TestTlvEncodeDecode(t *testing.T) {\n\tt.Parallel()\n\n\ttestCases := []struct {\n\t\tname string\n\t\tgiven *Tapscript\n\t\texpected *Tapscript\n\t\texpectedErrEncode string\n\t\texpectedErrDecode string\n\t}{{\n\t\tname: \"nil\",\n\t\texpectedErrEncode: \"cannot encode nil script\",\n\t}, {\n\t\tname: \"empty\",\n\t\tgiven: &Tapscript{},\n\t\texpected: &Tapscript{},\n\t}, {\n\t\tname: \"no leaves\",\n\t\tgiven: &Tapscript{\n\t\t\tType: TapscriptTypeFullTree,\n\t\t\tControlBlock: &txscript.ControlBlock{\n\t\t\t\tInternalKey: testPubKey,\n\t\t\t},\n\t\t},\n\t\texpected: &Tapscript{\n\t\t\tType: TapscriptTypeFullTree,\n\t\t\tControlBlock: &txscript.ControlBlock{\n\t\t\t\tInternalKey: testPubKey,\n\t\t\t\tInclusionProof: []byte{},\n\t\t\t},\n\t\t},\n\t}, {\n\t\tname: \"no pubkey\",\n\t\tgiven: &Tapscript{\n\t\t\tType: TapscriptTypeFullTree,\n\t\t\tControlBlock: &txscript.ControlBlock{},\n\t\t},\n\t\texpectedErrEncode: \"control block is missing internal key\",\n\t}, {\n\t\tname: \"empty leaf\",\n\t\tgiven: &Tapscript{\n\t\t\tType: TapscriptTypeFullTree,\n\t\t\tControlBlock: &txscript.ControlBlock{\n\t\t\t\tInternalKey: testPubKey,\n\t\t\t},\n\t\t\tLeaves: []txscript.TapLeaf{{}},\n\t\t},\n\t\texpected: &Tapscript{\n\t\t\tType: TapscriptTypeFullTree,\n\t\t\tControlBlock: &txscript.ControlBlock{\n\t\t\t\tInternalKey: testPubKey,\n\t\t\t\tInclusionProof: []byte{},\n\t\t\t},\n\t\t\tLeaves: []txscript.TapLeaf{{}},\n\t\t},\n\t}, {\n\t\tname: \"full key and leaves\",\n\t\tgiven: &Tapscript{\n\t\t\tType: TapscriptTypeFullTree,\n\t\t\tControlBlock: &txscript.ControlBlock{\n\t\t\t\tInternalKey: testPubKey,\n\t\t\t},\n\t\t\tLeaves: []txscript.TapLeaf{\n\t\t\t\ttxscript.NewBaseTapLeaf(testScript),\n\t\t\t},\n\t\t},\n\t\texpected: &Tapscript{\n\t\t\tType: TapscriptTypeFullTree,\n\t\t\tControlBlock: &txscript.ControlBlock{\n\t\t\t\tInternalKey: testPubKey,\n\t\t\t\tInclusionProof: []byte{},\n\t\t\t},\n\t\t\tLeaves: []txscript.TapLeaf{\n\t\t\t\ttxscript.NewBaseTapLeaf(testScript),\n\t\t\t},\n\t\t},\n\t}, {\n\t\tname: \"invalid proof\",\n\t\tgiven: &Tapscript{\n\t\t\tType: TapscriptTypePartialReveal,\n\t\t\tControlBlock: &txscript.ControlBlock{\n\t\t\t\tInternalKey: testPubKey,\n\t\t\t\tInclusionProof: testScript,\n\t\t\t},\n\t\t\tRevealedScript: testScript,\n\t\t},\n\t\texpectedErrDecode: \"error decoding control block: control \" +\n\t\t\t\"block proof is not a multiple of 32: 6\",\n\t}, {\n\t\tname: \"inclusion proof no leaves\",\n\t\tgiven: &Tapscript{\n\t\t\tType: TapscriptTypePartialReveal,\n\t\t\tControlBlock: &txscript.ControlBlock{\n\t\t\t\tInternalKey: testPubKey,\n\t\t\t\tInclusionProof: testProof[:],\n\t\t\t},\n\t\t\tRevealedScript: testScript,\n\t\t},\n\t\texpected: &Tapscript{\n\t\t\tType: TapscriptTypePartialReveal,\n\t\t\tControlBlock: &txscript.ControlBlock{\n\t\t\t\tInternalKey: testPubKey,\n\t\t\t\tInclusionProof: testProof[:],\n\t\t\t},\n\t\t\tRevealedScript: testScript,\n\t\t},\n\t}, {\n\t\tname: \"root hash only\",\n\t\tgiven: &Tapscript{\n\t\t\tType: TaprootKeySpendRootHash,\n\t\t\tControlBlock: &txscript.ControlBlock{\n\t\t\t\tInternalKey: testPubKey,\n\t\t\t},\n\t\t\tRootHash: testScript,\n\t\t},\n\t\texpected: &Tapscript{\n\t\t\tType: TaprootKeySpendRootHash,\n\t\t\tControlBlock: &txscript.ControlBlock{\n\t\t\t\tInternalKey: testPubKey,\n\t\t\t\tInclusionProof: []byte{},\n\t\t\t},\n\t\t\tRootHash: testScript,\n\t\t},\n\t}, {\n\t\tname: \"full key only\",\n\t\tgiven: &Tapscript{\n\t\t\tType: TapscriptTypeFullTree,\n\t\t\tFullOutputKey: testPubKey,\n\t\t},\n\t\texpected: &Tapscript{\n\t\t\tType: TapscriptTypeFullTree,\n\t\t\tFullOutputKey: testPubKey,\n\t\t},\n\t}}\n\n\tfor _, tc := range testCases {\n\t\ttc := tc\n\n\t\tt.Run(tc.name, func(tt *testing.T) {\n\t\t\tdata, err := tlvEncodeTaprootScript(tc.given)\n\n\t\t\tif tc.expectedErrEncode != \"\" {\n\t\t\t\trequire.Error(tt, err)\n\t\t\t\trequire.Contains(\n\t\t\t\t\ttt, err.Error(), tc.expectedErrEncode,\n\t\t\t\t)\n\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\trequire.NoError(tt, err)\n\t\t\trequire.NotEmpty(tt, data)\n\n\t\t\tdecoded, err := tlvDecodeTaprootTaprootScript(data)\n\t\t\tif tc.expectedErrDecode != \"\" {\n\t\t\t\trequire.Error(tt, err)\n\t\t\t\trequire.Contains(\n\t\t\t\t\ttt, err.Error(), tc.expectedErrDecode,\n\t\t\t\t)\n\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\trequire.NoError(tt, err)\n\n\t\t\trequire.Equal(tt, tc.expected, decoded)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "5829dc18b153a97d5def7a30ef4c6aa4", "score": "0.4631941", "text": "func TestLoadABI(t *testing.T) {\n\n\t//Get the ABI ready\n\trawContractAbi, errorMsg := ioutil.ReadFile(\"./PeggyABI.json\")\n\tif errorMsg != nil {\n\t\tlog.Fatal(errorMsg)\n\t}\n\n\trequire.True(t, strings.Contains(string(rawContractAbi), \"LogLock\"))\n}", "title": "" }, { "docid": "5829dc18b153a97d5def7a30ef4c6aa4", "score": "0.4631941", "text": "func TestLoadABI(t *testing.T) {\n\n\t//Get the ABI ready\n\trawContractAbi, errorMsg := ioutil.ReadFile(\"./PeggyABI.json\")\n\tif errorMsg != nil {\n\t\tlog.Fatal(errorMsg)\n\t}\n\n\trequire.True(t, strings.Contains(string(rawContractAbi), \"LogLock\"))\n}", "title": "" }, { "docid": "71aea07b80a7e5cc7540f9f0f215dd2f", "score": "0.46315685", "text": "func TestSignatureEncoding(t *testing.T) {\n\t// Create key pair.\n\tsk, pk, err := GenerateSignatureKeys()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Marshal and unmarshal the public key.\n\tmarshalledPK := encoding.Marshal(pk)\n\tvar unmarshalledPK PublicKey\n\terr = encoding.Unmarshal(marshalledPK, &unmarshalledPK)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Test the public keys for equality.\n\tif *pk != *unmarshalledPK {\n\t\tt.Error(\"pubkey not the same after marshalling and unmarshalling\")\n\t}\n\n\t// Create a signature using the secret key.\n\tsignedData := []byte{1, 21, 31, 41, 51}\n\tsig, err := SignBytes(signedData, sk)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Marshal and unmarshal the signature.\n\tmarSig := encoding.Marshal(sig)\n\tvar unmarSig Signature\n\terr = encoding.Unmarshal(marSig, &unmarSig)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Test signatures for equality.\n\tif *sig != *unmarSig {\n\t\tt.Error(\"signature not same after marshalling and unmarshalling\")\n\t}\n}", "title": "" }, { "docid": "9ad98bc6df34cf8f7adfd998e4e49cf4", "score": "0.4616842", "text": "func TestBCChainApplication_CheckTx(t *testing.T) {\n\t//app := initChain()\n\t//var cases = []struct {\n\t//}{}\n\t//for i, c := range cases {\n\t//\treq := createCheckTxRequest(int64(i + 1))\n\t//\tresponse := app.CheckTx(req.Tx)\n\t//\tutest.AssertEquals(response.Code, types2.CodeOK)\n\t//\t//todo assert more ...\n\t//\n\t//}\n}", "title": "" }, { "docid": "6e73037fda5406bd935842ffc5928614", "score": "0.4604607", "text": "func (c *Client) RawSign(p12, password, raw string, config *TSPConfig) (*RawSignResponse, error) {\n\tif p12 == \"\" || password == \"\" || raw == \"\" {\n\t\treturn nil, ErrInvalidRequestBody\n\t}\n\n\tif config == nil {\n\t\tconfig = &TSPConfig{}\n\t}\n\n\tbody := apiRequest{\n\t\tVersion: c.version,\n\t\tMethod: \"RAW.sign\",\n\t\tParams: rawSignRequest{\n\t\t\tP12: p12,\n\t\t\tPassword: password,\n\t\t\tRaw: raw,\n\t\t\tCreateTsp: config.Enabled,\n\t\t\tUseTsaPolicy: config.Policy,\n\t\t\tTSPHashAlgorithm: config.HashAlgorithm,\n\t\t\tTspInCms: config.InCMS,\n\t\t},\n\t}\n\n\tvar reply RawSignResponse\n\tif err := c.call(body, &reply); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &reply, nil\n}", "title": "" }, { "docid": "8065a610c3eaa946027bfb9702cafc40", "score": "0.45966044", "text": "func executeTransaction(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n fmt.Println(\"*************************************************\")\n fmt.Println(\"---------- IN EXECUTE TRANSACTION BANK ----------\")\n\n // RETURN ERROR IF ARGS IS NOT 4 IN NUMBER\n if len(args) != 4 {\n fmt.Println(\"**************************\")\n fmt.Println(\"Too few argments... Need 4\")\n fmt.Println(\"**************************\")\n return shim.Error(\"Invalid argument count. Expecting 4.\")\n }\n\n // SET ARGUMENTS INTO LOCAL VARIABLES\n _userName := args[0]\n _bankAC := args[1]\n _transactionType := args[2]\n _amount, _ := strconv.ParseFloat(args[3], 64)\n\n // LOG THE ARGUMENTS\n fmt.Println(\"**** Arguments To Function ****\")\n fmt.Println(\"User Name : \", _userName)\n fmt.Println(\"Bank AC : \", _bankAC)\n fmt.Println(\"Transaction Type: \", _transactionType)\n fmt.Println(\"Amount : \", _amount)\n\n // PREPARE THE KEY TO GET RECORD FROM BANK MASTER\n _bankKey, err := stub.CreateCompositeKey(PREFIX04IDX, []string{PREFIX04, _userName})\n // CHECK FOR ERROR IN CREATING COMPOSITE KEY\n if err != nil {\n return shim.Error(err.Error())\n }\n fmt.Println(\"executeTransaction: Arguments Setting and Prepare Key Completed\")\n fmt.Println(\"Bank Key: \", _bankKey)\n\n // USE THE KEY TO RETRIEVE BANK MASTER\n _bankMasterAsBytes, err := stub.GetState(_bankKey)\n if err != nil {\n return shim.Error(err.Error())\n }\n fmt.Println(\"executeTransaction: Record Retrieved by GetState\")\n fmt.Println(string(_bankMasterAsBytes))\n\n _bankMaster := bankMaster{}\n err = json.Unmarshal(_bankMasterAsBytes, &_bankMaster)\n if err != nil {\n return shim.Error(err.Error())\n }\n\n // READY TO EXECUTE TRANSACTION\n // TRANSACTION EXECUTES ONLY IF ENOUGH BALANCE IS AVAILABLE IN ACCOUNT\n _balance := _bankMaster.Balance\n if _transactionType == DEBIT {\n if (_balance < _amount) {\n fmt.Println(\"executeTransaction: Not enought balance \", _balance, \" < \", _amount)\n return shim.Error(err.Error())\n }\n fmt.Println(\"executeTransaction: Enough balance \", _balance, \" > \", _amount)\n _balance = _balance - _amount\n fmt.Println(\"executeTransaction: Debit Completed\")\n fmt.Println(\"executeTransaction: New balance \", _balance)\n } else if _transactionType == CREDIT {\n fmt.Println(\"executeTransaction: Balance \", _balance, \" Amount \", _amount)\n _balance = _balance + _amount\n fmt.Println(\"executeTransaction: Credit Completed\")\n fmt.Println(\"executeTransaction: New balance \", _balance)\n }\n\n // NOW UPDATE BANK MASTER RECORD\n _bankMaster = bankMaster {\n UserName: _userName,\n BankAC: _bankAC,\n Balance: _balance,\n }\n\n // MARSHAL THE BANK MASTER RECORD\n _bankMasterAsBytes, err = json.Marshal(_bankMaster)\n // CHECK FOR ERROR IN MARSHALING\n if err != nil {\n return shim.Error(err.Error())\n }\n\n // NOW WRITE THE BANK MASTER RECORD\n err = stub.PutState(_bankKey, _bankMasterAsBytes)\n // CHECK FOR ERROR\n if err != nil {\n return shim.Error(err.Error())\n }\n fmt.Println(\"executeTransaction: Record Updated By PutState\")\n\n // NOW PREPARE BANK TRANSACTION RECORD TO WRITE\n _currentTimeTS := getTimeStamp()\n _bankTransaction := bankTransactions {\n TransTimestamp: _currentTimeTS,\n BankAC: _bankAC,\n TransAmount: _amount,\n Balance: _balance,\n }\n\n // PREPARE THE KEY TO WRITE BANK TRANSACTION\n _bankTransactionKey, err := stub.CreateCompositeKey(PREFIX05IDX, []string{PREFIX05, _userName})\n // CHECK FOR ERROR IN CREATING COMPOSITE KEY\n if err != nil {\n return shim.Error(err.Error())\n }\n fmt.Println(\"executeTransaction: Prepare Transaction Key Completed\")\n\n // MARSHAL THE BANK TRANSACTION RECORD\n _bankTransactionAsBytes, err := json.Marshal(_bankTransaction)\n // CHECK FOR ERROR IN MARSHALING\n if err != nil {\n return shim.Error(err.Error())\n }\n\n // NOW WRITE THE BANK TRANSACTION RECORD\n err = stub.PutState(_bankTransactionKey, _bankTransactionAsBytes)\n // CHECK FOR ERROR\n if err != nil {\n return shim.Error(err.Error())\n }\n fmt.Println(\"executeTransaction: Writing Bank Transaction Completed\")\n\n fmt.Println(\"---------- OUT EXECUTE TRANSACTION BANK ----------\")\n fmt.Println(\"**************************************************\")\n\n // RETURN SUCCESS\n return shim.Success(_bankTransactionAsBytes)\n}", "title": "" }, { "docid": "349c18e68ee35d5e0ce59e3e98eb60db", "score": "0.45916718", "text": "func TestAddToOutgoingPoolExportGenesis(t *testing.T) {\n\tinput := CreateTestEnv(t)\n\tctx := input.Context\n\tk := input.GravityKeeper\n\tvar (\n\t\tmySender, _ = sdk.AccAddressFromBech32(\"cosmos1ahx7f8wyertuus9r20284ej0asrs085case3kn\")\n\t\tmyReceiver = \"0xd041c41EA1bf0F006ADBb6d2c9ef9D425dE5eaD7\"\n\t\tmyTokenContractAddr = \"0x429881672B9AE42b8EbA0E26cD9C73711b891Ca5\"\n\t)\n\treceiver, err := types.NewEthAddress(myReceiver)\n\trequire.NoError(t, err)\n\t// mint some voucher first\n\tallVouchersToken, err := types.NewInternalERC20Token(sdk.NewInt(99999), myTokenContractAddr)\n\trequire.NoError(t, err)\n\tallVouchers := sdk.Coins{allVouchersToken.GravityCoin()}\n\n\terr = input.BankKeeper.MintCoins(ctx, types.ModuleName, allVouchers)\n\trequire.NoError(t, err)\n\n\t// set senders balance\n\tinput.AccountKeeper.NewAccountWithAddress(ctx, mySender)\n\terr = input.BankKeeper.SetBalances(ctx, mySender, allVouchers)\n\trequire.NoError(t, err)\n\n\tunbatchedTxMap := make(map[uint64]types.OutgoingTransferTx)\n\tfoundTxsMap := make(map[uint64]bool)\n\t// when\n\tfor i, v := range []uint64{2, 3, 2, 1} {\n\t\tamountToken, err := types.NewInternalERC20Token(sdk.NewInt(int64(i+100)), myTokenContractAddr)\n\t\trequire.NoError(t, err)\n\t\tamount := amountToken.GravityCoin()\n\t\tfeeToken, err := types.NewInternalERC20Token(sdk.NewIntFromUint64(v), myTokenContractAddr)\n\t\trequire.NoError(t, err)\n\t\tfee := feeToken.GravityCoin()\n\n\t\tr, err := input.GravityKeeper.AddToOutgoingPool(ctx, mySender, *receiver, amount, fee)\n\t\trequire.NoError(t, err)\n\n\t\tunbatchedTxMap[r] = types.OutgoingTransferTx{\n\t\t\tId: r,\n\t\t\tSender: mySender.String(),\n\t\t\tDestAddress: myReceiver,\n\t\t\tErc20Token: amountToken.ToExternal(),\n\t\t\tErc20Fee: feeToken.ToExternal(),\n\t\t}\n\t\tfoundTxsMap[r] = false\n\n\t}\n\t// then\n\tgot := ExportGenesis(ctx, k)\n\trequire.NotNil(t, got)\n\n\tfor _, tx := range got.UnbatchedTransfers {\n\t\tcached := unbatchedTxMap[tx.Id]\n\t\trequire.NotNil(t, cached)\n\t\trequire.Equal(t, cached, *tx, \"cached: %+v\\nactual: %+v\\n\", cached, *tx)\n\t\tfoundTxsMap[tx.Id] = true\n\t}\n\n\tfor _, v := range foundTxsMap {\n\t\trequire.True(t, v)\n\t}\n}", "title": "" }, { "docid": "c89b511bdbd6cb3b27865e8b356197ee", "score": "0.45899776", "text": "func GetTxOutTest() {\n\thashs, err := cli.GetRawMempool()\n\tif err != nil {\n\t\tlog.Fatal(\"\", \"error\", err)\n\t}\n\tfor _, h := range hashs {\n\t\tlog.Info(\"GetRawMempool\", \"hashs\", h)\n\t\tresult, _ := cli.GetTxOut(h, 0, true)\n\t\tlog.Info(\"GetTxOut\", \"result\", result)\n\t\tbreak\n\t}\n}", "title": "" }, { "docid": "2be148be7045d7becf8ba4ad6fd9270d", "score": "0.4579816", "text": "func testTxn(owner string, value int64) *transaction.Transaction {\n\tt := &transaction.Transaction{\n\t\tClientID: datastore.Key(owner),\n\t\tToClientID: datastore.Key(clientID2),\n\t\tChainID: config.GetMainChainID(),\n\t\tTransactionData: \"testTxnDataOK\",\n\t\tTransactionOutput: fmt.Sprintf(`{\"name\":\"payFees\",\"input\":{\"round\":%v}}`, 1),\n\t\tValue: value,\n\t\tTransactionType: transaction.TxnTypeSmartContract,\n\t\tCreationDate: common.Now(),\n\t}\n\tt.ComputeOutputHash()\n\tvar scheme = encryption.NewBLS0ChainScheme()\n\tscheme.GenerateKeys()\n\tt.PublicKey = scheme.GetPublicKey()\n\tt.Sign(scheme)\n\treturn t\n}", "title": "" }, { "docid": "dbae93aef66a59087bfdee28875124af", "score": "0.457885", "text": "func (_BondingManager *BondingManagerCallerSession) TranscoderTotalStake(_transcoder common.Address) (*big.Int, error) {\n\treturn _BondingManager.Contract.TranscoderTotalStake(&_BondingManager.CallOpts, _transcoder)\n}", "title": "" }, { "docid": "c5f7723e2d5081488360eaa06af581d4", "score": "0.4572792", "text": "func extractSwapAddresses(pkScript []byte) (string, string, error) {\n\t// A swap redemption sigScript is <pubkey> <secret> and satisfies the\n\t// following swap contract.\n\t//\n\t// OP_IF\n\t// OP_SIZE hashSize OP_EQUALVERIFY OP_SHA256 OP_DATA_32 secretHash OP_EQUALVERIFY OP_DUP OP_HASH160 OP_DATA20 pkHashReceiver\n\t// 1 + 2 + 1 + 1 + 1 + 32 + 1 + 1 + 1 + 1 + 20\n\t// OP_ELSE\n\t// OP_DATA4 locktime OP_CHECKLOCKTIMEVERIFY OP_DROP OP_DUP OP_HASH160 OP_DATA_20 pkHashSender\n\t// 1 + 4 + 1 + 1 + 1 + 1 + 1 + 20\n\t// OP_ENDIF\n\t// OP_EQUALVERIFY\n\t// OP_CHECKSIG\n\t//\n\t// 5 bytes if-else-endif-equalverify-checksig\n\t// 1 + 2 + 1 + 1 + 1 + 32 + 1 + 1 + 1 + 1 + 20 = 62 bytes for redeem block\n\t// 1 + 4 + 1 + 1 + 1 + 1 + 1 + 20 = 30 bytes for refund block\n\t// 5 + 62 + 30 = 97 bytes\n\tif len(pkScript) != SwapContractSize {\n\t\treturn \"\", \"\", fmt.Errorf(\"incorrect swap contract length\")\n\t}\n\tif pkScript[0] == txscript.OP_IF &&\n\t\tpkScript[1] == txscript.OP_SIZE &&\n\t\t// secret key hash size (2 bytes)\n\t\tpkScript[4] == txscript.OP_EQUALVERIFY &&\n\t\tpkScript[5] == txscript.OP_SHA256 &&\n\t\tpkScript[6] == txscript.OP_DATA_32 &&\n\t\t// secretHash (32 bytes)\n\t\tpkScript[39] == txscript.OP_EQUALVERIFY &&\n\t\tpkScript[40] == txscript.OP_DUP &&\n\t\tpkScript[41] == txscript.OP_HASH160 &&\n\t\tpkScript[42] == txscript.OP_DATA_20 &&\n\t\t// receiver's pkh (20 bytes)\n\t\tpkScript[63] == txscript.OP_ELSE &&\n\t\tpkScript[64] == txscript.OP_DATA_4 &&\n\t\t// time (4 bytes)\n\t\tpkScript[69] == txscript.OP_CHECKLOCKTIMEVERIFY &&\n\t\tpkScript[70] == txscript.OP_DROP &&\n\t\tpkScript[71] == txscript.OP_DUP &&\n\t\tpkScript[72] == txscript.OP_HASH160 &&\n\t\tpkScript[73] == txscript.OP_DATA_20 &&\n\t\t// sender's pkh (20 bytes)\n\t\tpkScript[94] == txscript.OP_ENDIF &&\n\t\tpkScript[95] == txscript.OP_EQUALVERIFY &&\n\t\tpkScript[96] == txscript.OP_CHECKSIG {\n\n\t\treceiverAddr, err := dcrutil.NewAddressPubKeyHash(pkScript[43:63], chainParams, dcrec.STEcdsaSecp256k1)\n\t\tif err != nil {\n\t\t\treturn \"\", \"\", fmt.Errorf(\"error decoding address from recipient's pubkey hash\")\n\t\t}\n\n\t\tsenderAddr, err := dcrutil.NewAddressPubKeyHash(pkScript[74:94], chainParams, dcrec.STEcdsaSecp256k1)\n\t\tif err != nil {\n\t\t\treturn \"\", \"\", fmt.Errorf(\"error decoding address from sender's pubkey hash\")\n\t\t}\n\n\t\treturn senderAddr.String(), receiverAddr.String(), nil\n\t}\n\treturn \"\", \"\", fmt.Errorf(\"invalid swap contract\")\n}", "title": "" }, { "docid": "f4202213392fa21ac8781bb5cf14566f", "score": "0.4563349", "text": "func TestWalletSiacoins(t *testing.T) {\n\tif testing.Short() || !build.VLONG {\n\t\tt.SkipNow()\n\t}\n\tt.Parallel()\n\n\tst, err := createServerTester(t.Name())\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer st.server.panicClose()\n\tst2, err := blankServerTester(t.Name() + \"-wallet2\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer st2.server.Close()\n\tst3, err := blankServerTester(t.Name() + \"-wallet3\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer st3.server.Close()\n\tst4, err := blankServerTester(t.Name() + \"-wallet4\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer st4.server.Close()\n\tst5, err := blankServerTester(t.Name() + \"-wallet5\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer st5.server.Close()\n\tst6, err := blankServerTester(t.Name() + \"-wallet6\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer st6.server.Close()\n\n\t// Mine two more blocks with 'st' to get extra outputs to spend.\n\tfor i := 0; i < 2; i++ {\n\t\t_, err := st.miner.AddBlock()\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t}\n\n\t// Connect all the wallets together.\n\twallets := []*serverTester{st, st2, st3, st4, st5, st6}\n\terr = fullyConnectNodes(wallets)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Send 10KS in a single-send to st2.\n\tsendAmount := types.SiacoinPrecision.Mul64(10000)\n\tvar wag WalletAddressGET\n\terr = st2.getAPI(\"/wallet/address\", &wag)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tsendSiacoinsValues := url.Values{}\n\toutputsJSON, _ := json.Marshal([]types.SiacoinOutput{{\n\t\tUnlockHash: wag.Address,\n\t\tValue: sendAmount,\n\t}})\n\tsendSiacoinsValues.Set(\"outputs\", string(outputsJSON))\n\tif err = st.stdPostAPI(\"/wallet/spacecash\", sendSiacoinsValues); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Send 10KS to 3, 4, 5 in a single send.\n\tvar outputs []types.SiacoinOutput\n\tfor _, w := range wallets[2:5] {\n\t\tvar wag WalletAddressGET\n\t\terr = w.getAPI(\"/wallet/address\", &wag)\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\toutputs = append(outputs, types.SiacoinOutput{\n\t\t\tUnlockHash: wag.Address,\n\t\t\tValue: sendAmount,\n\t\t})\n\t}\n\toutputsJSON, _ = json.Marshal(outputs)\n\tsendSiacoinsValues = url.Values{}\n\tsendSiacoinsValues.Set(\"outputs\", string(outputsJSON))\n\tif err = st.stdPostAPI(\"/wallet/spacecash\", sendSiacoinsValues); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Send 10KS to 6 through a joined 250 sends.\n\toutputs = nil\n\tsmallSend := sendAmount.Div64(250)\n\tfor i := 0; i < 250; i++ {\n\t\tvar wag WalletAddressGET\n\t\terr = st6.getAPI(\"/wallet/address\", &wag)\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\toutputs = append(outputs, types.SiacoinOutput{\n\t\t\tUnlockHash: wag.Address,\n\t\t\tValue: smallSend,\n\t\t})\n\t}\n\toutputsJSON, _ = json.Marshal(outputs)\n\tsendSiacoinsValues = url.Values{}\n\tsendSiacoinsValues.Set(\"outputs\", string(outputsJSON))\n\tif err = st.stdPostAPI(\"/wallet/spacecash\", sendSiacoinsValues); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Mine a block to confirm the send.\n\t_, err = st.miner.AddBlock()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\t// Wait for the block to propagate.\n\t_, err = synchronizationCheck(wallets)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Check that the wallets all have 10KS.\n\tfor i, w := range wallets[1:] {\n\t\tvar wg WalletGET\n\t\terr = w.getAPI(\"/wallet\", &wg)\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tif !wg.ConfirmedSiacoinBalance.Equals(sendAmount) {\n\t\t\tt.Errorf(\"wallet %d should have %v coins, has %v\", i+2, sendAmount, wg.ConfirmedSiacoinBalance)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "aad3eff4aa7ce157e9a61f09a20a0e8b", "score": "0.45540127", "text": "func TestKeygenStage6(t *testing.T) {\n\tassert := assert.New(t)\n\n\tstates4Bytes := []byte(`[{\"Parameters\":{\"NumberOfParticipants\":3,\"ParticipantIndex\":0,\"PaillierBitSize\":512,\"SecretSharingDegree\":1,\"SecretSharingStatisticalSecurity\":20,\"SecretSharingModulus\":2623222045352356732683025662305979215904046499376168877804324390266714056732042608675318325182279767188274546065280153959994987994681446800680132187027204726065259578691071312441425971149525208889491572233926587610577246558357978325575132606555085287066466813663551180648008762652591343459455276595418684019307,\"NumProcessors\":4,\"BiprimalityCheckTimes\":0},\"N\":923588794041132910322504663489230159340645205888572410576204511494217137733476860130052233334326157027202966831612503418564291553442062779657809148246697677036362133578704288207973851468378736925970832206358261932321121488532519774503731055510154940781895101061565530550463014148475619594070354394490660675257,\"TermOfLambda\":923588794041132910322504663489230159340645205888572410576204511494217137733476860130052233334326157027202966831612503418564291553442062779657809148246697652541388313042170629790242611175803258418345217941728188565941105917548217448614606718569135605365358413578891583586155149218758657459584554111367553844664,\"TestResponses\":[]},{\"Parameters\":{\"NumberOfParticipants\":3,\"ParticipantIndex\":1,\"PaillierBitSize\":512,\"SecretSharingDegree\":1,\"SecretSharingStatisticalSecurity\":20,\"SecretSharingModulus\":2623222045352356732683025662305979215904046499376168877804324390266714056732042608675318325182279767188274546065280153959994987994681446800680132187027204726065259578691071312441425971149525208889491572233926587610577246558357978325575132606555085287066466813663551180648008762652591343459455276595418684019307,\"NumProcessors\":4,\"BiprimalityCheckTimes\":0},\"N\":923588794041132910322504663489230159340645205888572410576204511494217137733476860130052233334326157027202966831612503418564291553442062779657809148246697677036362133578704288207973851468378736925970832206358261932321121488532519774503731055510154940781895101061565530550463014148475619594070354394490660675257,\"TermOfLambda\":25557955938562419505452003922262818619990788916190541227737041418537421777240436879859970327507060089129874099906967604894621066506567583448756035708761360,\"TestResponses\":null},{\"Parameters\":{\"NumberOfParticipants\":3,\"ParticipantIndex\":2,\"PaillierBitSize\":512,\"SecretSharingDegree\":1,\"SecretSharingStatisticalSecurity\":20,\"SecretSharingModulus\":2623222045352356732683025662305979215904046499376168877804324390266714056732042608675318325182279767188274546065280153959994987994681446800680132187027204726065259578691071312441425971149525208889491572233926587610577246558357978325575132606555085287066466813663551180648008762652591343459455276595418684019307,\"NumProcessors\":4,\"BiprimalityCheckTimes\":0},\"N\":923588794041132910322504663489230159340645205888572410576204511494217137733476860130052233334326157027202966831612503418564291553442062779657809148246697677036362133578704288207973851468378736925970832206358261932321121488532519774503731055510154940781895101061565530550463014148475619594070354394490660675257,\"TermOfLambda\":10787665490565197676068660975032690679537407281834856818578560682804749820662550345191506691878337503503743467014983993260833797125471924715616848074531764,\"TestResponses\":null}]`)\n\tvar states4 []*KeyGenerationStage4\n\tjson.Unmarshal(states4Bytes, &states4)\n\n\tmsgs4toBytes := []byte(`[[{\"From\":1,\"To\":0,\"TestResponses\":[]},{\"From\":2,\"To\":0,\"TestResponses\":[]}],[{\"From\":0,\"To\":1,\"TestResponses\":[]},{\"From\":2,\"To\":1,\"TestResponses\":[]}],[{\"From\":0,\"To\":2,\"TestResponses\":[]},{\"From\":1,\"To\":2,\"TestResponses\":[]}]]`)\n\tvar msgs4to [][]*KeyGenerationMessage4\n\tjson.Unmarshal(msgs4toBytes, &msgs4to)\n\n\t// Compute state 5 from state 4\n\tstates5 := make([]*KeyGenerationStage5, 3)\n\tmsgs5from := make([][]*KeyGenerationMessage5, 3)\n\tvar err error\n\n\tstates5[0], msgs5from[0], err = states4[0].Advance(msgs4to[0])\n\tassert.NoError(err, \"Stage 4 advance to 5 for player 0\")\n\tstates5[1], msgs5from[1], err = states4[1].Advance(msgs4to[1])\n\tassert.NoError(err, \"Stage 4 advance to 5 for player 1\")\n\tstates5[2], msgs5from[2], err = states4[2].Advance(msgs4to[2])\n\tassert.NoError(err, \"Stage 4 advance to 5 for player 2\")\n\n\t// Reroute messages\n\tmsgs5to := make([][]*KeyGenerationMessage5, 3)\n\tfor i := range msgs5to {\n\t\tmsgs5to[i] = make([]*KeyGenerationMessage5, 0)\n\t\tfor j := range msgs5from {\n\t\t\tfor k := range msgs5from[j] {\n\t\t\t\tif msgs5from[j][k].To == i {\n\t\t\t\t\tmsgs5to[i] = append(msgs5to[i], msgs5from[j][k])\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Compute state 6 from state 5\n\tstates6 := make([]*KeyGenerationStage6, 3)\n\tmsgs6from := make([][]*KeyGenerationMessage6, 3)\n\n\tstates6[0], msgs6from[0], err = states5[0].Advance(msgs5to[0])\n\tassert.NoError(err, \"Stage 5 advance to 6 for player 0\")\n\tstates6[1], msgs6from[1], err = states5[1].Advance(msgs5to[1])\n\tassert.NoError(err, \"Stage 5 advance to 6 for player 1\")\n\tstates6[2], msgs6from[2], err = states5[2].Advance(msgs5to[2])\n\tassert.NoError(err, \"Stage 5 advance to 6 for player 2\")\n\n\t// Reroute messages\n\tmsgs6to := make([][]*KeyGenerationMessage6, 3)\n\tfor i := range msgs6to {\n\t\tmsgs6to[i] = make([]*KeyGenerationMessage6, 0)\n\t\tfor j := range msgs6from {\n\t\t\tfor k := range msgs6from[j] {\n\t\t\t\tif msgs6from[j][k].To == i {\n\t\t\t\t\tmsgs6to[i] = append(msgs6to[i], msgs6from[j][k])\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Here we can test theta and h(i) as computed.\n\t// (i, h(i)) is a finite field share of lambda.beta (it autocorrects\n\t// for the extra factor of n! caused by the multiplication),\n\t// and theta is an integer share of lambda.beta.nu.nu, nu = n!.\n\n\t// First, reconstruct lambda and beta.\n\tlambda, beta := big.NewInt(0), big.NewInt(0)\n\tfor i := range states5 {\n\t\tlambda.Add(lambda, states5[i].TermOfL)\n\t\tbeta.Add(beta, states5[i].TermOfB)\n\t}\n\tnu := big.NewInt(6)\n\tnunu := big.NewInt(0).Mul(nu, nu)\n\tlb := big.NewInt(0).Mul(lambda, beta)\n\n\t// Reconstruct h from the h(i) shares and check that it's a secret sharing\n\t// of lambda.beta.\n\th, err := secret.ShareCombine([]secret.Share{\n\t\t{Factor: nunu, Degree: 2, X: 1, Y: states6[0].Hi},\n\t\t{Factor: nunu, Degree: 2, X: 2, Y: states6[1].Hi},\n\t\t{Factor: nunu, Degree: 2, X: 3, Y: states6[2].Hi},\n\t})\n\tif assert.NoError(err, \"Combining shares of h(i)\") {\n\t\tassert.Equal(h.String(), lb.String(), \"Combined H (expected) is not equal to lambda.beta (actual)\")\n\t}\n\th2, err := secret.ShareCombine([]secret.Share{\n\t\t{Factor: bigOne, Degree: 2, X: 1, Y: states6[0].Hi},\n\t\t{Factor: bigOne, Degree: 2, X: 2, Y: states6[1].Hi},\n\t\t{Factor: bigOne, Degree: 2, X: 3, Y: states6[2].Hi},\n\t})\n\tif assert.NoError(err, \"Combining shares of h(i) (2)\") {\n\t\tassert.Equal(\"0\", big.NewInt(0).Mod(h2, lambda).String(), \"Combined nu^2 lambda beta is not divisible by lambda\")\n\t}\n\n\ttheta0, err := secret.ShareCombine([]secret.Share{states6[0].MessageToSelf.ShareOfTheta, msgs6to[0][0].ShareOfTheta, msgs6to[0][1].ShareOfTheta})\n\tassert.NoError(err, \"Combining shares of theta, player 0\")\n\ttheta1, err := secret.ShareCombine([]secret.Share{states6[1].MessageToSelf.ShareOfTheta, msgs6to[1][0].ShareOfTheta, msgs6to[1][1].ShareOfTheta})\n\tassert.NoError(err, \"Combining shares of theta, player 1\")\n\ttheta2, err := secret.ShareCombine([]secret.Share{states6[2].MessageToSelf.ShareOfTheta, msgs6to[2][0].ShareOfTheta, msgs6to[2][1].ShareOfTheta})\n\tassert.NoError(err, \"Combining shares of theta, player 2\")\n\n\tassert.Equal(theta0.String(), theta1.String(), \"Theta 0 and 1 differ\")\n\tassert.Equal(theta0.String(), theta2.String(), \"Theta 0 and 2 differ\")\n\n\tif assert.NoError(err, \"Combining shares of theta\") {\n\t\tlb.Mul(lambda, beta).Mul(lb, nu).Mul(lb, nu).Mod(lb, states6[0].N)\n\t\tassert.Equal(theta0.String(), lb.String(), \"Combined theta (expected) is not equiv (mod N) to lambda.beta.nu.nu (actual)\")\n\t}\n}", "title": "" }, { "docid": "f28c101c2a872fcf489eaebfc9753fd6", "score": "0.45479608", "text": "func TestDecodeBase58(t *testing.T) {\n\t// Hex String representation of the decoded address.\n\t// Expected the Hexadcimal String of the pre-encoding of address (mo24iC138ffpdWiFsH8y7dq6v5CDD1UbiT)\n\texpected := \"6f524a4c9f658b9e482c40669096d93f2a6d96de523106c664\"\n\taddress := \"mo24iC138ffpdWiFsH8y7dq6v5CDD1UbiT\"\n\n\tresult, err := DecodeBase58(address)\n\tif err != nil {\n\t\tt.Fatalf(\"failed to decode a base58 address: %v\", err)\n\t}\n\tresultHex := fmt.Sprintf(\"%x\", string(result))\n\n\tif resultHex != expected {\n\t\tt.Fatalf(\"failed to decode the address \"+\n\t\t\t\"expected: %v received: %v\", expected, resultHex)\n\t}\n\n\t// Hex String representation of the decoded address.\n\t// Expected is the pre-encoding of address (18W7R8v4KeEZrQEe9iAbHicn45bWNn2QBe)\n\texpected = \"00524a4c9f658b9e482c40669096d93f2a6d96de52eb64c4fd\"\n\taddress = \"18W7R8v4KeEZrQEe9iAbHicn45bWNn2QBe\"\n\n\tresult, err = DecodeBase58(address)\n\tif err != nil {\n\t\tt.Fatalf(\"failed to decode a base58 address: %v\", err)\n\t}\n\tresultHex = fmt.Sprintf(\"%x\", string(result))\n\n\tif resultHex != expected {\n\t\tt.Fatalf(\"failed to decode the address \"+\n\t\t\t\"expected: %v received: %v\", expected, resultHex)\n\t}\n}", "title": "" }, { "docid": "40947f357e711f364e55372fdc3eedaf", "score": "0.45420358", "text": "func TestSendBidTransaction(t *testing.T) {\n\tlocalNet.LoadNetworkWallets(t, localNet.Size())\n\n\tt.Log(\"Send request to node 0 to generate and process a Bid transaction\")\n\ttxidBytes, err := localNet.SendBidCmd(0, 10, 10)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tfor i := 1; i < localNet.Size(); i++ {\n\t\tt.Logf(\"Send request to node %d to generate and process a Bid transaction\", i)\n\t\tif _, err := localNet.SendBidCmd(uint(i), 10, 10); err != nil {\n\t\t\tt.Error(err)\n\t\t}\n\t}\n\n\ttxID := hex.EncodeToString(txidBytes)\n\tt.Logf(\"Bid transaction id: %s\", txID)\n\n\tt.Log(\"Ensure all nodes have accepted this transaction at the same height\")\n\tblockhash := \"\"\n\tfor i := 0; i < localNet.Size(); i++ {\n\t\tbh := localNet.WaitUntilTx(t, uint(i), txID)\n\n\t\tif len(bh) == 0 {\n\t\t\tt.Fatal(\"empty blockhash\")\n\t\t}\n\n\t\tif len(blockhash) != 0 && blockhash != bh {\n\t\t\t// the case where the network has inconsistency and same tx has been\n\t\t\t// accepted within different blocks\n\t\t\tt.Fatal(\"same tx hash has been accepted within different blocks\")\n\t\t}\n\n\t\tif i == 0 {\n\t\t\tblockhash = bh\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0242b583e245a5ff32f07b7af0c2318a", "score": "0.4539374", "text": "func rawTxInSig(tx *wire.MsgTx, idx int, pkScript []byte, hashType txscript.SigHashType,\n\tkey *btcec.PrivateKey, _ []int64, _ [][]byte) ([]byte, error) {\n\n\treturn txscript.RawTxInSignature(tx, idx, pkScript, txscript.SigHashAll, key)\n}", "title": "" }, { "docid": "ba0e668b2802498122a907226fe77a6d", "score": "0.45229563", "text": "func RawTx(from string, to string, data string, pkey string, _gas uint64, _gasPrice uint64, value int64) (string) {\n privkey, _ := crypto.HexToECDSA(pkey)\n // Get some params\n _nonce := GetNonce(from)\n nonce, _ := strconv.ParseUint(_nonce[2:], 16, 64)\n net_version, _ := client.NetVersion()\n\n gas := big.NewInt(int64(_gas))\n gasPrice := big.NewInt(int64(_gasPrice))\n\n // Form the raw transaction (signed payload)\n txn, _ := sig.GetRawTx(net_version, from, to, data, nonce, value, gas, gasPrice, privkey)\n return txn\n}", "title": "" }, { "docid": "6a899782cccd013081cefad6b7547ab6", "score": "0.4516579", "text": "func (cn coinEx) CreateRawTx(txIns []coin.TxIn, getKey coin.GetPrivKey, txOuts interface{}) (string, error) {\n\ttx := skycoin.Transaction{}\n\tfor _, in := range txIns {\n\t\ttx.PushInput(cipher.MustSHA256FromHex(in.Txid))\n\t}\n\n\ts := reflect.ValueOf(txOuts)\n\tif s.Kind() != reflect.Slice {\n\t\treturn \"\", errors.New(\"error tx out type\")\n\t}\n\touts := make([]interface{}, s.Len())\n\tfor i := 0; i < s.Len(); i++ {\n\t\touts[i] = s.Index(i).Interface()\n\t}\n\n\tif len(outs) > 2 {\n\t\treturn \"\", errors.New(\"out address more than 2\")\n\t}\n\n\tfor _, o := range outs {\n\t\tout := o.(skycoin.TxOut)\n\t\t// todo decimal can be set\n\t\tif (out.Coins % 1e3) != 0 {\n\t\t\treturn \"\", fmt.Errorf(\"%s coins must be multiple of 1e3\", cn.Name())\n\t\t}\n\t\ttx.PushOutput(out.Address, out.Coins, out.Hours)\n\t}\n\n\tkeys := make([]cipher.SecKey, len(txIns))\n\tfor i, in := range txIns {\n\t\ts, err := getKey(in.Address)\n\t\tif err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"get private key failed:%v\", err)\n\t\t}\n\t\tk, err := cipher.SecKeyFromHex(s)\n\t\tif err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"invalid private key:%v\", err)\n\t\t}\n\t\tkeys[i] = k\n\t}\n\n\ttx.SignInputs(keys)\n\ttx.UpdateHeader()\n\n\td, err := tx.Serialize()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn hex.EncodeToString(d), nil\n}", "title": "" } ]
540400fd9c26fee2dab973582dc49971
WithResourcePathIdsMap sets map to keep resourcePathIdsMap to authorize connections with Registry Authorize Chain Element
[ { "docid": "2f437dc8f4aaaa326a2d099d57989a1f", "score": "0.7369873", "text": "func WithResourcePathIdsMap(m *genericsync.Map[string, []string]) Option {\n\treturn func(o *options) {\n\t\to.resourcePathIdsMap = m\n\t}\n}", "title": "" } ]
[ { "docid": "202def39ac25d5a05768aea28814a7e5", "score": "0.5225816", "text": "func (d *Dao) ResourceMap(c context.Context, oid int64, typ int32) (res map[int64]*model.Resource, err error) {\n\trows, err := d.db.Query(c, fmt.Sprintf(_resources, d.hit(oid)), oid, typ)\n\tif err != nil {\n\t\tlog.Error(\"db.Query error(%v)\", err)\n\t\treturn\n\t}\n\tdefer rows.Close()\n\tres = make(map[int64]*model.Resource)\n\tfor rows.Next() {\n\t\tr := &model.Resource{}\n\t\tif err = rows.Scan(&r.ID, &r.Oid, &r.Type, &r.Tid, &r.Mid, &r.Role, &r.Like, &r.Hate, &r.Attr, &r.State, &r.CTime, &r.MTime); err != nil {\n\t\t\tlog.Error(\"rows.Scan error(%v)\", err)\n\t\t\treturn\n\t\t}\n\t\tres[r.Tid] = r\n\t}\n\treturn\n}", "title": "" }, { "docid": "48c041f4b79f7d0dafa968d0ba1d784a", "score": "0.518513", "text": "func NewResourceMap(path string, res []string) ResourceMapping {\n\treturn ResourceMapping{\n\t\tUrl: \"/\" + path + \"/\",\n\t\tResources: res,\n\t}\n}", "title": "" }, { "docid": "94f23b095ecc6a6c6eb685ca4b7307ab", "score": "0.5107919", "text": "func namespacedResourceMap(objs []unstructured.Unstructured, releaseNamespace string) map[string][]string {\n\tresources := make(map[string][]string)\n\tfor _, obj := range objs {\n\t\tnamespace := obj.GetNamespace()\n\t\tif namespace == \"\" {\n\t\t\tnamespace = releaseNamespace\n\t\t}\n\t\tres := obj.GetKind() + \"/\" + obj.GetName()\n\t\tresources[namespace] = append(resources[namespace], res)\n\t}\n\treturn resources\n}", "title": "" }, { "docid": "d57a47b9bb2d0cf5e4e4e64d5ea681ad", "score": "0.5096026", "text": "func (m *ResourceAction) SetAllowedResourceActions(value []string)() {\n m.allowedResourceActions = value\n}", "title": "" }, { "docid": "3cc27d8babb47d1cb607f45116f78e38", "score": "0.50354505", "text": "func genResourceIDs(wr io.Writer) {\n\tconst text = `\n// New{{.Service}}ResourceID creates a ResourceID for the {{.Service}} resource.\n{{- if .KeyIsProject}}\nfunc New{{.Service}}ResourceID(project string) *ResourceID {\n\tvar key *meta.Key\n{{- else}}\n{{- if .KeyIsGlobal}}\nfunc New{{.Service}}ResourceID(project, name string) *ResourceID {\n\tkey := meta.GlobalKey(name)\n{{- end}}\n{{- if .KeyIsRegional}}\nfunc New{{.Service}}ResourceID(project, region, name string) *ResourceID {\n\tkey := meta.RegionalKey(name, region)\n{{- end}}\n{{- if .KeyIsZonal}}\nfunc New{{.Service}}ResourceID(project, zone, name string) *ResourceID {\n\tkey := meta.ZonalKey(name, zone)\n{{- end -}}\n{{end}}\n\treturn &ResourceID{project, \"{{.Resource}}\", key}\n}\n`\n\ttmpl := template.Must(template.New(\"resourceIDs\").Parse(text))\n\tfor _, sg := range meta.SortedServicesGroups {\n\t\tif err := tmpl.Execute(wr, sg.ServiceInfo()); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c2b88e52753e6a32bad5bb2f601f5cf0", "score": "0.5024978", "text": "func expandServiceBinaryAuthorizationMap(c *Client, f map[string]ServiceBinaryAuthorization, res *Service) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandServiceBinaryAuthorization(c, &item, res)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "4ff66bfcba8c3db304cda1413924d926", "score": "0.5012985", "text": "func setResource(alloc v1.ResourceList, res map[string]int64, grpres map[string]int64) {\n\t// set resource\n\tfor key, val := range res {\n\t\tsetRes(alloc, key, val)\n\t}\n\t// set group resource\n\tfor key, val := range grpres {\n\t\tsetGrpRes(alloc, key, val)\n\t}\n}", "title": "" }, { "docid": "2ad4951adcc9859c5af3c03fe2609838", "score": "0.5004654", "text": "func PartialMapResource(api, resource string) {\n\tPartialMap[api] = resource\n}", "title": "" }, { "docid": "4d9c66beb98f7687b03e5fc96c3ecb47", "score": "0.49286714", "text": "func addAPIPath(providers AzureProviders, fileLocation, path string, swagger *Spec) {\n\tfor _, re := range excludeRegexes {\n\t\tif re.MatchString(fileLocation) {\n\t\t\treturn\n\t\t}\n\t}\n\n\tprov := resources.ResourceProvider(fileLocation, path)\n\tif prov == \"\" {\n\t\treturn\n\t}\n\n\t// Find (or create) the version map with this name.\n\tversionMap, ok := providers[prov]\n\tif !ok {\n\t\tversionMap = map[string]VersionResources{}\n\t\tproviders[prov] = versionMap\n\t}\n\n\t// Find (or create) the resource map with this name.\n\tapiVersion := ApiToSdkVersion(swagger.Info.Version)\n\tversion, ok := versionMap[apiVersion]\n\tif !ok {\n\t\tversion = VersionResources{\n\t\t\tResources: map[string]*ResourceSpec{},\n\t\t\tInvokes: map[string]*ResourceSpec{},\n\t\t}\n\t\tversionMap[apiVersion] = version\n\t}\n\n\tpathItem := swagger.Paths.Paths[path]\n\n\tif ok := resources.HasCustomDelete(path); ok {\n\t\tpathItem.Delete = &spec.Operation{\n\t\t\tOperationProps: spec.OperationProps{\n\t\t\t\tDescription: \"Custom implementation of this operation is available\",\n\t\t\t},\n\t\t}\n\t}\n\n\tpathItemList, hasList := swagger.Paths.Paths[path+\"/list\"]\n\n\t// Add a resource entry.\n\tif pathItem.Put != nil && !pathItem.Put.Deprecated {\n\t\thasDelete := pathItem.Delete != nil && !pathItem.Delete.Deprecated\n\n\t\tswitch {\n\t\tcase pathItem.Get != nil && !pathItem.Get.Deprecated:\n\t\t\tdefaultState := defaults.GetDefaultResourceState(path)\n\t\t\tif defaultState != nil && hasDelete && defaultState.HasNonEmptyCollections {\n\t\t\t\t// See the limitation in `SdkShapeConverter.isDefaultResponse()`\n\t\t\t\tpanic(fmt.Sprintf(\"invalid defaultResourcesState '%s': non-empty collections aren't supported for deletable resources\", path))\n\t\t\t}\n\n\t\t\ttypeName := resources.ResourceName(pathItem.Get.ID, path)\n\n\t\t\tif typeName != \"\" && (hasDelete || defaultState != nil) {\n\t\t\t\tif _, ok := version.Resources[typeName]; ok && version.Resources[typeName].Path != path {\n\t\t\t\t\tfmt.Printf(\"warning: duplicate resource %s/%s at paths:\\n - %s\\n - %s\\n\", apiVersion, typeName, path, version.Resources[typeName].Path)\n\t\t\t\t}\n\t\t\t\tdefaultBody := map[string]interface{}{}\n\t\t\t\tif defaultState != nil {\n\t\t\t\t\tdefaultBody = defaultState.State\n\t\t\t\t}\n\t\t\t\tversion.Resources[typeName] = &ResourceSpec{\n\t\t\t\t\tPath: path,\n\t\t\t\t\tPathItem: &pathItem,\n\t\t\t\t\tSwagger: swagger,\n\t\t\t\t\tDefaultBody: defaultBody,\n\t\t\t\t}\n\t\t\t}\n\t\tcase pathItem.Head != nil && !pathItem.Head.Deprecated:\n\t\t\ttypeName := resources.ResourceName(pathItem.Head.ID, path)\n\t\t\tif typeName != \"\" && hasDelete {\n\t\t\t\tif _, ok := version.Resources[typeName]; ok && version.Resources[typeName].Path != path {\n\t\t\t\t\tfmt.Printf(\"warning: duplicate resource %s/%s at paths:\\n - %s\\n - %s\\n\", apiVersion, typeName, path, version.Resources[typeName].Path)\n\t\t\t\t}\n\t\t\t\tversion.Resources[typeName] = &ResourceSpec{\n\t\t\t\t\tPath: path,\n\t\t\t\t\tPathItem: &pathItem,\n\t\t\t\t\tSwagger: swagger,\n\t\t\t\t}\n\t\t\t}\n\t\tcase hasList:\n\t\t\tvar typeName string\n\t\t\tswitch {\n\t\t\tcase pathItemList.Get != nil && !pathItemList.Get.Deprecated:\n\t\t\t\ttypeName = resources.ResourceName(pathItemList.Get.ID, path)\n\t\t\tcase pathItemList.Post != nil && !pathItemList.Post.Deprecated:\n\t\t\t\ttypeName = resources.ResourceName(pathItemList.Post.ID, path)\n\t\t\t}\n\t\t\tif typeName != \"\" {\n\t\t\t\tvar defaultBody map[string]interface{}\n\t\t\t\tdefaultState := defaults.GetDefaultResourceState(path)\n\t\t\t\tif defaultState != nil {\n\t\t\t\t\tdefaultBody = defaultState.State\n\t\t\t\t} else if !hasDelete {\n\t\t\t\t\t// The /list pattern that we handle here seems to (almost) universally have this shape of the default body.\n\t\t\t\t\t// Instead of maintaining the resources in defaultResourcesState, we can hard-code it here.\n\t\t\t\t\tdefaultBody = map[string]interface{}{\n\t\t\t\t\t\t\"properties\": map[string]interface{}{},\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif _, ok := version.Resources[typeName]; ok && version.Resources[typeName].Path != path {\n\t\t\t\t\tfmt.Printf(\"warning: duplicate resource %s/%s at paths:\\n - %s\\n - %s\\n\", apiVersion, typeName, path, version.Resources[typeName].Path)\n\t\t\t\t}\n\t\t\t\tversion.Resources[typeName] = &ResourceSpec{\n\t\t\t\t\tPath: path,\n\t\t\t\t\tPathItem: &pathItem,\n\t\t\t\t\tPathItemList: &pathItemList,\n\t\t\t\t\tSwagger: swagger,\n\t\t\t\t\tDefaultBody: defaultBody,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Add an entry for PATCH-based resources.\n\tif pathItem.Patch != nil && !pathItem.Patch.Deprecated && pathItem.Get != nil && !pathItem.Get.Deprecated {\n\t\tdefaultState := defaults.GetDefaultResourceState(path)\n\t\ttypeName := resources.ResourceName(pathItem.Get.ID, path)\n\t\tif typeName != \"\" && defaultState != nil {\n\t\t\tif _, ok := version.Resources[typeName]; ok && version.Resources[typeName].Path != path {\n\t\t\t\tfmt.Printf(\"warning: duplicate resource %s/%s at paths:\\n - %s\\n - %s\\n\", apiVersion, typeName, path, version.Resources[typeName].Path)\n\t\t\t}\n\t\t\tversion.Resources[typeName] = &ResourceSpec{\n\t\t\t\tPath: path,\n\t\t\t\tPathItem: &pathItem,\n\t\t\t\tSwagger: swagger,\n\t\t\t\tDefaultBody: defaultState.State,\n\t\t\t}\n\t\t}\n\t}\n\n\t// Add a POST invoke entry.\n\tif pathItem.Post != nil && !pathItem.Post.Deprecated {\n\t\tparts := strings.Split(path, \"/\")\n\t\toperationName := strings.ToLower(parts[len(parts)-1])\n\t\tparts = strings.Split(pathItem.Post.OperationProps.ID, \"_\")\n\t\toperationId := strings.ToLower(parts[len(parts)-1])\n\t\tprefix := \"\"\n\t\tswitch {\n\t\tcase strings.HasPrefix(operationName, \"list\"):\n\t\t\tprefix = \"list\"\n\t\tcase strings.HasPrefix(operationName, \"get\"):\n\t\t\tprefix = \"get\"\n\t\tcase strings.HasPrefix(operationId, \"get\") && pathItem.Put == nil &&\n\t\t\t(strings.Contains(operationName, \"key\") ||\n\t\t\t\tstrings.Contains(operationName, \"token\") ||\n\t\t\t\tstrings.Contains(operationName, \"credential\")):\n\t\t\t// Operation ID-based selection is a bit tricky, so we apply the following heuristic:\n\t\t\t// - Called according to the pattern `Foo_GetBar`,\n\t\t\t// - It's not a resource (ensured by lack of a PUT operation),\n\t\t\t// - It's about a key, a token, or credentials.\n\t\t\tprefix = \"get\"\n\t\tdefault:\n\t\t\treturn\n\t\t}\n\n\t\ttypeName := resources.ResourceName(pathItem.Post.ID, path)\n\t\tif typeName != \"\" {\n\t\t\tversion.Invokes[prefix+typeName] = &ResourceSpec{\n\t\t\t\tPath: path,\n\t\t\t\tPathItem: &pathItem,\n\t\t\t\tSwagger: swagger,\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "450c6a91340d466e2e73f46c4bd1c353", "score": "0.49235106", "text": "func AddRelatedPropertyGeneratorsForResourceIdentity_ARM(gens map[string]gopter.Gen) {\n\tgens[\"UserAssignedIdentities\"] = gen.MapOf(gen.AlphaString(), UserAssignedIdentityDetails_ARMGenerator())\n}", "title": "" }, { "docid": "a09261c5626217a0b29e0bc420ee96d9", "score": "0.4905704", "text": "func (RsrcMgr *OpenOltResourceMgr) RemoveResourceMap(ctx context.Context, intfID uint32, onuID int32, uniID int32) {\n\tIntfOnuIDUniID := fmt.Sprintf(\"%d,%d,%d\", intfID, onuID, uniID)\n\tRsrcMgr.ResourceMgrs[intfID].RemoveResourceMap(ctx, IntfOnuIDUniID)\n}", "title": "" }, { "docid": "f0e6d97ed4bd90223e9ebb4b481f1165", "score": "0.48997858", "text": "func flattenServiceBinaryAuthorizationMap(c *Client, i interface{}, res *Service) map[string]ServiceBinaryAuthorization {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]ServiceBinaryAuthorization{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]ServiceBinaryAuthorization{}\n\t}\n\n\titems := make(map[string]ServiceBinaryAuthorization)\n\tfor k, item := range a {\n\t\titems[k] = *flattenServiceBinaryAuthorization(c, item.(map[string]interface{}), res)\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "cc7ced29c00946c616ec6077808200e1", "score": "0.48890463", "text": "func getAllResourcesFromRoot(apiClient k8s.K8sClientInf, pathName string, resourceMap map[string]Resource, resNodeMap map[string]*ResNode) {\n rd, err := ioutil.ReadDir(pathName)\n if err != nil {\n \tlog.Fatalln(\"read file error!\", err)\n }\n //resource file path\n for _, fi := range rd {\n if fi.IsDir() {\n getAllResourcesFromRoot(apiClient, pathName +\"/\"+fi.Name(), resourceMap, resNodeMap)\n } else {\n \tfilePath := pathName +\"/\"+fi.Name()\n \tif path.Ext(filePath) == \".yaml\" && strings.Contains(filePath, \"deployment.yaml\") {\n \t\tdeployment := apiClient.UnmarshalDeployment(GetResourceYaml(filePath))\n\t \tname := deployment.ObjectMeta.Name\n\t \tif _, res := resourceMap[name]; !res {\n\t \t\tvar resNode ResNode\n\t \t\tvar res Resource\n\t \t\tres.Name = name\n\t \t\tres.Path = pathName\n\t \t\tresourceMap[name] = res\n\n\t \t\tresNode.Id = xid.New().String()\n\t \t\tresNode.Name = name\n\t \t\tresNode.Res = resourceMap[name]\n\t \t\t//depends\n\t \t\tdepends := deployment.ObjectMeta.Annotations[\"dependOn\"]\n\t \t\tif depends != \"\" {\n\t\t\t\t\t\tresNode.Depends = strings.Split(depends, \",\")\n\t\t\t\t\t}\n\t\t\t\t\t//leaf node\n\t\t\t\t\tresNode.IsLeaf = false\n\t\t\t\t\tif len(resNode.Depends) == 0 {\n\t\t\t\t\t\tresNode.IsLeaf = true\n\t\t\t\t\t}\n\t\t\t\t\t//add node\n\t\t\t\t\tresNodeMap[name] = &resNode\n\t\t\t\t\t//add init data\n\t\t\t\t\taddDataInitPath(resNodeMap[name])\n\t \t}\n \t}\n }\n }\n}", "title": "" }, { "docid": "0d780fc519ec964b629c1fc4466034c7", "score": "0.488787", "text": "func expandServiceTemplateContainersResourcesMap(c *Client, f map[string]ServiceTemplateContainersResources, res *Service) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandServiceTemplateContainersResources(c, &item, res)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "91c5612642e6d04587b6c10724762ada", "score": "0.48824584", "text": "func RegisterHandlers(r *routing.RouteGroup, service Service, authHandler routing.Handler, logger log.Logger) {\n\tres := resource{service, logger}\n\tr.Use(authHandler)\n\tr.Get(\"/apikeys/<id>\", res.get)\n\tr.Post(\"/apikeys\", res.create)\n\tr.Delete(\"/apikeys/<id>\", res.delete)\n}", "title": "" }, { "docid": "4a53b4e7dfddbcf70c98e315fa2d7b3e", "score": "0.4881497", "text": "func AddRelatedPropertyGeneratorsForSignedIdentifier(gens map[string]gopter.Gen) {\n\tgens[\"AccessPolicy\"] = gen.PtrOf(AccessPolicyGenerator())\n}", "title": "" }, { "docid": "4c27e93d9a9f5e2e4661a288e17fc5eb", "score": "0.48797578", "text": "func getPathParamMap(c *gin.Context) map[string]string {\n\tpm := make(map[string]string)\n\tfor _, p := range c.Params {\n\t\tpm[p.Key] = p.Value\n\t}\n\treturn pm\n}", "title": "" }, { "docid": "a2b5687f6c133b53e34c24281f0d27ef", "score": "0.4874297", "text": "func (g *CommandGuard) GetResourceDetailsFromMap(selectedVerb, resourceType string, resMap map[string]v1.APIResource) (Resource, error) {\n\tres, exists := resMap[resourceType]\n\tif !exists {\n\t\treturn Resource{}, ErrResourceNotFound\n\t}\n\n\tverbs := g.getAllSupportedVerbs(resourceType, res.Verbs)\n\tif slices.Contains(verbs, selectedVerb) {\n\t\treturn Resource{\n\t\t\tName: res.Name,\n\t\t\tNamespaced: res.Namespaced,\n\t\t\tSlashSeparatedInCommand: false,\n\t\t}, nil\n\t}\n\n\taddVerbsWithSlash, exists := additionalVerbsWithSlash[resourceType]\n\tif exists && slices.Contains(addVerbsWithSlash, selectedVerb) {\n\t\treturn Resource{\n\t\t\tName: res.Name,\n\t\t\tNamespaced: res.Namespaced,\n\t\t\tSlashSeparatedInCommand: true,\n\t\t}, nil\n\t}\n\n\treturn Resource{}, ErrVerbNotSupported\n}", "title": "" }, { "docid": "8cb535715ec47f64c776e028804d31f2", "score": "0.48605856", "text": "func routesForGrant(l logr.Logger, client kube_client.Client) kube_handler.MapFunc {\n\tl = l.WithName(\"routesForGrant\")\n\n\treturn func(ctx context.Context, obj kube_client.Object) []kube_reconcile.Request {\n\t\tgrant, ok := obj.(*gatewayapi.ReferenceGrant)\n\t\tif !ok {\n\t\t\tl.Error(nil, \"unexpected error converting to be mapped %T object to GatewayGrant\", obj)\n\t\t\treturn nil\n\t\t}\n\n\t\tvar namespaces []gatewayapi.Namespace\n\t\tfor _, from := range grant.Spec.From {\n\t\t\tif from.Group == gatewayapi.Group(gatewayapi.GroupVersion.Group) && from.Kind == common.HTTPRouteKind {\n\t\t\t\tnamespaces = append(namespaces, from.Namespace)\n\t\t\t}\n\t\t}\n\n\t\tvar requests []kube_reconcile.Request\n\n\t\tfor _, namespace := range namespaces {\n\t\t\troutes := &gatewayapi.HTTPRouteList{}\n\t\t\tif err := client.List(ctx, routes, kube_client.InNamespace(namespace)); err != nil {\n\t\t\t\tl.Error(err, \"unexpected error listing HTTPRoutes\")\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tfor i := range routes.Items {\n\t\t\t\trequests = append(requests, kube_reconcile.Request{\n\t\t\t\t\tNamespacedName: kube_client.ObjectKeyFromObject(&routes.Items[i]),\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\n\t\treturn requests\n\t}\n}", "title": "" }, { "docid": "00b767bccdf6ea62f1d5b4281490995d", "score": "0.48582298", "text": "func (m *EntitlementManagementResourceRequestsItemCatalogResourcesItemRolesItemResourceScopesRequestBuilder) ByAccessPackageResourceScopeIdString(accessPackageResourceScopeId string)(*EntitlementManagementResourceRequestsItemCatalogResourcesItemRolesItemResourceScopesAccessPackageResourceScopeItemRequestBuilder) {\n urlTplParams := make(map[string]string)\n for idx, item := range m.BaseRequestBuilder.PathParameters {\n urlTplParams[idx] = item\n }\n if accessPackageResourceScopeId != \"\" {\n urlTplParams[\"accessPackageResourceScope%2Did\"] = accessPackageResourceScopeId\n }\n return NewEntitlementManagementResourceRequestsItemCatalogResourcesItemRolesItemResourceScopesAccessPackageResourceScopeItemRequestBuilderInternal(urlTplParams, m.BaseRequestBuilder.RequestAdapter)\n}", "title": "" }, { "docid": "ba06964a7ea831bfd756c0b28eb6674a", "score": "0.48447573", "text": "func usesPreAuthorizedId(req *restful.Request, resp *restful.Response, chain *restful.FilterChain) {\n\tfuncName := util.GetCallerName()\n\tlog.Printf(\"%s Authorizing Request %s\", funcName, req.Request.URL.RequestURI())\n\treq.Request.Header.Set(\"X-meritwiki-requires-preauth-id\", \"true\")\n\troute := req.Request.URL.Path\n\tlog.Printf(\"%s Authorizing Route Path %#v\", funcName, route)\n\tchain.ProcessFilter(req, resp)\n}", "title": "" }, { "docid": "271802376afdc5ea83c58814174b84e1", "score": "0.47920233", "text": "func (r Resources) FuncMap() map[string]interface{} {\n\tm := make(map[string]interface{})\n\tm[\"AppName\"] = r.AppName\n\tm[\"Bad0\"] = r.Bad0\n\tm[\"Bad1\"] = r.Bad1\n\tm[\"HelloWorld\"] = r.HelloWorld\n\tm[\"HelloX\"] = r.HelloX\n\tm[\"SelectorDetailsArray\"] = r.SelectorDetailsArray\n\tm[\"SelectorDetailsArray2\"] = r.SelectorDetailsArray2\n\tm[\"XHasYCats\"] = r.XHasYCats\n\tm[\"XHasYCats2\"] = r.XHasYCats2\n\tm[\"XRunsAroundYAndSingsZ\"] = r.XRunsAroundYAndSingsZ\n\treturn m\n}", "title": "" }, { "docid": "b7913c1efaeb40bf1a91952e1dfcc8c4", "score": "0.47658134", "text": "func (m *DeviceManagementRequestBuilder) ResourceOperationsById(id string)(*ResourceOperationsResourceOperationItemRequestBuilder) {\n urlTplParams := make(map[string]string)\n for idx, item := range m.pathParameters {\n urlTplParams[idx] = item\n }\n if id != \"\" {\n urlTplParams[\"resourceOperation%2Did\"] = id\n }\n return NewResourceOperationsResourceOperationItemRequestBuilderInternal(urlTplParams, m.requestAdapter)\n}", "title": "" }, { "docid": "b898c1bc1dfb1ecb3009e13d5adf1d4b", "score": "0.47327438", "text": "func (d *Dao) ResTagMap(c context.Context, oid int64, tp int32) (res map[int64]*taGrpcModel.Resource, err error) {\n\tvar (\n\t\treply *taGrpcModel.ResTagMapReply\n\t\targ = &taGrpcModel.ResTagReq{\n\t\t\tOid: oid,\n\t\t\tType: tp,\n\t\t}\n\t)\n\tif reply, err = d.tagRPC.ResTagMap(c, arg); err != nil {\n\t\tlog.Error(\"d.dao.ResTags(%d,%d) error: %v\", oid, tp, err)\n\t\treturn\n\t}\n\treturn reply.Resource, nil\n}", "title": "" }, { "docid": "002389d030748e8df605fbdc498f98f2", "score": "0.47257796", "text": "func filterAuthorizedResources(resources []SecretResource, proxy *model.Proxy, secrets credscontroller.Controller) []SecretResource {\n\tvar authzResult *bool\n\tvar authzError error\n\t// isAuthorized is a small wrapper around credscontroller.Authorize so we only call it once instead of each time in the loop\n\tisAuthorized := func() bool {\n\t\tif authzResult != nil {\n\t\t\treturn *authzResult\n\t\t}\n\t\tres := false\n\t\tif err := secrets.Authorize(proxy.VerifiedIdentity.ServiceAccount, proxy.VerifiedIdentity.Namespace); err == nil {\n\t\t\tres = true\n\t\t} else {\n\t\t\tauthzError = err\n\t\t}\n\t\tauthzResult = &res\n\t\treturn res\n\t}\n\n\t// There are 4 cases of secret reference\n\t// Verified cross namespace (by ReferencePolicy). No Authz needed.\n\t// Verified same namespace (implicit). No Authz needed.\n\t// Unverified cross namespace. Never allowed.\n\t// Unverified same namespace. Allowed if authorized.\n\tallowedResources := make([]SecretResource, 0, len(resources))\n\tdeniedResources := make([]string, 0)\n\tfor _, r := range resources {\n\t\tsameNamespace := r.Namespace == proxy.VerifiedIdentity.Namespace\n\t\tverified := proxy.MergedGateway != nil && proxy.MergedGateway.VerifiedCertificateReferences.Contains(r.ResourceName)\n\t\tswitch r.ResourceType {\n\t\tcase credentials.KubernetesGatewaySecretType:\n\t\t\t// For KubernetesGateway, we only allow VerifiedCertificateReferences.\n\t\t\t// This means a Secret in the same namespace as the Gateway (which also must be in the same namespace\n\t\t\t// as the proxy), or a ReferencePolicy allowing the reference.\n\t\t\tif verified {\n\t\t\t\tallowedResources = append(allowedResources, r)\n\t\t\t} else {\n\t\t\t\tdeniedResources = append(deniedResources, r.Name)\n\t\t\t}\n\t\tcase credentials.KubernetesSecretType:\n\t\t\t// For Kubernetes, we require the secret to be in the same namespace as the proxy and for it to be\n\t\t\t// authorized for access.\n\t\t\tif sameNamespace && isAuthorized() {\n\t\t\t\tallowedResources = append(allowedResources, r)\n\t\t\t} else {\n\t\t\t\tdeniedResources = append(deniedResources, r.Name)\n\t\t\t}\n\t\tdefault:\n\t\t\t// Should never happen\n\t\t\tlog.Warnf(\"unknown credential type %q\", r.Type)\n\t\t\tpilotSDSCertificateErrors.Increment()\n\t\t}\n\t}\n\n\t// If we filtered any out, report an error. We aggregate errors in one place here, rather than in the loop,\n\t// to avoid excessive logs.\n\tif len(deniedResources) > 0 {\n\t\terrMessage := authzError\n\t\tif errMessage == nil {\n\t\t\terrMessage = fmt.Errorf(\"cross namespace secret reference requires ReferencePolicy\")\n\t\t}\n\t\tlog.Warnf(\"proxy %s attempted to access unauthorized certificates %s: %v\", proxy.ID, atMostNJoin(deniedResources, 3), errMessage)\n\t\tpilotSDSCertificateErrors.Increment()\n\t}\n\n\treturn allowedResources\n}", "title": "" }, { "docid": "8473c936d0655cafb30ea7739869571e", "score": "0.4681706", "text": "func expandKeyRestrictionsIosKeyRestrictions(c *Client, f *KeyRestrictionsIosKeyRestrictions, res *Key) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.AllowedBundleIds; v != nil {\n\t\tm[\"allowedBundleIds\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "7118fc2f5ce991bff44d02e5c011beb6", "score": "0.4659103", "text": "func (e *Expander) SetResourceForEach(moduleAddr addrs.ModuleInstance, resourceAddr addrs.Resource, mapping map[string]cty.Value) {\n\te.setResourceExpansion(moduleAddr, resourceAddr, expansionForEach(mapping))\n}", "title": "" }, { "docid": "d3858b08f6f44ef63cdc162a43dbbd17", "score": "0.46298814", "text": "func GrantResourceCreatorActions(username string, projectID string, projectName string) error {\n\tiamConf := config.GlobalConf.IAM\n\t// 使用网关访问\n\treqUrl := fmt.Sprintf(\"%s%s\", iamConf.GatewayHost, grantActionPath)\n\theaders := map[string]string{\"Content-Type\": \"application/json\"}\n\treq := gorequest.SuperAgent{\n\t\tUrl: reqUrl,\n\t\tMethod: \"POST\",\n\t\tData: map[string]interface{}{\n\t\t\t\"bk_app_code\": config.GlobalConf.App.Code,\n\t\t\t\"bk_app_secret\": config.GlobalConf.App.Secret,\n\t\t\t\"creator\": username,\n\t\t\t\"system\": bcsIAM.SystemIDBKBCS,\n\t\t\t\"type\": \"project\",\n\t\t\t\"id\": projectID,\n\t\t\t\"name\": projectName,\n\t\t},\n\t}\n\t// 请求API\n\tproxy := \"\"\n\t_, err := component.Request(req, timeout, proxy, headers)\n\tif err != nil {\n\t\tlogging.Error(\"grant creator actions for project failed, %v\", err)\n\t\treturn errorx.NewRequestIAMErr(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "573c21c6d3f73705b6657992943a119d", "score": "0.4622906", "text": "func Init() {\n\tfor key, val := range identity.ReservedIdentities {\n\t\tlog.WithField(logfields.Identity, key).Debug(\"creating policy for identity\")\n\n\t\tpolicyMapPath := bpf.MapPath(fmt.Sprintf(\"%sreserved_%d\", policymap.MapName, int(val)))\n\n\t\tpolicyMap, _, err := policymap.OpenMap(policyMapPath)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Fatalf(\"Could not create policy BPF map for reserved identity '%s'\", policyMapPath)\n\t\t}\n\n\t\tidentity := identity.NewIdentity(val, labels.Labels{\n\t\t\tkey: labels.NewLabel(val.String(), \"\", labels.LabelSourceReserved),\n\t\t})\n\t\tc := GetConsumableCache().GetOrCreate(val, identity)\n\t\tif c == nil {\n\t\t\tlog.WithField(logfields.Identity, identity).Fatal(\"Unable to initialize consumable\")\n\t\t}\n\t\tGetConsumableCache().addReserved(c)\n\t\tc.AddMap(policyMap)\n\t}\n}", "title": "" }, { "docid": "8b4075b4395411e854b8b76c4cdff5fb", "score": "0.46181905", "text": "func (m *PermissionGrantConditionSet) SetClientApplicationIds(value []string)() {\n err := m.GetBackingStore().Set(\"clientApplicationIds\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "8fc923452bea793bce028d27a18b78b2", "score": "0.46144217", "text": "func (opts CreateOpts) ToResourceCreateMap() (map[string]interface{}, error) {\n\treturn eclcloud.BuildRequestBody(opts, \"server\")\n}", "title": "" }, { "docid": "9aa2c6aceaa43667f426ebc082acd0da", "score": "0.4603581", "text": "func AddIndependentPropertyGeneratorsForResourceIdentity_ARM(gens map[string]gopter.Gen) {\n\tgens[\"Type\"] = gen.PtrOf(gen.OneConstOf(\n\t\tResourceIdentity_Type_None,\n\t\tResourceIdentity_Type_SystemAssigned,\n\t\tResourceIdentity_Type_SystemAssignedUserAssigned,\n\t\tResourceIdentity_Type_UserAssigned))\n}", "title": "" }, { "docid": "6e4dd2956fca316479b116b166dd0629", "score": "0.45849004", "text": "func (w *WrappedClientImpl) ChangeInterfaceMap(serviceUniqueKey string, add bool) error {\n\tif add {\n\t\treturn w.interfaceMapHandler.Register(serviceUniqueKey)\n\t}\n\treturn w.interfaceMapHandler.UnRegister(serviceUniqueKey)\n}", "title": "" }, { "docid": "2f64d2301c846ba5d557a7b9c5ad3756", "score": "0.45548287", "text": "func (e *enforcer) configmap(ctx context.Context, log logr.Logger, namespace string) error {\n\tvar (\n\t\tnamespacedName = types.NamespacedName{\n\t\t\tName: e.configMapName,\n\t\t\tNamespace: namespace,\n\t\t}\n\t\tcm = new(corev1.ConfigMap)\n\t)\n\n\trootCA := fmt.Sprintf(\"%s\", e.rootCA())\n\n\t// Build the data which should be present in the well-known configmap in\n\t// all namespaces.\n\trootCAConfigData := map[string]string{\n\t\t\"root-cert.pem\": rootCA,\n\t}\n\n\tlog = log.WithValues(\"configmap\", namespacedName.String())\n\terr := e.client.Get(ctx, namespacedName, cm)\n\tif apierrors.IsNotFound(err) {\n\t\tlog.V(3).Info(\"configmap doesn't exist, creating\")\n\n\t\treturn e.client.Create(ctx, &corev1.ConfigMap{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: e.configMapName,\n\t\t\t\tNamespace: namespace,\n\t\t\t\tLabels: map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t},\n\t\t\t},\n\t\t\tData: rootCAConfigData,\n\t\t})\n\t}\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to get %q: %s\", namespacedName, err)\n\t}\n\n\tvar notMatch bool\n\tif data, ok := cm.Data[\"root-cert.pem\"]; !ok || data != rootCA {\n\t\tif cm.Data == nil {\n\t\t\tcm.Data = make(map[string]string)\n\t\t}\n\n\t\tcm.Data[\"root-cert.pem\"] = rootCA\n\t\tnotMatch = true\n\t}\n\n\tif val, ok := cm.Labels[IstioConfigLabelKey]; !ok || val != \"true\" {\n\t\tnotMatch = true\n\t}\n\n\tif notMatch {\n\t\tif cm.Labels == nil {\n\t\t\tcm.Labels = make(map[string]string)\n\t\t}\n\n\t\tcm.Labels[IstioConfigLabelKey] = \"true\"\n\n\t\tlog.V(3).Info(\"updating configmap\")\n\t\tif err := e.client.Update(ctx, cm); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "19140b4e0bf76e552f109ad0f3ac8bc6", "score": "0.45515105", "text": "func _getResourceParams(r *raml.Resource, params []string) []string {\n\tif r == nil {\n\t\treturn params\n\t}\n\n\tmatches := reResourceParam.FindAllString(r.URI, -1)\n\tfor _, match := range matches {\n\t\tmatchEscaped := commons.NormalizeIdentifier(match[1 : len(match)-1])\n\t\tparams = append(params, matchEscaped)\n\t}\n\n\treturn _getResourceParams(r.Parent, params)\n}", "title": "" }, { "docid": "f0c95cc933ad9848326e935f65c17ed7", "score": "0.45490095", "text": "func (m *ResourceAction) SetNotAllowedResourceActions(value []string)() {\n m.notAllowedResourceActions = value\n}", "title": "" }, { "docid": "ed92e32a0743e1c87e259f49ad5ce63e", "score": "0.454641", "text": "func mapSecNameToSecPath(secretPaths []string) map[string]string {\n\t// get message printer\n\tmsgPrinter := i18n.GetMessagePrinter()\n\n\tfinalMap := make(map[string]string, len(secretPaths))\n\tfor _, secPath := range secretPaths {\n\t\tif _, err := os.Stat(secPath); err != nil {\n\t\t\tcliutils.Fatal(cliutils.CLI_INPUT_ERROR, msgPrinter.Sprintf(\"Error verifying filepath %v: %v\", secPath, err))\n\t\t}\n\t\tfinalMap[filepath.Base(secPath)] = secPath\n\t}\n\treturn finalMap\n}", "title": "" }, { "docid": "fca8da42b1f1f898f8ec7d6a107bf110", "score": "0.45450988", "text": "func admitConfigMaps(ar v1.AdmissionReview) *v1.AdmissionResponse {\n\tklog.V(2).Info(\"admitting configmaps\")\n\tconfigMapResource := metav1.GroupVersionResource{Group: \"\", Version: \"v1\", Resource: \"configmaps\"}\n\tif ar.Request.Resource != configMapResource {\n\t\tklog.Errorf(\"expect resource to be %s\", configMapResource)\n\t\treturn nil\n\t}\n\n\tvar raw []byte\n\tif ar.Request.Operation == v1.Delete {\n\t\traw = ar.Request.OldObject.Raw\n\t} else {\n\t\traw = ar.Request.Object.Raw\n\t}\n\tconfigmap := corev1.ConfigMap{}\n\tdeserializer := codecs.UniversalDeserializer()\n\tif _, _, err := deserializer.Decode(raw, nil, &configmap); err != nil {\n\t\tklog.Error(err)\n\t\treturn toV1AdmissionResponse(err)\n\t}\n\treviewResponse := v1.AdmissionResponse{}\n\treviewResponse.Allowed = true\n\tfor k, v := range configmap.Data {\n\t\tif k == \"webhook-e2e-test\" && v == \"webhook-disallow\" &&\n\t\t\t(ar.Request.Operation == v1.Create || ar.Request.Operation == v1.Update) {\n\t\t\treviewResponse.Allowed = false\n\t\t\treviewResponse.Result = &metav1.Status{\n\t\t\t\tReason: \"the configmap contains unwanted key and value\",\n\t\t\t}\n\t\t}\n\t\tif k == \"webhook-e2e-test\" && v == \"webhook-nondeletable\" && ar.Request.Operation == v1.Delete {\n\t\t\treviewResponse.Allowed = false\n\t\t\treviewResponse.Result = &metav1.Status{\n\t\t\t\tReason: \"the configmap cannot be deleted because it contains unwanted key and value\",\n\t\t\t}\n\t\t}\n\t}\n\treturn &reviewResponse\n}", "title": "" }, { "docid": "24881251674bce23bda1c6a357582b57", "score": "0.4541181", "text": "func GeURLPathMap() *network.ApplicationGatewayURLPathMap {\n\treturn &network.ApplicationGatewayURLPathMap{\n\t\tName: to.StringPtr(PathMapName),\n\t\tApplicationGatewayURLPathMapPropertiesFormat: &network.ApplicationGatewayURLPathMapPropertiesFormat{\n\t\t\t// DefaultBackendAddressPool - Default backend address pool resource of URL path map.\n\t\t\tDefaultBackendAddressPool: &network.SubResource{\n\t\t\t\tID: to.StringPtr(\"\"),\n\t\t\t},\n\n\t\t\t// DefaultBackendHTTPSettings - Default backend http settings resource of URL path map.\n\t\t\tDefaultBackendHTTPSettings: &network.SubResource{\n\t\t\t\tID: to.StringPtr(\"\"),\n\t\t\t},\n\n\t\t\t// DefaultRewriteRuleSet - Default Rewrite rule set resource of URL path map.\n\t\t\tDefaultRewriteRuleSet: &network.SubResource{\n\t\t\t\tID: to.StringPtr(\"\"),\n\t\t\t},\n\n\t\t\t// DefaultRedirectConfiguration - Default redirect configuration resource of URL path map.\n\t\t\tDefaultRedirectConfiguration: &network.SubResource{\n\t\t\t\tID: to.StringPtr(\"\"),\n\t\t\t},\n\n\t\t\t// PathRules - Path rule of URL path map resource.\n\t\t\tPathRules: &[]network.ApplicationGatewayPathRule{\n\t\t\t\t*GetPathRulePathBased(),\n\t\t\t\t*GetPathRuleBasic(),\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "f7608adbe02824b0ee980b54d174902c", "score": "0.45367604", "text": "func AddRelatedPropertyGeneratorsForIdentity_ARM(gens map[string]gopter.Gen) {\n\tgens[\"UserAssignedIdentities\"] = gen.MapOf(gen.AlphaString(), UserAssignedIdentityDetails_ARMGenerator())\n}", "title": "" }, { "docid": "d63fd81f5bbf9f2622bf564b27226f68", "score": "0.45324156", "text": "func (opts CreateOpts) ToResourceProviderCreateMap() (map[string]interface{}, error) {\n\tb, err := gophercloud.BuildRequestBody(opts, \"\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn b, nil\n}", "title": "" }, { "docid": "65a60e86e08741571da17a0f6939899c", "score": "0.45185584", "text": "func (m *PermissionGrantConditionSet) SetClientApplicationIds(value []string)() {\n m.clientApplicationIds = value\n}", "title": "" }, { "docid": "dbc3094306d1bf542e85e752ed2d8393", "score": "0.45151305", "text": "func ExamplePowerBIResourcesClient_Update() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclientFactory, err := armpowerbiprivatelinks.NewClientFactory(\"<subscription-id>\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tres, err := clientFactory.NewPowerBIResourcesClient().Update(ctx, \"resourceGroup\", \"azureResourceName\", armpowerbiprivatelinks.TenantResource{\n\t\tLocation: to.Ptr(\"global\"),\n\t\tProperties: &armpowerbiprivatelinks.TenantProperties{\n\t\t\tTenantID: to.Ptr(\"ac2bc297-8a3e-46f3-972d-87c2b4ae6e2f\"),\n\t\t},\n\t\tTags: map[string]*string{\n\t\t\t\"tag1\": to.Ptr(\"value1\"),\n\t\t\t\"tag2\": to.Ptr(\"value2\"),\n\t\t},\n\t}, &armpowerbiprivatelinks.PowerBIResourcesClientUpdateOptions{ClientTenantID: to.Ptr(\"ac2bc297-8a3e-46f3-972d-87c2b4ae6e2f\")})\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\t// You could use response here. We use blank identifier for just demo purposes.\n\t_ = res\n\t// If the HTTP response code is 200 as defined in example definition, your response structure would look as follows. Please pay attention that all the values in the output are fake values for just demo purposes.\n\t// res.TenantResource = armpowerbiprivatelinks.TenantResource{\n\t// \tName: to.Ptr(\"myPrivateLinkServiceResource\"),\n\t// \tLocation: to.Ptr(\"global\"),\n\t// \tProperties: &armpowerbiprivatelinks.TenantProperties{\n\t// \t\tTenantID: to.Ptr(\"ac2bc297-8a3e-46f3-972d-87c2b4ae6e2f\"),\n\t// \t},\n\t// \tTags: map[string]*string{\n\t// \t\t\"tag1\": to.Ptr(\"value1\"),\n\t// \t\t\"tag2\": to.Ptr(\"value2\"),\n\t// \t},\n\t// }\n}", "title": "" }, { "docid": "c49ea3d7b5a0baa1047f18f026e7827d", "score": "0.45115685", "text": "func PrintPathMap(paths map[string]configapi.PathValue) {\n\tfor p, pv := range paths {\n\t\tfmt.Printf(\"%s: %s: %5t: %+v\\n\", p, pv.Path, pv.Deleted, pv.Value)\n\t}\n}", "title": "" }, { "docid": "e8090a51337e8d6302b4741fa84716cb", "score": "0.45103967", "text": "func (c *Config) IntMap(path string) map[string]int {\n\treturn c.k.IntMap(path)\n}", "title": "" }, { "docid": "bd4e686e3efea8997d6352bf747c3632", "score": "0.44935042", "text": "func MapUrls(router *gin.Engine, booksController Books, middleware middlewares.Middleware) *gin.RouterGroup {\n\n\tapiRoutes := router.Group(\"/api/books\")\n\t{\n\n\t\tapiRoutes.GET(\"/:id\", booksController.GetByID)\n\n\t\tapiRoutes.GET(\"/\", booksController.All)\n\n\t\tapiRoutes.POST(\"/\", middleware.CheckJWTToken, booksController.Create)\n\n\t\tapiRoutes.DELETE(\"/:id\", middleware.CheckJWTToken, booksController.Delete)\n\n\t\tapiRoutes.PUT(\"/:id\", middleware.CheckJWTToken, booksController.Update)\n\n\t}\n\n\treturn apiRoutes\n}", "title": "" }, { "docid": "f220ae64dd2960f80cf0aa1c3da4a80c", "score": "0.44912854", "text": "func (o *options) setWhitelistPaths(values []string) {\n\tsection := \"whitelist/paths\"\n\tif _, err := o.config.GetSection(section); err == nil {\n\t\to.config.DeleteSection(section)\n\t}\n\n\tsec := o.config.Section(section)\n\n\tfor i, val := range values {\n\t\t_, err := sec.NewKey(strconv.Itoa(i)+\"_type\", string(val[0]))\n\t\tif err != nil {\n\t\t\tlog.WithField(\"spot\", \"options.options.setWhitelistPaths()\").Errorln(err.Error())\n\t\t}\n\t}\n\n\to.flush()\n}", "title": "" }, { "docid": "9abbe598d48d202c5490037924db88d2", "score": "0.44905177", "text": "func expandKeyRestrictionsApiTargetsMap(c *Client, f map[string]KeyRestrictionsApiTargets, res *Key) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandKeyRestrictionsApiTargets(c, &item, res)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "05ffd0698700a5b189e3f839f9104b5c", "score": "0.44894302", "text": "func (opts UpdateOpts) ToResourceProviderUpdateMap() (map[string]interface{}, error) {\n\treturn gophercloud.BuildRequestBody(opts, \"\")\n}", "title": "" }, { "docid": "43092e83e7a161da4608ae1ac89f9983", "score": "0.44808057", "text": "func Configure(p *config.Provider) {\n\tp.AddResourceConfigurator(\"google_folder\", func(r *config.Resource) {\n\t\tr.Version = common.VersionV1alpha2\n\t\tr.ExternalName = config.NameAsIdentifier\n\t\tr.ExternalName.GetExternalNameFn = common.GetNameFromFullyQualifiedID\n\t\tr.ExternalName.GetIDFn = func(_ context.Context, externalName string, parameters map[string]interface{}, providerConfig map[string]interface{}) (string, error) {\n\t\t\treturn fmt.Sprintf(\"folders/%s\", externalName), nil\n\t\t}\n\t})\n\tp.AddResourceConfigurator(\"google_project\", func(r *config.Resource) {\n\t\tr.Version = common.VersionV1alpha2\n\t\tr.ExternalName = config.NameAsIdentifier\n\t\tr.ExternalName.GetExternalNameFn = common.GetNameFromFullyQualifiedID\n\t\tr.ExternalName.GetIDFn = func(_ context.Context, externalName string, parameters map[string]interface{}, providerConfig map[string]interface{}) (string, error) {\n\t\t\treturn fmt.Sprintf(\"projects/%s\", externalName), nil\n\t\t}\n\t\tr.TerraformResource.Schema[\"org_id\"].Description =\n\t\t\t\"The numeric ID of the organization this project belongs to.\"\n\t\tr.UseAsync = true\n\t})\n\tp.AddResourceConfigurator(\"google_service_account_key\", func(r *config.Resource) {\n\t\tr.Version = common.VersionV1alpha2\n\t\t// Note(turkenh): We have to modify schema of \"keepers\", since it is a\n\t\t// map where elements configured as nil, but needs to be String:\n\t\tr.TerraformResource.\n\t\t\tSchema[\"keepers\"].Elem = schema.TypeString\n\n\t\tr.References[\"service_account_id\"] = config.Reference{\n\t\t\tType: \"ServiceAccount\",\n\t\t\tExtractor: common.ExtractResourceIDFuncPath,\n\t\t}\n\t})\n\tp.AddResourceConfigurator(\"google_service_account\", func(r *config.Resource) {\n\t\tr.Version = common.VersionV1alpha2\n\t\tr.Kind = \"ServiceAccount\"\n\t\tr.ExternalName = config.NameAsIdentifier\n\t\tr.ExternalName.SetIdentifierArgumentFn = func(base map[string]interface{}, externalName string) {\n\t\t\tbase[\"account_id\"] = externalName\n\t\t}\n\t\tr.ExternalName.OmittedFields = []string{\"account_id\"}\n\t\tr.ExternalName.GetExternalNameFn = func(tfstate map[string]interface{}) (string, error) {\n\t\t\tid, err := common.GetField(tfstate, \"account_id\")\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", err\n\t\t\t}\n\t\t\treturn id, nil\n\t\t}\n\t\tr.ExternalName.GetIDFn = func(ctx context.Context, externalName string, parameters map[string]interface{}, providerConfig map[string]interface{}) (string, error) {\n\t\t\tproject, err := common.GetField(providerConfig, common.KeyProject)\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", err\n\t\t\t}\n\t\t\treturn fmt.Sprintf(\"projects/%s/serviceAccounts/%s@%s.iam.gserviceaccount.com\", project, externalName, project), nil\n\t\t}\n\t})\n}", "title": "" }, { "docid": "a1cadd28b2f86cbbf694e6ba9603aac0", "score": "0.44763035", "text": "func AddRelatedPropertyGeneratorsForManagedServiceIdentity_ARM(gens map[string]gopter.Gen) {\n\tgens[\"UserAssignedIdentities\"] = gen.MapOf(gen.AlphaString(), UserAssignedIdentityDetails_ARMGenerator())\n}", "title": "" }, { "docid": "37787d11b9deb3e3c5a844c111cbd417", "score": "0.4459738", "text": "func ApplyAuthSubResourceState(node *config.Node, name string, resource string, configField string, subResource string, resourceClient client.Client) error {\n\tnode = node.Children[resource]\n\n\tif node == nil {\n\t\treturn fmt.Errorf(\"unable to apply subresource. No child %s\", resource)\n\t}\n\n\tfor childName, node := range node.Children {\n\n\t\tvalue, err := client.GetString(node.Config, configField)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tm := map[string]interface{}{configField: value}\n\n\t\tif err := resourceClient.Write(m, \"auth/%s/%s/%s/%s\", name, resource, childName, subResource); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "64e046cdd49a38a66268f3ce7fc13507", "score": "0.44569886", "text": "func (m *PermissionGrantConditionSet) SetClientApplicationTenantIds(value []string)() {\n err := m.GetBackingStore().Set(\"clientApplicationTenantIds\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "7fc945cb1f4d2215d3549a7c9f30e55d", "score": "0.44560364", "text": "func flattenServiceTemplateContainersResourcesMap(c *Client, i interface{}, res *Service) map[string]ServiceTemplateContainersResources {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]ServiceTemplateContainersResources{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]ServiceTemplateContainersResources{}\n\t}\n\n\titems := make(map[string]ServiceTemplateContainersResources)\n\tfor k, item := range a {\n\t\titems[k] = *flattenServiceTemplateContainersResources(c, item.(map[string]interface{}), res)\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "da8f4f7c24a7ca5ec1b230f31de6a768", "score": "0.44554725", "text": "func ExamplePowerBIResourcesClient_ListByResourceName() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclientFactory, err := armpowerbiprivatelinks.NewClientFactory(\"<subscription-id>\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tres, err := clientFactory.NewPowerBIResourcesClient().ListByResourceName(ctx, \"resourceGroup\", \"azureResourceName\", nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\t// You could use response here. We use blank identifier for just demo purposes.\n\t_ = res\n\t// If the HTTP response code is 200 as defined in example definition, your response structure would look as follows. Please pay attention that all the values in the output are fake values for just demo purposes.\n\t// res.TenantResourceArray = []*armpowerbiprivatelinks.TenantResource{\n\t// \t{\n\t// \t\tName: to.Ptr(\"conection 1\"),\n\t// \t\tLocation: to.Ptr(\"west us\"),\n\t// \t\tProperties: &armpowerbiprivatelinks.TenantProperties{\n\t// \t\t\tPrivateEndpointConnections: []*armpowerbiprivatelinks.PrivateEndpointConnection{\n\t// \t\t\t\t{\n\t// \t\t\t\t\tName: to.Ptr(\"myPrivateEndpointConnection\"),\n\t// \t\t\t\t\tType: to.Ptr(\"string\"),\n\t// \t\t\t\t\tID: to.Ptr(\"/subscriptions/a0020869-4d28-422a-89f4-c2413130d73c/resourceGroups/resourceGroup/providers/Microsoft.PowerBI/privateLinkServicesForPowerBI/azureResourceName/privateEndpointConnections/myPrivateEndpointConnection.58ffb8de-89ad-41eb-9f8f-de0a7db9d721\"),\n\t// \t\t\t\t\tProperties: &armpowerbiprivatelinks.PrivateEndpointConnectionProperties{\n\t// \t\t\t\t\t\tPrivateEndpoint: &armpowerbiprivatelinks.PrivateEndpoint{\n\t// \t\t\t\t\t\t\tID: to.Ptr(\"/subscriptions/a0020869-4d28-422a-89f4-c2413130d73c/resourceGroups/resourceGroup/providers/Microsoft.Network/privateEndpoints/myPrivateEndpoint\"),\n\t// \t\t\t\t\t\t},\n\t// \t\t\t\t\t\tPrivateLinkServiceConnectionState: &armpowerbiprivatelinks.ConnectionState{\n\t// \t\t\t\t\t\t\tDescription: to.Ptr(\"My private endpoint connection\"),\n\t// \t\t\t\t\t\t\tActionsRequired: to.Ptr(\"None\"),\n\t// \t\t\t\t\t\t\tStatus: to.Ptr(armpowerbiprivatelinks.PersistedConnectionStatusPending),\n\t// \t\t\t\t\t\t},\n\t// \t\t\t\t\t},\n\t// \t\t\t}},\n\t// \t\t\tTenantID: to.Ptr(\"ac2bc297-8a3e-46f3-972d-87c2b4ae6e2f\"),\n\t// \t\t},\n\t// \t\tTags: map[string]*string{\n\t// \t\t\t\"tag1\": to.Ptr(\"value1\"),\n\t// \t\t\t\"tag2\": to.Ptr(\"value2\"),\n\t// \t\t},\n\t// }}\n}", "title": "" }, { "docid": "c825a1b107cd514439919d83d9d14294", "score": "0.44522396", "text": "func (r *Reconciler) getResourceIDListfromInputSpec(ctx *reconcileRequestContext) error {\n\n\tresourceIDListfromSpec := ctx.HostingAutoscalingPolicy.Spec.ResourceID\n\tfor _, resourceIDfromSpec := range resourceIDListfromSpec {\n\t\tresourceID := sdkutil.ConvertAutoscalingResourceToString(*resourceIDfromSpec)\n\t\tctx.ResourceIDList = append(ctx.ResourceIDList, *resourceID)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "2498e72a13529de439200413f6ff8116", "score": "0.4451026", "text": "func RegisterStandardRemoteIDAPIInterfacesServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client StandardRemoteIDAPIInterfacesServiceClient) error {\n\n\tmux.Handle(\"PUT\", pattern_StandardRemoteIDAPIInterfacesService_CreateIdentificationServiceArea_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {\n\t\tctx, cancel := context.WithCancel(req.Context())\n\t\tdefer cancel()\n\t\tinboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)\n\t\trctx, err := runtime.AnnotateContext(ctx, mux, req)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\t\tresp, md, err := request_StandardRemoteIDAPIInterfacesService_CreateIdentificationServiceArea_0(rctx, inboundMarshaler, client, req, pathParams)\n\t\tctx = runtime.NewServerMetadataContext(ctx, md)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\n\t\tforward_StandardRemoteIDAPIInterfacesService_CreateIdentificationServiceArea_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)\n\n\t})\n\n\tmux.Handle(\"PUT\", pattern_StandardRemoteIDAPIInterfacesService_CreateSubscription_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {\n\t\tctx, cancel := context.WithCancel(req.Context())\n\t\tdefer cancel()\n\t\tinboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)\n\t\trctx, err := runtime.AnnotateContext(ctx, mux, req)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\t\tresp, md, err := request_StandardRemoteIDAPIInterfacesService_CreateSubscription_0(rctx, inboundMarshaler, client, req, pathParams)\n\t\tctx = runtime.NewServerMetadataContext(ctx, md)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\n\t\tforward_StandardRemoteIDAPIInterfacesService_CreateSubscription_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)\n\n\t})\n\n\tmux.Handle(\"DELETE\", pattern_StandardRemoteIDAPIInterfacesService_DeleteIdentificationServiceArea_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {\n\t\tctx, cancel := context.WithCancel(req.Context())\n\t\tdefer cancel()\n\t\tinboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)\n\t\trctx, err := runtime.AnnotateContext(ctx, mux, req)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\t\tresp, md, err := request_StandardRemoteIDAPIInterfacesService_DeleteIdentificationServiceArea_0(rctx, inboundMarshaler, client, req, pathParams)\n\t\tctx = runtime.NewServerMetadataContext(ctx, md)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\n\t\tforward_StandardRemoteIDAPIInterfacesService_DeleteIdentificationServiceArea_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)\n\n\t})\n\n\tmux.Handle(\"DELETE\", pattern_StandardRemoteIDAPIInterfacesService_DeleteSubscription_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {\n\t\tctx, cancel := context.WithCancel(req.Context())\n\t\tdefer cancel()\n\t\tinboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)\n\t\trctx, err := runtime.AnnotateContext(ctx, mux, req)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\t\tresp, md, err := request_StandardRemoteIDAPIInterfacesService_DeleteSubscription_0(rctx, inboundMarshaler, client, req, pathParams)\n\t\tctx = runtime.NewServerMetadataContext(ctx, md)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\n\t\tforward_StandardRemoteIDAPIInterfacesService_DeleteSubscription_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)\n\n\t})\n\n\tmux.Handle(\"GET\", pattern_StandardRemoteIDAPIInterfacesService_GetIdentificationServiceArea_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {\n\t\tctx, cancel := context.WithCancel(req.Context())\n\t\tdefer cancel()\n\t\tinboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)\n\t\trctx, err := runtime.AnnotateContext(ctx, mux, req)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\t\tresp, md, err := request_StandardRemoteIDAPIInterfacesService_GetIdentificationServiceArea_0(rctx, inboundMarshaler, client, req, pathParams)\n\t\tctx = runtime.NewServerMetadataContext(ctx, md)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\n\t\tforward_StandardRemoteIDAPIInterfacesService_GetIdentificationServiceArea_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)\n\n\t})\n\n\tmux.Handle(\"GET\", pattern_StandardRemoteIDAPIInterfacesService_GetSubscription_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {\n\t\tctx, cancel := context.WithCancel(req.Context())\n\t\tdefer cancel()\n\t\tinboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)\n\t\trctx, err := runtime.AnnotateContext(ctx, mux, req)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\t\tresp, md, err := request_StandardRemoteIDAPIInterfacesService_GetSubscription_0(rctx, inboundMarshaler, client, req, pathParams)\n\t\tctx = runtime.NewServerMetadataContext(ctx, md)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\n\t\tforward_StandardRemoteIDAPIInterfacesService_GetSubscription_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)\n\n\t})\n\n\tmux.Handle(\"GET\", pattern_StandardRemoteIDAPIInterfacesService_SearchIdentificationServiceAreas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {\n\t\tctx, cancel := context.WithCancel(req.Context())\n\t\tdefer cancel()\n\t\tinboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)\n\t\trctx, err := runtime.AnnotateContext(ctx, mux, req)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\t\tresp, md, err := request_StandardRemoteIDAPIInterfacesService_SearchIdentificationServiceAreas_0(rctx, inboundMarshaler, client, req, pathParams)\n\t\tctx = runtime.NewServerMetadataContext(ctx, md)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\n\t\tforward_StandardRemoteIDAPIInterfacesService_SearchIdentificationServiceAreas_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)\n\n\t})\n\n\tmux.Handle(\"GET\", pattern_StandardRemoteIDAPIInterfacesService_SearchSubscriptions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {\n\t\tctx, cancel := context.WithCancel(req.Context())\n\t\tdefer cancel()\n\t\tinboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)\n\t\trctx, err := runtime.AnnotateContext(ctx, mux, req)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\t\tresp, md, err := request_StandardRemoteIDAPIInterfacesService_SearchSubscriptions_0(rctx, inboundMarshaler, client, req, pathParams)\n\t\tctx = runtime.NewServerMetadataContext(ctx, md)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\n\t\tforward_StandardRemoteIDAPIInterfacesService_SearchSubscriptions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)\n\n\t})\n\n\tmux.Handle(\"PUT\", pattern_StandardRemoteIDAPIInterfacesService_UpdateIdentificationServiceArea_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {\n\t\tctx, cancel := context.WithCancel(req.Context())\n\t\tdefer cancel()\n\t\tinboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)\n\t\trctx, err := runtime.AnnotateContext(ctx, mux, req)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\t\tresp, md, err := request_StandardRemoteIDAPIInterfacesService_UpdateIdentificationServiceArea_0(rctx, inboundMarshaler, client, req, pathParams)\n\t\tctx = runtime.NewServerMetadataContext(ctx, md)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\n\t\tforward_StandardRemoteIDAPIInterfacesService_UpdateIdentificationServiceArea_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)\n\n\t})\n\n\tmux.Handle(\"PUT\", pattern_StandardRemoteIDAPIInterfacesService_UpdateSubscription_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) {\n\t\tctx, cancel := context.WithCancel(req.Context())\n\t\tdefer cancel()\n\t\tinboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req)\n\t\trctx, err := runtime.AnnotateContext(ctx, mux, req)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\t\tresp, md, err := request_StandardRemoteIDAPIInterfacesService_UpdateSubscription_0(rctx, inboundMarshaler, client, req, pathParams)\n\t\tctx = runtime.NewServerMetadataContext(ctx, md)\n\t\tif err != nil {\n\t\t\truntime.HTTPError(ctx, mux, outboundMarshaler, w, req, err)\n\t\t\treturn\n\t\t}\n\n\t\tforward_StandardRemoteIDAPIInterfacesService_UpdateSubscription_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...)\n\n\t})\n\n\treturn nil\n}", "title": "" }, { "docid": "d4fd514bb9f5dc9efabf101349ef03d0", "score": "0.4440047", "text": "func (api *API) AddResource(resource interface{}, paths ...string) {\n\tfor _, path := range paths {\n\t\tapi.Mux().HandleFunc(path, api.requestHandler(resource))\n\t}\n}", "title": "" }, { "docid": "cbfb43f017e4128b96c96faa6f0d1b71", "score": "0.44379306", "text": "func RegisterHandlers(r *routing.RouteGroup, service Service, authHandler routing.Handler, keyHandler routing.Handler, logger log.Logger) {\n\tres := resource{service, logger}\n\tr.Use(keyHandler)\n\tr.Post(\"/shorts\", res.create)\n\tr.Get(\"/shorts/<code>\", res.get)\n\n\tr.Get(\"/shorts\", res.query)\n\n\tr.Put(\"/shorts/<id>\", res.update)\n\t// the following endpoints require a valid JWT\n\tr.Use(authHandler)\n\tr.Delete(\"/shorts/<id>\", res.delete)\n}", "title": "" }, { "docid": "9263a035b5017b7d423d06353e1ba3bf", "score": "0.4436511", "text": "func (m *PermissionGrantConditionSet) SetClientApplicationPublisherIds(value []string)() {\n err := m.GetBackingStore().Set(\"clientApplicationPublisherIds\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "6979df30e6fb2ee059d5d976322cd22b", "score": "0.4433913", "text": "func (m *RbacApplication) SetResourceNamespaces(value []UnifiedRbacResourceNamespaceable)() {\n err := m.GetBackingStore().Set(\"resourceNamespaces\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "0e7e6be331f528b0035de7f0b6ac039c", "score": "0.443285", "text": "func AddIndependentPropertyGeneratorsForApiManagementConfig_ARM(gens map[string]gopter.Gen) {\n\tgens[\"Id\"] = gen.PtrOf(gen.AlphaString())\n}", "title": "" }, { "docid": "5a92c24e1dddbf2a6881eba9a2715404", "score": "0.44255772", "text": "func (c *Configuration) IntMap(path string) map[string]int {\n\treturn c.config.IntMap(strings.ToLower(path))\n}", "title": "" }, { "docid": "b83c271d173df605c1ed111ab53aada1", "score": "0.4424105", "text": "func expandInstanceSettingsIPConfigurationAuthorizedNetworksMap(c *Client, f map[string]InstanceSettingsIPConfigurationAuthorizedNetworks) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandInstanceSettingsIPConfigurationAuthorizedNetworks(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "b799761acd02a655ebc1292534932f9a", "score": "0.4422507", "text": "func (m *WindowsAppX) SetIdentityResourceIdentifier(value *string)() {\n err := m.GetBackingStore().Set(\"identityResourceIdentifier\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "9c91b0fcfe9c8b1272aa14258c822171", "score": "0.44171283", "text": "func MappingResourcesInAProject(pProject *domain.Project, pProjectResources []*domain.ProjectResources) string {\n\tvar lead string\n\tmapResources := make(map[int]*domain.ResourceAssign, len(pProjectResources))\n\tfor _, projectResource := range pProjectResources {\n\t\tresourceAssign := domain.ResourceAssign{}\n\t\tresourceAssign.Resource = GetResourceById(projectResource.ResourceId)\n\t\tskills := GetResourceSkillsByResourceId(projectResource.ResourceId)\n\t\tutil.MappingSkillsInAResource(resourceAssign.Resource, skills)\n\t\tresourceAssign.StartDate = projectResource.StartDate\n\t\tresourceAssign.EndDate = projectResource.EndDate\n\t\tresourceAssign.Lead = projectResource.Lead\n\t\tif projectResource.Lead {\n\t\t\tlead = resourceAssign.Resource.Name\n\t\t} else if pProject.Lead == resourceAssign.Resource.Name {\n\t\t\tlead = \"\"\n\t\t}\n\t\tresourceAssign.Hours = projectResource.Hours\n\t\tmapResources[projectResource.ID] = &resourceAssign\n\t}\n\tpProject.ResourceAssign = mapResources\n\n\treturn lead\n}", "title": "" }, { "docid": "4bc5012d83f346eab6c73c055743a353", "score": "0.44093388", "text": "func RegisterHandlers(r *routing.RouteGroup, service Service, apikeyService apikey.Service, shortService short.Service, authHandler routing.Handler, logger log.Logger) {\n\tres := resource{service, apikeyService, shortService, logger}\n\t// the following endpoints require a valid JWT\n\tr.Use(authHandler)\n\tr.Get(\"/me\", res.me)\n\tr.Get(\"/my/shorts\", res.shorts)\n\tr.Post(\"/my/create/short\", res.createMyShort)\n}", "title": "" }, { "docid": "0d5e8bba5bd07d7b50d3ff6a535cd340", "score": "0.44080108", "text": "func applyAssetKRMResourceHacks(resource *krmtotf.Resource, a *asset.Asset, client serviceclient.ServiceClient, state *terraform.InstanceState) error {\n\tif resource.Kind == \"StorageBucket\" {\n\t\t// the storage bucket properly uses the container annotation of 'project', however, it is only used and\n\t\t// verified on creation. The project id is not part of the ResourceName in the asset, but the resource\n\t\t// skeleton is not useable without it as krmtotf, etc, need the project-id annotation since StorageBucket requires\n\t\t// the project id annotation. For that reason, use the project number in its place as it is mostly correct and\n\t\t// will allow the resource to be useable by the rest of the system\n\t\tfor _, ancestor := range a.Ancestors {\n\t\t\tif strings.HasPrefix(ancestor, \"projects/\") {\n\t\t\t\tprojectNumber := strings.Replace(ancestor, \"projects/\", \"\", 1)\n\t\t\t\tproject, err := client.GetProjectFromProjectIDOrNumber(projectNumber)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tresource.Annotations[k8s.ProjectIDAnnotation] = project.ProjectId\n\t\t\t}\n\t\t}\n\t} else if resource.Kind == \"IAMCustomRole\" {\n\t\tid, err := parseIAMCustomRoleID(state.ID)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unable to parse IAMCustomRole id: %v\", err)\n\t\t}\n\t\tif resource.Spec == nil {\n\t\t\tresource.Spec = make(map[string]interface{})\n\t\t}\n\t\tresource.Spec[k8s.ResourceIDFieldName] = id.roleID\n\t\tswitch id.parentType {\n\t\tcase Project:\n\t\t\tresource.Annotations[k8s.ProjectIDAnnotation] = id.parentID\n\t\tcase Organization:\n\t\t\tresource.Annotations[k8s.OrgIDAnnotation] = id.parentID\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "86f3a5cd3b7bc61677cd726a99781cca", "score": "0.44074205", "text": "func setResourcesReqForJob(res yaml.MapSlice, data *baseProwJobTemplateData) {\n\tdata.Resources = nil\n\tfor _, val := range res {\n\t\tdata.Resources = append(data.Resources, fmt.Sprintf(\" %s:\", getString(val.Key)))\n\t\tfor _, item := range getMapSlice(val.Value) {\n\t\t\tdata.Resources = append(data.Resources, fmt.Sprintf(\" %s: %s\", getString(item.Key), getString(item.Value)))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "66ceaa7e020e1670f4aafab145e5317a", "score": "0.44068658", "text": "func (r *reconciler) caBundleRevisionMap(dns *operatorv1.DNS) map[string]string {\n\tcaBundleRevisions := map[string]string{}\n\ttransportConfig := dns.Spec.UpstreamResolvers.TransportConfig\n\tif transportConfig.Transport == operatorv1.TLSTransport {\n\t\tif transportConfig.TLS != nil && transportConfig.TLS.CABundle.Name != \"\" {\n\t\t\tname := CABundleConfigMapName(transportConfig.TLS.CABundle.Name)\n\t\t\tcm := &corev1.ConfigMap{}\n\t\t\terr := r.client.Get(context.TODO(), name, cm)\n\t\t\tif err != nil {\n\t\t\t\tlogrus.Warningf(\"failed to get destination ca bundle configmap %s: %v\", name.Name, err)\n\t\t\t} else {\n\t\t\t\tcaBundleRevisions[transportConfig.TLS.CABundle.Name] = fmt.Sprintf(\"%s-%s\", cm.Name, cm.ResourceVersion)\n\t\t\t}\n\t\t}\n\t}\n\n\tfor _, server := range dns.Spec.Servers {\n\t\ttransportConfig := server.ForwardPlugin.TransportConfig\n\t\tif transportConfig.Transport == operatorv1.TLSTransport {\n\t\t\tif transportConfig.TLS != nil && transportConfig.TLS.CABundle.Name != \"\" {\n\t\t\t\tname := CABundleConfigMapName(transportConfig.TLS.CABundle.Name)\n\t\t\t\tcm := &corev1.ConfigMap{}\n\t\t\t\terr := r.client.Get(context.TODO(), name, cm)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogrus.Warningf(\"failed to get destination ca bundle configmap %s: %v\", name.Name, err)\n\t\t\t\t} else {\n\t\t\t\t\tcaBundleRevisions[transportConfig.TLS.CABundle.Name] = fmt.Sprintf(\"%s-%s\", cm.Name, cm.ResourceVersion)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn caBundleRevisions\n}", "title": "" }, { "docid": "0e535131acf009159e52ec8bde5dd580", "score": "0.44035727", "text": "func ContextMap(r *http.Request) map[string]string {\n\treturn (r.Context().Value(ContextMapKey)).(map[string]string)\n}", "title": "" }, { "docid": "48976c574c07d45600a1a32144f78c55", "score": "0.44026774", "text": "func applyOverlayToMap(resourceMap, overlayMap map[string]interface{}, path string) ([][]byte, error) {\n\tvar appliedPatches [][]byte\n\n\tfor key, value := range overlayMap {\n\t\t// skip anchor element because it has condition, not\n\t\t// the value that must replace resource value\n\t\tif commonAnchors.IsConditionAnchor(key) {\n\t\t\tcontinue\n\t\t}\n\n\t\tnoAnchorKey := removeAnchor(key)\n\t\tcurrentPath := path + noAnchorKey + \"/\"\n\t\tresourcePart, ok := resourceMap[noAnchorKey]\n\n\t\tif ok && !commonAnchors.IsAddingAnchor(key) {\n\t\t\t// Key exists - go down through the overlay and resource trees\n\t\t\tpatches, err := applyOverlay(resourcePart, value, currentPath)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tappliedPatches = append(appliedPatches, patches...)\n\t\t}\n\n\t\tif !ok {\n\t\t\t// Key does not exist - insert entire overlay subtree\n\t\t\tpatch, err := insertSubtree(value, currentPath)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tappliedPatches = append(appliedPatches, patch)\n\t\t}\n\t}\n\n\treturn appliedPatches, nil\n}", "title": "" }, { "docid": "d6d7cc0945da9c8024db1593fee6ae7d", "score": "0.44011062", "text": "func (m *AuditEvent) SetResources(value []AuditResourceable)() {\n err := m.GetBackingStore().Set(\"resources\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "599f52c863913998a403fe61ef1133f3", "score": "0.4394798", "text": "func (p IAMPolicies) ResourceIdentifiers() []string {\n\treturn p.PolicyArns\n}", "title": "" }, { "docid": "98ad8405954df91f8e620eb957d7f614", "score": "0.43945986", "text": "func (m *ServicePrincipalCreationConditionSet) SetApplicationIds(value []string)() {\n err := m.GetBackingStore().Set(\"applicationIds\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "cf508ec864adb1bbd51cd49ff57d2665", "score": "0.4388854", "text": "func makeURIHandlerMap(ghMap map[string][]guardAndHandler) map[string]http.Handler {\n\thandlerMap := make(map[string]http.Handler)\n\tfor uri, guardAndHandlers := range ghMap {\n\t\thandlerMap[uri] = reduceHandlers(guardAndHandlers)\n\t}\n\treturn handlerMap\n}", "title": "" }, { "docid": "03a410d30a686c60921ee85c1881fdec", "score": "0.43840724", "text": "func (m *RoleAssignment) SetResourceScopes(value []string)() {\n m.resourceScopes = value\n}", "title": "" }, { "docid": "b51343a54c144d0b23c66cfc1b87ff19", "score": "0.43778345", "text": "func (g *GenericGenerator) InitResources() error {\n\tclient, err := g.Client()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfuncs := []func(*octopusdeploy.Client) error{\n\t\tg.createResources,\n\t}\n\n\tfor _, f := range funcs {\n\t\terr := f(client)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "76c796f40f788df36fb4fb03a0003b7c", "score": "0.437704", "text": "func ApplyAuthResourceState(node *config.Node, name string, resource string, client client.Client) error {\n\tnode = node.Children[resource]\n\n\t// prune\n\texisting, err := client.List(\"auth/%s/%s\", name, resource)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, entry := range existing {\n\t\tremove := false\n\n\t\tif node == nil {\n\t\t\tremove = true\n\t\t} else if _, ok := node.Children[entry.Name]; !ok {\n\t\t\tremove = true\n\t\t}\n\n\t\tif remove {\n\t\t\tif err := client.Delete(\"auth/%s/%s/%s\", name, resource, entry.Name); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\t// apply\n\tif node != nil {\n\t\tfor key, value := range node.Children {\n\t\t\tif value.Config == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif err := client.Write(value.Config, \"auth/%s/%s/%s\", name, resource, key); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6240452591ea815dfb3e337e4e659564", "score": "0.43615514", "text": "func expandClusterAuthorizationMap(c *Client, f map[string]ClusterAuthorization, res *Cluster) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandClusterAuthorization(c, &item, res)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "f61ed22a6bd522ec59d0c5af8d5bd5e9", "score": "0.43602857", "text": "func addCorrelationID(resource *unstructured.Unstructured, correlationID string) {\n\tanno := resource.GetAnnotations()\n\tif anno == nil {\n\t\tanno = make(map[string]string)\n\t}\n\tanno[kubeclient.CorrelationIDAnnotation] = correlationID\n\tresource.SetAnnotations(anno)\n}", "title": "" }, { "docid": "08fc3182683b5b530acd9890f1e59444", "score": "0.4359607", "text": "func (m *ConditionalAccessPolicyDetail) SetGrantControls(value ConditionalAccessGrantControlsable)() {\n m.grantControls = value\n}", "title": "" }, { "docid": "26383320168239b5804decafc17f2652", "score": "0.43578586", "text": "func expandServiceTemplateContainersEnvValueSourceSecretKeyRefMap(c *Client, f map[string]ServiceTemplateContainersEnvValueSourceSecretKeyRef, res *Service) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandServiceTemplateContainersEnvValueSourceSecretKeyRef(c, &item, res)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "7e199684131577efe59701c7ca3dd968", "score": "0.435379", "text": "func init() {\n\tResourceTemplates = map[string]string{\n\t\t\"outputs\": outputsTpl,\n\t\t\"provider\": providerTpl,\n\t\t\"resources\": resourcesTpl,\n\t\t\"variables\": variablesTpl,\n\t}\n}", "title": "" }, { "docid": "bb1cccb14fdb586a2556a067fb50299e", "score": "0.43438154", "text": "func MapUrls(router *gin.Engine, reviewsController Reviews, middleware middlewares.Middleware) *gin.RouterGroup {\n\n\tapiRoutes := router.Group(\"/api/reviews\")\n\t{\n\n\t\tapiRoutes.GET(\"/books/:id\", reviewsController.GetFromBook)\n\n\t\tapiRoutes.POST(\"/books/:id\", middleware.CheckJWTToken, reviewsController.CreateInBook)\n\n\t}\n\n\treturn apiRoutes\n}", "title": "" }, { "docid": "500104132a0936bf70675ccec4ed6584", "score": "0.43416405", "text": "func MapResource(api, resource string) {\n\tresourceMap.Store(api, resource)\n}", "title": "" }, { "docid": "121066aba6dcd0c6c1e9d45634204d73", "score": "0.4337122", "text": "func (r *resolve) MapK8sResourceAthenzResource(k8sRes string) string {\n\tathenzRes, ok := r.cfg.ResourceMappings[k8sRes]\n\tif !ok {\n\t\treturn k8sRes\n\t}\n\treturn athenzRes\n}", "title": "" }, { "docid": "1c3b42c6126ff5e74554d4fa6ed8d411", "score": "0.43287197", "text": "func makeIDConfigMapCompatible(resourceID string) string {\n\treturn strings.ToLower(strings.Replace(resourceID, \"_\", \"-\", -1))\n}", "title": "" }, { "docid": "9d90f11004a3f2a872da935d2bdc6ea4", "score": "0.43250868", "text": "func ParseResourceID(id, path string) (map[string]string, error) {\n\tpathParts := strings.Split(path, \"/\")\n\tregexParts := make([]string, len(pathParts))\n\tfor i, s := range pathParts {\n\t\tif strings.HasPrefix(s, \"{\") && strings.HasSuffix(s, \"}\") {\n\t\t\tname := s[1 : len(s)-1]\n\t\t\tregexParts[i] = fmt.Sprintf(\"(?P<%s>.*?)\", name)\n\t\t} else {\n\t\t\tregexParts[i] = pathParts[i]\n\t\t}\n\t}\n\n\texpr := fmt.Sprintf(\"(?i)^%s$\", strings.Join(regexParts, \"/\"))\n\tpattern, err := regexp.Compile(expr)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"failed to compile expression '%s' for path '%s'\", expr, path)\n\t}\n\n\tmatch := pattern.FindStringSubmatch(id)\n\tif len(match) < len(pattern.SubexpNames()) {\n\t\treturn nil, errors.Errorf(\"failed to parse '%s' against the path '%s'\", id, path)\n\t}\n\n\tresult := map[string]string{}\n\tfor i, name := range pattern.SubexpNames() {\n\t\tif i > 0 && name != \"\" {\n\t\t\tresult[name] = match[i]\n\t\t}\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "b146c4a50d9be112b1bcd67fbe88643e", "score": "0.43223956", "text": "func expandClusterAzureServicesAuthenticationMap(c *Client, f map[string]ClusterAzureServicesAuthentication, res *Cluster) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandClusterAzureServicesAuthentication(c, &item, res)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "7fe1af3a6b55395c6156451c726111c1", "score": "0.4321979", "text": "func (k *Kind) InitResources() error {\n\tconfig, _, err := initClientAndConfig()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tclientset, err := kubernetes.NewForConfig(config)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tgroup := reflect.ValueOf(clientset).MethodByName(\n\t\textractClientSetFuncGroupName(k.Group, k.Version)).Call(\n\t\t[]reflect.Value{})[0]\n\n\tparam := []reflect.Value{}\n\tnamespace := \"\"\n\tif k.Namespaced {\n\t\tparam = append(param, reflect.ValueOf(namespace))\n\t}\n\n\tresource := group.MethodByName(extractClientSetFuncTypeName(k.Name)).Call(param)[0]\n\n\tresults := resource.MethodByName(\"List\").Call([]reflect.Value{reflect.ValueOf(context.Background()),\n\t\treflect.ValueOf(metav1.ListOptions{})})\n\n\tif !results[1].IsNil() {\n\t\treturn results[1].Interface().(error)\n\t}\n\titems := reflect.Indirect(results[0]).FieldByName(\"Items\")\n\n\tfor i := 0; i < items.Len(); i++ {\n\t\titem := items.Index(i)\n\t\t// Filter to resources that aren't owned by any other resource\n\t\tif item.FieldByName(\"OwnerReferences\").Len() > 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tname := \"\"\n\t\tif k.Namespaced {\n\t\t\tname = item.FieldByName(\"Namespace\").String() + \"/\" + item.FieldByName(\"Name\").String()\n\t\t} else {\n\t\t\tname = item.FieldByName(\"Name\").String()\n\t\t}\n\n\t\tk.Resources = append(k.Resources, terraformutils.NewSimpleResource(\n\t\t\tname,\n\t\t\tname,\n\t\t\textractTfResourceName(k.Name),\n\t\t\t\"kubernetes\",\n\t\t\t[]string{},\n\t\t))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7667c03e052fc61186d37544003d65bf", "score": "0.43210793", "text": "func (i *IdentityStore) pathAliasIDList() framework.OperationFunc {\n\treturn func(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {\n\t\treturn i.handleAliasListCommon(ctx, false)\n\t}\n}", "title": "" }, { "docid": "77f43c240b585b5b22502bac24cdde58", "score": "0.43209141", "text": "func AuthorizationsForResource(ctx context.Context, k8sAPI *KubernetesAPI, namespace string, resource string) ([]Authorization, error) {\n\tpods, err := getPodsForResourceOrKind(ctx, k8sAPI, namespace, resource, \"\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresults := make([]Authorization, 0)\n\n\tsazs, err := k8sAPI.L5dCrdClient.ServerauthorizationV1beta1().ServerAuthorizations(namespace).List(ctx, metav1.ListOptions{})\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Failed to get serverauthorization resources: %s\\n\", err)\n\t\tos.Exit(1)\n\t}\n\n\tfor _, saz := range sazs.Items {\n\t\tvar servers []serverv1beta1.Server\n\n\t\tif saz.Spec.Server.Name != \"\" {\n\t\t\tserver, err := k8sAPI.L5dCrdClient.ServerV1beta1().Servers(saz.GetNamespace()).Get(ctx, saz.Spec.Server.Name, metav1.GetOptions{})\n\t\t\tif err != nil {\n\t\t\t\tfmt.Fprintf(os.Stderr, \"ServerAuthorization/%s targets Server/%s but we failed to get it: %s\\n\", saz.Name, saz.Spec.Server.Name, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tservers = []serverv1beta1.Server{*server}\n\t\t} else if saz.Spec.Server.Selector != nil {\n\t\t\tselector, err := metav1.LabelSelectorAsSelector(saz.Spec.Server.Selector)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Fprintf(os.Stderr, \"Failed to parse Server selector for ServerAuthorization/%s: %s\\n\", saz.Name, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tserverList, err := k8sAPI.L5dCrdClient.ServerV1beta1().Servers(saz.GetNamespace()).List(ctx, metav1.ListOptions{LabelSelector: selector.String()})\n\t\t\tif err != nil {\n\t\t\t\tfmt.Fprintf(os.Stderr, \"Failed to get Servers for ServerAuthorization/%s: %s\\n\", saz.Name, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tservers = serverList.Items\n\t\t}\n\n\t\tfor _, server := range servers {\n\t\t\tif serverIncludesPod(server, pods) {\n\t\t\t\tresults = append(results, Authorization{\n\t\t\t\t\tRoute: \"\",\n\t\t\t\t\tServer: server.GetName(),\n\t\t\t\t\tServerAuthorization: saz.GetName(),\n\t\t\t\t\tAuthorizationPolicy: \"\",\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t}\n\n\tpolicies, err := k8sAPI.L5dCrdClient.PolicyV1alpha1().AuthorizationPolicies(namespace).List(ctx, metav1.ListOptions{})\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Failed to get AuthorizationPolicy resources: %s\\n\", err)\n\t\tos.Exit(1)\n\t}\n\n\tallServersInNamespace := map[string]*serverv1beta1.ServerList{}\n\n\tfor _, p := range policies.Items {\n\t\ttarget := p.Spec.TargetRef\n\t\tif target.Kind == NamespaceKind && target.Group == K8sCoreAPIGroup {\n\t\t\tserverList, ok := allServersInNamespace[p.Namespace]\n\t\t\tif !ok {\n\t\t\t\tserverList, err = k8sAPI.L5dCrdClient.ServerV1beta1().Servers(p.Namespace).List(ctx, metav1.ListOptions{})\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Fprintf(os.Stderr, \"Failed to get Servers for Namespace/%s: %s\\n\", p.Namespace, err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tallServersInNamespace[p.Namespace] = serverList\n\t\t\t}\n\n\t\t\tfor _, server := range serverList.Items {\n\t\t\t\tif serverIncludesPod(server, pods) {\n\t\t\t\t\tresults = append(results, Authorization{\n\t\t\t\t\t\tRoute: \"\",\n\t\t\t\t\t\tServer: server.GetName(),\n\t\t\t\t\t\tServerAuthorization: \"\",\n\t\t\t\t\t\tAuthorizationPolicy: p.GetName(),\n\t\t\t\t\t})\n\t\t\t\t}\n\t\t\t}\n\t\t} else if target.Kind == ServerKind && target.Group == PolicyAPIGroup {\n\t\t\tserver, err := k8sAPI.L5dCrdClient.ServerV1beta1().Servers(p.Namespace).Get(ctx, string(target.Name), metav1.GetOptions{})\n\t\t\tif err != nil {\n\t\t\t\tfmt.Fprintf(os.Stderr, \"AuthorizationPolicy/%s targets Server/%s but we failed to get it: %s\\n\", p.Name, target.Name, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif serverIncludesPod(*server, pods) {\n\t\t\t\tresults = append(results, Authorization{\n\t\t\t\t\tRoute: \"\",\n\t\t\t\t\tServer: server.GetName(),\n\t\t\t\t\tServerAuthorization: \"\",\n\t\t\t\t\tAuthorizationPolicy: p.GetName(),\n\t\t\t\t})\n\t\t\t}\n\t\t} else if target.Kind == HTTPRouteKind && target.Group == PolicyAPIGroup {\n\t\t\troute, err := k8sAPI.L5dCrdClient.PolicyV1alpha1().HTTPRoutes(p.Namespace).Get(ctx, string(target.Name), metav1.GetOptions{})\n\t\t\tif err != nil {\n\t\t\t\tfmt.Fprintf(os.Stderr, \"AuthorizationPolicy/%s targets HTTPRoute/%s but we failed to get it: %s\\n\", p.Name, target.Name, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tfor _, parent := range route.Spec.ParentRefs {\n\t\t\t\tif parent.Kind != nil && *parent.Kind == ServerKind &&\n\t\t\t\t\tparent.Group != nil && *parent.Group == PolicyAPIGroup {\n\t\t\t\t\tserver, err := k8sAPI.L5dCrdClient.ServerV1beta1().Servers(p.Namespace).Get(ctx, string(parent.Name), metav1.GetOptions{})\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tfmt.Fprintf(os.Stderr, \"HTTPRoute/%s belongs to Server/%s but we failed to get it: %s\\n\", target.Name, parent.Name, err)\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif serverIncludesPod(*server, pods) {\n\t\t\t\t\t\tresults = append(results, Authorization{\n\t\t\t\t\t\t\tRoute: route.GetName(),\n\t\t\t\t\t\t\tServer: server.GetName(),\n\t\t\t\t\t\t\tServerAuthorization: \"\",\n\t\t\t\t\t\t\tAuthorizationPolicy: p.GetName(),\n\t\t\t\t\t\t})\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn results, nil\n}", "title": "" }, { "docid": "22ed1392eaf6b2c392a4af5cd62cfb78", "score": "0.4318305", "text": "func expandServicePerimeterSpecMap(c *Client, f map[string]ServicePerimeterSpec) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandServicePerimeterSpec(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "67303dcab8f58a543515ec954a5cca0f", "score": "0.4313477", "text": "func flattenKeyRestrictionsApiTargetsMap(c *Client, i interface{}, res *Key) map[string]KeyRestrictionsApiTargets {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]KeyRestrictionsApiTargets{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]KeyRestrictionsApiTargets{}\n\t}\n\n\titems := make(map[string]KeyRestrictionsApiTargets)\n\tfor k, item := range a {\n\t\titems[k] = *flattenKeyRestrictionsApiTargets(c, item.(map[string]interface{}), res)\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "22240e80a65d80e6a84d919152b9fd45", "score": "0.4312781", "text": "func authorizeGroups(client *ec2.EC2, ids []*string, protocol *string, port *int, cidr *string) {\n\tfor _, id := range ids {\n\t\tauthorizeGroup(client, id, protocol, port, cidr)\n\t}\n}", "title": "" }, { "docid": "f8ecb5795ed2f3b24e60ec28c5854340", "score": "0.4310001", "text": "func AddIndependentPropertyGeneratorsForHandlerMapping_ARM(gens map[string]gopter.Gen) {\n\tgens[\"Arguments\"] = gen.PtrOf(gen.AlphaString())\n\tgens[\"Extension\"] = gen.PtrOf(gen.AlphaString())\n\tgens[\"ScriptProcessor\"] = gen.PtrOf(gen.AlphaString())\n}", "title": "" }, { "docid": "29227f64f7a80c4d4697bf79c91762c5", "score": "0.43066132", "text": "func expandKeyRestrictionsIosKeyRestrictionsMap(c *Client, f map[string]KeyRestrictionsIosKeyRestrictions, res *Key) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandKeyRestrictionsIosKeyRestrictions(c, &item, res)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "b612089ab309b503006c452d13bf0ad8", "score": "0.43064168", "text": "func addAPIMappingRoutes(r *mux.Router, srv *RestServer) {\n\tr.Methods(\"GET\").Subrouter().HandleFunc(\"/interfaces/{id}\", httputils.MakeHTTPHandler(srv.getInterfaceMappingHandler))\n}", "title": "" }, { "docid": "5aa2294e85955b12a658b127c7021ee0", "score": "0.43043265", "text": "func MapUrls(router *gin.Engine, usersController Users) *gin.RouterGroup {\n\n\tapiRoutes := router.Group(\"/api/users\")\n\t{\n\t\tapiRoutes.GET(\"/:id\", usersController.Get)\n\t}\n\n\treturn apiRoutes\n}", "title": "" } ]
0e81e0222842cbb90d4a297e4ab19348
SetCurrent method changes the current environment
[ { "docid": "d38aa79e23b8c0b9bf3e9a130aaeb080", "score": "0.6941434", "text": "func (ctx *Context) SetCurrent(name string) *Context {\n\tif ctx.Err() != nil {\n\t\treturn ctx\n\t}\n\n\tif ctx.HasEnvironment(name) {\n\t\tdotEnvFilePath := ctx.CachedEnvironmentDotEnvPath(name)\n\t\tcurrentDotEnvFilePath := ctx.CachedDotEnvPath()\n\n\t\terr := utils.CopyFile(dotEnvFilePath, currentDotEnvFilePath)\n\t\tif err != nil {\n\t\t\treturn ctx.setError(\n\t\t\t\tkserrors.CopyFailed(dotEnvFilePath, currentDotEnvFilePath, err),\n\t\t\t)\n\t\t}\n\n\t\tenvironmentsfile := &environmentsfile.EnvironmentsFile{}\n\t\tif err := environmentsfile.Load(ctx.dotKeystonePath()).SetCurrent(name).Save().Err(); err != nil {\n\t\t\tctx.setError(kserrors.FailedToUpdateKeystoneFile(err))\n\t\t}\n\n\t\tif err != nil {\n\t\t\treturn ctx.setError(\n\t\t\t\tkserrors.FailedToSetCurrentEnvironment(\n\t\t\t\t\tname,\n\t\t\t\t\tctx.environmentFilePath(),\n\t\t\t\t\terr,\n\t\t\t\t),\n\t\t\t)\n\t\t}\n\n\t\tctx.FilesUseEnvironment(\n\t\t\tctx.CurrentEnvironment(),\n\t\t\tname,\n\t\t\tCTX_OVERWRITE_LOCAL_FILES,\n\t\t)\n\n\t} else {\n\t\treturn ctx.setError(kserrors.EnvironmentDoesntExist(name, strings.Join(ctx.ListEnvironments(), \", \"), nil))\n\t}\n\n\treturn ctx\n}", "title": "" } ]
[ { "docid": "960feda46041b7187ddcb73b9e664658", "score": "0.62193793", "text": "func (c *Context) Set(name string, value interface{}) {\n\tif c.Environ.Has(name) {\n\t\tpanic(\"double Environ: \" + name)\n\t} else {\n\t\tc.Environ[name] = value\n\t}\n}", "title": "" }, { "docid": "96677cd0bebcffebf9d1b6c6b1bbc3f4", "score": "0.592363", "text": "func Set(mode string) {\n\tcurrentMode = mode\n}", "title": "" }, { "docid": "3e9f3baf0b1169a7ed62f35687268878", "score": "0.5799423", "text": "func SetCurrentContext(name string, configPath ...string) error {\n\tfPath := PathFromEnv()\n\tif configPath != nil {\n\t\tfPath = configPath[0]\n\t}\n\tkcfg, err := readOrNew(fPath)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Error getting kubeconfig status\")\n\t}\n\tkcfg.CurrentContext = name\n\treturn writeToFile(kcfg, fPath)\n}", "title": "" }, { "docid": "d22b19fbe8d1fdd86f2887a7d834fbe3", "score": "0.57105565", "text": "func setCurrentStore(cmd *cobra.Command, args []string) error {\n\tconfigManipulator := di.InitialiseConfigManipulator()\n\n\treturn configManipulator.SetCurrentStore(args[0])\n}", "title": "" }, { "docid": "aba5df28feff428cc383513c690a98b5", "score": "0.57079464", "text": "func (c *Context) SetEnvironment(e string) { c.envName = e }", "title": "" }, { "docid": "d408f4b18d139308ad53219b84f5d4cb", "score": "0.5667689", "text": "func (this *Command) setCurrentEnv(cmd *osexec.Cmd) []string {\n\n\tenv := os.Environ()\n\n\tif this.Env != nil {\n\t\tfor k, v := range this.Env {\n\t\t\tenv = append(env, fmt.Sprintf(\"%s=%s\", k, v))\n\t\t}\n\t}\n\n\treturn env\n}", "title": "" }, { "docid": "4cb06c6aae1cc7d375006d6f64cc8072", "score": "0.5592319", "text": "func (c *CmdEnv) Set(name, newValue string) error {\n\tkey, err := c.openKeyFn(getEnvironmentPath(c.userScope))\n\tif err != nil {\n\t\treturn locale.WrapError(err, \"err_windows_registry\")\n\t}\n\tdefer key.Close()\n\n\t// Check if we're going to be overriding\n\t_, valType, err := key.GetStringValue(name)\n\tif err != nil && !osutils.IsNotExistError(err) {\n\t\treturn locale.WrapError(err, \"err_windows_registry\")\n\t}\n\n\treturn osutils.SetStringValue(key, name, valType, newValue)\n}", "title": "" }, { "docid": "735f51bfff786ff92a31be8d19798376", "score": "0.5591752", "text": "func Set(args ...string) error {\n\treturn os.Setenv(args[0], args[1])\n}", "title": "" }, { "docid": "324719216896951648f39e4103129b95", "score": "0.5573075", "text": "func (environments *Environments) Set() {\n\tfor _, e := range *environments {\n\t\tos.Setenv(e.Name, e.Value)\n\t}\n}", "title": "" }, { "docid": "79a211261292577739500bc6864ab5a2", "score": "0.55415034", "text": "func SetCurrentDeployment(deployName string) error {\n\tfilename, err := homedir.Expand(\"~/.sonatina/current\")\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"couldn't expand directory\")\n\t}\n\n\terr = afero.WriteFile(Fs, filename, []byte(deployName), 0644)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"couldn't write current deployment\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6814b9154ac18abf7b097baed841c6cd", "score": "0.55216104", "text": "func (a *advanceable) SetCurrent(now time.Time) {\n\ta.m.Lock()\n\ta.setCurrent(now)\n\ta.m.Unlock()\n}", "title": "" }, { "docid": "e1772447cc6f026a79118ab465d22e52", "score": "0.5519049", "text": "func Set(key string, value string) { DefaultEnv.Set(key, value) }", "title": "" }, { "docid": "a724b44b0abf7f29240039488767980e", "score": "0.5504738", "text": "func (m *EnvironmentManager) setCurrentPh(point utils.Point, ph float64) {\n\tm.mutex.Lock()\n\tm.currentPhMap[point.X][point.Y] = ph\n\tm.mutex.Unlock()\n}", "title": "" }, { "docid": "7c061712dc0c488da9be0679d18fee0a", "score": "0.5498128", "text": "func (l *preLogger) SetCurrentTest(ti *protocol.Entity) {\n\tl.mu.Lock()\n\tdefer l.mu.Unlock()\n\tl.ti = ti\n}", "title": "" }, { "docid": "9145a25d4b7d131d328c27e1b8d30082", "score": "0.5479486", "text": "func Reset() { DefaultEnv.Reset() }", "title": "" }, { "docid": "7f9fedd9465d172399f6372fa819cdf7", "score": "0.54578376", "text": "func (env *Environment) Set(name, value string) error {\n\tvar err error\n\tv, ok := env.vars[name]\n\tif !ok {\n\t\tlocal := false\n\t\terr = env.Declare(name, guessType(name), local)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tv = env.vars[name]\n\t}\n\tv.set(env.process(&v, value))\n\n\tenv.vars[name] = v\n\tenv.stack = append(env.stack, &SetVar{\n\t\tName: name,\n\t\tValue: value,\n\t})\n\treturn err\n}", "title": "" }, { "docid": "af74a9c1c290e0dde28040664d17044f", "score": "0.54138833", "text": "func SetEnvironment(environment string) {\n\tstd.SetEnvironment(environment)\n}", "title": "" }, { "docid": "ef5ec1bbb04511bc00c104ebd8c3156b", "score": "0.5337938", "text": "func (us *UserSaver) SetCurrent(upk cipher.PubKey) error {\n\tus.Lock()\n\tdefer us.Unlock()\n\tif _, has := us.masters[upk]; has == false {\n\t\treturn errors.New(\"not a master user\")\n\t}\n\tus.current = upk\n\treturn nil\n}", "title": "" }, { "docid": "4202ee19b3a9cbee159bf873ba256a71", "score": "0.5304441", "text": "func (e *Environment) Set(name string, val Object) Object {\n\te.store[name] = val\n\treturn val\n}", "title": "" }, { "docid": "4202ee19b3a9cbee159bf873ba256a71", "score": "0.5304441", "text": "func (e *Environment) Set(name string, val Object) Object {\n\te.store[name] = val\n\treturn val\n}", "title": "" }, { "docid": "5ec277bc2833af521438fbda3356fc8d", "score": "0.5277368", "text": "func (a *Activations) Set(name string, value interface{}) {\n\tcurrent := a.current()\n\t// create the first scope if there is no scope\n\tif current == nil {\n\t\ta.PushCurrent()\n\t\tcurrent = &a.activations[0]\n\t}\n\n\tcount := len(a.activations)\n\t// update the current scope in an immutable way,\n\t// which builds on top of the old \"current\" activation value\n\t// without mutating it.\n\ta.activations[count-1] = current.Insert(name, value)\n}", "title": "" }, { "docid": "f499279d544f575bd4d12ea09e8b9bc7", "score": "0.5251461", "text": "func SetEnvironment() {\n\tgetEnv := os.Getenv(\"GOCUSTOMENV\")\n\tviper.Set(\"Env\", \"Development\")\n\tif len(getEnv) > 0 {\n\t\tif getEnv == \"production\" {\n\t\t\tviper.Set(\"Env\", \"Production\")\n\t\t\tgin.SetMode(\"release\")\n\t\t} else if getEnv == \"staging\" {\n\t\t\tviper.Set(\"Env\", \"Staging\")\n\t\t\tgin.SetMode(\"release\")\n\t\t}\n\t}\n\tfmt.Println(\"Environment: \" + viper.GetString(\"Env\"))\n}", "title": "" }, { "docid": "5306c0ca518d34a0a651eba98f7a39b5", "score": "0.52135897", "text": "func setEnv(e *AppEnv) {\n\tenvMutex.Lock()\n\tdefer envMutex.Unlock()\n\tenv = *e\n}", "title": "" }, { "docid": "90996fe2b111607199fd81151a008a4b", "score": "0.5210407", "text": "func (t *nativeThread) SetCurrentBreakpoint(adjustPC bool) error {\n\tt.CurrentBreakpoint.Clear()\n\n\tvar bp *proc.Breakpoint\n\n\tif t.dbp.Breakpoints().HasHWBreakpoints() {\n\t\tvar err error\n\t\tbp, err = t.findHardwareBreakpoint()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif bp == nil {\n\t\tpc, err := t.PC()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// If the breakpoint instruction does not change the value\n\t\t// of PC after being executed we should look for breakpoints\n\t\t// with bp.Addr == PC and there is no need to call SetPC\n\t\t// after finding one.\n\t\tadjustPC = adjustPC && t.BinInfo().Arch.BreakInstrMovesPC()\n\n\t\tvar ok bool\n\t\tbp, ok = t.dbp.FindBreakpoint(pc, adjustPC)\n\t\tif ok {\n\t\t\tif adjustPC {\n\t\t\t\tif err = t.setPC(bp.Addr); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tt.CurrentBreakpoint.Breakpoint = bp\n\treturn nil\n}", "title": "" }, { "docid": "7fa69e130f67ba83024e0f84ff86c187", "score": "0.51832217", "text": "func (p *Process) Setenv(m map[string]string) { p.env = m }", "title": "" }, { "docid": "582dc77711e3be9d7fe26b0398388b62", "score": "0.5170255", "text": "func (m Mode) Set() error {\n\tscwMu.Lock()\n\tdefer scwMu.Unlock()\n\treturn multisc.setMode(m)\n}", "title": "" }, { "docid": "7ec0589cf9cbbcbe6db3ca690d275c3a", "score": "0.5166788", "text": "func SetCurrentContext(context string) Action {\n\treturn func(c *Config) {\n\t\tc.CurrentContext = context\n\t}\n}", "title": "" }, { "docid": "f3c31548610518715fed5cc817689b16", "score": "0.5144144", "text": "func Set(ctx context.Context, key string, value interface{}) context.Context {\n\treturn context.WithValue(ctx, envKey(key), value)\n}", "title": "" }, { "docid": "14997353ab6ad5364b0f68923a900f2e", "score": "0.511571", "text": "func (this *ContextStack) SetGlobal(name string, value reflect.Value) {\r\n\tthis.stack[0][name] = value\r\n}", "title": "" }, { "docid": "29b71a521b5a6b55fde52d78ab148fe0", "score": "0.51077455", "text": "func (m *BrowserSharedCookieHistory) SetSourceEnvironment(value *BrowserSharedCookieSourceEnvironment)() {\n err := m.GetBackingStore().Set(\"sourceEnvironment\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "41e4eeff0d840f3fa8cd1b49437cbc4f", "score": "0.510251", "text": "func SetDevelop() {\n\tSet(DEVELOP)\n}", "title": "" }, { "docid": "9bb4392df3b1c9b76a5d96abb67eca30", "score": "0.5082765", "text": "func SetEnv(envName string) (string, error) {\n\tvar msg string\n\tcurrentEnvPath, err := system.GetCurrentEnvPath()\n\tif err != nil {\n\t\treturn msg, err\n\t}\n\tenvMeta, err := GetEnvByName(envName)\n\tif err != nil {\n\t\treturn msg, err\n\t}\n\t//nolint:gosec\n\tif err = ioutil.WriteFile(currentEnvPath, []byte(envName), 0644); err != nil {\n\t\treturn msg, err\n\t}\n\tmsg = fmt.Sprintf(\"Set environment succeed, current environment is \" + envName + \", namespace is \" + envMeta.Namespace)\n\treturn msg, nil\n}", "title": "" }, { "docid": "8834f74b80116f33d7854438430debc3", "score": "0.50818807", "text": "func Current() Env {\n\treturn current\n}", "title": "" }, { "docid": "995f4a6c1802113bfb61821dd37525bb", "score": "0.50715464", "text": "func (thread *Thread) SetCurrentBreakpoint() error {\n\tthread.CurrentBreakpoint = nil\n\tpc, err := thread.PC()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif bp, ok := thread.dbp.FindBreakpoint(pc); ok {\n\t\tthread.CurrentBreakpoint = bp\n\t\tif err = thread.SetPC(bp.Addr); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tthread.BreakpointConditionMet, thread.BreakpointConditionError = bp.checkCondition(thread)\n\t\tif thread.onTriggeredBreakpoint() {\n\t\t\tif g, err := thread.GetG(); err == nil {\n\t\t\t\tthread.CurrentBreakpoint.HitCount[g.ID]++\n\t\t\t}\n\t\t\tthread.CurrentBreakpoint.TotalHitCount++\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a221611c587b5ca51ec728f5c2cc3a6e", "score": "0.50658906", "text": "func (scene *MleScene) SetCurrentScene() {\n\tg_currentScene = scene\n}", "title": "" }, { "docid": "72ee3cb7d5ed3a95ee2b8cb908f7188d", "score": "0.5040176", "text": "func SetCurrentAbsPath(path ...string) {\n\tif len(path) == 0 {\n\t\tdir := getCurrentAbsPathByExecutable()\n\t\ttmpDir, _ := filepath.EvalSymlinks(os.TempDir())\n\t\tif strings.Contains(dir, tmpDir) {\n\t\t\tdir = getCurrentAbsPathByCaller()\n\t\t}\n\t\tcurrentAbsPath = dir\n\t} else {\n\t\tcurrentAbsPath = path[0]\n\t}\n\n}", "title": "" }, { "docid": "944dbf6e16edcdd4063bc957d92b1a1b", "score": "0.5037694", "text": "func SetLive() {\n\tinitEnv()\n\tEnv.DatabaseURL = Env.ProdDatabaseURL\n\tEnv.StripeKey = Env.StripeKeyProd\n\trunInitializations()\n}", "title": "" }, { "docid": "4dd06da0cd1a8493e5ea0e6643005989", "score": "0.5034813", "text": "func TestEnvSet(t *testing.T) {\n\tts := testServer(t,\n\t\ttest.Http{\n\t\t\tMethod: \"POST\",\n\t\t\tPath: \"/apps/myapp/environment\",\n\t\t\tBody: \"foo=bar\\n\",\n\t\t\tCode: 200,\n\t\t},\n\t\ttest.Http{\n\t\t\tMethod: \"GET\",\n\t\t\tPath: \"/apps/myapp/environment\",\n\t\t\tCode: 200,\n\t\t\tResponse: client.Environment{},\n\t\t},\n\t)\n\n\tdefer ts.Close()\n\n\ttest.Runs(t,\n\t\ttest.ExecRun{\n\t\t\tCommand: \"convox env set -a myapp foo=bar\",\n\t\t\tExit: 0,\n\t\t\tStdout: \"Updating environment... OK\\n\",\n\t\t},\n\t)\n}", "title": "" }, { "docid": "a2886019bc84c46098911b256b21540e", "score": "0.5033138", "text": "func SetProject(project migrate.Project) {\n\tappState.Project = project\n\tCli.SetPrompt(\"dmk [\" + appState.Directory + \"] » \" + project.Component.MachineName + \" » \")\n}", "title": "" }, { "docid": "bd16fb3e16ebbe0398bbe085d5db09d2", "score": "0.50325054", "text": "func Set(key string, value string) {\n\tgil.Lock()\n\tdefer gil.Unlock()\n\tenv[key] = value\n}", "title": "" }, { "docid": "e5e4414d08bcf9d364a4d0e331a575a2", "score": "0.5028214", "text": "func SetLocalDevMode(path string) {\n\tgosrc.SetLocalDevMode(path)\n}", "title": "" }, { "docid": "3256735670b02e239b4e6bb2c9f0badd", "score": "0.49998736", "text": "func SetPlatform(platform string) {\n\tstd.SetPlatform(platform)\n}", "title": "" }, { "docid": "2ee329ad3b628620840d7e12fcea86fd", "score": "0.49923655", "text": "func Sync() { DefaultEnv.Sync() }", "title": "" }, { "docid": "1a4d9738eb5178c4512631e298cce02e", "score": "0.4989069", "text": "func (es *EnvSet) Run() error {\n\tenv, err := es.app.Environment(es.envName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err := es.updateName(env.IsOverride()); err != nil {\n\t\treturn err\n\t}\n\n\treturn es.updateNamespace(env)\n}", "title": "" }, { "docid": "e12b89f673a9b0c43e6fe5d219d17973", "score": "0.49867612", "text": "func (thread *Thread) SetCurrentBreakpoint() error {\n\tthread.CurrentBreakpoint.Clear()\n\tpc, err := thread.PC()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif bp, ok := thread.dbp.FindBreakpoint(pc); ok {\n\t\tif err = thread.SetPC(bp.Addr); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tthread.CurrentBreakpoint = bp.CheckCondition(thread)\n\t\tif thread.CurrentBreakpoint.Breakpoint != nil && thread.CurrentBreakpoint.Active {\n\t\t\tif g, err := proc.GetG(thread); err == nil {\n\t\t\t\tthread.CurrentBreakpoint.HitCount[g.ID]++\n\t\t\t}\n\t\t\tthread.CurrentBreakpoint.TotalHitCount++\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cf227cccbf9474ed8c054de19fe54e00", "score": "0.4973809", "text": "func (env *Environment) SetModule(module *Module) {\n\tC.EnvSetCurrentModule(env.env, module.modptr)\n}", "title": "" }, { "docid": "08bc6b6c4083bb0d2a5f347527877914", "score": "0.49666733", "text": "func SetShell(name string) {\n\tCurrentShell = shellNames[name]\n}", "title": "" }, { "docid": "7633e2fc0ee85dd912b7e78f899ebf58", "score": "0.49637112", "text": "func (c *Client) SetCurrentAo(value interface{}) error {\n\treturn c.SetProperty(\"current-ao\", value)\n}", "title": "" }, { "docid": "e08b4a644837acc75091d0c0bfa747ae", "score": "0.49565673", "text": "func (pipe *Pipeline) SetEnv(keyValue string, more ...string) *Pipeline {\n\tif pipe.Started {\n\t\treturn pipe\n\t}\n\tpipe.currentEnv = append(more, keyValue)\n\treturn pipe\n}", "title": "" }, { "docid": "49cba848fb9086ceb28b1ce159118829", "score": "0.49479207", "text": "func SetEnvironment(host, key, env string) {\n\n\tvar cf string\n\n\tswitch env {\n\tcase \"escapepod\":\n\t\tcf = escapepod\n\tcase \"production\":\n\t\tcf = prod\n\tdefault:\n\t\tfmt.Println(`valid environments are:\n\t\tescapepod\n\t\tproduction`)\n\t\tos.Exit(1)\n\t}\n\n\tc, err := getSSHConn(key, host)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\n\tif err := runCmds(\n\t\tc,\n\t\t[]string{\n\t\t\t\"mount -o remount rw /\",\n\t\t\tfmt.Sprintf(\"cp %s %s.bak\", cfpath, cfpath),\n\t\t\tfmt.Sprintf(`cat > %s << EOF\n%s\nEOF`,\n\t\t\t\tcfpath,\n\t\t\t\tcf,\n\t\t\t),\n\t\t},\n\t); err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\n\trebootPrompt(c)\n}", "title": "" }, { "docid": "40b66805be5c28611bb94fb7f987b5e9", "score": "0.49427238", "text": "func SetEnvironment(env string) {\n\tviper.Set(\"env\", env)\n}", "title": "" }, { "docid": "d724e27969814bc2bab2cff6244edea7", "score": "0.49266088", "text": "func (vm *VM) SetConsole(w io.Writer) { panic(\"TODO\") }", "title": "" }, { "docid": "9685e89d02da94596f0e6872e63497c7", "score": "0.49090263", "text": "func (i *Incident) SetCurrent() error {\n\tstmt, err := db.Prepare(`UPDATE incidents SET current = true, updated_at = (NOW() AT TIME ZONE 'UTC') WHERE uuid = $1 AND current = false`)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer stmt.Close()\n\n\t_, err = stmt.Exec(i.UUID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ti.Current = true\n\n\treturn nil\n}", "title": "" }, { "docid": "ed97f2b29d6bff45632ebe9d45305d68", "score": "0.49018148", "text": "func (device *IndustrialAnalogOutV2Bricklet) SetCurrent(current uint16) (err error) {\n\tvar buf bytes.Buffer\n\tbinary.Write(&buf, binary.LittleEndian, current)\n\n\tresultBytes, err := device.device.Set(uint8(FunctionSetCurrent), buf.Bytes())\n\tif err != nil {\n\t\treturn err\n\t}\n\tif len(resultBytes) > 0 {\n\t\tvar header PacketHeader\n\n\t\theader.FillFromBytes(resultBytes)\n\n\t\tif header.Length != 8 {\n\t\t\treturn fmt.Errorf(\"Received packet of unexpected size %d, instead of %d\", header.Length, 8)\n\t\t}\n\n\t\tif header.ErrorCode != 0 {\n\t\t\treturn DeviceError(header.ErrorCode)\n\t\t}\n\n\t\tbytes.NewBuffer(resultBytes[8:])\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "89a8c68b58ec6dff6cb6317ca5248baf", "score": "0.4896051", "text": "func (c *Config) Set(env map[string]string) error {\n\targv := []string{\"-w\"}\n\targv = append(argv, flatenv(env)...)\n\n\t_, err := c.invokeGo(argv)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"env: write: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "eceac4b1196f38abc555651998d4cd26", "score": "0.48932227", "text": "func SetCtx(ctx context.Context, opt Opt) error {\n\terr := exec.CommandContext(ctx, Wg, opt.Args()...).Run()\n\tif err != nil {\n\t\terr = fmt.Errorf(\"set: %v\", err)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "a30bb1971c4b8b299c1021ce4c9fd778", "score": "0.48927334", "text": "func setInputMode(_ *gocui.Gui, _ *gocui.View) error {\n\tif c.GetMode() == stocking {\n\t\treturn nil\n\t}\n\tc.SetMode(stocking)\n\tupdatePromptSymbol()\n\tlogGui.Infof(\"Changed to %s Mode\", aur.Brown(\"Stocking\"))\n\tlogFile.WithField(\"mode\", stocking).Info(\"Changed Mode\")\n\treturn nil\n}", "title": "" }, { "docid": "92ee4767f8a7d3810854b16beb067a17", "score": "0.48903748", "text": "func (m Environ) Set(name string, v interface{}) {\n\tif m.Has(name) {\n\t\tpanic(\"double Environ: \" + name)\n\t} else {\n\t\tm[name] = v\n\t}\n}", "title": "" }, { "docid": "a606f586745d5dccdab5f944a0ae2b0b", "score": "0.48695344", "text": "func (p *Environment) Start(ctx context.Instance, scope lifecycle.Scope) error {\n\tp.scope = scope\n\tmesh := model.DefaultMeshConfig()\n\tp.Mesh = &mesh\n\treturn nil\n}", "title": "" }, { "docid": "8e2f34690360bde9221eba190a75620f", "score": "0.48566556", "text": "func Set() {\n\tcfg := config{}\n\tenv.Parse(&cfg)\n\tAppVersion = cfg.Version\n\tAppStage = cfg.AppStage\n\tLogLevel = cfg.LogLevel\n\tif location, err := time.LoadLocation(cfg.TimeZone); err == nil {\n\t\tTimeZone = location\n\t}\n\tMySQLConnection = cfg.MySQLConnection\n\n}", "title": "" }, { "docid": "3e94c52ef5da69e3beebbef1506f8740", "score": "0.48469687", "text": "func (s *EmailTemplateService) SetActive(req *appDTO.ETSetActiveReqDTO, i identity.Identity) (*appDTO.ETSetActiveResDTO, error) {\n\t// authorization\n\tif i.CanAccessCurrentRequest() == false {\n\t\terrMsg := fmt.Sprintf(\"You are not authorized to access [`%s.%s`]\",\n\t\t\ti.RequestInfo.RequestObject, i.RequestInfo.RequestAction)\n\t\treturn nil, sysError.CustomForbiddenAccess(errMsg)\n\t}\n\n\t// request domain\n\treqDom := domSchema.ETSetActiveRequest{\n\t\tKeys: &domSchema.ETSetActiveKeys{\n\t\t\tCode: req.Keys.Code,\n\t\t},\n\t\tData: &domSchema.ETSetActiveData{\n\t\t\tIsActive: req.Data.IsActive,\n\t\t},\n\t}\n\n\tif err := reqDom.Validate(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tres, err := s.repo.SetActive(&reqDom, i)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// response dto\n\tresDTO := new(appDTO.ETSetActiveResDTO)\n\tresDTO.Code = res.Code\n\tresDTO.IsActive = res.IsActive\n\n\treturn resDTO, nil\n}", "title": "" }, { "docid": "860c14a6bc8eadf33636da139e68aaac", "score": "0.4833214", "text": "func (k Keeper) setCurrentPrice(ctx sdk.Context, price types.CurrentPrice) {\n\tstore := ctx.KVStore(k.storeKey)\n\tpriceStore := prefix.NewStore(store, types.CurPricesPrefix)\n\tkey, _ := price.AssetCode.Marshal()\n\n\tbz := k.cdc.MustMarshalBinaryBare(&price)\n\tpriceStore.Set(key, bz)\n}", "title": "" }, { "docid": "fc69ae2d42f8397d5af4508f7c26f784", "score": "0.48242435", "text": "func SetEngine() (err error) {\n\tx, err = getEngine()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to connect to database: %v\", err)\n\t}\n\n\tx.ShowExecTime(true)\n\tx.SetMapper(core.GonicMapper{})\n\tx.SetMaxOpenConns(32)\n\tx.SetMaxIdleConns(8)\n\treturn nil\n}", "title": "" }, { "docid": "e366aa3d351659dc96208793b8835dc8", "score": "0.48105913", "text": "func Set(opt Opt) error {\n\treturn SetCtx(context.Background(), opt)\n}", "title": "" }, { "docid": "a88aafee3e1d7e6a246f02ed7237a654", "score": "0.48085308", "text": "func (this *Environment) Assign(name *Token, value interface{}) {\n\tif _, ok := this.values[name.Lexeme]; ok {\n\t\tthis.values[name.Lexeme] = value\n\t\treturn\n\t}\n\tif this.enclosing != nil {\n\t\tthis.enclosing.Assign(name, value)\n\t\treturn\n\t}\n\tpanic(NewRuntimeError(name, \"set undefined variable '\"+name.Lexeme+\"'.\"))\n}", "title": "" }, { "docid": "78d7e8327f02b33a9fb9f3f9035c1479", "score": "0.4796852", "text": "func SetTesting(filenames ...string) {\n\t// Overwrite the GoEnv variable, just to make sure we are in test mode\n\tEnv.GoEnv = \"test\"\n\tos.Setenv(\"GO_ENV\", Env.GoEnv)\n\tinitEnv(filenames...)\n\terr := json.Unmarshal([]byte(DefaultPlansJson), &Env.Plans)\n\tLogIfError(err, nil)\n\tEnv.DatabaseURL = Env.TestDatabaseURL\n\tEnv.StripeKey = Env.StripeKeyTest\n\trunInitializations()\n}", "title": "" }, { "docid": "4f843204d7473a704b24438e8d6cd928", "score": "0.4788508", "text": "func (e *Environment) Set(key, value string) {\n\te.Lock()\n\tdefer e.Unlock()\n\n\te.data[key] = value\n}", "title": "" }, { "docid": "3122c679efe05b49cc7c696824897d96", "score": "0.4781672", "text": "func (m *Mode) Set(str string) error {\n\t// Allow other casing from user in command line (e.g. Quick & quick)\n\tlcase := strings.ToLower(str)\n\tmode, ok := modeMap[lcase]\n\tif !ok {\n\t\treturn fmt.Errorf(\"unknown mode %s\", str)\n\t}\n\t*m = mode\n\treturn nil\n}", "title": "" }, { "docid": "43d93eacbf9f74ebfe097132a453ce72", "score": "0.4750558", "text": "func SetEngine() (err error) {\n\tx, err = getEngine()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to connect to database: %v\", err)\n\t}\n\n\tx.SetMapper(names.GonicMapper{})\n\t// WARNING: for serv command, MUST remove the output to os.stdout,\n\t// so use log file to instead print to stdout.\n\tx.SetLogger(NewXORMLogger(setting.Database.LogSQL))\n\tx.ShowSQL(setting.Database.LogSQL)\n\tx.SetMaxOpenConns(setting.Database.MaxOpenConns)\n\tx.SetMaxIdleConns(setting.Database.MaxIdleConns)\n\tx.SetConnMaxLifetime(setting.Database.ConnMaxLifetime)\n\treturn nil\n}", "title": "" }, { "docid": "a0865f42608d4fa1abf55fd7c7ef3974", "score": "0.4738019", "text": "func execCurrent(_ int, p *gop.Context) {\n\tret, ret1 := user.Current()\n\tp.Ret(0, ret, ret1)\n}", "title": "" }, { "docid": "7c48329e44617001c31e1ad1d73ea5f2", "score": "0.47354463", "text": "func (m *MockState) SetCurrentSupply(arg0 ids.ID, arg1 uint64) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SetCurrentSupply\", arg0, arg1)\n}", "title": "" }, { "docid": "de52859cf061bb1faf5dbb578a099317", "score": "0.47306544", "text": "func (p *Env) Set(name, v string) {\n\tp.Vars.Set(name, v)\n}", "title": "" }, { "docid": "6b691da8b39e01e29fc7ea374209916e", "score": "0.47263557", "text": "func Set(key, value string) error {\n\treturn os.Setenv(key, value)\n}", "title": "" }, { "docid": "492e75f5a22411020ab1db23a1b58ed5", "score": "0.47234228", "text": "func (this *Shader) SetCurrentTextureParameter(name string) {\n\tcname := C.CString(name)\n\tdefer C.free(unsafe.Pointer(cname))\n\n\tC.sfShader_setCurrentTextureParameter(this.toCPtr(), cname)\n}", "title": "" }, { "docid": "2f3f4ddba791123f8e56bf15e1e6cc2e", "score": "0.4722981", "text": "func (m *CloudAppSecurityProfile) SetPlatform(value *string)() {\n err := m.GetBackingStore().Set(\"platform\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "183b85aaf7b9a7e14a1cf961e7221390", "score": "0.47178388", "text": "func Set(c *cli.Context) {\n\tscopeName := c.String(\"scope\")\n\n\tscope, err := libsecrets.GetScope(scopeName)\n\tif err != nil {\n\t\tg.LogError(err)\n\t}\n\n\tkv := strings.SplitN(c.Args().First(), \"=\", 2)\n\tif len(kv) != 2 {\n\t\terr := fmt.Errorf(\"Please provide key and value for set command in the format key=value\")\n\t\tg.LogError(err)\n\t}\n\n\tscope.Set(kv[0], kv[1])\n\tscope.Save()\n}", "title": "" }, { "docid": "a3788da77fe2c570021f59d6c8c14bd7", "score": "0.47055468", "text": "func (this *App) Enable(name string) {\n\tthis.Env[name] = true\n}", "title": "" }, { "docid": "85debfb2b5b542ecfa1a1492d37c6b19", "score": "0.4700884", "text": "func (h *envHandler) Set(key string, value interface{}, args ...interface{}) error {\n\tif len(args) != 0 {\n\t\treturn cfg.ErrArgsNotSupported\n\t}\n\tsval, err := cfg.ToString(value)\n\tif err != nil {\n\t\treturn cfg.ErrBadType\n\t}\n\n\terr = os.Setenv(key, sval)\n\tif err != nil {\n\t\treturn cfg.ErrKeyNotSet\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "afa5bcef34faaae005d66c6aa96f29dd", "score": "0.46990356", "text": "func (r *Register) SetCurrentFile(s string) { r.file = s }", "title": "" }, { "docid": "32d6cf01e9ad9b55df24fafec8715f51", "score": "0.4694194", "text": "func (self Shader) SetCurrentTextureParameter(name string) {\n\tn := C.CString(name)\n\tC.sfShader_setCurrentTextureParameter(self.Cref, n)\n}", "title": "" }, { "docid": "f2cbac1d9718da73050db6a5c692d427", "score": "0.46917716", "text": "func (s *Server) SetEnv(ctx context.Context, req *dbdpb.SetEnvRequest) (*dbdpb.SetEnvResponse, error) {\n\tklog.InfoS(\"proxy/SetEnv\", \"req\", req)\n\toracleHome := req.GetOracleHome()\n\tcdbName := req.GetCdbName()\n\tspfile := req.GetSpfilePath()\n\tdefaultSpfile := filepath.Join(fmt.Sprintf(consts.ConfigDir, consts.DataMount, cdbName), fmt.Sprintf(\"spfile%s.ora\", cdbName))\n\n\t// move config files to default locations first\n\tif spfile != defaultSpfile {\n\t\tif err := provision.MoveFile(spfile, defaultSpfile); err != nil {\n\t\t\treturn &dbdpb.SetEnvResponse{}, fmt.Errorf(\"Proxy/SetEnv: failed to move spfile to default location: %v\", err)\n\t\t}\n\t}\n\n\tspfileLink := filepath.Join(oracleHome, \"dbs\", fmt.Sprintf(\"spfile%s.ora\", cdbName))\n\tif _, err := os.Stat(spfileLink); err == nil {\n\t\tos.Remove(spfileLink)\n\t}\n\tif err := os.Symlink(defaultSpfile, spfileLink); err != nil {\n\t\treturn &dbdpb.SetEnvResponse{}, fmt.Errorf(\"Proxy/SetEnv symlink creation failed for %s: %v\", defaultSpfile, err)\n\t}\n\treturn &dbdpb.SetEnvResponse{}, nil\n}", "title": "" }, { "docid": "70ecc222fee95fadf4857e05198975e9", "score": "0.46909714", "text": "func SetActive() {\n\tisActive := isUserActive()\n\n\tif isActive {\n\t\tfmt.Println(\"You are already active.\")\n\t\treturn\n\t}\n\n\tsetUserActive()\n}", "title": "" }, { "docid": "a38ca0fc5897535ad65988c339ed1777", "score": "0.4684891", "text": "func setEnv(cmd *exec.Cmd, envs map[string]string) {\n\tenv := os.Environ()\n\tcmd.Env = make([]string, 0, len(env)+len(envs))\nouter:\n\tfor _, e := range env {\n\t\tfor k := range envs {\n\t\t\tif strings.HasPrefix(e, k+\"=\") {\n\t\t\t\tcontinue outer\n\t\t\t}\n\t\t}\n\t\tcmd.Env = append(cmd.Env, e)\n\t}\n\tfor k, v := range envs {\n\t\tcmd.Env = append(cmd.Env, k+\"=\"+v)\n\t}\n}", "title": "" }, { "docid": "d2272f636a57ecd9e0eff42b602b8ed1", "score": "0.4680051", "text": "func (c *Context) SetCurrentUser() {\n\tif c.User != nil {\n\t\treturn\n\t}\n\n\tuser, _ := c.CurrentUser()\n\n\tc.User = user\n}", "title": "" }, { "docid": "538bb262142e7b58bafb2e7ba4b4d049", "score": "0.46769834", "text": "func SetEnvironments(environments []string) {\n\tprops := GetRCProperties()\n\tprops.Environments = environments\n\twriteRCProperties(props)\n}", "title": "" }, { "docid": "c21f1bccd56045159c3762cb8cad859c", "score": "0.46672222", "text": "func SetEnv(env string) {\n\tinstance.SetEnv(env)\n}", "title": "" }, { "docid": "1e164bf8e02022e77e40a093602a363d", "score": "0.46663773", "text": "func (_this *SVGSVGElement) SetCurrentScale(value float32) {\n\tinput := value\n\t_this.Value_JS.Set(\"currentScale\", input)\n}", "title": "" }, { "docid": "e94233e68e7b220b07928ce12b87a380", "score": "0.4664853", "text": "func SetStaging() {\n\tSet(STAGING)\n}", "title": "" }, { "docid": "2b0d90bdcb58489cc843c954cc394c2e", "score": "0.46337023", "text": "func (c *Context) Set(key string, value interface{}) {\n\tc.mu.Lock()\n\tdefer c.mu.Unlock()\n\tc.addon[key] = value\n}", "title": "" }, { "docid": "e5769f3f526ab76fd955a59ffb41d7be", "score": "0.46309322", "text": "func (s *Supervisor) Setenv(ctx context.Context, env []string, _ *struct{}) error {\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\ts.environ = env\n\treturn nil\n}", "title": "" }, { "docid": "c404418fed966eeff6c590f5db2fcff8", "score": "0.46303853", "text": "func (m *MockConnection) SetCurrentRemoteAddr(arg0 net.Addr) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SetCurrentRemoteAddr\", arg0)\n}", "title": "" }, { "docid": "df9bbde1928b528776d868a8ef7fa7d9", "score": "0.4629064", "text": "func setEnv(ctx context.Context, ds *appsv1.DaemonSet, varName, varValue string) {\n\tfor i := range ds.Spec.Template.Spec.Containers {\n\t\tsetContainerEnv(ctx, &ds.Spec.Template.Spec.Containers[i], varName, varValue)\n\t}\n}", "title": "" }, { "docid": "269372a251c734c291079797087cf386", "score": "0.46142098", "text": "func (t *Object) SetInitialFromCurrent() {\n\t// logger.Println( \"Object.SetInitialFromCurrent() BEGIN\" )\n\n\tt.copyCurrentToInitial()\n\n\tt.makeResults()\n\n\t// logger.Println( \"Object.SetInitialFromCurrent() END\" )\n}", "title": "" }, { "docid": "b6edbb18a7b7d4e18a1110d252c075aa", "score": "0.46141586", "text": "func Set(envKey ENVKey, value string) (err error) {\n\treturn os.Setenv(string(envKey), value)\n}", "title": "" }, { "docid": "140afe421bfe7a1c06df4cfa01fd612b", "score": "0.46088168", "text": "func SetEnvForCLI(orgName, connProfilePath, tls, currentDir string) error {\n\n\tvar tlsNetwork string\n\tmspID, err := GetMSPIDForOrg(connProfilePath, orgName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif tls == \"clientauth\" {\n\t\ttlsNetwork = \"true\"\n\t} else {\n\t\ttlsNetwork = \"false\"\n\t}\n\n\tos.Setenv(\"CORE_PEER_LOCALMSPID\", mspID)\n\tos.Setenv(\"CORE_PEER_TLS_ENABLED\", tlsNetwork)\n\tos.Setenv(\"CORE_PEER_MSPCONFIGPATH\", fmt.Sprintf(\"%s/crypto-config/peerOrganizations/%s/users/Admin@%s/msp\", currentDir, orgName, orgName))\n\tos.Setenv(\"CORE_PEER_TLS_ROOTCERT_FILE\", fmt.Sprintf(\"%s/crypto-config/peerOrganizations/%s/peers/peer0-%s.%s/tls/ca.crt\", currentDir, orgName, orgName, orgName))\n\treturn nil\n}", "title": "" }, { "docid": "68a06285f6a03fcaa26677ec7096a31c", "score": "0.46020496", "text": "func (e Environ) Set(key, value string) Environ {\n\te.save(key)\n\tset(key, value)\n\treturn e\n}", "title": "" }, { "docid": "d22be2f4bdf618478958b22f8ee67b08", "score": "0.4601528", "text": "func (s *ScriptSystem) SetGlobal(name string, value interface{}) {\n\ts.state.SetGlobal(name, luar.New(s.state, value))\n}", "title": "" }, { "docid": "a8bd350513aa312ec1ac39dc63fdd5a4", "score": "0.45999733", "text": "func (obj *Notebook) SetCurrentPage(pageNum int) {\n\tobj.Candy().Guify(\"gtk_notebook_set_current_page\", obj, pageNum)\n}", "title": "" }, { "docid": "9188af577b4cd75f9d7eef5fc04e37d8", "score": "0.45991594", "text": "func (s *SpanWrapper) SetEnvironment(env string) *SpanWrapper {\n\tfor _, ss := range s.spanList {\n\t\tss.SetEnvironment(env)\n\t}\n\treturn s\n}", "title": "" }, { "docid": "0c19b06bf259ea7c5052fe0dc72bb121", "score": "0.45964944", "text": "func (o *Options) SetupEnvironment() error {\n\t// Get current Azure details, subscription etc from CLI\n\tacct, err := azure.GetSubscription()\n\tcobra.CheckErr(err)\n\n\t// If they weren't set already, fall back to logged in account subscription\n\tif o.StateSubscription == \"\" {\n\t\to.StateSubscription = acct.ID\n\t}\n\tif o.TargetSubscription == \"\" {\n\t\to.TargetSubscription = acct.ID\n\t}\n\to.Subscription = *acct\n\n\tif o.LaunchPadMode {\n\t\tif o.TargetSubscription != o.StateSubscription {\n\t\t\treturn errors.New(\"in launchpad mode, state-sub and target-sub must be the same Azure subscription\")\n\t\t}\n\t}\n\n\t// Get the currently signed in identity regardless of type\n\to.Identity = getIdentity(*acct, o.TargetSubscription)\n\tconsole.Successf(\"Obtained identity successfully.\\nWe are signed in as: %s '%s' (%s)\\n\", o.Identity.ObjectType, o.Identity.DisplayName, o.Identity.ObjectID)\n\n\t// Slight hack for now, we set debug on when in dry-run mode\n\tif o.DryRun {\n\t\tconsole.DebugEnabled = true\n\t}\n\n\tif strings.EqualFold(o.Identity.ObjectType, \"servicePrincipal\") {\n\t\tos.Setenv(\"ARM_CLIENT_ID\", o.Identity.ClientID)\n\n\t\t// the AssignedIdentityInfo starts with \"MSI\" for both system assigned and user assigned\n\t\tif strings.HasPrefix(acct.User.AssignedIdentityInfo, \"MSI\") {\n\t\t\tos.Setenv(\"ARM_USE_MSI\", \"true\")\n\t\t} else {\n\t\t\t// Otherwise were using a old fashioned SP and we need the secret to be set outside of rover\n\t\t\tif os.Getenv(\"ARM_CLIENT_SECRET\") == \"\" && os.Getenv(\"ARM_CLIENT_CERTIFICATE_PATH\") == \"\" {\n\t\t\t\treturn errors.New(\"when signed in as service principal, you must set ARM_CLIENT_SECRET or ARM_CLIENT_CERTIFICATE_PATH\")\n\t\t\t}\n\t\t}\n\t}\n\n\tos.Setenv(\"TF_DATA_DIR\", o.DataDir)\n\tos.Setenv(\"TF_VAR_tfstate_key\", \"\")\n\tos.Setenv(\"ARM_SUBSCRIPTION_ID\", o.TargetSubscription)\n\tos.Setenv(\"ARM_TENANT_ID\", o.Subscription.TenantID)\n\tos.Setenv(\"TF_VAR_tfstate_subscription_id\", o.StateSubscription)\n\tos.Setenv(\"TF_VAR_tf_name\", fmt.Sprintf(\"%s.tfstate\", o.StateName))\n\tos.Setenv(\"TF_VAR_tf_plan\", fmt.Sprintf(\"%s.tfplan\", o.StateName))\n\tos.Setenv(\"TF_VAR_workspace\", o.Workspace)\n\tos.Setenv(\"TF_VAR_level\", o.Level)\n\tos.Setenv(\"TF_VAR_environment\", o.CafEnvironment)\n\tos.Setenv(\"TF_VAR_rover_version\", version.Value)\n\tos.Setenv(\"TF_VAR_tenant_id\", o.Subscription.TenantID)\n\tos.Setenv(\"TF_VAR_user_type\", o.Identity.ObjectType)\n\tos.Setenv(\"TF_VAR_logged_user_objectId\", o.Identity.ObjectID)\n\n\treturn nil\n}", "title": "" } ]
42db5082b85c094e8ffcd3c5a5685971
When sets expectation for the CommonAPIClient.VolumeInspect which will trigger the result defined by the following Then helper
[ { "docid": "32633a1e8310122b190116ca163493ae", "score": "0.70211565", "text": "func (mmVolumeInspect *mCommonAPIClientMockVolumeInspect) When(ctx context.Context, volumeID string) *CommonAPIClientMockVolumeInspectExpectation {\n\tif mmVolumeInspect.mock.funcVolumeInspect != nil {\n\t\tmmVolumeInspect.mock.t.Fatalf(\"CommonAPIClientMock.VolumeInspect mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockVolumeInspectExpectation{\n\t\tmock: mmVolumeInspect.mock,\n\t\tparams: &CommonAPIClientMockVolumeInspectParams{ctx, volumeID},\n\t}\n\tmmVolumeInspect.expectations = append(mmVolumeInspect.expectations, expectation)\n\treturn expectation\n}", "title": "" } ]
[ { "docid": "15ff056ff041446c7956c4a3246695d9", "score": "0.7341576", "text": "func (e *CommonAPIClientMockVolumeInspectWithRawExpectation) Then(v1 types.Volume, ba1 []byte, err error) *CommonAPIClientMock {\n\te.results = &CommonAPIClientMockVolumeInspectWithRawResults{v1, ba1, err}\n\treturn e.mock\n}", "title": "" }, { "docid": "9ee1c429e41e71d7e51a8df09ebcf7bc", "score": "0.7209102", "text": "func (e *CommonAPIClientMockVolumeInspectExpectation) Then(v1 types.Volume, err error) *CommonAPIClientMock {\n\te.results = &CommonAPIClientMockVolumeInspectResults{v1, err}\n\treturn e.mock\n}", "title": "" }, { "docid": "c5eee9786ef63921902e9d8191fa0ecd", "score": "0.72056615", "text": "func (m *CommonAPIClientMock) MinimockVolumeInspectInspect() {\n\tfor _, e := range m.VolumeInspectMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.VolumeInspect with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.VolumeInspectMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterVolumeInspectCounter) < 1 {\n\t\tif m.VolumeInspectMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.VolumeInspect\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.VolumeInspect with params: %#v\", *m.VolumeInspectMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcVolumeInspect != nil && mm_atomic.LoadUint64(&m.afterVolumeInspectCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.VolumeInspect\")\n\t}\n}", "title": "" }, { "docid": "7923e1dc91dc203fee21389e062e9477", "score": "0.7163777", "text": "func (mmVolumeInspectWithRaw *mCommonAPIClientMockVolumeInspectWithRaw) When(ctx context.Context, volumeID string) *CommonAPIClientMockVolumeInspectWithRawExpectation {\n\tif mmVolumeInspectWithRaw.mock.funcVolumeInspectWithRaw != nil {\n\t\tmmVolumeInspectWithRaw.mock.t.Fatalf(\"CommonAPIClientMock.VolumeInspectWithRaw mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockVolumeInspectWithRawExpectation{\n\t\tmock: mmVolumeInspectWithRaw.mock,\n\t\tparams: &CommonAPIClientMockVolumeInspectWithRawParams{ctx, volumeID},\n\t}\n\tmmVolumeInspectWithRaw.expectations = append(mmVolumeInspectWithRaw.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "ce61b1e56ea2b880bae79468eb0f8aac", "score": "0.6857866", "text": "func (m *CommonAPIClientMock) MinimockVolumeCreateInspect() {\n\tfor _, e := range m.VolumeCreateMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.VolumeCreate with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.VolumeCreateMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterVolumeCreateCounter) < 1 {\n\t\tif m.VolumeCreateMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.VolumeCreate\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.VolumeCreate with params: %#v\", *m.VolumeCreateMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcVolumeCreate != nil && mm_atomic.LoadUint64(&m.afterVolumeCreateCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.VolumeCreate\")\n\t}\n}", "title": "" }, { "docid": "c291271021c9dccea5485630f1e251a0", "score": "0.68322635", "text": "func (m *CommonAPIClientMock) MinimockVolumeInspectWithRawInspect() {\n\tfor _, e := range m.VolumeInspectWithRawMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.VolumeInspectWithRaw with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.VolumeInspectWithRawMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterVolumeInspectWithRawCounter) < 1 {\n\t\tif m.VolumeInspectWithRawMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.VolumeInspectWithRaw\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.VolumeInspectWithRaw with params: %#v\", *m.VolumeInspectWithRawMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcVolumeInspectWithRaw != nil && mm_atomic.LoadUint64(&m.afterVolumeInspectWithRawCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.VolumeInspectWithRaw\")\n\t}\n}", "title": "" }, { "docid": "81c128dc61fe9b994d1c612111b30a4d", "score": "0.6819983", "text": "func (m *CommonAPIClientMock) MinimockVolumeListInspect() {\n\tfor _, e := range m.VolumeListMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.VolumeList with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.VolumeListMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterVolumeListCounter) < 1 {\n\t\tif m.VolumeListMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.VolumeList\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.VolumeList with params: %#v\", *m.VolumeListMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcVolumeList != nil && mm_atomic.LoadUint64(&m.afterVolumeListCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.VolumeList\")\n\t}\n}", "title": "" }, { "docid": "f0f54bccd232cfa1076088cc003de965", "score": "0.6735571", "text": "func (mmVolumeInspectWithRaw *mCommonAPIClientMockVolumeInspectWithRaw) Inspect(f func(ctx context.Context, volumeID string)) *mCommonAPIClientMockVolumeInspectWithRaw {\n\tif mmVolumeInspectWithRaw.mock.inspectFuncVolumeInspectWithRaw != nil {\n\t\tmmVolumeInspectWithRaw.mock.t.Fatalf(\"Inspect function is already set for CommonAPIClientMock.VolumeInspectWithRaw\")\n\t}\n\n\tmmVolumeInspectWithRaw.mock.inspectFuncVolumeInspectWithRaw = f\n\n\treturn mmVolumeInspectWithRaw\n}", "title": "" }, { "docid": "9f6d438f9185fc33d354091515d280f5", "score": "0.67136", "text": "func (mmVolumeInspectWithRaw *mCommonAPIClientMockVolumeInspectWithRaw) Set(f func(ctx context.Context, volumeID string) (v1 types.Volume, ba1 []byte, err error)) *CommonAPIClientMock {\n\tif mmVolumeInspectWithRaw.defaultExpectation != nil {\n\t\tmmVolumeInspectWithRaw.mock.t.Fatalf(\"Default expectation is already set for the CommonAPIClient.VolumeInspectWithRaw method\")\n\t}\n\n\tif len(mmVolumeInspectWithRaw.expectations) > 0 {\n\t\tmmVolumeInspectWithRaw.mock.t.Fatalf(\"Some expectations are already set for the CommonAPIClient.VolumeInspectWithRaw method\")\n\t}\n\n\tmmVolumeInspectWithRaw.mock.funcVolumeInspectWithRaw = f\n\treturn mmVolumeInspectWithRaw.mock\n}", "title": "" }, { "docid": "9814e93068e638cbdfb6fb0b90a73c90", "score": "0.67109084", "text": "func (a *Client) VolumeInspect(params *VolumeInspectParams) (*VolumeInspectOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewVolumeInspectParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"VolumeInspect\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/volumes/{name}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\", \"text/plain\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &VolumeInspectReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*VolumeInspectOK), nil\n\n}", "title": "" }, { "docid": "6093eecc43a4b1ed46aae6cb906ad97b", "score": "0.66650176", "text": "func (m *MockClient) VolumeInspect(arg0 context.Context, arg1 string) (types.Volume, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"VolumeInspect\", arg0, arg1)\n\tret0, _ := ret[0].(types.Volume)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "42664c25fade6d39228e7fbb9148955b", "score": "0.66605735", "text": "func (mmVolumeCreate *mCommonAPIClientMockVolumeCreate) Inspect(f func(ctx context.Context, options volumetypes.VolumeCreateBody)) *mCommonAPIClientMockVolumeCreate {\n\tif mmVolumeCreate.mock.inspectFuncVolumeCreate != nil {\n\t\tmmVolumeCreate.mock.t.Fatalf(\"Inspect function is already set for CommonAPIClientMock.VolumeCreate\")\n\t}\n\n\tmmVolumeCreate.mock.inspectFuncVolumeCreate = f\n\n\treturn mmVolumeCreate\n}", "title": "" }, { "docid": "182069938de389a2bc9a58073f139d65", "score": "0.66376585", "text": "func (mmVolumeInspect *mCommonAPIClientMockVolumeInspect) Inspect(f func(ctx context.Context, volumeID string)) *mCommonAPIClientMockVolumeInspect {\n\tif mmVolumeInspect.mock.inspectFuncVolumeInspect != nil {\n\t\tmmVolumeInspect.mock.t.Fatalf(\"Inspect function is already set for CommonAPIClientMock.VolumeInspect\")\n\t}\n\n\tmmVolumeInspect.mock.inspectFuncVolumeInspect = f\n\n\treturn mmVolumeInspect\n}", "title": "" }, { "docid": "18e247c36133ca53bca9c5b1c02c020c", "score": "0.6605963", "text": "func (mmVolumeInspect *mCommonAPIClientMockVolumeInspect) Set(f func(ctx context.Context, volumeID string) (v1 types.Volume, err error)) *CommonAPIClientMock {\n\tif mmVolumeInspect.defaultExpectation != nil {\n\t\tmmVolumeInspect.mock.t.Fatalf(\"Default expectation is already set for the CommonAPIClient.VolumeInspect method\")\n\t}\n\n\tif len(mmVolumeInspect.expectations) > 0 {\n\t\tmmVolumeInspect.mock.t.Fatalf(\"Some expectations are already set for the CommonAPIClient.VolumeInspect method\")\n\t}\n\n\tmmVolumeInspect.mock.funcVolumeInspect = f\n\treturn mmVolumeInspect.mock\n}", "title": "" }, { "docid": "1fa3a380a09adecbef7ca3c6b882d2c7", "score": "0.6580041", "text": "func (mmVolumeInspectWithRaw *mCommonAPIClientMockVolumeInspectWithRaw) Expect(ctx context.Context, volumeID string) *mCommonAPIClientMockVolumeInspectWithRaw {\n\tif mmVolumeInspectWithRaw.mock.funcVolumeInspectWithRaw != nil {\n\t\tmmVolumeInspectWithRaw.mock.t.Fatalf(\"CommonAPIClientMock.VolumeInspectWithRaw mock is already set by Set\")\n\t}\n\n\tif mmVolumeInspectWithRaw.defaultExpectation == nil {\n\t\tmmVolumeInspectWithRaw.defaultExpectation = &CommonAPIClientMockVolumeInspectWithRawExpectation{}\n\t}\n\n\tmmVolumeInspectWithRaw.defaultExpectation.params = &CommonAPIClientMockVolumeInspectWithRawParams{ctx, volumeID}\n\tfor _, e := range mmVolumeInspectWithRaw.expectations {\n\t\tif minimock.Equal(e.params, mmVolumeInspectWithRaw.defaultExpectation.params) {\n\t\t\tmmVolumeInspectWithRaw.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmVolumeInspectWithRaw.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmVolumeInspectWithRaw\n}", "title": "" }, { "docid": "9b4cf938649a09259ab9d821f91ea7f2", "score": "0.6570381", "text": "func (mmVolumeInspect *mCommonAPIClientMockVolumeInspect) Expect(ctx context.Context, volumeID string) *mCommonAPIClientMockVolumeInspect {\n\tif mmVolumeInspect.mock.funcVolumeInspect != nil {\n\t\tmmVolumeInspect.mock.t.Fatalf(\"CommonAPIClientMock.VolumeInspect mock is already set by Set\")\n\t}\n\n\tif mmVolumeInspect.defaultExpectation == nil {\n\t\tmmVolumeInspect.defaultExpectation = &CommonAPIClientMockVolumeInspectExpectation{}\n\t}\n\n\tmmVolumeInspect.defaultExpectation.params = &CommonAPIClientMockVolumeInspectParams{ctx, volumeID}\n\tfor _, e := range mmVolumeInspect.expectations {\n\t\tif minimock.Equal(e.params, mmVolumeInspect.defaultExpectation.params) {\n\t\t\tmmVolumeInspect.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmVolumeInspect.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmVolumeInspect\n}", "title": "" }, { "docid": "aede738a247056998239530e8fb5513d", "score": "0.6546241", "text": "func (mmVolumeList *mCommonAPIClientMockVolumeList) When(ctx context.Context, filter filters.Args) *CommonAPIClientMockVolumeListExpectation {\n\tif mmVolumeList.mock.funcVolumeList != nil {\n\t\tmmVolumeList.mock.t.Fatalf(\"CommonAPIClientMock.VolumeList mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockVolumeListExpectation{\n\t\tmock: mmVolumeList.mock,\n\t\tparams: &CommonAPIClientMockVolumeListParams{ctx, filter},\n\t}\n\tmmVolumeList.expectations = append(mmVolumeList.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "4deec6c2a25b593f4a054c2b2deb3b47", "score": "0.6417468", "text": "func (mmVolumeList *mCommonAPIClientMockVolumeList) Inspect(f func(ctx context.Context, filter filters.Args)) *mCommonAPIClientMockVolumeList {\n\tif mmVolumeList.mock.inspectFuncVolumeList != nil {\n\t\tmmVolumeList.mock.t.Fatalf(\"Inspect function is already set for CommonAPIClientMock.VolumeList\")\n\t}\n\n\tmmVolumeList.mock.inspectFuncVolumeList = f\n\n\treturn mmVolumeList\n}", "title": "" }, { "docid": "9c9631f4ddda60ff489272cc1796887e", "score": "0.6402335", "text": "func (transport *Transport) volumeInspectOperation(response *http.Response, executor *operationExecutor) error {\n\t// VolumeInspect response is a JSON object\n\t// https://docs.docker.com/engine/api/v1.28/#operation/VolumeInspect\n\tresponseObject, err := responseutils.GetResponseAsJSONOBject(response)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif responseObject[\"Name\"] == nil || responseObject[\"CreatedAt\"] == nil {\n\t\treturn errors.New(\"missing identifier in Docker resource detail response\")\n\t}\n\tresponseObject[volumeObjectIdentifier] = responseObject[\"Name\"].(string) + responseObject[\"CreatedAt\"].(string)\n\n\tresourceOperationParameters := &resourceOperationParameters{\n\t\tresourceIdentifierAttribute: volumeObjectIdentifier,\n\t\tresourceType: portainer.VolumeResourceControl,\n\t\tlabelsObjectSelector: selectorVolumeLabels,\n\t}\n\n\treturn transport.applyAccessControlOnResource(resourceOperationParameters, responseObject, response, executor)\n}", "title": "" }, { "docid": "71be880c41a8ca567bb1c5b6d6e4eb35", "score": "0.63940156", "text": "func (m *CommonAPIClientMock) MinimockVolumeRemoveInspect() {\n\tfor _, e := range m.VolumeRemoveMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.VolumeRemove with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.VolumeRemoveMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterVolumeRemoveCounter) < 1 {\n\t\tif m.VolumeRemoveMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.VolumeRemove\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.VolumeRemove with params: %#v\", *m.VolumeRemoveMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcVolumeRemove != nil && mm_atomic.LoadUint64(&m.afterVolumeRemoveCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.VolumeRemove\")\n\t}\n}", "title": "" }, { "docid": "b0abb1287ae60daaa6e7aebf72b0a589", "score": "0.639165", "text": "func (mmVolumeInspect *mCommonAPIClientMockVolumeInspect) Return(v1 types.Volume, err error) *CommonAPIClientMock {\n\tif mmVolumeInspect.mock.funcVolumeInspect != nil {\n\t\tmmVolumeInspect.mock.t.Fatalf(\"CommonAPIClientMock.VolumeInspect mock is already set by Set\")\n\t}\n\n\tif mmVolumeInspect.defaultExpectation == nil {\n\t\tmmVolumeInspect.defaultExpectation = &CommonAPIClientMockVolumeInspectExpectation{mock: mmVolumeInspect.mock}\n\t}\n\tmmVolumeInspect.defaultExpectation.results = &CommonAPIClientMockVolumeInspectResults{v1, err}\n\treturn mmVolumeInspect.mock\n}", "title": "" }, { "docid": "9f2cf173814f171754c2c0b464bb1eba", "score": "0.63695264", "text": "func (mmVolumeRemove *mCommonAPIClientMockVolumeRemove) Inspect(f func(ctx context.Context, volumeID string, force bool)) *mCommonAPIClientMockVolumeRemove {\n\tif mmVolumeRemove.mock.inspectFuncVolumeRemove != nil {\n\t\tmmVolumeRemove.mock.t.Fatalf(\"Inspect function is already set for CommonAPIClientMock.VolumeRemove\")\n\t}\n\n\tmmVolumeRemove.mock.inspectFuncVolumeRemove = f\n\n\treturn mmVolumeRemove\n}", "title": "" }, { "docid": "6913bc489dd5639ae744d5cf7ba192a1", "score": "0.63070226", "text": "func (mmVolumeInspectWithRaw *mCommonAPIClientMockVolumeInspectWithRaw) Return(v1 types.Volume, ba1 []byte, err error) *CommonAPIClientMock {\n\tif mmVolumeInspectWithRaw.mock.funcVolumeInspectWithRaw != nil {\n\t\tmmVolumeInspectWithRaw.mock.t.Fatalf(\"CommonAPIClientMock.VolumeInspectWithRaw mock is already set by Set\")\n\t}\n\n\tif mmVolumeInspectWithRaw.defaultExpectation == nil {\n\t\tmmVolumeInspectWithRaw.defaultExpectation = &CommonAPIClientMockVolumeInspectWithRawExpectation{mock: mmVolumeInspectWithRaw.mock}\n\t}\n\tmmVolumeInspectWithRaw.defaultExpectation.results = &CommonAPIClientMockVolumeInspectWithRawResults{v1, ba1, err}\n\treturn mmVolumeInspectWithRaw.mock\n}", "title": "" }, { "docid": "abc874314d3d9a53aba8bf9a54489410", "score": "0.6291432", "text": "func (cli *Client) VolumeInspect(ctx context.Context, volumeID string) (volume.Volume, error) {\n\tvol, _, err := cli.VolumeInspectWithRaw(ctx, volumeID)\n\treturn vol, err\n}", "title": "" }, { "docid": "67a3f753a75c809bbb838fdd96e585f3", "score": "0.6217793", "text": "func (mmVolumeList *mCommonAPIClientMockVolumeList) Expect(ctx context.Context, filter filters.Args) *mCommonAPIClientMockVolumeList {\n\tif mmVolumeList.mock.funcVolumeList != nil {\n\t\tmmVolumeList.mock.t.Fatalf(\"CommonAPIClientMock.VolumeList mock is already set by Set\")\n\t}\n\n\tif mmVolumeList.defaultExpectation == nil {\n\t\tmmVolumeList.defaultExpectation = &CommonAPIClientMockVolumeListExpectation{}\n\t}\n\n\tmmVolumeList.defaultExpectation.params = &CommonAPIClientMockVolumeListParams{ctx, filter}\n\tfor _, e := range mmVolumeList.expectations {\n\t\tif minimock.Equal(e.params, mmVolumeList.defaultExpectation.params) {\n\t\t\tmmVolumeList.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmVolumeList.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmVolumeList\n}", "title": "" }, { "docid": "d385c4c92e6810c5122f250ce07bd2ff", "score": "0.6179594", "text": "func (e *CommonAPIClientMockVolumeListExpectation) Then(v1 volumetypes.VolumeListOKBody, err error) *CommonAPIClientMock {\n\te.results = &CommonAPIClientMockVolumeListResults{v1, err}\n\treturn e.mock\n}", "title": "" }, { "docid": "7f939d7f88cb22fb06b9abe0506f4b42", "score": "0.6159883", "text": "func (d *driver) VolumeInspect(\n\tctx types.Context,\n\tvolumeID string,\n\topts *types.VolumeInspectOpts) (*types.Volume, error) {\n\n\tif volumeID == \"\" {\n\t\treturn nil, ErrMissingVolID\n\t}\n\n\tfileSystemName := volumeID\n\n\tvolume := &types.Volume{\n\t\tName: fileSystemName,\n\t\tID: fileSystemName,\n\t\tAttachments: nil,\n\t}\n\n\tif opts.Attachments {\n\t\tvar atts []*types.VolumeAttachment\n\t\tatts, err := d.getVolumeAttachments(ctx, fileSystemName)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvolume.Attachments = atts\n\t}\n\treturn volume, nil\n}", "title": "" }, { "docid": "75c37bae8fda23ece67cbb19773a8cff", "score": "0.61371636", "text": "func (d *DockerRunner) InspectVolume(volumeName string) []map[string]interface{} {\n\n\tfmt.Fprintf(GinkgoWriter, \"Inspecting volume %s\", volumeName)\n\toutput := CmdShouldPass(d.path, \"inspect\", volumeName)\n\n\tvar result []map[string]interface{}\n\terr := json.Unmarshal([]byte(output), &result)\n\tExpect(err).NotTo(HaveOccurred())\n\n\treturn result\n}", "title": "" }, { "docid": "2a6ca7ae2cbb3e2e774f6a7c865557f1", "score": "0.61300665", "text": "func (m *CommonAPIClientMock) MinimockVolumeInspectWithRawDone() bool {\n\tfor _, e := range m.VolumeInspectWithRawMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\treturn false\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.VolumeInspectWithRawMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterVolumeInspectWithRawCounter) < 1 {\n\t\treturn false\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcVolumeInspectWithRaw != nil && mm_atomic.LoadUint64(&m.afterVolumeInspectWithRawCounter) < 1 {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "afec54b96fd2b46860620cb8c06a712a", "score": "0.6097994", "text": "func (e *CommonAPIClientMockVolumeCreateExpectation) Then(v1 types.Volume, err error) *CommonAPIClientMock {\n\te.results = &CommonAPIClientMockVolumeCreateResults{v1, err}\n\treturn e.mock\n}", "title": "" }, { "docid": "a06bc091e3cd99b99559d47c22428b67", "score": "0.60957175", "text": "func (m *CommonAPIClientMock) MinimockVolumeInspectDone() bool {\n\tfor _, e := range m.VolumeInspectMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\treturn false\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.VolumeInspectMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterVolumeInspectCounter) < 1 {\n\t\treturn false\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcVolumeInspect != nil && mm_atomic.LoadUint64(&m.afterVolumeInspectCounter) < 1 {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "433306bf1e3665780ca11390bcf7706e", "score": "0.60641503", "text": "func (e *Engine) InspectVolume(ctx context.Context, name string) (types.Volume, error) {\n\tctx, cancel := context.WithTimeout(ctx, 15*time.Second)\n\tdefer cancel()\n\n\treturn e.api.VolumeInspect(ctx, name)\n}", "title": "" }, { "docid": "da2f01024372fb9d07463aade9f24db4", "score": "0.60534245", "text": "func (mmVolumeCreate *mCommonAPIClientMockVolumeCreate) When(ctx context.Context, options volumetypes.VolumeCreateBody) *CommonAPIClientMockVolumeCreateExpectation {\n\tif mmVolumeCreate.mock.funcVolumeCreate != nil {\n\t\tmmVolumeCreate.mock.t.Fatalf(\"CommonAPIClientMock.VolumeCreate mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockVolumeCreateExpectation{\n\t\tmock: mmVolumeCreate.mock,\n\t\tparams: &CommonAPIClientMockVolumeCreateParams{ctx, options},\n\t}\n\tmmVolumeCreate.expectations = append(mmVolumeCreate.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "5216071f896e760ce6584ff10bd7c3e7", "score": "0.60420406", "text": "func (mmVolumeCreate *mCommonAPIClientMockVolumeCreate) Expect(ctx context.Context, options volumetypes.VolumeCreateBody) *mCommonAPIClientMockVolumeCreate {\n\tif mmVolumeCreate.mock.funcVolumeCreate != nil {\n\t\tmmVolumeCreate.mock.t.Fatalf(\"CommonAPIClientMock.VolumeCreate mock is already set by Set\")\n\t}\n\n\tif mmVolumeCreate.defaultExpectation == nil {\n\t\tmmVolumeCreate.defaultExpectation = &CommonAPIClientMockVolumeCreateExpectation{}\n\t}\n\n\tmmVolumeCreate.defaultExpectation.params = &CommonAPIClientMockVolumeCreateParams{ctx, options}\n\tfor _, e := range mmVolumeCreate.expectations {\n\t\tif minimock.Equal(e.params, mmVolumeCreate.defaultExpectation.params) {\n\t\t\tmmVolumeCreate.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmVolumeCreate.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmVolumeCreate\n}", "title": "" }, { "docid": "2c2622be07a8e526538f4d5ba898c777", "score": "0.59846574", "text": "func verifyVolPropertiesFromCnsQueryResults(e2eVSphere vSphere, volHandle string) {\n\n\tginkgo.By(fmt.Sprintf(\"Invoking QueryCNSVolumeWithResult with VolumeID: %s\", volHandle))\n\tqueryResult, err := e2eVSphere.queryCNSVolumeWithResult(volHandle)\n\tgomega.Expect(err).NotTo(gomega.HaveOccurred())\n\tgomega.Expect(queryResult.Volumes).ShouldNot(gomega.BeEmpty())\n\tginkgo.By(fmt.Sprintf(\"volume Name:%s , capacity:%d volumeType:%s health:%s accesspoint: %s\",\n\t\tqueryResult.Volumes[0].Name,\n\t\tqueryResult.Volumes[0].BackingObjectDetails.(*cnstypes.CnsVsanFileShareBackingDetails).CapacityInMb,\n\t\tqueryResult.Volumes[0].VolumeType, queryResult.Volumes[0].HealthStatus,\n\t\tqueryResult.Volumes[0].BackingObjectDetails.(*cnstypes.CnsVsanFileShareBackingDetails).AccessPoints))\n\n\t//Verifying disk size specified in PVC is honored\n\tginkgo.By(\"Verifying disk size specified in PVC is honored\")\n\tgomega.Expect(queryResult.Volumes[0].BackingObjectDetails.(*cnstypes.CnsVsanFileShareBackingDetails).\n\t\tCapacityInMb == diskSizeInMb).To(gomega.BeTrue(), \"wrong disk size provisioned\")\n\n\t//Verifying volume type specified in PVC is honored\n\tginkgo.By(\"Verifying volume type specified in PVC is honored\")\n\tgomega.Expect(queryResult.Volumes[0].VolumeType == testVolumeType).To(gomega.BeTrue(), \"volume type is not FILE\")\n\n\t// Verify if VolumeID is created on the VSAN datastores\n\tginkgo.By(\"Verify if VolumeID is created on the VSAN datastores\")\n\tgomega.Expect(strings.HasPrefix(queryResult.Volumes[0].DatastoreUrl, \"ds:///vmfs/volumes/vsan:\")).\n\t\tTo(gomega.BeTrue(), \"Volume is not provisioned on vSan datastore\")\n\n\t// Verify if VolumeID is created on the datastore from list of datacenters provided in vsphere.conf\n\tginkgo.By(\"Verify if VolumeID is created on the datastore from list of datacenters provided in vsphere.conf\")\n\tgomega.Expect(isDatastoreBelongsToDatacenterSpecifiedInConfig(queryResult.Volumes[0].DatastoreUrl)).\n\t\tTo(gomega.BeTrue(), \"Volume is not provisioned on the datastore specified on config file\")\n\n}", "title": "" }, { "docid": "a5d3b405fef580de302022454bf09940", "score": "0.59147", "text": "func (mmContainerInspectWithRaw *mCommonAPIClientMockContainerInspectWithRaw) When(ctx context.Context, container string, getSize bool) *CommonAPIClientMockContainerInspectWithRawExpectation {\n\tif mmContainerInspectWithRaw.mock.funcContainerInspectWithRaw != nil {\n\t\tmmContainerInspectWithRaw.mock.t.Fatalf(\"CommonAPIClientMock.ContainerInspectWithRaw mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockContainerInspectWithRawExpectation{\n\t\tmock: mmContainerInspectWithRaw.mock,\n\t\tparams: &CommonAPIClientMockContainerInspectWithRawParams{ctx, container, getSize},\n\t}\n\tmmContainerInspectWithRaw.expectations = append(mmContainerInspectWithRaw.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "8c0d96969b9aa7b9d4f4a5686b324af7", "score": "0.58628863", "text": "func (mmVolumeList *mCommonAPIClientMockVolumeList) Set(f func(ctx context.Context, filter filters.Args) (v1 volumetypes.VolumeListOKBody, err error)) *CommonAPIClientMock {\n\tif mmVolumeList.defaultExpectation != nil {\n\t\tmmVolumeList.mock.t.Fatalf(\"Default expectation is already set for the CommonAPIClient.VolumeList method\")\n\t}\n\n\tif len(mmVolumeList.expectations) > 0 {\n\t\tmmVolumeList.mock.t.Fatalf(\"Some expectations are already set for the CommonAPIClient.VolumeList method\")\n\t}\n\n\tmmVolumeList.mock.funcVolumeList = f\n\treturn mmVolumeList.mock\n}", "title": "" }, { "docid": "f3491ebc50bbf9cc12f41d5efcc27246", "score": "0.58528394", "text": "func (mmVolumeRemove *mCommonAPIClientMockVolumeRemove) When(ctx context.Context, volumeID string, force bool) *CommonAPIClientMockVolumeRemoveExpectation {\n\tif mmVolumeRemove.mock.funcVolumeRemove != nil {\n\t\tmmVolumeRemove.mock.t.Fatalf(\"CommonAPIClientMock.VolumeRemove mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockVolumeRemoveExpectation{\n\t\tmock: mmVolumeRemove.mock,\n\t\tparams: &CommonAPIClientMockVolumeRemoveParams{ctx, volumeID, force},\n\t}\n\tmmVolumeRemove.expectations = append(mmVolumeRemove.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "2967ee5e1f78db6d3b88afb422144eab", "score": "0.5800503", "text": "func (mr *MockClientMockRecorder) VolumeInspect(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"VolumeInspect\", reflect.TypeOf((*MockClient)(nil).VolumeInspect), arg0, arg1)\n}", "title": "" }, { "docid": "a45f30873f0bb8ee2d80480a8142427c", "score": "0.57865906", "text": "func (mmVolumeCreate *mCommonAPIClientMockVolumeCreate) Set(f func(ctx context.Context, options volumetypes.VolumeCreateBody) (v1 types.Volume, err error)) *CommonAPIClientMock {\n\tif mmVolumeCreate.defaultExpectation != nil {\n\t\tmmVolumeCreate.mock.t.Fatalf(\"Default expectation is already set for the CommonAPIClient.VolumeCreate method\")\n\t}\n\n\tif len(mmVolumeCreate.expectations) > 0 {\n\t\tmmVolumeCreate.mock.t.Fatalf(\"Some expectations are already set for the CommonAPIClient.VolumeCreate method\")\n\t}\n\n\tmmVolumeCreate.mock.funcVolumeCreate = f\n\treturn mmVolumeCreate.mock\n}", "title": "" }, { "docid": "5c75533045c6d132fcd52fe008650c4d", "score": "0.574393", "text": "func (mmVolumeRemove *mCommonAPIClientMockVolumeRemove) Expect(ctx context.Context, volumeID string, force bool) *mCommonAPIClientMockVolumeRemove {\n\tif mmVolumeRemove.mock.funcVolumeRemove != nil {\n\t\tmmVolumeRemove.mock.t.Fatalf(\"CommonAPIClientMock.VolumeRemove mock is already set by Set\")\n\t}\n\n\tif mmVolumeRemove.defaultExpectation == nil {\n\t\tmmVolumeRemove.defaultExpectation = &CommonAPIClientMockVolumeRemoveExpectation{}\n\t}\n\n\tmmVolumeRemove.defaultExpectation.params = &CommonAPIClientMockVolumeRemoveParams{ctx, volumeID, force}\n\tfor _, e := range mmVolumeRemove.expectations {\n\t\tif minimock.Equal(e.params, mmVolumeRemove.defaultExpectation.params) {\n\t\t\tmmVolumeRemove.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmVolumeRemove.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmVolumeRemove\n}", "title": "" }, { "docid": "118233b512242cdcf3c155be377a2535", "score": "0.5653337", "text": "func (*SdkVolumeInspectResponse) Descriptor() ([]byte, []int) {\n\treturn file_api_api_proto_rawDescGZIP(), []int{158}\n}", "title": "" }, { "docid": "cac5602a3f6ea6dafc9094601464d527", "score": "0.56157976", "text": "func (m *CommonAPIClientMock) MinimockVolumesPruneInspect() {\n\tfor _, e := range m.VolumesPruneMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.VolumesPrune with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.VolumesPruneMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterVolumesPruneCounter) < 1 {\n\t\tif m.VolumesPruneMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.VolumesPrune\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.VolumesPrune with params: %#v\", *m.VolumesPruneMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcVolumesPrune != nil && mm_atomic.LoadUint64(&m.afterVolumesPruneCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.VolumesPrune\")\n\t}\n}", "title": "" }, { "docid": "9278c4ec46712d7cca87b40b52266384", "score": "0.5594036", "text": "func (mmVolumeCreate *mCommonAPIClientMockVolumeCreate) Return(v1 types.Volume, err error) *CommonAPIClientMock {\n\tif mmVolumeCreate.mock.funcVolumeCreate != nil {\n\t\tmmVolumeCreate.mock.t.Fatalf(\"CommonAPIClientMock.VolumeCreate mock is already set by Set\")\n\t}\n\n\tif mmVolumeCreate.defaultExpectation == nil {\n\t\tmmVolumeCreate.defaultExpectation = &CommonAPIClientMockVolumeCreateExpectation{mock: mmVolumeCreate.mock}\n\t}\n\tmmVolumeCreate.defaultExpectation.results = &CommonAPIClientMockVolumeCreateResults{v1, err}\n\treturn mmVolumeCreate.mock\n}", "title": "" }, { "docid": "533a1e9aac3401c0a6db338623fa912c", "score": "0.55420375", "text": "func TestReadStorageReturnsOk(t *testing.T) {\n\tmockedO := &okReadStorageK8sOrch{\n\t\tk8sOrchestrator: k8sOrchestrator{\n\t\t\tk8sUtlGtr: &okReadStorageK8sOrch{},\n\t\t},\n\t}\n\n\tvolProfile := &okCtrlImgVolumeProfile{}\n\n\tpvl, err := mockedO.ReadStorage(volProfile)\n\n\tif err != nil {\n\t\tt.Errorf(\"TestCase: Nil Error Match \\n\\tExpectedErr: 'nil' \\n\\tActualErr: '%s'\", err.Error())\n\t}\n\n\t// Verify the pvl items\n\tif len(pvl.Items) != 1 {\n\t\tt.Errorf(\"TestCase: No of PVs \\n\\tExpectedNo: '1' \\n\\tActualNo: '%d'\", len(pvl.Items))\n\t}\n\n\t// Verify the pv name\n\texpectedVSM := \"ok-vsm-name\"\n\tif pvl.Items[0].Name != expectedVSM {\n\t\tt.Errorf(\"TestCase: VSM Name Match \\n\\tExpectedName: '%s' \\n\\tActualName: '%s'\", expectedVSM, pvl.Items[0].Name)\n\t}\n}", "title": "" }, { "docid": "68646708acbfdc057ec67c94186274db", "score": "0.5445615", "text": "func handleGetVolume(w http.ResponseWriter, r *http.Request) {\n\tif stepHandlersErrors.VolInstanceError {\n\t\twriteError(w, \"Error retrieving Volume\", http.StatusRequestTimeout, codes.Internal)\n\t\treturn\n\t}\n\tif testControllerHasNoConnection {\n\t\tw.WriteHeader(http.StatusRequestTimeout)\n\t\treturn\n\t}\n\tw.Write([]byte(\"{\\\"attrs\\\": [{}]}\"))\n}", "title": "" }, { "docid": "dfb41b3b6d9514ee6fdd4e599b912b4b", "score": "0.5438708", "text": "func (*SdkVolumeInspectRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_api_proto_rawDescGZIP(), []int{157}\n}", "title": "" }, { "docid": "5c05746b45e43d07c6ebe606b77dadb2", "score": "0.5383141", "text": "func (mmVolumeList *mCommonAPIClientMockVolumeList) Return(v1 volumetypes.VolumeListOKBody, err error) *CommonAPIClientMock {\n\tif mmVolumeList.mock.funcVolumeList != nil {\n\t\tmmVolumeList.mock.t.Fatalf(\"CommonAPIClientMock.VolumeList mock is already set by Set\")\n\t}\n\n\tif mmVolumeList.defaultExpectation == nil {\n\t\tmmVolumeList.defaultExpectation = &CommonAPIClientMockVolumeListExpectation{mock: mmVolumeList.mock}\n\t}\n\tmmVolumeList.defaultExpectation.results = &CommonAPIClientMockVolumeListResults{v1, err}\n\treturn mmVolumeList.mock\n}", "title": "" }, { "docid": "350be0b3cf829f01fc49964c0a97ee44", "score": "0.53676444", "text": "func dutVolumeInfo(ctx context.Context) (string, error) {\n\tamixer, err := testexec.CommandContext(ctx, \"amixer\", \"get\", \"Master\").Output()\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"failed to execute amixer command\")\n\t}\n\treturn string(amixer), nil\n}", "title": "" }, { "docid": "42905cb8b23f225d68c4ef7fc9f80f79", "score": "0.5366041", "text": "func (m *CommonAPIClientMock) MinimockDiskUsageInspect() {\n\tfor _, e := range m.DiskUsageMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.DiskUsage with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.DiskUsageMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterDiskUsageCounter) < 1 {\n\t\tif m.DiskUsageMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.DiskUsage\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.DiskUsage with params: %#v\", *m.DiskUsageMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcDiskUsage != nil && mm_atomic.LoadUint64(&m.afterDiskUsageCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.DiskUsage\")\n\t}\n}", "title": "" }, { "docid": "51d26a0901763b158d3bcc3a3e7b4c1c", "score": "0.533615", "text": "func handleGetExistentVolume(w http.ResponseWriter, r *http.Request) {\n\tif testControllerHasNoConnection {\n\t\tw.WriteHeader(http.StatusRequestTimeout)\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(readFromFile(\"mock/volume/get_volume2_without_metadata.txt\"))\n}", "title": "" }, { "docid": "fe2d1b2e60a55c493d8a2e41955ff794", "score": "0.53191745", "text": "func (mmContainerInspectWithRaw *mCommonAPIClientMockContainerInspectWithRaw) Expect(ctx context.Context, container string, getSize bool) *mCommonAPIClientMockContainerInspectWithRaw {\n\tif mmContainerInspectWithRaw.mock.funcContainerInspectWithRaw != nil {\n\t\tmmContainerInspectWithRaw.mock.t.Fatalf(\"CommonAPIClientMock.ContainerInspectWithRaw mock is already set by Set\")\n\t}\n\n\tif mmContainerInspectWithRaw.defaultExpectation == nil {\n\t\tmmContainerInspectWithRaw.defaultExpectation = &CommonAPIClientMockContainerInspectWithRawExpectation{}\n\t}\n\n\tmmContainerInspectWithRaw.defaultExpectation.params = &CommonAPIClientMockContainerInspectWithRawParams{ctx, container, getSize}\n\tfor _, e := range mmContainerInspectWithRaw.expectations {\n\t\tif minimock.Equal(e.params, mmContainerInspectWithRaw.defaultExpectation.params) {\n\t\t\tmmContainerInspectWithRaw.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmContainerInspectWithRaw.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmContainerInspectWithRaw\n}", "title": "" }, { "docid": "9644b94ea1a24859459387a415c82341", "score": "0.5315976", "text": "func (*SdkVolumeInspectWithFiltersResponse) Descriptor() ([]byte, []int) {\n\treturn file_api_api_proto_rawDescGZIP(), []int{160}\n}", "title": "" }, { "docid": "3c75cda30a102b292237f583445240fc", "score": "0.5299869", "text": "func (mmSecretInspectWithRaw *mCommonAPIClientMockSecretInspectWithRaw) When(ctx context.Context, name string) *CommonAPIClientMockSecretInspectWithRawExpectation {\n\tif mmSecretInspectWithRaw.mock.funcSecretInspectWithRaw != nil {\n\t\tmmSecretInspectWithRaw.mock.t.Fatalf(\"CommonAPIClientMock.SecretInspectWithRaw mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockSecretInspectWithRawExpectation{\n\t\tmock: mmSecretInspectWithRaw.mock,\n\t\tparams: &CommonAPIClientMockSecretInspectWithRawParams{ctx, name},\n\t}\n\tmmSecretInspectWithRaw.expectations = append(mmSecretInspectWithRaw.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "4866500b7c5304eda2b571958e717a7a", "score": "0.5295282", "text": "func (adm *AdminClient) Inspect(ctx context.Context, d InspectOptions) (key [32]byte, c io.ReadCloser, err error) {\n\tpath := fmt.Sprintf(adminAPIPrefix + \"/inspect-data\")\n\tq := make(url.Values)\n\tq.Set(\"volume\", d.Volume)\n\tq.Set(\"file\", d.File)\n\tresp, err := adm.executeMethod(ctx,\n\t\thttp.MethodGet, requestData{\n\t\t\trelPath: path,\n\t\t\tqueryValues:q,\n\t\t},\n\t)\n\n\tif err != nil {\n\t\tcloseResponse(resp)\n\t\treturn key, nil, err\n\t}\n\n\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn key, nil, httpRespToErrorResponse(resp)\n\t}\n\n\tif resp.Body == nil {\n\t\treturn key, nil, errors.New(\"body is nil\")\n\t}\n\t_, err = io.ReadFull(resp.Body, key[:1])\n\tif err != nil {\n\t\tcloseResponse(resp)\n\t\treturn key, nil, err\n\t}\n\t// This is the only version we know.\n\tif key[0] != 1 {\n\t\treturn key, nil, errors.New(\"unknown data version\")\n\t}\n\t// Read key...\n\t_, err = io.ReadFull(resp.Body, key[:])\n\tif err != nil {\n\t\tcloseResponse(resp)\n\t\treturn key, nil, err\n\t}\n\n\t// Return body\n\treturn key, resp.Body, nil\n}", "title": "" }, { "docid": "527f026bed31b5327fd826656517c669", "score": "0.52952063", "text": "func (mmVolumesPrune *mCommonAPIClientMockVolumesPrune) Inspect(f func(ctx context.Context, pruneFilter filters.Args)) *mCommonAPIClientMockVolumesPrune {\n\tif mmVolumesPrune.mock.inspectFuncVolumesPrune != nil {\n\t\tmmVolumesPrune.mock.t.Fatalf(\"Inspect function is already set for CommonAPIClientMock.VolumesPrune\")\n\t}\n\n\tmmVolumesPrune.mock.inspectFuncVolumesPrune = f\n\n\treturn mmVolumesPrune\n}", "title": "" }, { "docid": "751ce98659a3ae6c4495adc1a0c678fb", "score": "0.52747554", "text": "func (o *VirtualizationVolumeInfoAllOf) GetVolumeSizeOk() (*int64, bool) {\n\tif o == nil || o.VolumeSize == nil {\n\t\treturn nil, false\n\t}\n\treturn o.VolumeSize, true\n}", "title": "" }, { "docid": "6838ad886a288dd656575b33f2b9577d", "score": "0.5234375", "text": "func handleGetExistentVolumeMetadata(w http.ResponseWriter, r *http.Request) {\n\tif testControllerHasNoConnection {\n\t\tw.WriteHeader(http.StatusRequestTimeout)\n\t\treturn\n\t}\n\tw.Write([]byte(\"{\\\"attrs\\\": [{}]}\"))\n}", "title": "" }, { "docid": "0002e59f863441134a8c2706674f48f1", "score": "0.5229721", "text": "func (mmVolumeRemove *mCommonAPIClientMockVolumeRemove) Set(f func(ctx context.Context, volumeID string, force bool) (err error)) *CommonAPIClientMock {\n\tif mmVolumeRemove.defaultExpectation != nil {\n\t\tmmVolumeRemove.mock.t.Fatalf(\"Default expectation is already set for the CommonAPIClient.VolumeRemove method\")\n\t}\n\n\tif len(mmVolumeRemove.expectations) > 0 {\n\t\tmmVolumeRemove.mock.t.Fatalf(\"Some expectations are already set for the CommonAPIClient.VolumeRemove method\")\n\t}\n\n\tmmVolumeRemove.mock.funcVolumeRemove = f\n\treturn mmVolumeRemove.mock\n}", "title": "" }, { "docid": "7e1ae89fed233c6c20b77e9098f6e65d", "score": "0.52254564", "text": "func (mmServiceInspectWithRaw *mCommonAPIClientMockServiceInspectWithRaw) When(ctx context.Context, serviceID string, options types.ServiceInspectOptions) *CommonAPIClientMockServiceInspectWithRawExpectation {\n\tif mmServiceInspectWithRaw.mock.funcServiceInspectWithRaw != nil {\n\t\tmmServiceInspectWithRaw.mock.t.Fatalf(\"CommonAPIClientMock.ServiceInspectWithRaw mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockServiceInspectWithRawExpectation{\n\t\tmock: mmServiceInspectWithRaw.mock,\n\t\tparams: &CommonAPIClientMockServiceInspectWithRawParams{ctx, serviceID, options},\n\t}\n\tmmServiceInspectWithRaw.expectations = append(mmServiceInspectWithRaw.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "0fbaff16dd9e70940e40f59040178d0e", "score": "0.52127475", "text": "func (m *CommonAPIClientMock) MinimockDistributionInspectInspect() {\n\tfor _, e := range m.DistributionInspectMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.DistributionInspect with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.DistributionInspectMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterDistributionInspectCounter) < 1 {\n\t\tif m.DistributionInspectMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.DistributionInspect\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.DistributionInspect with params: %#v\", *m.DistributionInspectMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcDistributionInspect != nil && mm_atomic.LoadUint64(&m.afterDistributionInspectCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.DistributionInspect\")\n\t}\n}", "title": "" }, { "docid": "902af95677bf22eb1e2285f30653706d", "score": "0.52121633", "text": "func (cli *Client) VolumeInspectWithRaw(ctx context.Context, volumeID string) (volume.Volume, []byte, error) {\n\tif volumeID == \"\" {\n\t\treturn volume.Volume{}, nil, objectNotFoundError{object: \"volume\", id: volumeID}\n\t}\n\n\tvar vol volume.Volume\n\tresp, err := cli.get(ctx, \"/volumes/\"+volumeID, nil, nil)\n\tdefer ensureReaderClosed(resp)\n\tif err != nil {\n\t\treturn vol, nil, err\n\t}\n\n\tbody, err := io.ReadAll(resp.body)\n\tif err != nil {\n\t\treturn vol, nil, err\n\t}\n\trdr := bytes.NewReader(body)\n\terr = json.NewDecoder(rdr).Decode(&vol)\n\treturn vol, body, err\n}", "title": "" }, { "docid": "2e115c98198ae2a8a295599f41f4f768", "score": "0.5195206", "text": "func (e *CommonAPIClientMockVolumeRemoveExpectation) Then(err error) *CommonAPIClientMock {\n\te.results = &CommonAPIClientMockVolumeRemoveResults{err}\n\treturn e.mock\n}", "title": "" }, { "docid": "1dc2a2802de33a00379d9fb01c67733e", "score": "0.51784074", "text": "func (mmImageInspectWithRaw *mCommonAPIClientMockImageInspectWithRaw) When(ctx context.Context, image string) *CommonAPIClientMockImageInspectWithRawExpectation {\n\tif mmImageInspectWithRaw.mock.funcImageInspectWithRaw != nil {\n\t\tmmImageInspectWithRaw.mock.t.Fatalf(\"CommonAPIClientMock.ImageInspectWithRaw mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockImageInspectWithRawExpectation{\n\t\tmock: mmImageInspectWithRaw.mock,\n\t\tparams: &CommonAPIClientMockImageInspectWithRawParams{ctx, image},\n\t}\n\tmmImageInspectWithRaw.expectations = append(mmImageInspectWithRaw.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "ad3746aeededc0b4d5bd546c64481647", "score": "0.51724577", "text": "func (mmVolumesPrune *mCommonAPIClientMockVolumesPrune) When(ctx context.Context, pruneFilter filters.Args) *CommonAPIClientMockVolumesPruneExpectation {\n\tif mmVolumesPrune.mock.funcVolumesPrune != nil {\n\t\tmmVolumesPrune.mock.t.Fatalf(\"CommonAPIClientMock.VolumesPrune mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockVolumesPruneExpectation{\n\t\tmock: mmVolumesPrune.mock,\n\t\tparams: &CommonAPIClientMockVolumesPruneParams{ctx, pruneFilter},\n\t}\n\tmmVolumesPrune.expectations = append(mmVolumesPrune.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "a86e58732a84b73d27c28b7bf464c2fd", "score": "0.51508117", "text": "func GetVolume(context echo.Context) error {\n\treturn context.JSON(http.StatusOK, \"We unfortunately can't do this :(\")\n}", "title": "" }, { "docid": "649a9db250173377e9369d86f94a75a0", "score": "0.5138003", "text": "func (mmVolumeInspect *CommonAPIClientMock) VolumeInspectBeforeCounter() uint64 {\n\treturn mm_atomic.LoadUint64(&mmVolumeInspect.beforeVolumeInspectCounter)\n}", "title": "" }, { "docid": "48fafd129d91ca80fc9dc40e497f2d6d", "score": "0.51332873", "text": "func (m *CommonAPIClientMock) MinimockSecretInspectWithRawInspect() {\n\tfor _, e := range m.SecretInspectWithRawMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.SecretInspectWithRaw with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.SecretInspectWithRawMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterSecretInspectWithRawCounter) < 1 {\n\t\tif m.SecretInspectWithRawMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.SecretInspectWithRaw\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.SecretInspectWithRaw with params: %#v\", *m.SecretInspectWithRawMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcSecretInspectWithRaw != nil && mm_atomic.LoadUint64(&m.afterSecretInspectWithRawCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.SecretInspectWithRaw\")\n\t}\n}", "title": "" }, { "docid": "cf21a7b9bd6819e254800221a65bfef9", "score": "0.5119536", "text": "func (mmPluginInspectWithRaw *mCommonAPIClientMockPluginInspectWithRaw) When(ctx context.Context, name string) *CommonAPIClientMockPluginInspectWithRawExpectation {\n\tif mmPluginInspectWithRaw.mock.funcPluginInspectWithRaw != nil {\n\t\tmmPluginInspectWithRaw.mock.t.Fatalf(\"CommonAPIClientMock.PluginInspectWithRaw mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockPluginInspectWithRawExpectation{\n\t\tmock: mmPluginInspectWithRaw.mock,\n\t\tparams: &CommonAPIClientMockPluginInspectWithRawParams{ctx, name},\n\t}\n\tmmPluginInspectWithRaw.expectations = append(mmPluginInspectWithRaw.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "8ad80de7fdc774374a53cda7b8f832eb", "score": "0.51155597", "text": "func (m *CommonAPIClientMock) MinimockNegotiateAPIVersionInspect() {\n\tfor _, e := range m.NegotiateAPIVersionMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.NegotiateAPIVersion with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.NegotiateAPIVersionMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterNegotiateAPIVersionCounter) < 1 {\n\t\tif m.NegotiateAPIVersionMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.NegotiateAPIVersion\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.NegotiateAPIVersion with params: %#v\", *m.NegotiateAPIVersionMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcNegotiateAPIVersion != nil && mm_atomic.LoadUint64(&m.afterNegotiateAPIVersionCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.NegotiateAPIVersion\")\n\t}\n}", "title": "" }, { "docid": "3f8944e280c6294cd48aa851f6f93912", "score": "0.5102115", "text": "func (m *CommonAPIClientMock) MinimockImageListInspect() {\n\tfor _, e := range m.ImageListMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.ImageList with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.ImageListMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterImageListCounter) < 1 {\n\t\tif m.ImageListMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.ImageList\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.ImageList with params: %#v\", *m.ImageListMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcImageList != nil && mm_atomic.LoadUint64(&m.afterImageListCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.ImageList\")\n\t}\n}", "title": "" }, { "docid": "369267a07f40a8f451c5bb34847e23e9", "score": "0.51004183", "text": "func handleGetVolumeWithoutMetadata(w http.ResponseWriter, r *http.Request) {\n\tif testControllerHasNoConnection {\n\t\tw.WriteHeader(http.StatusRequestTimeout)\n\t\treturn\n\t}\n\tif stepHandlersErrors.VolumeNotExistError {\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\tw.Write(readFromFile(\"mock/volume/get_non_existent_volume.txt\"))\n\t}\n\tw.Write(readFromFile(\"mock/volume/get_volume2_without_metadata.txt\"))\n}", "title": "" }, { "docid": "cb453203fd7fd64d8487e610fab90c7d", "score": "0.5096577", "text": "func (m *CommonAPIClientMock) MinimockContainerStatPathInspect() {\n\tfor _, e := range m.ContainerStatPathMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.ContainerStatPath with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.ContainerStatPathMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterContainerStatPathCounter) < 1 {\n\t\tif m.ContainerStatPathMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.ContainerStatPath\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.ContainerStatPath with params: %#v\", *m.ContainerStatPathMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcContainerStatPath != nil && mm_atomic.LoadUint64(&m.afterContainerStatPathCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.ContainerStatPath\")\n\t}\n}", "title": "" }, { "docid": "c23ffd241126b34381e34ec8c890bf93", "score": "0.5094063", "text": "func (c *VolumesController) Show(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tvolumeId := vars[\"volumeId\"]\n\tvolume, err := docker.DockerConn.VolumeInspect(context.Background(), volumeId)\n\tif c.CheckError(err, http.StatusInternalServerError, w) {\n\t\treturn\n\t}\n\tc.SendJSON(\n\t\tw,\n\t\tr,\n\t\tvolume,\n\t\thttp.StatusOK,\n\t)\n}", "title": "" }, { "docid": "956c4cd7f490b71ee81154f2e44c8d23", "score": "0.5092787", "text": "func (mmNetworkInspectWithRaw *mCommonAPIClientMockNetworkInspectWithRaw) When(ctx context.Context, network string, options types.NetworkInspectOptions) *CommonAPIClientMockNetworkInspectWithRawExpectation {\n\tif mmNetworkInspectWithRaw.mock.funcNetworkInspectWithRaw != nil {\n\t\tmmNetworkInspectWithRaw.mock.t.Fatalf(\"CommonAPIClientMock.NetworkInspectWithRaw mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockNetworkInspectWithRawExpectation{\n\t\tmock: mmNetworkInspectWithRaw.mock,\n\t\tparams: &CommonAPIClientMockNetworkInspectWithRawParams{ctx, network, options},\n\t}\n\tmmNetworkInspectWithRaw.expectations = append(mmNetworkInspectWithRaw.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "224c5d355766d5f8db08e6360057aaf1", "score": "0.5091836", "text": "func (*SdkVolumeInspectWithFiltersRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_api_proto_rawDescGZIP(), []int{159}\n}", "title": "" }, { "docid": "b99f9d4377601a748e9aa59f41ee940a", "score": "0.5086969", "text": "func (*VolumeInspectOptions) Descriptor() ([]byte, []int) {\n\treturn file_api_api_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "7425cae4a95d9e8f43e6fc39482325b6", "score": "0.50760853", "text": "func (mmContainerInspect *mCommonAPIClientMockContainerInspect) When(ctx context.Context, container string) *CommonAPIClientMockContainerInspectExpectation {\n\tif mmContainerInspect.mock.funcContainerInspect != nil {\n\t\tmmContainerInspect.mock.t.Fatalf(\"CommonAPIClientMock.ContainerInspect mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockContainerInspectExpectation{\n\t\tmock: mmContainerInspect.mock,\n\t\tparams: &CommonAPIClientMockContainerInspectParams{ctx, container},\n\t}\n\tmmContainerInspect.expectations = append(mmContainerInspect.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "cb226e7b27d914639639b2dce34e4ee1", "score": "0.5064321", "text": "func (m *CommonAPIClientMock) MinimockNegotiateAPIVersionPingInspect() {\n\tfor _, e := range m.NegotiateAPIVersionPingMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.NegotiateAPIVersionPing with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.NegotiateAPIVersionPingMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterNegotiateAPIVersionPingCounter) < 1 {\n\t\tif m.NegotiateAPIVersionPingMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.NegotiateAPIVersionPing\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.NegotiateAPIVersionPing with params: %#v\", *m.NegotiateAPIVersionPingMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcNegotiateAPIVersionPing != nil && mm_atomic.LoadUint64(&m.afterNegotiateAPIVersionPingCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.NegotiateAPIVersionPing\")\n\t}\n}", "title": "" }, { "docid": "f08360743f00dcabddb64ca0979d1ed9", "score": "0.50589645", "text": "func (mmVolumesPrune *mCommonAPIClientMockVolumesPrune) Expect(ctx context.Context, pruneFilter filters.Args) *mCommonAPIClientMockVolumesPrune {\n\tif mmVolumesPrune.mock.funcVolumesPrune != nil {\n\t\tmmVolumesPrune.mock.t.Fatalf(\"CommonAPIClientMock.VolumesPrune mock is already set by Set\")\n\t}\n\n\tif mmVolumesPrune.defaultExpectation == nil {\n\t\tmmVolumesPrune.defaultExpectation = &CommonAPIClientMockVolumesPruneExpectation{}\n\t}\n\n\tmmVolumesPrune.defaultExpectation.params = &CommonAPIClientMockVolumesPruneParams{ctx, pruneFilter}\n\tfor _, e := range mmVolumesPrune.expectations {\n\t\tif minimock.Equal(e.params, mmVolumesPrune.defaultExpectation.params) {\n\t\t\tmmVolumesPrune.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmVolumesPrune.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmVolumesPrune\n}", "title": "" }, { "docid": "53d5f4abe87f2f8aac380b4786b58696", "score": "0.5057497", "text": "func (mmContainerInspectWithRaw *mCommonAPIClientMockContainerInspectWithRaw) Inspect(f func(ctx context.Context, container string, getSize bool)) *mCommonAPIClientMockContainerInspectWithRaw {\n\tif mmContainerInspectWithRaw.mock.inspectFuncContainerInspectWithRaw != nil {\n\t\tmmContainerInspectWithRaw.mock.t.Fatalf(\"Inspect function is already set for CommonAPIClientMock.ContainerInspectWithRaw\")\n\t}\n\n\tmmContainerInspectWithRaw.mock.inspectFuncContainerInspectWithRaw = f\n\n\treturn mmContainerInspectWithRaw\n}", "title": "" }, { "docid": "af6a7651da700b2a0019b390ddfe6b77", "score": "0.505498", "text": "func (m *CommonAPIClientMock) MinimockContainerInspectInspect() {\n\tfor _, e := range m.ContainerInspectMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.ContainerInspect with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.ContainerInspectMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterContainerInspectCounter) < 1 {\n\t\tif m.ContainerInspectMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.ContainerInspect\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.ContainerInspect with params: %#v\", *m.ContainerInspectMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcContainerInspect != nil && mm_atomic.LoadUint64(&m.afterContainerInspectCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.ContainerInspect\")\n\t}\n}", "title": "" }, { "docid": "6071171745308e284240399ac00302d2", "score": "0.50530255", "text": "func (mmVolumeInspectWithRaw *CommonAPIClientMock) VolumeInspectWithRawBeforeCounter() uint64 {\n\treturn mm_atomic.LoadUint64(&mmVolumeInspectWithRaw.beforeVolumeInspectWithRawCounter)\n}", "title": "" }, { "docid": "82dfd8e9e696798aaf78d21d916a5e8a", "score": "0.5048464", "text": "func (m *CommonAPIClientMock) MinimockImageSearchInspect() {\n\tfor _, e := range m.ImageSearchMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.ImageSearch with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.ImageSearchMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterImageSearchCounter) < 1 {\n\t\tif m.ImageSearchMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.ImageSearch\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.ImageSearch with params: %#v\", *m.ImageSearchMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcImageSearch != nil && mm_atomic.LoadUint64(&m.afterImageSearchCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.ImageSearch\")\n\t}\n}", "title": "" }, { "docid": "ba0c941a7b1947572b7a7ba9f7535278", "score": "0.5038628", "text": "func (m *CommonAPIClientMock) MinimockSecretUpdateInspect() {\n\tfor _, e := range m.SecretUpdateMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.SecretUpdate with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.SecretUpdateMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterSecretUpdateCounter) < 1 {\n\t\tif m.SecretUpdateMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.SecretUpdate\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.SecretUpdate with params: %#v\", *m.SecretUpdateMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcSecretUpdate != nil && mm_atomic.LoadUint64(&m.afterSecretUpdateCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.SecretUpdate\")\n\t}\n}", "title": "" }, { "docid": "592bd560b4779e7dd15d934e82290253", "score": "0.50337166", "text": "func (s *BasicTestSuite) TestBasicVolumeIsolation(c *C) {\n\tmisc.LogTestStart(c.TestName())\n\n\tout, err := dockercli.CreateVolume(s.vm1, s.volName1)\n\tc.Assert(err, IsNil, Commentf(out))\n\n\taccessible := verification.CheckVolumeAvailability(s.vm1, s.volName1)\n\tc.Assert(accessible, Equals, true, Commentf(\"Volume %s is not available\", s.volName1))\n\n\taccessible = verification.CheckVolumeAvailability(s.vm2, s.volName1)\n\t//TODO: VM2 inaccessible to this volume is currently not available\n\t//c.Assert(accessible, Equals, false, Commentf(\"Volume %s is still available\", s.volName1))\n\n\tout, err = dockercli.DeleteVolume(s.vm1, s.volName1)\n\tc.Assert(err, IsNil, Commentf(out))\n\n\tmisc.LogTestEnd(c.TestName())\n}", "title": "" }, { "docid": "424184243b5f513dd2fff19b68faada7", "score": "0.50263554", "text": "func (mmConfigInspectWithRaw *mCommonAPIClientMockConfigInspectWithRaw) When(ctx context.Context, name string) *CommonAPIClientMockConfigInspectWithRawExpectation {\n\tif mmConfigInspectWithRaw.mock.funcConfigInspectWithRaw != nil {\n\t\tmmConfigInspectWithRaw.mock.t.Fatalf(\"CommonAPIClientMock.ConfigInspectWithRaw mock is already set by Set\")\n\t}\n\n\texpectation := &CommonAPIClientMockConfigInspectWithRawExpectation{\n\t\tmock: mmConfigInspectWithRaw.mock,\n\t\tparams: &CommonAPIClientMockConfigInspectWithRawParams{ctx, name},\n\t}\n\tmmConfigInspectWithRaw.expectations = append(mmConfigInspectWithRaw.expectations, expectation)\n\treturn expectation\n}", "title": "" }, { "docid": "f060293a351715c4309cde1397f94efc", "score": "0.50240123", "text": "func (m *IndexMock) MinimockVersionsInspect() {\n\tfor _, e := range m.VersionsMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to IndexMock.Versions with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.VersionsMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterVersionsCounter) < 1 {\n\t\tif m.VersionsMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to IndexMock.Versions\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to IndexMock.Versions with params: %#v\", *m.VersionsMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcVersions != nil && mm_atomic.LoadUint64(&m.afterVersionsCounter) < 1 {\n\t\tm.t.Error(\"Expected call to IndexMock.Versions\")\n\t}\n}", "title": "" }, { "docid": "f3456ac5a2c9b9cc75273329897e82fe", "score": "0.50136745", "text": "func (m *CommonAPIClientMock) MinimockSecretListInspect() {\n\tfor _, e := range m.SecretListMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.SecretList with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.SecretListMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterSecretListCounter) < 1 {\n\t\tif m.SecretListMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.SecretList\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.SecretList with params: %#v\", *m.SecretListMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcSecretList != nil && mm_atomic.LoadUint64(&m.afterSecretListCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.SecretList\")\n\t}\n}", "title": "" }, { "docid": "b9286f5f65607e40ac4f68334550d37c", "score": "0.50087744", "text": "func (m *CommonAPIClientMock) MinimockContainerInspectWithRawInspect() {\n\tfor _, e := range m.ContainerInspectWithRawMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.ContainerInspectWithRaw with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.ContainerInspectWithRawMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterContainerInspectWithRawCounter) < 1 {\n\t\tif m.ContainerInspectWithRawMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.ContainerInspectWithRaw\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.ContainerInspectWithRaw with params: %#v\", *m.ContainerInspectWithRawMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcContainerInspectWithRaw != nil && mm_atomic.LoadUint64(&m.afterContainerInspectWithRawCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.ContainerInspectWithRaw\")\n\t}\n}", "title": "" }, { "docid": "02c28d12e90dfefbb2c0f1011fd25d0c", "score": "0.5004255", "text": "func TestVolumeCrudAndOp(t *testing.T) {\n\t// 0, list volume template\n\ttemplates, err := CLIENT.ListVolumeTpl()\n\tExpectEqual(t.Errorf, nil, err)\n\tExpectEqual(t.Errorf, true, len(templates.Result) > 0)\n\n\t// 1, create volume\n\tname := \"TestVolumeCrudAndOp\"\n\thostPath := \"/var/local\"\n\tcreateReq := &api.CreateVolReq{\n\t\tName: name,\n\t\tTags: []string{\"tag1\", \"tag2\"},\n\t\tTemplateCode: templates.Result[0].Code,\n\t\tHostPath: hostPath,\n\t\tDescription: \"desc\",\n\t}\n\tcreateRet, err := CLIENT.CreateVolume(createReq)\n\tExpectEqual(t.Errorf, nil, err)\n\tExpectEqual(t.Errorf, name, createRet.Name)\n\tExpectEqual(t.Errorf, templates.Result[0].Code, createRet.Template.Code)\n\n\t// 2, get volume\n\tvolumeGot, err := CLIENT.GetVolume(name)\n\tExpectEqual(t.Errorf, nil, err)\n\tExpectEqual(t.Errorf, name, volumeGot.Name)\n\tExpectEqual(t.Errorf, templates.Result[0].Code, volumeGot.Template.Code)\n\n\t// 3, list volume\n\tlist, err := CLIENT.ListVolume(&api.ListVolumeReq{})\n\tExpectEqual(t.Errorf, nil, err)\n\tExpectEqual(t.Errorf, true, list.TotalCount > 0)\n\n\t// 4, update\n\tnewDesc := \"new description\"\n\tnewTags := []string{\"tag3\", \"tag4\", \"tag5\", \"tag6\"}\n\tnewHostpath := hostPath + \"/new\"\n\tupdateReq := &api.EditVolumeReq{\n\t\tTags: newTags, Description: newDesc, HostPath: newHostpath}\n\tupdateRet, err := CLIENT.EditVolume(name, updateReq)\n\tExpectEqual(t.Errorf, nil, err)\n\tExpectEqual(t.Errorf, newDesc, updateRet.Description)\n\tExpectEqual(t.Errorf, true, len(updateRet.Tags) >= 4)\n\n\t// 5, query version list\n\tverListRet, err := CLIENT.ListVolumeVer(&api.NameVersion{Name: name, Version: updateRet.Version})\n\tExpectEqual(t.Errorf, nil, err)\n\tExpectEqual(t.Errorf, true, len(verListRet.Result) > 0)\n\n\t// 6, publish new version\n\tpubRet, err := CLIENT.PubVolumeVer(name)\n\tExpectEqual(t.Errorf, nil, err)\n\tExpectEqual(t.Errorf, false, pubRet.Version == updateRet.Version)\n\tverListRet2, err := CLIENT.ListVolumeVer(&api.NameVersion{Name: name})\n\tExpectEqual(t.Errorf, nil, err)\n\tExpectEqual(t.Errorf, true, len(verListRet2.Result) > 1)\n\n\t// 7, download url\n\tdownRet, err := CLIENT.DownloadVolVer(name, pubRet.Version)\n\tExpectEqual(t.Errorf, nil, err)\n\tExpectEqual(t.Errorf, true, len(downRet.Url) > 0)\n\n\t// 8, delete\n\terr = CLIENT.DeleteVolume(name)\n\tExpectEqual(t.Errorf, nil, err)\n}", "title": "" }, { "docid": "03dc83c923e529921606622def7fa4c6", "score": "0.50021", "text": "func (m *CommonAPIClientMock) MinimockSwarmGetUnlockKeyInspect() {\n\tfor _, e := range m.SwarmGetUnlockKeyMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.SwarmGetUnlockKey with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.SwarmGetUnlockKeyMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterSwarmGetUnlockKeyCounter) < 1 {\n\t\tif m.SwarmGetUnlockKeyMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.SwarmGetUnlockKey\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.SwarmGetUnlockKey with params: %#v\", *m.SwarmGetUnlockKeyMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcSwarmGetUnlockKey != nil && mm_atomic.LoadUint64(&m.afterSwarmGetUnlockKeyCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.SwarmGetUnlockKey\")\n\t}\n}", "title": "" }, { "docid": "3ea5b10af6760dfc44d92fdcd637f35c", "score": "0.5000611", "text": "func (mmDiskUsage *mCommonAPIClientMockDiskUsage) Expect(ctx context.Context) *mCommonAPIClientMockDiskUsage {\n\tif mmDiskUsage.mock.funcDiskUsage != nil {\n\t\tmmDiskUsage.mock.t.Fatalf(\"CommonAPIClientMock.DiskUsage mock is already set by Set\")\n\t}\n\n\tif mmDiskUsage.defaultExpectation == nil {\n\t\tmmDiskUsage.defaultExpectation = &CommonAPIClientMockDiskUsageExpectation{}\n\t}\n\n\tmmDiskUsage.defaultExpectation.params = &CommonAPIClientMockDiskUsageParams{ctx}\n\tfor _, e := range mmDiskUsage.expectations {\n\t\tif minimock.Equal(e.params, mmDiskUsage.defaultExpectation.params) {\n\t\t\tmmDiskUsage.mock.t.Fatalf(\"Expectation set by When has same params: %#v\", *mmDiskUsage.defaultExpectation.params)\n\t\t}\n\t}\n\n\treturn mmDiskUsage\n}", "title": "" }, { "docid": "7d2360b7f440bfe88611143f37132443", "score": "0.49978948", "text": "func (o *FiltersVolume) GetVolumeSizesOk() (*[]int32, bool) {\n\tif o == nil || o.VolumeSizes == nil {\n\t\treturn nil, false\n\t}\n\treturn o.VolumeSizes, true\n}", "title": "" }, { "docid": "c2c955d06a65dd798cdee19bf94371b9", "score": "0.4996701", "text": "func (mmNegotiateAPIVersionPing *mCommonAPIClientMockNegotiateAPIVersionPing) Inspect(f func(p1 types.Ping)) *mCommonAPIClientMockNegotiateAPIVersionPing {\n\tif mmNegotiateAPIVersionPing.mock.inspectFuncNegotiateAPIVersionPing != nil {\n\t\tmmNegotiateAPIVersionPing.mock.t.Fatalf(\"Inspect function is already set for CommonAPIClientMock.NegotiateAPIVersionPing\")\n\t}\n\n\tmmNegotiateAPIVersionPing.mock.inspectFuncNegotiateAPIVersionPing = f\n\n\treturn mmNegotiateAPIVersionPing\n}", "title": "" }, { "docid": "31288f43d50235bb68b9f54488450ca0", "score": "0.4993675", "text": "func (m *CommonAPIClientMock) MinimockImageInspectWithRawInspect() {\n\tfor _, e := range m.ImageInspectWithRawMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.ImageInspectWithRaw with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.ImageInspectWithRawMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterImageInspectWithRawCounter) < 1 {\n\t\tif m.ImageInspectWithRawMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to CommonAPIClientMock.ImageInspectWithRaw\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to CommonAPIClientMock.ImageInspectWithRaw with params: %#v\", *m.ImageInspectWithRawMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcImageInspectWithRaw != nil && mm_atomic.LoadUint64(&m.afterImageInspectWithRawCounter) < 1 {\n\t\tm.t.Error(\"Expected call to CommonAPIClientMock.ImageInspectWithRaw\")\n\t}\n}", "title": "" }, { "docid": "1a921fd28d4a3d921f016dfe7d18f51a", "score": "0.49935877", "text": "func (m *ClientMock) MinimockGetKeysInspect() {\n\tfor _, e := range m.GetKeysMock.expectations {\n\t\tif mm_atomic.LoadUint64(&e.Counter) < 1 {\n\t\t\tm.t.Errorf(\"Expected call to ClientMock.GetKeys with params: %#v\", *e.params)\n\t\t}\n\t}\n\n\t// if default expectation was set then invocations count should be greater than zero\n\tif m.GetKeysMock.defaultExpectation != nil && mm_atomic.LoadUint64(&m.afterGetKeysCounter) < 1 {\n\t\tif m.GetKeysMock.defaultExpectation.params == nil {\n\t\t\tm.t.Error(\"Expected call to ClientMock.GetKeys\")\n\t\t} else {\n\t\t\tm.t.Errorf(\"Expected call to ClientMock.GetKeys with params: %#v\", *m.GetKeysMock.defaultExpectation.params)\n\t\t}\n\t}\n\t// if func was set then invocations count should be greater than zero\n\tif m.funcGetKeys != nil && mm_atomic.LoadUint64(&m.afterGetKeysCounter) < 1 {\n\t\tm.t.Error(\"Expected call to ClientMock.GetKeys\")\n\t}\n}", "title": "" }, { "docid": "b5e3aa703d47fd050b621eaa0d859de8", "score": "0.49933544", "text": "func (v *volumesnapshotter) GetVolumeInfo(volumeID, volumeAZ string) (string, *int64, error) {\n\tv.Log.Infof(\">>>>> GetVolumeInfo called with id %s and name %s\", volumeID, volumeAZ)\n\tdefer v.Log.Infof(\"<<<<< GetVolumeInfo\")\n\n\t// we do not store the type or iops\n\treturn \"\", nil, nil\n}", "title": "" }, { "docid": "e8ea8eb3d8274457a86cdb295be6d01d", "score": "0.49932992", "text": "func (m *MockVisibilityArchiver) EXPECT() *MockVisibilityArchiverMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "2c19124d9ddc6dc595f688f583abb3a8", "score": "0.49884373", "text": "func (mmVolumeInspect *CommonAPIClientMock) VolumeInspectAfterCounter() uint64 {\n\treturn mm_atomic.LoadUint64(&mmVolumeInspect.afterVolumeInspectCounter)\n}", "title": "" } ]
3119651fe3ee07dd48aab9abb26f4aed
NewPausableTokenMockTransactor creates a new writeonly instance of PausableTokenMock, bound to a specific deployed contract.
[ { "docid": "4fd35992c2b9ecfb5a78027e843df05f", "score": "0.8180542", "text": "func NewPausableTokenMockTransactor(address common.Address, transactor bind.ContractTransactor) (*PausableTokenMockTransactor, error) {\n\tcontract, err := bindPausableTokenMock(address, nil, transactor)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableTokenMockTransactor{contract: contract}, nil\n}", "title": "" } ]
[ { "docid": "54d80d40f670ae0e4ec5a79b0a86ae58", "score": "0.77135813", "text": "func NewPausableTokenMock(address common.Address, backend bind.ContractBackend) (*PausableTokenMock, error) {\n\tcontract, err := bindPausableTokenMock(address, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableTokenMock{PausableTokenMockCaller: PausableTokenMockCaller{contract: contract}, PausableTokenMockTransactor: PausableTokenMockTransactor{contract: contract}}, nil\n}", "title": "" }, { "docid": "1b24f8fbae725daf188332c7a8822ed4", "score": "0.73795044", "text": "func NewPausableTokenMockCaller(address common.Address, caller bind.ContractCaller) (*PausableTokenMockCaller, error) {\n\tcontract, err := bindPausableTokenMock(address, caller, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableTokenMockCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "427bd8a621f6203b899a275c00194243", "score": "0.7149468", "text": "func bindPausableTokenMock(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor) (*bind.BoundContract, error) {\n\tparsed, err := abi.JSON(strings.NewReader(PausableTokenMockABI))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, parsed, caller, transactor), nil\n}", "title": "" }, { "docid": "e837d48408ea7c481df854712e27c38d", "score": "0.69533616", "text": "func DeployPausableTokenMock(auth *bind.TransactOpts, backend bind.ContractBackend, initialAccount common.Address, initialBalance *big.Int) (common.Address, *types.Transaction, *PausableTokenMock, error) {\n\tparsed, err := abi.JSON(strings.NewReader(PausableTokenMockABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(PausableTokenMockBin), backend, initialAccount, initialBalance)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &PausableTokenMock{PausableTokenMockCaller: PausableTokenMockCaller{contract: contract}, PausableTokenMockTransactor: PausableTokenMockTransactor{contract: contract}}, nil\n}", "title": "" }, { "docid": "c0cf1291e0dde5100c8d52fc1223383f", "score": "0.6262779", "text": "func NewStandardTokenMockTransactor(address common.Address, transactor bind.ContractTransactor) (*StandardTokenMockTransactor, error) {\n\tcontract, err := bindStandardTokenMock(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &StandardTokenMockTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "876a3ec1a157bb839afe1ae98190e1b4", "score": "0.59811324", "text": "func NewPausableTransactor(address common.Address, transactor bind.ContractTransactor) (*PausableTransactor, error) {\n\tcontract, err := bindPausable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "876a3ec1a157bb839afe1ae98190e1b4", "score": "0.59811324", "text": "func NewPausableTransactor(address common.Address, transactor bind.ContractTransactor) (*PausableTransactor, error) {\n\tcontract, err := bindPausable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "876a3ec1a157bb839afe1ae98190e1b4", "score": "0.59811324", "text": "func NewPausableTransactor(address common.Address, transactor bind.ContractTransactor) (*PausableTransactor, error) {\n\tcontract, err := bindPausable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "876a3ec1a157bb839afe1ae98190e1b4", "score": "0.59811324", "text": "func NewPausableTransactor(address common.Address, transactor bind.ContractTransactor) (*PausableTransactor, error) {\n\tcontract, err := bindPausable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "876a3ec1a157bb839afe1ae98190e1b4", "score": "0.59811324", "text": "func NewPausableTransactor(address common.Address, transactor bind.ContractTransactor) (*PausableTransactor, error) {\n\tcontract, err := bindPausable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "b89523992f844d3c66c17a3a80f30634", "score": "0.55875885", "text": "func NewStandardTokenMock(address common.Address, backend bind.ContractBackend) (*StandardTokenMock, error) {\n\tcontract, err := bindStandardTokenMock(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &StandardTokenMock{StandardTokenMockCaller: StandardTokenMockCaller{contract: contract}, StandardTokenMockTransactor: StandardTokenMockTransactor{contract: contract}, StandardTokenMockFilterer: StandardTokenMockFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "92a82a23cdb9e25384ca70c98930f76e", "score": "0.5544759", "text": "func NewStandardTokenMockCaller(address common.Address, caller bind.ContractCaller) (*StandardTokenMockCaller, error) {\n\tcontract, err := bindStandardTokenMock(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &StandardTokenMockCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "bb2ce2521705336305490cf16e163a76", "score": "0.55279326", "text": "func DeployStandardTokenMock(auth *bind.TransactOpts, backend bind.ContractBackend, initialAccount common.Address, initialBalance *big.Int) (common.Address, *types.Transaction, *StandardTokenMock, error) {\n\tparsed, err := abi.JSON(strings.NewReader(StandardTokenMockABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(StandardTokenMockBin), backend, initialAccount, initialBalance)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &StandardTokenMock{StandardTokenMockCaller: StandardTokenMockCaller{contract: contract}, StandardTokenMockTransactor: StandardTokenMockTransactor{contract: contract}, StandardTokenMockFilterer: StandardTokenMockFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "9adf76a4e2a92b240a768dbed5c56df9", "score": "0.53009754", "text": "func NewStandardTokenTransactor(address common.Address, transactor bind.ContractTransactor) (*StandardTokenTransactor, error) {\n\tcontract, err := bindStandardToken(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &StandardTokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "0eca5e118b6dddbc2716dba82d1d3bae", "score": "0.5295128", "text": "func NewStandardTokenTransactor(address common.Address, transactor bind.ContractTransactor) (*StandardTokenTransactor, error) {\n\tcontract, err := bindStandardToken(address, nil, transactor)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &StandardTokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "55b2938594e02b54738e9f56f4fad236", "score": "0.5259779", "text": "func NewPausable(address common.Address, backend bind.ContractBackend) (*Pausable, error) {\n\tcontract, err := bindPausable(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Pausable{PausableCaller: PausableCaller{contract: contract}, PausableTransactor: PausableTransactor{contract: contract}, PausableFilterer: PausableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "55b2938594e02b54738e9f56f4fad236", "score": "0.5259779", "text": "func NewPausable(address common.Address, backend bind.ContractBackend) (*Pausable, error) {\n\tcontract, err := bindPausable(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Pausable{PausableCaller: PausableCaller{contract: contract}, PausableTransactor: PausableTransactor{contract: contract}, PausableFilterer: PausableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "55b2938594e02b54738e9f56f4fad236", "score": "0.5259779", "text": "func NewPausable(address common.Address, backend bind.ContractBackend) (*Pausable, error) {\n\tcontract, err := bindPausable(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Pausable{PausableCaller: PausableCaller{contract: contract}, PausableTransactor: PausableTransactor{contract: contract}, PausableFilterer: PausableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "55b2938594e02b54738e9f56f4fad236", "score": "0.5259779", "text": "func NewPausable(address common.Address, backend bind.ContractBackend) (*Pausable, error) {\n\tcontract, err := bindPausable(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Pausable{PausableCaller: PausableCaller{contract: contract}, PausableTransactor: PausableTransactor{contract: contract}, PausableFilterer: PausableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "55b2938594e02b54738e9f56f4fad236", "score": "0.5259779", "text": "func NewPausable(address common.Address, backend bind.ContractBackend) (*Pausable, error) {\n\tcontract, err := bindPausable(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Pausable{PausableCaller: PausableCaller{contract: contract}, PausableTransactor: PausableTransactor{contract: contract}, PausableFilterer: PausableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "b455131d59e9f7530058937ebc040ca1", "score": "0.5216212", "text": "func bindStandardTokenMock(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor, filterer bind.ContractFilterer) (*bind.BoundContract, error) {\n\tparsed, err := abi.JSON(strings.NewReader(StandardTokenMockABI))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, parsed, caller, transactor, filterer), nil\n}", "title": "" }, { "docid": "7ee7642bbc99c5d4b56c087176c93bc0", "score": "0.51294863", "text": "func NewSmartTokenTransactor(address common.Address, transactor bind.ContractTransactor) (*SmartTokenTransactor, error) {\n\tcontract, err := bindSmartToken(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &SmartTokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "076b450ab48fc8e200c7be435ea6b721", "score": "0.5101101", "text": "func New(authenticator authenticator.Token, successTTL, failureTTL time.Duration) authenticator.Token {\n\treturn newWithClock(authenticator, successTTL, failureTTL, utilclock.RealClock{})\n}", "title": "" }, { "docid": "99fce236942e89b55d04f243caf57af6", "score": "0.5089663", "text": "func NewTokenTransactor(address common.Address, transactor bind.ContractTransactor) (*TokenTransactor, error) {\n\tcontract, err := bindToken(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "99fce236942e89b55d04f243caf57af6", "score": "0.5089663", "text": "func NewTokenTransactor(address common.Address, transactor bind.ContractTransactor) (*TokenTransactor, error) {\n\tcontract, err := bindToken(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "99fce236942e89b55d04f243caf57af6", "score": "0.5089663", "text": "func NewTokenTransactor(address common.Address, transactor bind.ContractTransactor) (*TokenTransactor, error) {\n\tcontract, err := bindToken(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "99fce236942e89b55d04f243caf57af6", "score": "0.5089663", "text": "func NewTokenTransactor(address common.Address, transactor bind.ContractTransactor) (*TokenTransactor, error) {\n\tcontract, err := bindToken(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "99fce236942e89b55d04f243caf57af6", "score": "0.5089663", "text": "func NewTokenTransactor(address common.Address, transactor bind.ContractTransactor) (*TokenTransactor, error) {\n\tcontract, err := bindToken(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "f33daa743353bfa68e8b8db206e73666", "score": "0.50601035", "text": "func (_PausableTokenMock *PausableTokenMockRaw) Transact(opts *bind.TransactOpts, method string, params ...interface{}) (*types.Transaction, error) {\n\treturn _PausableTokenMock.Contract.PausableTokenMockTransactor.contract.Transact(opts, method, params...)\n}", "title": "" }, { "docid": "135f2c13575e7910ca5e5a9d97fab326", "score": "0.5017296", "text": "func newTokenManager(config *aws.Config, initFunc func() (*token.Token, error), authEndPoint string,\n\tadvisoryRefreshTimeout, mandatoryRefreshTimeout func(time.Duration) time.Duration, timeFunc func() time.Time,\n\tclient IBMClientDo) *defaultTMImplementation {\n\t// if no time function passed uses the time.Now\n\tif timeFunc == nil {\n\t\ttimeFunc = time.Now\n\t}\n\n\t// if no value passed use the one stored as global\n\tif advisoryRefreshTimeout == nil {\n\t\tadvisoryRefreshTimeout = DefaultAdvisoryTimeoutFunc\n\t}\n\n\t// if no value passed use the one stored as global\n\tif mandatoryRefreshTimeout == nil {\n\t\tmandatoryRefreshTimeout = DefaultMandatoryTimeoutFunc\n\t}\n\n\t// checks the logLevel and logger,\n\t// only sets the loveLevel when logLevel and logger are not ZERO values\n\t// helps reducing the logic since logLevel needs to be checked\n\tlogLevel := aws.LogLevel(aws.LogOff)\n\tif config != nil && config.LogLevel != nil && config.Logger != nil {\n\t\tlogLevel = config.LogLevel\n\t}\n\n\t// builds a defaultTMImplementation using the provided parameters\n\ttm := &defaultTMImplementation{\n\t\tauthEndPoint: authEndPoint,\n\t\tclient: client,\n\t\tadvisoryRefreshTimeout: advisoryRefreshTimeout,\n\t\tmandatoryRefreshTimeout: mandatoryRefreshTimeout,\n\t\ttimeProvider: timeFunc,\n\t\tinitFunc: initFunc,\n\n\t\tlogLevel: logLevel,\n\t\tlogger: config.Logger,\n\t}\n\treturn tm\n}", "title": "" }, { "docid": "b0ad647be608d49e5006904b2a6facd1", "score": "0.49858436", "text": "func NewStockTokenTransactor(address common.Address, transactor bind.ContractTransactor) (*StockTokenTransactor, error) {\n\tcontract, err := bindStockToken(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &StockTokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "0ae24926c08dbbe7b42a4fd569aeb607", "score": "0.49705812", "text": "func NewPametteTransactor(address common.Address, transactor bind.ContractTransactor) (*PametteTransactor, error) {\n\tcontract, err := bindPamette(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PametteTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "b4dafaa5f2b3a484d64e765d2d64baaa", "score": "0.49361065", "text": "func NewMockTransport() *MockTransport {\n\treturn &MockTransport{make(map[string]Responder), nil}\n}", "title": "" }, { "docid": "ef49fea04df2cc15c94c19494f23ad14", "score": "0.4923114", "text": "func newMockProvider() *mockProviderAsync {\n\tprovider := newSyncMockProvider()\n\t// By default notifier is set to a function which is a no-op. In the event we've implemented the PodNotifier interface,\n\t// it will be set, and then we'll call a real underlying implementation.\n\t// This makes it easier in the sense we don't need to wrap each method.\n\treturn &mockProviderAsync{provider}\n}", "title": "" }, { "docid": "546e02edf90fd3017d9672edba2cac11", "score": "0.49148804", "text": "func NewEncryptor(t mockConstructorTestingTNewEncryptor) *Encryptor {\n\tmock := &Encryptor{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "93c948f1705bda3746a139c2faf2cb6c", "score": "0.48822483", "text": "func NewClaimableTransactor(address common.Address, transactor bind.ContractTransactor) (*ClaimableTransactor, error) {\n\tcontract, err := bindClaimable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ClaimableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "6cd5b3f22cd72ee17986c095ddb188af", "score": "0.48605764", "text": "func NewTransactable(address common.Address, backend bind.ContractBackend) (*Transactable, error) {\n\tcontract, err := bindTransactable(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Transactable{TransactableCaller: TransactableCaller{contract: contract}, TransactableTransactor: TransactableTransactor{contract: contract}, TransactableFilterer: TransactableFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "e189e5bcf5ea3559f20c2c0cac5c626a", "score": "0.48603457", "text": "func NewMockedPerceptor() (*Perceptor, error) {\n\tmockConfig := Config{\n\t\tHubHost: \"mock host\",\n\t\tHubUser: \"mock user\",\n\t\tConcurrentScanLimit: 2,\n\t}\n\treturn newPerceptorHelper(hub.NewMockHub(\"mock hub version\"), &mockConfig), nil\n}", "title": "" }, { "docid": "8d3e30e8bc98386850ceee165ef6924a", "score": "0.48413286", "text": "func NewAssigntokenTransactor(address common.Address, transactor bind.ContractTransactor) (*AssigntokenTransactor, error) {\n\tcontract, err := bindAssigntoken(address, nil, transactor)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &AssigntokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "38cea2ab2c645910bc50d387542cc343", "score": "0.4832945", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.48319831", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.48319831", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.48319831", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.48319831", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.48319831", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.48319831", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.48319831", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.48319831", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.48319831", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "48f3567cbf8d3312fd8d4773c09833f0", "score": "0.48307446", "text": "func NewOwnableTransactor(address common.Address, transactor bind.ContractTransactor) (*OwnableTransactor, error) {\n\tcontract, err := bindOwnable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &OwnableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "9c63e45a1da1accbc6bb26fe5bc6a247", "score": "0.48270988", "text": "func NewAssigntokenCaller(address common.Address, caller bind.ContractCaller) (*AssigntokenCaller, error) {\n\tcontract, err := bindAssigntoken(address, caller, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &AssigntokenCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "63749a8f3fc1db9f257b6316f659aa48", "score": "0.48244715", "text": "func newTaskAllocator(shard ShardContext) taskAllocator {\n\treturn &taskAllocatorImpl{\n\t\tcurrentClusterName: shard.GetService().GetClusterMetadata().GetCurrentClusterName(),\n\t\tshard: shard,\n\t\tdomainCache: shard.GetDomainCache(),\n\t\tlogger: shard.GetLogger(),\n\t}\n}", "title": "" }, { "docid": "18b797f16330e70ade24d7526bec558f", "score": "0.48157892", "text": "func newMockTxn() Transaction {\n\treturn &mockTxn{\n\t\topts: make(map[int]interface{}),\n\t\tvalid: true,\n\t}\n}", "title": "" }, { "docid": "b7a06b45ed74b0bc383ddefd99d15928", "score": "0.48155814", "text": "func (_PausableTokenMock *PausableTokenMockTransactorRaw) Transact(opts *bind.TransactOpts, method string, params ...interface{}) (*types.Transaction, error) {\n\treturn _PausableTokenMock.Contract.contract.Transact(opts, method, params...)\n}", "title": "" }, { "docid": "b4ae7a515092d7085d4e84cbd2116bfe", "score": "0.48116603", "text": "func NewPausableCaller(address common.Address, caller bind.ContractCaller) (*PausableCaller, error) {\n\tcontract, err := bindPausable(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "b4ae7a515092d7085d4e84cbd2116bfe", "score": "0.48116603", "text": "func NewPausableCaller(address common.Address, caller bind.ContractCaller) (*PausableCaller, error) {\n\tcontract, err := bindPausable(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "b4ae7a515092d7085d4e84cbd2116bfe", "score": "0.48116603", "text": "func NewPausableCaller(address common.Address, caller bind.ContractCaller) (*PausableCaller, error) {\n\tcontract, err := bindPausable(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "b4ae7a515092d7085d4e84cbd2116bfe", "score": "0.48116603", "text": "func NewPausableCaller(address common.Address, caller bind.ContractCaller) (*PausableCaller, error) {\n\tcontract, err := bindPausable(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "b4ae7a515092d7085d4e84cbd2116bfe", "score": "0.48116603", "text": "func NewPausableCaller(address common.Address, caller bind.ContractCaller) (*PausableCaller, error) {\n\tcontract, err := bindPausable(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PausableCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "c96e94b22d3770e9d670e2c213af85ef", "score": "0.47972012", "text": "func NewTestDepositTokenContractTransactor(address common.Address, transactor bind.ContractTransactor) (*TestDepositTokenContractTransactor, error) {\n\tcontract, err := bindTestDepositTokenContract(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TestDepositTokenContractTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "79c5af836d6411d7e2dffbeb55cd6118", "score": "0.47923654", "text": "func NewMockTransport() *MockTransport {\n\treturn &MockTransport{pushed: brahms.View{}, pulls: map[brahms.NID]brahms.View{}}\n}", "title": "" }, { "docid": "92a3fd5f01a6c9b93f0edfc02bfefc0e", "score": "0.47812375", "text": "func NewTransport() *MockTransport {\n\treturn &MockTransport{}\n}", "title": "" }, { "docid": "69d0a66668ba19594d43c7346a971761", "score": "0.47535688", "text": "func NewContractSubmitter(t mockConstructorTestingTNewContractSubmitter) *ContractSubmitter {\n\tmock := &ContractSubmitter{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "efe71cc7d8a4eea105d89a5d7119d41f", "score": "0.47495306", "text": "func TestInvoke_DeployToken(t *testing.T) {\n\tlog.LLvl1(\"Deploying Token Contract\")\n\n\t//Preparing ledger\n\tbct := newBCTest(t)\n\tbct.local.Check = onet.CheckNone\n\tdefer bct.Close()\n\n\t//Instantiating evm\n\targs := byzcoin.Arguments{}\n\tinstID := bct.createInstance(t, args)\n\n\t// Get the proof from byzcoin\n\treply, err := bct.cl.GetProof(instID.Slice())\n\trequire.Nil(t, err)\n\n\t// Make sure the proof is a matching proof and not a proof of absence.\n\tpr := reply.Proof\n\trequire.True(t, pr.InclusionProof.Match(instID.Slice()))\n\n\t_, err = bct.cl.WaitProof(instID, bct.gMsg.BlockInterval, nil)\n\trequire.Nil(t, err)\n\n\n\t//CREDIT\n\t//Preparing parameters to credit account to have enough ether to deploy\n\taddressA := \"0x2afd357E96a3aCbcd01615681C1D7e3398d5fb61\"\n\taddressABuffer := []byte(addressA)\n\targs = byzcoin.Arguments{\n\t\t{\n\t\t\tName: \"address\",\n\t\t\tValue: addressABuffer,\n\t\t},\n\t}\n\n\t//Send credit instructions to Byzcoin and incrementing nonce counter\n\tbct.creditAccountInstance(t, instID, args)\n\tbct.ct = bct.ct +1\n\n\t//Verifying account credit\n\tbct.displayAccountInstance(t, instID, args)\n\tbct.ct = bct.ct +1\n\n\t//DEPLOY\n\t//Getting smartcontract abi and bytecode\n\tRawAbi, bytecode := getSmartContract(\"MinimumToken\")\n\n\t//Getting transaction parameters\n\tgasLimit, gasPrice := transactionGasParameters()\n\n\t//Creating deploying transaction\n\tdeployTx := types.NewContractCreation(0, big.NewInt(0), gasLimit, gasPrice, common.Hex2Bytes(bytecode))\n\n\t//Signing transaction with private key corresponding to addressA\n\tprivateA := \"a33fca62081a2665454fe844a8afbe8e2e02fb66af558e695a79d058f9042f0d\"\n\tsignedTxBuffer, err := signAndMarshalTx(privateA, deployTx)\n\trequire.Nil(t, err)\n\targs = byzcoin.Arguments{\n\t\t{\n\t\t\tName: \"tx\",\n\t\t\tValue: signedTxBuffer,\n\t\t},\n\t}\n\n\tbct.transactionInstance(t, instID, args)\n\tbct.ct = bct.ct +1\n\n\targs = byzcoin.Arguments{\n\t\t{\n\t\t\tName: \"address\",\n\t\t\tValue: addressABuffer,\n\t\t},\n\t}\n\n\t//Verifying account credit\n\tbct.displayAccountInstance(t, instID, args)\n\tbct.ct = bct.ct +1\n\n\t//CONSTRUCTOR\n\t//Calling constructor method to mint 100 coins\n\tmethodBuf, err := abiMethodPack(RawAbi, \"constructor\", addressA, big.NewInt(100))\n\trequire.Nil(t, err)\n\n\n\t//Old hardcoded contract address : contractAddress := common.HexToAddress(\"0x45663483f58d687c8aF17B85cCCDD9391b567498\")\n\t//The contract address is derived from the sending address and its nonce\n\tcontractAddress := crypto.CreateAddress(common.HexToAddress(addressA), deployTx.Nonce())\n\n\n\tconstructorTx := types.NewTransaction(0, contractAddress, big.NewInt(0), gasLimit, gasPrice, methodBuf)\n\ttxBuffer, err := signAndMarshalTx(privateA, constructorTx)\n\trequire.Nil(t, err)\n\targs = byzcoin.Arguments{\n\t\t{\n\t\t\tName: \"tx\",\n\t\t\tValue: txBuffer,\n\n\t\t},\n\t}\n\tbct.transactionInstance(t,instID, args)\n\tbct.ct = bct.ct + 1\n\n\n\t//TRANSACT A to B\n\t//Now send a token transaction from A to B\n\taddressB := \"0x2887A24130cACFD8f71C479d9f9Da5b9C6425CE8\"\n\ttoAddress := common.HexToAddress(addressB)\n\tfromAddress := common.HexToAddress(addressA)\n\tmethodBuf, err = abiMethodPack(RawAbi, \"transferFrom\",fromAddress, toAddress, big.NewInt(1))\n\trequire.Nil(t, err)\n\n\t//create transaction\n\tsendTxAB := types.NewTransaction(0, contractAddress, big.NewInt(0), gasLimit, gasPrice, methodBuf)\n\ttxBufferAB, err := signAndMarshalTx(privateA, sendTxAB)\n\trequire.Nil(t, err)\n\targs = byzcoin.Arguments{\n\t\t{\n\t\t\tName: \"tx\",\n\t\t\tValue: txBufferAB,\n\n\t\t},\n\t}\n\tbct.transactionInstance(t,instID, args)\n\tbct.ct = bct.ct +1\n\n\n}", "title": "" }, { "docid": "9641886a0e3bcf1ea10a24b02231efee", "score": "0.47280106", "text": "func deployLockedTokensContract(\n\tt *testing.T,\n\tb *emulator.Blockchain,\n\tIDTableAddr, proxyAddr flow.Address,\n\tlockedTokensAccountKey *flow.AccountKey,\n\tadminAddress flow.Address,\n\tadminSigner crypto.Signer,\n) flow.Address {\n\n\t// Get the code of the locked tokens contract\n\t// with the import addresses replaced\n\tlockedTokensCode := contracts.FlowLockedTokens(\n\t\temulatorFTAddress,\n\t\temulatorFlowTokenAddress,\n\t\tIDTableAddr.Hex(),\n\t\tproxyAddr.Hex(),\n\t\tb.ServiceKey().Address.String(),\n\t)\n\t// Encode the contract as a Cadence string\n\tcadenceCode := CadenceString(hex.EncodeToString(lockedTokensCode))\n\n\t// Create the locked tokens account key array and a key\n\tpublicKeys := make([]cadence.Value, 1)\n\tpublicKeys[0] = bytesToCadenceArray(lockedTokensAccountKey.Encode())\n\tcadencePublicKeys := cadence.NewArray(publicKeys)\n\n\t// Create the transaction template to deploy the locked tokens contract\n\ttx := createTxWithTemplateAndAuthorizer(b, templates.GenerateDeployLockedTokens(), adminAddress)\n\t// Add the arguments for contract name, contract code, and public keys for the account\n\ttx.AddRawArgument(jsoncdc.MustEncode(CadenceString(\"LockedTokens\")))\n\ttx.AddRawArgument(jsoncdc.MustEncode(cadenceCode))\n\ttx.AddRawArgument(jsoncdc.MustEncode(cadencePublicKeys))\n\n\t// Sign and submit the transaction\n\terr := tx.SignPayload(adminAddress, 0, adminSigner)\n\tassert.NoError(t, err)\n\terr = tx.SignEnvelope(b.ServiceKey().Address, b.ServiceKey().Index, b.ServiceKey().Signer())\n\trequire.NoError(t, err)\n\terr = b.AddTransaction(*tx)\n\trequire.NoError(t, err)\n\tresult, err := b.ExecuteNextTransaction()\n\trequire.NoError(t, err)\n\trequire.NoError(t, result.Error)\n\n\t// Search emitted events from the transaction result\n\t// to find the address of the locked tokens contract\n\tvar lockedTokensAddr flow.Address\n\n\tfor _, event := range result.Events {\n\t\tif event.Type == flow.EventAccountCreated {\n\t\t\taccountCreatedEvent := flow.AccountCreatedEvent(event)\n\t\t\tlockedTokensAddr = accountCreatedEvent.Address()\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// Commit the result as a block\n\t_, err = b.CommitBlock()\n\trequire.NoError(t, err)\n\n\t// Mint tokens for the locked tokens admin\n\tscript := ft_templates.GenerateMintTokensScript(\n\t\tflow.HexToAddress(emulatorFTAddress),\n\t\tflow.HexToAddress(emulatorFlowTokenAddress),\n\t\t\"FlowToken\",\n\t)\n\ttx = createTxWithTemplateAndAuthorizer(b, script, b.ServiceKey().Address)\n\t_ = tx.AddArgument(cadence.NewAddress(lockedTokensAddr))\n\t_ = tx.AddArgument(CadenceUFix64(\"1000000000.0\"))\n\n\tsignAndSubmit(\n\t\tt, b, tx,\n\t\t[]flow.Address{b.ServiceKey().Address},\n\t\t[]crypto.Signer{b.ServiceKey().Signer()},\n\t\tfalse,\n\t)\n\n\treturn lockedTokensAddr\n}", "title": "" }, { "docid": "aec51beb25e7396ca57d4b27fec5755a", "score": "0.47196007", "text": "func NewMapperTransactor(address common.Address, transactor bind.ContractTransactor) (*MapperTransactor, error) {\n\tcontract, err := bindMapper(address, nil, transactor)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &MapperTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "4d953686b9727a306300753db7638319", "score": "0.4707862", "text": "func newJWTManager(secretKey string, tokenDuration time.Duration) *JWTManager {\n\tsecretKey = strings.TrimSpace(secretKey)\n\tif tokenDuration <= 0 {\n\t\ttokenDuration = DeaultTokenDuration\n\t}\n\n\treturn &JWTManager{\n\t\tsecretKey: secretKey,\n\t\ttokenDuration: tokenDuration,\n\t}\n}", "title": "" }, { "docid": "6be3dc9411f58ef7a24647a6bebd70ec", "score": "0.47022036", "text": "func newMockAddressProvider(t interface {\n\tmock.TestingT\n\tCleanup(func())\n}) *mockAddressProvider {\n\tmock := &mockAddressProvider{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "503126af61a9197f43587f07d5ebf605", "score": "0.46903023", "text": "func NewMathMockTransactor(address common.Address, transactor bind.ContractTransactor) (*MathMockTransactor, error) {\n\tcontract, err := bindMathMock(address, nil, transactor)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &MathMockTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "4b72242204dba4e40c575c8db41f00c2", "score": "0.46874496", "text": "func (p *ServiceAccountTokenProvider) Create(userInfo *provider.UserInfo, sa *kubermaticv1.User, projectID, tokenName, tokenID, token string) (*v1.Secret, error) {\n\tif userInfo == nil {\n\t\treturn nil, kerrors.NewBadRequest(\"userInfo cannot be nil\")\n\t}\n\tif sa == nil {\n\t\treturn nil, kerrors.NewBadRequest(\"service account cannot be nil\")\n\t}\n\n\tsecret := genToken(sa, projectID, tokenName, tokenID, token)\n\tsecret.Namespace = resources.KubermaticNamespace\n\tkubernetesImpersonatedClient, err := createImpersonationClientWrapperFromUserInfo(userInfo, p.kubernetesImpersonationClient)\n\tif err != nil {\n\t\treturn nil, kerrors.NewInternalError(err)\n\t}\n\n\tif err := kubernetesImpersonatedClient.Create(context.Background(), secret); err != nil {\n\t\treturn nil, err\n\t}\n\tsecret.Name = removeTokenPrefix(secret.Name)\n\treturn secret, nil\n}", "title": "" }, { "docid": "9da1e998192b8f9661db97dbacb7661f", "score": "0.46833146", "text": "func mockToken(name string, tokenType token.Type, line, column int) *token.Token {\n\treturn &token.Token{\n\t\tType: tokenType,\n\t\tLit: []byte(name),\n\t\tPos: token.Pos{Offset: (line-1)*80 + column, Line: line, Column: column},\n\t}\n}", "title": "" }, { "docid": "db6ce09e97b327be58c980ff5fa36346", "score": "0.4681241", "text": "func NewPotTransactor(address common.Address, transactor bind.ContractTransactor) (*PotTransactor, error) {\n\tcontract, err := bindPot(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PotTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "95cb5b8142e7ae67bf049bbd0d8f571f", "score": "0.46694398", "text": "func NewStakingTransactor(address common.Address, transactor bind.ContractTransactor) (*StakingTransactor, error) {\n\tcontract, err := bindStaking(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &StakingTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "b6434c38481bea53c9e1721458f7ea75", "score": "0.46591523", "text": "func NewSmartTokenCaller(address common.Address, caller bind.ContractCaller) (*SmartTokenCaller, error) {\n\tcontract, err := bindSmartToken(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &SmartTokenCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "626a81d427b4f5d3bff4a8eb8956d5ba", "score": "0.4646891", "text": "func (_PausableTokenMock *PausableTokenMockRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _PausableTokenMock.Contract.PausableTokenMockTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "55354febc288b18669976f688f27048d", "score": "0.46207324", "text": "func NewDummyERC20TokenTransactor(address common.Address, transactor bind.ContractTransactor) (*DummyERC20TokenTransactor, error) {\n\tcontract, err := bindDummyERC20Token(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &DummyERC20TokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "a4d37401fae9201bab24ad3383eb3e3c", "score": "0.4613246", "text": "func (ti *TokenIssue) newToken(\n\ttokenAddress types.Address,\n\towner types.Address,\n\tname string,\n\tsymbol string,\n\ttotalSupply bn.Number,\n\taddSupplyEnabled bool,\n\tburnEnabled bool,\n\tgasPrice int64,\n\torgName string) {\n\t// If it owns a token, it's not the genesis contract, cannot execute this function.\n\tsdk.Require(ti.sdk.Message().Contract().Token() == \"\",\n\t\ttypes.ErrNoAuthorization, \"The contract has already registered a token\")\n\n\tsdk.Require(totalSupply.IsEqualI(0) || totalSupply.IsGEI(minTotalsupply),\n\t\ttypes.ErrInvalidParameter, \"Invalid total supply\")\n\n\tsdk.Require(gasPrice >= ti.sdk.Helper().TokenHelper().BaseGasPrice() && gasPrice <= maxGasPrice,\n\t\ttypes.ErrInvalidParameter, \"Invalid gas price\")\n\n\tif orgName == \"\" {\n\t\ttoken := ti.setNewToken(tokenAddress, owner, name, symbol, totalSupply, addSupplyEnabled, burnEnabled, gasPrice, \"\", \"\")\n\t\tti.setNewContract(nil, token, ti.contractNameBRC20(name))\n\t} else {\n\t\ttoken := ti.setNewToken(tokenAddress, owner, name, symbol, totalSupply, addSupplyEnabled, burnEnabled, gasPrice, orgName, \"BRC30\")\n\t\tti.setNewContract(nil, token, ti.contractNameBRC30(orgName, name))\n\t}\n\n}", "title": "" }, { "docid": "148fe3ef50197b812c118e90e24fa379", "score": "0.4603693", "text": "func NewTransactableTransactor(address common.Address, transactor bind.ContractTransactor) (*TransactableTransactor, error) {\n\tcontract, err := bindTransactable(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TransactableTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "df9e4857431e6789436f28f9ee5542f4", "score": "0.46006113", "text": "func NewNectarTokenTransactor(address common.Address, transactor bind.ContractTransactor) (*NectarTokenTransactor, error) {\n\tcontract, err := bindNectarToken(address, nil, transactor)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &NectarTokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "c303ba5e6f9a70bc3326467edb9dba4b", "score": "0.45976213", "text": "func NewStandardTokenMockFilterer(address common.Address, filterer bind.ContractFilterer) (*StandardTokenMockFilterer, error) {\n\tcontract, err := bindStandardTokenMock(address, nil, nil, filterer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &StandardTokenMockFilterer{contract: contract}, nil\n}", "title": "" }, { "docid": "552d3d3997265d372c617b2a525773be", "score": "0.4593", "text": "func NewMockSerializable(t interface {\n\tmock.TestingT\n\tCleanup(func())\n}) *MockSerializable {\n\tmock := &MockSerializable{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "eebf3bc03c0373f8aedf0c2617205e66", "score": "0.45856908", "text": "func NewTokenVestingTransactor(address common.Address, transactor bind.ContractTransactor) (*TokenVestingTransactor, error) {\n\tcontract, err := bindTokenVesting(address, nil, transactor, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TokenVestingTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "5ef2f14111e06d616263eb5627e6a1f5", "score": "0.4583157", "text": "func NewTelemClient(t mockConstructorTestingTNewTelemClient) *TelemClient {\n\tmock := &TelemClient{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "51601f6d8915b82d658e88b4c70fb98f", "score": "0.4577748", "text": "func NewStandardTokenCaller(address common.Address, caller bind.ContractCaller) (*StandardTokenCaller, error) {\n\tcontract, err := bindStandardToken(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &StandardTokenCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "cb047c4d709f8ed243784ec9a0f10a92", "score": "0.4575121", "text": "func NewStandardTokenCaller(address common.Address, caller bind.ContractCaller) (*StandardTokenCaller, error) {\n\tcontract, err := bindStandardToken(address, caller, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &StandardTokenCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "b4839748dec651cfd07a8827f9b7ec78", "score": "0.45695108", "text": "func createToken(req *logical.Request, b logical.Backend, t *testing.T, roleName string, claimName string) (*logical.Response, error) {\n\tdata := map[string]interface{}{\n\t\t\"role_name\": roleName,\n\t\t\"token_type\": \"jwt\",\n\t}\n\n\t// set the claim to use if specified\n\tif claimName != \"\" {\n\t\tdata[\"claim_name\"] = claimName\n\t}\n\n\treq.Operation = logical.UpdateOperation\n\treq.Path = \"token/issue\"\n\treq.Data = data\n\n\tstart := time.Now()\n\tresp, err := b.HandleRequest(req)\n\tfmt.Printf(\"Issue Token took %s\\n\", time.Since(start))\n\n\treturn resp, err\n}", "title": "" }, { "docid": "05d28eba316e26ea68d5b38f93f1aba6", "score": "0.45580164", "text": "func CreateToken(p *models.Person) (tokenString string, err error) {\n token := jwt.NewWithClaims(jwt.SigningMethodHS256, TokenClaims{\n Name: p.Name,\n StandardClaims: jwt.StandardClaims{\n NotBefore: time.Now().Unix(),\n },\n })\n\n tokenString, err = token.SignedString([]byte(hmacSampleSecret))\n\n return\n}", "title": "" }, { "docid": "a8138eade87d2773a8a4ed5d3d9d623c", "score": "0.4542186", "text": "func setupTestCVLTokenContract(client bind.ContractBackend, auth *bind.TransactOpts) (common.Address,\n\t*contract.CVLTokenContract, error) {\n\ttokenControllerAddress, _, _, err := deployCivilTokenController(client, auth)\n\tif err != nil {\n\t\treturn common.Address{}, nil, err\n\t}\n\taddress, _, contract, err := contract.DeployCVLTokenContract(\n\t\tauth,\n\t\tclient,\n\t\tbig.NewInt(9223372036854775807),\n\t\t\"CivilTokenTest\",\n\t\t18,\n\t\t\"CVLT\",\n\t\ttokenControllerAddress,\n\t)\n\tif err != nil {\n\t\treturn common.Address{}, nil, err\n\t}\n\treturn address, contract, nil\n}", "title": "" }, { "docid": "d43a9f0af0209e9d9b2d7d921abc856b", "score": "0.45416492", "text": "func NewStandardToken(address common.Address, backend bind.ContractBackend) (*StandardToken, error) {\n\tcontract, err := bindStandardToken(address, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &StandardToken{StandardTokenCaller: StandardTokenCaller{contract: contract}, StandardTokenTransactor: StandardTokenTransactor{contract: contract}}, nil\n}", "title": "" }, { "docid": "05d860e5ca2e699197ea5d7e09acda1e", "score": "0.4534787", "text": "func NewRealEnvWithPPSTransactionMock(ctx context.Context, t testing.TB, customOpts ...pachconfig.ConfigOption) *RealEnv {\n\tnoInterceptor := func(mock *testpachd.MockPachd) grpcutil.Interceptor {\n\t\treturn grpcutil.Interceptor{}\n\t}\n\treturn newRealEnv(ctx, t, true, noInterceptor, customOpts...)\n}", "title": "" }, { "docid": "c50ad462cab43435a00b45b74a16294f", "score": "0.4532643", "text": "func NewTestDepositTokenContractCaller(address common.Address, caller bind.ContractCaller) (*TestDepositTokenContractCaller, error) {\n\tcontract, err := bindTestDepositTokenContract(address, caller, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TestDepositTokenContractCaller{contract: contract}, nil\n}", "title": "" }, { "docid": "dec249b185ea8216ce98f6c3f99e1d22", "score": "0.45321903", "text": "func getNewToken(t *testing.T, authorizedAction string) string {\n\tctx := context.Background()\n\n\tauthnConnection, err := suite.connFactory.DialContext(\n\t\tctx,\n\t\t\"authn-service\",\n\t\tauthNAddress,\n\t\tgrpc.WithBlock(),\n\t)\n\trequire.NoError(t, err)\n\tdefer authnConnection.Close() // nolint: errcheck\n\n\tauthnClient := authn.NewTokensMgmtServiceClient(authnConnection)\n\n\tctx = auth_context.NewOutgoingContext(auth_context.NewContext(ctx,\n\t\t[]string{\"tls:service:deployment-service:internal\"}, []string{}, \"res\", \"act\"))\n\tresponse, err := authnClient.CreateToken(ctx, &authn.CreateTokenReq{\n\t\tId: uuid.Must(uuid.NewV4()).String(),\n\t\tName: \"token for event-service integration test\",\n\t\tActive: true,\n\t\tProjects: []string{},\n\t})\n\trequire.NoError(t, err)\n\n\tpolID := \"nats-test-policy-\" + uuid.Must(uuid.NewV4()).String()\n\t_, err = suite.AuthzClient.CreatePolicy(ctx, &policies.CreatePolicyReq{\n\t\tId: polID,\n\t\tName: polID,\n\t\tMembers: []string{fmt.Sprintf(\"token:%s\", response.Id)},\n\t\tStatements: []*policies.Statement{\n\t\t\t&policies.Statement{\n\t\t\t\tEffect: policies.Statement_ALLOW,\n\t\t\t\tActions: []string{authorizedAction},\n\t\t\t\tProjects: []string{\"*\"},\n\t\t\t},\n\t\t},\n\t\tProjects: []string{},\n\t})\n\trequire.NoError(t, err)\n\n\treturn response.Value\n}", "title": "" }, { "docid": "2f3a33c05a3b5fe3860b28e0b1967e33", "score": "0.45310634", "text": "func NewStandardToken(address common.Address, backend bind.ContractBackend) (*StandardToken, error) {\n\tcontract, err := bindStandardToken(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &StandardToken{StandardTokenCaller: StandardTokenCaller{contract: contract}, StandardTokenTransactor: StandardTokenTransactor{contract: contract}, StandardTokenFilterer: StandardTokenFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "4ab67482698e2c4be5a0d8410262f33d", "score": "0.45232195", "text": "func NewSNMTTokenTransactor(address common.Address, transactor bind.ContractTransactor) (*SNMTTokenTransactor, error) {\n\tcontract, err := bindSNMTToken(address, nil, transactor)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &SNMTTokenTransactor{contract: contract}, nil\n}", "title": "" }, { "docid": "f2d88256c2f2f84161bc5c4a3da76380", "score": "0.45144367", "text": "func newMockService() *genericMockRoundTripper {\n\treturn &genericMockRoundTripper{\n\t\tmockResponses: map[*mux.Route]interface{}{\n\t\t\ttransport.NewAPIRouter().Get(\"UpdateManifests\"): job.ID(\"here-is-a-job-id\"),\n\t\t\ttransport.NewAPIRouter().Get(\"JobStatus\"): job.Status{\n\t\t\t\tStatusString: job.StatusSucceeded,\n\t\t\t},\n\t\t},\n\t\trequestHistory: make(map[string]*http.Request),\n\t}\n}", "title": "" }, { "docid": "cf0405a3e7da989e232723eea43a49bc", "score": "0.45126292", "text": "func (_StandardTokenMock *StandardTokenMockRaw) Transact(opts *bind.TransactOpts, method string, params ...interface{}) (*types.Transaction, error) {\n\treturn _StandardTokenMock.Contract.StandardTokenMockTransactor.contract.Transact(opts, method, params...)\n}", "title": "" }, { "docid": "48b83e8e1f08712fa597e66f1ef6e138", "score": "0.45100453", "text": "func newMockWriteRequestFactory(t interface {\n\tmock.TestingT\n\tCleanup(func())\n}) *mockWriteRequestFactory {\n\tmock := &mockWriteRequestFactory{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "cc8cfd93467f3f034a62210d9ed0375c", "score": "0.45093417", "text": "func NewAuthenticator(t mockConstructorTestingTNewAuthenticator) *Authenticator {\n\tmock := &Authenticator{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "73d16a4b9ed82ff00ff0c81c9a43652a", "score": "0.45072925", "text": "func newOauthToken(clientId string, ownerId OauthTokenOwnerId, duration time.Duration, scopes []string) *OauthToken {\n\toauthToken := GenerateRandomString(32)\n\n\treturn &OauthToken{\n\t\tToken: oauthToken,\n\t\tClientId: clientId,\n\t\tOwnerId: ownerId,\n\t\tExpiresAt: time.Now().Add(duration),\n\t\tScopes: scopes,\n\t}\n}", "title": "" }, { "docid": "cd1c2f4a3ba10c3553483260abe185f8", "score": "0.45007035", "text": "func NewMock(salt byte) *Mock {\n\treturn &Mock{salt: salt}\n}", "title": "" } ]
277ec7e4f3225f0201e156790e5322bd
Predecessor return the biggest newKey, which newKey < key
[ { "docid": "ac81574205a416f1a205b2b861559a3e", "score": "0.69751936", "text": "func (rb RBTree) Predecessor(key int) (int, error) {\n\tnode := rb.searchNode(key)\n\tif node == rb.nil() {\n\t\treturn 0, fmt.Errorf(\"key %v does not exist\", key)\n\t}\n\n\tif node.leftChild != rb.nil() {\n\t\tnewNode := rb.maximumNode(node.leftChild)\n\t\treturn newNode.key, nil\n\t}\n\n\tp := node.parent\n\tfor p != rb.nil() {\n\t\tif node == p.rightChild {\n\t\t\treturn p.key, nil\n\t\t}\n\n\t\tnode = p\n\t\tp = node.parent\n\t}\n\treturn 0, fmt.Errorf(\"key %v already the min key\", key)\n}", "title": "" } ]
[ { "docid": "5b74af3b61d29149a1decd1d83cd8330", "score": "0.6389192", "text": "func (c *Chord) findPredecessor(ctx context.Context, key *chord.Key) *chord.ChordNode {\n\n // Return predecessor if this node should be holding key \n /*\n n := c.Int()\n if n == key.Id {\n pbc := &chord.ChordNode{Node: c.predecessor.node.Pb, Successor: c.Pb}\n return pbc\n }\n */\n\n // Else search for successor of key\n pbc := &chord.ChordNode{Node: c.Pb, Successor: c.successor.node.Pb}\n np := c.newChord(pbc, nil)\n\n log.Printf(\"findPredecessor: Finding key: %d\\n\", key.Id)\n\n // While the id is not between a given node 'np' and their successor \n id := &finger{start: key.Id, m: c.m}\n for !id.halfClosedRight(np.Int(), np.successor.node.Int()) {\n\n // 'np' is a locally running instance\n // unexported closestPrecedingFinger() takes advantage of recycling client\n // connections to np's finger nodes\n if np.cl == nil {\n\n np, _ = np.closestPrecedingFinger(ctx, key)\n\n // else 'np' is a remote instance \n } else {\n\n pbc, _ := np.cl.Inf.(chord.ChordClient).ClosestPrecedingFinger(ctx, key)\n np = c.newChord(pbc, nil)\n }\n }\n\n pbc = np.Marshall()\n return pbc\n}", "title": "" }, { "docid": "4f267292a10c70fa5f420100da3d91ff", "score": "0.6292929", "text": "func prev(ba roachpb.BatchRequest, k roachpb.RKey) roachpb.RKey {\n\tcandidate := roachpb.RKeyMin\n\tfor _, union := range ba.Requests {\n\t\th := union.GetInner().Header()\n\t\taddr := keys.Addr(h.Key)\n\t\teAddr := keys.Addr(h.EndKey)\n\t\tif len(eAddr) == 0 {\n\t\t\t// Can probably avoid having to compute Next() here if\n\t\t\t// we're in the mood for some more complexity.\n\t\t\teAddr = addr.Next()\n\t\t}\n\t\tif !eAddr.Less(k) {\n\t\t\tif !k.Less(addr) {\n\t\t\t\t// Range contains k, so won't be able to go lower.\n\t\t\t\treturn k\n\t\t\t}\n\t\t\t// Range is disjoint from [KeyMin,k).\n\t\t\tcontinue\n\t\t}\n\t\t// We want the largest surviving candidate.\n\t\tif candidate.Less(addr) {\n\t\t\tcandidate = addr\n\t\t}\n\t}\n\treturn candidate\n}", "title": "" }, { "docid": "c79fe8d548be986805149c3f22dde9e6", "score": "0.62128854", "text": "func replaceWithPredecessor(node *btnode, kidx int, stack *[]*nodeTrace) *btnode {\n\tnext := node.nodes[kidx]\n\tfor !next.isLeaf() {\n\t\t*stack = append(*stack, &nodeTrace{next, len(next.nodes) - 1})\n\t\tnext = next.last()\n\t}\n\tnode.keys[kidx] = next.max()\n\treturn next\n}", "title": "" }, { "docid": "af83ee2cbaa51a7ffab282d66ac5d4cb", "score": "0.6095593", "text": "func (this *SkipList) getPrevious(key interface{}) []*node {\r\n\tcur := this.root\r\n\th := len(cur.next)\r\n\tnodes := make([]*node, h)\r\n\tfor i := h-1; i >= 0; i-- {\r\n\t\tfor cur.next[i] != nil && this.less(cur.next[i].key, key) {\r\n\t\t\tcur = cur.next[i]\r\n\t\t}\r\n\t\tnodes[i] = cur\r\n\t}\r\n\treturn nodes\r\n}", "title": "" }, { "docid": "38819a7cbf6c2500945ecf564d44dbd4", "score": "0.60717964", "text": "func (r *HashRing) Predecessor(key []byte) (*VirtualNode, error) {\n\treturn r.state.Load().(*hashRingState).predecessor(key)\n}", "title": "" }, { "docid": "0573e86e34ecab967e77ed2cbf83046c", "score": "0.5823013", "text": "func (c *KeyContext) Prev(colIdx int, val tree.Datum) (_ tree.Datum, ok bool) {\n\tif c.Columns.Get(colIdx).Ascending() {\n\t\tif val.IsMin(c.EvalCtx) {\n\t\t\treturn nil, false\n\t\t}\n\t\treturn val.Prev(c.EvalCtx)\n\t}\n\tif val.IsMax(c.EvalCtx) {\n\t\treturn nil, false\n\t}\n\treturn val.Next(c.EvalCtx)\n}", "title": "" }, { "docid": "8e710b757dcd18933b096e88ba3572ce", "score": "0.582148", "text": "func (kpl *KeyPointerList) MinKey() Key {\n\tif len(*kpl) == 0 {\n\t\treturn MinKey\n\t}\n\treturn (*kpl)[0].Key\n}", "title": "" }, { "docid": "0312d6b0420a50e665017dc26dee39f9", "score": "0.5808203", "text": "func (fh *FibonacciHeap) decreaseKey(iNode interface{}, key float64) {\n\tif iNode == nil {\n\t\tpanic(\"nil value given\")\n\t}\n\tnode := iNode.(*node)\n\n\t// Verify precondition.\n\tif key > node.key {\n\t\tpanic(\"new key is greater than current key\")\n\t}\n\tif !node.isQueued {\n\t\tpanic(\"node isn't queued\")\n\t}\n\n\t// Assign new key.\n\tnode.key = key\n\n\t// Cut the node from its parent and cascade the cuts upward if the heap\n\t// property just became violated.\n\tif node.parent != nil && node.key < node.parent.key {\n\t\tp := node.parent\n\t\tfh.cut(node)\n\t\tfh.cascadingCut(p)\n\t}\n\n\t// Set the minimum of the heap if necessary.\n\tif node.key < fh.min.key {\n\t\tfh.min = node\n\t}\n}", "title": "" }, { "docid": "1009ade9a2861861a963c02e86822d20", "score": "0.57747215", "text": "func (n Node) closestPrecedingNode(id *big.Int) Address {\n\tfor i := numFingerEntries - 1; i > 0; i-- {\n\t\tif n.Fingers[i] == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\tif between(n.Hash, n.Fingers[i].hashed(), id, false) {\n\t\t\t// log.Printf(\"closest preceding node: using finger entry @ index %d\", i)\n\t\t\treturn n.Fingers[i]\n\t\t}\n\t}\n\t// Otherwise just return successor\n\treturn n.Successors[0]\n}", "title": "" }, { "docid": "210923bd4d8cd3192491131b901989fe", "score": "0.5673043", "text": "func next(ba roachpb.BatchRequest, k roachpb.RKey) roachpb.RKey {\n\tcandidate := roachpb.RKeyMax\n\tfor _, union := range ba.Requests {\n\t\th := union.GetInner().Header()\n\t\taddr := keys.Addr(h.Key)\n\t\tif addr.Less(k) {\n\t\t\tif eAddr := keys.Addr(h.EndKey); k.Less(eAddr) {\n\t\t\t\t// Starts below k, but continues beyond. Need to stay at k.\n\t\t\t\treturn k\n\t\t\t}\n\t\t\t// Affects only [KeyMin,k).\n\t\t\tcontinue\n\t\t}\n\t\t// We want the smallest of the surviving candidates.\n\t\tif addr.Less(candidate) {\n\t\t\tcandidate = addr\n\t\t}\n\t}\n\treturn candidate\n}", "title": "" }, { "docid": "a4a1a6732207f336d7f647d06bc5d569", "score": "0.5641256", "text": "func (tl *TodoList) findPredecessors(x int) []*TNode {\n\theight := tl.height\n\tresult := make([]*TNode, height+1)\n\n\t// find them\n\tresult[0] = &tl.Sentinel // get the first sentinel\n\tfor i := 0; i <= height; i++ {\n\t\tnextGuy := result[i].Next(i)\n\t\tif nextGuy != nil && nextGuy.key < x {\n\t\t\tresult[i] = nextGuy\n\t\t}\n\t\tif i+1 <= height {\n\t\t\tresult[i+1] = result[i] // go down (autoamatically)\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "c0fa9c06f2958fdcd5b6e1bfd55b2ba9", "score": "0.56360465", "text": "func (n *LockingTree) LowestKey() uint {\n\tn.mu.RLock()\n\tdefer n.mu.RUnlock()\n\tif n.root == nil {\n\t\treturn 0\n\t}\n\treturn n.root.loKey\n}", "title": "" }, { "docid": "a0b5305003810ee64bebbb730067677c", "score": "0.5617618", "text": "func (w *Window) minKey() (min int64) {\n\tmin = time.Now().UnixNano()\n\tfor k := range w.nodes {\n\t\tif k < min {\n\t\t\tmin = k\n\t\t}\n\t}\n\treturn min\n}", "title": "" }, { "docid": "d0f5042efcddb7f312abc40d9860bf19", "score": "0.5606936", "text": "func (k Key) Prev(keyCtx *KeyContext) (_ Key, ok bool) {\n\tcol := k.Length() - 1\n\tprevVal, ok := keyCtx.Prev(col, k.Value(col))\n\tif !ok {\n\t\treturn Key{}, false\n\t}\n\tif col == 0 {\n\t\treturn Key{firstVal: prevVal}, true\n\t}\n\t// Keep the key up to col, and replace the value for col with prevVal.\n\tvals := make([]tree.Datum, col)\n\tcopy(vals[:col-1], k.otherVals)\n\tvals[col-1] = prevVal\n\treturn Key{firstVal: k.firstVal, otherVals: vals}, true\n}", "title": "" }, { "docid": "3cd15f49925ddc27feef61f01396c023", "score": "0.5605166", "text": "func (r *HashRing) PredecessorNode(key []byte) (*VirtualNode, error) {\n\treturn r.state.Load().(*hashRingState).predecessorNode(key)\n}", "title": "" }, { "docid": "6a433b26f49ea766e5fedceac0a48bcf", "score": "0.5597029", "text": "func (node *Node) findPredecessor(id []byte) (*RemoteNode, error) {\n\tn1 := node.RemoteSelf\n\tsuccessor := node.Successor\n\tfor !BetweenRightIncl(id, n1.Id, successor.Id) {\n\t\tvar err error\n\t\tif err != nil {\n\t\t\tlog.Println(\"error to get successor\", err)\n\t\t}\n\t\tn1, err = ClosestPrecedingFinger_RPC(n1, id)\n\t\tsuccessor, err = GetSuccessorId_RPC(n1)\n\t\tif err != nil {\n\t\t\tlog.Println(\"error to get ClosestPrecedingFinger\", err)\n\t\t\treturn nil, err\n\t\t}\n\n\t}\n\treturn n1, nil\n}", "title": "" }, { "docid": "1dc6b7628890020315e6e16e7fc5c029", "score": "0.55726284", "text": "func (T *Tree) Predecessor(x *Node) *Node {\n\tif x.Left != nil {\n\t\treturn T.Maximum(x.Left)\n\t}\n\n\tvar y = x.Parent\n\tfor y != nil && x == y.Right {\n\t\tx = y\n\t\ty = y.Parent\n\t}\n\treturn y\n}", "title": "" }, { "docid": "23ea0bfc6fab4ff39e277929b8ba37ef", "score": "0.55486816", "text": "func (pq *unorderedMinPQ) Remove() Key {\n\tidx, key := pq.peek()\n\tpq.swap(idx, len(*pq)-1)\n\t*pq = (*pq)[:len(*pq)-1]\n\treturn key\n}", "title": "" }, { "docid": "1838546efb5aa8460f93b15bfb603613", "score": "0.5545491", "text": "func LastLessThan(key KeyConvertible) KeySelector {\n\treturn KeySelector{key, false, 0}\n}", "title": "" }, { "docid": "2e7220d44b89e552b9674e4a5a525bdd", "score": "0.5532468", "text": "func (n *Node) Predecessor() *Node {\n\tif isNotSentinel(n.left) {\n\t\treturn n.left.Max()\n\t}\n\n\tcurr := n\n\tprev := n.parent\n\tfor isNotSentinel(curr) && prev == curr.left {\n\t\tprev = curr\n\t\tcurr = curr.parent\n\t}\n\n\treturn curr\n}", "title": "" }, { "docid": "57ac137b76158a949ab8125dc2927f87", "score": "0.5531363", "text": "func (pq unorderedMinPQ) Peek() Key {\n\t_, key := pq.peek()\n\treturn key\n}", "title": "" }, { "docid": "44d67ca13616af3500c50f2c9124fbc5", "score": "0.54857206", "text": "func (bst *BST) Predecessor(n *bintree.Node) *bintree.Node {\n\tif n.HasLChild() {\n\t\treturn subTreeMax(n.LChild)\n\t}\n\tfor n.IsLChild() {\n\t\tn = n.Parent\n\t}\n\treturn n.Parent\n}", "title": "" }, { "docid": "798bb5fd3ae21ab772a17ccb80464713", "score": "0.5479077", "text": "func NextLargerKey(key string) string {\n\treturn key + \"\\x00\" // the next string that is larger than key, but smaller than any other keys > key\n}", "title": "" }, { "docid": "798bb5fd3ae21ab772a17ccb80464713", "score": "0.5479077", "text": "func NextLargerKey(key string) string {\n\treturn key + \"\\x00\" // the next string that is larger than key, but smaller than any other keys > key\n}", "title": "" }, { "docid": "251a33580501a1f02589c5edbf75cec1", "score": "0.547155", "text": "func delete(node *Node, key Key) *Node {\n\tif node == nil {\n\t\treturn nil\n\t}\n\tif key < node.key {\n\t\tnode.left = delete(node.left, key)\n\t} else if key > node.key {\n\t\tnode.right = delete(node.right, key)\n\t} else {\n\t\tif node.right == nil {\n\t\t\treturn node.left\n\t\t}\n\t\tif node.left == nil {\n\t\t\treturn node.right\n\t\t}\n\n\t\ttmp := node\n\t\tnode = min(tmp.right)\n\t\tnode.right = deleteMin(tmp.right)\n\t\tnode.left = tmp.left\n\t}\n\tnode.numChildren = size(node.left) + size(node.right) + 1\n\treturn node\n}", "title": "" }, { "docid": "f433937e903831a89b05433fea8129fd", "score": "0.5466392", "text": "func (o *Node) closestPrecedingNode(id *big.Int) Edge {\n\tfor i := M; i > 0; i-- {\n\t\tif o.Finger[i].ID != nil && o.Ping(o.Finger[i].Addr) {\n\t\t\tif between(o.ID, o.Finger[i].ID, id, true) {\n\t\t\t\treturn Edge{o.Finger[i].Addr, new(big.Int).Set(o.Finger[i].ID)}\n\t\t\t}\n\t\t}\n\t}\n\t_ = o.FixSuccessors()\n\tif o.Ping(o.Successor[1].Addr) {\n\t\treturn Edge{o.Successor[1].Addr, new(big.Int).Set(o.Successor[1].ID)}\n\t} else {\n\t\treturn Edge{\"\", new(big.Int)}\n\t}\n}", "title": "" }, { "docid": "a116f5054bf917b7a526e0f2af8f239f", "score": "0.5448068", "text": "func (i *blockIter) Prev() (*InternalKey, []byte) {\n\tif n := len(i.cached) - 1; n > 0 && i.cached[n].offset == i.offset {\n\t\ti.nextOffset = i.offset\n\t\te := &i.cached[n-1]\n\t\ti.offset = e.offset\n\t\ti.val = getBytes(unsafe.Pointer(uintptr(i.ptr)+uintptr(e.valStart)), int(e.valSize))\n\t\t// Manually inlined version of i.decodeInternalKey(key).\n\t\tkey := i.cachedBuf[e.keyStart:e.keyEnd]\n\t\tif n := len(key) - 8; n >= 0 {\n\t\t\ti.ikey.Trailer = binary.LittleEndian.Uint64(key[n:])\n\t\t\ti.ikey.UserKey = key[:n:n]\n\t\t\tif i.globalSeqNum != 0 {\n\t\t\t\ti.ikey.SetSeqNum(i.globalSeqNum)\n\t\t\t}\n\t\t} else {\n\t\t\ti.ikey.Trailer = uint64(InternalKeyKindInvalid)\n\t\t\ti.ikey.UserKey = nil\n\t\t}\n\t\ti.cached = i.cached[:n]\n\t\treturn &i.ikey, i.val\n\t}\n\n\tif i.offset == 0 {\n\t\ti.offset = -1\n\t\ti.nextOffset = 0\n\t\treturn nil, nil\n\t}\n\n\ttargetOffset := i.offset\n\tvar index int32\n\n\t{\n\t\t// NB: manually inlined sort.Sort is ~5% faster.\n\t\t//\n\t\t// Define f(-1) == false and f(n) == true.\n\t\t// Invariant: f(index-1) == false, f(upper) == true.\n\t\tupper := i.numRestarts\n\t\tfor index < upper {\n\t\t\th := int32(uint(index+upper) >> 1) // avoid overflow when computing h\n\t\t\t// index ≤ h < upper\n\t\t\toffset := int32(binary.LittleEndian.Uint32(i.data[i.restarts+4*h:]))\n\t\t\tif offset < targetOffset {\n\t\t\t\tindex = h + 1 // preserves f(i-1) == false\n\t\t\t} else {\n\t\t\t\tupper = h // preserves f(j) == true\n\t\t\t}\n\t\t}\n\t\t// index == upper, f(index-1) == false, and f(upper) (= f(index)) == true\n\t\t// => answer is index.\n\t}\n\n\ti.offset = 0\n\tif index > 0 {\n\t\ti.offset = int32(binary.LittleEndian.Uint32(i.data[i.restarts+4*(index-1):]))\n\t}\n\n\ti.readEntry()\n\ti.clearCache()\n\ti.cacheEntry()\n\n\tfor i.nextOffset < targetOffset {\n\t\ti.offset = i.nextOffset\n\t\ti.readEntry()\n\t\ti.cacheEntry()\n\t}\n\n\ti.decodeInternalKey(i.key)\n\treturn &i.ikey, i.val\n}", "title": "" }, { "docid": "b3f92c41efde359b28c958af23c0530f", "score": "0.5402457", "text": "func (kpl *KeyPointerList) MaxKey() Key {\n\tx := len(*kpl)\n\tif x == 0 {\n\t\treturn MaxKey\n\t}\n\treturn (*kpl)[x-1].Key\n}", "title": "" }, { "docid": "722ea53bbc49951a4a72504f4e54c68e", "score": "0.54021466", "text": "func (h *Heap) Increasekey(elementkey int, targetkey float64) error {\n\tif targetkey < h.Inslice[elementkey] {\n\t\treturn errors.New(\"New key is smaller than the current key, which is not allowed in max-heap increasekey.\")\n\t}\n\th.Inslice[elementkey] = targetkey\n\tfor elementkey > 1 && h.Inslice[elementkey>>1] < h.Inslice[elementkey] {\n\t\th.Inslice[elementkey], h.Inslice[elementkey>>1] = h.Inslice[elementkey>>1], h.Inslice[elementkey]\n\t\telementkey = elementkey >> 1\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c84ef741b88874ea98714f261f2f14ca", "score": "0.5381126", "text": "func (t *node32) prev() *node32 {\n\t// If there is a left child, it is to the left\n\tl := t.left\n\tif l != nil {\n\t\treturn l.max()\n\t}\n\t// if t is p.right, then p, else repeat.\n\tp := t.parent\n\tfor p != nil {\n\t\tif p.right == t {\n\t\t\treturn p\n\t\t}\n\t\tt = p\n\t\tp = t.parent\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bee393bfd8ff9b933b794bd4eaa0d91b", "score": "0.5370223", "text": "func (V VEB) Predecessor(x int) int {\n\tif V.u == 2 {\n\t\tif x == 1 && V.min == 0 {\n\t\t\treturn 0\n\t\t} else {\n\t\t\treturn -1\n\t\t}\n\t} else if V.max != -1 && x > V.max {\n\t\treturn V.max\n\t} else {\n\t\tminLow := V.cluster[V.High(x)].Min()\n\t\tif minLow != -1 && V.Low(x) > minLow {\n\t\t\toffset := V.cluster[V.High(x)].Predecessor(V.Low(x))\n\t\t\treturn V.Index(V.High(x), offset)\n\t\t} else {\n\t\t\tpredCluster := V.summary.Predecessor(V.High(x))\n\t\t\tif predCluster == -1 {\n\t\t\t\tif V.min != -1 && x > V.min {\n\t\t\t\t\treturn V.min\n\t\t\t\t} else {\n\t\t\t\t\treturn -1\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\toffset := V.cluster[predCluster].Max()\n\t\t\t\treturn V.Index(predCluster, offset)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e9182bd8812c35f5a4e3c67f59303da9", "score": "0.53549737", "text": "func (gt *GrpcTransport) GetPredecessor(node *api.Node) (*api.Node, error) {\n\tclient, err := gt.getConn(node.Addr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tconntx, cancel := context.WithTimeout(context.Background(), gt.timeout)\n\tdefer cancel()\n\treturn client.GetPredecessor(conntx, emptyRequest)\n}", "title": "" }, { "docid": "a21889684df7cfe36e7d5d58e0b9e7b9", "score": "0.5354528", "text": "func (s *Iterator) Prev() {\n\tz.AssertTrue(s.Valid())\n\ts.node, _ = s.skipList.findNear(s.Key(), true, false) // find <. No equality allowed.\n}", "title": "" }, { "docid": "90804727301564c57db69d520390d7a4", "score": "0.5352", "text": "func minimum(fringe map[state]int, lastmin int) state {\n\tvar mink state\n\tfirst := true\n\tfor k, d := range fringe {\n\t\tif first {\n\t\t\tmink = k\n\t\t\tfirst = false\n\t\t}\n\t\tif d == lastmin {\n\t\t\treturn k\n\t\t}\n\t\tif d < fringe[mink] {\n\t\t\tmink = k\n\t\t}\n\t}\n\treturn mink\n}", "title": "" }, { "docid": "c574de3c7d06063c30731e91aac512ff", "score": "0.5334917", "text": "func (heap *FloatingFibonacciHeap) DecreaseKey(node *Entry, newPriority float64) (*Entry, error) {\n\n\tif heap.IsEmpty() {\n\t\treturn nil, EmptyHeapError(\"Cannot decrease key in an empty heap\")\n\t}\n\n\tif node == nil {\n\t\treturn nil, NilError(\"Cannot decrease key: given node is nil\")\n\t}\n\n\tif newPriority >= node.Priority {\n\t\treturn nil, fmt.Errorf(\"The given new priority: %v, is larger than or equal to the old: %v\",\n\t\t\tnewPriority, node.Priority)\n\t}\n\n\tdecreaseKeyUnchecked(heap, node, newPriority)\n\treturn node, nil\n}", "title": "" }, { "docid": "e49464b9c8d2ee9b4a89bd35830c2594", "score": "0.5306472", "text": "func (c *Cursor) Prev() (key string) {\n\treturn c.bucket.Prev()\n}", "title": "" }, { "docid": "05d694b99cd188bdbe8a5741f9ee7c47", "score": "0.52715296", "text": "func (brh blockRetrievalHeap) Less(i, j int) bool {\n\treqI := brh[i]\n\treqJ := brh[j]\n\tif reqI.priority > reqJ.priority {\n\t\treturn true\n\t}\n\tif reqI.priority < reqJ.priority {\n\t\treturn false\n\t}\n\treturn reqI.insertionOrder < reqJ.insertionOrder\n}", "title": "" }, { "docid": "50d3c9e46638348f5439819260fc382f", "score": "0.5262027", "text": "func (p *pebbleMVCCScanner) prevKey(key []byte) bool {\n\tp.keyBuf = append(p.keyBuf[:0], key...)\n\n\tfor i := 0; i < p.itersBeforeSeek; i++ {\n\t\tpeekedKey, ok := p.iterPeekPrev()\n\t\tif !ok {\n\t\t\treturn false\n\t\t}\n\t\tif !bytes.Equal(peekedKey, p.keyBuf) {\n\t\t\treturn p.backwardLatestVersion(peekedKey, i+1)\n\t\t}\n\t\tif !p.iterPrev() {\n\t\t\treturn false\n\t\t}\n\t}\n\n\tp.decrementItersBeforeSeek()\n\treturn p.iterSeekReverse(MVCCKey{Key: p.keyBuf})\n}", "title": "" }, { "docid": "7a13daaf2cf3803fda3d4f36992a4d23", "score": "0.52530026", "text": "func (c *CLRU) PeekOldest() (key interface{}, value interface{}, ok bool) {\n\tc.lock.RLock()\n\tkey, value, ok = c.lru.PeekOldest()\n\tc.lock.RUnlock()\n\treturn key, value, ok\n}", "title": "" }, { "docid": "40f30139b4108e72b9f6254863c6056d", "score": "0.5247123", "text": "func (repo *repository) GetPredecessorVersion(ctx context.Context, idList []uint64) (map[uint64]map[int]uint64, error) {\n\tvar err error\n\tapiConfig := ctx.Value(model.APIConfigKey).(model.APIConfig)\n\ttableName := apiConfig.TablePrefix + \"posts\"\n\tidParameters := toolbox.UInt64SliceToCSV(idList)\n\n\tsqlQuery := fmt.Sprintf(`SELECT post_parent, ID FROM %s WHERE 1=1 AND post_parent IN ( %s ) \n\t\t\t\t\t\t\t\tAND post_type = 'revision' \n\t\t\t\t\t\t\t\tAND ((post_status = 'inherit')) \n\t\t\t\t\t\t\t\tORDER BY post_date DESC, wp_posts.ID DESC`,\n\t\ttableName,\n\t\tidParameters)\n\n\tq, err := repo.db.Query(sqlQuery)\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"params\": sqlQuery,\n\t\t\t\"func\": \"db.Query\",\n\t\t}).Errorf(\"Failed to run db query: %s\", err)\n\t\treturn nil, err\n\t}\n\tdefer q.Close()\n\n\t// load results and put in map of parent ID and the sorted revision ID, sort from the latest first\n\tres := map[uint64]map[int]uint64{}\n\tfor q.Next() {\n\t\tvar parentID uint64\n\t\tvar postID uint64\n\n\t\terr = q.Scan(&parentID, &postID)\n\t\tif err != nil {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"params\": fmt.Sprintf(\"parentID : %d, postID: %d\", parentID, postID),\n\t\t\t\t\"func\": \"q.Scan\",\n\t\t\t}).Errorf(\"Failed to run query scan: %s\", err)\n\t\t\treturn nil, err\n\t\t}\n\n\t\t_, ok := res[parentID]\n\n\t\tif !ok {\n\t\t\tres[parentID] = map[int]uint64{0: postID}\n\t\t} else {\n\t\t\tidx := len(res[parentID])\n\t\t\tres[parentID][idx] = postID\n\t\t}\n\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "de91a715f62fd62f11ddbace2a2cb5f3", "score": "0.52469444", "text": "func (s *Hook) Predecessor() Intrusive {\n\treturn s.prev\n}", "title": "" }, { "docid": "26c4c1feae09b06b9afced045f2dea47", "score": "0.5244765", "text": "func (d *Driver) Prev(iter []byte, limit int) (result []*herbdata.KeyValue, newiter []byte, err error) {\n\tif limit <= 0 {\n\t\treturn nil, nil, kvdb.ErrUnsupportedNextLimit\n\t}\n\titerrange := &util.Range{}\n\tif len(iter) > 0 {\n\t\titerrange.Limit = iter\n\t}\n\tit := d.DB.NewIterator(iterrange, nil)\n\tdefer it.Release()\n\tvar found bool\n\tif len(iter) == 0 {\n\t\tfound = true\n\t}\n\tif it.Last() {\n\t\tfor {\n\t\t\tif !found {\n\t\t\t\tif bytes.Compare(iter, it.Key()) <= 0 {\n\t\t\t\t\tif !it.Prev() {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tfound = true\n\t\t\t}\n\t\t\tkv := &herbdata.KeyValue{\n\t\t\t\tKey: it.Key(),\n\t\t\t\tValue: it.Value(),\n\t\t\t}\n\t\t\tresult = append(result, kv.Clone())\n\t\t\tif limit >= 0 && len(result) >= limit {\n\t\t\t\treturn result, it.Key(), nil\n\t\t\t}\n\t\t\tif !it.Prev() {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\terr = it.Error()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn result, nil, nil\n}", "title": "" }, { "docid": "cf1e3bf3fba2cbc63662c180f760d600", "score": "0.52431977", "text": "func (this ForgeFedDependedByPropertyIterator) Prev() vocab.ForgeFedDependedByPropertyIterator {\n\tif this.myIdx-1 < 0 {\n\t\treturn nil\n\t} else {\n\t\treturn this.parent.At(this.myIdx - 1)\n\t}\n}", "title": "" }, { "docid": "e3e1786a57bccb3f3fd7c6c02907f8db", "score": "0.52425975", "text": "func (y *Node) borrowPrev(x, p *Node, yi int) {\n\ty.keys.insertBefore(0, p.keys[yi-1])\n\ty.children.insertBefore(0, x.children.removeAt(len(x.children)-1))\n\tp.keys[yi-1] = x.keys.removeAt(len(x.keys) - 1)\n}", "title": "" }, { "docid": "64d5a18a568db55e635ade50a5793597", "score": "0.5237393", "text": "func (s *SkipList) findNear(key []byte, less bool, allowEqual bool) (*node, bool) {\n\tx := s.head\n\tlevel := int(s.getHeight() - 1)\n\tfor {\n\t\t// Assume x.key < key.\n\t\tnext := s.getNext(x, level)\n\t\tif next == nil {\n\t\t\t// x.key < key < END OF LIST\n\t\t\tif level > 0 {\n\t\t\t\t// Can descend further to iterate closer to the end.\n\t\t\t\tlevel--\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// Level=0. Cannot descend further. Let's return something that makes sense.\n\t\t\tif !less {\n\t\t\t\treturn nil, false\n\t\t\t}\n\t\t\t// Try to return x. Make sure it is not a head node.\n\t\t\tif x == s.head {\n\t\t\t\treturn nil, false\n\t\t\t}\n\t\t\treturn x, false\n\t\t}\n\n\t\tnextKey := next.key(s.arena)\n\t\tcmp := z.CompareKeys(key, nextKey)\n\t\tif cmp > 0 {\n\t\t\t// x.key < next.key < key. We can continue to move right.\n\t\t\tx = next\n\t\t\tcontinue\n\t\t}\n\t\tif cmp == 0 {\n\t\t\t// x.key < key == next.key.\n\t\t\tif allowEqual {\n\t\t\t\treturn next, true\n\t\t\t}\n\t\t\tif !less {\n\t\t\t\t// We want >, so go to base level to grab the next bigger note.\n\t\t\t\treturn s.getNext(next, 0), false\n\t\t\t}\n\t\t\t// We want <. If not base level, we should go closer in the next level.\n\t\t\tif level > 0 {\n\t\t\t\tlevel--\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// On base level. Return x.\n\t\t\tif x == s.head {\n\t\t\t\treturn nil, false\n\t\t\t}\n\t\t\treturn x, false\n\t\t}\n\t\t// cmp < 0. In other words, x.key < key < next.\n\t\tif level > 0 {\n\t\t\tlevel--\n\t\t\tcontinue\n\t\t}\n\t\t// At base level. Need to return something.\n\t\tif !less {\n\t\t\treturn next, false\n\t\t}\n\t\t// Try to return x. Make sure it is not a head node.\n\t\tif x == s.head {\n\t\t\treturn nil, false\n\t\t}\n\n\t\treturn x, false\n\t}\n}", "title": "" }, { "docid": "4ab839e45c7ed5d8d2f00d83e88c8447", "score": "0.5235211", "text": "func (this *AllOne) GetMinKey() string {\n\tmins := len(this.min)\n\tif mins == 0 {\n\t\treturn \"\"\n\t}\n\ttop := this.min[mins-1]\n\tfor k := range this.rev[top] {\n\t\treturn k\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "14e6d64cd93f09fb5ecd45cba8095a16", "score": "0.5234218", "text": "func (o *Orc) GetPrevSubKey() string { return o.SubKey }", "title": "" }, { "docid": "4cff769373636309d1c38c8444d37d50", "score": "0.52215505", "text": "func (i *blockIter) SeekLT(key []byte) (*InternalKey, []byte) {\n\tikey := base.MakeSearchKey(key)\n\n\t// Find the index of the smallest restart point whose key is >= the key\n\t// sought; index will be numRestarts if there is no such restart point.\n\ti.offset = 0\n\tvar index int32\n\n\t{\n\t\t// NB: manually inlined sort.Search is ~5% faster.\n\t\t//\n\t\t// Define f(-1) == false and f(n) == true.\n\t\t// Invariant: f(index-1) == false, f(upper) == true.\n\t\tupper := i.numRestarts\n\t\tfor index < upper {\n\t\t\th := int32(uint(index+upper) >> 1) // avoid overflow when computing h\n\t\t\t// index ≤ h < upper\n\t\t\toffset := int32(binary.LittleEndian.Uint32(i.data[i.restarts+4*h:]))\n\t\t\t// For a restart point, there are 0 bytes shared with the previous key.\n\t\t\t// The varint encoding of 0 occupies 1 byte.\n\t\t\tptr := unsafe.Pointer(uintptr(i.ptr) + uintptr(offset+1))\n\n\t\t\t// Decode the key at that restart point, and compare it to the key\n\t\t\t// sought. See the comment in readEntry for why we manually inline the\n\t\t\t// varint decoding.\n\t\t\tvar v1 uint32\n\t\t\tsrc := (*[5]uint8)(ptr)\n\t\t\tif a := (*src)[0]; a < 128 {\n\t\t\t\tv1 = uint32(a)\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 1)\n\t\t\t} else if a, b := a&0x7f, (*src)[1]; b < 128 {\n\t\t\t\tv1 = uint32(b)<<7 | uint32(a)\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 2)\n\t\t\t} else if b, c := b&0x7f, (*src)[2]; c < 128 {\n\t\t\t\tv1 = uint32(c)<<14 | uint32(b)<<7 | uint32(a)\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 3)\n\t\t\t} else if c, d := c&0x7f, (*src)[3]; d < 128 {\n\t\t\t\tv1 = uint32(d)<<21 | uint32(c)<<14 | uint32(b)<<7 | uint32(a)\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 4)\n\t\t\t} else {\n\t\t\t\td, e := d&0x7f, (*src)[4]\n\t\t\t\tv1 = uint32(e)<<28 | uint32(d)<<21 | uint32(c)<<14 | uint32(b)<<7 | uint32(a)\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 5)\n\t\t\t}\n\n\t\t\tif src := (*[5]uint8)(ptr); (*src)[0] < 128 {\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 1)\n\t\t\t} else if (*src)[1] < 128 {\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 2)\n\t\t\t} else if (*src)[2] < 128 {\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 3)\n\t\t\t} else if (*src)[3] < 128 {\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 4)\n\t\t\t} else {\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 5)\n\t\t\t}\n\n\t\t\t// Manually inlining base.DecodeInternalKey provides a 5-10% speedup on\n\t\t\t// BlockIter benchmarks.\n\t\t\ts := getBytes(ptr, int(v1))\n\t\t\tvar k InternalKey\n\t\t\tif n := len(s) - 8; n >= 0 {\n\t\t\t\tk.Trailer = binary.LittleEndian.Uint64(s[n:])\n\t\t\t\tk.UserKey = s[:n:n]\n\t\t\t\t// NB: We can't have duplicate keys if the globalSeqNum != 0, so we\n\t\t\t\t// leave the seqnum on this key as 0 as it won't affect our search\n\t\t\t\t// since ikey has the maximum seqnum.\n\t\t\t} else {\n\t\t\t\tk.Trailer = uint64(InternalKeyKindInvalid)\n\t\t\t}\n\n\t\t\tif base.InternalCompare(i.cmp, ikey, k) > 0 {\n\t\t\t\tindex = h + 1 // preserves f(i-1) == false\n\t\t\t} else {\n\t\t\t\tupper = h // preserves f(j) == true\n\t\t\t}\n\t\t}\n\t\t// index == upper, f(index-1) == false, and f(upper) (= f(index)) == true\n\t\t// => answer is index.\n\t}\n\n\t// Since keys are strictly increasing, if index > 0 then the restart point at\n\t// index-1 will be the largest whose key is < the key sought.\n\tif index > 0 {\n\t\ti.offset = int32(binary.LittleEndian.Uint32(i.data[i.restarts+4*(index-1):]))\n\t} else if index == 0 {\n\t\t// If index == 0 then all keys in this block are larger than the key\n\t\t// sought.\n\t\ti.offset = -1\n\t\ti.nextOffset = 0\n\t\treturn nil, nil\n\t}\n\n\t// Iterate from that restart point to somewhere >= the key sought, then back\n\t// up to the previous entry. The expectation is that we'll be performing\n\t// reverse iteration, so we cache the entries as we advance forward.\n\ti.clearCache()\n\ti.nextOffset = i.offset\n\n\tfor {\n\t\ti.offset = i.nextOffset\n\t\ti.readEntry()\n\t\ti.decodeInternalKey(i.key)\n\t\ti.cacheEntry()\n\n\t\tif i.cmp(i.ikey.UserKey, ikey.UserKey) >= 0 {\n\t\t\t// The current key is greater than or equal to our search key. Back up to\n\t\t\t// the previous key which was less than our search key.\n\t\t\ti.Prev()\n\t\t\treturn &i.ikey, i.val\n\t\t}\n\n\t\tif i.nextOffset >= i.restarts {\n\t\t\t// We've reached the end of the block. Return the current key.\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif !i.Valid() {\n\t\treturn nil, nil\n\t}\n\treturn &i.ikey, i.val\n}", "title": "" }, { "docid": "24868762ea273279d42786863e314d9a", "score": "0.5217465", "text": "func minPrev(arr []int, index int) int {\n\tmin := 1<<(32<<(^uint(0)>>32&1)-1) - 1\n\t// fmt.Println(\"minArr, index to avoid:\", arr, index)\n\tfor i := 0; i < len(arr); i++ {\n\t\tif arr[i] < min && i != index {\n\t\t\tmin = arr[i]\n\t\t}\n\t}\n\t// fmt.Println(\"min\", min)\n\treturn min\n}", "title": "" }, { "docid": "9cdf9fa58b6260bf1db17a3613fc9b3e", "score": "0.52161205", "text": "func (tree *Treap) Min() interface{} {\n\n\troot := *tree.rootPtr\n\tif root == nullNodePtr {\n\t\treturn nil\n\t}\n\n\tfor root.llink != nullNodePtr {\n\t\troot = root.llink\n\t}\n\n\treturn root.key\n}", "title": "" }, { "docid": "c0ae31398979d2b50e9fa522fdd97fd6", "score": "0.5208052", "text": "func (p *Pair[K, V]) Prev() *Pair[K, V] {\n\treturn listElementToPair(p.element.Prev())\n}", "title": "" }, { "docid": "b72550061c9fd2f722a235cd21f908d6", "score": "0.52074033", "text": "func (*BlackholeTransport) GetPredecessor(vn *Vnode) (*Vnode, error) {\n\treturn nil, fmt.Errorf(\"failed to connect blackhole: %s\", vn.StringID())\n}", "title": "" }, { "docid": "535b385ff1b1c998746d23dbcb04e22c", "score": "0.51980925", "text": "func (t *SkipList) Get(key []byte) *Element {\n\tvar prev = &t.Node\n\tvar next *Element\n\n\tfor i := t.maxLevel - 1; i >= 0; i-- {\n\t\tnext = prev.next[i]\n\n\t\tfor next != nil && bytes.Compare(key, next.key) > 0 {\n\t\t\tprev = &next.Node\n\t\t\tnext = next.next[i]\n\t\t}\n\t}\n\n\tif next != nil && bytes.Compare(next.key, key) <= 0 {\n\t\treturn next\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "02aa79073d9e7dbafe65b596ccdee5cd", "score": "0.5196531", "text": "func TestPredecessor(t *testing.T) {\n\tvar res int\n\n\tassert.NotNil(t, n1.predecessor, \"n1's predecessor should not be nil\")\n\tif n1.predecessor != nil {\n\t\tres = bytes.Compare(n1.predecessor.Id, []byte{69})\n\t\tassert.Equal(t, 0, res, \"n1's predecessor should be n2\")\n\t}\n\n\tassert.NotNil(t, n2.predecessor, \"n2's predecessor should not be nil\")\n\tif n2.predecessor != nil {\n\t\tres = bytes.Compare(n2.predecessor.Id, []byte{19})\n\t\tassert.Equal(t, 0, res, \"n2's predecessor should be n3\")\n\t}\n\n\tassert.NotNil(t, n3.predecessor, \"n3's predecessor should not be nil\")\n\tif n3.predecessor != nil {\n\t\tres = bytes.Compare(n3.predecessor.Id, []byte{118})\n\t\tassert.Equal(t, 0, res, \"n3's predecessor should be n1\")\n\t}\n}", "title": "" }, { "docid": "d5a2f8d03e354066a9fe04cf1d6a1478", "score": "0.5182545", "text": "func (tree *Tree) leftSibling(node *Node, key interface{}) (*Node, int) {\n\tif node.Parent != nil {\n\t\tindex, _ := tree.search(node.Parent, key)\n\t\tindex--\n\t\tif index >= 0 && index < len(node.Parent.Children) {\n\t\t\treturn node.Parent.Children[index], index\n\t\t}\n\t}\n\treturn nil, -1\n}", "title": "" }, { "docid": "c4feb6d9fe056e27da5cea0905343605", "score": "0.51787364", "text": "func (r *RPC) ClosestPrecedingFinger(ctx context.Context, in *pb.RemoteQuery) (*pb.RemoteNode, error) {\n\tctx = r.node.SendTraceID(ctx, \"ClosestPrecedingFinger\")\n\tclosestPrecedingFinger, err := r.node.ClosestPrecedingFinger(ctx, keyspace.ByteArrayToKey(in.Id))\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tid := closestPrecedingFinger.GetID()\n\n\tres := &pb.RemoteNode{\n\t\tId: id[:],\n\t\tAddr: closestPrecedingFinger.GetAddr(),\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "355336270dfdda5d0f7fa3beea55622a", "score": "0.51638347", "text": "func (f dateLessThanFunc) key() Key {\n\treturn f.k\n}", "title": "" }, { "docid": "5a466e578ed89b35ae8c983281b5410c", "score": "0.51570606", "text": "func selectSmallerNode(node1 *node, node2 *node) *node {\n\tswitch true {\n\tcase (*node1).itemIndex < (*node2).itemIndex:\n\t\treturn node1\n\tcase (*node1).itemIndex > (*node2).itemIndex:\n\t\treturn node2\n\tcase (*node1).fitnessClass < (*node2).fitnessClass:\n\t\treturn node1\n\tcase (*node1).fitnessClass > (*node2).fitnessClass:\n\t\treturn node2\n\tcase (*node1).lineIndex < (*node2).lineIndex:\n\t\treturn node2\n\t}\n\treturn node1\n}", "title": "" }, { "docid": "6ee02eafe4bc10e53e9ff5e9327b827b", "score": "0.5156507", "text": "func (rb RBTree) Successor(key int) (int, error) {\n\tnode := rb.searchNode(key)\n\tif node == rb.nil() {\n\t\treturn 0, fmt.Errorf(\"key %v does not exist\", key)\n\t}\n\n\tif node.rightChild != rb.nil() {\n\t\tnewNode := rb.minimumNode(node.rightChild)\n\t\treturn newNode.key, nil\n\t}\n\n\tp := node.parent\n\tfor p != rb.nil() {\n\t\tif node == p.leftChild {\n\t\t\treturn p.key, nil\n\t\t}\n\n\t\tnode = p\n\t\tp = node.parent\n\t}\n\treturn 0, fmt.Errorf(\"key %v already the max key\", key)\n}", "title": "" }, { "docid": "72150c1b1fe922e4f532e0748f5a08e7", "score": "0.5145969", "text": "func reheapTop(pq []*stateT) {\n l := len(pq)\n i := 0\t\t\t// at the root we start\n for {\t\t\t// index 2i+1 is the left, index 2i+2 the right son of i\n\tif 2*i+1 >= l {\t\t// no left son? ==> leaf: we are done.\n\t return\n\t}\n\tif 2*i+2 >= l {\t\t// only a left son\n\t if pq[i].phi >= pq[2*i+1].phi {\t// left son is not greater? done.\n\t return\n\t }\n\t j := 2*i+1\t\t\t\t// the left son is greater\n\t pq[i], pq[j] = pq[j], pq[i]\t\t// we swap and proceed\n\t i = j\n\t} else {\t\t// left and right son\n\t if pq[i].phi >= pq[2*i+1].phi && pq[i].phi >= pq[2*i+2].phi {\n\t return\t\t// greater or equal than both sons? done.\n\t }\n\t j := 2*i+1\t\t// at least one son is greater, maybe the left\n\t if pq[2*i+2].phi > pq[2*i+1].phi {\t// but eventually the right\n\t j = 2*i+2\n\t }\n\t pq[i], pq[j] = pq[j], pq[i]\t\t// we swap with the larger son\n\t i = j\t\t\t\t// and proceed\n\t}\n }\n}", "title": "" }, { "docid": "6ce1f4de57ee6ac14701a08a03c88f4f", "score": "0.51446724", "text": "func (i *blockIter) SeekGE(key []byte) (*InternalKey, []byte) {\n\tikey := base.MakeSearchKey(key)\n\n\t// Find the index of the smallest restart point whose key is > the key\n\t// sought; index will be numRestarts if there is no such restart point.\n\ti.offset = 0\n\tvar index int32\n\n\t{\n\t\t// NB: manually inlined sort.Seach is ~5% faster.\n\t\t//\n\t\t// Define f(-1) == false and f(n) == true.\n\t\t// Invariant: f(index-1) == false, f(upper) == true.\n\t\tupper := i.numRestarts\n\t\tfor index < upper {\n\t\t\th := int32(uint(index+upper) >> 1) // avoid overflow when computing h\n\t\t\t// index ≤ h < upper\n\t\t\toffset := int32(binary.LittleEndian.Uint32(i.data[i.restarts+4*h:]))\n\t\t\t// For a restart point, there are 0 bytes shared with the previous key.\n\t\t\t// The varint encoding of 0 occupies 1 byte.\n\t\t\tptr := unsafe.Pointer(uintptr(i.ptr) + uintptr(offset+1))\n\n\t\t\t// Decode the key at that restart point, and compare it to the key\n\t\t\t// sought. See the comment in readEntry for why we manually inline the\n\t\t\t// varint decoding.\n\t\t\tvar v1 uint32\n\t\t\tsrc := (*[5]uint8)(ptr)\n\t\t\tif a := (*src)[0]; a < 128 {\n\t\t\t\tv1 = uint32(a)\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 1)\n\t\t\t} else if a, b := a&0x7f, (*src)[1]; b < 128 {\n\t\t\t\tv1 = uint32(b)<<7 | uint32(a)\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 2)\n\t\t\t} else if b, c := b&0x7f, (*src)[2]; c < 128 {\n\t\t\t\tv1 = uint32(c)<<14 | uint32(b)<<7 | uint32(a)\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 3)\n\t\t\t} else if c, d := c&0x7f, (*src)[3]; d < 128 {\n\t\t\t\tv1 = uint32(d)<<21 | uint32(c)<<14 | uint32(b)<<7 | uint32(a)\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 4)\n\t\t\t} else {\n\t\t\t\td, e := d&0x7f, (*src)[4]\n\t\t\t\tv1 = uint32(e)<<28 | uint32(d)<<21 | uint32(c)<<14 | uint32(b)<<7 | uint32(a)\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 5)\n\t\t\t}\n\n\t\t\tif src := (*[5]uint8)(ptr); (*src)[0] < 128 {\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 1)\n\t\t\t} else if (*src)[1] < 128 {\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 2)\n\t\t\t} else if (*src)[2] < 128 {\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 3)\n\t\t\t} else if (*src)[3] < 128 {\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 4)\n\t\t\t} else {\n\t\t\t\tptr = unsafe.Pointer(uintptr(ptr) + 5)\n\t\t\t}\n\n\t\t\t// Manually inlining base.DecodeInternalKey provides a 5-10% speedup on\n\t\t\t// BlockIter benchmarks.\n\t\t\ts := getBytes(ptr, int(v1))\n\t\t\tvar k InternalKey\n\t\t\tif n := len(s) - 8; n >= 0 {\n\t\t\t\tk.Trailer = binary.LittleEndian.Uint64(s[n:])\n\t\t\t\tk.UserKey = s[:n:n]\n\t\t\t\t// NB: We can't have duplicate keys if the globalSeqNum != 0, so we\n\t\t\t\t// leave the seqnum on this key as 0 as it won't affect our search\n\t\t\t\t// since ikey has the maximum seqnum.\n\t\t\t} else {\n\t\t\t\tk.Trailer = uint64(InternalKeyKindInvalid)\n\t\t\t}\n\n\t\t\tif base.InternalCompare(i.cmp, ikey, k) >= 0 {\n\t\t\t\tindex = h + 1 // preserves f(i-1) == false\n\t\t\t} else {\n\t\t\t\tupper = h // preserves f(j) == true\n\t\t\t}\n\t\t}\n\t\t// index == upper, f(index-1) == false, and f(upper) (= f(index)) == true\n\t\t// => answer is index.\n\t}\n\n\t// Since keys are strictly increasing, if index > 0 then the restart point at\n\t// index-1 will be the largest whose key is <= the key sought. If index ==\n\t// 0, then all keys in this block are larger than the key sought, and offset\n\t// remains at zero.\n\tif index > 0 {\n\t\ti.offset = int32(binary.LittleEndian.Uint32(i.data[i.restarts+4*(index-1):]))\n\t}\n\ti.readEntry()\n\ti.decodeInternalKey(i.key)\n\n\t// Iterate from that restart point to somewhere >= the key sought.\n\tfor ; i.Valid(); i.Next() {\n\t\tif base.InternalCompare(i.cmp, i.ikey, ikey) >= 0 {\n\t\t\treturn &i.ikey, i.val\n\t\t}\n\t}\n\n\treturn nil, nil\n}", "title": "" }, { "docid": "27d760c7871e8e44863287068c615ee3", "score": "0.5137362", "text": "func Prev(tree *BST, val interface{}) *Node {\n\tvar n, p *Node\n\n\tif tree != nil {\n\t\tn = tree.Root\n\t}\n\t// if not found and node is valid\n\tn = SearchItem(n, val)\n\n\tif IsNil(n) {\n\t\treturn nil //early exit\n\t}\n\t//-> left , max value on right branch\n\tif NotNil(n.Left) {\n\t\tn = BranchMost(n.Left, NewBranch().AsRight())\n\t\treturn n\n\t}\n\t//the above algorithm\n\tp = n.Parent\n\tfor p != nil && n == p.Left {\n\t\tn, p = p, p.Parent\n\t}\n\treturn p\n}", "title": "" }, { "docid": "d0d95fc3ecb1c3dbe69a17686083d475", "score": "0.51326025", "text": "func (bn *btnode) find(key Key) (int, bool) {\n\tidx := sort.Search(len(bn.elements), func(i int) bool {\n\t\treturn bn.tree.less(key, bn.elements[i].Key())\n\t})\n\n\tif 0 < idx && !bn.tree.less(bn.elements[idx-1].Key(), key) {\n\t\t// it's less than an item, but not less than the previous, means it's already here\n\t\treturn idx - 1, true\n\t}\n\treturn idx, false\n}", "title": "" }, { "docid": "4e09bb86bf88b28b4299aef1e6b5ba6e", "score": "0.5125328", "text": "func getKthSmallest(node *TreeNode, numberOfNodesVisited *int, k int) (int, bool) {\n if nil == node {\n return -1, false\n }\n\n if v, ok := getKthSmallest(node.Left, numberOfNodesVisited, k); ok {\n return v, ok\n }\n\n if *numberOfNodesVisited == k {\n return node.Val, true\n }\n (*numberOfNodesVisited)++\n\n return getKthSmallest(node.Right, numberOfNodesVisited, k)\n}", "title": "" }, { "docid": "655168f75d442ac98d870fc5aa69bdce", "score": "0.51081663", "text": "func (q *Queue) Next() (key string, priority int) {\n\t// shift the key form the queue\n\tkey, keys := q.keys[0], q.keys[1:]\n\tq.keys = keys\n\n\tpriority = q.nodes[key]\n\n\tdelete(q.nodes, key)\n\n\treturn key, priority\n}", "title": "" }, { "docid": "1d8fb58922cacdd70c0b8bee1af45716", "score": "0.5107554", "text": "func (s *searchResults) Prev(line int64) (searchResult, bool) {\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\n\t// Search for line - 1, since it may be equal.\n\t_, i, err := s.lines.NearestLessEqual(line - 1)\n\tif err != nil {\n\t\t// Probably ErrNoSuchKey, aka none found.\n\t\treturn searchResult{}, false\n\t}\n\n\treturn s.results[i], true\n}", "title": "" }, { "docid": "77994f67ff071bb5341021d59c42774d", "score": "0.51073265", "text": "func (x *Node) Prev() *Node {\n\tif x.l != nil {\n\t\tx = x.l\n\t\tfor x.r != nil {\n\t\t\tx = x.r\n\t\t}\n\t\treturn x\n\t} else {\n\t\tfor x.p != nil && x.p.l == x {\n\t\t\tx = x.p\n\t\t}\n\t\treturn x.p\n\t}\n}", "title": "" }, { "docid": "e54d64091302e8528a57c3df1d7942b9", "score": "0.5093509", "text": "func (rpcServer *RPC) GetPredecessor(args GetPredecessorArgs, reply *GetPredecessorReply) error {\n\treply.N = rpcServer.chord.GetPredecessor()\n\treturn nil\n}", "title": "" }, { "docid": "63382f5296250a457f77b370ade34016", "score": "0.5087554", "text": "func (t BinaryTree) GetPrevious(current *Node) *Node {\n\tx := current\n\tif x == nil {\n\t\treturn nil\n\t}\n\tif x.left != nil {\n\t\treturn GetMaximum(x.left)\n\t}\n\ty := x.parent\n\tfor y != nil && x == y.left {\n\t\tx = y\n\t\ty = y.parent\n\t}\n\treturn y\n}", "title": "" }, { "docid": "957cc7afa94c57a5df27abe0aebb8f92", "score": "0.5072101", "text": "func FindPrev(node *Node) *Node {\n\tif node == nil {\n\t\treturn nil\n\t}\n\n\tif node.Left != nil {\n\t\treturn FindMax(node.Left)\n\t}\n\n\tn := node\n\tp := node.Parent\n\tfor p != nil && p.Right != n {\n\t\tn = p\n\t\tp = p.Parent\n\t}\n\treturn p\n}", "title": "" }, { "docid": "cef48a56e2fd51b6f546cb733a2bcf55", "score": "0.5071698", "text": "func (h *Hashgraph) OldestSelfAncestorToSee(x, y string) string {\n\tif c, ok := h.oldestSelfAncestorCache.Get(Key{x, y}); ok {\n\t\treturn c.(string)\n\t}\n\tres := h.oldestSelfAncestorToSee(x, y)\n\th.oldestSelfAncestorCache.Add(Key{x, y}, res)\n\treturn res\n}", "title": "" }, { "docid": "6b5e3c72d1c34028a337928da05ee2de", "score": "0.50620395", "text": "func (lt *LocalTransport) GetPredecessor(vn *Vnode) (*Vnode, error) {\n\t// Look for it locally\n\tobj, ok := lt.get(vn)\n\t// If it exists locally, handle it\n\tif ok {\n\t\treturn obj.GetPredecessor()\n\t}\n\t// Pass onto remote\n\treturn lt.remote.GetPredecessor(vn)\n}", "title": "" }, { "docid": "54bcc7b6a071d94ff40ad2dd02c1b3e5", "score": "0.50579387", "text": "func (l VirtualDeviceList) NewKey() int32 {\n\tvar key int32 = -200\n\n\tfor _, device := range l {\n\t\td := device.GetVirtualDevice()\n\t\tif d.Key < key {\n\t\t\tkey = d.Key\n\t\t}\n\t}\n\n\treturn key - 1\n}", "title": "" }, { "docid": "1ab4f9553ba5e1b5a2a060bfa4894393", "score": "0.5057491", "text": "func (fh *FibonacciHeap) Peek() (interface{}, float64) {\n\tif fh.min == nil {\n\t\treturn nil, math.Inf(-1)\n\t}\n\treturn fh.min.value, fh.min.key\n}", "title": "" }, { "docid": "6284900846c30d1cff05da27e9f0fe84", "score": "0.5045858", "text": "func (pq *indexMinPQ) delMin() int {\n minind := pq.invind[1]\n maxind := pq.invind[pq.n]\n \n pq.keys[1] = pq.keys[pq.n]\n pq.keys = pq.keys[:pq.n]\n pq.invind[1] = pq.invind[pq.n]\n pq.invind = pq.invind[:pq.n]\n pq.ind[minind] = -1\n pq.ind[maxind] = 1\n \n pq.n -= 1\n if pq.n > 0 {\n pq.sink(pq.invind[1]) \n }\n \n return minind\n}", "title": "" }, { "docid": "299b1e398635324837c42f337ed015d5", "score": "0.5045726", "text": "func (n *branchNode) getMaxKey() KeyType {\n\t_assert(!(*nodeHeader)(unsafe.Pointer(n)).isLeaf, \"not a branch!!\")\n\treturn n.cells[n.numCells-1].key\n}", "title": "" }, { "docid": "af470ec8e427cae5e74c9398c76fae9d", "score": "0.50456613", "text": "func (_MerkleTree *MerkleTreeCaller) GetLeftSiblingKey(opts *bind.CallOpts, _parent [32]byte) ([32]byte, error) {\n\tvar (\n\t\tret0 = new([32]byte)\n\t)\n\tout := ret0\n\terr := _MerkleTree.contract.Call(opts, out, \"getLeftSiblingKey\", _parent)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "c51fd847aae4d9884fe28b2a260b7468", "score": "0.50393635", "text": "func pickNode(diffMap map[string]int, sourceNode string) string {\n\tfirstItr := true\n\tminDiff := 0\n\tpickedNode := \"\"\n\tfor _, node := range orderedKeys(diffMap) {\n\t\tif node == sourceNode {\n\t\t\tcontinue\n\t\t}\n\t\tif diffMap[node] < minDiff || firstItr {\n\t\t\tminDiff = diffMap[node]\n\t\t\tpickedNode = node\n\t\t\tfirstItr = false\n\t\t}\n\t}\n\treturn pickedNode\n}", "title": "" }, { "docid": "305b0d5084c7fc12f5fa1b10fe1af9e7", "score": "0.50119156", "text": "func (r *RPC) GetPredecessor(ctx context.Context, in *pb.Empty) (*pb.RemoteNode, error) {\n\tctx = r.node.SendTraceID(ctx, \"GetPredecessor\")\n\tpredecessor, err := r.node.GetPredecessor(ctx)\n\n\tif err != nil {\n\t\treturn nil, err\n\t} else if predecessor == nil {\n\t\tempty := &pb.RemoteNode{Present: false}\n\n\t\treturn empty, nil\n\t}\n\n\tid := predecessor.GetID()\n\n\tres := &pb.RemoteNode{\n\t\tId: id[:],\n\t\tAddr: predecessor.GetAddr(),\n\t\tPresent: true,\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "bbeb99c0cb94c8fb11e773818b296c31", "score": "0.500399", "text": "func (tree *OrderedIndex) LowerBound(key Key) Iterator {\n\tresult := tree.End()\n\tnode := tree.Root\n\n\tif node == nil {\n\t\treturn result\n\t}\n\n\tfor {\n\t\tif Comparator(key, node.Key) > 0 {\n\t\t\tif node.Right != nil {\n\t\t\t\tnode = node.Right\n\t\t\t} else {\n\t\t\t\treturn result\n\t\t\t}\n\t\t} else {\n\t\t\tresult.node = node\n\t\t\tresult.position = between\n\t\t\tif node.Left != nil {\n\t\t\t\tnode = node.Left\n\t\t\t} else {\n\t\t\t\treturn result\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c1cd28b27ba2ebe54cf2e2a81edbe6d0", "score": "0.50009143", "text": "func GetNewKey(length int) (error, string) {\n\tkey := middlewares.CreateKey(length)\n\n\tvar exists bool\n\t_ = config.DB.QueryRow(\"SELECT EXISTS(SELECT 1 FROM urls WHERE key = $1);\", key).Scan(&exists)\n\tfor exists == true {\n\t\tkey = middlewares.CreateKey(length)\n\t\t_ = config.DB.QueryRow(\"SELECT EXISTS(SELECT 1 FROM urls WHERE key = $1);\", key).Scan(&exists)\n\t}\n\n\treturn nil, key\n}", "title": "" }, { "docid": "6231d254fbc2de785f91a1994e7c98c1", "score": "0.4999123", "text": "func (k MVCCKey) Next() MVCCKey {\n\tts := k.Timestamp.Prev()\n\tif ts == hlc.ZeroTimestamp {\n\t\treturn MVCCKey{\n\t\t\tKey: k.Key.Next(),\n\t\t}\n\t}\n\treturn MVCCKey{\n\t\tKey: k.Key,\n\t\tTimestamp: ts,\n\t}\n}", "title": "" }, { "docid": "53a45f21ecaefe05d87cf71e8b3a621d", "score": "0.49976942", "text": "func FindPredecessors(thisNodeKey int, ringNodeDataMap map[int]NodeData) map[int]SimpleNodeData {\n\tkeys := GetSortedKeys(ringNodeDataMap)\n\tthisNodeKeyIndex := FindIndexOfArray(thisNodeKey, keys)\n\tpredecessorKeyIndex := thisNodeKeyIndex\n\tpredecessors := make(map[int]SimpleNodeData)\n\tfor i := 0; i < REPLICATION_FACTOR-1; i++ {\n\t\tpredecessorKeyIndex -= 1\n\t\tif predecessorKeyIndex < 0 {\n\t\t\tpredecessorKeyIndex += len(keys)\n\t\t}\n\t\tif predecessorKeyIndex == thisNodeKeyIndex {\n\t\t\tcontinue\n\t\t}\n\t\tpredecessorKey := keys[predecessorKeyIndex]\n\t\tpredecessorNodeData := ringNodeDataMap[predecessorKey]\n\t\tpredecessorSimpleNodeData := SimpleNodeData{\n\t\t\tId: predecessorNodeData.Id,\n\t\t\tIp: predecessorNodeData.Ip,\n\t\t\tPort: predecessorNodeData.Port,\n\t\t\tHash: predecessorNodeData.Hash,\n\t\t}\n\t\tpredecessors[predecessorKey] = predecessorSimpleNodeData\n\t}\n\treturn predecessors\n}", "title": "" }, { "docid": "4fa9b0e8629e039ad19d5ee7b40eedcf", "score": "0.49909174", "text": "func (this *SkipList) Get(key interface{}) interface{} {\r\n\tif this.size == 0 {\r\n\t\treturn nil\r\n\t}\r\n\t\r\n\tcur := this.root\r\n\t// Start at the top\r\n\tfor i := len(cur.next)-1; i >= 0; i-- {\r\n\t\tfor this.less(cur.next[i].key, key) {\r\n\t\t\tcur = cur.next[i]\r\n\t\t}\r\n\t}\r\n\tcur = cur.next[0]\r\n\t\r\n\tif this.equals(cur.key, key) {\r\n\t\treturn cur.value\r\n\t}\r\n\t\r\n\treturn nil\r\n}", "title": "" }, { "docid": "df3d98dd96e3c74cc99b50bb2dcba472", "score": "0.49868894", "text": "func (np *nodePool) del(head int32, key []byte) int32 {\n\tvar newHead int32\n\t// check at the head of List\n\tif np.compare(key, head) == 0 {\n\t\tnewHead = np.array[head].next\n\t\tnp.recycleNode(head) //recycle the node\n\t\treturn newHead\n\t}\n\n\t// check at the list\n\tpindex := head\n\tfor {\n\t\tindex := np.array[pindex].next\n\t\tif index == -1 {\n\t\t\tbreak\n\t\t}\n\t\tif np.compare(key, index) == 0 {\n\t\t\tnp.array[pindex].next = np.array[index].next\n\t\t\tnp.recycleNode(index) //recycle the node\n\t\t\treturn head\n\t\t}\n\t\tpindex = index\n\t}\n\treturn head\n}", "title": "" }, { "docid": "3e22b37b992bdbdc6ebcf8d278ae71f4", "score": "0.49863002", "text": "func (node *Node) closestPreNode(nodeId []byte) *NodeRPC {\n\tnode.predLock.RLock()\n\tdefer node.predLock.RUnlock()\n\n\tcurrNode := node.NodeRPC\n\n\tfor i := len(node.fingerTable) - 1; i >= 0; i-- {\n\t\tv := node.fingerTable[i]\n\t\tif v == nil || v.RemoteNode == nil {\n\t\t\tcontinue\n\t\t}\n\t\tif between(v.InitId, currNode.NodeId, nodeId) {\n\t\t\treturn v.RemoteNode\n\t\t}\n\t}\n\treturn currNode\n}", "title": "" }, { "docid": "c3377a4cf34d08cc71830253d64b32e5", "score": "0.49822763", "text": "func (t *RBTint32) Min() (k int32, d interface{}) {\n\treturn t.root.min().keyAndData()\n}", "title": "" }, { "docid": "d6859b95a1d7bf6c313fcd2d76f58cdb", "score": "0.49819952", "text": "func (m *RemoteNodeMock) ClosestPrecedingFinger(context.Context, scale.Key) (scale.RemoteNode, error) {\n\treturn m.closestPrecedingFingerResponse, nil\n}", "title": "" }, { "docid": "de567418fe9d12479b4d0362a40980ad", "score": "0.49774623", "text": "func (t *BPTree) splitParent(node *Node, leftIndex int, key []byte, right *Node) error {\n\ttmpKeys := make([][]byte, order)\n\ttmpPointers := make([]interface{}, order+1)\n\n\t// In addition to the index location of leftIndex filtered out\n\t// the other key of the node is stored in tmpKeys\n\tvar i, j int\n\tfor i = 0; i < node.KeysNum; i ++{\n\t\tif i == leftIndex {\n\t\t\tj++\n\t\t}\n\n\t\ttmpKeys[j] = node.Keys[i]\n\t\tj++\n\t}\n\n\t// In addition to the index location of leftIndex+1 filtered out\n\t// the other pointer of the node is stored in tmpPointers\n\tj = 0\n\tfor i = 0; i < node.KeysNum+1; i++ {\n\t\tif i == leftIndex+1 {\n\t\t\tj++\n\t\t}\n\n\t\ttmpPointers[j] = node.pointers[i]\n\t\tj++\n\t}\n\n\ttmpKeys[leftIndex] = key\n\ttmpPointers[leftIndex+1] = right\n\n\t// Get the split index for he intermediate node\n\tsplitIndex := getSplitIndex(order-1)\n\n\t// Reset the last pointer of the node.\n\tnode.pointers[i] = tmpPointers[i]\n\n\tnewNode := newNode()\n\n\tj = 0\n\tfor i++; i < order; i++ {\n\t\tnewNode.Keys[j] = tmpKeys[i]\n\t\tnewNode.pointers[j] = tmpPointers[i]\n\t\tnewNode.KeysNum++\n\t\tj++\n\t}\n\n\t// Set the parent of the new node.\n\tnewNode.parent = node.parent\n\n\t// Set the last pointer of the new node.\n\tnewNode.pointers[j] = tmpPointers[i]\n\n\t// Set the parent of the pointer node for new node.\n\tfor i = 0; i <= newNode.KeysNum; i++ {\n\t\tchild := newNode.pointers[i].(*Node)\n\t\tchild.parent = newNode\n\t}\n\n\t// Insert into the parent node at the given the the first key of the new node.\n\tnewKey := tmpKeys[splitIndex]\n\treturn t.insertIntoParent(node, newKey, newNode)\n}", "title": "" }, { "docid": "b9424deab2378531877c3f25c7e2ee3d", "score": "0.4965298", "text": "func (n *leafNode) getMaxKey(sizer DataSizer) KeyType {\n\t_assert((*nodeHeader)(unsafe.Pointer(n)).isLeaf, \"not a leaf\")\n\treturn n.getCellKey(sizer, n.numCells-1)\n}", "title": "" }, { "docid": "d4207b7e527269e19851a9d43ae45875", "score": "0.4962448", "text": "func keyFuncPrevious(this *Application) error {\n\tthis.cursor.Rewind(LINE_SIZE)\n\treturn nil\n}", "title": "" }, { "docid": "0c54e812379659e0594fde676475400a", "score": "0.49613416", "text": "func minKey(l map[string]uint32) (string, uint32) {\n\tvar result string\n\tm := uint32(math.MaxUint32)\n\t//fmt.Println(m)\n\t//fmt.Println(l)\n\tfor k := range l {\n\t\t//fmt.Println(\"l[k] \",l[k])\n\t\tif m > l[k] {\n\t\t\t//fmt.Println(m,\" > \", l[k])\n\t\t\tm = l[k]\n\t\t\tresult = k\n\t\t}\n\t}\n\n\treturn result, m\n}", "title": "" }, { "docid": "a3b21cc66c0e401a44ce7c668f78083d", "score": "0.495839", "text": "func (it *Iterator) Prev() *Iterator {\n\tif it.pos == -1 {\n\t\tpanic(\"Iterator underflow\")\n\t}\n\n\tit.pos--\n\tif it.pos == -1 {\n\t\tit.curr = nullNodePtr\n\t\treturn it\n\t}\n\n\tit.curr = __choose(it.root, it.pos)\n\treturn it\n}", "title": "" }, { "docid": "4878c8ecc5890c529ec5955e05a465e2", "score": "0.49518645", "text": "func (t *SkipList) Remove(key []byte) *Element {\n\tprev := t.backNodes(key)\n\n\tif element := prev[0].next[0]; element != nil && bytes.Compare(element.key, key) <= 0 {\n\t\tfor k, v := range element.next {\n\t\t\tprev[k].next[k] = v\n\t\t}\n\n\t\tt.Len--\n\t\treturn element\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "845b9095233c4ead8f19634ba38c60ce", "score": "0.4951089", "text": "func (i *iterator) Prev() {\n\tif i.n == nil {\n\t\treturn\n\t}\n\n\tif i.n.leaf {\n\t\ti.pos--\n\t\tif i.pos >= 0 {\n\t\t\treturn\n\t\t}\n\t\tfor i.s.len() > 0 && i.pos < 0 {\n\t\t\ti.ascend()\n\t\t\ti.pos--\n\t\t}\n\t\treturn\n\t}\n\n\ti.descend(i.n, i.pos)\n\tfor !i.n.leaf {\n\t\ti.descend(i.n, i.n.count)\n\t}\n\ti.pos = i.n.count - 1\n}", "title": "" }, { "docid": "76b3bd4ab6eae45a3342a82a32f22537", "score": "0.4950266", "text": "func (self *q) deleteNewest() {\n\tq := *self\n\tq[len(q)-1] = BPNode{}\n\t*self = q[0 : len(q)-1]\n}", "title": "" }, { "docid": "7c6fb914a60874e2f24c60d2038853ee", "score": "0.49398187", "text": "func delete_entry(root, n *node, k []byte, ptr interface{}) *node {\n\tvar min_keys, neighbor_index, k_prime_index, capacity int\n\tvar neighbor *node\n\tvar k_prime []byte\n\n\t// remove key, ptr from node\n\tn = remove_entry_from_node(n, k, ptr)\n\t//switch ptr.(type) {\n\t//case *node:\n\t//\tn = remove_entry_from_node(n, key, ptr.(*node))\n\t//case *rec:\n\t//\tn = remove_entry_from_node(n, key, ptr.(*rec))\n\t//}\n\tif n == root {\n\t\treturn adjust_root(root)\n\t}\n\n\t// case: delete from inner node\n\tif n.is_leaf {\n\t\tmin_keys = cut(order - 1)\n\t} else {\n\t\tmin_keys = cut(order) - 1\n\t}\n\t// case: node stays at or above min order\n\tif n.num_keys >= min_keys {\n\t\treturn root\n\t}\n\n\t// case: node is bellow min order; coalescence or redistribute\n\tneighbor_index = get_neighbor_index(n)\n\tif neighbor_index == -1 {\n\t\tk_prime_index = 0\n\t} else {\n\t\tk_prime_index = neighbor_index\n\t}\n\tk_prime = n.parent.keys[k_prime_index]\n\tif neighbor_index == -1 {\n\t\tneighbor = n.parent.ptrs[1].(*node)\n\t} else {\n\t\tneighbor = n.parent.ptrs[neighbor_index].(*node)\n\t}\n\tif n.is_leaf {\n\t\tcapacity = order\n\t} else {\n\t\tcapacity = order - 1\n\t}\n\n\t// coalescence\n\tif neighbor.num_keys+n.num_keys < capacity {\n\t\treturn coalesce_nodes(root, n, neighbor, neighbor_index, k_prime)\n\t}\n\treturn redistribute_nodes(root, n, neighbor, neighbor_index, k_prime_index, k_prime)\n}", "title": "" }, { "docid": "0e3c640a9c83533b73731bdbe6d9fa96", "score": "0.49385908", "text": "func (hl *hashList) nextKey(lastIndex int) int {\n\n\t//recover the last index\n\ti := 0\n\tfor j, h := range hl.list {\n\t\tif h.index > lastIndex {\n\t\t\ti = j\n\t\t\tbreak\n\t\t}\n\t}\n\n\tfor hl.size <= i {\n\t\thl.next()\n\t}\n\nloop:\n\tfor {\n\n\t\tif hl.list[i].isTriple {\n\t\t\t//catch up the list\n\t\t\tfor hl.list[i].index+1000 > hl.list[hl.size-1].index {\n\t\t\t\thl.next()\n\t\t\t}\n\t\t\tj := i + 1\n\t\t\tfor hl.list[i].index+1000 > hl.list[j].index {\n\t\t\t\tif hl.list[j].isFiver && (hl.list[i].tripVal[0] == hl.list[j].fivesVal[0]) {\n\t\t\t\t\tbreak loop\n\t\t\t\t}\n\t\t\t\tj++\n\t\t\t}\n\n\t\t\ti++\n\t\t}\n\n\t}\n\treturn hl.list[i].index\n}", "title": "" }, { "docid": "1cfd62fb001f616028346089540f5498", "score": "0.49301863", "text": "func (bkt *BucketStore) Prev() (key string) {\n\tbkt.Set.RLock()\n\tdefer bkt.Set.RUnlock()\n\n\tp := bkt.Set.pages[bkt.idxPage]\n\tif p == nil {\n\t\treturn \"\"\n\t}\n\tif bkt.idxItem < p.numItems-1 {\n\t\tbkt.idxItem++\n\t\tif !strings.HasPrefix(p.items[bkt.idxItem], bkt.Name) {\n\t\t\treturn \"\"\n\t\t}\n\t\treturn p.items[bkt.idxItem][len(bkt.Name):]\n\t}\n\tif bkt.idxPage < len(bkt.Set.pages)-1 {\n\t\tbkt.idxPage++\n\t\tbkt.idxItem = 0\n\t\tresult := bkt.Set.pages[bkt.idxPage].items[bkt.idxItem]\n\t\tif !strings.HasPrefix(result, bkt.Name) {\n\t\t\treturn \"\"\n\t\t}\n\t\treturn result[len(bkt.Name):]\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "76fb5493ac99ed9be4acf59dbe9eaa99", "score": "0.4929989", "text": "func (n *BasicBST) Prev() *BasicBST {\n\treturn n.next(lo)\n}", "title": "" } ]
1cec8b1cc7c725bf8eadfec33da02a79
WriteToRequest writes these params to a swagger request
[ { "docid": "4578cd59941941800e47361e47470849", "score": "0.0", "text": "func (o *UpdateSplitTestParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.BranchTests != nil {\n\t\tif err := r.SetBodyParam(o.BranchTests); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param site_id\n\tif err := r.SetPathParam(\"site_id\", o.SiteID); err != nil {\n\t\treturn err\n\t}\n\n\t// path param split_test_id\n\tif err := r.SetPathParam(\"split_test_id\", o.SplitTestID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" } ]
[ { "docid": "34a05559dcfc073ab13a820623e3f106", "score": "0.7273088", "text": "func (o *SemverGenerateParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param projectUuid\n\tif err := r.SetPathParam(\"projectUuid\", o.ProjectUUID.String()); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "228f0eb3f21aaea82d4a0b07e316c341", "score": "0.7146969", "text": "func (o *GetParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.DollarExpand != nil {\n\n\t\t// query param $expand\n\t\tvar qrNrDollarExpand string\n\t\tif o.DollarExpand != nil {\n\t\t\tqrNrDollarExpand = *o.DollarExpand\n\t\t}\n\t\tqNrDollarExpand := qrNrDollarExpand\n\t\tif qNrDollarExpand != \"\" {\n\t\t\tif err := r.SetQueryParam(\"$expand\", qNrDollarExpand); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// query param api-version\n\tqrAPIVersion := o.APIVersion\n\tqAPIVersion := qrAPIVersion\n\tif qAPIVersion != \"\" {\n\t\tif err := r.SetQueryParam(\"api-version\", qAPIVersion); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param organization\n\tif err := r.SetPathParam(\"organization\", o.Organization); err != nil {\n\t\treturn err\n\t}\n\n\t// path param processTypeId\n\tif err := r.SetPathParam(\"processTypeId\", o.ProcessTypeID.String()); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "83d75e05b1af01e23586f9d3bcb27f75", "score": "0.71419734", "text": "func (o *WriteToMicrostorageParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.ContentLength != nil {\n\n\t\t// header param Content-Length\n\t\tif err := r.SetHeaderParam(\"Content-Length\", swag.FormatInt64(*o.ContentLength)); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\tif o.ContentType != nil {\n\n\t\t// header param Content-Type\n\t\tif err := r.SetHeaderParam(\"Content-Type\", *o.ContentType); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\treturn err\n\t}\n\n\t// path param id4n\n\tif err := r.SetPathParam(\"id4n\", o.ID4N); err != nil {\n\t\treturn err\n\t}\n\n\t// path param organization\n\tif err := r.SetPathParam(\"organization\", o.Organization); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "882d15b1667ff2c63d5b5a6af8a94711", "score": "0.71082646", "text": "func (o *GetSampleV2Params) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// query param ids\n\tqrIds := o.Ids\n\tqIds := qrIds\n\tif qIds != \"\" {\n\n\t\tif err := r.SetQueryParam(\"ids\", qIds); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.PasswordProtected != nil {\n\n\t\t// query param password_protected\n\t\tvar qrPasswordProtected bool\n\n\t\tif o.PasswordProtected != nil {\n\t\t\tqrPasswordProtected = *o.PasswordProtected\n\t\t}\n\t\tqPasswordProtected := swag.FormatBool(qrPasswordProtected)\n\t\tif qPasswordProtected != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"password_protected\", qPasswordProtected); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5b411819b2d18298fd51573a105ab366", "score": "0.70691323", "text": "func (o *GetTagParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param owner\n\tif err := r.SetPathParam(\"owner\", o.Owner); err != nil {\n\t\treturn err\n\t}\n\n\t// path param repo\n\tif err := r.SetPathParam(\"repo\", o.Repo); err != nil {\n\t\treturn err\n\t}\n\n\t// path param sha\n\tif err := r.SetPathParam(\"sha\", o.Sha); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ec31e917a0aafd419287aac61884d9c9", "score": "0.7062389", "text": "func (o *AddTagParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param organizationName\n\tif err := r.SetPathParam(\"organizationName\", o.OrganizationName); err != nil {\n\t\treturn err\n\t}\n\n\t// path param projectName\n\tif err := r.SetPathParam(\"projectName\", o.ProjectName); err != nil {\n\t\treturn err\n\t}\n\tif o.Tag != nil {\n\t\tif err := r.SetBodyParam(o.Tag); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ceec037cd6b8c28a93dd9773233b2f87", "score": "0.7048568", "text": "func (o *CreateSnippetParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.JSONBody != nil {\n\t\tif err := r.SetBodyParam(o.JSONBody); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param id\n\tif err := r.SetPathParam(\"id\", o.ID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d9b7693259307f74db2b5b0db38d8f45", "score": "0.7047833", "text": "func (o *SearchDocParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// header param X-Cassandra-Token\n\tif err := r.SetHeaderParam(\"X-Cassandra-Token\", o.XCassandraToken); err != nil {\n\t\treturn err\n\t}\n\n\t// path param collection-id\n\tif err := r.SetPathParam(\"collection-id\", o.CollectionID); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Fields != nil {\n\n\t\t// query param fields\n\t\tvar qrFields string\n\t\tif o.Fields != nil {\n\t\t\tqrFields = *o.Fields\n\t\t}\n\t\tqFields := qrFields\n\t\tif qFields != \"\" {\n\t\t\tif err := r.SetQueryParam(\"fields\", qFields); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param namespace-id\n\tif err := r.SetPathParam(\"namespace-id\", o.NamespaceID); err != nil {\n\t\treturn err\n\t}\n\n\tif o.PageSize != nil {\n\n\t\t// query param page-size\n\t\tvar qrPageSize int32\n\t\tif o.PageSize != nil {\n\t\t\tqrPageSize = *o.PageSize\n\t\t}\n\t\tqPageSize := swag.FormatInt32(qrPageSize)\n\t\tif qPageSize != \"\" {\n\t\t\tif err := r.SetQueryParam(\"page-size\", qPageSize); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.PageState != nil {\n\n\t\t// query param page-state\n\t\tvar qrPageState string\n\t\tif o.PageState != nil {\n\t\t\tqrPageState = *o.PageState\n\t\t}\n\t\tqPageState := qrPageState\n\t\tif qPageState != \"\" {\n\t\t\tif err := r.SetQueryParam(\"page-state\", qPageState); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Raw != nil {\n\n\t\t// query param raw\n\t\tvar qrRaw bool\n\t\tif o.Raw != nil {\n\t\t\tqrRaw = *o.Raw\n\t\t}\n\t\tqRaw := swag.FormatBool(qrRaw)\n\t\tif qRaw != \"\" {\n\t\t\tif err := r.SetQueryParam(\"raw\", qRaw); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Where != nil {\n\n\t\t// query param where\n\t\tvar qrWhere string\n\t\tif o.Where != nil {\n\t\t\tqrWhere = *o.Where\n\t\t}\n\t\tqWhere := qrWhere\n\t\tif qWhere != \"\" {\n\t\t\tif err := r.SetQueryParam(\"where\", qWhere); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e3417554a9350a535d4e859e4accc5b0", "score": "0.7043921", "text": "func (o *ScanSamplesParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b0cb5fb169c1ba4fa13a741c51911fb8", "score": "0.7020427", "text": "func (o *ListParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// query param api-version\n\tqrAPIVersion := o.APIVersion\n\tqAPIVersion := qrAPIVersion\n\tif qAPIVersion != \"\" {\n\t\tif err := r.SetQueryParam(\"api-version\", qAPIVersion); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.ContinuationToken != nil {\n\n\t\t// query param continuationToken\n\t\tvar qrContinuationToken string\n\t\tif o.ContinuationToken != nil {\n\t\t\tqrContinuationToken = *o.ContinuationToken\n\t\t}\n\t\tqContinuationToken := qrContinuationToken\n\t\tif qContinuationToken != \"\" {\n\t\t\tif err := r.SetQueryParam(\"continuationToken\", qContinuationToken); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.IsPublic != nil {\n\n\t\t// query param isPublic\n\t\tvar qrIsPublic bool\n\t\tif o.IsPublic != nil {\n\t\t\tqrIsPublic = *o.IsPublic\n\t\t}\n\t\tqIsPublic := swag.FormatBool(qrIsPublic)\n\t\tif qIsPublic != \"\" {\n\t\t\tif err := r.SetQueryParam(\"isPublic\", qIsPublic); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.PageSize != nil {\n\n\t\t// query param pageSize\n\t\tvar qrPageSize int32\n\t\tif o.PageSize != nil {\n\t\t\tqrPageSize = *o.PageSize\n\t\t}\n\t\tqPageSize := swag.FormatInt32(qrPageSize)\n\t\tif qPageSize != \"\" {\n\t\t\tif err := r.SetQueryParam(\"pageSize\", qPageSize); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param subjectDescriptor\n\tif err := r.SetPathParam(\"subjectDescriptor\", o.SubjectDescriptor); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "adae7819fa0736cf2fdf08e66b344313", "score": "0.70152074", "text": "func (o *APIServiceBlockParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tvaluesFields := o.Fields\n\n\tjoinedFields := swag.JoinByFormat(valuesFields, \"multi\")\n\t// query array param fields\n\tif err := r.SetQueryParam(\"fields\", joinedFields...); err != nil {\n\t\treturn err\n\t}\n\n\t// path param height\n\tif err := r.SetPathParam(\"height\", o.Height); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "01d54c99ccc2558bcc51c008df76568a", "score": "0.7005153", "text": "func (o *GetBancorInfoParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param symbol\n\tif err := r.SetPathParam(\"symbol\", o.Symbol); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9729142fb6847b60277f5581d16aef86", "score": "0.70005333", "text": "func (o *VscanGetParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Fields != nil {\n\n\t\t// binding items for fields\n\t\tjoinedFields := o.bindParamFields(reg)\n\n\t\t// query array param fields\n\t\tif err := r.SetQueryParam(\"fields\", joinedFields...); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param svm.uuid\n\tif err := r.SetPathParam(\"svm.uuid\", o.SvmUUID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "864d0c8a50f493bd246d32bdb067eff3", "score": "0.6984452", "text": "func (o *GetCwfParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "55a82706f7dce98ada9a0396ebcfb873", "score": "0.69540757", "text": "func (o *RouteGetByParamsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\tif o.Req != nil {\n\t\tif err := r.SetBodyParam(o.Req); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "541406ff393e6bac5ad80da363223325", "score": "0.6951134", "text": "func (o *PutCustomFieldsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.BulkFields != nil {\n\n\t\t// form param bulk_fields\n\t\tvar frBulkFields string\n\t\tif o.BulkFields != nil {\n\t\t\tfrBulkFields = *o.BulkFields\n\t\t}\n\t\tfBulkFields := frBulkFields\n\t\tif fBulkFields != \"\" {\n\t\t\tif err := r.SetFormParam(\"bulk_fields\", fBulkFields); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.ClearValue != nil {\n\n\t\t// form param clear_value\n\t\tvar frClearValue string\n\t\tif o.ClearValue != nil {\n\t\t\tfrClearValue = *o.ClearValue\n\t\t}\n\t\tfClearValue := frClearValue\n\t\tif fClearValue != \"\" {\n\t\t\tif err := r.SetFormParam(\"clear_value\", fClearValue); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// form param key\n\tfrKey := o.Key\n\tfKey := frKey\n\tif fKey != \"\" {\n\t\tif err := r.SetFormParam(\"key\", fKey); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// form param name\n\tfrName := o.Name\n\tfName := frName\n\tif fName != \"\" {\n\t\tif err := r.SetFormParam(\"name\", fName); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.Notes != nil {\n\n\t\t// form param notes\n\t\tvar frNotes string\n\t\tif o.Notes != nil {\n\t\t\tfrNotes = *o.Notes\n\t\t}\n\t\tfNotes := frNotes\n\t\tif fNotes != \"\" {\n\t\t\tif err := r.SetFormParam(\"notes\", fNotes); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.RelatedFieldName != nil {\n\n\t\t// form param related_field_name\n\t\tvar frRelatedFieldName string\n\t\tif o.RelatedFieldName != nil {\n\t\t\tfrRelatedFieldName = *o.RelatedFieldName\n\t\t}\n\t\tfRelatedFieldName := frRelatedFieldName\n\t\tif fRelatedFieldName != \"\" {\n\t\t\tif err := r.SetFormParam(\"related_field_name\", fRelatedFieldName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Type != nil {\n\n\t\t// form param type\n\t\tvar frType string\n\t\tif o.Type != nil {\n\t\t\tfrType = *o.Type\n\t\t}\n\t\tfType := frType\n\t\tif fType != \"\" {\n\t\t\tif err := r.SetFormParam(\"type\", fType); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Value != nil {\n\n\t\t// form param value\n\t\tvar frValue string\n\t\tif o.Value != nil {\n\t\t\tfrValue = *o.Value\n\t\t}\n\t\tfValue := frValue\n\t\tif fValue != \"\" {\n\t\t\tif err := r.SetFormParam(\"value\", fValue); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8433a9870f71279b27dff1cf21d3ef6e", "score": "0.6949903", "text": "func (o *DeleteAPIParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param api\n\tif err := r.SetPathParam(\"api\", o.APIID); err != nil {\n\t\treturn err\n\t}\n\n\t// path param tid\n\tif err := r.SetPathParam(\"tid\", o.Tid); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b7d6260943c0e8e1a4b41a2cfb278d7d", "score": "0.69368285", "text": "func (o *GetAPIFeaturesParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tr.SetTimeout(o.timeout)\n\tvar res []error\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int64\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt64(qrLimit)\n\t\tif qLimit != \"\" {\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tvaluesNames := o.Names\n\n\tjoinedNames := swag.JoinByFormat(valuesNames, \"\")\n\t// query array param names\n\tif err := r.SetQueryParam(\"names\", joinedNames...); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Offset != nil {\n\n\t\t// query param offset\n\t\tvar qrOffset int64\n\t\tif o.Offset != nil {\n\t\t\tqrOffset = *o.Offset\n\t\t}\n\t\tqOffset := swag.FormatInt64(qrOffset)\n\t\tif qOffset != \"\" {\n\t\t\tif err := r.SetQueryParam(\"offset\", qOffset); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "052fad6a44c1854fcf69bd9b8d0b2998", "score": "0.69206864", "text": "func (o *AddWaterLogParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// query param amount\n\tqrAmount := o.Amount\n\tqAmount := swag.FormatInt64(qrAmount)\n\tif qAmount != \"\" {\n\t\tif err := r.SetQueryParam(\"amount\", qAmount); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// query param date\n\tqrDate := o.Date\n\tqDate := qrDate.String()\n\tif qDate != \"\" {\n\t\tif err := r.SetQueryParam(\"date\", qDate); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.Unit != nil {\n\n\t\t// query param unit\n\t\tvar qrUnit string\n\t\tif o.Unit != nil {\n\t\t\tqrUnit = *o.Unit\n\t\t}\n\t\tqUnit := qrUnit\n\t\tif qUnit != \"\" {\n\t\t\tif err := r.SetQueryParam(\"unit\", qUnit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "14e281af5913e9cb365b63106373d2e7", "score": "0.69171923", "text": "func (o *ListServicesParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int64\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt64(qrLimit)\n\t\tif qLimit != \"\" {\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Offset != nil {\n\n\t\t// query param offset\n\t\tvar qrOffset int64\n\t\tif o.Offset != nil {\n\t\t\tqrOffset = *o.Offset\n\t\t}\n\t\tqOffset := swag.FormatInt64(qrOffset)\n\t\tif qOffset != \"\" {\n\t\t\tif err := r.SetQueryParam(\"offset\", qOffset); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param organization\n\tif err := r.SetPathParam(\"organization\", o.Organization); err != nil {\n\t\treturn err\n\t}\n\n\t// path param project\n\tif err := r.SetPathParam(\"project\", o.Project); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "53da9ba15853f976ca3cb0344cd547db", "score": "0.6915928", "text": "func (o *CreateanewPbxDeviceParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// header param Content-Type\n\tif err := r.SetHeaderParam(\"Content-Type\", o.ContentType); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "275197dea7360b92add55500e0e42e49", "score": "0.6913418", "text": "func (o *SetActionParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.JSONBody != nil {\n\t\tif err := r.SetBodyParam(o.JSONBody); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param collectorId\n\tif err := r.SetPathParam(\"collectorId\", o.CollectorID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f83bbb67735987b7244093902727aa8d", "score": "0.69129723", "text": "func (o *ServeChangesParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Build != nil {\n\n\t\t// query param build\n\t\tvar qrBuild string\n\t\tif o.Build != nil {\n\t\t\tqrBuild = *o.Build\n\t\t}\n\t\tqBuild := qrBuild\n\t\tif qBuild != \"\" {\n\t\t\tif err := r.SetQueryParam(\"build\", qBuild); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.BuildType != nil {\n\n\t\t// query param buildType\n\t\tvar qrBuildType string\n\t\tif o.BuildType != nil {\n\t\t\tqrBuildType = *o.BuildType\n\t\t}\n\t\tqBuildType := qrBuildType\n\t\tif qBuildType != \"\" {\n\t\t\tif err := r.SetQueryParam(\"buildType\", qBuildType); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Count != nil {\n\n\t\t// query param count\n\t\tvar qrCount int32\n\t\tif o.Count != nil {\n\t\t\tqrCount = *o.Count\n\t\t}\n\t\tqCount := swag.FormatInt32(qrCount)\n\t\tif qCount != \"\" {\n\t\t\tif err := r.SetQueryParam(\"count\", qCount); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Fields != nil {\n\n\t\t// query param fields\n\t\tvar qrFields string\n\t\tif o.Fields != nil {\n\t\t\tqrFields = *o.Fields\n\t\t}\n\t\tqFields := qrFields\n\t\tif qFields != \"\" {\n\t\t\tif err := r.SetQueryParam(\"fields\", qFields); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Locator != nil {\n\n\t\t// query param locator\n\t\tvar qrLocator string\n\t\tif o.Locator != nil {\n\t\t\tqrLocator = *o.Locator\n\t\t}\n\t\tqLocator := qrLocator\n\t\tif qLocator != \"\" {\n\t\t\tif err := r.SetQueryParam(\"locator\", qLocator); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Project != nil {\n\n\t\t// query param project\n\t\tvar qrProject string\n\t\tif o.Project != nil {\n\t\t\tqrProject = *o.Project\n\t\t}\n\t\tqProject := qrProject\n\t\tif qProject != \"\" {\n\t\t\tif err := r.SetQueryParam(\"project\", qProject); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.SinceChange != nil {\n\n\t\t// query param sinceChange\n\t\tvar qrSinceChange string\n\t\tif o.SinceChange != nil {\n\t\t\tqrSinceChange = *o.SinceChange\n\t\t}\n\t\tqSinceChange := qrSinceChange\n\t\tif qSinceChange != \"\" {\n\t\t\tif err := r.SetQueryParam(\"sinceChange\", qSinceChange); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Start != nil {\n\n\t\t// query param start\n\t\tvar qrStart int64\n\t\tif o.Start != nil {\n\t\t\tqrStart = *o.Start\n\t\t}\n\t\tqStart := swag.FormatInt64(qrStart)\n\t\tif qStart != \"\" {\n\t\t\tif err := r.SetQueryParam(\"start\", qStart); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.VcsRoot != nil {\n\n\t\t// query param vcsRoot\n\t\tvar qrVcsRoot string\n\t\tif o.VcsRoot != nil {\n\t\t\tqrVcsRoot = *o.VcsRoot\n\t\t}\n\t\tqVcsRoot := qrVcsRoot\n\t\tif qVcsRoot != \"\" {\n\t\t\tif err := r.SetQueryParam(\"vcsRoot\", qVcsRoot); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "16342355ecd2a737994236309f05526b", "score": "0.69064116", "text": "func (o *DescribeKeyPairsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Description != nil {\n\n\t\t// query param description\n\t\tvar qrDescription string\n\t\tif o.Description != nil {\n\t\t\tqrDescription = *o.Description\n\t\t}\n\t\tqDescription := qrDescription\n\t\tif qDescription != \"\" {\n\t\t\tif err := r.SetQueryParam(\"description\", qDescription); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.KeyPairID != nil {\n\n\t\t// query param key_pair_id\n\t\tvar qrKeyPairID string\n\t\tif o.KeyPairID != nil {\n\t\t\tqrKeyPairID = *o.KeyPairID\n\t\t}\n\t\tqKeyPairID := qrKeyPairID\n\t\tif qKeyPairID != \"\" {\n\t\t\tif err := r.SetQueryParam(\"key_pair_id\", qKeyPairID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int64\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt64(qrLimit)\n\t\tif qLimit != \"\" {\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Name != nil {\n\n\t\t// query param name\n\t\tvar qrName string\n\t\tif o.Name != nil {\n\t\t\tqrName = *o.Name\n\t\t}\n\t\tqName := qrName\n\t\tif qName != \"\" {\n\t\t\tif err := r.SetQueryParam(\"name\", qName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Offset != nil {\n\n\t\t// query param offset\n\t\tvar qrOffset int64\n\t\tif o.Offset != nil {\n\t\t\tqrOffset = *o.Offset\n\t\t}\n\t\tqOffset := swag.FormatInt64(qrOffset)\n\t\tif qOffset != \"\" {\n\t\t\tif err := r.SetQueryParam(\"offset\", qOffset); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tvaluesOwner := o.Owner\n\n\tjoinedOwner := swag.JoinByFormat(valuesOwner, \"multi\")\n\t// query array param owner\n\tif err := r.SetQueryParam(\"owner\", joinedOwner...); err != nil {\n\t\treturn err\n\t}\n\n\tif o.PubKey != nil {\n\n\t\t// query param pub_key\n\t\tvar qrPubKey string\n\t\tif o.PubKey != nil {\n\t\t\tqrPubKey = *o.PubKey\n\t\t}\n\t\tqPubKey := qrPubKey\n\t\tif qPubKey != \"\" {\n\t\t\tif err := r.SetQueryParam(\"pub_key\", qPubKey); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.SearchWord != nil {\n\n\t\t// query param search_word\n\t\tvar qrSearchWord string\n\t\tif o.SearchWord != nil {\n\t\t\tqrSearchWord = *o.SearchWord\n\t\t}\n\t\tqSearchWord := qrSearchWord\n\t\tif qSearchWord != \"\" {\n\t\t\tif err := r.SetQueryParam(\"search_word\", qSearchWord); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "54be5cc7e03f3d3636f2c3d5ff5af80b", "score": "0.6892378", "text": "func (o *GetCDNIpsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Filter != nil {\n\n\t\t// query param filter\n\t\tvar qrFilter string\n\t\tif o.Filter != nil {\n\t\t\tqrFilter = *o.Filter\n\t\t}\n\t\tqFilter := qrFilter\n\t\tif qFilter != \"\" {\n\t\t\tif err := r.SetQueryParam(\"filter\", qFilter); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.ResponseType != nil {\n\n\t\t// query param response_type\n\t\tvar qrResponseType string\n\t\tif o.ResponseType != nil {\n\t\t\tqrResponseType = *o.ResponseType\n\t\t}\n\t\tqResponseType := qrResponseType\n\t\tif qResponseType != \"\" {\n\t\t\tif err := r.SetQueryParam(\"response_type\", qResponseType); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d32d6e0667c3b0f982ed936bd5f1b916", "score": "0.6888891", "text": "func (o *FpolicyCreateParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\tif o.Info != nil {\n\t\tif err := r.SetBodyParam(o.Info); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.ReturnRecords != nil {\n\n\t\t// query param return_records\n\t\tvar qrReturnRecords bool\n\n\t\tif o.ReturnRecords != nil {\n\t\t\tqrReturnRecords = *o.ReturnRecords\n\t\t}\n\t\tqReturnRecords := swag.FormatBool(qrReturnRecords)\n\t\tif qReturnRecords != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"return_records\", qReturnRecords); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9372ea57f2d8185f321076ad392de6f6", "score": "0.68696797", "text": "func (o *PushGatewayRequestsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.GatewayRequestEvents != nil {\n\t\tif err := r.SetBodyParam(o.GatewayRequestEvents); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.AuthorizerVersion != nil {\n\n\t\t// query param authorizer_version\n\t\tvar qrAuthorizerVersion string\n\t\tif o.AuthorizerVersion != nil {\n\t\t\tqrAuthorizerVersion = *o.AuthorizerVersion\n\t\t}\n\t\tqAuthorizerVersion := qrAuthorizerVersion\n\t\tif qAuthorizerVersion != \"\" {\n\t\t\tif err := r.SetQueryParam(\"authorizer_version\", qAuthorizerVersion); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param tid\n\tif err := r.SetPathParam(\"tid\", o.Tid); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "fca9e0a36f047f0f91cfceafd6f9a59f", "score": "0.68685174", "text": "func (o *GetVlansParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.ContentLanguage != nil {\n\n\t\t// header param content-language\n\t\tif err := r.SetHeaderParam(\"content-language\", *o.ContentLanguage); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif o.RequestBody != nil {\n\t\tif err := r.SetBodyParam(o.RequestBody); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4fb8eb7340cbd1d0e5331f27090c59b4", "score": "0.68678206", "text": "func (o *GetPacketAnalyzerParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param id\n\tif err := r.SetPathParam(\"id\", o.ID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9c7213744ff4f08f2910c20df211fc55", "score": "0.6862503", "text": "func (o *GetPaymentsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Length != nil {\n\n\t\t// query param length\n\t\tvar qrLength int64\n\t\tif o.Length != nil {\n\t\t\tqrLength = *o.Length\n\t\t}\n\t\tqLength := swag.FormatInt64(qrLength)\n\t\tif qLength != \"\" {\n\t\t\tif err := r.SetQueryParam(\"length\", qLength); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Offset != nil {\n\n\t\t// query param offset\n\t\tvar qrOffset int64\n\t\tif o.Offset != nil {\n\t\t\tqrOffset = *o.Offset\n\t\t}\n\t\tqOffset := swag.FormatInt64(qrOffset)\n\t\tif qOffset != \"\" {\n\t\t\tif err := r.SetQueryParam(\"offset\", qOffset); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6aa364e19e3b18a298402b01742cccc5", "score": "0.68607074", "text": "func (o *CreateIOCParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "49c2608f627cc9bd78cfb0e7c4adb28f", "score": "0.6859398", "text": "func (o *GetaspecificNumberParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param id\n\tif err := r.SetPathParam(\"id\", o.ID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1c45ffa9186014b16413cf814d7423c0", "score": "0.68499905", "text": "func (o *GetUsingGET1Params) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// header param Authorization\n\tif err := r.SetHeaderParam(\"Authorization\", o.Authorization); err != nil {\n\t\treturn err\n\t}\n\n\t// query param apiVersion\n\tqrAPIVersion := o.APIVersion\n\tqAPIVersion := qrAPIVersion\n\n\tif err := r.SetQueryParam(\"apiVersion\", qAPIVersion); err != nil {\n\t\treturn err\n\t}\n\n\t// path param id\n\tif err := r.SetPathParam(\"id\", o.ID); err != nil {\n\t\treturn err\n\t}\n\n\tif o.QueryParams != nil {\n\n\t\t// binding items for queryParams\n\t\tjoinedQueryParams := o.bindParamQueryParams(reg)\n\n\t\t// query array param queryParams\n\t\tif err := r.SetQueryParam(\"queryParams\", joinedQueryParams...); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "faba4803bfc3c66e35aeef5b439f951d", "score": "0.6839103", "text": "func (o *GetPolicyParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\tif o.Labels != nil {\n\t\tif err := r.SetBodyParam(o.Labels); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d3bd98f1ea270a312d855de6a18cc361", "score": "0.68358207", "text": "func (o *ListParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// query param api-version\n\tqrAPIVersion := o.APIVersion\n\tqAPIVersion := qrAPIVersion\n\tif qAPIVersion != \"\" {\n\t\tif err := r.SetQueryParam(\"api-version\", qAPIVersion); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.AssetTypes != nil {\n\n\t\t// query param assetTypes\n\t\tvar qrAssetTypes string\n\t\tif o.AssetTypes != nil {\n\t\t\tqrAssetTypes = *o.AssetTypes\n\t\t}\n\t\tqAssetTypes := qrAssetTypes\n\t\tif qAssetTypes != \"\" {\n\t\t\tif err := r.SetQueryParam(\"assetTypes\", qAssetTypes); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.IncludeDisabledExtensions != nil {\n\n\t\t// query param includeDisabledExtensions\n\t\tvar qrIncludeDisabledExtensions bool\n\t\tif o.IncludeDisabledExtensions != nil {\n\t\t\tqrIncludeDisabledExtensions = *o.IncludeDisabledExtensions\n\t\t}\n\t\tqIncludeDisabledExtensions := swag.FormatBool(qrIncludeDisabledExtensions)\n\t\tif qIncludeDisabledExtensions != \"\" {\n\t\t\tif err := r.SetQueryParam(\"includeDisabledExtensions\", qIncludeDisabledExtensions); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.IncludeErrors != nil {\n\n\t\t// query param includeErrors\n\t\tvar qrIncludeErrors bool\n\t\tif o.IncludeErrors != nil {\n\t\t\tqrIncludeErrors = *o.IncludeErrors\n\t\t}\n\t\tqIncludeErrors := swag.FormatBool(qrIncludeErrors)\n\t\tif qIncludeErrors != \"\" {\n\t\t\tif err := r.SetQueryParam(\"includeErrors\", qIncludeErrors); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.IncludeInstallationIssues != nil {\n\n\t\t// query param includeInstallationIssues\n\t\tvar qrIncludeInstallationIssues bool\n\t\tif o.IncludeInstallationIssues != nil {\n\t\t\tqrIncludeInstallationIssues = *o.IncludeInstallationIssues\n\t\t}\n\t\tqIncludeInstallationIssues := swag.FormatBool(qrIncludeInstallationIssues)\n\t\tif qIncludeInstallationIssues != \"\" {\n\t\t\tif err := r.SetQueryParam(\"includeInstallationIssues\", qIncludeInstallationIssues); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param organization\n\tif err := r.SetPathParam(\"organization\", o.Organization); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "672254ef57e2fb67abdb57f85aed572c", "score": "0.6812041", "text": "func (o *GetResourceActionsUsingGETParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param depId\n\tif err := r.SetPathParam(\"depId\", o.DepID.String()); err != nil {\n\t\treturn err\n\t}\n\n\t// path param resourceId\n\tif err := r.SetPathParam(\"resourceId\", o.ResourceID.String()); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "66b8b630e3d235ab1b6a525f82a04836", "score": "0.6808544", "text": "func (o *GetStatsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param namespace\n\tif err := r.SetPathParam(\"namespace\", o.Namespace); err != nil {\n\t\treturn err\n\t}\n\n\tif o.CycleIds != nil {\n\n\t\t// query param cycleIds\n\t\tvar qrCycleIds string\n\t\tif o.CycleIds != nil {\n\t\t\tqrCycleIds = *o.CycleIds\n\t\t}\n\t\tqCycleIds := qrCycleIds\n\t\tif qCycleIds != \"\" {\n\t\t\tif err := r.SetQueryParam(\"cycleIds\", qCycleIds); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.IsGlobal != nil {\n\n\t\t// query param isGlobal\n\t\tvar qrIsGlobal bool\n\t\tif o.IsGlobal != nil {\n\t\t\tqrIsGlobal = *o.IsGlobal\n\t\t}\n\t\tqIsGlobal := swag.FormatBool(qrIsGlobal)\n\t\tif qIsGlobal != \"\" {\n\t\t\tif err := r.SetQueryParam(\"isGlobal\", qIsGlobal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.IsPublic != nil {\n\n\t\t// query param isPublic\n\t\tvar qrIsPublic bool\n\t\tif o.IsPublic != nil {\n\t\t\tqrIsPublic = *o.IsPublic\n\t\t}\n\t\tqIsPublic := swag.FormatBool(qrIsPublic)\n\t\tif qIsPublic != \"\" {\n\t\t\tif err := r.SetQueryParam(\"isPublic\", qIsPublic); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int32\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt32(qrLimit)\n\t\tif qLimit != \"\" {\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Offset != nil {\n\n\t\t// query param offset\n\t\tvar qrOffset int32\n\t\tif o.Offset != nil {\n\t\t\tqrOffset = *o.Offset\n\t\t}\n\t\tqOffset := swag.FormatInt32(qrOffset)\n\t\tif qOffset != \"\" {\n\t\t\tif err := r.SetQueryParam(\"offset\", qOffset); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// setting the default header value\n\tif err := r.SetHeaderParam(\"User-Agent\", utils.UserAgentGen()); err != nil {\n\t\treturn err\n\t}\n\n\tif err := r.SetHeaderParam(\"X-Amzn-Trace-Id\", utils.AmazonTraceIDGen()); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "12d956d09db75880d841fd22b32a0d06", "score": "0.68071437", "text": "func (o *EndpointsDiscoveryParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.EndpointType != nil {\n\n\t\t// query param EndpointType\n\t\tvar qrEndpointType string\n\n\t\tif o.EndpointType != nil {\n\t\t\tqrEndpointType = *o.EndpointType\n\t\t}\n\t\tqEndpointType := qrEndpointType\n\t\tif qEndpointType != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"EndpointType\", qEndpointType); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dbae8dd76545e1497214d68751ec69e3", "score": "0.68004817", "text": "func (o *GetCheckMetricDataParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.From != nil {\n\n\t\t// query param from\n\t\tvar qrFrom strfmt.DateTime\n\n\t\tif o.From != nil {\n\t\t\tqrFrom = *o.From\n\t\t}\n\t\tqFrom := qrFrom.String()\n\t\tif qFrom != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"from\", qFrom); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\t// path param id\n\tif err := r.SetPathParam(\"id\", swag.FormatInt32(o.ID)); err != nil {\n\t\treturn err\n\t}\n\n\tif o.IncludeSummary != nil {\n\n\t\t// query param include_summary\n\t\tvar qrIncludeSummary bool\n\n\t\tif o.IncludeSummary != nil {\n\t\t\tqrIncludeSummary = *o.IncludeSummary\n\t\t}\n\t\tqIncludeSummary := swag.FormatBool(qrIncludeSummary)\n\t\tif qIncludeSummary != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"include_summary\", qIncludeSummary); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Locations != nil {\n\n\t\t// binding items for locations\n\t\tjoinedLocations := o.bindParamLocations(reg)\n\n\t\t// query array param locations\n\t\tif err := r.SetQueryParam(\"locations\", joinedLocations...); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.Names != nil {\n\n\t\t// binding items for names\n\t\tjoinedNames := o.bindParamNames(reg)\n\n\t\t// query array param names\n\t\tif err := r.SetQueryParam(\"names\", joinedNames...); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.Range != nil {\n\n\t\t// query param range\n\t\tvar qrRange string\n\n\t\tif o.Range != nil {\n\t\t\tqrRange = *o.Range\n\t\t}\n\t\tqRange := qrRange\n\t\tif qRange != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"range\", qRange); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.To != nil {\n\n\t\t// query param to\n\t\tvar qrTo strfmt.DateTime\n\n\t\tif o.To != nil {\n\t\t\tqrTo = *o.To\n\t\t}\n\t\tqTo := qrTo.String()\n\t\tif qTo != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"to\", qTo); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "11e03c631f3685120415fc778de6d38f", "score": "0.6792646", "text": "func (o *CreateCustomPropertyForDeviceParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param deviceId\n\tif err := r.SetPathParam(\"deviceId\", o.DeviceID); err != nil {\n\t\treturn err\n\t}\n\n\tif err := r.SetBodyParam(o.Request); err != nil {\n\t\treturn err\n\t}\n\n\t// path param tenantId\n\tif err := r.SetPathParam(\"tenantId\", o.TenantID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a22757fdb49ee63f26fccc4b8b74e454", "score": "0.6785254", "text": "func (o *AcceptBackfillParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param backfillID\n\tif err := r.SetPathParam(\"backfillID\", o.BackfillID); err != nil {\n\t\treturn err\n\t}\n\n\t// path param namespace\n\tif err := r.SetPathParam(\"namespace\", o.Namespace); err != nil {\n\t\treturn err\n\t}\n\n\t// setting the default header value\n\tif err := r.SetHeaderParam(\"User-Agent\", utils.UserAgentGen()); err != nil {\n\t\treturn err\n\t}\n\n\tif err := r.SetHeaderParam(\"X-Amzn-Trace-Id\", utils.AmazonTraceIDGen()); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ad230d1e4dc87a6bcff4f70b4a2e7c49", "score": "0.67785335", "text": "func (o *GetPublicGetInstrumentsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// query param currency\n\tqrCurrency := o.Currency\n\tqCurrency := qrCurrency\n\tif qCurrency != \"\" {\n\t\tif err := r.SetQueryParam(\"currency\", qCurrency); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.Expired != nil {\n\n\t\t// query param expired\n\t\tvar qrExpired bool\n\t\tif o.Expired != nil {\n\t\t\tqrExpired = *o.Expired\n\t\t}\n\t\tqExpired := swag.FormatBool(qrExpired)\n\t\tif qExpired != \"\" {\n\t\t\tif err := r.SetQueryParam(\"expired\", qExpired); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Kind != nil {\n\n\t\t// query param kind\n\t\tvar qrKind string\n\t\tif o.Kind != nil {\n\t\t\tqrKind = *o.Kind\n\t\t}\n\t\tqKind := qrKind\n\t\tif qKind != \"\" {\n\t\t\tif err := r.SetQueryParam(\"kind\", qKind); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7852b5a12a3052e62e2fe03de63c42f9", "score": "0.6778388", "text": "func (o *WorkflowsGetByInstanceIDParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param identifier\n\tif err := r.SetPathParam(\"identifier\", o.Identifier); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0c7f164d995cf67ebcd7eb66624efe8f", "score": "0.67740047", "text": "func (o *AllocateSpecificIPParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param ip\n\tif err := r.SetPathParam(\"ip\", o.IP); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "47b6fec5016971cb2b85d6be999f1ae2", "score": "0.6768444", "text": "func (o *ListAccessPointsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Versions != nil {\n\n\t\t// query param versions\n\t\tvar qrVersions bool\n\t\tif o.Versions != nil {\n\t\t\tqrVersions = *o.Versions\n\t\t}\n\t\tqVersions := swag.FormatBool(qrVersions)\n\t\tif qVersions != \"\" {\n\t\t\tif err := r.SetQueryParam(\"versions\", qVersions); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "027c5fdff9bff04d1636dcdd341fe04f", "score": "0.67646044", "text": "func (o *AutoUpdateConfigurationCollectionGetParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Action != nil {\n\n\t\t// query param action\n\t\tvar qrAction string\n\n\t\tif o.Action != nil {\n\t\t\tqrAction = *o.Action\n\t\t}\n\t\tqAction := qrAction\n\t\tif qAction != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"action\", qAction); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Category != nil {\n\n\t\t// query param category\n\t\tvar qrCategory string\n\n\t\tif o.Category != nil {\n\t\t\tqrCategory = *o.Category\n\t\t}\n\t\tqCategory := qrCategory\n\t\tif qCategory != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"category\", qCategory); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.DescriptionCode != nil {\n\n\t\t// query param description.code\n\t\tvar qrDescriptionCode string\n\n\t\tif o.DescriptionCode != nil {\n\t\t\tqrDescriptionCode = *o.DescriptionCode\n\t\t}\n\t\tqDescriptionCode := qrDescriptionCode\n\t\tif qDescriptionCode != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"description.code\", qDescriptionCode); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.DescriptionMessage != nil {\n\n\t\t// query param description.message\n\t\tvar qrDescriptionMessage string\n\n\t\tif o.DescriptionMessage != nil {\n\t\t\tqrDescriptionMessage = *o.DescriptionMessage\n\t\t}\n\t\tqDescriptionMessage := qrDescriptionMessage\n\t\tif qDescriptionMessage != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"description.message\", qDescriptionMessage); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Fields != nil {\n\n\t\t// binding items for fields\n\t\tjoinedFields := o.bindParamFields(reg)\n\n\t\t// query array param fields\n\t\tif err := r.SetQueryParam(\"fields\", joinedFields...); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.MaxRecords != nil {\n\n\t\t// query param max_records\n\t\tvar qrMaxRecords int64\n\n\t\tif o.MaxRecords != nil {\n\t\t\tqrMaxRecords = *o.MaxRecords\n\t\t}\n\t\tqMaxRecords := swag.FormatInt64(qrMaxRecords)\n\t\tif qMaxRecords != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"max_records\", qMaxRecords); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.OrderBy != nil {\n\n\t\t// binding items for order_by\n\t\tjoinedOrderBy := o.bindParamOrderBy(reg)\n\n\t\t// query array param order_by\n\t\tif err := r.SetQueryParam(\"order_by\", joinedOrderBy...); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.ReturnRecords != nil {\n\n\t\t// query param return_records\n\t\tvar qrReturnRecords bool\n\n\t\tif o.ReturnRecords != nil {\n\t\t\tqrReturnRecords = *o.ReturnRecords\n\t\t}\n\t\tqReturnRecords := swag.FormatBool(qrReturnRecords)\n\t\tif qReturnRecords != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"return_records\", qReturnRecords); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.ReturnTimeout != nil {\n\n\t\t// query param return_timeout\n\t\tvar qrReturnTimeout int64\n\n\t\tif o.ReturnTimeout != nil {\n\t\t\tqrReturnTimeout = *o.ReturnTimeout\n\t\t}\n\t\tqReturnTimeout := swag.FormatInt64(qrReturnTimeout)\n\t\tif qReturnTimeout != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"return_timeout\", qReturnTimeout); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.UUID != nil {\n\n\t\t// query param uuid\n\t\tvar qrUUID string\n\n\t\tif o.UUID != nil {\n\t\t\tqrUUID = *o.UUID\n\t\t}\n\t\tqUUID := qrUUID\n\t\tif qUUID != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"uuid\", qUUID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dd0c729316a3e96e5cde8a1c08f86d4c", "score": "0.6762865", "text": "func (o *CreateIntegrationParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param id\n\tif err := r.SetPathParam(\"id\", o.ID); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Integration != nil {\n\t\tif err := r.SetBodyParam(o.Integration); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bdb44b9c0135db6c88a9dadef7950236", "score": "0.6758308", "text": "func (o *MachinePxeParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param id\n\tif err := r.SetPathParam(\"id\", o.ID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9b8932980d22cc288d9e14c87f686c15", "score": "0.6757914", "text": "func (o *GetWorkItemParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param ownerId\n\tif err := r.SetPathParam(\"ownerId\", o.OwnerID); err != nil {\n\t\treturn err\n\t}\n\n\t// path param workItemId\n\tif err := r.SetPathParam(\"workItemId\", o.WorkItemID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8471ecad79f745e34ce2554d21ed69e1", "score": "0.67489445", "text": "func (o *HelloWorldParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6cac5175fdb1a166cfe39dbe585ef24f", "score": "0.67414236", "text": "func (o *GetEventsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Cache != nil {\n\n\t\t// query param cache\n\t\tvar qrCache strfmt.Base64\n\t\tif o.Cache != nil {\n\t\t\tqrCache = *o.Cache\n\t\t}\n\t\tqCache := qrCache.String()\n\t\tif qCache != \"\" {\n\t\t\tif err := r.SetQueryParam(\"cache\", qCache); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.ContextID != nil {\n\n\t\t// query param context_id\n\t\tvar qrContextID string\n\t\tif o.ContextID != nil {\n\t\t\tqrContextID = *o.ContextID\n\t\t}\n\t\tqContextID := qrContextID\n\t\tif qContextID != \"\" {\n\t\t\tif err := r.SetQueryParam(\"context_id\", qContextID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Count != nil {\n\n\t\t// query param count\n\t\tvar qrCount int32\n\t\tif o.Count != nil {\n\t\t\tqrCount = *o.Count\n\t\t}\n\t\tqCount := swag.FormatInt32(qrCount)\n\t\tif qCount != \"\" {\n\t\t\tif err := r.SetQueryParam(\"count\", qCount); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Index != nil {\n\n\t\t// query param index\n\t\tvar qrIndex int32\n\t\tif o.Index != nil {\n\t\t\tqrIndex = *o.Index\n\t\t}\n\t\tqIndex := swag.FormatInt32(qrIndex)\n\t\tif qIndex != \"\" {\n\t\t\tif err := r.SetQueryParam(\"index\", qIndex); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Keywords != nil {\n\n\t\t// query param keywords\n\t\tvar qrKeywords string\n\t\tif o.Keywords != nil {\n\t\t\tqrKeywords = *o.Keywords\n\t\t}\n\t\tqKeywords := qrKeywords\n\t\tif qKeywords != \"\" {\n\t\t\tif err := r.SetQueryParam(\"keywords\", qKeywords); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Report != nil {\n\n\t\t// query param report\n\t\tvar qrReport string\n\t\tif o.Report != nil {\n\t\t\tqrReport = *o.Report\n\t\t}\n\t\tqReport := qrReport\n\t\tif qReport != \"\" {\n\t\t\tif err := r.SetQueryParam(\"report\", qReport); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Transform != nil {\n\n\t\t// query param transform\n\t\tvar qrTransform string\n\t\tif o.Transform != nil {\n\t\t\tqrTransform = *o.Transform\n\t\t}\n\t\tqTransform := qrTransform\n\t\tif qTransform != \"\" {\n\t\t\tif err := r.SetQueryParam(\"transform\", qTransform); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bdf12cd12db277b97d148c539dfd587f", "score": "0.6737964", "text": "func (o *RevokeParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param aid\n\tif err := r.SetPathParam(\"aid\", o.Aid); err != nil {\n\t\treturn err\n\t}\n\n\t// path param tid\n\tif err := r.SetPathParam(\"tid\", o.Tid); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Token != nil {\n\n\t\t// form param token\n\t\tvar frToken string\n\t\tif o.Token != nil {\n\t\t\tfrToken = *o.Token\n\t\t}\n\t\tfToken := frToken\n\t\tif fToken != \"\" {\n\t\t\tif err := r.SetFormParam(\"token\", fToken); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d4db7a285e3a223247a22fcc77203922", "score": "0.6735563", "text": "func (o *BurnTokenParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif err := r.SetBodyParam(o.Amount); err != nil {\n\t\treturn err\n\t}\n\n\t// path param symbol\n\tif err := r.SetPathParam(\"symbol\", o.Symbol); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "89ed9588eba925315152b9ec278fad3f", "score": "0.67302257", "text": "func (o *GetAppcompsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Device != nil {\n\n\t\t// query param device\n\t\tvar qrDevice string\n\t\tif o.Device != nil {\n\t\t\tqrDevice = *o.Device\n\t\t}\n\t\tqDevice := qrDevice\n\t\tif qDevice != \"\" {\n\t\t\tif err := r.SetQueryParam(\"device\", qDevice); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.DeviceID != nil {\n\n\t\t// query param device_id\n\t\tvar qrDeviceID string\n\t\tif o.DeviceID != nil {\n\t\t\tqrDeviceID = *o.DeviceID\n\t\t}\n\t\tqDeviceID := qrDeviceID\n\t\tif qDeviceID != \"\" {\n\t\t\tif err := r.SetQueryParam(\"device_id\", qDeviceID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0a95f4919feecd47afed5cffbceb08c2", "score": "0.6729972", "text": "func (o *EdgeInfoUpdateParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// header param Authorization\n\tif err := r.SetHeaderParam(\"Authorization\", o.Authorization); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param id\n\tif err := r.SetPathParam(\"id\", o.ID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b50031842a3d745c94dd0cbddcf61e84", "score": "0.67284626", "text": "func (o *ConnectPipelinesParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.JSONBody != nil {\n\t\tif err := r.SetBodyParam(o.JSONBody); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "141cbb1d2a3eb846d1aa444cd6753032", "score": "0.672571", "text": "func (o *TagsListParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Filters != nil {\n\n\t\t// query param filters\n\t\tvar qrFilters string\n\t\tif o.Filters != nil {\n\t\t\tqrFilters = *o.Filters\n\t\t}\n\t\tqFilters := qrFilters\n\t\tif qFilters != \"\" {\n\t\t\tif err := r.SetQueryParam(\"filters\", qFilters); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.ID != nil {\n\n\t\t// query param id\n\t\tvar qrID float64\n\t\tif o.ID != nil {\n\t\t\tqrID = *o.ID\n\t\t}\n\t\tqID := swag.FormatFloat64(qrID)\n\t\tif qID != \"\" {\n\t\t\tif err := r.SetQueryParam(\"id\", qID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.IDIn != nil {\n\n\t\t// query param id__in\n\t\tvar qrIDIn float64\n\t\tif o.IDIn != nil {\n\t\t\tqrIDIn = *o.IDIn\n\t\t}\n\t\tqIDIn := swag.FormatFloat64(qrIDIn)\n\t\tif qIDIn != \"\" {\n\t\t\tif err := r.SetQueryParam(\"id__in\", qIDIn); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int64\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt64(qrLimit)\n\t\tif qLimit != \"\" {\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Name != nil {\n\n\t\t// query param name\n\t\tvar qrName string\n\t\tif o.Name != nil {\n\t\t\tqrName = *o.Name\n\t\t}\n\t\tqName := qrName\n\t\tif qName != \"\" {\n\t\t\tif err := r.SetQueryParam(\"name\", qName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.NameContains != nil {\n\n\t\t// query param name__contains\n\t\tvar qrNameContains string\n\t\tif o.NameContains != nil {\n\t\t\tqrNameContains = *o.NameContains\n\t\t}\n\t\tqNameContains := qrNameContains\n\t\tif qNameContains != \"\" {\n\t\t\tif err := r.SetQueryParam(\"name__contains\", qNameContains); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.NameIcontains != nil {\n\n\t\t// query param name__icontains\n\t\tvar qrNameIcontains string\n\t\tif o.NameIcontains != nil {\n\t\t\tqrNameIcontains = *o.NameIcontains\n\t\t}\n\t\tqNameIcontains := qrNameIcontains\n\t\tif qNameIcontains != \"\" {\n\t\t\tif err := r.SetQueryParam(\"name__icontains\", qNameIcontains); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.NameStartswith != nil {\n\n\t\t// query param name__startswith\n\t\tvar qrNameStartswith string\n\t\tif o.NameStartswith != nil {\n\t\t\tqrNameStartswith = *o.NameStartswith\n\t\t}\n\t\tqNameStartswith := qrNameStartswith\n\t\tif qNameStartswith != \"\" {\n\t\t\tif err := r.SetQueryParam(\"name__startswith\", qNameStartswith); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Offset != nil {\n\n\t\t// query param offset\n\t\tvar qrOffset int64\n\t\tif o.Offset != nil {\n\t\t\tqrOffset = *o.Offset\n\t\t}\n\t\tqOffset := swag.FormatInt64(qrOffset)\n\t\tif qOffset != \"\" {\n\t\t\tif err := r.SetQueryParam(\"offset\", qOffset); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Ordering != nil {\n\n\t\t// query param ordering\n\t\tvar qrOrdering string\n\t\tif o.Ordering != nil {\n\t\t\tqrOrdering = *o.Ordering\n\t\t}\n\t\tqOrdering := qrOrdering\n\t\tif qOrdering != \"\" {\n\t\t\tif err := r.SetQueryParam(\"ordering\", qOrdering); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Org != nil {\n\n\t\t// query param org\n\t\tvar qrOrg string\n\t\tif o.Org != nil {\n\t\t\tqrOrg = *o.Org\n\t\t}\n\t\tqOrg := qrOrg\n\t\tif qOrg != \"\" {\n\t\t\tif err := r.SetQueryParam(\"org\", qOrg); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.OrgID != nil {\n\n\t\t// query param org_id\n\t\tvar qrOrgID string\n\t\tif o.OrgID != nil {\n\t\t\tqrOrgID = *o.OrgID\n\t\t}\n\t\tqOrgID := qrOrgID\n\t\tif qOrgID != \"\" {\n\t\t\tif err := r.SetQueryParam(\"org_id\", qOrgID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.OrgIDIn != nil {\n\n\t\t// query param org_id__in\n\t\tvar qrOrgIDIn string\n\t\tif o.OrgIDIn != nil {\n\t\t\tqrOrgIDIn = *o.OrgIDIn\n\t\t}\n\t\tqOrgIDIn := qrOrgIDIn\n\t\tif qOrgIDIn != \"\" {\n\t\t\tif err := r.SetQueryParam(\"org_id__in\", qOrgIDIn); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Search != nil {\n\n\t\t// query param search\n\t\tvar qrSearch string\n\t\tif o.Search != nil {\n\t\t\tqrSearch = *o.Search\n\t\t}\n\t\tqSearch := qrSearch\n\t\tif qSearch != \"\" {\n\t\t\tif err := r.SetQueryParam(\"search\", qSearch); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "91e06a67a399f56be5cb40a572d85849", "score": "0.67242163", "text": "func (o *ExtrasCustomFieldsListParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.ContentTypes != nil {\n\n\t\t// query param content_types\n\t\tvar qrContentTypes string\n\n\t\tif o.ContentTypes != nil {\n\t\t\tqrContentTypes = *o.ContentTypes\n\t\t}\n\t\tqContentTypes := qrContentTypes\n\t\tif qContentTypes != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"content_types\", qContentTypes); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.FilterLogic != nil {\n\n\t\t// query param filter_logic\n\t\tvar qrFilterLogic string\n\n\t\tif o.FilterLogic != nil {\n\t\t\tqrFilterLogic = *o.FilterLogic\n\t\t}\n\t\tqFilterLogic := qrFilterLogic\n\t\tif qFilterLogic != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"filter_logic\", qFilterLogic); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.ID != nil {\n\n\t\t// query param id\n\t\tvar qrID float64\n\n\t\tif o.ID != nil {\n\t\t\tqrID = *o.ID\n\t\t}\n\t\tqID := swag.FormatFloat64(qrID)\n\t\tif qID != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"id\", qID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int64\n\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt64(qrLimit)\n\t\tif qLimit != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Name != nil {\n\n\t\t// query param name\n\t\tvar qrName string\n\n\t\tif o.Name != nil {\n\t\t\tqrName = *o.Name\n\t\t}\n\t\tqName := qrName\n\t\tif qName != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"name\", qName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Offset != nil {\n\n\t\t// query param offset\n\t\tvar qrOffset int64\n\n\t\tif o.Offset != nil {\n\t\t\tqrOffset = *o.Offset\n\t\t}\n\t\tqOffset := swag.FormatInt64(qrOffset)\n\t\tif qOffset != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"offset\", qOffset); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Required != nil {\n\n\t\t// query param required\n\t\tvar qrRequired string\n\n\t\tif o.Required != nil {\n\t\t\tqrRequired = *o.Required\n\t\t}\n\t\tqRequired := qrRequired\n\t\tif qRequired != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"required\", qRequired); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Weight != nil {\n\n\t\t// query param weight\n\t\tvar qrWeight float64\n\n\t\tif o.Weight != nil {\n\t\t\tqrWeight = *o.Weight\n\t\t}\n\t\tqWeight := swag.FormatFloat64(qrWeight)\n\t\tif qWeight != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"weight\", qWeight); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "69cac8b43ec57264d4518088fb113cd3", "score": "0.67221296", "text": "func (o *PostKeysKeyParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tr.SetTimeout(o.timeout)\n\tvar res []error\n\n\t// path param key\n\tif err := r.SetPathParam(\"key\", o.Key); err != nil {\n\t\treturn err\n\t}\n\n\t// query param value\n\tqrValue := o.Value\n\tqValue := qrValue\n\tif qValue != \"\" {\n\t\tif err := r.SetQueryParam(\"value\", qValue); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "41c94cce296b15e5fad37b1e053862c0", "score": "0.6721347", "text": "func (o *MultiAdminVerifyRequestModifyParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param index\n\tif err := r.SetPathParam(\"index\", o.Index); err != nil {\n\t\treturn err\n\t}\n\tif o.Info != nil {\n\t\tif err := r.SetBodyParam(o.Info); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "649d2b43b93c30aec7936957ab5ed9ff", "score": "0.6719077", "text": "func (o *APIKeyEnableParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// form param apiKeyID\n\tfrAPIKeyID := o.APIKeyID\n\tfAPIKeyID := frAPIKeyID\n\tif fAPIKeyID != \"\" {\n\t\tif err := r.SetFormParam(\"apiKeyID\", fAPIKeyID); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2e39ed588133b6aa9da6c7545e755559", "score": "0.6716691", "text": "func (o *ServeBuildsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.AgentName != nil {\n\n\t\t// query param agentName\n\t\tvar qrAgentName string\n\t\tif o.AgentName != nil {\n\t\t\tqrAgentName = *o.AgentName\n\t\t}\n\t\tqAgentName := qrAgentName\n\t\tif qAgentName != \"\" {\n\t\t\tif err := r.SetQueryParam(\"agentName\", qAgentName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param btLocator\n\tif err := r.SetPathParam(\"btLocator\", o.BtLocator); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Count != nil {\n\n\t\t// query param count\n\t\tvar qrCount int32\n\t\tif o.Count != nil {\n\t\t\tqrCount = *o.Count\n\t\t}\n\t\tqCount := swag.FormatInt32(qrCount)\n\t\tif qCount != \"\" {\n\t\t\tif err := r.SetQueryParam(\"count\", qCount); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Fields != nil {\n\n\t\t// query param fields\n\t\tvar qrFields string\n\t\tif o.Fields != nil {\n\t\t\tqrFields = *o.Fields\n\t\t}\n\t\tqFields := qrFields\n\t\tif qFields != \"\" {\n\t\t\tif err := r.SetQueryParam(\"fields\", qFields); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.IncludeCanceled != nil {\n\n\t\t// query param includeCanceled\n\t\tvar qrIncludeCanceled bool\n\t\tif o.IncludeCanceled != nil {\n\t\t\tqrIncludeCanceled = *o.IncludeCanceled\n\t\t}\n\t\tqIncludeCanceled := swag.FormatBool(qrIncludeCanceled)\n\t\tif qIncludeCanceled != \"\" {\n\t\t\tif err := r.SetQueryParam(\"includeCanceled\", qIncludeCanceled); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.IncludePersonal != nil {\n\n\t\t// query param includePersonal\n\t\tvar qrIncludePersonal bool\n\t\tif o.IncludePersonal != nil {\n\t\t\tqrIncludePersonal = *o.IncludePersonal\n\t\t}\n\t\tqIncludePersonal := swag.FormatBool(qrIncludePersonal)\n\t\tif qIncludePersonal != \"\" {\n\t\t\tif err := r.SetQueryParam(\"includePersonal\", qIncludePersonal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Locator != nil {\n\n\t\t// query param locator\n\t\tvar qrLocator string\n\t\tif o.Locator != nil {\n\t\t\tqrLocator = *o.Locator\n\t\t}\n\t\tqLocator := qrLocator\n\t\tif qLocator != \"\" {\n\t\t\tif err := r.SetQueryParam(\"locator\", qLocator); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.OnlyPinned != nil {\n\n\t\t// query param onlyPinned\n\t\tvar qrOnlyPinned bool\n\t\tif o.OnlyPinned != nil {\n\t\t\tqrOnlyPinned = *o.OnlyPinned\n\t\t}\n\t\tqOnlyPinned := swag.FormatBool(qrOnlyPinned)\n\t\tif qOnlyPinned != \"\" {\n\t\t\tif err := r.SetQueryParam(\"onlyPinned\", qOnlyPinned); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param projectLocator\n\tif err := r.SetPathParam(\"projectLocator\", o.ProjectLocator); err != nil {\n\t\treturn err\n\t}\n\n\tif o.SinceBuild != nil {\n\n\t\t// query param sinceBuild\n\t\tvar qrSinceBuild string\n\t\tif o.SinceBuild != nil {\n\t\t\tqrSinceBuild = *o.SinceBuild\n\t\t}\n\t\tqSinceBuild := qrSinceBuild\n\t\tif qSinceBuild != \"\" {\n\t\t\tif err := r.SetQueryParam(\"sinceBuild\", qSinceBuild); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.SinceDate != nil {\n\n\t\t// query param sinceDate\n\t\tvar qrSinceDate string\n\t\tif o.SinceDate != nil {\n\t\t\tqrSinceDate = *o.SinceDate\n\t\t}\n\t\tqSinceDate := qrSinceDate\n\t\tif qSinceDate != \"\" {\n\t\t\tif err := r.SetQueryParam(\"sinceDate\", qSinceDate); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Start != nil {\n\n\t\t// query param start\n\t\tvar qrStart int64\n\t\tif o.Start != nil {\n\t\t\tqrStart = *o.Start\n\t\t}\n\t\tqStart := swag.FormatInt64(qrStart)\n\t\tif qStart != \"\" {\n\t\t\tif err := r.SetQueryParam(\"start\", qStart); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Status != nil {\n\n\t\t// query param status\n\t\tvar qrStatus string\n\t\tif o.Status != nil {\n\t\t\tqrStatus = *o.Status\n\t\t}\n\t\tqStatus := qrStatus\n\t\tif qStatus != \"\" {\n\t\t\tif err := r.SetQueryParam(\"status\", qStatus); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tvaluesTag := o.Tag\n\n\tjoinedTag := swag.JoinByFormat(valuesTag, \"multi\")\n\t// query array param tag\n\tif err := r.SetQueryParam(\"tag\", joinedTag...); err != nil {\n\t\treturn err\n\t}\n\n\tif o.TriggeredByUser != nil {\n\n\t\t// query param triggeredByUser\n\t\tvar qrTriggeredByUser string\n\t\tif o.TriggeredByUser != nil {\n\t\t\tqrTriggeredByUser = *o.TriggeredByUser\n\t\t}\n\t\tqTriggeredByUser := qrTriggeredByUser\n\t\tif qTriggeredByUser != \"\" {\n\t\t\tif err := r.SetQueryParam(\"triggeredByUser\", qTriggeredByUser); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c61032dbdddb1a62580d9f4cbf995836", "score": "0.67122823", "text": "func (o *CreateAttributeDefinitionParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Resource != nil {\n\t\tif err := r.SetBodyParam(o.Resource); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8821617a129977f2f78fcf115248561d", "score": "0.67069095", "text": "func (o *AddCapabilityParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif err := r.SetBodyParam(o.Request); err != nil {\n\t\treturn err\n\t}\n\n\t// path param sensorTypeId\n\tif err := r.SetPathParam(\"sensorTypeId\", o.SensorTypeID); err != nil {\n\t\treturn err\n\t}\n\n\t// path param tenantId\n\tif err := r.SetPathParam(\"tenantId\", o.TenantID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5b15e8165482a935e686a1efa0cee275", "score": "0.670564", "text": "func (o *PostServicesParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Category != nil {\n\n\t\t// query param category\n\t\tvar qrCategory string\n\t\tif o.Category != nil {\n\t\t\tqrCategory = *o.Category\n\t\t}\n\t\tqCategory := qrCategory\n\t\tif qCategory != \"\" {\n\t\t\tif err := r.SetQueryParam(\"category\", qCategory); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Description != nil {\n\n\t\t// form param description\n\t\tvar frDescription string\n\t\tif o.Description != nil {\n\t\t\tfrDescription = *o.Description\n\t\t}\n\t\tfDescription := frDescription\n\t\tif fDescription != \"\" {\n\t\t\tif err := r.SetFormParam(\"description\", fDescription); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// query param display_name\n\tqrDisplayName := o.DisplayName\n\tqDisplayName := qrDisplayName\n\tif qDisplayName != \"\" {\n\t\tif err := r.SetQueryParam(\"display_name\", qDisplayName); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.Name != nil {\n\n\t\t// query param name\n\t\tvar qrName string\n\t\tif o.Name != nil {\n\t\t\tqrName = *o.Name\n\t\t}\n\t\tqName := qrName\n\t\tif qName != \"\" {\n\t\t\tif err := r.SetQueryParam(\"name\", qName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Notes != nil {\n\n\t\t// query param notes\n\t\tvar qrNotes string\n\t\tif o.Notes != nil {\n\t\t\tqrNotes = *o.Notes\n\t\t}\n\t\tqNotes := qrNotes\n\t\tif qNotes != \"\" {\n\t\t\tif err := r.SetQueryParam(\"notes\", qNotes); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.ServiceType != nil {\n\n\t\t// query param service_type\n\t\tvar qrServiceType string\n\t\tif o.ServiceType != nil {\n\t\t\tqrServiceType = *o.ServiceType\n\t\t}\n\t\tqServiceType := qrServiceType\n\t\tif qServiceType != \"\" {\n\t\t\tif err := r.SetQueryParam(\"service_type\", qServiceType); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Vendor != nil {\n\n\t\t// form param vendor\n\t\tvar frVendor string\n\t\tif o.Vendor != nil {\n\t\t\tfrVendor = *o.Vendor\n\t\t}\n\t\tfVendor := frVendor\n\t\tif fVendor != \"\" {\n\t\t\tif err := r.SetFormParam(\"vendor\", fVendor); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "17a87d0ebdab7a3e335413b9dd08744a", "score": "0.6704889", "text": "func (o *GetUserActivitiesHandlerParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param namespace\n\tif err := r.SetPathParam(\"namespace\", o.Namespace); err != nil {\n\t\treturn err\n\t}\n\n\t// path param userId\n\tif err := r.SetPathParam(\"userId\", o.UserID); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Offset != nil {\n\n\t\t// query param offset\n\t\tvar qrOffset int64\n\t\tif o.Offset != nil {\n\t\t\tqrOffset = *o.Offset\n\t\t}\n\t\tqOffset := swag.FormatInt64(qrOffset)\n\t\tif qOffset != \"\" {\n\t\t\tif err := r.SetQueryParam(\"offset\", qOffset); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// query param pageSize\n\tqrPageSize := o.PageSize\n\tqPageSize := swag.FormatInt64(qrPageSize)\n\tif qPageSize != \"\" {\n\t\tif err := r.SetQueryParam(\"pageSize\", qPageSize); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// setting the default header value\n\tif err := r.SetHeaderParam(\"User-Agent\", utils.UserAgentGen()); err != nil {\n\t\treturn err\n\t}\n\n\tif err := r.SetHeaderParam(\"X-Amzn-Trace-Id\", utils.AmazonTraceIDGen()); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "804c53a4e33e76e0672dff79e206e50b", "score": "0.67047167", "text": "func (o *ImageTagParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param name\n\tif err := r.SetPathParam(\"name\", o.Name); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Repo != nil {\n\n\t\t// query param repo\n\t\tvar qrRepo string\n\t\tif o.Repo != nil {\n\t\t\tqrRepo = *o.Repo\n\t\t}\n\t\tqRepo := qrRepo\n\t\tif qRepo != \"\" {\n\t\t\tif err := r.SetQueryParam(\"repo\", qRepo); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Tag != nil {\n\n\t\t// query param tag\n\t\tvar qrTag string\n\t\tif o.Tag != nil {\n\t\t\tqrTag = *o.Tag\n\t\t}\n\t\tqTag := qrTag\n\t\tif qTag != \"\" {\n\t\t\tif err := r.SetQueryParam(\"tag\", qTag); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "164ce237e7577dfb6fe39e3c66cb8ff9", "score": "0.6701539", "text": "func (o *GetTriggerParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param btLocator\n\tif err := r.SetPathParam(\"btLocator\", o.BtLocator); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Fields != nil {\n\n\t\t// query param fields\n\t\tvar qrFields string\n\t\tif o.Fields != nil {\n\t\t\tqrFields = *o.Fields\n\t\t}\n\t\tqFields := qrFields\n\t\tif qFields != \"\" {\n\t\t\tif err := r.SetQueryParam(\"fields\", qFields); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param triggerLocator\n\tif err := r.SetPathParam(\"triggerLocator\", o.TriggerLocator); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c05d6b8401064c3d3f0a4563a57b3e03", "score": "0.6688225", "text": "func (o *PostClientinfoParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Authorization != nil {\n\n\t\t// header param Authorization\n\t\tif err := r.SetHeaderParam(\"Authorization\", *o.Authorization); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\t// form param access_token\n\tfrAccessToken := o.AccessToken\n\tfAccessToken := frAccessToken\n\tif fAccessToken != \"\" {\n\t\tif err := r.SetFormParam(\"access_token\", fAccessToken); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6430ed05e4d5835673d95d378ed70beb", "score": "0.66768634", "text": "func (o *GetResourcesParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tr.SetTimeout(o.timeout)\n\tvar res []error\n\n\tif o.Accept != nil {\n\n\t\t// query param Accept\n\t\tvar qrAccept string\n\t\tif o.Accept != nil {\n\t\t\tqrAccept = *o.Accept\n\t\t}\n\t\tqAccept := qrAccept\n\t\tif qAccept != \"\" {\n\t\t\tif err := r.SetQueryParam(\"Accept\", qAccept); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.AccessType != nil {\n\n\t\t// query param accessType\n\t\tvar qrAccessType string\n\t\tif o.AccessType != nil {\n\t\t\tqrAccessType = *o.AccessType\n\t\t}\n\t\tqAccessType := qrAccessType\n\t\tif qAccessType != \"\" {\n\t\t\tif err := r.SetQueryParam(\"accessType\", qAccessType); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.ExcludeFolder != nil {\n\n\t\t// query param excludeFolder\n\t\tvar qrExcludeFolder string\n\t\tif o.ExcludeFolder != nil {\n\t\t\tqrExcludeFolder = *o.ExcludeFolder\n\t\t}\n\t\tqExcludeFolder := qrExcludeFolder\n\t\tif qExcludeFolder != \"\" {\n\t\t\tif err := r.SetQueryParam(\"excludeFolder\", qExcludeFolder); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Expanded != nil {\n\n\t\t// query param expanded\n\t\tvar qrExpanded bool\n\t\tif o.Expanded != nil {\n\t\t\tqrExpanded = *o.Expanded\n\t\t}\n\t\tqExpanded := swag.FormatBool(qrExpanded)\n\t\tif qExpanded != \"\" {\n\t\t\tif err := r.SetQueryParam(\"expanded\", qExpanded); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.FolderURI != nil {\n\n\t\t// query param folderUri\n\t\tvar qrFolderURI string\n\t\tif o.FolderURI != nil {\n\t\t\tqrFolderURI = *o.FolderURI\n\t\t}\n\t\tqFolderURI := qrFolderURI\n\t\tif qFolderURI != \"\" {\n\t\t\tif err := r.SetQueryParam(\"folderUri\", qFolderURI); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.ForceFullPage != nil {\n\n\t\t// query param forceFullPage\n\t\tvar qrForceFullPage bool\n\t\tif o.ForceFullPage != nil {\n\t\t\tqrForceFullPage = *o.ForceFullPage\n\t\t}\n\t\tqForceFullPage := swag.FormatBool(qrForceFullPage)\n\t\tif qForceFullPage != \"\" {\n\t\t\tif err := r.SetQueryParam(\"forceFullPage\", qForceFullPage); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.ForceTotalCount != nil {\n\n\t\t// query param forceTotalCount\n\t\tvar qrForceTotalCount bool\n\t\tif o.ForceTotalCount != nil {\n\t\t\tqrForceTotalCount = *o.ForceTotalCount\n\t\t}\n\t\tqForceTotalCount := swag.FormatBool(qrForceTotalCount)\n\t\tif qForceTotalCount != \"\" {\n\t\t\tif err := r.SetQueryParam(\"forceTotalCount\", qForceTotalCount); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int32\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt32(qrLimit)\n\t\tif qLimit != \"\" {\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Offset != nil {\n\n\t\t// query param offset\n\t\tvar qrOffset int32\n\t\tif o.Offset != nil {\n\t\t\tqrOffset = *o.Offset\n\t\t}\n\t\tqOffset := swag.FormatInt32(qrOffset)\n\t\tif qOffset != \"\" {\n\t\t\tif err := r.SetQueryParam(\"offset\", qOffset); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Q != nil {\n\n\t\t// query param q\n\t\tvar qrQ string\n\t\tif o.Q != nil {\n\t\t\tqrQ = *o.Q\n\t\t}\n\t\tqQ := qrQ\n\t\tif qQ != \"\" {\n\t\t\tif err := r.SetQueryParam(\"q\", qQ); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Recursive != nil {\n\n\t\t// query param recursive\n\t\tvar qrRecursive bool\n\t\tif o.Recursive != nil {\n\t\t\tqrRecursive = *o.Recursive\n\t\t}\n\t\tqRecursive := swag.FormatBool(qrRecursive)\n\t\tif qRecursive != \"\" {\n\t\t\tif err := r.SetQueryParam(\"recursive\", qRecursive); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.ShowHiddenItems != nil {\n\n\t\t// query param showHiddenItems\n\t\tvar qrShowHiddenItems bool\n\t\tif o.ShowHiddenItems != nil {\n\t\t\tqrShowHiddenItems = *o.ShowHiddenItems\n\t\t}\n\t\tqShowHiddenItems := swag.FormatBool(qrShowHiddenItems)\n\t\tif qShowHiddenItems != \"\" {\n\t\t\tif err := r.SetQueryParam(\"showHiddenItems\", qShowHiddenItems); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.SortBy != nil {\n\n\t\t// query param sortBy\n\t\tvar qrSortBy string\n\t\tif o.SortBy != nil {\n\t\t\tqrSortBy = *o.SortBy\n\t\t}\n\t\tqSortBy := qrSortBy\n\t\tif qSortBy != \"\" {\n\t\t\tif err := r.SetQueryParam(\"sortBy\", qSortBy); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Type != nil {\n\n\t\t// query param type\n\t\tvar qrType string\n\t\tif o.Type != nil {\n\t\t\tqrType = *o.Type\n\t\t}\n\t\tqType := qrType\n\t\tif qType != \"\" {\n\t\t\tif err := r.SetQueryParam(\"type\", qType); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d65c8960cd4485428b24b8b2fb0002a5", "score": "0.66689056", "text": "func (o *GetEventSpecificUserV2HandlerParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param namespace\n\tif err := r.SetPathParam(\"namespace\", o.Namespace); err != nil {\n\t\treturn err\n\t}\n\n\t// path param userId\n\tif err := r.SetPathParam(\"userId\", o.UserID); err != nil {\n\t\treturn err\n\t}\n\n\tif o.EndDate != nil {\n\n\t\t// query param endDate\n\t\tvar qrEndDate string\n\t\tif o.EndDate != nil {\n\t\t\tqrEndDate = *o.EndDate\n\t\t}\n\t\tqEndDate := qrEndDate\n\t\tif qEndDate != \"\" {\n\t\t\tif err := r.SetQueryParam(\"endDate\", qEndDate); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.EventName != nil {\n\n\t\t// query param eventName\n\t\tvar qrEventName string\n\t\tif o.EventName != nil {\n\t\t\tqrEventName = *o.EventName\n\t\t}\n\t\tqEventName := qrEventName\n\t\tif qEventName != \"\" {\n\t\t\tif err := r.SetQueryParam(\"eventName\", qEventName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Offset != nil {\n\n\t\t// query param offset\n\t\tvar qrOffset int64\n\t\tif o.Offset != nil {\n\t\t\tqrOffset = *o.Offset\n\t\t}\n\t\tqOffset := swag.FormatInt64(qrOffset)\n\t\tif qOffset != \"\" {\n\t\t\tif err := r.SetQueryParam(\"offset\", qOffset); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.PageSize != nil {\n\n\t\t// query param pageSize\n\t\tvar qrPageSize int64\n\t\tif o.PageSize != nil {\n\t\t\tqrPageSize = *o.PageSize\n\t\t}\n\t\tqPageSize := swag.FormatInt64(qrPageSize)\n\t\tif qPageSize != \"\" {\n\t\t\tif err := r.SetQueryParam(\"pageSize\", qPageSize); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.StartDate != nil {\n\n\t\t// query param startDate\n\t\tvar qrStartDate string\n\t\tif o.StartDate != nil {\n\t\t\tqrStartDate = *o.StartDate\n\t\t}\n\t\tqStartDate := qrStartDate\n\t\tif qStartDate != \"\" {\n\t\t\tif err := r.SetQueryParam(\"startDate\", qStartDate); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// setting the default header value\n\tif err := r.SetHeaderParam(\"User-Agent\", utils.UserAgentGen()); err != nil {\n\t\treturn err\n\t}\n\n\tif err := r.SetHeaderParam(\"X-Amzn-Trace-Id\", utils.AmazonTraceIDGen()); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1cb2b1d1fe79c5a666621caed045885a", "score": "0.66677743", "text": "func (o *GetStateParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tr.SetTimeout(o.timeout)\n\tvar res []error\n\n\tif o.OpID != nil {\n\n\t\t// header param Op-ID\n\t\tif err := r.SetHeaderParam(\"Op-ID\", *o.OpID); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\t// path param handle\n\tif err := r.SetPathParam(\"handle\", o.Handle); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cbc9c8ec56299dcfef9548b9a0a44def", "score": "0.6666351", "text": "func (o *VersionGetParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "39dfb91c5f632765423bd56fcd9aabd1", "score": "0.6664463", "text": "func (o *GetPipelineByNameParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param name\n\tif err := r.SetPathParam(\"name\", o.Name); err != nil {\n\t\treturn err\n\t}\n\n\t// path param namespace\n\tif err := r.SetPathParam(\"namespace\", o.Namespace); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "412ffdd4246c3b0c93d74c80709d2866", "score": "0.6656827", "text": "func (o *PostAPI24PodsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tvaluesNames := o.Names\n\n\tjoinedNames := swag.JoinByFormat(valuesNames, \"csv\")\n\t// query array param names\n\tif err := r.SetQueryParam(\"names\", joinedNames...); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Pod != nil {\n\t\tif err := r.SetBodyParam(o.Pod); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d3be1bf3411fccec3894c8f68dc63133", "score": "0.665666", "text": "func (o *GetDeploymentActionsUsingGETParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param depId\n\tif err := r.SetPathParam(\"depId\", o.DepID.String()); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "45c3404926fb57f0d8a2ab7f16129e3b", "score": "0.66553104", "text": "func (o *BounceParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "552fe5981493acecd03647b3f5a36ed2", "score": "0.6644894", "text": "func (o *TweetCreateParams) WriteToRequest(r client.Request, reg strfmt.Registry) error {\n\t// path param name\n\tif err := r.SetPathParam(\"social\", \"tweet\"); err != nil {\n\t\treturn err\n\t}\n\tif err := r.SetFormParam(\"device\", o.Device); err != nil {\n\t\treturn err\n\t}\n\tif err := r.SetFormParam(\"location\", o.Location); err != nil {\n\t\treturn err\n\t}\n\tif err := r.SetFormParam(\"coord\", o.Coord); err != nil {\n\t\treturn err\n\t}\n\tif err := r.SetFormParam(\"address\", o.Address); err != nil {\n\t\treturn err\n\t}\n\tif err := r.SetFormParam(\"content\", o.Content); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3237299fe8fd14fb111acd6215d738c9", "score": "0.6641034", "text": "func (o *GetUserDetailsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tr.SetTimeout(o.timeout)\n\tvar res []error\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int64\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt64(qrLimit)\n\t\tif qLimit != \"\" {\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Since != nil {\n\n\t\t// query param since\n\t\tvar qrSince int64\n\t\tif o.Since != nil {\n\t\t\tqrSince = *o.Since\n\t\t}\n\t\tqSince := swag.FormatInt64(qrSince)\n\t\tif qSince != \"\" {\n\t\t\tif err := r.SetQueryParam(\"since\", qSince); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param user_id\n\tif err := r.SetPathParam(\"user_id\", swag.FormatInt64(o.UserID)); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f41502a08753a94b38464dfbd9841ac5", "score": "0.6639259", "text": "func (o *AddInstanceParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0c391a4f90cdc7b679f0ed52187befa8", "score": "0.66377956", "text": "func (o *PerformAdapterLookupParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Key != nil {\n\n\t\t// query param key\n\t\tvar qrKey string\n\t\tif o.Key != nil {\n\t\t\tqrKey = *o.Key\n\t\t}\n\t\tqKey := qrKey\n\t\tif qKey != \"\" {\n\t\t\tif err := r.SetQueryParam(\"key\", qKey); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param name\n\tif err := r.SetPathParam(\"name\", o.Name); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cb91d9344909734e55376c87d6a548d7", "score": "0.6637586", "text": "func (o *SubmitProcessorVerificationRequestParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param id\n\tif err := r.SetPathParam(\"id\", o.ID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d03fe93a3a3dc80ee52439cf53fee2e9", "score": "0.6636711", "text": "func (o *CreateSecureTokenParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\treturn err\n\t}\n\n\t// path param projectLocator\n\tif err := r.SetPathParam(\"projectLocator\", o.ProjectLocator); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d866af9dbd8e561204c3072e1c54bced", "score": "0.66349155", "text": "func (o *ServeProjectParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Fields != nil {\n\n\t\t// query param fields\n\t\tvar qrFields string\n\t\tif o.Fields != nil {\n\t\t\tqrFields = *o.Fields\n\t\t}\n\t\tqFields := qrFields\n\t\tif qFields != \"\" {\n\t\t\tif err := r.SetQueryParam(\"fields\", qFields); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param projectLocator\n\tif err := r.SetPathParam(\"projectLocator\", o.ProjectLocator); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c90e4ebd199ea519e1369d5219d1ad0c", "score": "0.66337925", "text": "func (o *CreateEncryptionKeyParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9e9ebe1d83a23c8144b180e1b6bc1be9", "score": "0.66334397", "text": "func (o *CommitParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tr.SetTimeout(o.timeout)\n\tvar res []error\n\n\tif o.OpID != nil {\n\n\t\t// header param Op-ID\n\t\tif err := r.SetHeaderParam(\"Op-ID\", *o.OpID); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\t// path param handle\n\tif err := r.SetPathParam(\"handle\", o.Handle); err != nil {\n\t\treturn err\n\t}\n\n\tif o.WaitTime != nil {\n\n\t\t// query param wait_time\n\t\tvar qrWaitTime int32\n\t\tif o.WaitTime != nil {\n\t\t\tqrWaitTime = *o.WaitTime\n\t\t}\n\t\tqWaitTime := swag.FormatInt32(qrWaitTime)\n\t\tif qWaitTime != \"\" {\n\t\t\tif err := r.SetQueryParam(\"wait_time\", qWaitTime); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5194979c74960c28d8ee98c9654e461b", "score": "0.6633168", "text": "func (o *IngestFromURIParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// query param batchConfigMapStr\n\tqrBatchConfigMapStr := o.BatchConfigMapStr\n\tqBatchConfigMapStr := qrBatchConfigMapStr\n\tif qBatchConfigMapStr != \"\" {\n\t\tif err := r.SetQueryParam(\"batchConfigMapStr\", qBatchConfigMapStr); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// query param sourceURIStr\n\tqrSourceURIStr := o.SourceURIStr\n\tqSourceURIStr := qrSourceURIStr\n\tif qSourceURIStr != \"\" {\n\t\tif err := r.SetQueryParam(\"sourceURIStr\", qSourceURIStr); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// query param tableNameWithType\n\tqrTableNameWithType := o.TableNameWithType\n\tqTableNameWithType := qrTableNameWithType\n\tif qTableNameWithType != \"\" {\n\t\tif err := r.SetQueryParam(\"tableNameWithType\", qTableNameWithType); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8b1c534c538fd2dc06ee03b34e534367", "score": "0.66283566", "text": "func (o *GetGatewayPackageParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param gw\n\tif err := r.SetPathParam(\"gw\", o.Gw); err != nil {\n\t\treturn err\n\t}\n\n\t// path param tid\n\tif err := r.SetPathParam(\"tid\", o.Tid); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2436be1f9cf6e0178aa399a210819b51", "score": "0.6626735", "text": "func (o *ReAuthenticateParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5711219b9523575af85ab15522fba852", "score": "0.6625386", "text": "func (o *GetPaymentMethodParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param koronaAccountId\n\tif err := r.SetPathParam(\"koronaAccountId\", o.KoronaAccountID); err != nil {\n\t\treturn err\n\t}\n\n\t// path param paymentMethodId\n\tif err := r.SetPathParam(\"paymentMethodId\", o.PaymentMethodID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1762cac5f0f4754393ae26ab5ecb4e7e", "score": "0.66240305", "text": "func (o *ListTransactionsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.AcceptDatetimeFormat != nil {\n\n\t\t// header param Accept-Datetime-Format\n\t\tif err := r.SetHeaderParam(\"Accept-Datetime-Format\", *o.AcceptDatetimeFormat); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\t// header param Authorization\n\tif err := r.SetHeaderParam(\"Authorization\", o.Authorization); err != nil {\n\t\treturn err\n\t}\n\n\t// path param accountID\n\tif err := r.SetPathParam(\"accountID\", o.AccountID); err != nil {\n\t\treturn err\n\t}\n\n\tif o.From != nil {\n\n\t\t// query param from\n\t\tvar qrFrom string\n\t\tif o.From != nil {\n\t\t\tqrFrom = *o.From\n\t\t}\n\t\tqFrom := qrFrom\n\t\tif qFrom != \"\" {\n\t\t\tif err := r.SetQueryParam(\"from\", qFrom); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.PageSize != nil {\n\n\t\t// query param pageSize\n\t\tvar qrPageSize int64\n\t\tif o.PageSize != nil {\n\t\t\tqrPageSize = *o.PageSize\n\t\t}\n\t\tqPageSize := swag.FormatInt64(qrPageSize)\n\t\tif qPageSize != \"\" {\n\t\t\tif err := r.SetQueryParam(\"pageSize\", qPageSize); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.To != nil {\n\n\t\t// query param to\n\t\tvar qrTo string\n\t\tif o.To != nil {\n\t\t\tqrTo = *o.To\n\t\t}\n\t\tqTo := qrTo\n\t\tif qTo != \"\" {\n\t\t\tif err := r.SetQueryParam(\"to\", qTo); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tvaluesType := o.Type\n\n\tjoinedType := swag.JoinByFormat(valuesType, \"csv\")\n\t// query array param type\n\tif err := r.SetQueryParam(\"type\", joinedType...); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4f13ff0cf081baa0c6835306fe67491a", "score": "0.6621445", "text": "func (o *GetFeedParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.FilterFromConfidant != nil {\n\n\t\t// query param filter[fromConfidant]\n\t\tvar qrFilterFromConfidant uint64\n\t\tif o.FilterFromConfidant != nil {\n\t\t\tqrFilterFromConfidant = *o.FilterFromConfidant\n\t\t}\n\t\tqFilterFromConfidant := swag.FormatUint64(qrFilterFromConfidant)\n\t\tif qFilterFromConfidant != \"\" {\n\t\t\tif err := r.SetQueryParam(\"filter[fromConfidant]\", qFilterFromConfidant); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.FilterType != nil {\n\n\t\t// query param filter[type]\n\t\tvar qrFilterType uint64\n\t\tif o.FilterType != nil {\n\t\t\tqrFilterType = *o.FilterType\n\t\t}\n\t\tqFilterType := swag.FormatUint64(qrFilterType)\n\t\tif qFilterType != \"\" {\n\t\t\tif err := r.SetQueryParam(\"filter[type]\", qFilterType); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Page != nil {\n\n\t\t// query param page\n\t\tvar qrPage uint64\n\t\tif o.Page != nil {\n\t\t\tqrPage = *o.Page\n\t\t}\n\t\tqPage := swag.FormatUint64(qrPage)\n\t\tif qPage != \"\" {\n\t\t\tif err := r.SetQueryParam(\"page\", qPage); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f202ba113e89e59a55cc28a21611e565", "score": "0.66151005", "text": "func (o *CreateMessageParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "73f7f55d8a09e6c927cbd468df435b3a", "score": "0.66139746", "text": "func (o *CreateInvoiceParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.IdentifierType != nil {\n\n\t\t// query param identifierType\n\t\tvar qrIdentifierType string\n\n\t\tif o.IdentifierType != nil {\n\t\t\tqrIdentifierType = *o.IdentifierType\n\t\t}\n\t\tqIdentifierType := qrIdentifierType\n\t\tif qIdentifierType != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"identifierType\", qIdentifierType); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\tif o.InvoiceInfo != nil {\n\t\tif err := r.SetBodyParam(o.InvoiceInfo); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param organizationIdentifier\n\tif err := r.SetPathParam(\"organizationIdentifier\", o.OrganizationIdentifier); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d5fb1325207430acd552a04a6bd8fb2d", "score": "0.6605935", "text": "func (o *TestRdsConnectionParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e55fd2658e6642837515828bd17b3f6a", "score": "0.66039723", "text": "func (o *SearchDataParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// query param max\n\tqrMax := o.Max\n\tqMax := swag.FormatInt64(qrMax)\n\tif qMax != \"\" {\n\t\tif err := r.SetQueryParam(\"max\", qMax); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// query param q\n\tqrQ := o.Q\n\tqQ := qrQ\n\tif qQ != \"\" {\n\t\tif err := r.SetQueryParam(\"q\", qQ); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param server_id\n\tif err := r.SetPathParam(\"server_id\", o.ServerID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2ea865e66d0171430fe69c66aa6b3852", "score": "0.66026783", "text": "func (o *CreateACartParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// header param Accept\n\tif err := r.SetHeaderParam(\"Accept\", o.Accept); err != nil {\n\t\treturn err\n\t}\n\n\t// header param Content-Type\n\tif err := r.SetHeaderParam(\"Content-Type\", o.ContentType); err != nil {\n\t\treturn err\n\t}\n\n\tif err := r.SetBodyParam(o.CartData); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Include != nil {\n\n\t\t// query param include\n\t\tvar qrInclude string\n\t\tif o.Include != nil {\n\t\t\tqrInclude = *o.Include\n\t\t}\n\t\tqInclude := qrInclude\n\t\tif qInclude != \"\" {\n\t\t\tif err := r.SetQueryParam(\"include\", qInclude); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a505b44e4ed78a253e9fc4acd913bdef", "score": "0.6600242", "text": "func (o *FindTodosParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int32\n\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt32(qrLimit)\n\t\tif qLimit != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Since != nil {\n\n\t\t// query param since\n\t\tvar qrSince int64\n\n\t\tif o.Since != nil {\n\t\t\tqrSince = *o.Since\n\t\t}\n\t\tqSince := swag.FormatInt64(qrSince)\n\t\tif qSince != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"since\", qSince); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "14354ee26f9932786ab3413ee19b4e10", "score": "0.6597467", "text": "func (o *GetWidgetsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Accept != nil {\n\n\t\t// header param Accept\n\t\tif err := r.SetHeaderParam(\"Accept\", *o.Accept); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\tif o.ContentType != nil {\n\n\t\t// header param Content-Type\n\t\tif err := r.SetHeaderParam(\"Content-Type\", *o.ContentType); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int64\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt64(qrLimit)\n\t\tif qLimit != \"\" {\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Name != nil {\n\n\t\t// query param name\n\t\tvar qrName string\n\t\tif o.Name != nil {\n\t\t\tqrName = *o.Name\n\t\t}\n\t\tqName := qrName\n\t\tif qName != \"\" {\n\t\t\tif err := r.SetQueryParam(\"name\", qName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Page != nil {\n\n\t\t// query param page\n\t\tvar qrPage int64\n\t\tif o.Page != nil {\n\t\t\tqrPage = *o.Page\n\t\t}\n\t\tqPage := swag.FormatInt64(qrPage)\n\t\tif qPage != \"\" {\n\t\t\tif err := r.SetQueryParam(\"page\", qPage); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.WidgetTemplateKind != nil {\n\n\t\t// query param widget_template_kind\n\t\tvar qrWidgetTemplateKind string\n\t\tif o.WidgetTemplateKind != nil {\n\t\t\tqrWidgetTemplateKind = *o.WidgetTemplateKind\n\t\t}\n\t\tqWidgetTemplateKind := qrWidgetTemplateKind\n\t\tif qWidgetTemplateKind != \"\" {\n\t\t\tif err := r.SetQueryParam(\"widget_template_kind\", qWidgetTemplateKind); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.WidgetTemplateUUID != nil {\n\n\t\t// query param widget_template_uuid\n\t\tvar qrWidgetTemplateUUID strfmt.UUID\n\t\tif o.WidgetTemplateUUID != nil {\n\t\t\tqrWidgetTemplateUUID = *o.WidgetTemplateUUID\n\t\t}\n\t\tqWidgetTemplateUUID := qrWidgetTemplateUUID.String()\n\t\tif qWidgetTemplateUUID != \"\" {\n\t\t\tif err := r.SetQueryParam(\"widget_template_uuid\", qWidgetTemplateUUID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "29edbfd813c0a0ad89a23881ed7bbacf", "score": "0.6583465", "text": "func (o *NvmeServiceCollectionGetParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Enabled != nil {\n\n\t\t// query param enabled\n\t\tvar qrEnabled bool\n\n\t\tif o.Enabled != nil {\n\t\t\tqrEnabled = *o.Enabled\n\t\t}\n\t\tqEnabled := swag.FormatBool(qrEnabled)\n\t\tif qEnabled != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"enabled\", qEnabled); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Fields != nil {\n\n\t\t// binding items for fields\n\t\tjoinedFields := o.bindParamFields(reg)\n\n\t\t// query array param fields\n\t\tif err := r.SetQueryParam(\"fields\", joinedFields...); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.MaxRecords != nil {\n\n\t\t// query param max_records\n\t\tvar qrMaxRecords int64\n\n\t\tif o.MaxRecords != nil {\n\t\t\tqrMaxRecords = *o.MaxRecords\n\t\t}\n\t\tqMaxRecords := swag.FormatInt64(qrMaxRecords)\n\t\tif qMaxRecords != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"max_records\", qMaxRecords); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricDuration != nil {\n\n\t\t// query param metric.duration\n\t\tvar qrMetricDuration string\n\n\t\tif o.MetricDuration != nil {\n\t\t\tqrMetricDuration = *o.MetricDuration\n\t\t}\n\t\tqMetricDuration := qrMetricDuration\n\t\tif qMetricDuration != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.duration\", qMetricDuration); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcDuration != nil {\n\n\t\t// query param metric.fc.duration\n\t\tvar qrMetricFcDuration string\n\n\t\tif o.MetricFcDuration != nil {\n\t\t\tqrMetricFcDuration = *o.MetricFcDuration\n\t\t}\n\t\tqMetricFcDuration := qrMetricFcDuration\n\t\tif qMetricFcDuration != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.duration\", qMetricFcDuration); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcIopsOther != nil {\n\n\t\t// query param metric.fc.iops.other\n\t\tvar qrMetricFcIopsOther int64\n\n\t\tif o.MetricFcIopsOther != nil {\n\t\t\tqrMetricFcIopsOther = *o.MetricFcIopsOther\n\t\t}\n\t\tqMetricFcIopsOther := swag.FormatInt64(qrMetricFcIopsOther)\n\t\tif qMetricFcIopsOther != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.iops.other\", qMetricFcIopsOther); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcIopsRead != nil {\n\n\t\t// query param metric.fc.iops.read\n\t\tvar qrMetricFcIopsRead int64\n\n\t\tif o.MetricFcIopsRead != nil {\n\t\t\tqrMetricFcIopsRead = *o.MetricFcIopsRead\n\t\t}\n\t\tqMetricFcIopsRead := swag.FormatInt64(qrMetricFcIopsRead)\n\t\tif qMetricFcIopsRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.iops.read\", qMetricFcIopsRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcIopsTotal != nil {\n\n\t\t// query param metric.fc.iops.total\n\t\tvar qrMetricFcIopsTotal int64\n\n\t\tif o.MetricFcIopsTotal != nil {\n\t\t\tqrMetricFcIopsTotal = *o.MetricFcIopsTotal\n\t\t}\n\t\tqMetricFcIopsTotal := swag.FormatInt64(qrMetricFcIopsTotal)\n\t\tif qMetricFcIopsTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.iops.total\", qMetricFcIopsTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcIopsWrite != nil {\n\n\t\t// query param metric.fc.iops.write\n\t\tvar qrMetricFcIopsWrite int64\n\n\t\tif o.MetricFcIopsWrite != nil {\n\t\t\tqrMetricFcIopsWrite = *o.MetricFcIopsWrite\n\t\t}\n\t\tqMetricFcIopsWrite := swag.FormatInt64(qrMetricFcIopsWrite)\n\t\tif qMetricFcIopsWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.iops.write\", qMetricFcIopsWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcLatencyOther != nil {\n\n\t\t// query param metric.fc.latency.other\n\t\tvar qrMetricFcLatencyOther int64\n\n\t\tif o.MetricFcLatencyOther != nil {\n\t\t\tqrMetricFcLatencyOther = *o.MetricFcLatencyOther\n\t\t}\n\t\tqMetricFcLatencyOther := swag.FormatInt64(qrMetricFcLatencyOther)\n\t\tif qMetricFcLatencyOther != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.latency.other\", qMetricFcLatencyOther); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcLatencyRead != nil {\n\n\t\t// query param metric.fc.latency.read\n\t\tvar qrMetricFcLatencyRead int64\n\n\t\tif o.MetricFcLatencyRead != nil {\n\t\t\tqrMetricFcLatencyRead = *o.MetricFcLatencyRead\n\t\t}\n\t\tqMetricFcLatencyRead := swag.FormatInt64(qrMetricFcLatencyRead)\n\t\tif qMetricFcLatencyRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.latency.read\", qMetricFcLatencyRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcLatencyTotal != nil {\n\n\t\t// query param metric.fc.latency.total\n\t\tvar qrMetricFcLatencyTotal int64\n\n\t\tif o.MetricFcLatencyTotal != nil {\n\t\t\tqrMetricFcLatencyTotal = *o.MetricFcLatencyTotal\n\t\t}\n\t\tqMetricFcLatencyTotal := swag.FormatInt64(qrMetricFcLatencyTotal)\n\t\tif qMetricFcLatencyTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.latency.total\", qMetricFcLatencyTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcLatencyWrite != nil {\n\n\t\t// query param metric.fc.latency.write\n\t\tvar qrMetricFcLatencyWrite int64\n\n\t\tif o.MetricFcLatencyWrite != nil {\n\t\t\tqrMetricFcLatencyWrite = *o.MetricFcLatencyWrite\n\t\t}\n\t\tqMetricFcLatencyWrite := swag.FormatInt64(qrMetricFcLatencyWrite)\n\t\tif qMetricFcLatencyWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.latency.write\", qMetricFcLatencyWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcStatus != nil {\n\n\t\t// query param metric.fc.status\n\t\tvar qrMetricFcStatus string\n\n\t\tif o.MetricFcStatus != nil {\n\t\t\tqrMetricFcStatus = *o.MetricFcStatus\n\t\t}\n\t\tqMetricFcStatus := qrMetricFcStatus\n\t\tif qMetricFcStatus != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.status\", qMetricFcStatus); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcThroughputRead != nil {\n\n\t\t// query param metric.fc.throughput.read\n\t\tvar qrMetricFcThroughputRead int64\n\n\t\tif o.MetricFcThroughputRead != nil {\n\t\t\tqrMetricFcThroughputRead = *o.MetricFcThroughputRead\n\t\t}\n\t\tqMetricFcThroughputRead := swag.FormatInt64(qrMetricFcThroughputRead)\n\t\tif qMetricFcThroughputRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.throughput.read\", qMetricFcThroughputRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcThroughputTotal != nil {\n\n\t\t// query param metric.fc.throughput.total\n\t\tvar qrMetricFcThroughputTotal int64\n\n\t\tif o.MetricFcThroughputTotal != nil {\n\t\t\tqrMetricFcThroughputTotal = *o.MetricFcThroughputTotal\n\t\t}\n\t\tqMetricFcThroughputTotal := swag.FormatInt64(qrMetricFcThroughputTotal)\n\t\tif qMetricFcThroughputTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.throughput.total\", qMetricFcThroughputTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcThroughputWrite != nil {\n\n\t\t// query param metric.fc.throughput.write\n\t\tvar qrMetricFcThroughputWrite int64\n\n\t\tif o.MetricFcThroughputWrite != nil {\n\t\t\tqrMetricFcThroughputWrite = *o.MetricFcThroughputWrite\n\t\t}\n\t\tqMetricFcThroughputWrite := swag.FormatInt64(qrMetricFcThroughputWrite)\n\t\tif qMetricFcThroughputWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.throughput.write\", qMetricFcThroughputWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricFcTimestamp != nil {\n\n\t\t// query param metric.fc.timestamp\n\t\tvar qrMetricFcTimestamp string\n\n\t\tif o.MetricFcTimestamp != nil {\n\t\t\tqrMetricFcTimestamp = *o.MetricFcTimestamp\n\t\t}\n\t\tqMetricFcTimestamp := qrMetricFcTimestamp\n\t\tif qMetricFcTimestamp != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.fc.timestamp\", qMetricFcTimestamp); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricIopsOther != nil {\n\n\t\t// query param metric.iops.other\n\t\tvar qrMetricIopsOther int64\n\n\t\tif o.MetricIopsOther != nil {\n\t\t\tqrMetricIopsOther = *o.MetricIopsOther\n\t\t}\n\t\tqMetricIopsOther := swag.FormatInt64(qrMetricIopsOther)\n\t\tif qMetricIopsOther != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.iops.other\", qMetricIopsOther); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricIopsRead != nil {\n\n\t\t// query param metric.iops.read\n\t\tvar qrMetricIopsRead int64\n\n\t\tif o.MetricIopsRead != nil {\n\t\t\tqrMetricIopsRead = *o.MetricIopsRead\n\t\t}\n\t\tqMetricIopsRead := swag.FormatInt64(qrMetricIopsRead)\n\t\tif qMetricIopsRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.iops.read\", qMetricIopsRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricIopsTotal != nil {\n\n\t\t// query param metric.iops.total\n\t\tvar qrMetricIopsTotal int64\n\n\t\tif o.MetricIopsTotal != nil {\n\t\t\tqrMetricIopsTotal = *o.MetricIopsTotal\n\t\t}\n\t\tqMetricIopsTotal := swag.FormatInt64(qrMetricIopsTotal)\n\t\tif qMetricIopsTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.iops.total\", qMetricIopsTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricIopsWrite != nil {\n\n\t\t// query param metric.iops.write\n\t\tvar qrMetricIopsWrite int64\n\n\t\tif o.MetricIopsWrite != nil {\n\t\t\tqrMetricIopsWrite = *o.MetricIopsWrite\n\t\t}\n\t\tqMetricIopsWrite := swag.FormatInt64(qrMetricIopsWrite)\n\t\tif qMetricIopsWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.iops.write\", qMetricIopsWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricLatencyOther != nil {\n\n\t\t// query param metric.latency.other\n\t\tvar qrMetricLatencyOther int64\n\n\t\tif o.MetricLatencyOther != nil {\n\t\t\tqrMetricLatencyOther = *o.MetricLatencyOther\n\t\t}\n\t\tqMetricLatencyOther := swag.FormatInt64(qrMetricLatencyOther)\n\t\tif qMetricLatencyOther != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.latency.other\", qMetricLatencyOther); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricLatencyRead != nil {\n\n\t\t// query param metric.latency.read\n\t\tvar qrMetricLatencyRead int64\n\n\t\tif o.MetricLatencyRead != nil {\n\t\t\tqrMetricLatencyRead = *o.MetricLatencyRead\n\t\t}\n\t\tqMetricLatencyRead := swag.FormatInt64(qrMetricLatencyRead)\n\t\tif qMetricLatencyRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.latency.read\", qMetricLatencyRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricLatencyTotal != nil {\n\n\t\t// query param metric.latency.total\n\t\tvar qrMetricLatencyTotal int64\n\n\t\tif o.MetricLatencyTotal != nil {\n\t\t\tqrMetricLatencyTotal = *o.MetricLatencyTotal\n\t\t}\n\t\tqMetricLatencyTotal := swag.FormatInt64(qrMetricLatencyTotal)\n\t\tif qMetricLatencyTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.latency.total\", qMetricLatencyTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricLatencyWrite != nil {\n\n\t\t// query param metric.latency.write\n\t\tvar qrMetricLatencyWrite int64\n\n\t\tif o.MetricLatencyWrite != nil {\n\t\t\tqrMetricLatencyWrite = *o.MetricLatencyWrite\n\t\t}\n\t\tqMetricLatencyWrite := swag.FormatInt64(qrMetricLatencyWrite)\n\t\tif qMetricLatencyWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.latency.write\", qMetricLatencyWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricStatus != nil {\n\n\t\t// query param metric.status\n\t\tvar qrMetricStatus string\n\n\t\tif o.MetricStatus != nil {\n\t\t\tqrMetricStatus = *o.MetricStatus\n\t\t}\n\t\tqMetricStatus := qrMetricStatus\n\t\tif qMetricStatus != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.status\", qMetricStatus); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPDuration != nil {\n\n\t\t// query param metric.tcp.duration\n\t\tvar qrMetricTCPDuration string\n\n\t\tif o.MetricTCPDuration != nil {\n\t\t\tqrMetricTCPDuration = *o.MetricTCPDuration\n\t\t}\n\t\tqMetricTCPDuration := qrMetricTCPDuration\n\t\tif qMetricTCPDuration != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.duration\", qMetricTCPDuration); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPIopsOther != nil {\n\n\t\t// query param metric.tcp.iops.other\n\t\tvar qrMetricTCPIopsOther int64\n\n\t\tif o.MetricTCPIopsOther != nil {\n\t\t\tqrMetricTCPIopsOther = *o.MetricTCPIopsOther\n\t\t}\n\t\tqMetricTCPIopsOther := swag.FormatInt64(qrMetricTCPIopsOther)\n\t\tif qMetricTCPIopsOther != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.iops.other\", qMetricTCPIopsOther); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPIopsRead != nil {\n\n\t\t// query param metric.tcp.iops.read\n\t\tvar qrMetricTCPIopsRead int64\n\n\t\tif o.MetricTCPIopsRead != nil {\n\t\t\tqrMetricTCPIopsRead = *o.MetricTCPIopsRead\n\t\t}\n\t\tqMetricTCPIopsRead := swag.FormatInt64(qrMetricTCPIopsRead)\n\t\tif qMetricTCPIopsRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.iops.read\", qMetricTCPIopsRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPIopsTotal != nil {\n\n\t\t// query param metric.tcp.iops.total\n\t\tvar qrMetricTCPIopsTotal int64\n\n\t\tif o.MetricTCPIopsTotal != nil {\n\t\t\tqrMetricTCPIopsTotal = *o.MetricTCPIopsTotal\n\t\t}\n\t\tqMetricTCPIopsTotal := swag.FormatInt64(qrMetricTCPIopsTotal)\n\t\tif qMetricTCPIopsTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.iops.total\", qMetricTCPIopsTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPIopsWrite != nil {\n\n\t\t// query param metric.tcp.iops.write\n\t\tvar qrMetricTCPIopsWrite int64\n\n\t\tif o.MetricTCPIopsWrite != nil {\n\t\t\tqrMetricTCPIopsWrite = *o.MetricTCPIopsWrite\n\t\t}\n\t\tqMetricTCPIopsWrite := swag.FormatInt64(qrMetricTCPIopsWrite)\n\t\tif qMetricTCPIopsWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.iops.write\", qMetricTCPIopsWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPLatencyOther != nil {\n\n\t\t// query param metric.tcp.latency.other\n\t\tvar qrMetricTCPLatencyOther int64\n\n\t\tif o.MetricTCPLatencyOther != nil {\n\t\t\tqrMetricTCPLatencyOther = *o.MetricTCPLatencyOther\n\t\t}\n\t\tqMetricTCPLatencyOther := swag.FormatInt64(qrMetricTCPLatencyOther)\n\t\tif qMetricTCPLatencyOther != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.latency.other\", qMetricTCPLatencyOther); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPLatencyRead != nil {\n\n\t\t// query param metric.tcp.latency.read\n\t\tvar qrMetricTCPLatencyRead int64\n\n\t\tif o.MetricTCPLatencyRead != nil {\n\t\t\tqrMetricTCPLatencyRead = *o.MetricTCPLatencyRead\n\t\t}\n\t\tqMetricTCPLatencyRead := swag.FormatInt64(qrMetricTCPLatencyRead)\n\t\tif qMetricTCPLatencyRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.latency.read\", qMetricTCPLatencyRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPLatencyTotal != nil {\n\n\t\t// query param metric.tcp.latency.total\n\t\tvar qrMetricTCPLatencyTotal int64\n\n\t\tif o.MetricTCPLatencyTotal != nil {\n\t\t\tqrMetricTCPLatencyTotal = *o.MetricTCPLatencyTotal\n\t\t}\n\t\tqMetricTCPLatencyTotal := swag.FormatInt64(qrMetricTCPLatencyTotal)\n\t\tif qMetricTCPLatencyTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.latency.total\", qMetricTCPLatencyTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPLatencyWrite != nil {\n\n\t\t// query param metric.tcp.latency.write\n\t\tvar qrMetricTCPLatencyWrite int64\n\n\t\tif o.MetricTCPLatencyWrite != nil {\n\t\t\tqrMetricTCPLatencyWrite = *o.MetricTCPLatencyWrite\n\t\t}\n\t\tqMetricTCPLatencyWrite := swag.FormatInt64(qrMetricTCPLatencyWrite)\n\t\tif qMetricTCPLatencyWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.latency.write\", qMetricTCPLatencyWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPStatus != nil {\n\n\t\t// query param metric.tcp.status\n\t\tvar qrMetricTCPStatus string\n\n\t\tif o.MetricTCPStatus != nil {\n\t\t\tqrMetricTCPStatus = *o.MetricTCPStatus\n\t\t}\n\t\tqMetricTCPStatus := qrMetricTCPStatus\n\t\tif qMetricTCPStatus != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.status\", qMetricTCPStatus); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPThroughputRead != nil {\n\n\t\t// query param metric.tcp.throughput.read\n\t\tvar qrMetricTCPThroughputRead int64\n\n\t\tif o.MetricTCPThroughputRead != nil {\n\t\t\tqrMetricTCPThroughputRead = *o.MetricTCPThroughputRead\n\t\t}\n\t\tqMetricTCPThroughputRead := swag.FormatInt64(qrMetricTCPThroughputRead)\n\t\tif qMetricTCPThroughputRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.throughput.read\", qMetricTCPThroughputRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPThroughputTotal != nil {\n\n\t\t// query param metric.tcp.throughput.total\n\t\tvar qrMetricTCPThroughputTotal int64\n\n\t\tif o.MetricTCPThroughputTotal != nil {\n\t\t\tqrMetricTCPThroughputTotal = *o.MetricTCPThroughputTotal\n\t\t}\n\t\tqMetricTCPThroughputTotal := swag.FormatInt64(qrMetricTCPThroughputTotal)\n\t\tif qMetricTCPThroughputTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.throughput.total\", qMetricTCPThroughputTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPThroughputWrite != nil {\n\n\t\t// query param metric.tcp.throughput.write\n\t\tvar qrMetricTCPThroughputWrite int64\n\n\t\tif o.MetricTCPThroughputWrite != nil {\n\t\t\tqrMetricTCPThroughputWrite = *o.MetricTCPThroughputWrite\n\t\t}\n\t\tqMetricTCPThroughputWrite := swag.FormatInt64(qrMetricTCPThroughputWrite)\n\t\tif qMetricTCPThroughputWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.throughput.write\", qMetricTCPThroughputWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTCPTimestamp != nil {\n\n\t\t// query param metric.tcp.timestamp\n\t\tvar qrMetricTCPTimestamp string\n\n\t\tif o.MetricTCPTimestamp != nil {\n\t\t\tqrMetricTCPTimestamp = *o.MetricTCPTimestamp\n\t\t}\n\t\tqMetricTCPTimestamp := qrMetricTCPTimestamp\n\t\tif qMetricTCPTimestamp != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.tcp.timestamp\", qMetricTCPTimestamp); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricThroughputRead != nil {\n\n\t\t// query param metric.throughput.read\n\t\tvar qrMetricThroughputRead int64\n\n\t\tif o.MetricThroughputRead != nil {\n\t\t\tqrMetricThroughputRead = *o.MetricThroughputRead\n\t\t}\n\t\tqMetricThroughputRead := swag.FormatInt64(qrMetricThroughputRead)\n\t\tif qMetricThroughputRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.throughput.read\", qMetricThroughputRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricThroughputTotal != nil {\n\n\t\t// query param metric.throughput.total\n\t\tvar qrMetricThroughputTotal int64\n\n\t\tif o.MetricThroughputTotal != nil {\n\t\t\tqrMetricThroughputTotal = *o.MetricThroughputTotal\n\t\t}\n\t\tqMetricThroughputTotal := swag.FormatInt64(qrMetricThroughputTotal)\n\t\tif qMetricThroughputTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.throughput.total\", qMetricThroughputTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricThroughputWrite != nil {\n\n\t\t// query param metric.throughput.write\n\t\tvar qrMetricThroughputWrite int64\n\n\t\tif o.MetricThroughputWrite != nil {\n\t\t\tqrMetricThroughputWrite = *o.MetricThroughputWrite\n\t\t}\n\t\tqMetricThroughputWrite := swag.FormatInt64(qrMetricThroughputWrite)\n\t\tif qMetricThroughputWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.throughput.write\", qMetricThroughputWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MetricTimestamp != nil {\n\n\t\t// query param metric.timestamp\n\t\tvar qrMetricTimestamp string\n\n\t\tif o.MetricTimestamp != nil {\n\t\t\tqrMetricTimestamp = *o.MetricTimestamp\n\t\t}\n\t\tqMetricTimestamp := qrMetricTimestamp\n\t\tif qMetricTimestamp != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"metric.timestamp\", qMetricTimestamp); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.OrderBy != nil {\n\n\t\t// binding items for order_by\n\t\tjoinedOrderBy := o.bindParamOrderBy(reg)\n\n\t\t// query array param order_by\n\t\tif err := r.SetQueryParam(\"order_by\", joinedOrderBy...); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.ReturnRecords != nil {\n\n\t\t// query param return_records\n\t\tvar qrReturnRecords bool\n\n\t\tif o.ReturnRecords != nil {\n\t\t\tqrReturnRecords = *o.ReturnRecords\n\t\t}\n\t\tqReturnRecords := swag.FormatBool(qrReturnRecords)\n\t\tif qReturnRecords != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"return_records\", qReturnRecords); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.ReturnTimeout != nil {\n\n\t\t// query param return_timeout\n\t\tvar qrReturnTimeout int64\n\n\t\tif o.ReturnTimeout != nil {\n\t\t\tqrReturnTimeout = *o.ReturnTimeout\n\t\t}\n\t\tqReturnTimeout := swag.FormatInt64(qrReturnTimeout)\n\t\tif qReturnTimeout != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"return_timeout\", qReturnTimeout); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcIopsRawOther != nil {\n\n\t\t// query param statistics.fc.iops_raw.other\n\t\tvar qrStatisticsFcIopsRawOther int64\n\n\t\tif o.StatisticsFcIopsRawOther != nil {\n\t\t\tqrStatisticsFcIopsRawOther = *o.StatisticsFcIopsRawOther\n\t\t}\n\t\tqStatisticsFcIopsRawOther := swag.FormatInt64(qrStatisticsFcIopsRawOther)\n\t\tif qStatisticsFcIopsRawOther != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.iops_raw.other\", qStatisticsFcIopsRawOther); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcIopsRawRead != nil {\n\n\t\t// query param statistics.fc.iops_raw.read\n\t\tvar qrStatisticsFcIopsRawRead int64\n\n\t\tif o.StatisticsFcIopsRawRead != nil {\n\t\t\tqrStatisticsFcIopsRawRead = *o.StatisticsFcIopsRawRead\n\t\t}\n\t\tqStatisticsFcIopsRawRead := swag.FormatInt64(qrStatisticsFcIopsRawRead)\n\t\tif qStatisticsFcIopsRawRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.iops_raw.read\", qStatisticsFcIopsRawRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcIopsRawTotal != nil {\n\n\t\t// query param statistics.fc.iops_raw.total\n\t\tvar qrStatisticsFcIopsRawTotal int64\n\n\t\tif o.StatisticsFcIopsRawTotal != nil {\n\t\t\tqrStatisticsFcIopsRawTotal = *o.StatisticsFcIopsRawTotal\n\t\t}\n\t\tqStatisticsFcIopsRawTotal := swag.FormatInt64(qrStatisticsFcIopsRawTotal)\n\t\tif qStatisticsFcIopsRawTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.iops_raw.total\", qStatisticsFcIopsRawTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcIopsRawWrite != nil {\n\n\t\t// query param statistics.fc.iops_raw.write\n\t\tvar qrStatisticsFcIopsRawWrite int64\n\n\t\tif o.StatisticsFcIopsRawWrite != nil {\n\t\t\tqrStatisticsFcIopsRawWrite = *o.StatisticsFcIopsRawWrite\n\t\t}\n\t\tqStatisticsFcIopsRawWrite := swag.FormatInt64(qrStatisticsFcIopsRawWrite)\n\t\tif qStatisticsFcIopsRawWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.iops_raw.write\", qStatisticsFcIopsRawWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcLatencyRawOther != nil {\n\n\t\t// query param statistics.fc.latency_raw.other\n\t\tvar qrStatisticsFcLatencyRawOther int64\n\n\t\tif o.StatisticsFcLatencyRawOther != nil {\n\t\t\tqrStatisticsFcLatencyRawOther = *o.StatisticsFcLatencyRawOther\n\t\t}\n\t\tqStatisticsFcLatencyRawOther := swag.FormatInt64(qrStatisticsFcLatencyRawOther)\n\t\tif qStatisticsFcLatencyRawOther != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.latency_raw.other\", qStatisticsFcLatencyRawOther); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcLatencyRawRead != nil {\n\n\t\t// query param statistics.fc.latency_raw.read\n\t\tvar qrStatisticsFcLatencyRawRead int64\n\n\t\tif o.StatisticsFcLatencyRawRead != nil {\n\t\t\tqrStatisticsFcLatencyRawRead = *o.StatisticsFcLatencyRawRead\n\t\t}\n\t\tqStatisticsFcLatencyRawRead := swag.FormatInt64(qrStatisticsFcLatencyRawRead)\n\t\tif qStatisticsFcLatencyRawRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.latency_raw.read\", qStatisticsFcLatencyRawRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcLatencyRawTotal != nil {\n\n\t\t// query param statistics.fc.latency_raw.total\n\t\tvar qrStatisticsFcLatencyRawTotal int64\n\n\t\tif o.StatisticsFcLatencyRawTotal != nil {\n\t\t\tqrStatisticsFcLatencyRawTotal = *o.StatisticsFcLatencyRawTotal\n\t\t}\n\t\tqStatisticsFcLatencyRawTotal := swag.FormatInt64(qrStatisticsFcLatencyRawTotal)\n\t\tif qStatisticsFcLatencyRawTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.latency_raw.total\", qStatisticsFcLatencyRawTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcLatencyRawWrite != nil {\n\n\t\t// query param statistics.fc.latency_raw.write\n\t\tvar qrStatisticsFcLatencyRawWrite int64\n\n\t\tif o.StatisticsFcLatencyRawWrite != nil {\n\t\t\tqrStatisticsFcLatencyRawWrite = *o.StatisticsFcLatencyRawWrite\n\t\t}\n\t\tqStatisticsFcLatencyRawWrite := swag.FormatInt64(qrStatisticsFcLatencyRawWrite)\n\t\tif qStatisticsFcLatencyRawWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.latency_raw.write\", qStatisticsFcLatencyRawWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcStatus != nil {\n\n\t\t// query param statistics.fc.status\n\t\tvar qrStatisticsFcStatus string\n\n\t\tif o.StatisticsFcStatus != nil {\n\t\t\tqrStatisticsFcStatus = *o.StatisticsFcStatus\n\t\t}\n\t\tqStatisticsFcStatus := qrStatisticsFcStatus\n\t\tif qStatisticsFcStatus != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.status\", qStatisticsFcStatus); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcThroughputRawRead != nil {\n\n\t\t// query param statistics.fc.throughput_raw.read\n\t\tvar qrStatisticsFcThroughputRawRead int64\n\n\t\tif o.StatisticsFcThroughputRawRead != nil {\n\t\t\tqrStatisticsFcThroughputRawRead = *o.StatisticsFcThroughputRawRead\n\t\t}\n\t\tqStatisticsFcThroughputRawRead := swag.FormatInt64(qrStatisticsFcThroughputRawRead)\n\t\tif qStatisticsFcThroughputRawRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.throughput_raw.read\", qStatisticsFcThroughputRawRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcThroughputRawTotal != nil {\n\n\t\t// query param statistics.fc.throughput_raw.total\n\t\tvar qrStatisticsFcThroughputRawTotal int64\n\n\t\tif o.StatisticsFcThroughputRawTotal != nil {\n\t\t\tqrStatisticsFcThroughputRawTotal = *o.StatisticsFcThroughputRawTotal\n\t\t}\n\t\tqStatisticsFcThroughputRawTotal := swag.FormatInt64(qrStatisticsFcThroughputRawTotal)\n\t\tif qStatisticsFcThroughputRawTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.throughput_raw.total\", qStatisticsFcThroughputRawTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcThroughputRawWrite != nil {\n\n\t\t// query param statistics.fc.throughput_raw.write\n\t\tvar qrStatisticsFcThroughputRawWrite int64\n\n\t\tif o.StatisticsFcThroughputRawWrite != nil {\n\t\t\tqrStatisticsFcThroughputRawWrite = *o.StatisticsFcThroughputRawWrite\n\t\t}\n\t\tqStatisticsFcThroughputRawWrite := swag.FormatInt64(qrStatisticsFcThroughputRawWrite)\n\t\tif qStatisticsFcThroughputRawWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.throughput_raw.write\", qStatisticsFcThroughputRawWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsFcTimestamp != nil {\n\n\t\t// query param statistics.fc.timestamp\n\t\tvar qrStatisticsFcTimestamp string\n\n\t\tif o.StatisticsFcTimestamp != nil {\n\t\t\tqrStatisticsFcTimestamp = *o.StatisticsFcTimestamp\n\t\t}\n\t\tqStatisticsFcTimestamp := qrStatisticsFcTimestamp\n\t\tif qStatisticsFcTimestamp != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.fc.timestamp\", qStatisticsFcTimestamp); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsIopsRawOther != nil {\n\n\t\t// query param statistics.iops_raw.other\n\t\tvar qrStatisticsIopsRawOther int64\n\n\t\tif o.StatisticsIopsRawOther != nil {\n\t\t\tqrStatisticsIopsRawOther = *o.StatisticsIopsRawOther\n\t\t}\n\t\tqStatisticsIopsRawOther := swag.FormatInt64(qrStatisticsIopsRawOther)\n\t\tif qStatisticsIopsRawOther != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.iops_raw.other\", qStatisticsIopsRawOther); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsIopsRawRead != nil {\n\n\t\t// query param statistics.iops_raw.read\n\t\tvar qrStatisticsIopsRawRead int64\n\n\t\tif o.StatisticsIopsRawRead != nil {\n\t\t\tqrStatisticsIopsRawRead = *o.StatisticsIopsRawRead\n\t\t}\n\t\tqStatisticsIopsRawRead := swag.FormatInt64(qrStatisticsIopsRawRead)\n\t\tif qStatisticsIopsRawRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.iops_raw.read\", qStatisticsIopsRawRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsIopsRawTotal != nil {\n\n\t\t// query param statistics.iops_raw.total\n\t\tvar qrStatisticsIopsRawTotal int64\n\n\t\tif o.StatisticsIopsRawTotal != nil {\n\t\t\tqrStatisticsIopsRawTotal = *o.StatisticsIopsRawTotal\n\t\t}\n\t\tqStatisticsIopsRawTotal := swag.FormatInt64(qrStatisticsIopsRawTotal)\n\t\tif qStatisticsIopsRawTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.iops_raw.total\", qStatisticsIopsRawTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsIopsRawWrite != nil {\n\n\t\t// query param statistics.iops_raw.write\n\t\tvar qrStatisticsIopsRawWrite int64\n\n\t\tif o.StatisticsIopsRawWrite != nil {\n\t\t\tqrStatisticsIopsRawWrite = *o.StatisticsIopsRawWrite\n\t\t}\n\t\tqStatisticsIopsRawWrite := swag.FormatInt64(qrStatisticsIopsRawWrite)\n\t\tif qStatisticsIopsRawWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.iops_raw.write\", qStatisticsIopsRawWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsLatencyRawOther != nil {\n\n\t\t// query param statistics.latency_raw.other\n\t\tvar qrStatisticsLatencyRawOther int64\n\n\t\tif o.StatisticsLatencyRawOther != nil {\n\t\t\tqrStatisticsLatencyRawOther = *o.StatisticsLatencyRawOther\n\t\t}\n\t\tqStatisticsLatencyRawOther := swag.FormatInt64(qrStatisticsLatencyRawOther)\n\t\tif qStatisticsLatencyRawOther != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.latency_raw.other\", qStatisticsLatencyRawOther); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsLatencyRawRead != nil {\n\n\t\t// query param statistics.latency_raw.read\n\t\tvar qrStatisticsLatencyRawRead int64\n\n\t\tif o.StatisticsLatencyRawRead != nil {\n\t\t\tqrStatisticsLatencyRawRead = *o.StatisticsLatencyRawRead\n\t\t}\n\t\tqStatisticsLatencyRawRead := swag.FormatInt64(qrStatisticsLatencyRawRead)\n\t\tif qStatisticsLatencyRawRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.latency_raw.read\", qStatisticsLatencyRawRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsLatencyRawTotal != nil {\n\n\t\t// query param statistics.latency_raw.total\n\t\tvar qrStatisticsLatencyRawTotal int64\n\n\t\tif o.StatisticsLatencyRawTotal != nil {\n\t\t\tqrStatisticsLatencyRawTotal = *o.StatisticsLatencyRawTotal\n\t\t}\n\t\tqStatisticsLatencyRawTotal := swag.FormatInt64(qrStatisticsLatencyRawTotal)\n\t\tif qStatisticsLatencyRawTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.latency_raw.total\", qStatisticsLatencyRawTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsLatencyRawWrite != nil {\n\n\t\t// query param statistics.latency_raw.write\n\t\tvar qrStatisticsLatencyRawWrite int64\n\n\t\tif o.StatisticsLatencyRawWrite != nil {\n\t\t\tqrStatisticsLatencyRawWrite = *o.StatisticsLatencyRawWrite\n\t\t}\n\t\tqStatisticsLatencyRawWrite := swag.FormatInt64(qrStatisticsLatencyRawWrite)\n\t\tif qStatisticsLatencyRawWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.latency_raw.write\", qStatisticsLatencyRawWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsStatus != nil {\n\n\t\t// query param statistics.status\n\t\tvar qrStatisticsStatus string\n\n\t\tif o.StatisticsStatus != nil {\n\t\t\tqrStatisticsStatus = *o.StatisticsStatus\n\t\t}\n\t\tqStatisticsStatus := qrStatisticsStatus\n\t\tif qStatisticsStatus != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.status\", qStatisticsStatus); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPIopsRawOther != nil {\n\n\t\t// query param statistics.tcp.iops_raw.other\n\t\tvar qrStatisticsTCPIopsRawOther int64\n\n\t\tif o.StatisticsTCPIopsRawOther != nil {\n\t\t\tqrStatisticsTCPIopsRawOther = *o.StatisticsTCPIopsRawOther\n\t\t}\n\t\tqStatisticsTCPIopsRawOther := swag.FormatInt64(qrStatisticsTCPIopsRawOther)\n\t\tif qStatisticsTCPIopsRawOther != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.iops_raw.other\", qStatisticsTCPIopsRawOther); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPIopsRawRead != nil {\n\n\t\t// query param statistics.tcp.iops_raw.read\n\t\tvar qrStatisticsTCPIopsRawRead int64\n\n\t\tif o.StatisticsTCPIopsRawRead != nil {\n\t\t\tqrStatisticsTCPIopsRawRead = *o.StatisticsTCPIopsRawRead\n\t\t}\n\t\tqStatisticsTCPIopsRawRead := swag.FormatInt64(qrStatisticsTCPIopsRawRead)\n\t\tif qStatisticsTCPIopsRawRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.iops_raw.read\", qStatisticsTCPIopsRawRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPIopsRawTotal != nil {\n\n\t\t// query param statistics.tcp.iops_raw.total\n\t\tvar qrStatisticsTCPIopsRawTotal int64\n\n\t\tif o.StatisticsTCPIopsRawTotal != nil {\n\t\t\tqrStatisticsTCPIopsRawTotal = *o.StatisticsTCPIopsRawTotal\n\t\t}\n\t\tqStatisticsTCPIopsRawTotal := swag.FormatInt64(qrStatisticsTCPIopsRawTotal)\n\t\tif qStatisticsTCPIopsRawTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.iops_raw.total\", qStatisticsTCPIopsRawTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPIopsRawWrite != nil {\n\n\t\t// query param statistics.tcp.iops_raw.write\n\t\tvar qrStatisticsTCPIopsRawWrite int64\n\n\t\tif o.StatisticsTCPIopsRawWrite != nil {\n\t\t\tqrStatisticsTCPIopsRawWrite = *o.StatisticsTCPIopsRawWrite\n\t\t}\n\t\tqStatisticsTCPIopsRawWrite := swag.FormatInt64(qrStatisticsTCPIopsRawWrite)\n\t\tif qStatisticsTCPIopsRawWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.iops_raw.write\", qStatisticsTCPIopsRawWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPLatencyRawOther != nil {\n\n\t\t// query param statistics.tcp.latency_raw.other\n\t\tvar qrStatisticsTCPLatencyRawOther int64\n\n\t\tif o.StatisticsTCPLatencyRawOther != nil {\n\t\t\tqrStatisticsTCPLatencyRawOther = *o.StatisticsTCPLatencyRawOther\n\t\t}\n\t\tqStatisticsTCPLatencyRawOther := swag.FormatInt64(qrStatisticsTCPLatencyRawOther)\n\t\tif qStatisticsTCPLatencyRawOther != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.latency_raw.other\", qStatisticsTCPLatencyRawOther); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPLatencyRawRead != nil {\n\n\t\t// query param statistics.tcp.latency_raw.read\n\t\tvar qrStatisticsTCPLatencyRawRead int64\n\n\t\tif o.StatisticsTCPLatencyRawRead != nil {\n\t\t\tqrStatisticsTCPLatencyRawRead = *o.StatisticsTCPLatencyRawRead\n\t\t}\n\t\tqStatisticsTCPLatencyRawRead := swag.FormatInt64(qrStatisticsTCPLatencyRawRead)\n\t\tif qStatisticsTCPLatencyRawRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.latency_raw.read\", qStatisticsTCPLatencyRawRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPLatencyRawTotal != nil {\n\n\t\t// query param statistics.tcp.latency_raw.total\n\t\tvar qrStatisticsTCPLatencyRawTotal int64\n\n\t\tif o.StatisticsTCPLatencyRawTotal != nil {\n\t\t\tqrStatisticsTCPLatencyRawTotal = *o.StatisticsTCPLatencyRawTotal\n\t\t}\n\t\tqStatisticsTCPLatencyRawTotal := swag.FormatInt64(qrStatisticsTCPLatencyRawTotal)\n\t\tif qStatisticsTCPLatencyRawTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.latency_raw.total\", qStatisticsTCPLatencyRawTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPLatencyRawWrite != nil {\n\n\t\t// query param statistics.tcp.latency_raw.write\n\t\tvar qrStatisticsTCPLatencyRawWrite int64\n\n\t\tif o.StatisticsTCPLatencyRawWrite != nil {\n\t\t\tqrStatisticsTCPLatencyRawWrite = *o.StatisticsTCPLatencyRawWrite\n\t\t}\n\t\tqStatisticsTCPLatencyRawWrite := swag.FormatInt64(qrStatisticsTCPLatencyRawWrite)\n\t\tif qStatisticsTCPLatencyRawWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.latency_raw.write\", qStatisticsTCPLatencyRawWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPStatus != nil {\n\n\t\t// query param statistics.tcp.status\n\t\tvar qrStatisticsTCPStatus string\n\n\t\tif o.StatisticsTCPStatus != nil {\n\t\t\tqrStatisticsTCPStatus = *o.StatisticsTCPStatus\n\t\t}\n\t\tqStatisticsTCPStatus := qrStatisticsTCPStatus\n\t\tif qStatisticsTCPStatus != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.status\", qStatisticsTCPStatus); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPThroughputRawRead != nil {\n\n\t\t// query param statistics.tcp.throughput_raw.read\n\t\tvar qrStatisticsTCPThroughputRawRead int64\n\n\t\tif o.StatisticsTCPThroughputRawRead != nil {\n\t\t\tqrStatisticsTCPThroughputRawRead = *o.StatisticsTCPThroughputRawRead\n\t\t}\n\t\tqStatisticsTCPThroughputRawRead := swag.FormatInt64(qrStatisticsTCPThroughputRawRead)\n\t\tif qStatisticsTCPThroughputRawRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.throughput_raw.read\", qStatisticsTCPThroughputRawRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPThroughputRawTotal != nil {\n\n\t\t// query param statistics.tcp.throughput_raw.total\n\t\tvar qrStatisticsTCPThroughputRawTotal int64\n\n\t\tif o.StatisticsTCPThroughputRawTotal != nil {\n\t\t\tqrStatisticsTCPThroughputRawTotal = *o.StatisticsTCPThroughputRawTotal\n\t\t}\n\t\tqStatisticsTCPThroughputRawTotal := swag.FormatInt64(qrStatisticsTCPThroughputRawTotal)\n\t\tif qStatisticsTCPThroughputRawTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.throughput_raw.total\", qStatisticsTCPThroughputRawTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPThroughputRawWrite != nil {\n\n\t\t// query param statistics.tcp.throughput_raw.write\n\t\tvar qrStatisticsTCPThroughputRawWrite int64\n\n\t\tif o.StatisticsTCPThroughputRawWrite != nil {\n\t\t\tqrStatisticsTCPThroughputRawWrite = *o.StatisticsTCPThroughputRawWrite\n\t\t}\n\t\tqStatisticsTCPThroughputRawWrite := swag.FormatInt64(qrStatisticsTCPThroughputRawWrite)\n\t\tif qStatisticsTCPThroughputRawWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.throughput_raw.write\", qStatisticsTCPThroughputRawWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTCPTimestamp != nil {\n\n\t\t// query param statistics.tcp.timestamp\n\t\tvar qrStatisticsTCPTimestamp string\n\n\t\tif o.StatisticsTCPTimestamp != nil {\n\t\t\tqrStatisticsTCPTimestamp = *o.StatisticsTCPTimestamp\n\t\t}\n\t\tqStatisticsTCPTimestamp := qrStatisticsTCPTimestamp\n\t\tif qStatisticsTCPTimestamp != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.tcp.timestamp\", qStatisticsTCPTimestamp); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsThroughputRawRead != nil {\n\n\t\t// query param statistics.throughput_raw.read\n\t\tvar qrStatisticsThroughputRawRead int64\n\n\t\tif o.StatisticsThroughputRawRead != nil {\n\t\t\tqrStatisticsThroughputRawRead = *o.StatisticsThroughputRawRead\n\t\t}\n\t\tqStatisticsThroughputRawRead := swag.FormatInt64(qrStatisticsThroughputRawRead)\n\t\tif qStatisticsThroughputRawRead != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.throughput_raw.read\", qStatisticsThroughputRawRead); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsThroughputRawTotal != nil {\n\n\t\t// query param statistics.throughput_raw.total\n\t\tvar qrStatisticsThroughputRawTotal int64\n\n\t\tif o.StatisticsThroughputRawTotal != nil {\n\t\t\tqrStatisticsThroughputRawTotal = *o.StatisticsThroughputRawTotal\n\t\t}\n\t\tqStatisticsThroughputRawTotal := swag.FormatInt64(qrStatisticsThroughputRawTotal)\n\t\tif qStatisticsThroughputRawTotal != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.throughput_raw.total\", qStatisticsThroughputRawTotal); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsThroughputRawWrite != nil {\n\n\t\t// query param statistics.throughput_raw.write\n\t\tvar qrStatisticsThroughputRawWrite int64\n\n\t\tif o.StatisticsThroughputRawWrite != nil {\n\t\t\tqrStatisticsThroughputRawWrite = *o.StatisticsThroughputRawWrite\n\t\t}\n\t\tqStatisticsThroughputRawWrite := swag.FormatInt64(qrStatisticsThroughputRawWrite)\n\t\tif qStatisticsThroughputRawWrite != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.throughput_raw.write\", qStatisticsThroughputRawWrite); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.StatisticsTimestamp != nil {\n\n\t\t// query param statistics.timestamp\n\t\tvar qrStatisticsTimestamp string\n\n\t\tif o.StatisticsTimestamp != nil {\n\t\t\tqrStatisticsTimestamp = *o.StatisticsTimestamp\n\t\t}\n\t\tqStatisticsTimestamp := qrStatisticsTimestamp\n\t\tif qStatisticsTimestamp != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"statistics.timestamp\", qStatisticsTimestamp); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.SvmName != nil {\n\n\t\t// query param svm.name\n\t\tvar qrSvmName string\n\n\t\tif o.SvmName != nil {\n\t\t\tqrSvmName = *o.SvmName\n\t\t}\n\t\tqSvmName := qrSvmName\n\t\tif qSvmName != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"svm.name\", qSvmName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.SvmUUID != nil {\n\n\t\t// query param svm.uuid\n\t\tvar qrSvmUUID string\n\n\t\tif o.SvmUUID != nil {\n\t\t\tqrSvmUUID = *o.SvmUUID\n\t\t}\n\t\tqSvmUUID := qrSvmUUID\n\t\tif qSvmUUID != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"svm.uuid\", qSvmUUID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "416d6d548da0296edde7a4670d0a51a8", "score": "0.65832514", "text": "func (o *UserCurrentPutStarParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param owner\n\tif err := r.SetPathParam(\"owner\", o.Owner); err != nil {\n\t\treturn err\n\t}\n\n\t// path param repo\n\tif err := r.SetPathParam(\"repo\", o.Repo); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" } ]
e1da056784552c789db627d280857dac
SetMetricUnit sets the MetricUnit field's value.
[ { "docid": "80c4c97615af018a90ec9b72db11c503", "score": "0.8863624", "text": "func (s *CloudwatchMetricAction) SetMetricUnit(v string) *CloudwatchMetricAction {\n\ts.MetricUnit = &v\n\treturn s\n}", "title": "" } ]
[ { "docid": "e3f58d1ae76e9524aa5d074f8dc1bdb2", "score": "0.8527646", "text": "func (m *Metric) SetUnit(v string) {\n\tm.Unit = &v\n}", "title": "" }, { "docid": "4a123f7e6a06f77ee9add70e6a2eab91", "score": "0.8394326", "text": "func (o *MetricSeries) SetUnit(v string) {\n\to.Unit = &v\n}", "title": "" }, { "docid": "c95a7312a28709e20f3e5a97b75347ee", "score": "0.8231422", "text": "func (o *DeeplinkMetricsRollup) SetUnit(v TimeUnit) {\n\to.Unit = &v\n}", "title": "" }, { "docid": "f2ea66c2655edf081c9ca3bc719f3e01", "score": "0.78893757", "text": "func (q *QueryValueWidget) SetUnit(v string) {\n\tq.Unit = &v\n}", "title": "" }, { "docid": "ff332531aa9e1f669d6ce3fbf5c8be1a", "score": "0.7835286", "text": "func (o *TimeseriesDefinition) SetUnit(v string) {\n\to.Unit = &v\n}", "title": "" }, { "docid": "b5d6dc149ea1ac044a3b9d68db936abf", "score": "0.7782213", "text": "func (a *AlertValueWidget) SetUnit(v string) {\n\ta.Unit = &v\n}", "title": "" }, { "docid": "af3dcd046b81c121db0b3053f7458e16", "score": "0.77806187", "text": "func (o *LaunchpadLinkPerformance) SetUnit(v string) {\n\to.Unit = &v\n}", "title": "" }, { "docid": "82bb40ffb09911667bd1b4070f390678", "score": "0.77604705", "text": "func (o *CloudSkuRegionRateCards) SetUnit(v string) {\n\to.Unit = &v\n}", "title": "" }, { "docid": "2b9be5667a6a6643987637e6e502b73f", "score": "0.7754837", "text": "func (o *AlertValueWidgetDefinition) SetUnit(v string) {\n\to.Unit = &v\n}", "title": "" }, { "docid": "eb7208e1b76ec41dbdb56d15d58b9b77", "score": "0.77393454", "text": "func (s *LocationTimestamp) SetUnit(v string) *LocationTimestamp {\n\ts.Unit = &v\n\treturn s\n}", "title": "" }, { "docid": "2d047a9500159cb28630768efece877d", "score": "0.7692532", "text": "func (s *TimestreamTimestamp) SetUnit(v string) *TimestreamTimestamp {\n\ts.Unit = &v\n\treturn s\n}", "title": "" }, { "docid": "9ecfd071438122d438b9a970ffdaa854", "score": "0.76871693", "text": "func (m *CoinInfoMutation) SetUnit(s string) {\n\tm.unit = &s\n}", "title": "" }, { "docid": "b075028bf3feefb62496f5c69e8ed9d9", "score": "0.7634213", "text": "func (s *DescribeFleetMetricOutput) SetUnit(v string) *DescribeFleetMetricOutput {\n\ts.Unit = &v\n\treturn s\n}", "title": "" }, { "docid": "c9baa5b839f3e38235eb231cf9a63dfa", "score": "0.7596661", "text": "func (s *DurationSinceLastAccess) SetUnit(v string) *DurationSinceLastAccess {\n\ts.Unit = &v\n\treturn s\n}", "title": "" }, { "docid": "ca2c04f8df1dd4b8982af159d432d700", "score": "0.75508845", "text": "func (s *UpdateFleetMetricInput) SetUnit(v string) *UpdateFleetMetricInput {\n\ts.Unit = &v\n\treturn s\n}", "title": "" }, { "docid": "37024bb90e211abbc2f34d21f1fe51e0", "score": "0.7514512", "text": "func (s *CreateFleetMetricInput) SetUnit(v string) *CreateFleetMetricInput {\n\ts.Unit = &v\n\treturn s\n}", "title": "" }, { "docid": "4c38f1e9ba44efea3b82998f50170b9c", "score": "0.7384075", "text": "func (o *ParseIngredients200ResponseInner) SetUnit(v string) {\n\to.Unit = v\n}", "title": "" }, { "docid": "d7373f6f3a57747b229c2f49cfef4476", "score": "0.72294116", "text": "func (a *RQTimerValue) SetUnit(unit uint8) {\n\ta.Octet = (a.Octet & 31) + ((unit & 7) << 5)\n}", "title": "" }, { "docid": "512fba19218b04cea1716defeb0dbdaf", "score": "0.706586", "text": "func (o *TimeseriesResponseSeries) SetUnit(v []Unit) {\n\to.Unit = v\n}", "title": "" }, { "docid": "aaf698c2e81c2f7885411becc55f9d37", "score": "0.6820433", "text": "func (o *CloudSkuInstanceTypeAllOf) SetMemorySizeUnit(v string) {\n\to.MemorySizeUnit = &v\n}", "title": "" }, { "docid": "68f4c5f7e2d635deefebcd6ea13a2bbb", "score": "0.66584635", "text": "func WithUnit(unit metricdata.Unit) Options {\n\treturn func(mo *metricOptions) {\n\t\tmo.unit = unit\n\t}\n}", "title": "" }, { "docid": "bb2f17059699e966f651b72d41e3d092", "score": "0.6459409", "text": "func (o *CreateContentLibraryImageParams) SetSizeUnit(sizeUnit *string) {\n\to.SizeUnit = sizeUnit\n}", "title": "" }, { "docid": "49ffe5b0dc6c5e39d61024b35d152ae0", "score": "0.6410812", "text": "func (o *DeeplinkMetricsRollup) SetUnits(v int32) {\n\to.Units = &v\n}", "title": "" }, { "docid": "b29f74cdbd053d10959438564f03e87d", "score": "0.6343675", "text": "func (o *DeeplinkMetricsRollup) SetUnitReference(v string) {\n\to.UnitReference = &v\n}", "title": "" }, { "docid": "953117652eb67de77bae7b8bb419d4df", "score": "0.62976927", "text": "func (s *Scheduler) setUnit(unit timeUnit) {\n\tcurrentJob := s.getCurrentJob()\n\tcurrentJob.unit = unit\n}", "title": "" }, { "docid": "694d7a25870737c9dddd5ae77cc6af33", "score": "0.62397504", "text": "func (m *Metric) GetUnit() string {\n\tif m == nil || m.Unit == nil {\n\t\treturn \"\"\n\t}\n\treturn *m.Unit\n}", "title": "" }, { "docid": "351ebc90eb261e1ae6324fbd43d335ff", "score": "0.6162912", "text": "func (j *Job) setUnit(unit string) *Job {\n\tj.mu.Lock()\n\tj.unit = unit\n\tj.mu.Unlock()\n\treturn j\n}", "title": "" }, { "docid": "f9bd410829b10718ec3108848767536f", "score": "0.61230505", "text": "func (o *ParseIngredients200ResponseInner) SetUnitLong(v string) {\n\to.UnitLong = v\n}", "title": "" }, { "docid": "0c3e5ca50a247b7a244dd1a5a8f4b029", "score": "0.6097519", "text": "func (q *QueryValueWidget) SetMetric(v string) {\n\tq.Metric = &v\n}", "title": "" }, { "docid": "703a7b176d2c59a67597616973e7193f", "score": "0.6020516", "text": "func (o *MetricSeries) GetUnit() string {\n\tif o == nil || o.Unit == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Unit\n}", "title": "" }, { "docid": "96420c3f1b824159dcfeda8bed112168", "score": "0.60146207", "text": "func (m *Metric) SetMetric(v string) {\n\tm.Metric = &v\n}", "title": "" }, { "docid": "1835864c99f531b5084f5f0bdefcbe7c", "score": "0.59766895", "text": "func (s *Series) SetMetric(v string) {\n\ts.Metric = &v\n}", "title": "" }, { "docid": "adaf1d99750731c1b28929d0bc3776db", "score": "0.595889", "text": "func (uc *UserCreate) SetDistanceUnit(uu user.DistanceUnit) *UserCreate {\n\tuc.mutation.SetDistanceUnit(uu)\n\treturn uc\n}", "title": "" }, { "docid": "7635ce1769477164567080d87b70658b", "score": "0.5940959", "text": "func GetUnitForMetric(metric string) string {\n\treturn metricToUnitMap[metric]\n}", "title": "" }, { "docid": "dc4b5bb2ccaa5c14c3da5c3a805a9493", "score": "0.5935837", "text": "func (t *SonarqubeMetric) SetMetric(v string) {\n\tt.Metric = v\n}", "title": "" }, { "docid": "9bc352840545160ff11c09993b245b1e", "score": "0.5896918", "text": "func (g *GraphDefinition) SetCustomUnit(v string) {\n\tg.CustomUnit = &v\n}", "title": "" }, { "docid": "d3cb157630db6260bf2557a50ab08b81", "score": "0.5877229", "text": "func (o *LaunchpadLinkPerformance) SetUnitReference(v string) {\n\to.UnitReference = &v\n}", "title": "" }, { "docid": "de49a97480476223027cd2cdc87f1950", "score": "0.58697844", "text": "func (o *LaunchpadLinkPerformance) SetUnits(v int32) {\n\to.Units = &v\n}", "title": "" }, { "docid": "e66fe65f0441c0511ae6b98acc9d9b55", "score": "0.5858328", "text": "func (o *MetricSeries) SetMetric(v string) {\n\to.Metric = v\n}", "title": "" }, { "docid": "300a144d8c2663c6766a0492987143df", "score": "0.581928", "text": "func (pb *ProgressBar) SetUnits(units Units) *ProgressBar {\n\tpb.Units = units\n\treturn pb\n}", "title": "" }, { "docid": "e3a6c4d5b85857527dfbda524664e096", "score": "0.5818163", "text": "func (s *Behavior) SetMetric(v string) *Behavior {\n\ts.Metric = &v\n\treturn s\n}", "title": "" }, { "docid": "dc193abfda076eb8158a3e79229a0777", "score": "0.5784029", "text": "func (o *ParseIngredients200ResponseInner) SetUnitShort(v string) {\n\to.UnitShort = v\n}", "title": "" }, { "docid": "85c98833c6165edb09214bd656426727", "score": "0.577966", "text": "func (o *CalculatedMetricDefinition) SetMetric(v string) {\n\to.Metric = v\n}", "title": "" }, { "docid": "ad9ecaedeb9f3c93b5b9b81f7a93065e", "score": "0.5766177", "text": "func (s *S3OnDeviceServiceConfiguration) SetStorageUnit(v string) *S3OnDeviceServiceConfiguration {\n\ts.StorageUnit = &v\n\treturn s\n}", "title": "" }, { "docid": "64c653c270df551ee905a59e2ed502b1", "score": "0.57577866", "text": "func (s *PITPolicyRule) SetUnits(v string) *PITPolicyRule {\n\ts.Units = &v\n\treturn s\n}", "title": "" }, { "docid": "1c8cc586f3e4586dbb39cc2c4ac2d59c", "score": "0.57478815", "text": "func (o *MemoryArray) SetUnits(v []MemoryUnitRelationship) {\n\to.Units = v\n}", "title": "" }, { "docid": "15d5a277c2b3e731acb97395e638f9f8", "score": "0.5726187", "text": "func (o *CloudSkuInstanceTypeAllOf) SetCpuUnit(v string) {\n\to.CpuUnit = &v\n}", "title": "" }, { "docid": "c69ded03691e8c8b1eb27ed003f9dd75", "score": "0.57194173", "text": "func (o TaskSetScaleOutput) Unit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v TaskSetScale) *string { return v.Unit }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c312147c422525250346a1d8eb0e5365", "score": "0.56848025", "text": "func Unit(v string) predicate.Timing {\n\treturn predicate.Timing(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldUnit), v))\n\t})\n}", "title": "" }, { "docid": "4d43f0a7aa8861a197fec6fd4ecbb229", "score": "0.56469315", "text": "func (o TaskSetScalePtrOutput) Unit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *TaskSetScale) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Unit\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "de4127d80c8aa276a25001b52ce1764e", "score": "0.56162107", "text": "func (mb MetricBuilder) CheckUnit(unit string) bool {\n\treturn mb.Unit == unit\n}", "title": "" }, { "docid": "2cf5ff7eebe46c08eea3637e246b6006", "score": "0.5610544", "text": "func (o *Operation) SetToUnit(){\n\to.opType = UNIT\n}", "title": "" }, { "docid": "992d37ab5b98a097eca725e57dcfd5ae", "score": "0.56005806", "text": "func (o GoogleCloudDocumentaiV1DocumentStyleFontSizeOutput) Unit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GoogleCloudDocumentaiV1DocumentStyleFontSize) *string { return v.Unit }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c32abf5df22e2e7872dc891218c816d6", "score": "0.5593157", "text": "func (m Measurement) Unit() string {\n\treturn m.unit\n}", "title": "" }, { "docid": "ab5557b3e39e2d6eacec9431b144e565", "score": "0.55891806", "text": "func (s *TGWOnDeviceServiceConfiguration) SetStorageUnit(v string) *TGWOnDeviceServiceConfiguration {\n\ts.StorageUnit = &v\n\treturn s\n}", "title": "" }, { "docid": "c03f809abe722976431f6ff2ed8da46c", "score": "0.55220866", "text": "func (o *DeeplinkMetricsRollup) GetUnit() TimeUnit {\n\tif o == nil || o.Unit == nil {\n\t\tvar ret TimeUnit\n\t\treturn ret\n\t}\n\treturn *o.Unit\n}", "title": "" }, { "docid": "1799b3a038ceadcb8ed04ea41825f72f", "score": "0.5489476", "text": "func (o TimeChartVizOptionOutput) ValueUnit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v TimeChartVizOption) *string { return v.ValueUnit }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "1fa74c8ff7c69f1e88f919e5b30e93a9", "score": "0.5468546", "text": "func (o GoogleCloudDocumentaiV1DocumentStyleFontSizeResponseOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GoogleCloudDocumentaiV1DocumentStyleFontSizeResponse) string { return v.Unit }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "d9c5557cc4092c214c6fbf7be2ffcd56", "score": "0.5450447", "text": "func (o *AdapterHostFcInterfaceAllOf) SetAdapterUnit(v AdapterUnitRelationship) {\n\to.AdapterUnit = &v\n}", "title": "" }, { "docid": "0e3a3f91fadb71de1849a31f7ef98ffb", "score": "0.5447381", "text": "func (o *LaunchpadLinkPerformance) GetUnit() string {\n\tif o == nil || o.Unit == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Unit\n}", "title": "" }, { "docid": "918dd7dcb0cdb6de54b4bb6c907a9859", "score": "0.5432995", "text": "func (s *NFSOnDeviceServiceConfiguration) SetStorageUnit(v string) *NFSOnDeviceServiceConfiguration {\n\ts.StorageUnit = &v\n\treturn s\n}", "title": "" }, { "docid": "ccd16de3241df28be15240a23f218cf0", "score": "0.54278105", "text": "func (o *CloudSkuInstanceTypeAllOf) GetMemorySizeUnit() string {\n\tif o == nil || o.MemorySizeUnit == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.MemorySizeUnit\n}", "title": "" }, { "docid": "fa2a4a469793611730b6b971e1f12dc4", "score": "0.54084337", "text": "func (o *CloudSkuRegionRateCards) GetUnit() string {\n\tif o == nil || o.Unit == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Unit\n}", "title": "" }, { "docid": "81cf9d51a75414fde5220f40f0a91c14", "score": "0.53958994", "text": "func (o *TimeseriesDefinition) GetUnit() string {\n\tif o == nil || o.Unit == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Unit\n}", "title": "" }, { "docid": "af4d34bcbfaed832e1a4f18f0363de64", "score": "0.5381008", "text": "func (q *QueryValueWidget) GetUnit() string {\n\tif q == nil || q.Unit == nil {\n\t\treturn \"\"\n\t}\n\treturn *q.Unit\n}", "title": "" }, { "docid": "f9e582ce61c4561d3ece1d377c0328f0", "score": "0.5377614", "text": "func (o InsightFiltersFirstObservedAtDateRangeOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v InsightFiltersFirstObservedAtDateRange) string { return v.Unit }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "2b82f008f3e086fa441bcd6dec592544", "score": "0.53536683", "text": "func (o InsightFiltersFirstObservedAtDateRangePtrOutput) Unit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *InsightFiltersFirstObservedAtDateRange) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Unit\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d1d1d516261c588f8d833630c8e206d6", "score": "0.53512734", "text": "func SetMetric(name string, labels map[string]string, value float64) error {\n\t// set vector value\n\tgv, ok := MetricVecs[name]\n\tif ok {\n\t\tgv.With(labels).Set(value)\n\t\treturn nil\n\t}\n\n\t// create label array for vector creation\n\tkeys := make([]string, 0, len(labels))\n\tfor k := range labels {\n\t\tkeys = append(keys, k)\n\t}\n\n\t// the vector does not exist, create it, register and then add this gauge metric to the gauge vector\n\tgv = *prometheus.NewGaugeVec(prometheus.GaugeOpts{Name: name}, keys)\n\tcustomMetrics.Registry.MustRegister(gv)\n\tMetricVecs[name] = gv\n\n\treturn nil\n}", "title": "" }, { "docid": "54ed8394ce7e5280b2153607bd68de21", "score": "0.53508294", "text": "func (o DataSetRefreshPropertiesRefreshConfigurationIncrementalRefreshLookbackWindowOutput) SizeUnit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v DataSetRefreshPropertiesRefreshConfigurationIncrementalRefreshLookbackWindow) string {\n\t\treturn v.SizeUnit\n\t}).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "2686876fe28ad69bc92b51b01bee98d6", "score": "0.5350414", "text": "func (o *AlertValueWidgetDefinition) GetUnit() string {\n\tif o == nil || o.Unit == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Unit\n}", "title": "" }, { "docid": "210ea70e1f26e1b03518e3cb4229db2b", "score": "0.53188825", "text": "func (m *Metric) HasUnit() bool {\n\tif m != nil && m.Unit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "6167e943f8e9d30f5fb09e7c469dccc3", "score": "0.53120244", "text": "func (o SingleValueChartVizOptionOutput) ValueUnit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v SingleValueChartVizOption) *string { return v.ValueUnit }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "138d5cde73ab14d18766cada07c0bec7", "score": "0.5288019", "text": "func (o InsightFiltersLastObservedAtDateRangeOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v InsightFiltersLastObservedAtDateRange) string { return v.Unit }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "089dd0beeffc92ae8967ef2d7c587d3f", "score": "0.5267815", "text": "func (o InsightFiltersLastObservedAtDateRangePtrOutput) Unit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *InsightFiltersLastObservedAtDateRange) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Unit\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a3156f95c6676ed5f015b77e83e079c3", "score": "0.52653956", "text": "func (g *AggGauge) GetUnit() metric.Unit { return g.g.GetUnit() }", "title": "" }, { "docid": "3542558b26f5aeca4e11fcb58185169a", "score": "0.52582407", "text": "func (dic *DefaultItemConfig) GetUnit() float64 {\n\treturn dic.Unit\n}", "title": "" }, { "docid": "75e96981becc5b11c23270bf6d322b60", "score": "0.5256938", "text": "func (m *JobMutation) SetSalaryUnit(ju job.SalaryUnit) {\n\tm.salary_unit = &ju\n}", "title": "" }, { "docid": "9e4f705e90ba95f7fa63bf9bd10a9dfe", "score": "0.5241186", "text": "func (o InsightFiltersUpdatedAtDateRangeOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v InsightFiltersUpdatedAtDateRange) string { return v.Unit }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "f45bcad42bb5d75609eeb05dc1a9e499", "score": "0.52388066", "text": "func (o InsightFiltersThreatIntelIndicatorLastObservedAtDateRangeOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v InsightFiltersThreatIntelIndicatorLastObservedAtDateRange) string { return v.Unit }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "34a038d4f6cd0b9fae5c1ab746479d00", "score": "0.52384716", "text": "func (o GoogleCloudDocumentaiV1DocumentStyleFontSizePtrOutput) Unit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *GoogleCloudDocumentaiV1DocumentStyleFontSize) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Unit\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "fb6011afe88f80817e58da0da3d4ce15", "score": "0.5219534", "text": "func (o ListChartVizOptionOutput) ValueUnit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ListChartVizOption) *string { return v.ValueUnit }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "72143d2ae7536c16e0999085da7e51b5", "score": "0.52189165", "text": "func (s *MetricToRetain) SetMetric(v string) *MetricToRetain {\n\ts.Metric = &v\n\treturn s\n}", "title": "" }, { "docid": "a6c51f42a26ff488547b4861d4963a04", "score": "0.52087146", "text": "func (a *AlertValueWidget) GetUnit() string {\n\tif a == nil || a.Unit == nil {\n\t\treturn \"\"\n\t}\n\treturn *a.Unit\n}", "title": "" }, { "docid": "7131c467a27fa5a1e29890ddb4566e54", "score": "0.5195938", "text": "func (m *metrics) SetGauge(value float64, subsystem, name, help string) {\n\tm.gaugeMutex.RLock()\n\tkey := fmt.Sprintf(\"%s/%s\", subsystem, name)\n\tgauge, exists := m.Gauges[key]\n\tm.gaugeMutex.RUnlock()\n\n\tif !exists {\n\t\tm.gaugeMutex.Lock()\n\t\tif gauge, exists = m.Gauges[key]; !exists {\n\t\t\tgauge = prometheus.NewGauge(prometheus.GaugeOpts{\n\t\t\t\tNamespace: m.Namespace,\n\t\t\t\tSubsystem: subsystem,\n\t\t\t\tName: name,\n\t\t\t\tHelp: help,\n\t\t\t})\n\t\t\tm.Gauges[key] = gauge\n\t\t\terr := prometheus.Register(gauge)\n\t\t\tif err != nil {\n\t\t\t\tm.Logger.\n\t\t\t\t\tWarn(\"MetricsSetGaugeFailed\",\n\t\t\t\t\t\t\"SetGauge: Gauge registration %v failed: %v\", gauge, err)\n\t\t\t}\n\t\t}\n\t\tm.gaugeMutex.Unlock()\n\t}\n\n\tgauge.Set(value)\n}", "title": "" }, { "docid": "39f6b32b144170da996988d0918fc103", "score": "0.5168773", "text": "func (o InsightFiltersNoteUpdatedAtDateRangeOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v InsightFiltersNoteUpdatedAtDateRange) string { return v.Unit }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "e178c5a991db43d074f5059192f397e1", "score": "0.5145535", "text": "func (o InsightFiltersUpdatedAtDateRangePtrOutput) Unit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *InsightFiltersUpdatedAtDateRange) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Unit\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a1d2bd095758bd4047b49c587d8715de", "score": "0.5144158", "text": "func (mw *MagickWand) SetResolutionUnits(units ResolutionType) error {\n\tok := C.MagickSetResolutionUnits(mw.mw, C.ResolutionType(units))\n\treturn mw.getLastErrorIfFailed(ok)\n}", "title": "" }, { "docid": "3b4cc46ebb688d10c28a245344ea0e7b", "score": "0.5111239", "text": "func (o DataSetRefreshPropertiesRefreshConfigurationIncrementalRefreshLookbackWindowPtrOutput) SizeUnit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *DataSetRefreshPropertiesRefreshConfigurationIncrementalRefreshLookbackWindow) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.SizeUnit\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "2105f5fa69c50f13612464006f91f0e7", "score": "0.50958496", "text": "func (i *Memory) Set(metric string, n int) {\n\ti.metrics[metric] = n\n}", "title": "" }, { "docid": "75ae57dc62ff973674f7dae507aced31", "score": "0.50945586", "text": "func (o InsightFiltersThreatIntelIndicatorLastObservedAtDateRangePtrOutput) Unit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *InsightFiltersThreatIntelIndicatorLastObservedAtDateRange) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Unit\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d8c2f4deb3dc8595e2f60a8608733f34", "score": "0.5092077", "text": "func (pr Pressure) Unit() *Unit {\n\treturn New(float64(pr), Dimensions{\n\t\tLengthDim: -1,\n\t\tMassDim: 1,\n\t\tTimeDim: -2,\n\t})\n}", "title": "" }, { "docid": "72542023e3cd8aaf9cc3edd184d793e2", "score": "0.50834906", "text": "func (s *XPackWatcherStatsService) Metric(metric string) *XPackWatcherStatsService {\n\ts.metric = metric\n\treturn s\n}", "title": "" }, { "docid": "37295aa10cdd1479dab30f2efa6684fc", "score": "0.50734067", "text": "func (m *CoinInfoMutation) ResetUnit() {\n\tm.unit = nil\n}", "title": "" }, { "docid": "272f6e8b8d631f6dcfb83607bdbed7be", "score": "0.5051027", "text": "func (o InsightFiltersResourceContainerLaunchedAtDateRangeOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v InsightFiltersResourceContainerLaunchedAtDateRange) string { return v.Unit }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "ceb56e643d4b96482b23692bb4ed90b2", "score": "0.50186074", "text": "func getUnit(m model.Metric) string {\n\tif u, ok := m[cwUnitLabel]; ok {\n\t\treturn string(u)\n\t}\n\treturn \"None\"\n}", "title": "" }, { "docid": "1b250017cd554f0102a209f5720f9487", "score": "0.5004682", "text": "func (o InsightFiltersCreatedAtDateRangeOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v InsightFiltersCreatedAtDateRange) string { return v.Unit }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b2a32a002d88112e2e81409883cdf309", "score": "0.4999734", "text": "func (o InsightFiltersResourceAwsEc2InstanceLaunchedAtDateRangeOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v InsightFiltersResourceAwsEc2InstanceLaunchedAtDateRange) string { return v.Unit }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "9ec85574e8e948540eb45294bb0b97f0", "score": "0.4995965", "text": "func (mc *ModbusClient) SetUnitId(id uint8) (err error) {\n\tmc.lock.Lock()\n\tdefer mc.lock.Unlock()\n\n\tmc.unitId\t= id\n\n\treturn\n}", "title": "" }, { "docid": "1f4aaa3122e6aa3396f9aba5bf4ac5eb", "score": "0.49873552", "text": "func (o InsightFiltersProcessTerminatedAtDateRangeOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v InsightFiltersProcessTerminatedAtDateRange) string { return v.Unit }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "ac5cf3fe8d26cfebb19a22248dbacc06", "score": "0.4987116", "text": "func (o *ParseIngredients200ResponseInner) GetUnit() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Unit\n}", "title": "" } ]
8e1a3b24ac20fabe99a9bccc64c45a34
AsAzureSQLTableDataset is the BasicDataset implementation for JiraObjectDataset.
[ { "docid": "d5a2f358f253d227dbd5f48e976990ad", "score": "0.81928223", "text": "func (jod JiraObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" } ]
[ { "docid": "96e5eda4734541281f1d257ca4be45a8", "score": "0.79278827", "text": "func (hbod HBaseObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "6807e500cf9e1ef0cb48f35a945a2cf1", "score": "0.7853477", "text": "func (iod ImpalaObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "673c2c918f4d4e3a45c87b51312fb78d", "score": "0.78426623", "text": "func (hod HiveObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "9c1278e68f832b4781e61f7a73d29b69", "score": "0.7820223", "text": "func (mod MarketoObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d1fb01133849421ed59c07eaabdcc53f", "score": "0.78176427", "text": "func (hod HubspotObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "03e82575ab60cc802b14aab266222c66", "score": "0.7774967", "text": "func (cod ConcurObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "474b52f7ae61acb08976e754462e8823", "score": "0.7773932", "text": "func (sod ShopifyObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "364c4110d1142f12f0cab41d45f94b81", "score": "0.7764331", "text": "func (sod SparkObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "a6e83c85ee4902e04fee6fb8f11b0f4d", "score": "0.77594894", "text": "func (mod MagentoObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "75fe94db1530da1355fb7f2149dda6f4", "score": "0.7729634", "text": "func (gbqod GoogleBigQueryObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "b60fe7f792cda58c0e776e8cda4b87f8", "score": "0.77275693", "text": "func (snod ServiceNowObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "b850c6377704b4d741e67beb3a966522", "score": "0.77248263", "text": "func (jod JiraObjectDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "435c4870b5420c551c0706d89e9461bc", "score": "0.77188075", "text": "func (pod PhoenixObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f437d22e230cad47f209414bcabe4975", "score": "0.76931524", "text": "func (ctd CouchbaseTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "5c9fbc4e671550606e0cab75d9347314", "score": "0.7686766", "text": "func (pod PrestoObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "fcd0ff7c3895e20b03407b8e88fb0c4c", "score": "0.7686513", "text": "func (d Dataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "404b36cbf749050366b1f724ccf9b313", "score": "0.7673438", "text": "func (hd HTTPDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "eb78e369474ec3f99941d425b4d8c78f", "score": "0.76680684", "text": "func (qbod QuickBooksObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f889378b9a2fc9557a7170e937d05fd5", "score": "0.7655902", "text": "func (xod XeroObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "17f0918029dabcb5f07a5a4dc49baf53", "score": "0.7651381", "text": "func (eod EloquaObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "5a5264ed449d892e05c379b177ea6b84", "score": "0.7648", "text": "func (sod SquareObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "59edb5f0715b959e4ae16119508374cc", "score": "0.7630861", "text": "func (zod ZohoObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "7b08f505612ae06a9d8b1700decbcab4", "score": "0.76308334", "text": "func (cd CustomDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "26a15b480a779e21c0432e1c8e34b109", "score": "0.76228786", "text": "func (sod SalesforceObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "904db0a6507d3b226a1bd748457e0545", "score": "0.76079893", "text": "func (astd AzureSQLTableDataset) AsDataset() (*Dataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "83bc612b117c0534a1b69a794943c8e5", "score": "0.75927675", "text": "func (mdcd MongoDbCollectionDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "841e9a9b287a2b1d4ade9c5f69928f33", "score": "0.7588537", "text": "func (otd OracleTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "1b659f1fa4e302ca75c7f0bf525d5f63", "score": "0.75715774", "text": "func (rod ResponsysObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "5a21c85a84186d26778c7574b2f2f850", "score": "0.7568733", "text": "func (atd AzureTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "c63449ed8fa39a173ff44356b10f2150", "score": "0.7567107", "text": "func (odrd ODataResourceDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "63beaaf5070782ee24f819b0a5df093d", "score": "0.7561723", "text": "func (jod JiraObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d16b0ec34631e999b73662a3263ea9b5", "score": "0.7507913", "text": "func (amod AmazonMWSObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "716e54d47efdffe80c7c87606d5ab5a5", "score": "0.7507872", "text": "func (dtd DrillTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "109c5b7b143591a430259e2936d493b6", "score": "0.7490684", "text": "func (abd AzureBlobDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "589662b02fedefddeb0ca3bc0c40f85d", "score": "0.74736667", "text": "func (sstd SQLServerTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "27510fe9f8751cc631041a1953893e07", "score": "0.745327", "text": "func (rtd RelationalTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f7bd565d25925d743bf4db29cb5eba4e", "score": "0.7444418", "text": "func (ded DynamicsEntityDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "842414e05ecfd8e8a7420b61fc2dcfae", "score": "0.74232805", "text": "func (jod JiraObjectDataset) AsAzureMySQLTableDataset() (*AzureMySQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "c6ca42d59ff77f57a3b1059d678322a5", "score": "0.74167156", "text": "func (astd AzureSQLTableDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "dea0a6cbfde579a407918ed9b22f2cdf", "score": "0.74118614", "text": "func (smcod SalesforceMarketingCloudObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "35de3662f38ea9a1a00a8e4f4bf653b0", "score": "0.74115604", "text": "func (mod MarketoObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "689306a94e71d92b652bb065822f6cce", "score": "0.73965216", "text": "func (jod JiraObjectDataset) AsSQLServerTableDataset() (*SQLServerTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "72ae3b6e2d9285b319183cf4a1dd8d12", "score": "0.7395022", "text": "func (hbod HBaseObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "6f3a1b9afca987c9ed47cb4698cc0c91", "score": "0.73939204", "text": "func (astd AzureSQLTableDataset) AsJiraObjectDataset() (*JiraObjectDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "43c73d7480052caa977c0f69d9bcc722", "score": "0.73841494", "text": "func (ctd CassandraTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "24804a9620791348bf26fc2dad72c783", "score": "0.7363955", "text": "func (gbqod GoogleBigQueryObjectDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "c2663b05f21b709015d18db0e5d582a7", "score": "0.7343915", "text": "func (amstd AzureMySQLTableDataset) AsDataset() (*Dataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "bae7f4ec39e4085861aa9c43cd49e53c", "score": "0.734047", "text": "func (asd AmazonS3Dataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "8128e47e66f07f9c873412e741c643e5", "score": "0.73308116", "text": "func (hbod HBaseObjectDataset) AsSQLServerTableDataset() (*SQLServerTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "2a4be5742370d0f02a8f3636816154a2", "score": "0.7330752", "text": "func (gtd GreenplumTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "14e4c088274ca59f35c1c7abb3ebd2ef", "score": "0.7328454", "text": "func (hbod HBaseObjectDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "35e505bbf7f74048058f0865e6a78e53", "score": "0.732566", "text": "func (wtd WebTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f8548322549d557cf0405fe60dd9f971", "score": "0.7320812", "text": "func (astd AzureSQLTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn &astd, true\n}", "title": "" }, { "docid": "c36cd7c121a6068380162fa1abe2e904", "score": "0.7311771", "text": "func (mdtd MariaDBTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "990d05eeba745687dc775f7bef4d9b18", "score": "0.7305631", "text": "func (amstd AzureMySQLTableDataset) AsJiraObjectDataset() (*JiraObjectDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "099647f593f2a234d889404401c62bbf", "score": "0.73024577", "text": "func (iod ImpalaObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "5a7cfa04fb1c50bef5d754d70a394d0a", "score": "0.72937655", "text": "func (sstd SQLServerTableDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "12002d33d2f8fb24cfafc10cc213522a", "score": "0.7288271", "text": "func (hod HubspotObjectDataset) AsSQLServerTableDataset() (*SQLServerTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "eb91d656d38bad89c4fcd86d08c59874", "score": "0.72877806", "text": "func (iod ImpalaObjectDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "76ccc7647b7d752bb22f0fa61cfea316", "score": "0.72859824", "text": "func (snod ServiceNowObjectDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d9e7697d5a60f55648204ed7db56939f", "score": "0.7282369", "text": "func (hod HiveObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "dabfde830273230a69d5d25fb6f36017", "score": "0.72766364", "text": "func (pod PaypalObjectDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "8d723eca5bfa063eae5ed675ebcfa564", "score": "0.7276498", "text": "func (mod MagentoObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "bf4db471ad080a58ec72e57ea3a411ae", "score": "0.72719073", "text": "func (sod SparkObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "210cb2153c0d5f6b098e72866aeecd07", "score": "0.7270963", "text": "func (sod ShopifyObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "0de736724362c2f23eee805a107460f6", "score": "0.7268493", "text": "func (cod ConcurObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "df9ab6a99638232eb16973db14fe7b3f", "score": "0.7266131", "text": "func (sstd SQLServerTableDataset) AsDataset() (*Dataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f4feeef6cfa25f6a152f5f51c992b5a5", "score": "0.7262814", "text": "func (ctd CouchbaseTableDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "207e6b15bd14f8672ef26282d649cffc", "score": "0.7259943", "text": "func (hod HubspotObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "39f98c9ae44e70a18fbf00e8ce1d4275", "score": "0.72557294", "text": "func (sod SparkObjectDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "573d5770c376e147d5ebeabcbb485c73", "score": "0.7254165", "text": "func (ctd CouchbaseTableDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "732c80420ccfbdfee96657522696e644", "score": "0.7242055", "text": "func (hbod HBaseObjectDataset) AsAzureMySQLTableDataset() (*AzureMySQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "08c7acba6aed547e565799087daeb415", "score": "0.72405374", "text": "func (astd AzureSQLTableDataset) AsImpalaObjectDataset() (*ImpalaObjectDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "e6fcf2946641d15d2efb0feef5e79a55", "score": "0.72367895", "text": "func (atd AzureTableDataset) AsSQLServerTableDataset() (*SQLServerTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "e75b5cd22481b656b33462452f3bc743", "score": "0.72325313", "text": "func (astd AzureSQLTableDataset) AsCustomDataset() (*CustomDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "0163d1f9ed3659d69763a64e6a8fad08", "score": "0.7231946", "text": "func (astd AzureSQLTableDataset) AsHTTPDataset() (*HTTPDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "0c55eb631dfaea7a7bd4b25f5b58e024", "score": "0.72317755", "text": "func (qbod QuickBooksObjectDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f8255635d408f416b02e142903263c7e", "score": "0.7221083", "text": "func (sod ShopifyObjectDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "3de9d3cf608a72e695bf49e4ab3dc821", "score": "0.7221056", "text": "func (pod PhoenixObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "0ffcbc81b8b60c2150cb70b3d6f04763", "score": "0.7215622", "text": "func (cod ConcurObjectDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "1c51cb53f5a3f6c42500bb7cc1556ad8", "score": "0.72152543", "text": "func (amstd AzureMySQLTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "6a7e617a3a416e11d5f9544a2c3b2dc9", "score": "0.72149456", "text": "func (cd CustomDataset) AsSQLServerTableDataset() (*SQLServerTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d69142944a05e4a3c3afc1c7f66d8340", "score": "0.7210625", "text": "func (gbqod GoogleBigQueryObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "6a474bb01c8e9c1e07d7c6ced4b52db1", "score": "0.7209772", "text": "func (hod HiveObjectDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "e62c3854a1c7b438e8188ec4fe7ef925", "score": "0.7207088", "text": "func (ddcd DocumentDbCollectionDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "86206e690239796ca3cf6c447fa17be6", "score": "0.7205168", "text": "func (asdtd AzureSQLDWTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "bb67928321b3541a2974359c7373931b", "score": "0.72051525", "text": "func (astd AzureSQLTableDataset) AsShopifyObjectDataset() (*ShopifyObjectDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "293bbaa6d8dae16198a1c4659c9adf03", "score": "0.72025913", "text": "func (vtd VerticaTableDataset) AsAzureSQLTableDataset() (*AzureSQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "79823ac24d1e1900b97eb0d6d6686c93", "score": "0.7191171", "text": "func (gbqod GoogleBigQueryObjectDataset) AsSQLServerTableDataset() (*SQLServerTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "438a7549fbb73bf0c1392308f778a8c3", "score": "0.71874064", "text": "func (pod PrestoObjectDataset) AsSQLServerTableDataset() (*SQLServerTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "19cfabceaa9466eeee1729140432635a", "score": "0.7187383", "text": "func (hod HiveObjectDataset) AsSQLServerTableDataset() (*SQLServerTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "3c79a094c182116046bd5406b40d2380", "score": "0.7174875", "text": "func (abd AzureBlobDataset) AsSQLServerTableDataset() (*SQLServerTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "9cbc40b357add151b3b605d67618c132", "score": "0.71739805", "text": "func (atd AzureTableDataset) AsDataset() (*Dataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "eaf2914f9e047cfd9e6b53a2425bfc80", "score": "0.71596384", "text": "func (asdtd AzureSQLDWTableDataset) AsAzureTableDataset() (*AzureTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "ce79631e8be5aba2bddc148d181ef12f", "score": "0.7159469", "text": "func (qbod QuickBooksObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "9ca6aeaba84fc52ff69f37aad7560d33", "score": "0.7158106", "text": "func (sod SquareObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "b61b9cc594801468037f976be6d268fa", "score": "0.7157768", "text": "func (xod XeroObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "45c371efc4eb1b0d2ec0b08211dede2d", "score": "0.71570563", "text": "func (sod SparkObjectDataset) AsAzureMySQLTableDataset() (*AzureMySQLTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "53c785f7408d836b9f2245c0d98d7767", "score": "0.71535206", "text": "func (sstd SQLServerTableDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f06aa02ae33ba1b6b340af9e7eda3e3d", "score": "0.71532714", "text": "func (pod PrestoObjectDataset) AsAzureSQLDWTableDataset() (*AzureSQLDWTableDataset, bool) {\n\treturn nil, false\n}", "title": "" } ]
af8bca7bcc6a152d266931d1c0a3bae9
getGlobalPrivsRowsFromPrivSet returns USER_PRIVILEGES rows using given global privilege set and grantee name string.
[ { "docid": "234234e7ca874a83d9db46b41195aca7", "score": "0.8567006", "text": "func getGlobalPrivsRowsFromPrivSet(privSet PrivilegeSet, grantee string) []Row {\n\tvar rows []Row\n\thasGrantOpt := privSet.Has(PrivilegeType_GrantOption)\n\tfor _, priv := range privSet.ToSlice() {\n\t\tif priv == PrivilegeType_GrantOption {\n\t\t\tcontinue\n\t\t}\n\t\tisGrantable := \"NO\"\n\t\tif hasGrantOpt {\n\t\t\tisGrantable = \"YES\"\n\t\t}\n\t\trows = append(rows, Row{\n\t\t\tgrantee, // grantee\n\t\t\t\"def\", // table_catalog\n\t\t\tpriv.String(), // privilege_type\n\t\t\tisGrantable, // is_grantable\n\t\t})\n\t}\n\treturn rows\n}", "title": "" } ]
[ { "docid": "b159b64dd95ac60c39d29b9c85035941", "score": "0.7500327", "text": "func getSchemaPrivsRowsFromPrivDbSet(privSetDb PrivilegeSetDatabase, grantee string) []Row {\n\tvar rows []Row\n\thasGrantOpt := privSetDb.Has(PrivilegeType_GrantOption)\n\tfor _, privType := range privSetDb.ToSlice() {\n\t\tif privType == PrivilegeType_GrantOption {\n\t\t\tcontinue\n\t\t}\n\t\tisGrantable := \"NO\"\n\t\tif hasGrantOpt {\n\t\t\tisGrantable = \"YES\"\n\t\t}\n\t\trows = append(rows, Row{\n\t\t\tgrantee, // grantee\n\t\t\t\"def\", // table_catalog\n\t\t\tprivSetDb.Name(), // table_schema\n\t\t\tprivType.String(), // privilege_type\n\t\t\tisGrantable, // is_grantable\n\t\t})\n\t}\n\treturn rows\n}", "title": "" }, { "docid": "57c0a3c20b50e6bc324398a05d4162de", "score": "0.7451749", "text": "func getTablePrivsRowsFromPrivTblSet(privSetTbl PrivilegeSetTable, grantee, dbName string) []Row {\n\tvar rows []Row\n\thasGrantOpt := privSetTbl.Has(PrivilegeType_GrantOption)\n\tfor _, privType := range privSetTbl.ToSlice() {\n\t\tif privType == PrivilegeType_GrantOption {\n\t\t\tcontinue\n\t\t}\n\t\tisGrantable := \"NO\"\n\t\tif hasGrantOpt {\n\t\t\tisGrantable = \"YES\"\n\t\t}\n\t\trows = append(rows, Row{\n\t\t\tgrantee, // grantee\n\t\t\t\"def\", // table_catalog\n\t\t\tdbName, // table_schema\n\t\t\tprivSetTbl.Name(), // table_name\n\t\t\tprivType.String(), // privilege_type\n\t\t\tisGrantable, // is_grantable\n\t\t})\n\t}\n\treturn rows\n}", "title": "" }, { "docid": "8662411ad50cf298b91fcc751f6f3d43", "score": "0.6340963", "text": "func GetUserServerPrivileges(ctx context.Context, db *sql.DB, user string, hostname string) (set.Set[string], error) {\n\thostname = HostnameOrDefault(hostname)\n\n\t// Note: This works because we only assign permissions at the DB level, not at the table, column, etc levels -- if we assigned\n\t// permissions at more levels we would need to do something else here such as join multiple tables or\n\t// parse SHOW GRANTS with a regex.\n\t// Remove \"USAGE\" as it's special and we never grant or remove it.\n\trows, err := db.QueryContext(\n\t\tctx,\n\t\t\"SELECT PRIVILEGE_TYPE FROM INFORMATION_SCHEMA.USER_PRIVILEGES WHERE GRANTEE = ? AND PRIVILEGE_TYPE != 'USAGE'\",\n\t\tformatUser(user, hostname))\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"listing grants for user %s\", user)\n\t}\n\tdefer rows.Close()\n\n\tresult := make(set.Set[string])\n\tfor rows.Next() {\n\t\tvar row string\n\t\terr := rows.Scan(&row)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"extracting privilege field\")\n\t\t}\n\n\t\tresult.Add(row)\n\t}\n\tif rows.Err() != nil {\n\t\treturn nil, errors.Wrapf(rows.Err(), \"iterating privileges\")\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "c2cf72ad6d0e47bd0c3c7976d0aef873", "score": "0.58314687", "text": "func tablePrivilegesRowIter(ctx *Context, c Catalog) (RowIter, error) {\n\tvar rows []Row\n\tprivSet, _ := ctx.GetPrivilegeSet()\n\tif privSet == nil {\n\t\tprivSet = mysql_db.NewPrivilegeSet()\n\t}\n\tif privSet.Has(PrivilegeType_Select) || privSet.Database(\"mysql\").Has(PrivilegeType_Select) {\n\t\tdb, err := c.Database(ctx, \"mysql\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tmysqlDb, ok := db.(*mysql_db.MySQLDb)\n\t\tif !ok {\n\t\t\treturn nil, ErrDatabaseNotFound.New(\"mysql\")\n\t\t}\n\n\t\ttblsPriv, _, err := mysqlDb.GetTableInsensitive(ctx, \"tables_priv\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tvar keys []mysql_db.UserPrimaryKey\n\t\terr = iterRows(ctx, tblsPriv, func(r Row) error {\n\t\t\tkeys = append(keys, mysql_db.UserPrimaryKey{\n\t\t\t\tHost: r[0].(string),\n\t\t\t\tUser: r[2].(string),\n\t\t\t})\n\t\t\treturn nil\n\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\trd := mysqlDb.Reader()\n\t\tdefer rd.Close()\n\n\t\tusers := make(map[*mysql_db.User]struct{})\n\t\tfor _, userKey := range keys {\n\t\t\tuser := mysqlDb.GetUser(rd, userKey.User, userKey.Host, false)\n\t\t\tif user == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tusers[user] = struct{}{}\n\t\t}\n\t\tfor user := range users {\n\t\t\tgrantee := user.UserHostToString(\"'\")\n\t\t\tfor _, privSetDb := range user.PrivilegeSet.GetDatabases() {\n\t\t\t\tdbName := privSetDb.Name()\n\t\t\t\tfor _, privSetTbl := range privSetDb.GetTables() {\n\t\t\t\t\trows = append(rows, getTablePrivsRowsFromPrivTblSet(privSetTbl, grantee, dbName)...)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t} else {\n\t\t// If current client does not have SELECT privilege on 'mysql' db, only available table privileges are\n\t\t// their current table privileges.\n\t\tcurrClient := ctx.Session.Client()\n\t\tgrantee := fmt.Sprintf(\"'%s'@'%s'\", currClient.User, currClient.Address)\n\t\tdbs := c.AllDatabases(ctx)\n\t\tfor _, db := range dbs {\n\t\t\tdbName := db.Name()\n\t\t\tprivSetDb := privSet.Database(dbName)\n\t\t\tfor _, privSetTbl := range privSetDb.GetTables() {\n\t\t\t\trows = append(rows, getTablePrivsRowsFromPrivTblSet(privSetTbl, grantee, dbName)...)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn RowsToRowIter(rows...), nil\n}", "title": "" }, { "docid": "9225c82bf44b63c0d9a1e694cc8b20b0", "score": "0.58190376", "text": "func userPrivilegesRowIter(ctx *Context, catalog Catalog) (RowIter, error) {\n\tvar rows []Row\n\tcurUserPrivSet, _ := ctx.GetPrivilegeSet()\n\tif curUserPrivSet == nil {\n\t\tcurUserPrivSet = mysql_db.NewPrivilegeSet()\n\t}\n\tif curUserPrivSet.Has(PrivilegeType_Select) || curUserPrivSet.Database(\"mysql\").Has(PrivilegeType_Select) {\n\t\tvar users = make(map[*mysql_db.User]struct{})\n\t\tdb, err := catalog.Database(ctx, \"mysql\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tmysqlDb, ok := db.(*mysql_db.MySQLDb)\n\t\tif !ok {\n\t\t\treturn nil, ErrDatabaseNotFound.New(\"mysql\")\n\t\t}\n\n\t\treader := mysqlDb.Reader()\n\t\tdefer reader.Close()\n\n\t\treader.VisitUsers(func(u *mysql_db.User) {\n\t\t\tusers[u] = struct{}{}\n\t\t})\n\n\t\tfor user := range users {\n\t\t\tgrantee := user.UserHostToString(\"'\")\n\t\t\trows = append(rows, getGlobalPrivsRowsFromPrivSet(user.PrivilegeSet, grantee)...)\n\t\t}\n\t} else {\n\t\t// If current client does not have SELECT privilege on 'mysql' db, only available schema privileges are\n\t\t// their current schema privileges.\n\t\tcurrClient := ctx.Session.Client()\n\t\tgrantee := fmt.Sprintf(\"'%s'@'%s'\", currClient.User, currClient.Address)\n\t\trows = getGlobalPrivsRowsFromPrivSet(curUserPrivSet, grantee)\n\t}\n\n\treturn RowsToRowIter(rows...), nil\n}", "title": "" }, { "docid": "3ba96fcddb7c00461502afb6f44da25a", "score": "0.567075", "text": "func GetUserDatabasePrivileges(ctx context.Context, db *sql.DB, user string, hostname string) (map[string]set.Set[string], error) {\n\thostname = HostnameOrDefault(hostname)\n\n\t// Note: This works because we only assign permissions at the DB level, not at the table, column, etc levels -- if we assigned\n\t// permissions at more levels we would need to do something else here such as join multiple tables or\n\t// parse SHOW GRANTS with a regex.\n\trows, err := db.QueryContext(\n\t\tctx,\n\t\t\"SELECT TABLE_SCHEMA, PRIVILEGE_TYPE FROM INFORMATION_SCHEMA.SCHEMA_PRIVILEGES WHERE GRANTEE = ?\",\n\t\tformatUser(user, hostname))\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"listing database grants for user %s\", user)\n\t}\n\tdefer rows.Close()\n\n\tresults := make(map[string]set.Set[string])\n\tfor rows.Next() {\n\t\tvar database, privilege string\n\t\terr := rows.Scan(&database, &privilege)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"extracting privilege row\")\n\t\t}\n\n\t\tvar privileges set.Set[string]\n\t\tif existingPrivileges, found := results[database]; found {\n\t\t\tprivileges = existingPrivileges\n\t\t} else {\n\t\t\tprivileges = make(set.Set[string])\n\t\t\tresults[database] = privileges\n\t\t}\n\t\tprivileges.Add(privilege)\n\t}\n\n\tif rows.Err() != nil {\n\t\treturn nil, errors.Wrapf(rows.Err(), \"iterating database privileges\")\n\t}\n\n\treturn results, nil\n}", "title": "" }, { "docid": "0bbea6c2c7db2e95566c6c27be9b3b05", "score": "0.5633475", "text": "func (p *UserPrivileges) UserPrivilegesTable() [][]types.Datum {\n\tmysqlPriv := p.Handle.Get()\n\treturn mysqlPriv.UserPrivilegesTable()\n}", "title": "" }, { "docid": "0154d6c93d0f10d05564d0c5204c56b9", "score": "0.5520234", "text": "func (a *Atheme) GetPrivset() (privs []string) {\n\tif a.Privset == nil {\n\t\tvar res string\n\n\t\ta.serverProxy.Call(\"atheme.privset\", []string{a.Authcookie, a.Account}, &res)\n\n\t\ta.Privset = strings.Split(res, \" \")\n\t}\n\n\treturn a.Privset\n}", "title": "" }, { "docid": "6a23c220c4e1bc30d22916c82121c632", "score": "0.54416704", "text": "func (n *Revoke) HandleGlobalPrivileges(user *mysql_db.User) error {\n\tfor i, priv := range n.Privileges {\n\t\tif len(priv.Columns) > 0 {\n\t\t\treturn sql.ErrGrantRevokeIllegalPrivilege.New()\n\t\t}\n\t\tswitch priv.Type {\n\t\tcase PrivilegeType_All:\n\t\t\t// If ALL is present, then no other privileges may be provided.\n\t\t\t// This should be enforced by the parser, so this is a backup check just in case\n\t\t\tif i == 0 && len(n.Privileges) == 1 {\n\t\t\t\tuser.PrivilegeSet.ClearGlobal()\n\t\t\t} else {\n\t\t\t\treturn sql.ErrGrantRevokeIllegalPrivilege.New()\n\t\t\t}\n\t\tcase PrivilegeType_Alter:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Alter)\n\t\tcase PrivilegeType_AlterRoutine:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_AlterRoutine)\n\t\tcase PrivilegeType_Create:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Create)\n\t\tcase PrivilegeType_CreateRole:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_CreateRole)\n\t\tcase PrivilegeType_CreateRoutine:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_CreateRoutine)\n\t\tcase PrivilegeType_CreateTablespace:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_CreateTablespace)\n\t\tcase PrivilegeType_CreateTemporaryTables:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_CreateTempTable)\n\t\tcase PrivilegeType_CreateUser:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_CreateUser)\n\t\tcase PrivilegeType_CreateView:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_CreateView)\n\t\tcase PrivilegeType_Delete:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Delete)\n\t\tcase PrivilegeType_Drop:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Drop)\n\t\tcase PrivilegeType_DropRole:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_DropRole)\n\t\tcase PrivilegeType_Event:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Event)\n\t\tcase PrivilegeType_Execute:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Execute)\n\t\tcase PrivilegeType_File:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_File)\n\t\tcase PrivilegeType_GrantOption:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_GrantOption)\n\t\tcase PrivilegeType_Index:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Index)\n\t\tcase PrivilegeType_Insert:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Insert)\n\t\tcase PrivilegeType_LockTables:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_LockTables)\n\t\tcase PrivilegeType_Process:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Process)\n\t\tcase PrivilegeType_References:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_References)\n\t\tcase PrivilegeType_Reload:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Reload)\n\t\tcase PrivilegeType_ReplicationClient:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_ReplicationClient)\n\t\tcase PrivilegeType_ReplicationSlave:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_ReplicationSlave)\n\t\tcase PrivilegeType_Select:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Select)\n\t\tcase PrivilegeType_ShowDatabases:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_ShowDB)\n\t\tcase PrivilegeType_ShowView:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_ShowView)\n\t\tcase PrivilegeType_Shutdown:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Shutdown)\n\t\tcase PrivilegeType_Super:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Super)\n\t\tcase PrivilegeType_Trigger:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Trigger)\n\t\tcase PrivilegeType_Update:\n\t\t\tuser.PrivilegeSet.RemoveGlobalStatic(sql.PrivilegeType_Update)\n\t\tcase PrivilegeType_Usage:\n\t\t\t// Usage is equal to no privilege\n\t\tcase PrivilegeType_Dynamic:\n\t\t\tif !priv.IsValidDynamic() {\n\t\t\t\treturn fmt.Errorf(`REVOKE does not yet support the dynamic privilege: \"%s\"`, priv.Dynamic)\n\t\t\t}\n\t\t\tuser.PrivilegeSet.RemoveGlobalDynamic(priv.Dynamic)\n\t\tdefault:\n\t\t\treturn sql.ErrGrantRevokeIllegalPrivilege.New()\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c607687ccda50eb4edf3ca1dbbc90b9c", "score": "0.5424226", "text": "func (o ClickhouseGrantOutput) PrivilegeGrants() ClickhouseGrantPrivilegeGrantArrayOutput {\n\treturn o.ApplyT(func(v *ClickhouseGrant) ClickhouseGrantPrivilegeGrantArrayOutput { return v.PrivilegeGrants }).(ClickhouseGrantPrivilegeGrantArrayOutput)\n}", "title": "" }, { "docid": "8fb0f41b633b40b82bd65111c5483321", "score": "0.5405505", "text": "func (p *ThriftHiveMetastoreClient) GetPrivilegeSet(hiveObject *HiveObjectRef, user_name string, group_names []string) (r *PrincipalPrivilegeSet, err error) {\n\tif err = p.sendGetPrivilegeSet(hiveObject, user_name, group_names); err != nil {\n\t\treturn\n\t}\n\treturn p.recvGetPrivilegeSet()\n}", "title": "" }, { "docid": "c4489832ff8938bf87757c4efdb0d8de", "score": "0.5383157", "text": "func schemaPrivilegesRowIter(ctx *Context, c Catalog) (RowIter, error) {\n\tvar rows []Row\n\tprivSet, _ := ctx.GetPrivilegeSet()\n\tif privSet == nil {\n\t\tprivSet = mysql_db.NewPrivilegeSet()\n\t}\n\tif privSet.Has(PrivilegeType_Select) || privSet.Database(\"mysql\").Has(PrivilegeType_Select) {\n\t\tdb, err := c.Database(ctx, \"mysql\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tmysqlDb, ok := db.(*mysql_db.MySQLDb)\n\t\tif !ok {\n\t\t\treturn nil, ErrDatabaseNotFound.New(\"mysql\")\n\t\t}\n\n\t\tdbTbl, _, err := mysqlDb.GetTableInsensitive(ctx, \"db\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tvar keys []mysql_db.UserPrimaryKey\n\t\terr = iterRows(ctx, dbTbl, func(r Row) error {\n\t\t\t// mysql.db table will have 'Host', 'Db', 'User' as first 3 columns in string format.\n\t\t\tkeys = append(keys, mysql_db.UserPrimaryKey{\n\t\t\t\tHost: r[0].(string),\n\t\t\t\tUser: r[2].(string),\n\t\t\t})\n\t\t\treturn nil\n\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\trd := mysqlDb.Reader()\n\t\tdefer rd.Close()\n\n\t\tusers := make(map[*mysql_db.User]struct{})\n\t\tfor _, userKey := range keys {\n\t\t\tuser := mysqlDb.GetUser(rd, userKey.User, userKey.Host, false)\n\t\t\tif user == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tusers[user] = struct{}{}\n\t\t}\n\t\tfor user := range users {\n\t\t\tgrantee := user.UserHostToString(\"'\")\n\t\t\tfor _, privSetDb := range user.PrivilegeSet.GetDatabases() {\n\t\t\t\trows = append(rows, getSchemaPrivsRowsFromPrivDbSet(privSetDb, grantee)...)\n\t\t\t}\n\t\t}\n\t} else {\n\t\t// If current client does not have SELECT privilege on 'mysql' db, only available schema privileges are\n\t\t// their current schema privileges.\n\t\tcurrClient := ctx.Session.Client()\n\t\tgrantee := fmt.Sprintf(\"'%s'@'%s'\", currClient.User, currClient.Address)\n\t\tdbs := c.AllDatabases(ctx)\n\t\tfor _, db := range dbs {\n\t\t\tdbName := db.Name()\n\t\t\tprivSetDb := privSet.Database(dbName)\n\t\t\trows = append(rows, getSchemaPrivsRowsFromPrivDbSet(privSetDb, grantee)...)\n\t\t}\n\t}\n\n\treturn RowsToRowIter(rows...), nil\n}", "title": "" }, { "docid": "402374c1169661ba92c0164403d01e10", "score": "0.5323509", "text": "func Privs(name string) (map[string]bool, error) {\n\tdb, err := initAuthDB()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer db.Close()\n\n\teprivs, err := readPrivItem(db, name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn decodePrivs(eprivs), nil\n}", "title": "" }, { "docid": "f537789fd8a4f964905647e487fe22b6", "score": "0.5322314", "text": "func (this *Merge) Privileges() (datastore.Privileges, errors.Error) {\n\tprivs := datastore.NewPrivileges()\n\tprivs[this.keyspace.Namespace()+\":\"+this.keyspace.Keyspace()] = datastore.PRIV_WRITE\n\n\tsp, err := this.source.Privileges()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tprivs.Add(sp)\n\n\tsubprivs, err := subqueryPrivileges(this.Expressions())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tprivs.Add(subprivs)\n\treturn privs, nil\n}", "title": "" }, { "docid": "a0a980c7b6365b8b3bd87edd0030fc20", "score": "0.52349436", "text": "func (this *Select) Privileges() (datastore.Privileges, errors.Error) {\n\tprivs, err := this.subresult.Privileges()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\texprs := make(expression.Expressions, 0, 16)\n\n\tif this.order != nil {\n\t\texprs = append(exprs, this.order.Expressions()...)\n\t}\n\n\tif this.limit != nil {\n\t\texprs = append(exprs, this.limit)\n\t}\n\n\tif this.offset != nil {\n\t\texprs = append(exprs, this.offset)\n\t}\n\n\tsubprivs, err := subqueryPrivileges(exprs)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tprivs.Add(subprivs)\n\treturn privs, nil\n}", "title": "" }, { "docid": "3c57f552f3480a1ecd65ec512494cc0b", "score": "0.519757", "text": "func (st *StateTracker) GetPrivs(c, n string) (privs *ChannelPrivileges, ok bool) {\n\tvar channel *Channel\n\tif channel, ok = st.channels[c]; ok {\n\t\tprivs, ok = channel.Nicks[n]\n\t}\n\treturn\n}", "title": "" }, { "docid": "aa213c2198cd049373ba6f9f16d3aacb", "score": "0.519143", "text": "func (this *Subselect) Privileges() (datastore.Privileges, errors.Error) {\n\tprivs := datastore.NewPrivileges()\n\n\tif this.from != nil {\n\t\tfprivs, err := this.from.Privileges()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tprivs.Add(fprivs)\n\t}\n\n\texprs := make(expression.Expressions, 0, 16)\n\n\tif this.let != nil {\n\t\texprs = append(exprs, this.let.Expressions()...)\n\t}\n\n\tif this.where != nil {\n\t\texprs = append(exprs, this.where)\n\t}\n\n\tif this.group != nil {\n\t\texprs = append(exprs, this.group.Expressions()...)\n\t}\n\n\texprs = append(exprs, this.projection.Expressions()...)\n\n\tsubprivs, err := subqueryPrivileges(exprs)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tprivs.Add(subprivs)\n\treturn privs, nil\n}", "title": "" }, { "docid": "9690b9359ad09daeacaa5630c686a853", "score": "0.49200496", "text": "func (c *Conn) Privs() (map[string]bool, error) {\n\treturn Privs(c.Username())\n}", "title": "" }, { "docid": "cb9068824a1ce3c2da004701adc34f67", "score": "0.48545069", "text": "func (ps PrivilegeSet) MarshalJSON() ([]byte, error) {\n\tglobalStaticPrivs := ps.ToSlice()\n\tpsm := privilegeSetMarshaler{\n\t\tGlobalStatic: make([]string, len(globalStaticPrivs)),\n\t\tDatabases: make([]privilegeSetMarshalerDatabase, len(ps.databases)),\n\t}\n\tfor i, globalStaticPriv := range globalStaticPrivs {\n\t\tpsm.GlobalStatic[i] = globalStaticPriv.String()\n\t}\n\tfor dbIndex, database := range ps.GetDatabases() {\n\t\tdbPrivs := database.ToSlice()\n\t\tdbm := privilegeSetMarshalerDatabase{\n\t\t\tName: database.Name(),\n\t\t\tPrivileges: make([]string, len(dbPrivs)),\n\t\t\tTables: make([]privilegeSetMarshalerTable, len(database.(PrivilegeSetDatabase).tables)),\n\t\t}\n\t\tfor i, dbPriv := range dbPrivs {\n\t\t\tdbm.Privileges[i] = dbPriv.String()\n\t\t}\n\t\tpsm.Databases[dbIndex] = dbm\n\n\t\tfor tblIndex, table := range database.GetTables() {\n\t\t\ttblPrivs := table.ToSlice()\n\t\t\ttbm := privilegeSetMarshalerTable{\n\t\t\t\tName: table.Name(),\n\t\t\t\tPrivileges: make([]string, len(table.(PrivilegeSetTable).privs)),\n\t\t\t\tColumns: make([]privilegeSetMarshalerColumn, len(table.(PrivilegeSetTable).columns)),\n\t\t\t}\n\t\t\tfor i, tblPriv := range tblPrivs {\n\t\t\t\ttbm.Privileges[i] = tblPriv.String()\n\t\t\t}\n\t\t\tdbm.Tables[tblIndex] = tbm\n\n\t\t\tfor colIndex, column := range table.GetColumns() {\n\t\t\t\tcolPrivs := column.ToSlice()\n\t\t\t\tcbm := privilegeSetMarshalerColumn{\n\t\t\t\t\tName: column.Name(),\n\t\t\t\t\tPrivileges: make([]string, len(column.(PrivilegeSetColumn).privs)),\n\t\t\t\t}\n\t\t\t\tfor i, colPriv := range colPrivs {\n\t\t\t\t\tcbm.Privileges[i] = colPriv.String()\n\t\t\t\t}\n\t\t\t\ttbm.Columns[colIndex] = cbm\n\t\t\t}\n\t\t}\n\t}\n\n\treturn json.Marshal(psm)\n}", "title": "" }, { "docid": "e90e0e3aa7741e0ae1b6e197b3310400", "score": "0.48373908", "text": "func (n *Revoke) HandleTablePrivileges(user *mysql_db.User, dbName string, tblName string) error {\n\tfor i, priv := range n.Privileges {\n\t\tif len(priv.Columns) > 0 {\n\t\t\treturn fmt.Errorf(\"GRANT has not yet implemented column privileges\")\n\t\t}\n\t\tswitch priv.Type {\n\t\tcase PrivilegeType_All:\n\t\t\t// If ALL is present, then no other privileges may be provided.\n\t\t\t// This should be enforced by the parser, so this is a backup check just in case\n\t\t\tif i == 0 && len(n.Privileges) == 1 {\n\t\t\t\tuser.PrivilegeSet.ClearTable(dbName, tblName)\n\t\t\t} else {\n\t\t\t\treturn sql.ErrGrantRevokeIllegalPrivilege.New()\n\t\t\t}\n\t\tcase PrivilegeType_Alter:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_Alter)\n\t\tcase PrivilegeType_Create:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_Create)\n\t\tcase PrivilegeType_CreateView:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_CreateView)\n\t\tcase PrivilegeType_Delete:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_Delete)\n\t\tcase PrivilegeType_Drop:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_Drop)\n\t\tcase PrivilegeType_GrantOption:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_GrantOption)\n\t\tcase PrivilegeType_Index:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_Index)\n\t\tcase PrivilegeType_Insert:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_Insert)\n\t\tcase PrivilegeType_References:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_References)\n\t\tcase PrivilegeType_Select:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_Select)\n\t\tcase PrivilegeType_ShowView:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_ShowView)\n\t\tcase PrivilegeType_Trigger:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_Trigger)\n\t\tcase PrivilegeType_Update:\n\t\t\tuser.PrivilegeSet.RemoveTable(dbName, tblName, sql.PrivilegeType_Update)\n\t\tcase PrivilegeType_Usage:\n\t\t\t// Usage is equal to no privilege\n\t\tcase PrivilegeType_Dynamic:\n\t\t\treturn sql.ErrGrantRevokeIllegalPrivilegeWithMessage.New(\n\t\t\t\t\"dynamic privileges may only operate at a global scope\")\n\t\tdefault:\n\t\t\treturn sql.ErrGrantRevokeIllegalPrivilege.New()\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d2b6cbacdb068546612809b7f66485ad", "score": "0.4824721", "text": "func (this *MergeSource) Privileges() (datastore.Privileges, errors.Error) {\n\tif this.from != nil {\n\t\treturn this.from.Privileges()\n\t}\n\n\treturn this.query.Privileges()\n}", "title": "" }, { "docid": "2b468be3885a57acb2588fb51987ba3e", "score": "0.47398442", "text": "func GetGrantPermissionSet(perm string) *provider.ResourcePermissions {\n\tvar rp provider.ResourcePermissions // default to 0 == all denied\n\n\tif strings.Contains(perm, \"r\") && !strings.Contains(perm, \"!r\") {\n\t\trp.GetPath = true\n\t\trp.Stat = true\n\t\trp.InitiateFileDownload = true\n\t}\n\n\tif strings.Contains(perm, \"w\") && !strings.Contains(perm, \"!w\") {\n\t\trp.Move = true\n\t\trp.Delete = true\n\t\trp.PurgeRecycle = true\n\t\trp.InitiateFileUpload = true\n\t\trp.RestoreFileVersion = true\n\t\trp.RestoreRecycleItem = true\n\t\trp.CreateContainer = true\n\t}\n\n\tif strings.Contains(perm, \"x\") && !strings.Contains(perm, \"!x\") {\n\t\trp.ListFileVersions = true\n\t\trp.ListRecycle = true\n\t\trp.ListContainer = true\n\t}\n\n\tif strings.Contains(perm, \"!d\") {\n\t\trp.Delete = false\n\t\trp.PurgeRecycle = false\n\t}\n\n\tif strings.Contains(perm, \"m\") && !strings.Contains(perm, \"!m\") {\n\t\trp.AddGrant = true\n\t\trp.ListGrants = true\n\t\trp.RemoveGrant = true\n\t}\n\n\tif strings.Contains(perm, \"q\") && !strings.Contains(perm, \"!q\") {\n\t\trp.GetQuota = true\n\t}\n\n\treturn &rp\n}", "title": "" }, { "docid": "f565330df180ae7323aae88a1aa940c1", "score": "0.4738364", "text": "func (p *Permission) GetPerm(s string) []Owner {\n\tdef := make([]Owner, len(p.Perm[s]))\n\tcopy(def, p.Perm[s])\n\treturn def\n}", "title": "" }, { "docid": "61c86eb15b94f0f9f231dbbc118b9add", "score": "0.47257182", "text": "func (m *Group) GetPermissionGrants()([]ResourceSpecificPermissionGrantable) {\n val, err := m.GetBackingStore().Get(\"permissionGrants\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]ResourceSpecificPermissionGrantable)\n }\n return nil\n}", "title": "" }, { "docid": "419ddd42fd4be8432a6d9cf24f21cc6c", "score": "0.47206926", "text": "func (db *Connector) HasAllPrivilege() bool {\n\tuser, host, err := db.CurrentUser()\n\tif err != nil {\n\t\tcommon.Log.Error(\"User: %s, HasAllPrivilege: %s\", db.User, err.Error())\n\t\treturn false\n\t}\n\n\t// concat privilege columns\n\tres, err := db.Query(\"SELECT GROUP_CONCAT(COLUMN_NAME) from information_schema.COLUMNS where TABLE_SCHEMA='mysql' and TABLE_NAME='user' and COLUMN_NAME like '%%_priv'\")\n\tif err != nil {\n\t\tcommon.Log.Error(\"HasAllPrivilege, DSN: %s, Error: %s\", db.Addr, err.Error())\n\t\treturn false\n\t}\n\tvar priv string\n\tif len(res.Rows) > 0 {\n\t\tpriv = res.Rows[0].Str(0)\n\t} else {\n\t\tcommon.Log.Error(\"HasAllPrivilege, DSN: %s, get privilege string error\", db.Addr)\n\t\treturn false\n\t}\n\n\t// get all privilege status\n\tres, err = db.Query(\"select concat(\"+priv+\") from mysql.user where user='%s' and host='%s'\", user, host)\n\tif err != nil {\n\t\tcommon.Log.Error(\"HasAllPrivilege, DSN: %s, Error: %s\", db.Addr, err.Error())\n\t\treturn false\n\t}\n\n\t// %_priv\n\tif len(res.Rows) > 0 {\n\t\tif strings.Replace(res.Rows[0].Str(0), \"Y\", \"\", -1) == \"\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "2639c347f319e30c6916a7b55ed416ff", "score": "0.46725515", "text": "func privileged(jita jita.Client, gateway *pb.Gateway, sessions []*pb.Session) []*pb.Session {\n\tif !gateway.RequiresPrivilegedAccess {\n\t\treturn sessions\n\t}\n\tprivilegedUsers := jita.GetPrivilegedUsersForGateway(gateway.Name)\n\n\tm, err := apiserver_metrics.PrivilegedUsersPerGateway.GetMetricWithLabelValues(gateway.Name)\n\tif err != nil {\n\t\tlog.Errorf(\"getting metric metric: %v\", err)\n\t}\n\tm.Set(float64(len(privilegedUsers)))\n\n\tvar sessionsToReturn []*pb.Session\n\tfor _, session := range sessions {\n\t\tif userIsPrivileged(privilegedUsers, session.ObjectID) {\n\t\t\tsessionsToReturn = append(sessionsToReturn, session)\n\t\t} else {\n\t\t\tlog.Tracef(\"Skipping unauthorized session: %s\", session.Device.Serial)\n\t\t}\n\t}\n\n\treturn sessionsToReturn\n}", "title": "" }, { "docid": "81b87327384b01d8694d594c52419a52", "score": "0.4651776", "text": "func (p *Privilege) GetUserPrivilegeConfig() (map[string][]string, []string) {\n\tresult, err := p.Engine.CoreAPI.ApiServer().GetUserPrivilegeConfig(context.Background(), p.header, p.OwnerID, p.UserName)\n\n\tif nil != err || false == result.Result {\n\t\tblog.Warnf(\"get user privilege json error: %v\", err)\n\t\treturn nil, nil\n\t}\n\tsysConfig := make([]string, 0)\n\tmodelConfig := make(map[string][]string, 0)\n\tfor _, i := range result.Data.SysConfig.BackConfig {\n\t\tsysConfig = append(sysConfig, i)\n\t}\n\n\tfor _, i := range result.Data.SysConfig.Globalbusi {\n\t\tsysConfig = append(sysConfig, i)\n\t}\n\tfor _, j := range result.Data.ModelConfig {\n\t\tfor m, n := range j {\n\t\t\tmodelConfig[m] = n\n\t\t}\n\t}\n\treturn modelConfig, sysConfig\n}", "title": "" }, { "docid": "8a4c12034f6a14b38f44daca76293c8e", "score": "0.46171945", "text": "func getAllAdminRights(client *restapi.RestClient) (map[string]interface{}, error) {\n\tvar queryArg = make(map[string]interface{})\n\tqueryArg[\"Script\"] = \"@/lib/get_superrights.js(excludeRight:'')\"\n\tqueryArg[\"Args\"] = subArgs\n\n\trights := make(map[string]interface{})\n\treply, err := client.CallGenericMapAPI(\"/Redrock/Query\", queryArg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif reply.Success {\n\t\tresults := reply.Result[\"Results\"].([]interface{})\n\t\tfor _, v := range results {\n\t\t\tresultItem := v.(map[string]interface{})\n\t\t\trow := resultItem[\"Row\"].(map[string]interface{})\n\t\t\trights[row[\"Description\"].(string)] = row[\"Path\"]\n\t\t}\n\t} else {\n\t\treturn nil, errors.New(reply.Message)\n\t}\n\tLogD.Printf(\"List of all admin rights: %v\", rights)\n\n\treturn rights, err\n}", "title": "" }, { "docid": "69ef51291cb054619603626fd2be1d34", "score": "0.46116638", "text": "func (this *KeyspaceTerm) Privileges() (*auth.Privileges, errors.Error) {\n\tprivs, err := privilegesFromKeyspace(this.namespace, this.keyspace)\n\tif err != nil {\n\t\treturn privs, err\n\t}\n\tif this.keys != nil {\n\t\tprivs.AddAll(this.keys.Privileges())\n\t}\n\treturn privs, nil\n}", "title": "" }, { "docid": "6702d0929dc2e41e0c52e18d8e2ceccf", "score": "0.46038106", "text": "func (ps *PrivilegeSet) UnmarshalJSON(jsonData []byte) error {\n\tps.globalStatic = make(map[sql.PrivilegeType]struct{})\n\tps.globalDynamic = make(map[string]bool)\n\tps.databases = make(map[string]PrivilegeSetDatabase)\n\tpsm := privilegeSetMarshaler{}\n\terr := json.Unmarshal(jsonData, &psm)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor _, privStr := range psm.GlobalStatic {\n\t\tpriv, ok := sql.PrivilegeTypeFromString(privStr)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(`unknown privilege type: \"%s\"`, priv)\n\t\t}\n\t\tps.AddGlobalStatic(priv)\n\t}\n\tfor _, database := range psm.Databases {\n\t\tfor _, privStr := range database.Privileges {\n\t\t\tpriv, ok := sql.PrivilegeTypeFromString(privStr)\n\t\t\tif !ok {\n\t\t\t\treturn fmt.Errorf(`unknown privilege type: \"%s\"`, priv)\n\t\t\t}\n\t\t\tps.AddDatabase(database.Name, priv)\n\t\t}\n\n\t\tfor _, table := range database.Tables {\n\t\t\tfor _, privStr := range table.Privileges {\n\t\t\t\tpriv, ok := sql.PrivilegeTypeFromString(privStr)\n\t\t\t\tif !ok {\n\t\t\t\t\treturn fmt.Errorf(`unknown privilege type: \"%s\"`, priv)\n\t\t\t\t}\n\t\t\t\tps.AddTable(database.Name, table.Name, priv)\n\t\t\t}\n\n\t\t\tfor _, column := range table.Columns {\n\t\t\t\tfor _, privStr := range column.Privileges {\n\t\t\t\t\tpriv, ok := sql.PrivilegeTypeFromString(privStr)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\treturn fmt.Errorf(`unknown privilege type: \"%s\"`, priv)\n\t\t\t\t\t}\n\t\t\t\t\tps.AddColumn(database.Name, table.Name, column.Name, priv)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "22ed97fba0da5d0559d294080981d1ca", "score": "0.46028075", "text": "func (p *Privilege) GetUserPrivilegeApp(appRole []string) map[int64][]string {\n\torCond := make([]mapstr.MapStr, 0)\n\tallCond := mapstr.MapStr{}\n\tcondition := mapstr.MapStr{}\n\tfor _, role := range appRole {\n\t\tcell := mapstr.MapStr{}\n\t\td := mapstr.MapStr{}\n\t\tcell[common.BKDBLIKE] = p.UserName\n\t\td[role] = cell\n\t\torCond = append(orCond, d)\n\t}\n\tallCond[common.BKDBOR] = orCond\n\tcondition[\"condition\"] = allCond\n\tcondition[\"native\"] = 1\n\tuserRole := make(map[int64][]string)\n\n\tresult, err := p.Engine.CoreAPI.ApiServer().GetUserPrivilegeApp(context.Background(), p.header, p.OwnerID, p.UserName, condition)\n\tif nil != err || !result.Result {\n\t\tblog.Errorf(\"get role privilege app error: %v\", err)\n\t\treturn userRole\n\t}\n\n\tfor _, i := range result.Data.Info {\n\t\tappID, err := util.GetInt64ByInterface(i[common.BKAppIDField])\n\t\tif nil != err {\n\t\t\tcontinue\n\t\t}\n\t\tuserRoleArr := make([]string, 0)\n\t\tfor _, j := range appRole {\n\t\t\troleData, ok := i[j]\n\t\t\tif false == ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\troleStr, ok := roleData.(string)\n\t\t\tif false == ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\troleArr := strings.Split(roleStr, \",\")\n\t\t\tfor _, k := range roleArr {\n\t\t\t\tif k == p.UserName {\n\t\t\t\t\tuserRoleArr = append(userRoleArr, j)\n\t\t\t\t}\n\t\t\t}\n\t\t\tuserRole[appID] = userRoleArr\n\t\t}\n\t}\n\treturn userRole\n}", "title": "" }, { "docid": "cfc7e00350be1b9a8e18b3ca0e58664e", "score": "0.46002373", "text": "func (this *RevokeRole) Privileges() (*auth.Privileges, errors.Error) {\n\tprivs := auth.NewPrivileges()\n\t// Currently our privileges always attach to buckets. In this case,\n\t// the data being updated isn't a bucket, it's system security data,\n\t// so the code is leaving the bucket name blank.\n\t// This works because no bucket name is needed for this type of authorization.\n\t// If we absolutely had to provide a table name, it would make sense to use system:user_info,\n\t// because that's the virtual table where the data can be accessed.\n\tprivs.Add(\"\", auth.PRIV_SECURITY_WRITE, auth.PRIV_PROPS_NONE)\n\treturn privs, nil\n}", "title": "" }, { "docid": "ffd415960b0fd17b20cfc9e037d6e9c4", "score": "0.45957896", "text": "func dataSourceGoogleIamPolicyMembers(d *schema.Set) []string {\n\tvar members []string\n\tmembers = make([]string, d.Len())\n\n\tfor i, v := range d.List() {\n\t\tmembers[i] = v.(string)\n\t}\n\treturn members\n}", "title": "" }, { "docid": "09da06ce322afe746b0e702e3eece5e7", "score": "0.45527586", "text": "func (sqls *SQLStore) GetAdminGroups(userid int) ([]*Group, error) {\n\tgps := make([]*Group, 0)\n\n\tinsq := \"select g.group_id, g.user_id, u.first_name, u.last_name, u.photo_url, g.category_id, c.category_name, g.group_name, g.group_description, g.created_at from `group` g join category c on g.category_id = c.category_id join user u on g.user_id = u.user_id where g.user_id = ?\"\n\n\tres, errQuery := sqls.DB.Query(insq, userid)\n\tif errQuery != nil {\n\t\treturn nil, errQuery\n\t}\n\tdefer res.Close()\n\n\tfor res.Next() {\n\t\tgp := &Group{}\n\t\tuser := &User{}\n\t\tc := &Category{}\n\t\terrScan := res.Scan(&gp.GroupID, &user.UserID, &user.FirstName, &user.LastName, &user.PhotoURL, &c.CategoryID, &c.CategoryName, &gp.GroupName, &gp.GroupDescription, &gp.CreatedAt)\n\t\tif errScan != nil {\n\t\t\treturn nil, errScan\n\t\t}\n\t\tgp.User = user\n\t\tgps = append(gps, gp)\n\t}\n\n\treturn gps, nil\n}", "title": "" }, { "docid": "5b41c5df5ec8d8570d5d2dd5077bf4a0", "score": "0.45393637", "text": "func (in *PostgresDatabaseSpecTablesSecurityPrivileges) DeepCopy() *PostgresDatabaseSpecTablesSecurityPrivileges {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(PostgresDatabaseSpecTablesSecurityPrivileges)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "74511cbb43b67ee18ff1ca77bca78676", "score": "0.45392343", "text": "func (rm *Enforcer) GetUserRestrictions(user string) []*Restriction {\n\tvar data []*Restriction\n\tres := rm.enforcer.GetFilteredNamedGroupingPolicy(\"g2\", 0, user)\n\tfor _, n := range res {\n\t\tdata = append(data, rm.createUserRestriction(n[1]))\n\t}\n\n\treturn data\n}", "title": "" }, { "docid": "f814dac94b139bf259a85fcb43a28631", "score": "0.45387623", "text": "func (resolver *ACLResolver) GetUserPrivileges(user *User, obj Base) (*Privilege, error) {\n\troleMap, err := resolver.GetUserRoleMap(user)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// figure out which role's privileges apply\n\tfor _, role := range ACLRolesOrderedList {\n\t\tnamespaceSpan := roleMap[role.ID]\n\t\tif namespaceSpan[namespaceAll] || namespaceSpan[obj.GetNamespace()] {\n\t\t\treturn role.Privileges.getObjectPrivileges(obj), nil\n\t\t}\n\t}\n\n\treturn nobody.Privileges.getObjectPrivileges(obj), nil\n}", "title": "" }, { "docid": "eb3ea979297505c0e4be0e302161c5d8", "score": "0.4529128", "text": "func getUserAccessLevel(server []UA_Server, session []UA_Session, node []UA_VariableNode) UA_Byte {\n\tif session == (*[100000000]UA_Session)(unsafe.Pointer(&adminSession))[:] {\n\t\t// the local admin user has all rights\n\t\treturn UA_Byte(255)\n\t}\n\treturn UA_Byte(int(uint8((__uint8_t((uint8_t((UA_Byte(node[0].accessLevel)))))))) & int(uint8((__uint8_t((uint8_t((server.config.accessControl.getUserAccessLevel(server, (*[100000000]UA_AccessControl)(unsafe.Pointer(&server[0].config.accessControl))[:], (*[100000000]UA_NodeId)(unsafe.Pointer(&session[0].sessionId))[:], session[0].sessionHandle, (*[100000000]UA_NodeId)(unsafe.Pointer(&node[0].nodeId))[:], node[0].context)))))))))\n}", "title": "" }, { "docid": "b0c8d7bc0b70b1130bf5ab18a519392d", "score": "0.45020664", "text": "func (m *ServicePrincipal) GetOauth2PermissionGrants()([]OAuth2PermissionGrantable) {\n val, err := m.GetBackingStore().Get(\"oauth2PermissionGrants\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]OAuth2PermissionGrantable)\n }\n return nil\n}", "title": "" }, { "docid": "c9072a583c39e1991e29edf2a7b44466", "score": "0.44961578", "text": "func (p *UserPrivileges) ShowGrants(ctx context.Context, user string) ([]string, error) {\n\tstrs := strings.Split(user, \"@\")\n\tif len(strs) != 2 {\n\t\treturn nil, errors.Errorf(\"Invalid format for user: %s\", user)\n\t}\n\tuser, host := strs[0], strs[1]\n\tmysqlPrivilege := p.Handle.Get()\n\treturn mysqlPrivilege.showGrants(user, host), nil\n}", "title": "" }, { "docid": "66d40682423ae5903b09aeebf057bb63", "score": "0.4491767", "text": "func (gs *groupauthSqac) GetGroupAuths() []GroupAuth {\n\n\tgroupauth := GroupAuth{}\n\tgroupauths := []GroupAuth{}\n\n\tqs := fmt.Sprintf(`SELECT groupauth.id, groupauth.group_id, usrgroup.group_name, groupauth.auth_id, auth.auth_name, auth.auth_type, auth.description\n \t\tFROM groupauth INNER JOIN auth ON (groupauth.auth_id = auth.id) \n \t\t INNER JOIN usrgroup ON (usrgroup.id = groupauth.group_id);`)\n\n\t// read the table row - can only be one due to db key contraint\n\trows, err := gs.handle.ExecuteQueryx(qs)\n\tif err != nil {\n\t\tlw.ErrorWithPrefixString(\"Get for table groupauth returned error: \", err)\n\t\treturn nil\n\t}\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\terr = rows.StructScan(&groupauth)\n\t\tif err != nil {\n\t\t\tlw.ErrorWithPrefixString(\"error reading GroupAuth rows via StructScan: \", err)\n\t\t\treturn nil\n\t\t}\n\t\tgroupauths = append(groupauths, groupauth)\n\t}\n\n\tif gs.handle.IsLog() {\n\t\tlw.Debug(\"Get for table groupauth got: %v\", groupauths)\n\t}\n\treturn groupauths\n}", "title": "" }, { "docid": "be34fc11226da30e1d62d87e7014e9b5", "score": "0.44781968", "text": "func GetPermUserByEmail(c echo.Context) (err error) {\n\t//\tdb := dbs.GetDB()\n\tfmt.Println(\"email:\", c.QueryParam(\"email\"))\n\tresult, err := models.GetPerm(dbs.DB, c.QueryParam(\"email\"))\n\ttools.PanicIf(err)\n\tpmusrs := make([]models.Permit, 0.0)\n\tpmusr := models.Permit{}\n\tfor result.Next() {\n\t\tresult.Scan(&pmusr.Organizationid, &pmusr.Email)\n\t\tfmt.Println(pmusr.Organizationid, pmusr.Email)\n\t\tpmusrs = append(pmusrs, pmusr)\n\t}\n\t//\tdbs.CloseDB(db)\n\treturn c.JSON(http.StatusOK, pmusrs)\n}", "title": "" }, { "docid": "c03746c9bb8461ad6f9e794c45db2047", "score": "0.4472394", "text": "func (this *Unnest) Privileges() (*auth.Privileges, errors.Error) {\n\tlPrivs, err := this.left.Privileges()\n\tif err != nil {\n\t\treturn lPrivs, err\n\t}\n\tlPrivs.AddAll(this.expr.Privileges())\n\treturn lPrivs, nil\n}", "title": "" }, { "docid": "5b9d72b7e88ff45f6494596aeb151346", "score": "0.44631675", "text": "func SelectSet(pop [][]interface{}, k int) [][]interface{} {\n\ts := make([][]interface{}, k, k) // Selection\n\tp := rand.Perm(len(pop))[:k] // k numbers picked from [0,len(pop))\n\n\tfor i := range s {\n\t\ts[i] = pop[p[i]]\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "0d789e89b89b41bcb07a2d40b71a6a03", "score": "0.44446433", "text": "func (p *ThriftHiveMetastoreClient) ListPrivileges(principal_name string, principal_type PrincipalType, hiveObject *HiveObjectRef) (r []*HiveObjectPrivilege, err error) {\n\tif err = p.sendListPrivileges(principal_name, principal_type, hiveObject); err != nil {\n\t\treturn\n\t}\n\treturn p.recvListPrivileges()\n}", "title": "" }, { "docid": "19ca85f8f83d83e786e48c4c881b629f", "score": "0.44179556", "text": "func (n *Revoke) RowIter(ctx *sql.Context, row sql.Row) (sql.RowIter, error) {\n\tmysqlDb, ok := n.MySQLDb.(*mysql_db.MySQLDb)\n\tif !ok {\n\t\treturn nil, sql.ErrDatabaseNotFound.New(\"mysql\")\n\t}\n\teditor := mysqlDb.Editor()\n\tdefer editor.Close()\n\tif n.PrivilegeLevel.Database == \"*\" && n.PrivilegeLevel.TableRoutine == \"*\" {\n\t\tif n.ObjectType != ObjectType_Any {\n\t\t\treturn nil, sql.ErrGrantRevokeIllegalPrivilege.New()\n\t\t}\n\t\tfor _, revokeUser := range n.Users {\n\t\t\tuser := mysqlDb.GetUser(editor, revokeUser.Name, revokeUser.Host, false)\n\t\t\tif user == nil {\n\t\t\t\treturn nil, sql.ErrGrantUserDoesNotExist.New()\n\t\t\t}\n\t\t\tif err := n.HandleGlobalPrivileges(user); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t} else if n.PrivilegeLevel.Database != \"*\" && n.PrivilegeLevel.TableRoutine == \"*\" {\n\t\tdatabase := n.PrivilegeLevel.Database\n\t\tif database == \"\" {\n\t\t\tdatabase = ctx.GetCurrentDatabase()\n\t\t\tif database == \"\" {\n\t\t\t\treturn nil, sql.ErrNoDatabaseSelected.New()\n\t\t\t}\n\t\t}\n\t\tif n.ObjectType != ObjectType_Any {\n\t\t\treturn nil, sql.ErrGrantRevokeIllegalPrivilege.New()\n\t\t}\n\t\tfor _, revokeUser := range n.Users {\n\t\t\tuser := mysqlDb.GetUser(editor, revokeUser.Name, revokeUser.Host, false)\n\t\t\tif user == nil {\n\t\t\t\treturn nil, sql.ErrGrantUserDoesNotExist.New()\n\t\t\t}\n\t\t\tif err := n.HandleDatabasePrivileges(user, database); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t} else {\n\t\tdatabase := n.PrivilegeLevel.Database\n\t\tif database == \"\" {\n\t\t\tdatabase = ctx.GetCurrentDatabase()\n\t\t\tif database == \"\" {\n\t\t\t\treturn nil, sql.ErrNoDatabaseSelected.New()\n\t\t\t}\n\t\t}\n\t\tif n.ObjectType != ObjectType_Any {\n\t\t\t//TODO: implement object types\n\t\t\treturn nil, fmt.Errorf(\"GRANT has not yet implemented object types\")\n\t\t}\n\t\tfor _, grantUser := range n.Users {\n\t\t\tuser := mysqlDb.GetUser(editor, grantUser.Name, grantUser.Host, false)\n\t\t\tif user == nil {\n\t\t\t\treturn nil, sql.ErrGrantUserDoesNotExist.New()\n\t\t\t}\n\t\t\tif err := n.HandleTablePrivileges(user, database, n.PrivilegeLevel.TableRoutine); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\tif err := mysqlDb.Persist(ctx, editor); err != nil {\n\t\treturn nil, err\n\t}\n\treturn sql.RowsToRowIter(sql.Row{types.NewOkResult(0)}), nil\n}", "title": "" }, { "docid": "8da5681890531f376fb155f28dee108b", "score": "0.4399717", "text": "func Getprivateroomslist()([]interface{}) {\n coll := conn.Database(DBName).Collection(privateroomsCollection)\n \n\tcursor, err := coll.Find(ctx, bson.D{})\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t\n\tvar privateroomlist []bson.M\n\tif err = cursor.All(ctx, &privateroomlist); err != nil {\n\t\tfmt.Printf(\"Could list all privaterooms.\")\n\t\t//return err\n\t}\n\t// fmt.Println(privateroomlist)\n\t\n\tvar listall []interface{}\n\t// err := c.Find(bson.M{}).All(&data)\n\t// handle err \n\tfor _, doc := range privateroomlist {\n\t for key, value := range doc {\n\t\t if key == \"name\"{\n\t\t\tlistall = append(listall, value)\n\t\t\t//fmt.Println(value)\n\t\t }\n\n\t }\n\t} \n\treturn listall \n}", "title": "" }, { "docid": "6ae229ad1ada3b646e04483a592b2d33", "score": "0.4397608", "text": "func (m *SchedulingGroup) GetUserIds()([]string) {\n val, err := m.GetBackingStore().Get(\"userIds\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]string)\n }\n return nil\n}", "title": "" }, { "docid": "5b30095bf6c0d6505e340172914dfb54", "score": "0.43920457", "text": "func GetPermUserOrg(c echo.Context) (err error) {\n\tresult, err := models.GetPermOrg(dbs.DB, stringtoInt(c.Param(\"orgid\")))\n\ttools.PanicIf(err)\n\tpmusrs := make([]models.Permit, 0.0)\n\tpmusr := models.Permit{}\n\tfor result.Next() {\n\t\tresult.Scan(&pmusr.Organizationid, &pmusr.Email)\n\t\tfmt.Println(pmusr.Organizationid, pmusr.Email)\n\t\tpmusrs = append(pmusrs, pmusr)\n\t}\n\t//\tdbs.CloseDB(db)\n\treturn c.JSON(http.StatusOK, pmusrs)\n}", "title": "" }, { "docid": "3223c13a91fde652bd211d55719c38d6", "score": "0.43538913", "text": "func GetCmdListGrants(queryRoute string, cdc *codec.Codec) *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"list\",\n\t\tShort: \"list\",\n\t\t// Args: cobra.ExactArgs(1),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tcliCtx := context.NewCLIContext().WithCodec(cdc)\n\n\t\t\tfullQueryRoute := fmt.Sprintf(\"custom/%s/%s\", queryRoute, types.QueryGrantList)\n\t\t\tres, _, err := cliCtx.QueryWithData(fullQueryRoute, nil)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(\"could not get query grant list full route is %s - error is %v\\n \", fullQueryRoute, err)\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tvar out types.QueryResGrants\n\t\t\tcdc.MustUnmarshalJSON(res, &out)\n\t\t\treturn cliCtx.PrintOutput(out)\n\t\t},\n\t}\n}", "title": "" }, { "docid": "9d40ff425b5c71a5e4f1cb073cee59b0", "score": "0.43408054", "text": "func (m *GlobalSpecType) GetUsbPolicyChoiceDBEntries(ctx context.Context, d db.Interface) ([]db.Entry, error) {\n\tvar entries []db.Entry\n\n\tswitch m.GetUsbPolicyChoice().(type) {\n\tcase *GlobalSpecType_DenyAllUsb:\n\n\tcase *GlobalSpecType_AllowAllUsb:\n\n\tcase *GlobalSpecType_UsbPolicy:\n\t\trefdType, err := d.TypeForEntryKind(\"\", \"\", \"usb_policy.Object\")\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"Cannot find type for kind: usb_policy\")\n\t\t}\n\n\t\tvref := m.GetUsbPolicy()\n\t\tif vref == nil {\n\t\t\treturn nil, nil\n\t\t}\n\t\tref := &ves_io_schema.ObjectRefType{\n\t\t\tKind: \"usb_policy.Object\",\n\t\t\tTenant: vref.Tenant,\n\t\t\tNamespace: vref.Namespace,\n\t\t\tName: vref.Name,\n\t\t}\n\t\trefdEnt, err := d.GetReferredEntry(ctx, refdType, ref, db.WithRefOpOptions(db.OpWithReadRefFromInternalTable()))\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"Getting referred entry\")\n\t\t}\n\t\tif refdEnt != nil {\n\t\t\tentries = append(entries, refdEnt)\n\t\t}\n\n\t}\n\n\treturn entries, nil\n}", "title": "" }, { "docid": "262e53d1445d169875b9c411fc4730de", "score": "0.43125847", "text": "func getUsersWithAccessMode(ctx context.Context, repo *repo_model.Repository, mode perm_model.AccessMode) (_ []*user_model.User, err error) {\n\tif err = repo.LoadOwner(ctx); err != nil {\n\t\treturn nil, err\n\t}\n\n\te := db.GetEngine(ctx)\n\taccesses := make([]*Access, 0, 10)\n\tif err = e.Where(\"repo_id = ? AND mode >= ?\", repo.ID, mode).Find(&accesses); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Leave a seat for owner itself to append later, but if owner is an organization\n\t// and just waste 1 unit is cheaper than re-allocate memory once.\n\tusers := make([]*user_model.User, 0, len(accesses)+1)\n\tif len(accesses) > 0 {\n\t\tuserIDs := make([]int64, len(accesses))\n\t\tfor i := 0; i < len(accesses); i++ {\n\t\t\tuserIDs[i] = accesses[i].UserID\n\t\t}\n\n\t\tif err = e.In(\"id\", userIDs).Find(&users); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tif !repo.Owner.IsOrganization() {\n\t\tusers = append(users, repo.Owner)\n\t}\n\n\treturn users, nil\n}", "title": "" }, { "docid": "cec8afa07ab284c8e12fc0e6a70b38ef", "score": "0.42802697", "text": "func adminPrivilege(userID int) bool {\n for _, id := range config[0].AdminID {\n if userID == id {\n return true\n }\n }\n return false\n}", "title": "" }, { "docid": "4921bd8823205661470017ded467acaf", "score": "0.4279151", "text": "func GetGrantPermissionSet(mode string) *provider.ResourcePermissions {\n\n\t// TODO also check unix permissions for read access\n\tp := &provider.ResourcePermissions{}\n\t// r\n\tif strings.Contains(mode, \"r\") {\n\t\tp.Stat = true\n\t\tp.InitiateFileDownload = true\n\t}\n\t// w\n\tif strings.Contains(mode, \"w\") {\n\t\tp.CreateContainer = true\n\t\tp.InitiateFileUpload = true\n\t\tp.Delete = true\n\t\tif p.InitiateFileDownload {\n\t\t\tp.Move = true\n\t\t}\n\t}\n\tif strings.Contains(mode, \"wo\") {\n\t\tp.CreateContainer = true\n\t\t//\tp.InitiateFileUpload = false // TODO only when the file exists\n\t\tp.Delete = false\n\t}\n\tif strings.Contains(mode, \"!d\") {\n\t\tp.Delete = false\n\t} else if strings.Contains(mode, \"+d\") {\n\t\tp.Delete = true\n\t}\n\t// x\n\tif strings.Contains(mode, \"x\") {\n\t\tp.ListContainer = true\n\t}\n\n\t// sharing\n\t// TODO AddGrant\n\t// TODO ListGrants\n\t// TODO RemoveGrant\n\t// TODO UpdateGrant\n\n\t// trash\n\t// TODO ListRecycle\n\t// TODO RestoreRecycleItem\n\t// TODO PurgeRecycle\n\n\t// versions\n\t// TODO ListFileVersions\n\t// TODO RestoreFileVersion\n\n\t// ?\n\t// TODO GetPath\n\t// TODO GetQuota\n\treturn p\n}", "title": "" }, { "docid": "5739ca0c890206d12fddabb165c14f49", "score": "0.4276924", "text": "func (privileges *Privileges) getObjectPrivileges(obj Base) *Privilege {\n\tvar result *Privilege\n\tif obj.GetNamespace() == runtime.SystemNS {\n\t\tresult = privileges.GlobalObjects[obj.GetKind()]\n\t} else {\n\t\tresult = privileges.NamespaceObjects[obj.GetKind()]\n\t}\n\tif result == nil {\n\t\treturn noAccess\n\t}\n\treturn result\n}", "title": "" }, { "docid": "489fb5d90365b6a6f6bd646be26a5e1e", "score": "0.4273408", "text": "func readPrivItem(db *sql.DB, name string) (string, error) {\n\tvar r string\n\terr := db.QueryRow(`SELECT privileges FROM privileges WHERE name = ?;`, name).Scan(&r)\n\tif err != nil && !errors.Is(err, sql.ErrNoRows) {\n\t\treturn \"\", err\n\t}\n\n\treturn r, err\n}", "title": "" }, { "docid": "18ecfd12da08ea69cc00ce438a408961", "score": "0.42655063", "text": "func (m *WindowsDefenderApplicationControlSupplementalPolicy) GetAssignments()([]WindowsDefenderApplicationControlSupplementalPolicyAssignmentable) {\n val, err := m.GetBackingStore().Get(\"assignments\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]WindowsDefenderApplicationControlSupplementalPolicyAssignmentable)\n }\n return nil\n}", "title": "" }, { "docid": "5a480862069b224b977c86a0ba057335", "score": "0.42515877", "text": "func TestServer_UserPrivilegeAuthorization(t *testing.T) {\n\ts := OpenServer(NewMessagingClient())\n\tdefer s.Close()\n\n\t// Create cluster admin.\n\ts.CreateUser(\"admin\", \"admin\", true)\n\tadmin := s.User(\"admin\")\n\n\t// Create normal database user.\n\ts.CreateUser(\"user1\", \"user1\", false)\n\tuser1 := s.User(\"user1\")\n\tuser1.Privileges[\"foo\"] = influxql.ReadPrivilege\n\n\ts.Restart()\n\n\t// admin user should be authorized for all privileges.\n\tif !admin.Authorize(influxql.AllPrivileges, \"\") {\n\t\tt.Fatalf(\"cluster admin doesn't have influxql.AllPrivileges\")\n\t} else if !admin.Authorize(influxql.WritePrivilege, \"\") {\n\t\tt.Fatalf(\"cluster admin doesn't have influxql.WritePrivilege\")\n\t}\n\n\t// Normal user with only read privilege on database foo.\n\tif !user1.Authorize(influxql.ReadPrivilege, \"foo\") {\n\t\tt.Fatalf(\"user1 doesn't have influxql.ReadPrivilege on foo\")\n\t} else if user1.Authorize(influxql.WritePrivilege, \"foo\") {\n\t\tt.Fatalf(\"user1 has influxql.WritePrivilege on foo\")\n\t} else if user1.Authorize(influxql.ReadPrivilege, \"bar\") {\n\t\tt.Fatalf(\"user1 has influxql.ReadPrivilege on bar\")\n\t} else if user1.Authorize(influxql.AllPrivileges, \"\") {\n\t\tt.Fatalf(\"user1 is cluster admin\")\n\t}\n}", "title": "" }, { "docid": "307de2df20d761bd87cdd08d4860cc13", "score": "0.4250413", "text": "func (ws *WebSessionV1) GetPriv() []byte {\n\treturn ws.Priv\n}", "title": "" }, { "docid": "bf73e82a25c33f474e85276731d5c217", "score": "0.42483595", "text": "func GetSlice() [][]string {\n\tGetCredentialsStorage()\n\n\tvar creds [][]string\n\tfor _, item := range storage.credentials {\n\t\tcurrentCred := []string{item.Username, item.Password}\n\t\tcreds = append(creds, currentCred)\n\t}\n\treturn creds\n}", "title": "" }, { "docid": "3c4b27ecd9c5a71064d936871e56c5ef", "score": "0.424579", "text": "func (in *PostgresDatabaseSpecSecurityPrivileges) DeepCopy() *PostgresDatabaseSpecSecurityPrivileges {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(PostgresDatabaseSpecSecurityPrivileges)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "0ee26bdc4fa7e4f4e900ea3751aa6e02", "score": "0.42402494", "text": "func (ws *WebSessionV2) GetPriv() []byte {\n\treturn ws.Spec.Priv\n}", "title": "" }, { "docid": "224cbf0beb7d7b07b8a71d0e07f89287", "score": "0.41878343", "text": "func (q adminUsergroupQuery) AllG() (AdminUsergroupSlice, error) {\n\treturn q.All(boil.GetDB())\n}", "title": "" }, { "docid": "e3f95b4f529ab64b313a61d36c7f3670", "score": "0.4185974", "text": "func SetPrivs(name string, privs map[string]bool) error {\n\tdb, err := initAuthDB()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer db.Close()\n\n\terr = modPrivItem(db, name, encodePrivs(privs))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "be0edc33e9f75fc630b168252782f28a", "score": "0.4181877", "text": "func getDatastoresWithBlockVolumePrivs(ctx context.Context, vc *cnsvsphere.VirtualCenter,\n\tdsURLs []string, dsInfos []*cnsvsphere.DatastoreInfo,\n\tentities []vim25types.ManagedObjectReference) (map[string]*cnsvsphere.DatastoreInfo, error) {\n\tlog := logger.GetLogger(ctx)\n\tlog.Debugf(\"auth manager: file - dsURLs %v, dsInfos %v, vCenter %q\", dsURLs, dsInfos, vc.Config.Host)\n\t// dsURLToInfoMap will store a list of vSAN datastores with vSAN FS enabled\n\t// for which CSI user has privilege to.\n\tdsURLToInfoMap := make(map[string]*cnsvsphere.DatastoreInfo)\n\t// Get authMgr.\n\tauthMgr := object.NewAuthorizationManager(vc.Client.Client)\n\tprivIds := []string{DsPriv, SysReadPriv}\n\n\tuserName := vc.Config.Username\n\t// Invoke authMgr function HasUserPrivilegeOnEntities.\n\tresult, err := authMgr.HasUserPrivilegeOnEntities(ctx, entities, userName, privIds) // entities empty -> error\n\tif err != nil {\n\t\tlog.Errorf(\"auth manager: failed to check privilege %v on entities %v for user %s and for vCenter %q\",\n\t\t\tprivIds, entities, userName, vc.Config.Host)\n\t\treturn nil, err\n\t}\n\tif len(result) == 0 {\n\t\tlog.Infof(\"auth manager: HasUserPrivilegeOnEntities returned empty result when checking privileges %v \"+\n\t\t\t\"on entities %v for user %s and for vCenter %q\", privIds, entities, userName, vc.Config.Host)\n\t} else {\n\t\tlog.Debugf(\"auth manager: HasUserPrivilegeOnEntities returned %v when checking privileges %v on entities %v \"+\n\t\t\t\"for user %s and for vCenter %q\", result, privIds, entities, userName, vc.Config.Host)\n\t}\n\n\tfor index, entityPriv := range result {\n\t\thasPriv := true\n\t\tprivAvails := entityPriv.PrivAvailability\n\t\tfor _, privAvail := range privAvails {\n\t\t\tif !privAvail.IsGranted {\n\t\t\t\t// Required privilege is not grant for this entity.\n\t\t\t\thasPriv = false\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif hasPriv {\n\t\t\tdsURLToInfoMap[dsURLs[index]] = dsInfos[index]\n\t\t\tlog.Debugf(\"auth manager: datastore with URL %s and name %s has privileges and is added to dsURLToInfoMap \"+\n\t\t\t\t\"for vCenter %q\", dsInfos[index].Info.Name, dsURLs[index], vc.Config.Host)\n\t\t}\n\t}\n\tif len(result) != 0 && len(dsURLToInfoMap) == 0 {\n\t\tlog.Infof(\"auth manager: user %s on vCenter %q doesn't have privileges for any datastore. \"+\n\t\t\t\"HasUserPrivilegeOnEntities returns %v, when checking privileges %v on entities %v.\"+\n\t\t\tuserName, vc.Config.Host, result, privIds, entities)\n\t}\n\treturn dsURLToInfoMap, nil\n}", "title": "" }, { "docid": "e7a02503b38dd18673761a59a151c212", "score": "0.41816324", "text": "func (gs *groupauthSqac) GetGroupAuthsByGroupID(op string, GroupID string) []GroupAuth {\n\n\tvar groupauths []GroupAuth\n\tvar c string\n\n\tswitch op {\n\tcase \"EQ\":\n\t\tc = \"group_id = ?\"\n\tcase \"LT\":\n\t\tc = \"group_id < ?\"\n\tcase \"GT\":\n\t\tc = \"group_id > ?\"\n\tdefault:\n\t\treturn nil\n\t}\n\n\tqs := fmt.Sprintf(`SELECT groupauth.id, groupauth.group_id, usrgroup.group_name, groupauth.auth_id, auth.auth_name, auth.auth_type, auth.description\n \t\tFROM groupauth INNER JOIN auth ON (groupauth.auth_id = auth.id) \n \t\t INNER JOIN usrgroup ON (usrgroup.id = groupauth.group_id) WHERE %s;`, c)\n\n\terr := gs.handle.Select(&groupauths, qs, GroupID)\n\tif err != nil {\n\t\tlw.Warning(\"GetGroupAuthsByGroupID got: %s\", err.Error())\n\t\treturn nil\n\t}\n\n\tif gs.handle.IsLog() {\n\t\tlw.Debug(\"GetGroupAuthsByGroupID found: %v based on (%s %v)\", groupauths, op, GroupID)\n\t}\n\treturn groupauths\n}", "title": "" }, { "docid": "29baa320c613f1e2f068702cb2698554", "score": "0.41735643", "text": "func PrivilegesFlag(name, def string) *Privileges {\n\tp := new(Privileges)\n\tflag.StringVar(&p.Username, name, def, \"User to whom to drop privileges (if set)\")\n\treturn p\n}", "title": "" }, { "docid": "ea635bf62d826ae515dc8c5942ad1ece", "score": "0.41719878", "text": "func UsersByPrivilegeID(db XODB, privilegeID uint64) ([]*User, error) {\n\tvar err error\n\n\t// sql query\n\tconst sqlstr = `SELECT ` +\n\t\t`id, screen_name, password, privilege_id, created_at, updated_at ` +\n\t\t`FROM comingserver.users ` +\n\t\t`WHERE privilege_id = ?`\n\n\t// run query\n\tXOLog(sqlstr, privilegeID)\n\tq, err := db.Query(sqlstr, privilegeID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer q.Close()\n\n\t// load results\n\tres := []*User{}\n\tfor q.Next() {\n\t\tu := User{\n\t\t\t_exists: true,\n\t\t}\n\n\t\t// scan\n\t\terr = q.Scan(&u.ID, &u.ScreenName, &u.Password, &u.PrivilegeID, &u.CreatedAt, &u.UpdatedAt)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tres = append(res, &u)\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "49601031fb0a629f107e763b37b64fd2", "score": "0.41711727", "text": "func (m *PolicyRoot) GetPermissionGrantPolicies()([]PermissionGrantPolicyable) {\n val, err := m.GetBackingStore().Get(\"permissionGrantPolicies\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]PermissionGrantPolicyable)\n }\n return nil\n}", "title": "" }, { "docid": "ada76433b7b987fa72865a76d94536aa", "score": "0.41697466", "text": "func (VS *Server) getSpecificAccessByServiceAndUser(c *gin.Context, userID bson.ObjectId, serviceID bson.ObjectId) Access {\n\tvar acc []Access\n\terr := VS.DataBase.Find(&acc, bolthold.Where(\"IDservice\").Eq(serviceID).And(\"IDuser\").Eq(userID).And(\"IsActive\").Eq(true))\n\tVS.checkOperation(c, \"Database\", \"getSpecificAccessByServiceAndUser\", \"find\", err)\n\tif len(acc) == 0 {\n\t\treturn Access{}\n\t}\n\treturn acc[0]\n}", "title": "" }, { "docid": "9f483e94af767d87e3731693a3b4e34c", "score": "0.41621116", "text": "func (in *PostgresDatabaseSpecSchemaSecurityPrivileges) DeepCopy() *PostgresDatabaseSpecSchemaSecurityPrivileges {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(PostgresDatabaseSpecSchemaSecurityPrivileges)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "5946f5cb987a60ddc37796b38f8b3bb4", "score": "0.4158983", "text": "func getStaticSuperUserGrants() rmap.Rmap {\n\treturn rmap.NewFromMap(map[string]interface{}{\n\t\t\"view_sensitive\": []string{\"/user/*\"},\n\t})\n}", "title": "" }, { "docid": "4b32d5c7d3c5ab3e3297df895da660d2", "score": "0.41577455", "text": "func retrieveSysSettings(stmt string, db *sql.DB) (PGSettings, error) {\n\trows, err := db.Query(stmt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tsettings := make(PGSettings)\n\n\tfor rows.Next() {\n\t\tvar name, setting, unit, shortDesc, source, sourceFile sql.NullString\n\t\tvar sourceLine sql.NullInt64\n\t\terr = rows.Scan(&name, &setting, &unit, &shortDesc,\n\t\t\t&source, &sourceFile, &sourceLine)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// If the source is \"configuration file\", but the file path is empty,\n\t\t// the connected postgres user does not have sufficient privileges.\n\t\tvar line, file string\n\t\tif source.String == \"configuration file\" {\n\t\t\t// Shorten the source string.\n\t\t\tsource.String = \"conf file\"\n\t\t\tif sourceFile.String == \"\" {\n\t\t\t\tfile = \"NO PERMISSION\"\n\t\t\t} else {\n\t\t\t\tfile = sourceFile.String\n\t\t\t\tline = strconv.FormatInt(sourceLine.Int64, 10)\n\t\t\t}\n\t\t}\n\n\t\tsettings[name.String] = PGSetting{\n\t\t\tName: name.String,\n\t\t\tSetting: setting.String,\n\t\t\tUnit: unit.String,\n\t\t\tShortDesc: shortDesc.String,\n\t\t\tSource: source.String,\n\t\t\tSourceFile: file,\n\t\t\tSourceLine: line,\n\t\t}\n\t}\n\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn settings, nil\n}", "title": "" }, { "docid": "ef03343e612f23917ed819e739a25b07", "score": "0.4150853", "text": "func (m *WindowsInformationProtection) GetAssignments()([]TargetedManagedAppPolicyAssignmentable) {\n val, err := m.GetBackingStore().Get(\"assignments\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]TargetedManagedAppPolicyAssignmentable)\n }\n return nil\n}", "title": "" }, { "docid": "7c6892747a970b122067c14941a19ab3", "score": "0.41403073", "text": "func (p *UserPrivileges) ShowGrants(ctx context.Context, user string) ([]string, error) {\n\t// If user is current user\n\tif user == p.User {\n\t\treturn p.privs.ShowGrants(), nil\n\t}\n\tuserp := &UserPrivileges{User: user}\n\terr := userp.loadPrivileges(ctx)\n\tif err != nil {\n\t\treturn nil, errors.Trace(err)\n\t}\n\treturn userp.privs.ShowGrants(), nil\n}", "title": "" }, { "docid": "a374b339fb61ca5c6545b1dfb0cafbf5", "score": "0.4137482", "text": "func (me *COHESITYMANAGEMENTSDK_IMPL) Privileges() privileges.PRIVILEGES {\r\n\tif (me.privileges) == nil {\r\n\t\tme.privileges = privileges.NewPRIVILEGES(me.config)\r\n\t}\r\n\treturn me.privileges\r\n}", "title": "" }, { "docid": "12b3c2e850b374e2d4a9eef042004b8a", "score": "0.41341296", "text": "func (client *ClientImpl) GetGlobalPermissions(ctx context.Context, args GetGlobalPermissionsArgs) (*[]GlobalPermission, error) {\n\tqueryParams := url.Values{}\n\tif args.IncludeIds != nil {\n\t\tqueryParams.Add(\"includeIds\", strconv.FormatBool(*args.IncludeIds))\n\t}\n\tlocationId, _ := uuid.Parse(\"a74419ef-b477-43df-8758-3cd1cd5f56c6\")\n\tresp, err := client.Client.Send(ctx, http.MethodGet, locationId, \"7.1-preview.1\", nil, queryParams, nil, \"\", \"application/json\", nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar responseValue []GlobalPermission\n\terr = client.Client.UnmarshalCollectionBody(resp, &responseValue)\n\treturn &responseValue, err\n}", "title": "" }, { "docid": "a2ff1a6814edd23f2063cfaf61c3bee7", "score": "0.41285634", "text": "func (p *ThriftHiveMetastoreClient) GetPartitionsPsWithAuth(db_name string, tbl_name string, part_vals []string, max_parts int16, user_name string, group_names []string) (r []*Partition, err error) {\n\tif err = p.sendGetPartitionsPsWithAuth(db_name, tbl_name, part_vals, max_parts, user_name, group_names); err != nil {\n\t\treturn\n\t}\n\treturn p.recvGetPartitionsPsWithAuth()\n}", "title": "" }, { "docid": "0eeb88afce702d63d413fd4dd8466a23", "score": "0.41239226", "text": "func GrantedScopes(ctx context.Context, cache ScopeCache, kind string, rawConfig string) ([]string, error) {\n\tif kind != extsvc.KindGitHub {\n\t\treturn nil, nil\n\t}\n\tconfig, err := extsvc.ParseConfig(kind, rawConfig)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"parsing config\")\n\t}\n\tswitch v := config.(type) {\n\tcase *schema.GitHubConnection:\n\t\tif v.Token == \"\" {\n\t\t\treturn nil, errors.New(\"missing token\")\n\t\t}\n\t\tkey, err := hashToken(v.Token)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif result, ok := cache.Get(key); ok && len(result) > 0 {\n\t\t\treturn strings.Split(string(result), \",\"), nil\n\t\t}\n\n\t\t// Slow path\n\t\tu, err := url.Parse(v.Url)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"parsing URL\")\n\t\t}\n\t\tclient := github.NewV3Client(u, &auth.OAuthBearerToken{Token: v.Token}, nil)\n\t\tscopes, err := client.GetAuthenticatedUserOAuthScopes(ctx)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"getting scopes\")\n\t\t}\n\t\tcache.Set(key, []byte(strings.Join(scopes, \",\")))\n\t\treturn scopes, nil\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unsupported config type: %T\", v)\n\t}\n}", "title": "" }, { "docid": "598f183b7509e8637788747ed856b2df", "score": "0.41202435", "text": "func (m CodelibraryItem) GetMenusPermByIds(ids string) []model.CodelibraryItem {\n\tvar menus []model.CodelibraryItem\n\tdb := baseDao.GetDb()\n\tdb.Where(\"id in (?) and menu_type=2\", strings.Split(ids, \",\")).Find(&menus)\n\treturn menus\n}", "title": "" }, { "docid": "6fc897d973813d8fec26b86247819cc2", "score": "0.4106967", "text": "func (m *PrivilegedAccess) GetRoleAssignments()([]GovernanceRoleAssignmentable) {\n val, err := m.GetBackingStore().Get(\"roleAssignments\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]GovernanceRoleAssignmentable)\n }\n return nil\n}", "title": "" }, { "docid": "ded18c9be4a76c2d152a7c983f8f8c70", "score": "0.41044337", "text": "func (n *Revoke) CheckPrivileges(ctx *sql.Context, opChecker sql.PrivilegedOperationChecker) bool {\n\tif opChecker.UserHasPrivileges(ctx,\n\t\tsql.NewPrivilegedOperation(\"mysql\", \"\", \"\", sql.PrivilegeType_Update)) {\n\t\treturn true\n\t}\n\tif n.PrivilegeLevel.Database == \"*\" && n.PrivilegeLevel.TableRoutine == \"*\" {\n\t\tif n.Privileges[0].Type == PrivilegeType_All {\n\t\t\treturn opChecker.UserHasPrivileges(ctx, sql.NewPrivilegedOperation(\"\", \"\", \"\",\n\t\t\t\tsql.PrivilegeType_Select,\n\t\t\t\tsql.PrivilegeType_Insert,\n\t\t\t\tsql.PrivilegeType_Update,\n\t\t\t\tsql.PrivilegeType_Delete,\n\t\t\t\tsql.PrivilegeType_Create,\n\t\t\t\tsql.PrivilegeType_Drop,\n\t\t\t\tsql.PrivilegeType_Reload,\n\t\t\t\tsql.PrivilegeType_Shutdown,\n\t\t\t\tsql.PrivilegeType_Process,\n\t\t\t\tsql.PrivilegeType_File,\n\t\t\t\tsql.PrivilegeType_References,\n\t\t\t\tsql.PrivilegeType_Index,\n\t\t\t\tsql.PrivilegeType_Alter,\n\t\t\t\tsql.PrivilegeType_ShowDB,\n\t\t\t\tsql.PrivilegeType_Super,\n\t\t\t\tsql.PrivilegeType_CreateTempTable,\n\t\t\t\tsql.PrivilegeType_LockTables,\n\t\t\t\tsql.PrivilegeType_Execute,\n\t\t\t\tsql.PrivilegeType_ReplicationSlave,\n\t\t\t\tsql.PrivilegeType_ReplicationClient,\n\t\t\t\tsql.PrivilegeType_CreateView,\n\t\t\t\tsql.PrivilegeType_ShowView,\n\t\t\t\tsql.PrivilegeType_CreateRoutine,\n\t\t\t\tsql.PrivilegeType_AlterRoutine,\n\t\t\t\tsql.PrivilegeType_CreateUser,\n\t\t\t\tsql.PrivilegeType_Event,\n\t\t\t\tsql.PrivilegeType_Trigger,\n\t\t\t\tsql.PrivilegeType_CreateTablespace,\n\t\t\t\tsql.PrivilegeType_CreateRole,\n\t\t\t\tsql.PrivilegeType_DropRole,\n\t\t\t\tsql.PrivilegeType_GrantOption,\n\t\t\t))\n\t\t}\n\t\treturn opChecker.UserHasPrivileges(ctx, sql.NewPrivilegedOperation(\"\", \"\", \"\",\n\t\t\tconvertToSqlPrivilegeType(true, n.Privileges...)...))\n\t} else if n.PrivilegeLevel.Database != \"*\" && n.PrivilegeLevel.TableRoutine == \"*\" {\n\t\tdatabase := n.PrivilegeLevel.Database\n\t\tif database == \"\" {\n\t\t\tdatabase = ctx.GetCurrentDatabase()\n\t\t}\n\t\tif n.Privileges[0].Type == PrivilegeType_All {\n\t\t\treturn opChecker.UserHasPrivileges(ctx, sql.NewPrivilegedOperation(database, \"\", \"\",\n\t\t\t\tsql.PrivilegeType_Alter,\n\t\t\t\tsql.PrivilegeType_AlterRoutine,\n\t\t\t\tsql.PrivilegeType_Create,\n\t\t\t\tsql.PrivilegeType_CreateRoutine,\n\t\t\t\tsql.PrivilegeType_CreateTempTable,\n\t\t\t\tsql.PrivilegeType_CreateView,\n\t\t\t\tsql.PrivilegeType_Delete,\n\t\t\t\tsql.PrivilegeType_Drop,\n\t\t\t\tsql.PrivilegeType_Event,\n\t\t\t\tsql.PrivilegeType_Execute,\n\t\t\t\tsql.PrivilegeType_Index,\n\t\t\t\tsql.PrivilegeType_Insert,\n\t\t\t\tsql.PrivilegeType_LockTables,\n\t\t\t\tsql.PrivilegeType_References,\n\t\t\t\tsql.PrivilegeType_Select,\n\t\t\t\tsql.PrivilegeType_ShowView,\n\t\t\t\tsql.PrivilegeType_Trigger,\n\t\t\t\tsql.PrivilegeType_Update,\n\t\t\t\tsql.PrivilegeType_GrantOption,\n\t\t\t))\n\t\t}\n\t\treturn opChecker.UserHasPrivileges(ctx, sql.NewPrivilegedOperation(database, \"\", \"\",\n\t\t\tconvertToSqlPrivilegeType(true, n.Privileges...)...))\n\t} else {\n\t\t//TODO: add column checks\n\t\tif n.Privileges[0].Type == PrivilegeType_All {\n\t\t\treturn opChecker.UserHasPrivileges(ctx,\n\t\t\t\tsql.NewPrivilegedOperation(n.PrivilegeLevel.Database, n.PrivilegeLevel.TableRoutine, \"\",\n\t\t\t\t\tsql.PrivilegeType_Alter,\n\t\t\t\t\tsql.PrivilegeType_Create,\n\t\t\t\t\tsql.PrivilegeType_CreateView,\n\t\t\t\t\tsql.PrivilegeType_Delete,\n\t\t\t\t\tsql.PrivilegeType_Drop,\n\t\t\t\t\tsql.PrivilegeType_Index,\n\t\t\t\t\tsql.PrivilegeType_Insert,\n\t\t\t\t\tsql.PrivilegeType_References,\n\t\t\t\t\tsql.PrivilegeType_Select,\n\t\t\t\t\tsql.PrivilegeType_ShowView,\n\t\t\t\t\tsql.PrivilegeType_Trigger,\n\t\t\t\t\tsql.PrivilegeType_Update,\n\t\t\t\t\tsql.PrivilegeType_GrantOption,\n\t\t\t\t))\n\t\t}\n\t\treturn opChecker.UserHasPrivileges(ctx,\n\t\t\tsql.NewPrivilegedOperation(n.PrivilegeLevel.Database, n.PrivilegeLevel.TableRoutine, \"\",\n\t\t\t\tconvertToSqlPrivilegeType(true, n.Privileges...)...))\n\t}\n}", "title": "" }, { "docid": "9ecff4dd8f34fcb6598d426ca5f4bb8e", "score": "0.4094793", "text": "func getAccessLevel(server []UA_Server, session []UA_Session, node []UA_VariableNode) UA_Byte {\n\tif session == (*[100000000]UA_Session)(unsafe.Pointer(&adminSession))[:] {\n\t\t// the local admin user has all rights\n\t\treturn UA_Byte(255)\n\t}\n\treturn UA_Byte(node[0].accessLevel)\n}", "title": "" }, { "docid": "06b04b6d5606d8b01b833ab356a9b350", "score": "0.40921545", "text": "func (m *UserManager) GenEnvUserAccess(envs []string, user, query, carve, admin bool) UserAccess {\n\taccess := make(UserAccess)\n\tfor _, e := range envs {\n\t\taccess[e] = EnvAccess{\n\t\t\tUser: user,\n\t\t\tQuery: query,\n\t\t\tCarve: carve,\n\t\t\tAdmin: admin,\n\t\t}\n\t}\n\treturn access\n}", "title": "" }, { "docid": "7559c2d81d0e2a3754877a08cc506404", "score": "0.40861797", "text": "func initPrivTables(s Session) {\n\tmustExecute(s, CreateDBPrivTable)\n\tmustExecute(s, CreateTablePrivTable)\n\tmustExecute(s, CreateColumnPrivTable)\n}", "title": "" }, { "docid": "d24dbfc792d6846c3a1e6d9db2ecb8f5", "score": "0.40847853", "text": "func FindAdminUnauthorizedTrustlineG(iD int, selectCols ...string) (*AdminUnauthorizedTrustline, error) {\n\treturn FindAdminUnauthorizedTrustline(boil.GetDB(), iD, selectCols...)\n}", "title": "" }, { "docid": "521921594735c7d364bd5bd161be8736", "score": "0.4083305", "text": "func TestUserGrants(t *testing.T) {\n\tdefer leaktest.AfterTest(t)()\n\n\tctx := context.Background()\n\tparams, _ := tests.CreateTestServerParams()\n\ts, sqlDB, kvDB := serverutils.StartServer(t, params)\n\tdefer s.Stopper().Stop(ctx)\n\n\tconn, err := sqlDB.Conn(ctx)\n\trequire.NoError(t, err)\n\n\t// Create non-admin user with only CREATE privilege on the database.\n\t_, err = sqlDB.Exec(\"CREATE USER john\")\n\trequire.NoError(t, err)\n\t_, err = sqlDB.Exec(fmt.Sprintf(\"GRANT CREATE ON DATABASE %s TO john\", database))\n\trequire.NoError(t, err)\n\n\t// Operate under non-admin user.\n\texecutor := filetable.MakeInternalFileToTableExecutor(s.InternalExecutor().(*sql.\n\t\tInternalExecutor), kvDB)\n\tjohnUser := security.MakeSQLUsernameFromPreNormalizedString(\"john\")\n\tfileTableReadWriter, err := filetable.NewFileToTableSystem(ctx, qualifiedTableName,\n\t\texecutor, johnUser)\n\trequire.NoError(t, err)\n\n\t// Upload a file to test INSERT privilege.\n\texpected, err := uploadFile(ctx, \"file1\", 1024, 1, fileTableReadWriter,\n\t\tkvDB)\n\trequire.NoError(t, err)\n\n\t// Read file to test SELECT privilege.\n\treader, size, err := fileTableReadWriter.ReadFile(ctx, \"file1\", 0)\n\trequire.NoError(t, err)\n\trequire.Equal(t, int64(len(expected)), size)\n\tgot, err := ioutil.ReadAll(reader)\n\trequire.NoError(t, err)\n\trequire.True(t, bytes.Equal(got, expected))\n\n\t// Delete file to test DELETE privilege.\n\trequire.NoError(t, fileTableReadWriter.DeleteFile(ctx, \"file1\"))\n\n\t// Delete all files to test DROP privilege.\n\trequire.NoError(t, filetable.DestroyUserFileSystem(ctx, fileTableReadWriter))\n\n\t// Check that there are no grantees on the File and Payload tables as they\n\t// should have been dropped above.\n\t_, err = getTableGrantees(ctx, fileTableReadWriter.GetFQFileTableName(), conn)\n\trequire.Error(t, err)\n\n\t_, err = getTableGrantees(ctx, fileTableReadWriter.GetFQPayloadTableName(), conn)\n\trequire.Error(t, err)\n}", "title": "" }, { "docid": "fc0902baebda4fac85612cfa40cad745", "score": "0.40757746", "text": "func (p *PrivilegeDescriptor) Revoke(user string, privList privilege.List) {\n\tuserPriv, ok := p.findUser(user)\n\tif !ok || userPriv.Privileges == 0 {\n\t\t// Removing privileges from a user without privileges is a no-op.\n\t\treturn\n\t}\n\n\tbits := privList.ToBitField()\n\tif isPrivilegeSet(bits, privilege.ALL) {\n\t\t// Revoking 'ALL' privilege: remove user.\n\t\t// TODO(marc): the grammar does not allow it, but we should\n\t\t// check if other privileges are being specified and error out.\n\t\tp.removeUser(user)\n\t\treturn\n\t}\n\n\tif isPrivilegeSet(userPriv.Privileges, privilege.ALL) {\n\t\t// User has 'ALL' privilege. Remove it and set\n\t\t// all other privileges one.\n\t\tuserPriv.Privileges = 0\n\t\tfor _, v := range privilege.ByValue {\n\t\t\tif v != privilege.ALL {\n\t\t\t\tuserPriv.Privileges |= v.Mask()\n\t\t\t}\n\t\t}\n\t}\n\n\t// One doesn't see \"AND NOT\" very often.\n\tuserPriv.Privileges &^= bits\n\n\tif userPriv.Privileges == 0 {\n\t\tp.removeUser(user)\n\t}\n}", "title": "" }, { "docid": "eb839f61c756fe0c0d8a574c5a6ed5a2", "score": "0.40723598", "text": "func (r *GraphServiceOAuth2PermissionGrantsCollectionRequest) Get(ctx context.Context) ([]OAuth2PermissionGrant, error) {\n\treturn r.GetN(ctx, 0)\n}", "title": "" }, { "docid": "816fafa7a8ccb118a1bfb65451e6a6c8", "score": "0.4070624", "text": "func (q adminUnauthorizedTrustlineQuery) AllG() (AdminUnauthorizedTrustlineSlice, error) {\n\treturn q.All(boil.GetDB())\n}", "title": "" }, { "docid": "a350f76153a5805f342d1f94d01b5464", "score": "0.40612027", "text": "func (i *Iterate) CheckPrivileges(ctx *sql.Context, opChecker sql.PrivilegedOperationChecker) bool {\n\treturn true\n}", "title": "" }, { "docid": "df4307fa96f62f7548943c8b0d36e325", "score": "0.40606296", "text": "func TestStatementExecutor_ExecuteStatement_ShowGrantsFor(t *testing.T) {\n\tt.Skip(\"Intermittent test failure: issue 3028\")\n\te := NewStatementExecutor()\n\te.Store.UserPrivilegesFn = func(username string) (map[string]influxql.Privilege, error) {\n\t\tif username != \"dejan\" {\n\t\t\tt.Fatalf(\"unexpected username: %s\", username)\n\t\t}\n\t\treturn map[string]influxql.Privilege{\n\t\t\t\"dejan\": influxql.ReadPrivilege,\n\t\t\t\"golja\": influxql.WritePrivilege,\n\t\t}, nil\n\t}\n\n\tif res := e.ExecuteStatement(influxql.MustParseStatement(`SHOW GRANTS FOR dejan`)); res.Err != nil {\n\t\tt.Fatal(res.Err)\n\t} else if !reflect.DeepEqual(res.Series, models.Rows{\n\t\t{\n\t\t\tColumns: []string{\"database\", \"privilege\"},\n\t\t\tValues: [][]interface{}{\n\t\t\t\t{\"dejan\", \"READ\"},\n\t\t\t\t{\"golja\", \"WRITE\"},\n\t\t\t},\n\t\t},\n\t}) {\n\t\tt.Fatalf(\"unexpected rows: %s\", spew.Sdump(res.Series))\n\t}\n}", "title": "" }, { "docid": "07bd813372170a62da8bf101e2ff075c", "score": "0.404221", "text": "func (n *Nexus) ListPrivileges(req PrivilegeListRequest) ([]Privilege, error) {\n\tvar body bytes.Buffer\n\thttpResp, err := n.hc.Get(n.Addr).Path(\"/service/rest/beta/security/privileges\").\n\t\tHeader(HeaderAuthorization, n.basicAuthBase64Value()).\n\t\tDo().Body(&body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !httpResp.IsOK() {\n\t\treturn nil, ErrNotOK(httpResp.StatusCode(), body.String())\n\t}\n\n\tvar privileges []Privilege\n\tif err := json.NewDecoder(&body).Decode(&privileges); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn privileges, nil\n}", "title": "" }, { "docid": "b7c89297643e2ba9785698617b9e16b0", "score": "0.4040177", "text": "func (h databaseHandler) getGroupMemberIDs(gid int) []string {\n\tmembers := make(map[string]bool)\n\trows, err := h.database.cnx.Query(`\n\t\t\tSELECT u.name,u.uidnumber,u.primarygroup,u.passbcrypt,u.passsha256,u.otpsecret,u.yubikey,u.othergroups\n\t\t\tFROM users u`)\n\tif err != nil {\n\t\t// Silent fail... for now\n\t\treturn []string{}\n\t}\n\tdefer rows.Close()\n\n\tvar otherGroups string\n\tu := config.User{}\n\tfor rows.Next() {\n\t\terr := rows.Scan(&u.Name, &u.UIDNumber, &u.PrimaryGroup, &u.PassBcrypt, &u.PassSHA256, &u.OTPSecret, &u.Yubikey, &otherGroups)\n\t\tif err != nil {\n\t\t\treturn []string{}\n\t\t}\n\t\tif u.PrimaryGroup == gid {\n\t\t\tmembers[u.Name] = true\n\t\t} else {\n\t\t\tu.OtherGroups = h.commaListToIntTable(otherGroups)\n\t\t\tfor _, othergid := range u.OtherGroups {\n\t\t\t\tif othergid == gid {\n\t\t\t\t\tmembers[u.Name] = true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tfor _, g := range h.MemGroups {\n\t\tif gid == g.GIDNumber {\n\t\t\tfor _, includegroupid := range g.IncludeGroups {\n\t\t\t\tif includegroupid == gid {\n\t\t\t\t\th.log.Warn().Msg(fmt.Sprintf(\"Group: %d - Ignoring myself as included group\", includegroupid))\n\t\t\t\t} else {\n\t\t\t\t\tincludegroupmemberids := h.getGroupMemberIDs(includegroupid)\n\n\t\t\t\t\tfor _, includegroupmemberid := range includegroupmemberids {\n\t\t\t\t\t\tmembers[includegroupmemberid] = true\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tm := []string{}\n\tfor k := range members {\n\t\tm = append(m, k)\n\t}\n\n\tsort.Strings(m)\n\n\treturn m\n}", "title": "" }, { "docid": "e6cb5e2cc24f1fe5d4973f7f615acfdf", "score": "0.40375516", "text": "func (s *Database) getModAttributes(username string) map[string]string {\n attrs := make(map[string]string)\n stmt, err := s.db.Prepare(\"SELECT name, value FROM UserAttributes WHERE user_id = ( SELECT id FROM Users WHERE name = ? )\")\n defer stmt.Close()\n rows, err := stmt.Query(&username)\n if err != nil {\n log.Println(\"error getting mod attributes\", err)\n return attrs\n }\n defer rows.Close()\n for rows.Next() {\n var attr_name, attr_val string\n rows.Scan(&attr_name, &attr_val)\n attrs[attr_name] = attr_val\n }\n return attrs\n}", "title": "" }, { "docid": "92b0e3498a6748ac29885b4e4b78c238", "score": "0.40372956", "text": "func modPrivItem(db *sql.DB, name, privs string) error {\n\t_, err := db.Exec(`UPDATE privileges SET privileges = ? WHERE name = ?;`, privs, name)\n\treturn err\n}", "title": "" }, { "docid": "7213ab194f0a91daec680f9e9d9edb15", "score": "0.4033648", "text": "func Get(userId int64) (ps *[]Permission, err error) {\n\tvar permissions []Permission\n\to := orm.NewOrm()\n\t_, err = o.QueryTable(TABLE_NAME).\n\t\tFilter(\"user_id\", userId).\n\t\tAll(&permissions)\n\treturn &permissions, err\n}", "title": "" }, { "docid": "e3da44f5ff35757c2240586a59025032", "score": "0.403071", "text": "func (o *IamAccount) GetPrivileges() []IamPrivilegeRelationship {\n\tif o == nil {\n\t\tvar ret []IamPrivilegeRelationship\n\t\treturn ret\n\t}\n\treturn o.Privileges\n}", "title": "" }, { "docid": "21f44b4a447e5a6d66b6364fbba29f6d", "score": "0.40262243", "text": "func (m *GraphBaseServiceClient) PrivilegedRoleAssignments()(*i85eafc30b6e6233aefbca2b4e35ced0ac8836418de9401407873193666d812d9.PrivilegedRoleAssignmentsRequestBuilder) {\n return i85eafc30b6e6233aefbca2b4e35ced0ac8836418de9401407873193666d812d9.NewPrivilegedRoleAssignmentsRequestBuilderInternal(m.BaseRequestBuilder.PathParameters, m.BaseRequestBuilder.RequestAdapter)\n}", "title": "" }, { "docid": "7929b996ff3795398bf5e641af1f6408", "score": "0.40194908", "text": "func (n *AnalyzeTable) CheckPrivileges(ctx *sql.Context, opChecker sql.PrivilegedOperationChecker) bool {\n\treturn true\n}", "title": "" } ]
73f4c047d87f78e0e56bfe1c3937f488
GetChart gets a chart.
[ { "docid": "b7f0d35e24bfda755ab82bc1fd26f64b", "score": "0.7343188", "text": "func (c *Client) GetChart(ctx context.Context, id string) (*chart.Chart, error) {\n\tresp, err := c.doRequest(ctx, \"GET\", ChartAPIURL+\"/\"+id, nil, nil)\n\tif resp != nil {\n\t\tdefer resp.Body.Close()\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif resp.StatusCode != http.StatusOK {\n\t\tmessage, _ := ioutil.ReadAll(resp.Body)\n\t\treturn nil, fmt.Errorf(\"Unexpected status code: %d: %s\", resp.StatusCode, message)\n\t}\n\n\tfinalChart := &chart.Chart{}\n\n\terr = json.NewDecoder(resp.Body).Decode(finalChart)\n\t_, _ = io.Copy(ioutil.Discard, resp.Body)\n\n\treturn finalChart, err\n}", "title": "" } ]
[ { "docid": "410ce1eb35f7337aca6464e7ce338b42", "score": "0.8165147", "text": "func (c *Client) GetChart(ctx context.Context, ref string) (*chart.Chart, error) {\n\tmanifest, err := c.oci.GetManifest(ctx, ref)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(manifest.Layers) != 1 {\n\t\treturn nil, errors.New(\"unexpected number of layers\")\n\t}\n\n\tif manifest.Layers[0].MediaType != HelmChartContentLayerMediaType {\n\t\treturn nil, errors.New(\"unexpected media type of content\")\n\t}\n\n\tvar data bytes.Buffer\n\tif err := c.oci.Fetch(ctx, ref, manifest.Layers[0], &data); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn chartloader.LoadArchive(&data)\n}", "title": "" }, { "docid": "4745b9323808077b81f46486bd35db9d", "score": "0.7632938", "text": "func GetChart(cmd *cobra.Command, args []string) {\n\treq := &helmmanager.ListChartReq{}\n\n\tif !flagAll {\n\t\treq.Size = common.GetUint32P(uint32(flagNum))\n\t}\n\tif len(args) > 0 {\n\t\treq.Size = common.GetUint32P(1)\n\t}\n\treq.ProjectID = &flagProject\n\treq.Repository = &flagRepository\n\n\tc := newClientWithConfiguration()\n\tr, err := c.Chart().List(cmd.Context(), req)\n\tif err != nil {\n\t\tfmt.Printf(\"get chart failed, %s\\n\", err.Error())\n\t\tos.Exit(1)\n\t}\n\n\tif flagOutput == outputTypeJson {\n\t\tprinter.PrintChartInJson(r)\n\t\treturn\n\t}\n\n\tprinter.PrintChartInTable(flagOutput == outputTypeWide, r)\n}", "title": "" }, { "docid": "850f7b82143a8dd058b08ae8d252493b", "score": "0.76039636", "text": "func getChart(w http.ResponseWriter, req *http.Request, params Params) {\n\tdb, closer := dbSession.DB()\n\tdefer closer()\n\tvar chart models.Chart\n\tchartID := fmt.Sprintf(\"%s/%s\", params[\"repo\"], params[\"chartName\"])\n\tif err := db.C(chartCollection).FindId(chartID).One(&chart); err != nil {\n\t\tlog.WithError(err).Errorf(\"could not find chart with id %s\", chartID)\n\t\tresponse.NewErrorResponse(http.StatusNotFound, \"could not find chart\").Write(w)\n\t\treturn\n\t}\n\n\tcr := newChartResponse(&chart)\n\tresponse.NewDataResponse(cr).Write(w)\n}", "title": "" }, { "docid": "28bc684c5edbb9ccc2de3bd8269cb3c9", "score": "0.74609196", "text": "func (c *Controller) GetChart(namespace, chartName string) (ChartVersions, error) {\n\tif len(namespace) == 0 {\n\t\treturn nil, errors.New(\"empty name when getting chart versions\")\n\t}\n\n\tif len(chartName) == 0 {\n\t\treturn nil, errors.New(\"no chart name specified\")\n\t}\n\n\turl := fmt.Sprintf(\"%s/%s\", c.APIPrefix(namespace), chartName)\n\tdata, err := c.apiClient.GetContent(url)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tversions := make(ChartVersions, 0)\n\tif err := json.Unmarshal(data, &versions); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn versions, nil\n}", "title": "" }, { "docid": "3b379120f15b4af0904a2c4a329097b2", "score": "0.72393876", "text": "func getChart(c echo.Context) error {\n\tconfig, err := parseChartConfig(c)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusBadRequest, map[string]interface{}{\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t}\n\n\tmarket := c.Param(\"market\")\n\tpair := c.Param(\"pair\")\n\n\treturn c.JSON(http.StatusOK, map[string]interface{}{\n\t\t\"market\": market,\n\t\t\"pair\": pair,\n\t\t\"config\": config,\n\t})\n}", "title": "" }, { "docid": "a1034e5f143393d2b48dbab17ac550e9", "score": "0.7172756", "text": "func (c *Chart) GetChart(details *Details) (*chart.Chart, error) {\n\trepoURL := details.RepoURL\n\tif repoURL == \"\" {\n\t\t// FIXME: Make configurable\n\t\trepoURL = defaultRepoURL\n\t}\n\trepoURL = strings.TrimSuffix(strings.TrimSpace(repoURL), \"/\") + \"/index.yaml\"\n\n\tauthHeader := \"\"\n\tif details.Auth.Header != nil {\n\t\tnamespace := os.Getenv(\"POD_NAMESPACE\")\n\t\tif namespace == \"\" {\n\t\t\tnamespace = defaultNamespace\n\t\t}\n\n\t\tsecret, err := c.kubeClient.Core().Secrets(namespace).Get(details.Auth.Header.SecretKeyRef.Name, metav1.GetOptions{})\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tauthHeader = string(secret.Data[details.Auth.Header.SecretKeyRef.Key])\n\t}\n\n\tlog.Printf(\"Downloading repo %s index...\", repoURL)\n\trepoIndex, err := fetchRepoIndex(&c.netClient, repoURL, authHeader)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tchartURL, err := findChartInRepoIndex(repoIndex, repoURL, details.ChartName, details.Version)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlog.Printf(\"Downloading %s ...\", chartURL)\n\tchartRequested, err := fetchChart(&c.netClient, chartURL, authHeader, c.load)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn chartRequested, nil\n}", "title": "" }, { "docid": "75193cf35a5cd50ddd0b2191d46afaa2", "score": "0.66941786", "text": "func (g *GitChartProvider) GetChart(name string, version string) (*chart.Package, error) {\n\tmapping := g.index.GetChartVersionMapping(name, version)\n\tif mapping == nil {\n\t\treturn nil, fmt.Errorf(\"GetChart(): couldn't find commit hash from specified version\")\n\t}\n\n\tw, err := g.gitRepo.Worktree()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = w.Checkout(&git.CheckoutOptions{Hash: mapping.Hash})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tchartPath := w.Filesystem.Join(g.config.RelativeDir, name)\n\n\tp, err := chart.NewBillyChartBuilder(w.Filesystem).\n\t\tSetChartName(name).\n\t\tSetChartPath(chartPath).\n\t\tSetCommitTime(mapping.Time).\n\t\tBuild()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"GetChart(): couldn't build package %s: %s\", name, err)\n\t}\n\n\treturn p, nil\n}", "title": "" }, { "docid": "dc00f81e7a9251a1dd722ad225f166e5", "score": "0.66261685", "text": "func GetBarChart(c echo.Context) error {\n\tparams := c.Param(\"params\")\n\n\tif strings.TrimSpace(params) == \"\" {\n\t\treturn c.String(http.StatusOK, \"\")\n\t}\n\n\tdata, err := base64.StdEncoding.DecodeString(params)\n\n\tif err != nil {\n\t\tlog.Println(\"Could not decode input params:\", err)\n\t\treturn c.String(http.StatusUnprocessableEntity, \"Cound not decode params\")\n\t}\n\n\tvar input getBarChartInput\n\terr = json.Unmarshal(data, &input)\n\n\tif err != nil {\n\t\tlog.Println(\"Malformed input params:\", err)\n\t\treturn c.String(http.StatusUnprocessableEntity, \"Malformed input params\")\n\t}\n\n\tbarChartBytes, err := charts.RenderBarChartAsBytes(input.Series, \"percentage\")\n\n\tif err != nil {\n\t\tlog.Println(\"Could not generate the chart:\", err)\n\t\treturn c.String(http.StatusUnprocessableEntity, \"Could not generate the chart\")\n\t}\n\n\treturn c.Blob(http.StatusOK, \"image/png\", barChartBytes)\n}", "title": "" }, { "docid": "15e280bc227ea39747b8152bda08040b", "score": "0.6544523", "text": "func GetENGChart() (req *http.Request, res *http.Response, v ENGChart, err error) {\n\tvar b ([]byte)\n\treq, res, err = getRemoteFile(ENGChartURL)\n\tif err != nil {\n\t\treturn\n\t}\n\tb, err = ioutil.ReadAll(res.Body)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = json.Unmarshal(b, &v)\n\treturn\n}", "title": "" }, { "docid": "fec9398c9f3940123f8e0a6e9fb29a07", "score": "0.6405177", "text": "func (hm *HelmManager) GetChartDetail(ctx context.Context,\n\treq *helmmanager.GetChartDetailReq, resp *helmmanager.GetChartDetailResp) error {\n\n\tdefer recorder(ctx, \"GetChartDetail\", req, resp)()\n\taction := actionChart.NewGetChartDetailAction(hm.model, hm.platform)\n\treturn action.Handle(ctx, req, resp)\n}", "title": "" }, { "docid": "1b1ad1d84a49b38053c373eb45acc064", "score": "0.6306576", "text": "func GetChartDetail(cmd *cobra.Command, args []string) {\n\tif len(args) == 0 {\n\t\tfmt.Printf(\"get chart detail need specific chart name\\n\")\n\t\tos.Exit(1)\n\t}\n\tif len(args) == 1 {\n\t\tfmt.Printf(\"get chart detail need specific chart version\\n\")\n\t\tos.Exit(1)\n\t}\n\n\treq := &helmmanager.GetChartDetailReq{}\n\treq.ProjectID = &flagProject\n\treq.Repository = &flagRepository\n\treq.Name = common.GetStringP(args[0])\n\treq.Version = common.GetStringP(args[1])\n\n\tc := newClientWithConfiguration()\n\tr, err := c.Chart().Detail(cmd.Context(), req)\n\tif err != nil {\n\t\tfmt.Printf(\"get chart detail failed, %s\\n\", err.Error())\n\t\tos.Exit(1)\n\t}\n\n\tif flagOutput == outputTypeJson {\n\t\tprinter.PrintChartDetailInJson(r)\n\t\treturn\n\t}\n\n\tprinter.PrintChartDetailInTable(flagOutput == outputTypeWide, r)\n}", "title": "" }, { "docid": "24ca19fb03332a0b306bcd108fcfa8b7", "score": "0.6284385", "text": "func (p *Poloniex) GetChartData(ctx context.Context, currencyPair string, start, end time.Time, period string) ([]ChartData, error) {\n\tvals := url.Values{}\n\tvals.Set(\"currencyPair\", currencyPair)\n\n\tif !start.IsZero() {\n\t\tvals.Set(\"start\", strconv.FormatInt(start.Unix(), 10))\n\t}\n\n\tif !end.IsZero() {\n\t\tvals.Set(\"end\", strconv.FormatInt(end.Unix(), 10))\n\t}\n\n\tif period != \"\" {\n\t\tvals.Set(\"period\", period)\n\t}\n\n\tvar temp json.RawMessage\n\tvar resp []ChartData\n\tpath := \"/public?command=returnChartData&\" + vals.Encode()\n\terr := p.SendHTTPRequest(ctx, exchange.RestSpot, path, &temp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttempUnmarshal := json.Unmarshal(temp, &resp)\n\tif tempUnmarshal != nil {\n\t\tvar errResp struct {\n\t\t\tError string `json:\"error\"`\n\t\t}\n\t\terrRet := json.Unmarshal(temp, &errResp)\n\t\tif errRet != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif errResp.Error != \"\" {\n\t\t\treturn nil, errors.New(errResp.Error)\n\t\t}\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "17943ba57f9943337ca2bd3e1d902085", "score": "0.6277344", "text": "func GetChartData(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"content-type\", \"application/json\")\n\n\tvar rr models.ResponseResult\n\tvar user models.User\n\tif ok := user.GetLoggedIn(ctx.Get(r, \"jwtToken\")); !ok {\n\t\trr = models.ResponseResult{\n\t\t\tError: \"Token is invalid!\",\n\t\t\tResult: \"\",\n\t\t}\n\t\t_ = json.NewEncoder(w).Encode(rr)\n\t\treturn\n\t}\n\n\tvar chartDatReq models.ChartDataRequest\n\tbody, _ := ioutil.ReadAll(r.Body)\n\n\t// log.Println(\"-===================> \", string(body))\n\n\terr := json.Unmarshal(body, &chartDatReq)\n\n\tif err != nil {\n\t\trr.Error = err.Error()\n\t\t_ = json.NewEncoder(w).Encode(rr)\n\t\treturn\n\t}\n\n\t// log.Println(chartDatReq)\n\tdataFetchResult := chartDatReq.Get()\n\t_ = json.NewEncoder(w).Encode(dataFetchResult)\n\treturn\n\n}", "title": "" }, { "docid": "eca1b7a98279c69823a1060ff752628a", "score": "0.6159811", "text": "func getChart(chartData []chartjs.Point, metricName string, chartColor string) chartjs.Chart {\n\tlineTension := 0\n\n\tdataset := []chartjs.Dataset{{\n\t\tLabel: metricName,\n\t\tLineTension: &lineTension,\n\t\tData: chartData,\n\t\tBackgroundColor: chartColor,\n\t},\n\t}\n\n\tc := chartjs.Chart{\n\t\tName: metricName,\n\t\tChartType: \"line\",\n\t\tOptions: &chartjs.Options{\n\n\t\t\tScales: chartjs.Scales{\n\t\t\t\tYAxes: []chartjs.Axes{\n\t\t\t\t\t{\n\t\t\t\t\t\tTicks: &chartjs.Ticks{\n\t\t\t\t\t\t\tBeginAtZero: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tXAxes: []chartjs.Axes{\n\t\t\t\t\t{\n\t\t\t\t\t\tTime: &chartjs.Time{\n\t\t\t\t\t\t\tUnit: \"month\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\tType: \"time\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tMaintainAspectRatio: chartjs.False,\n\t\t\tResponsive: chartjs.True,\n\t\t},\n\t}\n\n\tc.Data.Datasets = dataset\n\n\treturn c\n}", "title": "" }, { "docid": "d21dc1684a544283827d108dbbef6f93", "score": "0.6108639", "text": "func getChart(c *stablev1.Chart) error {\n\texec.Command(\"helm\", \"repo\", \"update\")\n\tif err := os.MkdirAll(\"chart/\"+c.Spec.Version, os.ModePerm); err != nil {\n\t\tfmt.Printf(\"%v\\n\", err)\n\t}\n\tcmd := exec.Command(\"helm\",\n\t\t\"fetch\",\n\t\t\"--untar\",\n\t\t\"--version=\"+c.Spec.Version,\n\t\t\"--untardir=chart/\"+c.Spec.Version,\n\t\tc.Spec.Repo+\"/\"+c.Spec.Chart)\n\tvar out bytes.Buffer\n\tvar stderr bytes.Buffer\n\tcmd.Stdout = &out\n\tcmd.Stderr = &stderr\n\terr := cmd.Run()\n\tif err != nil {\n\t\tfmt.Println(fmt.Sprint(err) + \": \" + stderr.String())\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e0a25186b78c961c6e324d17a68dd1ee", "score": "0.5987894", "text": "func HelmChart(c *gin.Context) {\n\tlog := logger.WithFields(logrus.Fields{\"tag\": \"HelmChart\"})\n\tlog.Info(\"Get helm chart\")\n\n\tclusterName, ok := GetCommonClusterNameFromRequest(c)\n\tif ok != true {\n\t\treturn\n\t}\n\tlog.Debugf(\"%#v\", c)\n\tchartRepo := c.Param(\"reponame\")\n\tlog.Debugln(\"chartRepo:\", chartRepo)\n\n\tchartName := c.Param(\"name\")\n\tlog.Debugln(\"chartName:\", chartName)\n\n\tchartVersion := c.Param(\"version\")\n\tlog.Debugln(\"version:\", chartVersion)\n\n\tresponse, err := helm.ChartGet(clusterName, chartRepo, chartName, chartVersion)\n\tif err != nil {\n\t\tlog.Error(\"Error during get helm chart information.\", err.Error())\n\t\tc.JSON(http.StatusBadRequest, htype.ErrorResponse{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tMessage: \"Error during get helm chart information.\",\n\t\t\tError: err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tif response == nil {\n\t\tc.JSON(http.StatusNotFound, htype.ErrorResponse{\n\t\t\tCode: http.StatusNotFound,\n\t\t\tError: \"Chart Not Found!\",\n\t\t\tMessage: \"Chart Not Found!\",\n\t\t})\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, response)\n\treturn\n}", "title": "" }, { "docid": "308b59f817a1fcdd541b122a8403efa2", "score": "0.59591323", "text": "func GetChartVersion(cmd *cobra.Command, args []string) {\n\treq := &helmmanager.ListChartVersionReq{}\n\n\tif !flagAll {\n\t\treq.Size = common.GetUint32P(uint32(flagNum))\n\t}\n\tif len(args) == 0 {\n\t\tfmt.Printf(\"get chart version need specific chart name\\n\")\n\t\tos.Exit(1)\n\t}\n\treq.ProjectID = &flagProject\n\treq.Repository = &flagRepository\n\treq.Name = common.GetStringP(args[0])\n\n\tc := newClientWithConfiguration()\n\tr, err := c.Chart().Versions(cmd.Context(), req)\n\tif err != nil {\n\t\tfmt.Printf(\"get chart version failed, %s\\n\", err.Error())\n\t\tos.Exit(1)\n\t}\n\n\tif flagOutput == outputTypeJson {\n\t\tprinter.PrintChartVersionInJson(r)\n\t\treturn\n\t}\n\n\tprinter.PrintChartVersionInTable(flagOutput == outputTypeWide, r)\n}", "title": "" }, { "docid": "f139ee350351d15dc41ee3098af9c3e6", "score": "0.5923998", "text": "func fetchChart(netClient *HTTPClient, chartURL, authHeader string, load LoadChart) (*chart.Chart, error) {\n\treq, err := getReq(chartURL, authHeader)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tres, err := (*netClient).Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdata, err := readResponseBody(res)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn load(bytes.NewReader(data))\n}", "title": "" }, { "docid": "fc38c85f3154b6467bec204196e1673b", "score": "0.58830667", "text": "func (client *Client) GetChartRepository(request *GetChartRepositoryRequest) (response *GetChartRepositoryResponse, err error) {\n\tresponse = CreateGetChartRepositoryResponse()\n\terr = client.DoAction(request, response)\n\treturn\n}", "title": "" }, { "docid": "f371890da89a0f8ba4987af7c0faea8b", "score": "0.58817947", "text": "func (c *Controller) GetChartVersion(namespace, name, version string) (*helm_repo.ChartVersion, error) {\n\tif len(namespace) == 0 {\n\t\treturn nil, errors.New(\"empty namespace when getting summary of chart version\")\n\t}\n\n\tif len(name) == 0 || len(version) == 0 {\n\t\treturn nil, errors.New(\"invalid chart when getting summary\")\n\t}\n\n\turl := fmt.Sprintf(\"%s/%s/%s\", c.APIPrefix(namespace), name, version)\n\n\tcontent, err := c.apiClient.GetContent(url)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tchartVersion := &helm_repo.ChartVersion{}\n\tif err := yaml.Unmarshal(content, chartVersion); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn chartVersion, nil\n}", "title": "" }, { "docid": "9793234fabaf3aea9b48cb6c747d52d7", "score": "0.5821512", "text": "func (m *WorkbookWorksheet) GetCharts()([]WorkbookChartable) {\n return m.charts\n}", "title": "" }, { "docid": "27450ec31114e778ef799c2e853847d8", "score": "0.57281214", "text": "func (o *KubernetesAddonDefinitionAllOf) GetChartUrl() string {\n\tif o == nil || o.ChartUrl == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.ChartUrl\n}", "title": "" }, { "docid": "f8f83e06233ea5c5e250e12f4333dbcd", "score": "0.5607963", "text": "func (s *Space) Chart(ctx context.Context, chart string) (storage.Chart, error) {\n\tif !validateName(chart) {\n\t\treturn nil, ErrorInvalidParam.Format(\"chart\", chart)\n\t}\n\treturn NewChart(s, chart)\n}", "title": "" }, { "docid": "d6e1481d97386c3e80825942538d5544", "score": "0.55830604", "text": "func (c *CachingClient) Chart(name, version string) (*RepositoryChart, error) {\n\ttuple := nameVersion{name, version}\n\tif chart, ok := c.cache[tuple]; ok {\n\t\treturn chart, nil\n\t}\n\n\tchart, err := c.RepositoryClient.Chart(name, version)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif c.cache == nil {\n\t\tc.cache = make(map[nameVersion]*RepositoryChart)\n\t}\n\tc.cache[tuple] = chart\n\n\treturn chart, nil\n}", "title": "" }, { "docid": "f06f29961ebd20d395c2f528af3f75e1", "score": "0.5576113", "text": "func (g *GetService) Get() error {\n\tchartRepo, err := repo.NewChartRepository(&g.config, getter.All(environment.EnvSettings{}))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdownloadedIndexPath := path.Join(g.config.Name, downloadedFileName)\n\terr = chartRepo.DownloadIndexFile(downloadedIndexPath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = chartRepo.Load()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tindex := search.NewIndex()\n\tindex.AddRepo(chartRepo.Config.Name, chartRepo.IndexFile, (g.allVersions || g.chartVersion != \"\"))\n\trexp := fmt.Sprintf(\"^.*%s.*\", g.chartName)\n\tres, err := index.Search(rexp, 1, true)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, r := range res {\n\t\tif g.chartName != \"\" && r.Chart.Name != g.chartName {\n\t\t\tcontinue\n\t\t}\n\t\tif g.chartVersion != \"\" && r.Chart.Version != g.chartVersion {\n\t\t\tcontinue\n\t\t}\n\t\tfor _, u := range r.Chart.URLs {\n\t\t\tb, err := chartRepo.Client.Get(u)\n\t\t\tif err != nil {\n\t\t\t\tif g.ignoreErrors {\n\t\t\t\t\tg.logger.Printf(\"WARNING: processing chart %s(%s) - %s\", r.Name, r.Chart.Version, err)\n\t\t\t\t\tcontinue\n\t\t\t\t} else {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t\tchartFileName := fmt.Sprintf(\"%s-%s.tgz\", r.Chart.Name, r.Chart.Version)\n\t\t\tchartPath := path.Join(g.config.Name, chartFileName)\n\t\t\terr = writeFile(chartPath, b.Bytes(), g.logger, g.ignoreErrors)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\terr = prepareIndexFile(g.config.Name, g.config.URL, g.newRootURL, g.logger, g.ignoreErrors)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "697e477cf998897ec2d697ff88e57708", "score": "0.5550722", "text": "func DownloadChart(repo string, chart string, version string, dest string) (chartPath string, err error) {\n\n\tsettings := cli.New()\n\n\tactionConfig := new(action.Configuration)\n\tif err := actionConfig.Init(settings.RESTClientGetter(), settings.Namespace(), os.Getenv(\"HELM_DRIVER\"), debug); err != nil {\n\t\treturn \"\", err\n\t}\n\n\tclient := action.NewInstall(actionConfig)\n\n\tp := getter.All(settings)\n\n\tchartDownloader := &downloader.ChartDownloader{\n\t\tOut: os.Stdout,\n\t\tVerify: downloader.VerifyIfPossible,\n\t\tKeyring: client.ChartPathOptions.Keyring,\n\t\tGetters: p,\n\t\tOptions: []getter.Option{},\n\t\tRepositoryConfig: settings.RepositoryConfig,\n\t\tRepositoryCache: settings.RepositoryCache,\n\t}\n\n\tchartRef := fmt.Sprintf(\"%s/%s\", repo, chart)\n\thelpers.CreateDestDir(dest)\n\n\tpath, _, err := chartDownloader.DownloadTo(chartRef, version, dest)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tfmt.Printf(\"Chart downloaded to %s\\n\", path)\n\n\treturn path, nil\n}", "title": "" }, { "docid": "893c322d09565f3df030104a2f5f9a6e", "score": "0.5424317", "text": "func (o ApplicationOperationSyncSourceOutput) Chart() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApplicationOperationSyncSource) *string { return v.Chart }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "03166007dcf0f6dc99a92be4171cd4e5", "score": "0.54143274", "text": "func (o ApplicationSpecSourceOutput) Chart() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApplicationSpecSource) *string { return v.Chart }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "fd1ed5dbfeed1df48262dc16533d916e", "score": "0.5389766", "text": "func (w *Worker) loadChart(u string) (*chart.Chart, error) {\n\t// Rate limit requests to Github to avoid them being rejected\n\tif strings.HasPrefix(u, \"https://github.com\") {\n\t\t_ = w.rl.Wait(w.ctx)\n\t}\n\n\tresp, err := w.hg.Get(u)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\tif resp.StatusCode == http.StatusOK {\n\t\tchart, err := loader.LoadArchive(resp.Body)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn chart, nil\n\t}\n\treturn nil, fmt.Errorf(\"unexpected status code received: %d\", resp.StatusCode)\n}", "title": "" }, { "docid": "e385e5b8fdb5d1ec470c9c82bc71dbe1", "score": "0.53758514", "text": "func HelmCharts(c *gin.Context) {\n\tlog := logger.WithFields(logrus.Fields{\"tag\": \"HelmCharts\"})\n\tlog.Info(\"Get helm repository charts\")\n\n\tclusterName, ok := GetCommonClusterNameFromRequest(c)\n\tif ok != true {\n\t\treturn\n\t}\n\n\tvar query ChartQuery\n\terr := c.BindQuery(&query)\n\tif err != nil {\n\t\tlog.Errorf(\"Error parsing request: %s\", err.Error())\n\t\tc.JSON(http.StatusBadRequest, htype.ErrorResponse{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tMessage: \"error parsing request\",\n\t\t\tError: err.Error(),\n\t\t})\n\t\treturn\n\t}\n\n\tlog.Info(query)\n\n\tresponse, err := helm.ChartsGet(clusterName, query.Name, query.Repo, query.Version)\n\tif err != nil {\n\t\tlog.Error(\"Error during get helm repo chart list.\", err.Error())\n\t\tc.JSON(http.StatusBadRequest, htype.ErrorResponse{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tMessage: \"Error listing helm repo charts\",\n\t\t\tError: err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tc.JSON(http.StatusOK, response)\n\treturn\n}", "title": "" }, { "docid": "b74de98ff2fef3e02da8535cb0acb09e", "score": "0.53454465", "text": "func downloadChart(client client.Client, s *releasev1.HelmRelease) (string, error) {\n\tconfigMap, err := rUtils.GetConfigMap(client, s.Namespace, s.Repo.ConfigMapRef)\n\tif err != nil {\n\t\tklog.Error(err)\n\t\treturn \"\", err\n\t}\n\n\tsecret, err := rUtils.GetSecret(client, s.Namespace, s.Repo.SecretRef)\n\tif err != nil {\n\t\tklog.Error(err, \" - Failed to retrieve secret \", s.Repo.SecretRef.Name)\n\t\treturn \"\", err\n\t}\n\n\tchartsDir := os.Getenv(releasev1.ChartsDir)\n\tif chartsDir == \"\" {\n\t\tchartsDir, err = ioutil.TempDir(\"/tmp\", \"charts\")\n\t\tif err != nil {\n\t\t\tklog.Error(err, \" - Can not create tempdir\")\n\t\t\treturn \"\", err\n\t\t}\n\t}\n\n\tchartDir, err := rUtils.DownloadChart(configMap, secret, chartsDir, s)\n\tklog.V(3).Info(\"ChartDir: \", chartDir)\n\n\tif err != nil {\n\t\tklog.Error(err, \" - Failed to download the chart\")\n\t\treturn \"\", err\n\t}\n\n\treturn chartDir, nil\n}", "title": "" }, { "docid": "fa9ca40128329040ff0c095a9c2a665e", "score": "0.53452253", "text": "func (m *WorkbookChartAxes) GetCategoryAxis()(WorkbookChartAxisable) {\n return m.categoryAxis\n}", "title": "" }, { "docid": "ba35e99cf4d578e18e6673d9b343f57a", "score": "0.53364724", "text": "func NewChart(kubeClient kubernetes.Interface, netClient HTTPClient, load LoadChart) *Chart {\n\treturn &Chart{\n\t\tkubeClient,\n\t\tnetClient,\n\t\tload,\n\t}\n}", "title": "" }, { "docid": "b2eb876c303b5a70c5bd3a4b2acf4d10", "score": "0.5334936", "text": "func (o ApplicationOperationSyncSourcePtrOutput) Chart() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ApplicationOperationSyncSource) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Chart\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "108f84d94c5818f323a188a198398b43", "score": "0.5321633", "text": "func (o ApplicationSpecSourcePtrOutput) Chart() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ApplicationSpecSource) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Chart\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6ee49e62ca1c9e84b088ef48afc1cff1", "score": "0.5318309", "text": "func (o ApplicationStatusHistorySourceOutput) Chart() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApplicationStatusHistorySource) *string { return v.Chart }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "edf45286334c193e32aeea0f280b29e7", "score": "0.5228491", "text": "func (o ApplicationStatusHistorySourcePtrOutput) Chart() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ApplicationStatusHistorySource) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Chart\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9e62dbafbc506036487eeb774b905879", "score": "0.5209561", "text": "func getChartVersion(w http.ResponseWriter, req *http.Request, params Params) {\n\tdb, closer := dbSession.DB()\n\tdefer closer()\n\tvar chart models.Chart\n\tchartID := fmt.Sprintf(\"%s/%s\", params[\"repo\"], params[\"chartName\"])\n\tif err := db.C(chartCollection).Find(bson.M{\n\t\t\"_id\": chartID,\n\t\t\"chartversions\": bson.M{\"$elemMatch\": bson.M{\"version\": params[\"version\"]}},\n\t}).Select(bson.M{\n\t\t\"name\": 1, \"repo\": 1, \"description\": 1, \"home\": 1, \"keywords\": 1, \"maintainers\": 1, \"sources\": 1,\n\t\t\"chartversions.$\": 1,\n\t}).One(&chart); err != nil {\n\t\tlog.WithError(err).Errorf(\"could not find chart with id %s\", chartID)\n\t\tresponse.NewErrorResponse(http.StatusNotFound, \"could not find chart version\").Write(w)\n\t\treturn\n\t}\n\n\tcvr := newChartVersionResponse(&chart, chart.ChartVersions[0])\n\tresponse.NewDataResponse(cvr).Write(w)\n}", "title": "" }, { "docid": "681a48c6296bb93774c92cc13d6746d0", "score": "0.5180019", "text": "func GetDogsChartData(c echo.Context) error {\n\tdata, err := model.GetDogsChartData()\n\tif err != nil {\n\t\treturn c.JSON(http.StatusServiceUnavailable, \"Unable to complete the request\")\n\t}\n\treturn c.JSON(http.StatusOK, data)\n}", "title": "" }, { "docid": "5c2d0354359740757bd367474c430a10", "score": "0.5171203", "text": "func GetLineChart() *linechart.LineChart {\n\tlc, err := linechart.New(\n\t\tlinechart.AxesCellOpts(cell.FgColor(cell.ColorWhite)),\n\t\tlinechart.YLabelCellOpts(cell.FgColor(cell.ColorWhite)),\n\t\tlinechart.XLabelCellOpts(cell.FgColor(cell.ColorWhite)),\n\t\tlinechart.XAxisUnscaled(),\n\t\tlinechart.YAxisCustomScale(0.00, 0.80),\n\t)\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tgo playLineChart(lc)\n\treturn lc\n}", "title": "" }, { "docid": "7554bdced466df317917c488d7534d9d", "score": "0.5168199", "text": "func GetChartSource(path string) ([]byte, error) {\n\tpack := helm.NewPackage()\n\tpackagedPath, err := pack.Run(path, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t//nolint: errcheck\n\t//#nosec G307\n\tdefer os.Remove(packagedPath)\n\tpackaged, err := ioutil.ReadFile(packagedPath) // #nosec G304\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn packaged, nil\n}", "title": "" }, { "docid": "33b285da00435473e742bbb2357def05", "score": "0.5167225", "text": "func (_m *Handler) GetMusicChart(c echo.Context) error {\n\tret := _m.Called(c)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(echo.Context) error); ok {\n\t\tr0 = rf(c)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "70acf44030b2d2960816be9b93fa5238", "score": "0.51641554", "text": "func (h *Handlers) Get(w http.ResponseWriter, r *http.Request) {\n\tinput := &hub.GetPackageInput{\n\t\tPackageName: chi.URLParam(r, \"packageName\"),\n\t\tVersion: chi.URLParam(r, \"version\"),\n\t}\n\tchartRepositoryName := chi.URLParam(r, \"repoName\")\n\tif chartRepositoryName != \"\" {\n\t\tinput.ChartRepositoryName = chartRepositoryName\n\t}\n\tdataJSON, err := h.pkgManager.GetJSON(r.Context(), input)\n\tif err != nil {\n\t\th.logger.Error().Err(err).Interface(\"input\", input).Str(\"method\", \"Get\").Send()\n\t\tif errors.Is(err, pkg.ErrInvalidInput) {\n\t\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\t} else if errors.Is(err, pkg.ErrNotFound) {\n\t\t\thttp.NotFound(w, r)\n\t\t} else {\n\t\t\thttp.Error(w, \"\", http.StatusInternalServerError)\n\t\t}\n\t\treturn\n\t}\n\thelpers.RenderJSON(w, dataJSON, helpers.DefaultAPICacheMaxAge)\n}", "title": "" }, { "docid": "be0fba8dbf29b080928a60c77bd0a928", "score": "0.5143665", "text": "func (c *ChartMuseumClient) DownloadChart(filepath string, name string, version string, sourceRepo *api.Repo, index *helmRepo.IndexFile) error {\n\tklog.V(3).Infof(\"Downloading %s-%s from Chartmuseum repo\", name, version)\n\tapiEndpoint, err := utils.FindChartURL(name, version, index, sourceRepo.Url)\n\tif err != nil {\n\t\treturn errors.Trace(err)\n\t}\n\tif err := downloadFromChartMuseumLike(apiEndpoint, filepath, sourceRepo); err != nil {\n\t\treturn errors.Trace(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c6d06451cdecbe4103d691680c240afe", "score": "0.5137359", "text": "func (o ApplicationStatusSyncComparedToSourcePtrOutput) Chart() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ApplicationStatusSyncComparedToSource) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Chart\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "7075e8f7dad410b355d426a04e23fbf2", "score": "0.5128864", "text": "func (o ApplicationStatusSyncComparedToSourceOutput) Chart() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApplicationStatusSyncComparedToSource) *string { return v.Chart }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "fbf38774812b42c9de9498b83b364c44", "score": "0.5126742", "text": "func downloadChart(ctx context.Context, name, version, downloadDestination, stableRepoURL string, helmSettings HelmAccess) (string, error) {\n\tproviders := getter.All(environment.EnvSettings{})\n\tdl := downloader.ChartDownloader{\n\t\tGetters: providers,\n\t\tHelmHome: helmpath.Home(helmSettings.HelmPath),\n\t\tOut: os.Stdout,\n\t}\n\n\terr := ensureCacheIndex(ctx, helmSettings, stableRepoURL, providers)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Download the chart\n\tfilename, _, err := dl.DownloadTo(name, version, downloadDestination)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tlname, err := filepath.Abs(filename)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\terr = archiver.Unarchive(lname, downloadDestination)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\terr = os.Remove(lname)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn lname, nil\n}", "title": "" }, { "docid": "84353a4fd4978fd426f49af2a000ca45", "score": "0.5117148", "text": "func (pc PieChart) GetHeight() int {\n\tif pc.Height == 0 {\n\t\treturn DefaultChartWidth\n\t}\n\treturn pc.Height\n}", "title": "" }, { "docid": "b4d8fdb9aa012e094fb4b22950c1e9b5", "score": "0.5114953", "text": "func GetCatsChartData(c echo.Context) error {\n\tdata, err := model.GetCatsChartData()\n\tif err != nil {\n\t\treturn c.JSON(http.StatusServiceUnavailable, \"Unable to complete the request\")\n\t}\n\treturn c.JSON(http.StatusOK, data)\n}", "title": "" }, { "docid": "ee4e440e1d94785e041ad914da8e6e19", "score": "0.5103562", "text": "func (o ApplicationStatusOperationStateOperationSyncSourceOutput) Chart() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApplicationStatusOperationStateOperationSyncSource) *string { return v.Chart }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "974aa3ee091a9b19b78189ccb63e9dcc", "score": "0.5090174", "text": "func GetEtcdChartPath() string {\n\treturn filepath.Join(\"..\", \"..\", \"..\", \"..\", \"charts\", \"etcd\")\n}", "title": "" }, { "docid": "000c62661238db2a4799f0371830861a", "score": "0.5061474", "text": "func InitChart() Chart {\n\treturn Chart{Init(&CommandItem{\n\t\tName: \"chart\",\n\t\tDescription: \"Generates a chart for listens\",\n\t\tAliases: []string{},\n\t\tUsage: \"chart --period weekly\",\n\t\tParameters: []Parameter{\n\t\t\t{\n\t\t\t\tName: \"period\",\n\t\t\t\tValue: \"overall|yearly|monthly|weekly\",\n\t\t\t\tDescription: \"Gets your chart based on a given period of time\",\n\t\t\t\tRequired: false,\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"type\",\n\t\t\t\tValue: \"artist|album\",\n\t\t\t\tDescription: \"Gets a specific type of chart\",\n\t\t\t\tRequired: false,\n\t\t\t},\n\t\t},\n\t})}\n}", "title": "" }, { "docid": "690e2b4ea0c3d0f1778ed50e6cf3cf8d", "score": "0.50613", "text": "func GetPlot(c *fiber.Ctx) error {\n\t/*\n\t * Getting the context\n\t * getting the plot id\n\t * finding the plot info from db\n\t * returning the response\n\t */\n\t//getting the context\n\tctx, err := config.GetContext(c)\n\tif err != nil {\n\t\t//error while getting the context\n\t\treturn err\n\t}\n\n\t//getting the params\n\tid := c.Params(\"id\")\n\tparsedId, err := strconv.ParseUint(id, 10, 64)\n\tif err != nil {\n\t\t//error while parsing the plot id\n\t\tctx.Log.WithFields(log.Fields{\"error\": err}).Errorf(\"given plot id %s not a valid uint\", id)\n\t\treturn c.Status(422).JSON(config.Error(\"plot id not a valid integer\"))\n\t}\n\n\t//finding the plot from db\n\tplot := &db.Plot{}\n\terr = plot.FindByID(ctx, uint(parsedId))\n\tif err != nil {\n\t\t//couldn't find the plot for the given id\n\t\tctx.Log.WithFields(log.Fields{\"error\": err}).Errorf(\"given plot id %d doesn't exist\", parsedId)\n\t\treturn c.Status(404).JSON(config.Error(\"plot not found\"))\n\t}\n\n\t//return the response\n\treturn c.JSON(config.Success(dto.FromPlot(*plot), \"plot\"))\n}", "title": "" }, { "docid": "de10d86df33e7c83427f023fa21ce2e6", "score": "0.5008469", "text": "func (b *Poloniex) ChartData(currencyPair string, period int, start, end time.Time) (candles []*CandleStick, err error) {\n\tr, err := b.client.do(\"GET\", fmt.Sprintf(\n\t\t\"public?command=returnChartData&currencyPair=%s&period=%d&start=%d&end=%d\",\n\t\tstrings.ToUpper(currencyPair),\n\t\tperiod,\n\t\tstart.Unix(),\n\t\tend.Unix(),\n\t), nil, false)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tif err = json.Unmarshal(r, &candles); err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "b503ac1efd08ef30f3060b3c7d5e7071", "score": "0.49310398", "text": "func (controller *playgroundController) GetGraph(ctx context.Context, info *pb.GetGraphRequest) (*pb.GetGraphResponse, error) {\n\tpipelineId, err := uuid.Parse(info.PipelineUuid)\n\terrorMessage := \"Error during getting graph output\"\n\tif err != nil {\n\t\tlogger.Errorf(\"%s: GetGraph(): pipelineId has incorrect value and couldn't be parsed as uuid value: %s\", info.PipelineUuid, err.Error())\n\t\treturn nil, cerrors.InvalidArgumentError(errorMessage, \"pipelineId has incorrect value and couldn't be parsed as uuid value: %s\", info.PipelineUuid)\n\t}\n\tgraph, err := code_processing.GetGraph(ctx, controller.cacheService, pipelineId, errorMessage)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &pb.GetGraphResponse{Graph: graph}, nil\n}", "title": "" }, { "docid": "0d8df81524280a30f4eefe28e5afdc1b", "score": "0.49208683", "text": "func GetDeployment(t *testing.T, k8client client.Client, deployName string) (*appsv1.Deployment, error) {\n\tdeploy := &appsv1.Deployment{}\n\tns := \"default\"\n\terr := k8client.Get(goctx.TODO(), types.NamespacedName{Namespace: ns, Name: deployName}, deploy)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Deployment doesnt exist: %v\", err)\n\t}\n\n\treturn deploy, nil\n}", "title": "" }, { "docid": "9c7201fb2542ac5479927bdfb2a61616", "score": "0.49136135", "text": "func (c Chart) GetFont() (*truetype.Font, error) {\n\tif c.Font == nil {\n\t\tf, err := GetDefaultFont()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn f, nil\n\t}\n\treturn c.Font, nil\n}", "title": "" }, { "docid": "a0ab1114d34fa06f9aaf672360af4ffd", "score": "0.4905572", "text": "func (o ApplicationStatusOperationStateOperationSyncSourcePtrOutput) Chart() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ApplicationStatusOperationStateOperationSyncSource) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Chart\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "885e916b88077db518a81176ed7366b5", "score": "0.49053606", "text": "func (c *chart) renderChart() (string, error) {\n\tchartData := metricsToPoints(c.metrics)\n\n\tchart := getChart(chartData, c.metricName, c.color)\n\n\ts, err := chart.Render()\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"rendering chart failed\")\n\t}\n\n\treturn s, nil\n}", "title": "" }, { "docid": "0c3c1a1c486e81f74be705730a1ec597", "score": "0.49000564", "text": "func downloadChart(helm helm.Client, destFolder string, source *helmfluxv1.RepoChartSource) (string, error) {\n\treturn helm.PullWithRepoURL(source.RepoURL, source.Name, source.Version, destFolder)\n}", "title": "" }, { "docid": "3a270bd869f179e4f24e6f3cd6314dc0", "score": "0.48939022", "text": "func (m *Manager) GetByName(ctx context.Context, name string) (*hub.ChartRepository, error) {\n\tvar r *hub.ChartRepository\n\terr := m.dbQueryUnmarshal(ctx, &r, \"select get_chart_repository_by_name($1::text)\", name)\n\treturn r, err\n}", "title": "" }, { "docid": "776aab438e39e56cd4f09291eb951144", "score": "0.48935992", "text": "func (m *MarketClient) GetCandlestick(symbol, interval string, limit int32, startTime, endTime int64) (interface{}, error) {\n\tvar err error\n\tif symbol == \"\" {\n\t\terr = errors.New(SymbolEmpty)\n\t\treturn nil, err\n\t}\n\tif interval == \"\" {\n\t\terr = errors.New(IntervalEmpty)\n\t\treturn nil, err\n\t}\n\tparams := fmt.Sprintf(\"symbol=%s&interval=%s\", symbol, interval)\n\tif limit > 1000 {\n\t\tlimit = 1000\n\t}\n\tif limit > 0 {\n\t\tparams += fmt.Sprintf(\"&limit=%d\", limit)\n\t}\n\tif startTime > 0 {\n\t\tparams += fmt.Sprintf(\"&startTime=%d\", startTime)\n\t}\n\tif endTime > 0 {\n\t\tparams += fmt.Sprintf(\"&endTime=%d\", endTime)\n\t}\n\treq, err := m.Builder.Build(http.MethodGet, \"/api/v3/klines\", params)\n\tif err != nil {\n\t\tlogger.Error(\"Failed to build url: %s\", err.Error())\n\t}\n\tres, err := binance.HttpRequest(req)\n\tvar parser map[string]interface{}\n\terr = json.Unmarshal(res, &parser)\n\tif _, ok := parser[\"code\"]; ok {\n\t\tresult := model.APIErrorResponse{}\n\t\terr = json.Unmarshal(res, &result)\n\t\treturn result, err\n\t}\n\tresult := CandlestickResponse{}\n\terr = json.Unmarshal(res, &result)\n\treturn result, err\n}", "title": "" }, { "docid": "96423547f97d0f39f410abebae46353c", "score": "0.4892731", "text": "func (o ApplicationStatusOperationStateSyncResultSourceOutput) Chart() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApplicationStatusOperationStateSyncResultSource) *string { return v.Chart }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "03a16995733c5849d64e82b4bd65230e", "score": "0.4892662", "text": "func (a *WorkbooksWorkbookWorksheetsWorkbookChartApiService) WorkbooksWorkbookWorksheetsGetCharts(ctx _context.Context, driveItemId string, workbookWorksheetId string, workbookChartId string, localVarOptionals *WorkbooksWorkbookWorksheetsGetChartsOpts) (MicrosoftGraphWorkbookChart, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue MicrosoftGraphWorkbookChart\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/workbooks({driveItem-id})/workbook/worksheets({workbookWorksheet-id})/charts({workbookChart-id})\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"driveItem-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", driveItemId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"workbookWorksheet-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", workbookWorksheetId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"workbookChart-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", workbookChartId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Select_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(localVarOptionals.Select_.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Expand.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(localVarOptionals.Expand.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v MicrosoftGraphWorkbookChart\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "663ee2bb82b015ae0cd40b38b65f935f", "score": "0.48776448", "text": "func GetGraph(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *GraphState, opts ...pulumi.ResourceOption) (*Graph, error) {\n\tvar resource Graph\n\terr := ctx.ReadResource(\"aws:detective/graph:Graph\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "1ff15c6e8f910b3dfbdcab30371bb6c8", "score": "0.4872259", "text": "func (c *delegatingScaleInterface) Get(kind string, name string) (result *extensionsv1beta1.Scale, err error) {\n\tswitch {\n\tcase kind == \"DeploymentConfig\":\n\t\treturn c.dcs.GetScale(name, metav1.GetOptions{})\n\t\t// TODO: This is borked because the interface for Get is broken. Kind is insufficient.\n\tdefault:\n\t\treturn c.scales.Get(kind, name)\n\t}\n}", "title": "" }, { "docid": "f263e3773c8648cdbde2c4fa55fe4be9", "score": "0.48514995", "text": "func (k *HelmChart) GetConfig() *config.Config {\n\treturn k.env.config\n}", "title": "" }, { "docid": "c813a58d7021ad4671127d38bb64facb", "score": "0.4849255", "text": "func (m *WorkbookChartAxes) GetValueAxis()(WorkbookChartAxisable) {\n return m.valueAxis\n}", "title": "" }, { "docid": "1e0e1925303690acc0716726ef6fb093", "score": "0.48489726", "text": "func (v Ver) GetChartsDir() string {\n\tif len(common.Config.Rendering.ChartsDir) == 0 {\n\t\treturn path.Join(common.Config.Rendering.ResourceDir, \"helm\", v.String())\n\t}\n\treturn path.Join(common.Config.Rendering.ChartsDir, v.String())\n}", "title": "" }, { "docid": "115301d8872e2eddea0ccc7106b749ab", "score": "0.48414055", "text": "func (a *WorkbooksWorkbookWorksheetsWorkbookChartApiService) WorkbooksWorkbookWorksheetsChartsGetFormat(ctx _context.Context, driveItemId string, workbookWorksheetId string, workbookChartId string, localVarOptionals *WorkbooksWorkbookWorksheetsChartsGetFormatOpts) (MicrosoftGraphWorkbookChartAreaFormat, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue MicrosoftGraphWorkbookChartAreaFormat\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/workbooks({driveItem-id})/workbook/worksheets({workbookWorksheet-id})/charts({workbookChart-id})/format\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"driveItem-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", driveItemId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"workbookWorksheet-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", workbookWorksheetId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"workbookChart-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", workbookChartId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Select_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(localVarOptionals.Select_.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Expand.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(localVarOptionals.Expand.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v MicrosoftGraphWorkbookChartAreaFormat\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "61e01e434d7b293ec349d197f92c1be9", "score": "0.48234263", "text": "func getChartIcon(w http.ResponseWriter, req *http.Request, params Params) {\n\tdb, closer := dbSession.DB()\n\tdefer closer()\n\tvar chart models.Chart\n\tchartID := fmt.Sprintf(\"%s/%s\", params[\"repo\"], params[\"chartName\"])\n\tif err := db.C(chartCollection).FindId(chartID).One(&chart); err != nil {\n\t\tlog.WithError(err).Errorf(\"could not find chart with id %s\", chartID)\n\t\thttp.NotFound(w, req)\n\t\treturn\n\t}\n\n\tif chart.RawIcon == nil {\n\t\thttp.NotFound(w, req)\n\t\treturn\n\t}\n\n\tif chart.IconContentType != \"\" {\n\t\t// Force the Content-Type header because the autogenerated type does not work for\n\t\t// image/svg+xml. It is detected as plain text\n\t\tw.Header().Set(\"Content-Type\", chart.IconContentType)\n\t}\n\n\tw.Write(chart.RawIcon)\n}", "title": "" }, { "docid": "7258e7e80a41e3fa214871c2aedacf9a", "score": "0.48172987", "text": "func (api *HWApi) GetAnalytics(dt string, accountHash string, query interface{}) (*Analytics, error) {\n\n\tr, e := api.Request(\n\t\t&Request{\n\t\t\tMethod: GET,\n\t\t\tURL: fmt.Sprintf(\"/api/v1/accounts/%s/analytics/%s\", accountHash, dt),\n\t\t\tQuery: query.(map[string]string),\n\t\t},\n\t)\n\tif e != nil {\n\t\treturn nil, e\n\t}\n\tal := &Analytics{}\n\treturn al, json.Unmarshal(r.body, al)\n}", "title": "" }, { "docid": "fdd134a437d78f0afa2ba79e316732f3", "score": "0.48022667", "text": "func generateChartResource(versions repo.ChartVersions, name string, cr *v1beta1.ChartRepo) *v1beta1.Chart {\n\n\tlabels := map[string]string{\n\t\t\"repo\": cr.GetName(),\n\t}\n\tif cr.GetLabels() != nil {\n\t\tproject := cr.GetLabels()[util.ProjectKey]\n\t\tif project != \"\" {\n\t\t\tlabels[util.ProjectKey] = project\n\t\t}\n\t}\n\n\tvar vs []*v1beta1.ChartVersion\n\tfor _, v := range versions {\n\t\tvs = append(vs, &v1beta1.ChartVersion{ChartVersion: *v})\n\t}\n\n\tspec := v1beta1.ChartSpec{\n\t\tVersions: vs,\n\t}\n\n\tchart := v1beta1.Chart{\n\t\tTypeMeta: v1.TypeMeta{\n\t\t\tKind: \"Chart\",\n\t\t\tAPIVersion: \"app.alauda.io/v1alpha1\",\n\t\t},\n\t\tObjectMeta: v1.ObjectMeta{\n\t\t\tName: getChartName(cr.GetName(), name),\n\t\t\tNamespace: cr.GetNamespace(),\n\t\t\tLabels: labels,\n\t\t\tOwnerReferences: []v1.OwnerReference{\n\t\t\t\t*util.NewOwnerRef(cr, schema.GroupVersionKind{\n\t\t\t\t\tGroup: \"app.alauda.io\",\n\t\t\t\t\tVersion: \"v1alpha1\",\n\t\t\t\t\tKind: \"ChartRepo\",\n\t\t\t\t}),\n\t\t\t},\n\t\t},\n\t\tSpec: spec,\n\t}\n\n\treturn &chart\n\n}", "title": "" }, { "docid": "0000006997cc3bf85d1d461505797910", "score": "0.4772212", "text": "func (a *Adapter) Get(ctx context.Context, categoryCode string) (categoryDomain.Category, error) {\n\tt, err := a.categoryRepository.Category(ctx, categoryCode)\n\tif err == categoryDomain.ErrNotFound {\n\t\ta.logger.Warn(err)\n\t\treturn t, err\n\t}\n\tif err != nil {\n\t\ta.logger.Error(err)\n\t}\n\treturn t, err\n}", "title": "" }, { "docid": "c103b472fd3a9e99892d850ccfad80c6", "score": "0.4767847", "text": "func NewChart(systems map[globals.Component]*SystemStamp) *Chart {\n\treturn &Chart{\n\t\t&sync.Mutex{},\n\t\tsystems,\n\t}\n}", "title": "" }, { "docid": "ee19abed6605712f13116e9e69ba8c81", "score": "0.4756407", "text": "func (c baseClient) GetEngine(ctx context.Context) (containerd.Container, error) {\n\tctx = namespaces.WithNamespace(ctx, engineNamespace)\n\tcontainers, err := c.cclient.Containers(ctx, \"id==\"+engineContainerName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(containers) == 0 {\n\t\treturn nil, ErrEngineNotPresent\n\t}\n\treturn containers[0], nil\n}", "title": "" }, { "docid": "08e6a55899c6ea9567b66bab682a08e0", "score": "0.4747933", "text": "func Load(chart string) (*Chart, error) {\n\tif fi, err := os.Stat(chart); err != nil {\n\t\treturn nil, err\n\t} else if !fi.IsDir() {\n\t\treturn nil, fmt.Errorf(\"Chart %s is not a directory.\", chart)\n\t}\n\n\tcf, err := LoadChartfile(filepath.Join(chart, \"Chart.yaml\"))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc := &Chart{\n\t\tChartfile: cf,\n\t\tKind: map[string][]*manifest.Manifest{},\n\t}\n\n\tms, err := manifest.ParseDir(chart)\n\tif err != nil {\n\t\treturn c, err\n\t}\n\n\tc.attachManifests(ms)\n\n\treturn c, nil\n}", "title": "" }, { "docid": "bb12c98dae946d3afa7b45492d12ffd3", "score": "0.47313038", "text": "func (bgPtr *baseGraph) GetGraph() *gographviz.Graph {\n\treturn bgPtr.graph\n}", "title": "" }, { "docid": "689342359735b98b204040e6f9b5dc90", "score": "0.47273093", "text": "func (c *Controller) ListCharts(namespace string) ([]*ChartInfo, error) {\n\tif len(strings.TrimSpace(namespace)) == 0 {\n\t\treturn nil, errors.New(\"empty namespace when getting chart list\")\n\t}\n\n\tcontent, err := c.apiClient.GetContent(c.APIPrefix(namespace))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn c.chartOperator.GetChartList(content)\n}", "title": "" }, { "docid": "886bf421c61297518114d69044510d75", "score": "0.4722134", "text": "func (o ApplicationStatusOperationStateSyncResultSourcePtrOutput) Chart() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ApplicationStatusOperationStateSyncResultSource) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Chart\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ac329e6f8bd134954b2d87954d10bfcb", "score": "0.4700738", "text": "func (b *Box) FetchCharts(params ...Param) (*GroupListData, error) {\n\tresp := new(GroupListData)\n\turl := ChartURL\n\terr := b.fetchData(url, resp, params...)\n\n\treturn resp, err\n}", "title": "" }, { "docid": "25b3962a5570c0220dd1bae7d9c5faac", "score": "0.46970183", "text": "func (c *delegatingScaleInterface) Get(kind string, name string) (result *extensions.Scale, err error) {\n\tswitch {\n\tcase kind == \"DeploymentConfig\":\n\t\treturn c.dcs.GetScale(name)\n\tcase latest.OriginKind(kind, \"\"):\n\t\treturn nil, errors.NewBadRequest(fmt.Sprintf(\"Kind %s has no Scale subresource\", kind))\n\tdefault:\n\t\treturn c.scales.Get(kind, name)\n\t}\n}", "title": "" }, { "docid": "08628374633f305a7b154f90f69c0f20", "score": "0.46957222", "text": "func GetVersionedChartName(name, version string) string {\n\treturn fmt.Sprintf(\"%s-%s\", name, version)\n}", "title": "" }, { "docid": "e52906cb417d7ed437f319d3965b5582", "score": "0.46945938", "text": "func (d Display) GetCanvas() Canvas {\n\tcPtr := C.caca_get_canvas(d.Dp)\n\n\treturn Canvas{Cv: cPtr}\n}", "title": "" }, { "docid": "3ecc8a2540a9131464db7dac99b17ca7", "score": "0.46891308", "text": "func (cos *ComicService) Get(comicID int) (*Comic, error) {\n\twrap, _, err := cos.GetWrapped(comicID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &wrap.Data.Results[0], nil\n}", "title": "" }, { "docid": "fa8db2db62cd56526cfaeedaf19ed8d4", "score": "0.4688693", "text": "func (h *V1Visualizations) VisualizationsGet(clients *common.ClientContainer,\n\torganizationID, name string, tags map[string]interface{}) (\n\t*[]common.VisualizationWithDashboards, error) {\n\tlog.Logger.Debug(\"Querying data to user according to name and tags\")\n\n\tdata, err := clients.DatabaseManager.QueryVisualizationsDashboards(\n\t\t\"\", name, organizationID, tags)\n\tif err != nil {\n\t\tlog.Logger.Errorf(\"Error getting data from db: '%s'\", err)\n\t\treturn nil, err\n\t}\n\n\treturn GroupedVisualizationDashboardToResponse(data), nil\n}", "title": "" }, { "docid": "4b682df9d5cbe3c3356e82fbf58d69fd", "score": "0.468011", "text": "func getChartInfoFromChartUrl(\n\tchartUrl string,\n\tnamespace string,\n\tclient dynamic.Interface,\n\tcoreClient corev1client.CoreV1Interface,\n) (*ChartInfo, error) {\n\trepositories, err := chartproxy.NewRepoGetter(client, coreClient).List(namespace)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error listing repositories: %v\", err)\n\t}\n\n\tfor _, repository := range repositories {\n\t\tidx, err := repository.IndexFile()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"error producing the index file of repository %q in namespace %q is %q\", repository.Name, repository.Namespace, err.Error())\n\t\t}\n\t\tfor chartIndex, chartVersions := range idx.Entries {\n\t\t\tfor _, chartVersion := range chartVersions {\n\t\t\t\tfor _, url := range chartVersion.URLs {\n\t\t\t\t\tif chartUrl == url {\n\t\t\t\t\t\treturn &ChartInfo{\n\t\t\t\t\t\t\tRepositoryName: repository.Name,\n\t\t\t\t\t\t\tRepositoryNamespace: repository.Namespace,\n\t\t\t\t\t\t\tName: chartIndex,\n\t\t\t\t\t\t\tVersion: chartVersion.Version,\n\t\t\t\t\t\t}, nil\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn nil, fmt.Errorf(\"could not find a repository for the chart url %q in namespace %q\", chartUrl, namespace)\n}", "title": "" }, { "docid": "35ad105cd919f2d6f10098b504517940", "score": "0.46626866", "text": "func (pc PieChart) GetFont() *truetype.Font {\n\tif pc.Font == nil {\n\t\treturn pc.defaultFont\n\t}\n\treturn pc.Font\n}", "title": "" }, { "docid": "c7af5bdb5184e05f104ac73d3d4e5960", "score": "0.4660053", "text": "func GetContender(appName string, rels []*shipper.Release) (*shipper.Release, error) {\n\tif len(rels) == 0 {\n\t\treturn nil, errors.NewContenderNotFoundError(appName)\n\t}\n\treturn rels[0], nil\n}", "title": "" }, { "docid": "bfa8de5671fbf546840188ce0b7870f2", "score": "0.46469852", "text": "func GetChartImages(chartPath string) ([]string, error) {\n\n\tchart, err := loader.Load(chartPath)\n\tif err != nil {\n\t\tfmt.Printf(\"Error when loading chart.\\n\")\n\t\treturn nil, err\n\t}\n\n\tcvals, err := chartutil.CoalesceValues(chart, nil)\n\tif err != nil {\n\t\tfmt.Printf(\"ERR CoalesceValues.\\n\")\n\t\treturn nil, err\n\t}\n\n\timageList, err := GetChartImagesFromValues(cvals)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn imageList, nil\n}", "title": "" }, { "docid": "32057b443fea7b293a389cc9c3afc961", "score": "0.46456712", "text": "func (s *podDisruptionBudgetNamespaceLister) Get(name string) (*policyv1.PodDisruptionBudget, error) {\n\tkey := kcpcache.ToClusterAwareKey(s.clusterName.String(), s.namespace, name)\n\tobj, exists, err := s.indexer.GetByKey(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !exists {\n\t\treturn nil, errors.NewNotFound(policyv1.Resource(\"PodDisruptionBudget\"), name)\n\t}\n\treturn obj.(*policyv1.PodDisruptionBudget), nil\n}", "title": "" }, { "docid": "b042c6337acbdecdbfe716bd4ad5574b", "score": "0.46310672", "text": "func (Sodium) GetPeriod() string {\n\tvar p periodType = thirdPeriod\n\treturn p.get()\n}", "title": "" }, { "docid": "58c9ce0fc2a5a6121dfd6587eb2d8b8d", "score": "0.46307808", "text": "func (client *Client) GetChartRepositoryWithCallback(request *GetChartRepositoryRequest, callback func(response *GetChartRepositoryResponse, err error)) <-chan int {\n\tresult := make(chan int, 1)\n\terr := client.AddAsyncTask(func() {\n\t\tvar response *GetChartRepositoryResponse\n\t\tvar err error\n\t\tdefer close(result)\n\t\tresponse, err = client.GetChartRepository(request)\n\t\tcallback(response, err)\n\t\tresult <- 1\n\t})\n\tif err != nil {\n\t\tdefer close(result)\n\t\tcallback(nil, err)\n\t\tresult <- 0\n\t}\n\treturn result\n}", "title": "" }, { "docid": "f62c6a4c03eaef27954e2a53deec732d", "score": "0.46269554", "text": "func DownloadChartFromHelmRepo(configMap *corev1.ConfigMap, secret *corev1.Secret, chartsDir string, s *appv1alpha1.HelmRelease) (chartDir string, err error) {\n\tsrLogger := log.WithValues(\"HelmRelease.Namespace\", s.Namespace, \"SubscrptionRelease.Name\", s.Name)\n\tif s.Spec.Source.HelmRepo == nil {\n\t\terr := fmt.Errorf(\"HelmRepo type but Spec.HelmRepo is not defined\")\n\t\treturn \"\", err\n\t}\n\tif _, err := os.Stat(chartsDir); os.IsNotExist(err) {\n\t\terr := os.MkdirAll(chartsDir, 0755)\n\t\tif err != nil {\n\t\t\tsrLogger.Error(err, \"Unable to create chartDir: \", \"chartsDir\", chartsDir)\n\t\t\treturn \"\", err\n\t\t}\n\t}\n\thttpClient, err := GetHelmRepoClient(s.Namespace, configMap)\n\tif err != nil {\n\t\tsrLogger.Error(err, \"Failed to create httpClient \", \"sr.Spec.SecretRef.Name\", s.Spec.SecretRef.Name)\n\t\treturn \"\", err\n\t}\n\tvar downloadErr error\n\tfor _, urlelem := range s.Spec.Source.HelmRepo.Urls {\n\t\tvar URLP *url.URL\n\t\tURLP, downloadErr = url.Parse(urlelem)\n\t\tif err != nil {\n\t\t\tsrLogger.Error(downloadErr, \"url\", urlelem)\n\t\t\tcontinue\n\t\t}\n\t\tfileName := filepath.Base(URLP.Path)\n\t\t// Create the file\n\t\tchartZip := filepath.Join(chartsDir, fileName)\n\t\tif _, err := os.Stat(chartZip); os.IsNotExist(err) {\n\t\t\tvar req *http.Request\n\t\t\treq, downloadErr = http.NewRequest(http.MethodGet, urlelem, nil)\n\t\t\tif downloadErr != nil {\n\t\t\t\tsrLogger.Error(downloadErr, \"Can not build request: \", \"urlelem\", urlelem)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif secret != nil && secret.Data != nil {\n\t\t\t\treq.SetBasicAuth(string(secret.Data[\"user\"]), string(secret.Data[\"password\"]))\n\t\t\t}\n\t\t\tvar resp *http.Response\n\t\t\tresp, downloadErr = httpClient.Do(req)\n\t\t\tif downloadErr != nil {\n\t\t\t\tsrLogger.Error(downloadErr, \"Http request failed: \", \"urlelem\", urlelem)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tsrLogger.Info(\"Get suceeded: \", \"urlelem\", urlelem)\n\t\t\tdefer resp.Body.Close()\n\t\t\tvar out *os.File\n\t\t\tout, downloadErr = os.Create(chartZip)\n\t\t\tif downloadErr != nil {\n\t\t\t\tsrLogger.Error(downloadErr, \"Failed to create: \", \"chartZip\", chartZip)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tdefer out.Close()\n\n\t\t\t// Write the body to file\n\t\t\t_, downloadErr = io.Copy(out, resp.Body)\n\t\t\tif downloadErr != nil {\n\t\t\t\tsrLogger.Error(downloadErr, \"Failed to copy body: \", \"chartZip\", chartZip)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tvar r *os.File\n\t\tr, downloadErr = os.Open(chartZip)\n\t\tif downloadErr != nil {\n\t\t\tsrLogger.Error(downloadErr, \"Failed to open: \", \"chartZip\", chartZip)\n\t\t\tcontinue\n\t\t}\n\t\tchartDirUnzip := filepath.Join(chartsDir, s.Spec.ReleaseName, s.Namespace)\n\t\tchartDir = filepath.Join(chartDirUnzip, s.Spec.ChartName)\n\t\t//Clean before untar\n\t\tos.RemoveAll(chartDirUnzip)\n\t\tdownloadErr = Untar(chartDirUnzip, r)\n\t\tif downloadErr != nil {\n\t\t\t//Remove zip because failed to untar and so probably corrupted\n\t\t\tos.RemoveAll(chartZip)\n\t\t\tsrLogger.Error(downloadErr, \"Failed to unzip: \", \"chartZip\", chartZip)\n\t\t\tcontinue\n\t\t}\n\t}\n\treturn chartDir, downloadErr\n}", "title": "" }, { "docid": "f86c9c6bf3d6fb890db56b0334e4b4c2", "score": "0.46252367", "text": "func NewChart(space *Space, chart string) (*Chart, error) {\n\tif space == nil {\n\t\treturn nil, ErrorNoParameter.Format(\"space\")\n\t}\n\tif !validateName(chart) {\n\t\treturn nil, ErrorInvalidParam.Format(\"chart\", chart)\n\t}\n\treturn &Chart{space, path.Join(space.Prefix, chart), chart}, nil\n}", "title": "" }, { "docid": "747909661203718d55f20eef4b29510c", "score": "0.4622338", "text": "func LocateHelmChart(chartRepo, chartName, chartVersion string) (*chart.Chart, error) {\n\tclient := action.NewInstall(nil)\n\tclient.ChartPathOptions.RepoURL = chartRepo\n\tclient.ChartPathOptions.Version = chartVersion\n\n\tcp, err := client.ChartPathOptions.LocateChart(chartName, settings)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tklog.V(5).Infof(\"chart %s/%s:%s locates at: %s\", chartRepo, chartName, chartVersion, cp)\n\n\t// Check chart dependencies to make sure all are present in /charts\n\tchartRequested, err := loader.Load(cp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := CheckIfInstallable(chartRequested); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn chartRequested, nil\n}", "title": "" }, { "docid": "ea4978ef1a288972ca146ce3091905b1", "score": "0.4622041", "text": "func GetOHLC(w http.ResponseWriter, r *http.Request) {\n\ttoken := chi.URLParam(r, \"token\")\n\tinterval := chi.URLParam(r, \"interval\")\n\tfrom := r.URL.Query().Get(\"from\")\n\tto := r.URL.Query().Get(\"to\")\n\tohlc := getTicks(token, interval, from, to)\n\n\trender.JSON(w, r, ohlc) // A chi router helper for serializing and returning json\n}", "title": "" }, { "docid": "190b042c00aab20011a967271e9d1b50", "score": "0.4618819", "text": "func (r *ChartRenderer) Render(chartPath, releaseName, namespace string, values map[string]interface{}) (*chartrenderer.RenderedChart, error) {\n\treturn r.renderFunc()\n}", "title": "" }, { "docid": "d924ccee566334cc31a525e39ddb9366", "score": "0.46137732", "text": "func (e EntityRepository) GetGraph() (graph map[string]models.GraphArray, err error) {\n\treturn repositoryHandler.entityRepository.GetGraph()\n}", "title": "" }, { "docid": "0bf0f3443ff4c623c5fce39298b7082e", "score": "0.46122804", "text": "func (c *ChartPathOptions) LocateChart(name, dest string, settings *cli.EnvSettings) (string, error) {\n\tname = strings.TrimSpace(name)\n\tversion := strings.TrimSpace(c.Version)\n\n\tif _, err := os.Stat(name); err == nil {\n\t\tabs, err := filepath.Abs(name)\n\t\tif err != nil {\n\t\t\treturn abs, err\n\t\t}\n\t\tif c.Verify {\n\t\t\tif _, err := downloader.VerifyChart(abs, c.Keyring); err != nil {\n\t\t\t\treturn \"\", err\n\t\t\t}\n\t\t}\n\t\treturn abs, nil\n\t}\n\tif filepath.IsAbs(name) || strings.HasPrefix(name, \".\") {\n\t\treturn name, errors.Errorf(\"path %q not found\", name)\n\t}\n\n\tdl := downloader.ChartDownloader{\n\t\tOut: os.Stdout,\n\t\tKeyring: c.Keyring,\n\t\tGetters: getter.All(settings),\n\t\tOptions: []getter.Option{\n\t\t\tgetter.WithBasicAuth(c.Username, c.Password),\n\t\t\tgetter.WithTLSClientConfig(c.CertFile, c.KeyFile, c.CaFile),\n\t\t\tgetter.WithInsecureSkipVerifyTLS(c.InsecureSkipTLSverify),\n\t\t},\n\t\tRepositoryConfig: settings.RepositoryConfig,\n\t\tRepositoryCache: settings.RepositoryCache,\n\t}\n\tif c.Verify {\n\t\tdl.Verify = downloader.VerifyAlways\n\t}\n\tif c.RepoURL != \"\" {\n\t\tchartURL, err := repo.FindChartInAuthAndTLSRepoURL(c.RepoURL, c.Username, c.Password, name, version,\n\t\t\tc.CertFile, c.KeyFile, c.CaFile, c.InsecureSkipTLSverify, getter.All(settings))\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tname = chartURL\n\t}\n\n\tif err := os.MkdirAll(dest, 0755); err != nil {\n\t\treturn \"\", err\n\t}\n\n\tfilename, _, err := dl.DownloadTo(name, version, dest)\n\tif err == nil {\n\t\tlname, err := filepath.Abs(filename)\n\t\tif err != nil {\n\t\t\treturn filename, err\n\t\t}\n\t\treturn lname, nil\n\t} else if settings.Debug {\n\t\treturn filename, err\n\t}\n\n\tatVersion := \"\"\n\tif version != \"\" {\n\t\tatVersion = fmt.Sprintf(\" at version %q\", version)\n\t}\n\treturn filename, errors.Errorf(\"failed to download %q%s (hint: running `helm repo update` may help)\", name, atVersion)\n}", "title": "" } ]
ea12339a650f1ad50f8edc305a4b6ac1
GetEthernetPmdPreconf retrieves the value of the leaf EthernetPmdPreconf from the OpenconfigPlatform_Components_Component_Transceiver_State struct. Caution should be exercised whilst using this method since it will return the Go zero value if the field is explicitly unset. If the caller explicitly does not care if EthernetPmdPreconf is set, it can safely use t.GetEthernetPmdPreconf() to retrieve the value. In the case that the caller has different actions based on whether the leaf is set or unset, it should use 'if t.EthernetPmdPreconf == nil' before retrieving the leaf's value.
[ { "docid": "a25e47ff4d89cec3112c82c7596d5b45", "score": "0.83783436", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State) GetEthernetPmdPreconf() E_OpenconfigTransportTypes_ETHERNET_PMD_TYPE {\n\tif t == nil || t.EthernetPmdPreconf == 0 {\n\t\treturn 0\n\t}\n\treturn t.EthernetPmdPreconf\n}", "title": "" } ]
[ { "docid": "75adbff86e442f4f64f9f279a13bc90b", "score": "0.8157119", "text": "func (t *Component_Transceiver) GetEthernetPmdPreconf() E_OpenconfigTransportTypes_ETHERNET_PMD_TYPE {\n\tif t == nil || t.EthernetPmdPreconf == 0 {\n\t\treturn 0\n\t}\n\treturn t.EthernetPmdPreconf\n}", "title": "" }, { "docid": "9df150424419c9e4d6eaf143f59a7aeb", "score": "0.8154736", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_Config) GetEthernetPmdPreconf() E_OpenconfigTransportTypes_ETHERNET_PMD_TYPE {\n\tif t == nil || t.EthernetPmdPreconf == 0 {\n\t\treturn 0\n\t}\n\treturn t.EthernetPmdPreconf\n}", "title": "" }, { "docid": "9df150424419c9e4d6eaf143f59a7aeb", "score": "0.8154158", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_Config) GetEthernetPmdPreconf() E_OpenconfigTransportTypes_ETHERNET_PMD_TYPE {\n\tif t == nil || t.EthernetPmdPreconf == 0 {\n\t\treturn 0\n\t}\n\treturn t.EthernetPmdPreconf\n}", "title": "" }, { "docid": "4a0a81ec134bdb54e4713b7090cfd2e5", "score": "0.6330956", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State) GetEthernetPmd() E_OpenconfigTransportTypes_ETHERNET_PMD_TYPE {\n\tif t == nil || t.EthernetPmd == 0 {\n\t\treturn 0\n\t}\n\treturn t.EthernetPmd\n}", "title": "" }, { "docid": "4a0a81ec134bdb54e4713b7090cfd2e5", "score": "0.6330591", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State) GetEthernetPmd() E_OpenconfigTransportTypes_ETHERNET_PMD_TYPE {\n\tif t == nil || t.EthernetPmd == 0 {\n\t\treturn 0\n\t}\n\treturn t.EthernetPmd\n}", "title": "" }, { "docid": "42bd342adadc9bb92cc4108ff25fefcb", "score": "0.60842645", "text": "func (t *Component_Transceiver) GetEthernetPmd() E_OpenconfigTransportTypes_ETHERNET_PMD_TYPE {\n\tif t == nil || t.EthernetPmd == 0 {\n\t\treturn 0\n\t}\n\treturn t.EthernetPmd\n}", "title": "" }, { "docid": "f49b4766e0dcf6ffc54f60118d271f4d", "score": "0.54565054", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State) GetPreFecBer() *OpenconfigPlatform_Components_Component_Transceiver_State_PreFecBer {\n\tif t != nil && t.PreFecBer != nil {\n\t\treturn t.PreFecBer\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f49b4766e0dcf6ffc54f60118d271f4d", "score": "0.5454785", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State) GetPreFecBer() *OpenconfigPlatform_Components_Component_Transceiver_State_PreFecBer {\n\tif t != nil && t.PreFecBer != nil {\n\t\treturn t.PreFecBer\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "073ee765cc622195b0d20e65fe23b252", "score": "0.5223371", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State) GetPreFecBer() *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer {\n\tif t != nil && t.PreFecBer != nil {\n\t\treturn t.PreFecBer\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "073ee765cc622195b0d20e65fe23b252", "score": "0.52192336", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State) GetPreFecBer() *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer {\n\tif t != nil && t.PreFecBer != nil {\n\t\treturn t.PreFecBer\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "af7b4fafd24fbd0c103728a32b4433b1", "score": "0.51858485", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State) GetFormFactorPreconf() E_OpenconfigTransportTypes_TRANSCEIVER_FORM_FACTOR_TYPE {\n\tif t == nil || t.FormFactorPreconf == 0 {\n\t\treturn 0\n\t}\n\treturn t.FormFactorPreconf\n}", "title": "" }, { "docid": "af7b4fafd24fbd0c103728a32b4433b1", "score": "0.5185258", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State) GetFormFactorPreconf() E_OpenconfigTransportTypes_TRANSCEIVER_FORM_FACTOR_TYPE {\n\tif t == nil || t.FormFactorPreconf == 0 {\n\t\treturn 0\n\t}\n\treturn t.FormFactorPreconf\n}", "title": "" }, { "docid": "84a6c71f0171ed3fcba891a4c1d78bef", "score": "0.5107741", "text": "func (vn *localVnode) GetPredecessor() (*Vnode, error) {\n\tvn.predLock.RLock()\n\tdefer vn.predLock.RUnlock()\n\treturn vn.predecessor, nil\n}", "title": "" }, { "docid": "9b9785c7c251e1ba9738cc7779e754bd", "score": "0.49818817", "text": "func (t *TerminalDevice_Channel_Otn) GetPreFecBer() *TerminalDevice_Channel_Otn_PreFecBer {\n\tif t != nil && t.PreFecBer != nil {\n\t\treturn t.PreFecBer\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "86f7279c99bdaee788edf022d8405dbf", "score": "0.49780625", "text": "func (m *FullIntroductionReaderMock) GetNodePKMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetNodePKPreCounter)\n}", "title": "" }, { "docid": "02fd73867418ec3b28156d145a767c7a", "score": "0.4977704", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_Config) GetFormFactorPreconf() E_OpenconfigTransportTypes_TRANSCEIVER_FORM_FACTOR_TYPE {\n\tif t == nil || t.FormFactorPreconf == 0 {\n\t\treturn 0\n\t}\n\treturn t.FormFactorPreconf\n}", "title": "" }, { "docid": "02fd73867418ec3b28156d145a767c7a", "score": "0.49774033", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_Config) GetFormFactorPreconf() E_OpenconfigTransportTypes_TRANSCEIVER_FORM_FACTOR_TYPE {\n\tif t == nil || t.FormFactorPreconf == 0 {\n\t\treturn 0\n\t}\n\treturn t.FormFactorPreconf\n}", "title": "" }, { "docid": "09d7ff40b337945747fb1558b4b41cb4", "score": "0.49176604", "text": "func (m *FullIntroductionReaderMock) GetNodeIDMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetNodeIDPreCounter)\n}", "title": "" }, { "docid": "e20a99e67c9873778710a3fabe677739", "score": "0.4898334", "text": "func (m *MessageEntityPre) GetOffset() (value int) {\n\tif m == nil {\n\t\treturn\n\t}\n\treturn m.Offset\n}", "title": "" }, { "docid": "5dd0c3193b605c1800850622f5feef74", "score": "0.48835424", "text": "func (m *FullIntroductionReaderMock) GetNodeEndpointMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetNodeEndpointPreCounter)\n}", "title": "" }, { "docid": "59dff45aae8ceb34eb9670c2ce1d0c5b", "score": "0.48773745", "text": "func (t *transport) GetPredecessor(vn *chord.Vnode) (*chord.Vnode, error) {\n\tvar (\n\t\taddr *e3x.Addr\n\t\tch *e3x.Channel\n\t\tpkt *lob.Packet\n\t\tres *completeVnode\n\t\terr error\n\t)\n\n\taddr = t.lookupAddr(hashname.H(vn.Host))\n\tif addr == nil {\n\t\treturn nil, e3x.ErrNoAddress\n\t}\n\n\tch, err = t.e.Open(addr, \"chord.predecessor.get\", true)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer ch.Close()\n\n\t// ch.SetReadDeadline(time.Now().Add(30*time.Second))\n\t// ch.SetWriteDeadline(time.Now().Add(30*time.Second))\n\n\tpkt = &lob.Packet{}\n\tpkt.Header().SetString(\"vn\", vn.String())\n\terr = ch.WritePacket(pkt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = json.NewDecoder(newStream(ch)).Decode(&res)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif res != nil {\n\t\t// tracef(\"GetPredecessor(Vnode(%q)) => Vnode(%q)\", vn.String(), res.Id)\n\t}\n\treturn t.internalVnode(res), nil\n}", "title": "" }, { "docid": "edbbced7d64a492bb3aab4791a011125", "score": "0.48769048", "text": "func (t *Component_Transceiver) GetFormFactorPreconf() E_OpenconfigTransportTypes_TRANSCEIVER_FORM_FACTOR_TYPE {\n\tif t == nil || t.FormFactorPreconf == 0 {\n\t\treturn 0\n\t}\n\treturn t.FormFactorPreconf\n}", "title": "" }, { "docid": "1fd89222529ffd663bf0adc19560b000", "score": "0.4838351", "text": "func (o V2FunctionInstanceLifecycleConfigPtrOutput) PreStop() V2FunctionInstanceLifecycleConfigPreStopPtrOutput {\n\treturn o.ApplyT(func(v *V2FunctionInstanceLifecycleConfig) *V2FunctionInstanceLifecycleConfigPreStop {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.PreStop\n\t}).(V2FunctionInstanceLifecycleConfigPreStopPtrOutput)\n}", "title": "" }, { "docid": "a5a574163fa9500bfc4a75f6c4d97460", "score": "0.48195007", "text": "func (chord *ChordServer) GetPredecessor(context.Context, *chordrpc.NN) (*chordrpc.Node, error) {\n\t// need lock\n\tpred := chord.getPredecessor()\n\n\t// if pred == nil, simply return an empty node to indicate that, err should be nil, otherwise rpc won't work\n\tif pred == nil {\n\t\treturn &chordrpc.Node{}, nil\n\t}\n\n\treturn pred, nil\n}", "title": "" }, { "docid": "80761fa603730e215df4e1498de10b55", "score": "0.4811291", "text": "func (m *FullIntroductionReaderMock) GetNodePrimaryRoleMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetNodePrimaryRolePreCounter)\n}", "title": "" }, { "docid": "3b4a15a282bd27e1a64bd1c6f6ec9926", "score": "0.4762813", "text": "func (m *NodeKeeperMock) GetStateMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetStatePreCounter)\n}", "title": "" }, { "docid": "e423390fd58d2395a3b5d38eab503b68", "score": "0.4729094", "text": "func (m *NodeKeeperMock) GetActiveNodeMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetActiveNodePreCounter)\n}", "title": "" }, { "docid": "e2202e96c76c322991e4ef47a05cabb7", "score": "0.46466422", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State_PostFecBer) GetMin() float64 {\n\tif t == nil || t.Min == nil {\n\t\treturn 0.0\n\t}\n\treturn *t.Min\n}", "title": "" }, { "docid": "e2202e96c76c322991e4ef47a05cabb7", "score": "0.46466365", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State_PostFecBer) GetMin() float64 {\n\tif t == nil || t.Min == nil {\n\t\treturn 0.0\n\t}\n\treturn *t.Min\n}", "title": "" }, { "docid": "5cf30f9ed0dc1cbe366066b3266d7922", "score": "0.4625448", "text": "func (o V2FunctionInstanceLifecycleConfigOutput) PreStop() V2FunctionInstanceLifecycleConfigPreStopPtrOutput {\n\treturn o.ApplyT(func(v V2FunctionInstanceLifecycleConfig) *V2FunctionInstanceLifecycleConfigPreStop { return v.PreStop }).(V2FunctionInstanceLifecycleConfigPreStopPtrOutput)\n}", "title": "" }, { "docid": "dd9e9e0fcbd65104e8d45c27fddb7c87", "score": "0.4619352", "text": "func (mgr *ConfigManager) Preload() (*TSSTConfig, error) {\n\tvar tsCfg TSSTConfig\n\tif err := mgr.viper.Unmarshal( &tsCfg); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to parse config: %q\", err)\n\t}\n\treturn &tsCfg, nil\n}", "title": "" }, { "docid": "93b5c4ec2ab97671f1a5c401cc55dca9", "score": "0.46032152", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State_PreFecBer) GetMin() float64 {\n\tif t == nil || t.Min == nil {\n\t\treturn 0.0\n\t}\n\treturn *t.Min\n}", "title": "" }, { "docid": "93b5c4ec2ab97671f1a5c401cc55dca9", "score": "0.46012294", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State_PreFecBer) GetMin() float64 {\n\tif t == nil || t.Min == nil {\n\t\treturn 0.0\n\t}\n\treturn *t.Min\n}", "title": "" }, { "docid": "a505fc2b95850b0983152156408ec877", "score": "0.45991585", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer) GetMin() float64 {\n\tif t == nil || t.Min == nil {\n\t\treturn 0.0\n\t}\n\treturn *t.Min\n}", "title": "" }, { "docid": "a505fc2b95850b0983152156408ec877", "score": "0.45987496", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer) GetMin() float64 {\n\tif t == nil || t.Min == nil {\n\t\treturn 0.0\n\t}\n\treturn *t.Min\n}", "title": "" }, { "docid": "d9ee113d2ad42a9951f95ff3c6475bc7", "score": "0.45368698", "text": "func (m *NodeKeeperMock) GetCloudHashMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetCloudHashPreCounter)\n}", "title": "" }, { "docid": "54ac3be5ca44005e0186757077c1ab5c", "score": "0.451986", "text": "func (n *Node) getPreAllocate() int {\n\tif n.resource.Spec.IPAM.PreAllocate != 0 {\n\t\treturn n.resource.Spec.IPAM.PreAllocate\n\t}\n\treturn defaults.IPAMPreAllocation\n}", "title": "" }, { "docid": "7333c6687762fcec519908a2573bd658", "score": "0.44803238", "text": "func (t *Stp_Vlan) GetDesignatedRootPriority() uint32 {\n\tif t == nil || t.DesignatedRootPriority == nil {\n\t\treturn 0\n\t}\n\treturn *t.DesignatedRootPriority\n}", "title": "" }, { "docid": "7ccbcddabadeb98196dc6eb9ae5da260", "score": "0.44614378", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PostFecBer) GetMin() float64 {\n\tif t == nil || t.Min == nil {\n\t\treturn 0.0\n\t}\n\treturn *t.Min\n}", "title": "" }, { "docid": "7ccbcddabadeb98196dc6eb9ae5da260", "score": "0.44614378", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PostFecBer) GetMin() float64 {\n\tif t == nil || t.Min == nil {\n\t\treturn 0.0\n\t}\n\treturn *t.Min\n}", "title": "" }, { "docid": "94c1874b28d572228063da461dcb86b2", "score": "0.44534424", "text": "func (t *Stp_Rstp) GetDesignatedRootPriority() uint32 {\n\tif t == nil || t.DesignatedRootPriority == nil {\n\t\treturn 0\n\t}\n\treturn *t.DesignatedRootPriority\n}", "title": "" }, { "docid": "acb3e31d9d7d10939a3a69d8025874f1", "score": "0.44447792", "text": "func (t *binaryTree) Predecessor(node *binaryNode) *binaryNode {\n\tif node == nil {\n\t\treturn nil\n\t}\n\tif node.left != nil {\n\t\treturn t.Max(node.left)\n\t}\n\tparent := node.parent\n\tfor parent != nil && node == parent.left {\n\t\tnode = parent\n\t\tparent = parent.parent\n\t}\n\treturn parent\n}", "title": "" }, { "docid": "a01ccc287fb5c5e0162b4421f54ea2d9", "score": "0.4433391", "text": "func (m *NodeNetworkMock) GetWorkingNodeMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetWorkingNodePreCounter)\n}", "title": "" }, { "docid": "c2265882aeff736d26660f8f9bdeb6f0", "score": "0.44062322", "text": "func (o *ServiceOfferModel) GetPrePaymentAmount() MonetaryValueModel {\n\tif o == nil {\n\t\tvar ret MonetaryValueModel\n\t\treturn ret\n\t}\n\n\treturn o.PrePaymentAmount\n}", "title": "" }, { "docid": "084fe34dc6ac5b1be5a409499b20b0cf", "score": "0.44007957", "text": "func GetTelemetryPreMitigationByTmid(customerId int, cuid string, tmid int) (*db_models.TelemetryPreMitigation, error) {\n\ttelePreMitigation := &db_models.TelemetryPreMitigation{}\n\t// database connection create\n\tengine, err := ConnectDB()\n\tif err != nil {\n\t\tlog.Errorf(\"Database connect error: %s\", err)\n\t\treturn nil, err\n\t}\n\ttelePreMitigation, err = db_models.GetTelemetryPreMitigationByTmid(engine, customerId, cuid, tmid)\n\tif err != nil {\n\t\tlog.Errorf(\"Find tmid of telemetry pre-mitigation error: %s\\n\", err)\n\t\treturn nil, err\n\t}\n\treturn telePreMitigation, nil\n}", "title": "" }, { "docid": "c8eefc5322bc26d5da7c4411eb54ac4a", "score": "0.43945614", "text": "func (e ethernetHeader) PCP() uint8 {\n\treturn uint8((e.ieee8021Q >> 13) & 3)\n}", "title": "" }, { "docid": "fb50f85d009920eb3ee80562f536d3a6", "score": "0.4390365", "text": "func getPredecessor(targetKey uint32) (uint32, error) {\n\tfor i := len(memberStore_.members) - 1; i >= 0; i-- {\n\t\t// skip over \"Bootstrapping\" nodes\n\t\tif targetKey > memberStore_.members[i].Key && memberStore_.members[i].Status == STATUS_NORMAL {\n\t\t\treturn memberStore_.members[i].Key, nil\n\t\t}\n\t}\n\n\t// Search for last node with status normal (wrap around)\n\tfor i := len(memberStore_.members) - 1; i >= 0; i-- {\n\t\t// Skip over \"Bootstrapping\" nodes\n\t\tif memberStore_.members[i].Status == STATUS_NORMAL {\n\t\t\treturn memberStore_.members[i].Key, nil\n\t\t}\n\t}\n\n\treturn 0, errors.New(\"can't find predecessor\")\n}", "title": "" }, { "docid": "ad6805470b504f581d162694600c08b0", "score": "0.43866065", "text": "func (m *HostIdentityHolderMock) GetHostAddressMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetHostAddressPreCounter)\n}", "title": "" }, { "docid": "4d03acea33ef8e1ea4c61c241e4d9835", "score": "0.43715134", "text": "func (t *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Psnp) GetRetransmit() uint32 {\n\tif t == nil || t.Retransmit == nil {\n\t\treturn 0\n\t}\n\treturn *t.Retransmit\n}", "title": "" }, { "docid": "fa7b3f236760fa265f466f249adf0ba5", "score": "0.43621945", "text": "func (m *NodeKeeperMock) GetActiveNodesMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetActiveNodesPreCounter)\n}", "title": "" }, { "docid": "a06c6ddc9a88bf3d9c37e0e6fc20d88b", "score": "0.43613562", "text": "func (o V2FunctionInstanceLifecycleConfigPtrOutput) PreFreeze() V2FunctionInstanceLifecycleConfigPreFreezePtrOutput {\n\treturn o.ApplyT(func(v *V2FunctionInstanceLifecycleConfig) *V2FunctionInstanceLifecycleConfigPreFreeze {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.PreFreeze\n\t}).(V2FunctionInstanceLifecycleConfigPreFreezePtrOutput)\n}", "title": "" }, { "docid": "6cc858d01560f0894174ba3df35b346d", "score": "0.43514398", "text": "func (o *V0037JobResponseProperties) GetMinimumTmpDiskPerNode() int32 {\n\tif o == nil || o.MinimumTmpDiskPerNode == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.MinimumTmpDiskPerNode\n}", "title": "" }, { "docid": "bdce7f643d0da551e9ef908c493c2991", "score": "0.4345237", "text": "func LoadPreResetHeight() (map[string]uint64, error) {\n\tblockstorePath := ledgerconfig.GetBlockStorePath()\n\tlogger.Infof(\"Loading prereset height from path [%s]\", blockstorePath)\n\treturn fsblkstorage.LoadPreResetHeight(blockstorePath)\n}", "title": "" }, { "docid": "6483692d425f6852c2b0a47d5375193a", "score": "0.43430108", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State) GetOrCreatePreFecBer() *OpenconfigPlatform_Components_Component_Transceiver_State_PreFecBer {\n\tif t.PreFecBer != nil {\n\t\treturn t.PreFecBer\n\t}\n\tt.PreFecBer = &OpenconfigPlatform_Components_Component_Transceiver_State_PreFecBer{}\n\treturn t.PreFecBer\n}", "title": "" }, { "docid": "6483692d425f6852c2b0a47d5375193a", "score": "0.43425044", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State) GetOrCreatePreFecBer() *OpenconfigPlatform_Components_Component_Transceiver_State_PreFecBer {\n\tif t.PreFecBer != nil {\n\t\treturn t.PreFecBer\n\t}\n\tt.PreFecBer = &OpenconfigPlatform_Components_Component_Transceiver_State_PreFecBer{}\n\treturn t.PreFecBer\n}", "title": "" }, { "docid": "073025d71de076f16d706c42384b3ecc", "score": "0.43381092", "text": "func (c *KContext) BootStrapControlPlane() *KNode {\n\tif len(c.controlPlanes) == 0 {\n\t\treturn nil\n\t}\n\treturn c.controlPlanes[0]\n}", "title": "" }, { "docid": "7e01edbca536fad5b15caf65e07a5c8a", "score": "0.43344834", "text": "func (t *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Csnp) GetRetransmit() uint32 {\n\tif t == nil || t.Retransmit == nil {\n\t\treturn 0\n\t}\n\treturn *t.Retransmit\n}", "title": "" }, { "docid": "28ff8bf4d65b22e5004dc08c6ff38d52", "score": "0.43337458", "text": "func (t *Stp_Mstp_MstInstance) GetDesignatedRootPriority() uint32 {\n\tif t == nil || t.DesignatedRootPriority == nil {\n\t\treturn 0\n\t}\n\treturn *t.DesignatedRootPriority\n}", "title": "" }, { "docid": "336196346ff89fda4e1ac1d438e17dad", "score": "0.4315659", "text": "func (m *FullIntroductionReaderMock) GetPowerLevelsMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetPowerLevelsPreCounter)\n}", "title": "" }, { "docid": "746a2ac8cdb427a9feb214ced8fc748d", "score": "0.43102625", "text": "func (o *LinkTokenCreateRequestIncomeVerification) GetPrecheckId() string {\n\tif o == nil || o.PrecheckId == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.PrecheckId\n}", "title": "" }, { "docid": "450f0e2a362a0a22891ee06d774801ad", "score": "0.43068433", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ethernet) GetLldp() *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ethernet_Lldp {\n\tif t != nil && t.Lldp != nil {\n\t\treturn t.Lldp\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "450f0e2a362a0a22891ee06d774801ad", "score": "0.43052956", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ethernet) GetLldp() *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ethernet_Lldp {\n\tif t != nil && t.Lldp != nil {\n\t\treturn t.Lldp\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6ec026cfed6aa92df37fd3b664349aaf", "score": "0.43010905", "text": "func (o WorkflowTemplatePlacementManagedClusterConfigMasterConfigPtrOutput) Preemptibility() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WorkflowTemplatePlacementManagedClusterConfigMasterConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Preemptibility\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c09c668890f09beed6eabd179c94b4a0", "score": "0.42886832", "text": "func (o *VirtualizationVmwareVirtualMachineSnapshot) GetPredecessorId() int64 {\n\tif o == nil || o.PredecessorId == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.PredecessorId\n}", "title": "" }, { "docid": "9881a794c24cd8d90e714b51263c49f4", "score": "0.42849073", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State) GetPostFecBer() *OpenconfigPlatform_Components_Component_Transceiver_State_PostFecBer {\n\tif t != nil && t.PostFecBer != nil {\n\t\treturn t.PostFecBer\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "05be24dd0e8e0ea57b6196e70faeca00", "score": "0.42834556", "text": "func (t *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_Ipv4ExternalReachability_Prefix) GetUpDown() bool {\n\tif t == nil || t.UpDown == nil {\n\t\treturn false\n\t}\n\treturn *t.UpDown\n}", "title": "" }, { "docid": "0f023a1f00b687ab553e5584c1a76bed", "score": "0.42818493", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer) GetMinTime() uint64 {\n\tif t == nil || t.MinTime == nil {\n\t\treturn 0\n\t}\n\treturn *t.MinTime\n}", "title": "" }, { "docid": "0f023a1f00b687ab553e5584c1a76bed", "score": "0.428137", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer) GetMinTime() uint64 {\n\tif t == nil || t.MinTime == nil {\n\t\treturn 0\n\t}\n\treturn *t.MinTime\n}", "title": "" }, { "docid": "9881a794c24cd8d90e714b51263c49f4", "score": "0.42812347", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State) GetPostFecBer() *OpenconfigPlatform_Components_Component_Transceiver_State_PostFecBer {\n\tif t != nil && t.PostFecBer != nil {\n\t\treturn t.PostFecBer\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3ef01b4d27b48c6d0064d610f3e083f8", "score": "0.42753065", "text": "func (t *Stp_Rstp_Interface) GetDesignatedRootPriority() uint32 {\n\tif t == nil || t.DesignatedRootPriority == nil {\n\t\treturn 0\n\t}\n\treturn *t.DesignatedRootPriority\n}", "title": "" }, { "docid": "fd6801a2236f51d25ffeac56c5ee7158", "score": "0.427275", "text": "func (o *VPCRouterL2TPIPsecServer) GetPreSharedSecret() string {\n\treturn o.PreSharedSecret\n}", "title": "" }, { "docid": "5b8bbe7caac960c79ddf6f448da94803", "score": "0.42585346", "text": "func (node *Node) GetPrevNodeInNest() *Node {\n\treturn node.prevNodeInNest\n}", "title": "" }, { "docid": "8cb21543a12977cddae65de101b95bc4", "score": "0.42416465", "text": "func (o *V0037JobResponseProperties) GetMinimumCpusPerNode() int32 {\n\tif o == nil || o.MinimumCpusPerNode == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.MinimumCpusPerNode\n}", "title": "" }, { "docid": "e36fba8662e817185fec82c898fa2429", "score": "0.42406258", "text": "func (m *AndroidDeviceOwnerWiFiConfiguration) GetPreSharedKeyIsSet()(*bool) {\n val, err := m.GetBackingStore().Get(\"preSharedKeyIsSet\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*bool)\n }\n return nil\n}", "title": "" }, { "docid": "2388960afbc9320b1cdd0e8f930aed6a", "score": "0.42259467", "text": "func (o FhirDatastorePreloadDataConfigPtrOutput) PreloadDataType() FhirDatastorePreloadDataConfigPreloadDataTypePtrOutput {\n\treturn o.ApplyT(func(v *FhirDatastorePreloadDataConfig) *FhirDatastorePreloadDataConfigPreloadDataType {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.PreloadDataType\n\t}).(FhirDatastorePreloadDataConfigPreloadDataTypePtrOutput)\n}", "title": "" }, { "docid": "a95aa4d47b727cf9e6526b3b64f58ba7", "score": "0.42217478", "text": "func (t *Aps_ApsModule) GetRelativeSwitchThresholdOffset() float64 {\n\tif t == nil || t.RelativeSwitchThresholdOffset == nil {\n\t\treturn 0\n\t}\n\treturn *t.RelativeSwitchThresholdOffset\n}", "title": "" }, { "docid": "5cfdc68c7538a900bc6af0f11496b989", "score": "0.42169914", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State_PostFecBer) GetMinTime() uint64 {\n\tif t == nil || t.MinTime == nil {\n\t\treturn 0\n\t}\n\treturn *t.MinTime\n}", "title": "" }, { "docid": "5cfdc68c7538a900bc6af0f11496b989", "score": "0.42142624", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State_PostFecBer) GetMinTime() uint64 {\n\tif t == nil || t.MinTime == nil {\n\t\treturn 0\n\t}\n\treturn *t.MinTime\n}", "title": "" }, { "docid": "2954e846fe42163ff85086ad24c7e213", "score": "0.42140716", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State_PreFecBer) GetMinTime() uint64 {\n\tif t == nil || t.MinTime == nil {\n\t\treturn 0\n\t}\n\treturn *t.MinTime\n}", "title": "" }, { "docid": "2954e846fe42163ff85086ad24c7e213", "score": "0.42140716", "text": "func (t *OpenconfigPlatform_Components_Component_Transceiver_State_PreFecBer) GetMinTime() uint64 {\n\tif t == nil || t.MinTime == nil {\n\t\treturn 0\n\t}\n\treturn *t.MinTime\n}", "title": "" }, { "docid": "1170820d40f66181d365dec22d68e6b1", "score": "0.42099753", "text": "func Predecessor(n Node) Node {\n\tif HasLChild(n) {\n\t\treturn subTreeMax(n.LChild())\n\t}\n\tfor IsLChild(n) {\n\t\tn = n.Parent()\n\t}\n\treturn n.Parent()\n}", "title": "" }, { "docid": "2aec00ee4376413933bf020166f28e56", "score": "0.4205244", "text": "func (t *OpenconfigSystem_System_Cpus_Cpu_State_Kernel) GetMin() uint8 {\n\tif t == nil || t.Min == nil {\n\t\treturn 0\n\t}\n\treturn *t.Min\n}", "title": "" }, { "docid": "2aec00ee4376413933bf020166f28e56", "score": "0.42051744", "text": "func (t *OpenconfigSystem_System_Cpus_Cpu_State_Kernel) GetMin() uint8 {\n\tif t == nil || t.Min == nil {\n\t\treturn 0\n\t}\n\treturn *t.Min\n}", "title": "" }, { "docid": "dbc6b474ad91266ee1e70d042e5b4148", "score": "0.4200439", "text": "func (t *Stp_Vlan_Interface) GetDesignatedRootPriority() uint32 {\n\tif t == nil || t.DesignatedRootPriority == nil {\n\t\treturn 0\n\t}\n\treturn *t.DesignatedRootPriority\n}", "title": "" }, { "docid": "94bbbfc32175b15be15d05362f9559d4", "score": "0.41988155", "text": "func (m *NodeKeeperMock) GetClaimQueueMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetClaimQueuePreCounter)\n}", "title": "" }, { "docid": "d8f5ad91ba7d8b65e9d091c3d5ab8a98", "score": "0.4197438", "text": "func (t *Device) GetLldp() *OpenconfigLldp_Lldp {\n\tif t != nil && t.Lldp != nil {\n\t\treturn t.Lldp\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d8f5ad91ba7d8b65e9d091c3d5ab8a98", "score": "0.4197438", "text": "func (t *Device) GetLldp() *OpenconfigLldp_Lldp {\n\tif t != nil && t.Lldp != nil {\n\t\treturn t.Lldp\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c26582429535fa1816f999e165f4c982", "score": "0.419257", "text": "func (obj *TGQueryOptionImpl) GetPreFetchSize() int {\n\tif DoesPropertyExist(obj.optionProperties, OptionQueryFetchSize) {\n\t\tcn := NewConfigName(OptionQueryFetchSize, OptionQueryFetchSize, strconv.Itoa(DefaultPrefetchSize))\n\t\tif s := obj.GetProperty(cn, strconv.Itoa(DefaultPrefetchSize)); s != \"\" {\n\t\t\tv, _ := strconv.ParseInt(s, 10, 32)\n\t\t\treturn int(v)\n\t\t}\n\t}\n\treturn DefaultPrefetchSize\n}", "title": "" }, { "docid": "72704c68ea0f400f19ae0e20017be368", "score": "0.41871879", "text": "func (m *HostIdentityHolderMock) GetTransportKeyMinimockPreCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetTransportKeyPreCounter)\n}", "title": "" }, { "docid": "cd2fd2570ca2d364c00e31a81aa1b777", "score": "0.41833553", "text": "func (o VPCRouterL2tpPtrOutput) PreSharedSecret() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *VPCRouterL2tp) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.PreSharedSecret\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "e8d2836c33ac5e2c957229584222108b", "score": "0.4181589", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State) GetOrCreatePreFecBer() *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer {\n\tif t.PreFecBer != nil {\n\t\treturn t.PreFecBer\n\t}\n\tt.PreFecBer = &OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer{}\n\treturn t.PreFecBer\n}", "title": "" }, { "docid": "e8d2836c33ac5e2c957229584222108b", "score": "0.41788617", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State) GetOrCreatePreFecBer() *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer {\n\tif t.PreFecBer != nil {\n\t\treturn t.PreFecBer\n\t}\n\tt.PreFecBer = &OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer{}\n\treturn t.PreFecBer\n}", "title": "" }, { "docid": "f3e75a3fa76e494a65a495fc13254cd8", "score": "0.41763228", "text": "func (o V2FunctionInstanceLifecycleConfigOutput) PreFreeze() V2FunctionInstanceLifecycleConfigPreFreezePtrOutput {\n\treturn o.ApplyT(func(v V2FunctionInstanceLifecycleConfig) *V2FunctionInstanceLifecycleConfigPreFreeze {\n\t\treturn v.PreFreeze\n\t}).(V2FunctionInstanceLifecycleConfigPreFreezePtrOutput)\n}", "title": "" }, { "docid": "9441324fb954acb73ff3d79fc0e8386a", "score": "0.4167375", "text": "func (n *Node) GetPrev() *Node {\n\tif n.prev != n.list.root {\n\t\treturn n.prev\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9ee5fb9a0da94221d829da4bdb954570", "score": "0.41618958", "text": "func (t *Requested) GetPredecessor(args *interface{}, reply *chord.GetPredecessorReply) error {\n\t//fmt.Println(\"GetPredecessor() RPC called.\")\n\treply.Predecessor = chord.Predecessor\n\treturn nil\n}", "title": "" }, { "docid": "45c58caa28df86f2d4ca8b2c93b7e7e1", "score": "0.41598532", "text": "func (m *TunnelConfiguration) GetPreSharedKey()(*string) {\n val, err := m.GetBackingStore().Get(\"preSharedKey\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "2ad55069d63390317ef8a094e43ac652", "score": "0.41583407", "text": "func (o KafkaTopicConfigPtrOutput) UncleanLeaderElectionEnable() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *KafkaTopicConfig) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.UncleanLeaderElectionEnable\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "f61944e516bccc973e18157c72d3f2ec", "score": "0.41571257", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer) GetAvg() float64 {\n\tif t == nil || t.Avg == nil {\n\t\treturn 0.0\n\t}\n\treturn *t.Avg\n}", "title": "" }, { "docid": "f61944e516bccc973e18157c72d3f2ec", "score": "0.41571257", "text": "func (t *OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer) GetAvg() float64 {\n\tif t == nil || t.Avg == nil {\n\t\treturn 0.0\n\t}\n\treturn *t.Avg\n}", "title": "" } ]
ee0ed4519a43d37b916b886b668d683a
ProtoToPacketMirroringNetwork converts a PacketMirroringNetwork object from its proto representation.
[ { "docid": "397b1a7b904b9ac2add145b2f0810fa2", "score": "0.8195443", "text": "func ProtoToComputePacketMirroringNetwork(p *computepb.ComputePacketMirroringNetwork) *compute.PacketMirroringNetwork {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &compute.PacketMirroringNetwork{\n\t\tUrl: dcl.StringOrNil(p.GetUrl()),\n\t\tCanonicalUrl: dcl.StringOrNil(p.GetCanonicalUrl()),\n\t}\n\treturn obj\n}", "title": "" } ]
[ { "docid": "9323582dbc8bc5948b76a02caaff65a4", "score": "0.7972327", "text": "func ProtoToPacketMirroring(p *computepb.ComputePacketMirroring) *compute.PacketMirroring {\n\tobj := &compute.PacketMirroring{\n\t\tId: dcl.Int64OrNil(p.GetId()),\n\t\tSelfLink: dcl.StringOrNil(p.GetSelfLink()),\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tDescription: dcl.StringOrNil(p.GetDescription()),\n\t\tRegion: dcl.StringOrNil(p.GetRegion()),\n\t\tNetwork: ProtoToComputePacketMirroringNetwork(p.GetNetwork()),\n\t\tPriority: dcl.Int64OrNil(p.GetPriority()),\n\t\tCollectorIlb: ProtoToComputePacketMirroringCollectorIlb(p.GetCollectorIlb()),\n\t\tMirroredResources: ProtoToComputePacketMirroringMirroredResources(p.GetMirroredResources()),\n\t\tFilter: ProtoToComputePacketMirroringFilter(p.GetFilter()),\n\t\tEnable: ProtoToComputePacketMirroringEnableEnum(p.GetEnable()),\n\t\tProject: dcl.StringOrNil(p.GetProject()),\n\t\tLocation: dcl.StringOrNil(p.GetLocation()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "2c21b4419eb9e0e30a7878d3fbee67c8", "score": "0.7640774", "text": "func ComputePacketMirroringNetworkToProto(o *compute.PacketMirroringNetwork) *computepb.ComputePacketMirroringNetwork {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &computepb.ComputePacketMirroringNetwork{}\n\tp.SetUrl(dcl.ValueOrEmptyString(o.Url))\n\tp.SetCanonicalUrl(dcl.ValueOrEmptyString(o.CanonicalUrl))\n\treturn p\n}", "title": "" }, { "docid": "503c0c4607e109679687898a2a8e39da", "score": "0.73910904", "text": "func PacketMirroringToProto(resource *compute.PacketMirroring) *computepb.ComputePacketMirroring {\n\tp := &computepb.ComputePacketMirroring{}\n\tp.SetId(dcl.ValueOrEmptyInt64(resource.Id))\n\tp.SetSelfLink(dcl.ValueOrEmptyString(resource.SelfLink))\n\tp.SetName(dcl.ValueOrEmptyString(resource.Name))\n\tp.SetDescription(dcl.ValueOrEmptyString(resource.Description))\n\tp.SetRegion(dcl.ValueOrEmptyString(resource.Region))\n\tp.SetNetwork(ComputePacketMirroringNetworkToProto(resource.Network))\n\tp.SetPriority(dcl.ValueOrEmptyInt64(resource.Priority))\n\tp.SetCollectorIlb(ComputePacketMirroringCollectorIlbToProto(resource.CollectorIlb))\n\tp.SetMirroredResources(ComputePacketMirroringMirroredResourcesToProto(resource.MirroredResources))\n\tp.SetFilter(ComputePacketMirroringFilterToProto(resource.Filter))\n\tp.SetEnable(ComputePacketMirroringEnableEnumToProto(resource.Enable))\n\tp.SetProject(dcl.ValueOrEmptyString(resource.Project))\n\tp.SetLocation(dcl.ValueOrEmptyString(resource.Location))\n\n\treturn p\n}", "title": "" }, { "docid": "8fb92ffa7f621b5912a668f8a6ba1aae", "score": "0.7023717", "text": "func ProtoToComputePacketMirroringFilter(p *computepb.ComputePacketMirroringFilter) *compute.PacketMirroringFilter {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &compute.PacketMirroringFilter{\n\t\tDirection: ProtoToComputePacketMirroringFilterDirectionEnum(p.GetDirection()),\n\t}\n\tfor _, r := range p.GetCidrRanges() {\n\t\tobj.CidrRanges = append(obj.CidrRanges, r)\n\t}\n\tfor _, r := range p.GetIpProtocols() {\n\t\tobj.IPProtocols = append(obj.IPProtocols, r)\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "6c54f9801b154f012bd7037fc4f04da6", "score": "0.68707556", "text": "func ComputePacketMirroringFilterToProto(o *compute.PacketMirroringFilter) *computepb.ComputePacketMirroringFilter {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &computepb.ComputePacketMirroringFilter{}\n\tp.SetDirection(ComputePacketMirroringFilterDirectionEnumToProto(o.Direction))\n\tsCidrRanges := make([]string, len(o.CidrRanges))\n\tfor i, r := range o.CidrRanges {\n\t\tsCidrRanges[i] = r\n\t}\n\tp.SetCidrRanges(sCidrRanges)\n\tsIPProtocols := make([]string, len(o.IPProtocols))\n\tfor i, r := range o.IPProtocols {\n\t\tsIPProtocols[i] = r\n\t}\n\tp.SetIpProtocols(sIPProtocols)\n\treturn p\n}", "title": "" }, { "docid": "33d5b8c7e29b3d48812b31654fb1ff28", "score": "0.65694904", "text": "func ProtoToComputePacketMirroringCollectorIlb(p *computepb.ComputePacketMirroringCollectorIlb) *compute.PacketMirroringCollectorIlb {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &compute.PacketMirroringCollectorIlb{\n\t\tUrl: dcl.StringOrNil(p.GetUrl()),\n\t\tCanonicalUrl: dcl.StringOrNil(p.GetCanonicalUrl()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "de9528e406f5c1fdbbe9c0fa4284ecd7", "score": "0.6416944", "text": "func ProtoToComputePacketMirroringMirroredResources(p *computepb.ComputePacketMirroringMirroredResources) *compute.PacketMirroringMirroredResources {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &compute.PacketMirroringMirroredResources{}\n\tfor _, r := range p.GetSubnetworks() {\n\t\tobj.Subnetworks = append(obj.Subnetworks, *ProtoToComputePacketMirroringMirroredResourcesSubnetworks(r))\n\t}\n\tfor _, r := range p.GetInstances() {\n\t\tobj.Instances = append(obj.Instances, *ProtoToComputePacketMirroringMirroredResourcesInstances(r))\n\t}\n\tfor _, r := range p.GetTags() {\n\t\tobj.Tags = append(obj.Tags, r)\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "05f0fc6330a3e799fab9dcdacc74f201", "score": "0.6277056", "text": "func (n Network) ToProto(serdes serde.Registry) (*storage.Network, error) {\n\tret := &storage.Network{\n\t\tID: n.ID,\n\t\tType: n.Type,\n\t\tName: n.Name,\n\t\tDescription: n.Description,\n\t}\n\tbConfigs, err := marshalConfigs(n.Configs, serdes)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error serializing network %s: %w\", n.ID, err)\n\t}\n\tret.Configs = bConfigs\n\treturn ret, nil\n}", "title": "" }, { "docid": "c3491ba1b7f81a1abeea34e9b2e0e8f0", "score": "0.62372726", "text": "func ComputePacketMirroringMirroredResourcesToProto(o *compute.PacketMirroringMirroredResources) *computepb.ComputePacketMirroringMirroredResources {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &computepb.ComputePacketMirroringMirroredResources{}\n\tsSubnetworks := make([]*computepb.ComputePacketMirroringMirroredResourcesSubnetworks, len(o.Subnetworks))\n\tfor i, r := range o.Subnetworks {\n\t\tsSubnetworks[i] = ComputePacketMirroringMirroredResourcesSubnetworksToProto(&r)\n\t}\n\tp.SetSubnetworks(sSubnetworks)\n\tsInstances := make([]*computepb.ComputePacketMirroringMirroredResourcesInstances, len(o.Instances))\n\tfor i, r := range o.Instances {\n\t\tsInstances[i] = ComputePacketMirroringMirroredResourcesInstancesToProto(&r)\n\t}\n\tp.SetInstances(sInstances)\n\tsTags := make([]string, len(o.Tags))\n\tfor i, r := range o.Tags {\n\t\tsTags[i] = r\n\t}\n\tp.SetTags(sTags)\n\treturn p\n}", "title": "" }, { "docid": "f1bc170c9a8d6261716246d543a59a73", "score": "0.61657166", "text": "func ProtoToComputePacketMirroringMirroredResourcesInstances(p *computepb.ComputePacketMirroringMirroredResourcesInstances) *compute.PacketMirroringMirroredResourcesInstances {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &compute.PacketMirroringMirroredResourcesInstances{\n\t\tUrl: dcl.StringOrNil(p.GetUrl()),\n\t\tCanonicalUrl: dcl.StringOrNil(p.GetCanonicalUrl()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "1e07d389c4c8d3e9e56c8a6786d56ccc", "score": "0.61404973", "text": "func ComputePacketMirroringCollectorIlbToProto(o *compute.PacketMirroringCollectorIlb) *computepb.ComputePacketMirroringCollectorIlb {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &computepb.ComputePacketMirroringCollectorIlb{}\n\tp.SetUrl(dcl.ValueOrEmptyString(o.Url))\n\tp.SetCanonicalUrl(dcl.ValueOrEmptyString(o.CanonicalUrl))\n\treturn p\n}", "title": "" }, { "docid": "dcd0882fd1b44f129b0f828f8f1f9adb", "score": "0.6035839", "text": "func ComputePacketMirroringMirroredResourcesInstancesToProto(o *compute.PacketMirroringMirroredResourcesInstances) *computepb.ComputePacketMirroringMirroredResourcesInstances {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &computepb.ComputePacketMirroringMirroredResourcesInstances{}\n\tp.SetUrl(dcl.ValueOrEmptyString(o.Url))\n\tp.SetCanonicalUrl(dcl.ValueOrEmptyString(o.CanonicalUrl))\n\treturn p\n}", "title": "" }, { "docid": "89f9ba2ccccf57f563c192497e009eee", "score": "0.5929229", "text": "func ProtoToComputePacketMirroringMirroredResourcesSubnetworks(p *computepb.ComputePacketMirroringMirroredResourcesSubnetworks) *compute.PacketMirroringMirroredResourcesSubnetworks {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &compute.PacketMirroringMirroredResourcesSubnetworks{\n\t\tUrl: dcl.StringOrNil(p.GetUrl()),\n\t\tCanonicalUrl: dcl.StringOrNil(p.GetCanonicalUrl()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "649b8e9e2ac9d156c3840fcfbc418ce5", "score": "0.5870981", "text": "func ComputePacketMirroringEnableEnumToProto(e *compute.PacketMirroringEnableEnum) computepb.ComputePacketMirroringEnableEnum {\n\tif e == nil {\n\t\treturn computepb.ComputePacketMirroringEnableEnum(0)\n\t}\n\tif v, ok := computepb.ComputePacketMirroringEnableEnum_value[\"PacketMirroringEnableEnum\"+string(*e)]; ok {\n\t\treturn computepb.ComputePacketMirroringEnableEnum(v)\n\t}\n\treturn computepb.ComputePacketMirroringEnableEnum(0)\n}", "title": "" }, { "docid": "5ed528f140ac26c9ac1c900d98a2df41", "score": "0.5850135", "text": "func (n Network) FromProto(protoNet *storage.Network, serdes serde.Registry) (Network, error) {\n\tiConfigs, err := unmarshalConfigs(protoNet.Configs, serdes)\n\tif err != nil {\n\t\treturn n, fmt.Errorf(\"error deserializing network %s: %w\", protoNet.ID, err)\n\t}\n\n\tn.ID = protoNet.ID\n\tn.Type = protoNet.Type\n\tn.Name = protoNet.Name\n\tn.Description = protoNet.Description\n\tn.Version = protoNet.Version\n\tn.Configs = iConfigs\n\treturn n, nil\n}", "title": "" }, { "docid": "31245e9557af6aa5e31445dcf076a1f2", "score": "0.56627107", "text": "func ComputePacketMirroringFilterDirectionEnumToProto(e *compute.PacketMirroringFilterDirectionEnum) computepb.ComputePacketMirroringFilterDirectionEnum {\n\tif e == nil {\n\t\treturn computepb.ComputePacketMirroringFilterDirectionEnum(0)\n\t}\n\tif v, ok := computepb.ComputePacketMirroringFilterDirectionEnum_value[\"PacketMirroringFilterDirectionEnum\"+string(*e)]; ok {\n\t\treturn computepb.ComputePacketMirroringFilterDirectionEnum(v)\n\t}\n\treturn computepb.ComputePacketMirroringFilterDirectionEnum(0)\n}", "title": "" }, { "docid": "350f20afe818d845b87787d2bd11ad08", "score": "0.559808", "text": "func ProtoToNode(p *tpupb.TPUNode) *tpu.Node {\n\tobj := &tpu.Node{\n\t\tName: dcl.StringOrNil(p.Name),\n\t\tDescription: dcl.StringOrNil(p.Description),\n\t\tAcceleratorType: dcl.StringOrNil(p.AcceleratorType),\n\t\tIPAddress: dcl.StringOrNil(p.IpAddress),\n\t\tPort: dcl.StringOrNil(p.Port),\n\t\tState: ProtoToTPUNodeStateEnum(p.GetState()),\n\t\tHealthDescription: dcl.StringOrNil(p.HealthDescription),\n\t\tTensorflowVersion: dcl.StringOrNil(p.TensorflowVersion),\n\t\tNetwork: dcl.StringOrNil(p.Network),\n\t\tCidrBlock: dcl.StringOrNil(p.CidrBlock),\n\t\tServiceAccount: dcl.StringOrNil(p.ServiceAccount),\n\t\tCreateTime: ProtoToTPUNodeCreateTime(p.GetCreateTime()),\n\t\tSchedulingConfig: ProtoToTPUNodeSchedulingConfig(p.GetSchedulingConfig()),\n\t\tHealth: ProtoToTPUNodeHealthEnum(p.GetHealth()),\n\t\tUseServiceNetworking: dcl.Bool(p.UseServiceNetworking),\n\t\tProject: dcl.StringOrNil(p.Project),\n\t\tLocation: dcl.StringOrNil(p.Location),\n\t}\n\tfor _, r := range p.GetNetworkEndpoints() {\n\t\tobj.NetworkEndpoints = append(obj.NetworkEndpoints, *ProtoToTPUNodeNetworkEndpoints(r))\n\t}\n\tfor _, r := range p.GetSymptoms() {\n\t\tobj.Symptoms = append(obj.Symptoms, *ProtoToTPUNodeSymptoms(r))\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "4a453f6fef96275745f55dfea78335c8", "score": "0.559195", "text": "func ProtoToComputePacketMirroringEnableEnum(e computepb.ComputePacketMirroringEnableEnum) *compute.PacketMirroringEnableEnum {\n\tif e == 0 {\n\t\treturn nil\n\t}\n\tif n, ok := computepb.ComputePacketMirroringEnableEnum_name[int32(e)]; ok {\n\t\te := compute.PacketMirroringEnableEnum(n[len(\"ComputePacketMirroringEnableEnum\"):])\n\t\treturn &e\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9797af58eb94d26a6358c73129e248b9", "score": "0.5480764", "text": "func ComputePacketMirroringMirroredResourcesSubnetworksToProto(o *compute.PacketMirroringMirroredResourcesSubnetworks) *computepb.ComputePacketMirroringMirroredResourcesSubnetworks {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &computepb.ComputePacketMirroringMirroredResourcesSubnetworks{}\n\tp.SetUrl(dcl.ValueOrEmptyString(o.Url))\n\tp.SetCanonicalUrl(dcl.ValueOrEmptyString(o.CanonicalUrl))\n\treturn p\n}", "title": "" }, { "docid": "0b9d3afcfd3edb7cdb3ab526c48ba7a4", "score": "0.54012275", "text": "func ProtoToComputePacketMirroringFilterDirectionEnum(e computepb.ComputePacketMirroringFilterDirectionEnum) *compute.PacketMirroringFilterDirectionEnum {\n\tif e == 0 {\n\t\treturn nil\n\t}\n\tif n, ok := computepb.ComputePacketMirroringFilterDirectionEnum_name[int32(e)]; ok {\n\t\te := compute.PacketMirroringFilterDirectionEnum(n[len(\"ComputePacketMirroringFilterDirectionEnum\"):])\n\t\treturn &e\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3d7fc5ad0ac1c81183f10e0590cfb429", "score": "0.5355898", "text": "func ProtoToCloudbuildWorkerPoolNetworkConfig(p *cloudbuildpb.CloudbuildWorkerPoolNetworkConfig) *cloudbuild.WorkerPoolNetworkConfig {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &cloudbuild.WorkerPoolNetworkConfig{\n\t\tPeeredNetwork: dcl.StringOrNil(p.GetPeeredNetwork()),\n\t\tPeeredNetworkIPRange: dcl.StringOrNil(p.GetPeeredNetworkIpRange()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "00496b2703f8e71ad0579d8644926875", "score": "0.5243643", "text": "func CloudbuildWorkerPoolNetworkConfigToProto(o *cloudbuild.WorkerPoolNetworkConfig) *cloudbuildpb.CloudbuildWorkerPoolNetworkConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &cloudbuildpb.CloudbuildWorkerPoolNetworkConfig{}\n\tp.SetPeeredNetwork(dcl.ValueOrEmptyString(o.PeeredNetwork))\n\tp.SetPeeredNetworkIpRange(dcl.ValueOrEmptyString(o.PeeredNetworkIPRange))\n\treturn p\n}", "title": "" }, { "docid": "520a4fb76bd9a6a729aa12f5a960fd6f", "score": "0.52287304", "text": "func (s *PacketMirroringServer) applyPacketMirroring(ctx context.Context, c *compute.Client, request *computepb.ApplyComputePacketMirroringRequest) (*computepb.ComputePacketMirroring, error) {\n\tp := ProtoToPacketMirroring(request.GetResource())\n\tres, err := c.ApplyPacketMirroring(ctx, p)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tr := PacketMirroringToProto(res)\n\treturn r, nil\n}", "title": "" }, { "docid": "cdaf415cf05baaeeddb06f8a970dcbc9", "score": "0.51777357", "text": "func BytesToPacket(ntpPacketBytes []byte) (*Packet, error) {\n\tpacket := &Packet{}\n\treader := bytes.NewReader(ntpPacketBytes)\n\terr := binary.Read(reader, binary.BigEndian, packet)\n\treturn packet, err\n}", "title": "" }, { "docid": "809aac0444e9ad61ea24499bbf264fc2", "score": "0.5169133", "text": "func (m ForwardMetadata) ToProto(pb *metricpb.ForwardMetadata) error {\n\tm.AggregationID.ToProto(&pb.AggregationId)\n\tif err := m.StoragePolicy.ToProto(&pb.StoragePolicy); err != nil {\n\t\treturn err\n\t}\n\tif err := m.Pipeline.ToProto(&pb.Pipeline); err != nil {\n\t\treturn err\n\t}\n\tpb.SourceId = m.SourceID\n\tpb.NumForwardedTimes = int32(m.NumForwardedTimes)\n\tpb.ResendEnabled = m.ResendEnabled\n\treturn nil\n}", "title": "" }, { "docid": "6da29a177bce1b244c62092936108609", "score": "0.516227", "text": "func (u *UserRegOrigin) ConvertToProto() *UserRegOriginProto {\n\treturn &UserRegOriginProto{\n\t\tMid: u.Mid,\n\t\tJoinIP: u.JoinIP,\n\t\tJoinIPV6: u.JoinIPV6,\n\t\tPort: u.Port,\n\t\tJoinTime: u.JoinTime,\n\t\tOrigin: u.Origin,\n\t\tRegType: u.RegType,\n\t\tAppID: u.AppID,\n\t}\n}", "title": "" }, { "docid": "b7d0bebd65253daecd91bf1cfb0cdf42", "score": "0.51395285", "text": "func NetworkservicesGrpcRouteRulesToProto(o *networkservices.GrpcRouteRules) *networkservicespb.NetworkservicesGrpcRouteRules {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &networkservicespb.NetworkservicesGrpcRouteRules{}\n\tp.SetAction(NetworkservicesGrpcRouteRulesActionToProto(o.Action))\n\tsMatches := make([]*networkservicespb.NetworkservicesGrpcRouteRulesMatches, len(o.Matches))\n\tfor i, r := range o.Matches {\n\t\tsMatches[i] = NetworkservicesGrpcRouteRulesMatchesToProto(&r)\n\t}\n\tp.SetMatches(sMatches)\n\treturn p\n}", "title": "" }, { "docid": "adea68554c7439fd29695ff7bf6e63c0", "score": "0.5095537", "text": "func (d *structDecoderImpl) paddingToStruct(fieldType reflect.Type, nodePacket NodePacket) reflect.Value {\n\tobj := reflect.New(fieldType)\n\tobj = reflect.Indirect(obj)\n\n\tfor _, v := range nodePacket.PrimitivePackets {\n\t\tfor i := 0; i < obj.NumField(); i++ {\n\t\t\tstructField := obj.Type().Field(i)\n\t\t\tvalueField := obj.Field(i)\n\t\t\tfieldName := fieldNameByTag(d.config.TagName, structField)\n\t\t\tif v.SeqID() == utils.KeyOf(fieldName) {\n\t\t\t\tvv, _ := d.takePrimitiveValue(valueField.Type(), v)\n\t\t\t\tvalueField.Set(vv)\n\t\t\t}\n\t\t}\n\t}\n\n\tfor _, v := range nodePacket.NodePackets {\n\t\tfor i := 0; i < obj.NumField(); i++ {\n\t\t\tstructField := obj.Type().Field(i)\n\t\t\tvalueField := obj.Field(i)\n\t\t\tfieldName := fieldNameByTag(d.config.TagName, structField)\n\t\t\tif v.SeqID() == utils.KeyOf(fieldName) {\n\t\t\t\tvv, _ := d.takeNodeValue(structField.Type, v)\n\t\t\t\tvalueField.Set(vv)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn reflect.Indirect(obj)\n}", "title": "" }, { "docid": "494afcf57bdc619cb325503fb71d5d80", "score": "0.5056753", "text": "func ParseBytesToPacket(buf []byte) (TelemetryPacket, error) {\n\tr := bytes.NewReader(buf)\n\tpacket := TelemetryPacket{}\n\terr := binary.Read(r, binary.LittleEndian, &packet)\n\tif err != nil {\n\t\treturn TelemetryPacket{}, err\n\t}\n\treturn packet, nil\n}", "title": "" }, { "docid": "1ff251db7316c02066d6a6f7f667eddc", "score": "0.50200033", "text": "func ProtoToInstanceTemplate(p *computepb.ComputeInstanceTemplate) *compute.InstanceTemplate {\n\tobj := &compute.InstanceTemplate{\n\t\tCreationTimestamp: dcl.StringOrNil(p.GetCreationTimestamp()),\n\t\tDescription: dcl.StringOrNil(p.Description),\n\t\tId: dcl.Int64OrNil(p.Id),\n\t\tSelfLink: dcl.StringOrNil(p.SelfLink),\n\t\tName: dcl.StringOrNil(p.Name),\n\t\tProperties: ProtoToComputeInstanceTemplateProperties(p.GetProperties()),\n\t\tProject: dcl.StringOrNil(p.Project),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "be0bc40453605d204db7b2a0b50fc313", "score": "0.49993417", "text": "func FromBytes(bytesReader io.Reader) (*Packet, error) {\n\tp := &Packet{}\n\t//Flags\n\tflags := uint8(0)\n\tbinary.Read(bytesReader, binary.BigEndian, &flags)\n\tp.Flags = flags\n\n\tif p.Flags != 0x8 {\n\t\treturn nil, fmt.Errorf(\"invalid magic integer\")\n\t}\n\n\t//Group Policy\n\tgroupPolicy := make([]byte, 3)\n\tbinary.Read(bytesReader, binary.BigEndian, &groupPolicy)\n\tgroupPolicy = append(groupPolicy, []byte{0x0}...)\n\tp.GroupPolicy = binary.BigEndian.Uint32(groupPolicy)\n\n\t//VNID expanding 3 bytes to 4\n\tvnid := make([]byte, 3)\n\tbinary.Read(bytesReader, binary.BigEndian, &vnid)\n\tvnid = append([]byte{0x0}, vnid...)\n\tp.VNID = binary.BigEndian.Uint32(vnid)\n\n\t//Resv\n\tresv := uint8(0)\n\tbinary.Read(bytesReader, binary.BigEndian, &resv)\n\tp.resv = resv\n\n\t//Inner frame\n\tvar innerFrame bytes.Buffer\n\tio.Copy(&innerFrame, bytesReader)\n\tp.InnerFrame = innerFrame.Bytes()\n\n\treturn p, nil\n}", "title": "" }, { "docid": "55e9d35e133eaae8d45fa3abb5f491ce", "score": "0.49910933", "text": "func NewSyncCvrpPacketFromBytes(data []byte) (SyncCvrpPacket, error) {\n\tremainingBytes, clockRef, correlationID, err := ParseSyncHeader(data, CVRP)\n\tif err != nil {\n\t\treturn SyncCvrpPacket{}, err\n\t}\n\tpacket := SyncCvrpPacket{ClockRef: clockRef, CorrelationID: correlationID}\n\tpacket.ClockRef = binary.LittleEndian.Uint64(data[4:])\n\tif packet.ClockRef != EmptyCFType {\n\t\treturn packet, fmt.Errorf(\"CVRP packet should have empty CFTypeID for ClockRef but has:%x\", packet.ClockRef)\n\t}\n\n\tpacket.DeviceClockRef = binary.LittleEndian.Uint64(remainingBytes)\n\n\tpayloadDict, err := coremedia.NewStringDictFromBytes(remainingBytes[8:])\n\tif err != nil {\n\t\treturn packet, err\n\t}\n\tpacket.Payload = payloadDict\n\treturn packet, nil\n}", "title": "" }, { "docid": "0fd03692f04aa349cca8a87309392d18", "score": "0.49841425", "text": "func GrpcRouteToProto(resource *networkservices.GrpcRoute) *networkservicespb.NetworkservicesGrpcRoute {\n\tp := &networkservicespb.NetworkservicesGrpcRoute{}\n\tp.SetName(dcl.ValueOrEmptyString(resource.Name))\n\tp.SetCreateTime(dcl.ValueOrEmptyString(resource.CreateTime))\n\tp.SetUpdateTime(dcl.ValueOrEmptyString(resource.UpdateTime))\n\tp.SetDescription(dcl.ValueOrEmptyString(resource.Description))\n\tp.SetProject(dcl.ValueOrEmptyString(resource.Project))\n\tp.SetLocation(dcl.ValueOrEmptyString(resource.Location))\n\tp.SetSelfLink(dcl.ValueOrEmptyString(resource.SelfLink))\n\tmLabels := make(map[string]string, len(resource.Labels))\n\tfor k, r := range resource.Labels {\n\t\tmLabels[k] = r\n\t}\n\tp.SetLabels(mLabels)\n\tsHostnames := make([]string, len(resource.Hostnames))\n\tfor i, r := range resource.Hostnames {\n\t\tsHostnames[i] = r\n\t}\n\tp.SetHostnames(sHostnames)\n\tsMeshes := make([]string, len(resource.Meshes))\n\tfor i, r := range resource.Meshes {\n\t\tsMeshes[i] = r\n\t}\n\tp.SetMeshes(sMeshes)\n\tsGateways := make([]string, len(resource.Gateways))\n\tfor i, r := range resource.Gateways {\n\t\tsGateways[i] = r\n\t}\n\tp.SetGateways(sGateways)\n\tsRules := make([]*networkservicespb.NetworkservicesGrpcRouteRules, len(resource.Rules))\n\tfor i, r := range resource.Rules {\n\t\tsRules[i] = NetworkservicesGrpcRouteRulesToProto(&r)\n\t}\n\tp.SetRules(sRules)\n\n\treturn p\n}", "title": "" }, { "docid": "c9f0108b91f72e4386aae99fad39649c", "score": "0.49748003", "text": "func ProtoToCloudbuildWorkerPoolPrivatePoolV1ConfigNetworkConfig(p *cloudbuildpb.CloudbuildWorkerPoolPrivatePoolV1ConfigNetworkConfig) *cloudbuild.WorkerPoolPrivatePoolV1ConfigNetworkConfig {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &cloudbuild.WorkerPoolPrivatePoolV1ConfigNetworkConfig{\n\t\tPeeredNetwork: dcl.StringOrNil(p.GetPeeredNetwork()),\n\t\tPeeredNetworkIPRange: dcl.StringOrNil(p.GetPeeredNetworkIpRange()),\n\t\tEgressOption: ProtoToCloudbuildWorkerPoolPrivatePoolV1ConfigNetworkConfigEgressOptionEnum(p.GetEgressOption()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "caf5f2e38d8858a9ddea333bd82d8d46", "score": "0.49693713", "text": "func NodeToProto(resource *tpu.Node) *tpupb.TPUNode {\n\tp := &tpupb.TPUNode{\n\t\tName: dcl.ValueOrEmptyString(resource.Name),\n\t\tDescription: dcl.ValueOrEmptyString(resource.Description),\n\t\tAcceleratorType: dcl.ValueOrEmptyString(resource.AcceleratorType),\n\t\tIpAddress: dcl.ValueOrEmptyString(resource.IPAddress),\n\t\tPort: dcl.ValueOrEmptyString(resource.Port),\n\t\tState: TPUNodeStateEnumToProto(resource.State),\n\t\tHealthDescription: dcl.ValueOrEmptyString(resource.HealthDescription),\n\t\tTensorflowVersion: dcl.ValueOrEmptyString(resource.TensorflowVersion),\n\t\tNetwork: dcl.ValueOrEmptyString(resource.Network),\n\t\tCidrBlock: dcl.ValueOrEmptyString(resource.CidrBlock),\n\t\tServiceAccount: dcl.ValueOrEmptyString(resource.ServiceAccount),\n\t\tCreateTime: TPUNodeCreateTimeToProto(resource.CreateTime),\n\t\tSchedulingConfig: TPUNodeSchedulingConfigToProto(resource.SchedulingConfig),\n\t\tHealth: TPUNodeHealthEnumToProto(resource.Health),\n\t\tUseServiceNetworking: dcl.ValueOrEmptyBool(resource.UseServiceNetworking),\n\t\tProject: dcl.ValueOrEmptyString(resource.Project),\n\t\tLocation: dcl.ValueOrEmptyString(resource.Location),\n\t}\n\tfor _, r := range resource.NetworkEndpoints {\n\t\tp.NetworkEndpoints = append(p.NetworkEndpoints, TPUNodeNetworkEndpointsToProto(&r))\n\t}\n\tfor _, r := range resource.Symptoms {\n\t\tp.Symptoms = append(p.Symptoms, TPUNodeSymptomsToProto(&r))\n\t}\n\n\treturn p\n}", "title": "" }, { "docid": "2f9ce4efe0caf405cb69e2b9ed880178", "score": "0.4945949", "text": "func (k *MaglevOuterKey) ToNetwork() *MaglevOuterKey {\n\tn := *k\n\t// For some reasons rev_nat_index is stored in network byte order in\n\t// the SVC BPF maps\n\tn.RevNatID = byteorder.HostToNetwork16(n.RevNatID)\n\treturn &n\n}", "title": "" }, { "docid": "132501ecd8b8b4544ef82cc08b7da23b", "score": "0.49432376", "text": "func (ent NetworkEntity) fromProtoSerialized(p *storage.NetworkEntity) NetworkEntity {\n\te := NetworkEntity{\n\t\tNetworkID: p.NetworkID,\n\t\tType: p.Type,\n\t\tKey: p.Key,\n\t\tName: p.Name,\n\t\tDescription: p.Description,\n\t\tPhysicalID: p.PhysicalID,\n\t\tGraphID: p.GraphID,\n\t\tAssociations: entIDsToTKs(p.Associations),\n\t\tParentAssociations: entIDsToTKs(p.ParentAssociations),\n\t\tVersion: p.Version,\n\t}\n\tif len(p.Config) != 0 {\n\t\te.Config = p.Config\n\t\te.isSerialized = true\n\t}\n\treturn e\n}", "title": "" }, { "docid": "a50ad786ff73b597f5ea64115b7e3cdd", "score": "0.49387714", "text": "func TPUNodeNetworkEndpointsToProto(o *tpu.NodeNetworkEndpoints) *tpupb.TPUNodeNetworkEndpoints {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &tpupb.TPUNodeNetworkEndpoints{\n\t\tIpAddress: dcl.ValueOrEmptyString(o.IPAddress),\n\t\tPort: dcl.ValueOrEmptyInt64(o.Port),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "b1c12a465a6265d4c67ae1ead055f2f1", "score": "0.4932249", "text": "func (p *Packet) Marshal() ([]byte, error) {\n\n\t/*\n\t * 0 1 2 3\n\t * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1\n\t * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\n\t * |V=2|P|X| CC |M| PT | sequence number |\n\t * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\n\t * | timestamp |\n\t * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\n\t * | synchronization source (SSRC) identifier |\n\t * +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+\n\t * | contributing source (CSRC) identifiers |\n\t * | .... |\n\t * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\n\t */\n\n\trawPacketLength := 12 + (len(p.CSRC) * csrcLength)\n\tif p.Extension {\n\t\trawPacketLength += 4 + len(p.ExtensionPayload)\n\t}\n\trawPacket := make([]byte, rawPacketLength)\n\n\trawPacket[0] |= p.Version << versionShift\n\tif p.Padding {\n\t\trawPacket[0] |= 1 << paddingShift\n\t}\n\tif p.Extension {\n\t\trawPacket[0] |= 1 << extensionShift\n\t}\n\trawPacket[0] |= uint8(len(p.CSRC))\n\n\tif p.Marker {\n\t\trawPacket[1] |= 1 << markerShift\n\t}\n\trawPacket[1] |= p.PayloadType\n\n\tbinary.BigEndian.PutUint16(rawPacket[seqNumOffset:], p.SequenceNumber)\n\tbinary.BigEndian.PutUint32(rawPacket[timestampOffset:], p.Timestamp)\n\tbinary.BigEndian.PutUint32(rawPacket[ssrcOffset:], p.SSRC)\n\n\tfor i, csrc := range p.CSRC {\n\t\tbinary.BigEndian.PutUint32(rawPacket[csrcOffset+(i*csrcLength):], csrc)\n\t}\n\n\tcurrOffset := csrcOffset + (len(p.CSRC) * csrcLength)\n\n\tfor i := range p.CSRC {\n\t\toffset := csrcOffset + (i * csrcLength)\n\t\tp.CSRC[i] = binary.BigEndian.Uint32(rawPacket[offset:offset])\n\t}\n\n\tif p.Extension {\n\t\tbinary.BigEndian.PutUint16(rawPacket[currOffset:], p.ExtensionProfile)\n\t\tcurrOffset += 2\n\t\tbinary.BigEndian.PutUint16(rawPacket[currOffset:], uint16(len(p.ExtensionPayload))/4)\n\t\tcurrOffset += 2\n\t\tcopy(rawPacket[currOffset:], p.ExtensionPayload)\n\t}\n\n\tp.PayloadOffset = csrcOffset + (len(p.CSRC) * csrcLength)\n\n\trawPacket = append(rawPacket, p.Payload...)\n\tp.Raw = rawPacket\n\n\treturn rawPacket, nil\n}", "title": "" }, { "docid": "b4723fd38beb996bdaf92f24a96c579d", "score": "0.4929439", "text": "func DatagramToStruct(buf []byte) *F1Packet {\n\tvar pack F1Packet\n\tr := bytes.NewReader(buf) // binary.Read requires a reader\n\t// F1 outputs packet data in LittleEndian style\n\t// Bytes read from r are written using LittleEndian decoding into successive fields of the pack pointer\n\t// https://golang.org/pkg/encoding/binary/#Read\n\tif err := binary.Read(r, binary.LittleEndian, &pack); err != nil {\n\t\tfmt.Println(err)\n\t}\n\tpack.Speed = pack.Speed * 2.23694 // convert for InfluxDB\n\treturn &pack\n}", "title": "" }, { "docid": "3ae5ac72eb885692739b401baf7f7bab", "score": "0.4928515", "text": "func (l *Liquid) ToProto() *pbLiquid.Liquid {\n\treturn &pbLiquid.Liquid{\n\t\tID: l.id,\n\t\tFileHash: l.fileHash,\n\t\tContent: l.content,\n\t\tSize: l.size,\n\t\tLastUpdated: l.lastUpdated,\n\t\tDeleted: l.deleted,\n\t\tOptions: &pbLiquid.Options{\n\t\t\tName: l.options.GetName(),\n\t\t\tExt: l.options.GetExt(),\n\t\t\tCache: l.options.GetCache(),\n\t\t\tGzip: l.options.GetGzip(),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "b4eb1d1672cd55956b90715d738f2f8d", "score": "0.4890365", "text": "func FromNet(r io.Reader) (BitSwapMessage, error) {\n\treturn libipfs.FromNet(r)\n}", "title": "" }, { "docid": "a17602507e52c6cce10755c4b7e1b8d6", "score": "0.48839742", "text": "func ProtoToComputeInstanceTemplatePropertiesNetworkInterfaces(p *computepb.ComputeInstanceTemplatePropertiesNetworkInterfaces) *compute.InstanceTemplatePropertiesNetworkInterfaces {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &compute.InstanceTemplatePropertiesNetworkInterfaces{\n\t\tName: dcl.StringOrNil(p.Name),\n\t\tNetwork: dcl.StringOrNil(p.Network),\n\t\tNetworkIP: dcl.StringOrNil(p.NetworkIp),\n\t\tSubnetwork: dcl.StringOrNil(p.Subnetwork),\n\t}\n\tfor _, r := range p.GetAccessConfigs() {\n\t\tobj.AccessConfigs = append(obj.AccessConfigs, *ProtoToComputeInstanceTemplatePropertiesNetworkInterfacesAccessConfigs(r))\n\t}\n\tfor _, r := range p.GetAliasIpRanges() {\n\t\tobj.AliasIPRanges = append(obj.AliasIPRanges, *ProtoToComputeInstanceTemplatePropertiesNetworkInterfacesAliasIPRanges(r))\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "e1011678763e2bdd7f1f58a904ee251c", "score": "0.487062", "text": "func NetworkservicesGrpcRouteRulesActionFaultInjectionPolicyDelayToProto(o *networkservices.GrpcRouteRulesActionFaultInjectionPolicyDelay) *networkservicespb.NetworkservicesGrpcRouteRulesActionFaultInjectionPolicyDelay {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &networkservicespb.NetworkservicesGrpcRouteRulesActionFaultInjectionPolicyDelay{}\n\tp.SetFixedDelay(dcl.ValueOrEmptyString(o.FixedDelay))\n\tp.SetPercentage(dcl.ValueOrEmptyInt64(o.Percentage))\n\treturn p\n}", "title": "" }, { "docid": "1b11a3e204880858a1ed39e86d8bb892", "score": "0.48626977", "text": "func ProtoToWorkerPool(p *cloudbuildpb.CloudbuildWorkerPool) *cloudbuild.WorkerPool {\n\tobj := &cloudbuild.WorkerPool{\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tDisplayName: dcl.StringOrNil(p.GetDisplayName()),\n\t\tUid: dcl.StringOrNil(p.GetUid()),\n\t\tCreateTime: dcl.StringOrNil(p.GetCreateTime()),\n\t\tUpdateTime: dcl.StringOrNil(p.GetUpdateTime()),\n\t\tDeleteTime: dcl.StringOrNil(p.GetDeleteTime()),\n\t\tState: ProtoToCloudbuildWorkerPoolStateEnum(p.GetState()),\n\t\tPrivatePoolV1Config: ProtoToCloudbuildWorkerPoolPrivatePoolV1Config(p.GetPrivatePoolV1Config()),\n\t\tEtag: dcl.StringOrNil(p.GetEtag()),\n\t\tWorkerConfig: ProtoToCloudbuildWorkerPoolWorkerConfig(p.GetWorkerConfig()),\n\t\tNetworkConfig: ProtoToCloudbuildWorkerPoolNetworkConfig(p.GetNetworkConfig()),\n\t\tProject: dcl.StringOrNil(p.GetProject()),\n\t\tLocation: dcl.StringOrNil(p.GetLocation()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "02bdc3d9806aaa13ed95fd47aebcefd4", "score": "0.48583615", "text": "func ProtoToGrpcRoute(p *networkservicespb.NetworkservicesGrpcRoute) *networkservices.GrpcRoute {\n\tobj := &networkservices.GrpcRoute{\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tCreateTime: dcl.StringOrNil(p.GetCreateTime()),\n\t\tUpdateTime: dcl.StringOrNil(p.GetUpdateTime()),\n\t\tDescription: dcl.StringOrNil(p.GetDescription()),\n\t\tProject: dcl.StringOrNil(p.GetProject()),\n\t\tLocation: dcl.StringOrNil(p.GetLocation()),\n\t\tSelfLink: dcl.StringOrNil(p.GetSelfLink()),\n\t}\n\tfor _, r := range p.GetHostnames() {\n\t\tobj.Hostnames = append(obj.Hostnames, r)\n\t}\n\tfor _, r := range p.GetMeshes() {\n\t\tobj.Meshes = append(obj.Meshes, r)\n\t}\n\tfor _, r := range p.GetGateways() {\n\t\tobj.Gateways = append(obj.Gateways, r)\n\t}\n\tfor _, r := range p.GetRules() {\n\t\tobj.Rules = append(obj.Rules, *ProtoToNetworkservicesGrpcRouteRules(r))\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "c47b44fb7e07b428ae0336c3025aceff", "score": "0.48575798", "text": "func CloudbuildWorkerPoolPrivatePoolV1ConfigNetworkConfigToProto(o *cloudbuild.WorkerPoolPrivatePoolV1ConfigNetworkConfig) *cloudbuildpb.CloudbuildWorkerPoolPrivatePoolV1ConfigNetworkConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &cloudbuildpb.CloudbuildWorkerPoolPrivatePoolV1ConfigNetworkConfig{}\n\tp.SetPeeredNetwork(dcl.ValueOrEmptyString(o.PeeredNetwork))\n\tp.SetPeeredNetworkIpRange(dcl.ValueOrEmptyString(o.PeeredNetworkIPRange))\n\tp.SetEgressOption(CloudbuildWorkerPoolPrivatePoolV1ConfigNetworkConfigEgressOptionEnumToProto(o.EgressOption))\n\treturn p\n}", "title": "" }, { "docid": "d523eee9c1a583a3c8159e88649b6823", "score": "0.48557717", "text": "func (k *AffinityMatchKey) ToNetwork() *AffinityMatchKey {\n\tn := *k\n\t// For some reasons rev_nat_index is stored in network byte order in\n\t// the SVC BPF maps\n\tn.RevNATID = byteorder.HostToNetwork(n.RevNATID).(uint16)\n\treturn &n\n}", "title": "" }, { "docid": "5d016a995b587582203a935fee2166a4", "score": "0.48424125", "text": "func ProtoToTPUNodeNetworkEndpoints(p *tpupb.TPUNodeNetworkEndpoints) *tpu.NodeNetworkEndpoints {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &tpu.NodeNetworkEndpoints{\n\t\tIPAddress: dcl.StringOrNil(p.IpAddress),\n\t\tPort: dcl.Int64OrNil(p.Port),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "ccf63a9cc256dca19c62d442dea8039b", "score": "0.48151332", "text": "func NetworkservicesGrpcRouteRulesMatchesMethodToProto(o *networkservices.GrpcRouteRulesMatchesMethod) *networkservicespb.NetworkservicesGrpcRouteRulesMatchesMethod {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &networkservicespb.NetworkservicesGrpcRouteRulesMatchesMethod{}\n\tp.SetType(NetworkservicesGrpcRouteRulesMatchesMethodTypeEnumToProto(o.Type))\n\tp.SetGrpcService(dcl.ValueOrEmptyString(o.GrpcService))\n\tp.SetGrpcMethod(dcl.ValueOrEmptyString(o.GrpcMethod))\n\tp.SetCaseSensitive(dcl.ValueOrEmptyBool(o.CaseSensitive))\n\treturn p\n}", "title": "" }, { "docid": "cb886de108d8b97cbfe7043a3cf71bb1", "score": "0.48103452", "text": "func ToPipelineRunProto(pr *v1beta1.PipelineRun) (*pb.PipelineRun, error) {\n\tb, err := json.Marshal(pr)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error marshalling PipelineRun: %v\", err)\n\t}\n\tout := new(pb.PipelineRun)\n\tm := jsonpb.Unmarshaler{\n\t\tAllowUnknownFields: true,\n\t}\n\tif err := m.Unmarshal(bytes.NewBuffer(b), out); err != nil {\n\t\treturn nil, fmt.Errorf(\"error converting PipelineRun to proto: %v\", err)\n\t}\n\treturn out, nil\n}", "title": "" }, { "docid": "88c18240461e39d50f057fcf0687842d", "score": "0.4809223", "text": "func ComputeInstanceTemplatePropertiesNetworkInterfacesToProto(o *compute.InstanceTemplatePropertiesNetworkInterfaces) *computepb.ComputeInstanceTemplatePropertiesNetworkInterfaces {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &computepb.ComputeInstanceTemplatePropertiesNetworkInterfaces{\n\t\tName: dcl.ValueOrEmptyString(o.Name),\n\t\tNetwork: dcl.ValueOrEmptyString(o.Network),\n\t\tNetworkIp: dcl.ValueOrEmptyString(o.NetworkIP),\n\t\tSubnetwork: dcl.ValueOrEmptyString(o.Subnetwork),\n\t}\n\tfor _, r := range o.AccessConfigs {\n\t\tp.AccessConfigs = append(p.AccessConfigs, ComputeInstanceTemplatePropertiesNetworkInterfacesAccessConfigsToProto(&r))\n\t}\n\tfor _, r := range o.AliasIPRanges {\n\t\tp.AliasIpRanges = append(p.AliasIpRanges, ComputeInstanceTemplatePropertiesNetworkInterfacesAliasIPRangesToProto(&r))\n\t}\n\treturn p\n}", "title": "" }, { "docid": "6666397737a24b29d4ecdebb8b8b5c0d", "score": "0.4807314", "text": "func NetworkservicesGrpcRouteRulesMatchesToProto(o *networkservices.GrpcRouteRulesMatches) *networkservicespb.NetworkservicesGrpcRouteRulesMatches {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &networkservicespb.NetworkservicesGrpcRouteRulesMatches{}\n\tp.SetMethod(NetworkservicesGrpcRouteRulesMatchesMethodToProto(o.Method))\n\tsHeaders := make([]*networkservicespb.NetworkservicesGrpcRouteRulesMatchesHeaders, len(o.Headers))\n\tfor i, r := range o.Headers {\n\t\tsHeaders[i] = NetworkservicesGrpcRouteRulesMatchesHeadersToProto(&r)\n\t}\n\tp.SetHeaders(sHeaders)\n\treturn p\n}", "title": "" }, { "docid": "a35b332ec52c96292275328142ef6444", "score": "0.4803621", "text": "func (u *UserThirdBind) ConvertToProto() *UserThirdBindProto {\n\treturn &UserThirdBindProto{\n\t\tID: u.ID,\n\t\tMid: u.Mid,\n\t\tOpenID: u.OpenID,\n\t\tPlatForm: u.PlatForm,\n\t\tToken: u.Token,\n\t\tExpires: u.Expires,\n\t}\n}", "title": "" }, { "docid": "2d87c1f6cfd077bb3a80c61d18259204", "score": "0.48014352", "text": "func ToPushMirror(pm *repo_model.PushMirror) (*api.PushMirror, error) {\n\trepo := pm.GetRepository()\n\tremoteAddress, err := getRemoteAddress(repo, pm.RemoteName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &api.PushMirror{\n\t\tRepoName: repo.Name,\n\t\tRemoteName: pm.RemoteName,\n\t\tRemoteAddress: remoteAddress,\n\t\tCreatedUnix: pm.CreatedUnix.FormatLong(),\n\t\tLastUpdateUnix: pm.LastUpdateUnix.FormatLong(),\n\t\tLastError: pm.LastError,\n\t\tInterval: pm.Interval.String(),\n\t\tSyncOnCommit: pm.SyncOnCommit,\n\t}, nil\n}", "title": "" }, { "docid": "8717fc325690fab8f54399279c056e15", "score": "0.48002094", "text": "func ProtoToComputeInstanceTemplateProperties(p *computepb.ComputeInstanceTemplateProperties) *compute.InstanceTemplateProperties {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &compute.InstanceTemplateProperties{\n\t\tCanIPForward: dcl.Bool(p.CanIpForward),\n\t\tDescription: dcl.StringOrNil(p.Description),\n\t\tMachineType: dcl.StringOrNil(p.MachineType),\n\t\tMinCpuPlatform: dcl.StringOrNil(p.MinCpuPlatform),\n\t\tReservationAffinity: ProtoToComputeInstanceTemplatePropertiesReservationAffinity(p.GetReservationAffinity()),\n\t\tShieldedInstanceConfig: ProtoToComputeInstanceTemplatePropertiesShieldedInstanceConfig(p.GetShieldedInstanceConfig()),\n\t\tScheduling: ProtoToComputeInstanceTemplatePropertiesScheduling(p.GetScheduling()),\n\t}\n\tfor _, r := range p.GetDisks() {\n\t\tobj.Disks = append(obj.Disks, *ProtoToComputeInstanceTemplatePropertiesDisks(r))\n\t}\n\tfor _, r := range p.GetGuestAccelerators() {\n\t\tobj.GuestAccelerators = append(obj.GuestAccelerators, *ProtoToComputeInstanceTemplatePropertiesGuestAccelerators(r))\n\t}\n\tfor _, r := range p.GetNetworkInterfaces() {\n\t\tobj.NetworkInterfaces = append(obj.NetworkInterfaces, *ProtoToComputeInstanceTemplatePropertiesNetworkInterfaces(r))\n\t}\n\tfor _, r := range p.GetServiceAccounts() {\n\t\tobj.ServiceAccounts = append(obj.ServiceAccounts, *ProtoToComputeInstanceTemplatePropertiesServiceAccounts(r))\n\t}\n\tfor _, r := range p.GetTags() {\n\t\tobj.Tags = append(obj.Tags, r)\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "abb65b86ff68a0f149ad737b39d10c6b", "score": "0.47931165", "text": "func unmarshalPacketMirroring(b []byte, c *Client, res *PacketMirroring) (*PacketMirroring, error) {\n\tvar m map[string]interface{}\n\tif err := json.Unmarshal(b, &m); err != nil {\n\t\treturn nil, err\n\t}\n\treturn unmarshalMapPacketMirroring(m, c, res)\n}", "title": "" }, { "docid": "33f6ed6056c0e09400b8e1c21098b39a", "score": "0.4776813", "text": "func ProtoToWorkerPool(p *alphapb.CloudbuildAlphaWorkerPool) *alpha.WorkerPool {\n\tobj := &alpha.WorkerPool{\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tDisplayName: dcl.StringOrNil(p.GetDisplayName()),\n\t\tUid: dcl.StringOrNil(p.GetUid()),\n\t\tCreateTime: dcl.StringOrNil(p.GetCreateTime()),\n\t\tUpdateTime: dcl.StringOrNil(p.GetUpdateTime()),\n\t\tDeleteTime: dcl.StringOrNil(p.GetDeleteTime()),\n\t\tState: ProtoToCloudbuildAlphaWorkerPoolStateEnum(p.GetState()),\n\t\tPrivatePoolV1Config: ProtoToCloudbuildAlphaWorkerPoolPrivatePoolV1Config(p.GetPrivatePoolV1Config()),\n\t\tEtag: dcl.StringOrNil(p.GetEtag()),\n\t\tWorkerConfig: ProtoToCloudbuildAlphaWorkerPoolWorkerConfig(p.GetWorkerConfig()),\n\t\tNetworkConfig: ProtoToCloudbuildAlphaWorkerPoolNetworkConfig(p.GetNetworkConfig()),\n\t\tProject: dcl.StringOrNil(p.GetProject()),\n\t\tLocation: dcl.StringOrNil(p.GetLocation()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "cc7246674900c86041a7d0286f4fee78", "score": "0.47598988", "text": "func (lb *LightBlock) ToProto() (*tmproto.LightBlock, error) {\n\tif lb == nil {\n\t\treturn nil, nil\n\t}\n\n\tlbp := new(tmproto.LightBlock)\n\tvar err error\n\tif lb.SignedHeader != nil {\n\t\tlbp.SignedHeader = lb.SignedHeader.ToProto()\n\t}\n\tif lb.ValidatorSet != nil {\n\t\tlbp.ValidatorSet, err = lb.ValidatorSet.ToProto()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn lbp, nil\n}", "title": "" }, { "docid": "28e58bfb2a0cf31b41ed272db08eec09", "score": "0.4753221", "text": "func ProtoToNetworkservicesGrpcRouteRules(p *networkservicespb.NetworkservicesGrpcRouteRules) *networkservices.GrpcRouteRules {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &networkservices.GrpcRouteRules{\n\t\tAction: ProtoToNetworkservicesGrpcRouteRulesAction(p.GetAction()),\n\t}\n\tfor _, r := range p.GetMatches() {\n\t\tobj.Matches = append(obj.Matches, *ProtoToNetworkservicesGrpcRouteRulesMatches(r))\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "79400f9f16d733f258f4c5392eec6ab7", "score": "0.47461304", "text": "func (u *UserBase) ConvertToProto() *UserBaseProto {\n\treturn &UserBaseProto{\n\t\tMid: u.Mid,\n\t\tUserID: u.UserID,\n\t\tPwd: u.Pwd,\n\t\tSalt: u.Salt,\n\t\tStatus: u.Status,\n\t}\n}", "title": "" }, { "docid": "7cdfa4673e8577b035c5fcf093b3e3d6", "score": "0.4744108", "text": "func (u *UserEmail) ConvertToProto() *UserEmailProto {\n\treturn &UserEmailProto{\n\t\tMid: u.Mid,\n\t\tEmail: u.Email,\n\t\tVerified: u.Verified,\n\t\tEmailBindTime: u.EmailBindTime,\n\t}\n}", "title": "" }, { "docid": "911d6f9a885fe940f513a76b7604f037", "score": "0.47282743", "text": "func MakePacket(payload []byte, server *Server, client *Peer) []byte {\n\tbuf := gopacket.NewSerializeBuffer()\n\n\t// this does the hard stuff for us\n\topts := gopacket.SerializeOptions{\n\t\tFixLengths: true,\n\t\tComputeChecksums: true,\n\t}\n\n\tipHeader := layers.IPv4{\n\t\tSrcIP: client.IP,\n\t\tDstIP: server.Addr.IP,\n\t\tVersion: 4,\n\t\tTTL: 64,\n\t\tProtocol: layers.IPProtocolUDP,\n\t}\n\n\tudpHeader := layers.UDP{\n\t\tSrcPort: layers.UDPPort(client.Port),\n\t\tDstPort: layers.UDPPort(server.Port),\n\t}\n\n\tpayloadLayer := gopacket.Payload(payload)\n\n\tudpHeader.SetNetworkLayerForChecksum(&ipHeader)\n\n\tgopacket.SerializeLayers(buf, opts, &ipHeader, &udpHeader, &payloadLayer)\n\n\treturn buf.Bytes()\n}", "title": "" }, { "docid": "0de1a3da45740d7084576f023d23cd16", "score": "0.47273365", "text": "func NewProto(value interface{}) (NodeProto, error) {\n\tvar err error\n\tsValue, ok := value.(string)\n\tif !ok {\n\t\terr = ErrConversionType\n\t}\n\n\tvar original string = sValue\n\tvar not bool = false\n\n\tif strings.HasPrefix(sValue, notOp) {\n\t\tnot = true\n\t\tsValue = strings.Replace(sValue, notOp, \"\", -1)\n\t}\n\treturn NodeProto{\n\t\tkey: Proto.String(),\n\t\tvalue: sValue,\n\t\toriginal: original,\n\t\tnot: not,\n\t}, err\n}", "title": "" }, { "docid": "d10cd6d9638d41b2998cb2a87fb4d1c2", "score": "0.47256356", "text": "func (s *PacketMirroringServer) ListComputePacketMirroring(ctx context.Context, request *computepb.ListComputePacketMirroringRequest) (*computepb.ListComputePacketMirroringResponse, error) {\n\tcl, err := createConfigPacketMirroring(ctx, request.GetServiceAccountFile())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresources, err := cl.ListPacketMirroring(ctx, request.GetProject(), request.GetLocation())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar protos []*computepb.ComputePacketMirroring\n\tfor _, r := range resources.Items {\n\t\trp := PacketMirroringToProto(r)\n\t\tprotos = append(protos, rp)\n\t}\n\tp := &computepb.ListComputePacketMirroringResponse{}\n\tp.SetItems(protos)\n\treturn p, nil\n}", "title": "" }, { "docid": "c27a90a286104525d8079d2aa25be028", "score": "0.47215438", "text": "func (PRUDPPacket *Packet) FromBytes(Data []byte) {\n\tPRUDPPacket.Data = Data\n\t//header := PRUDPPacket.decodeHeader()\n\n\tvar decoded map[string]interface{}\n\n\tif bytes.Equal(PRUDPPacket.Data[:2], PRUDPV1Magic) {\n\t\tPRUDPPacket.Version = 1\n\t\tdecoded = decodePacketV1(PRUDPPacket)\n\t\tPRUDPPacket.MultiAckVersion = decoded[\"MultiAckVersion\"].(uint8)\n\t} else if bytes.Equal(PRUDPPacket.Data[:1], PRUDPLiteMagic) {\n\t\tPRUDPPacket.Version = 2\n\t\t// handle Lite?\n\t\t// we aren't doing Switch stuff but I dunno why not have a check anyway!\n\t} else {\n\t\t// assume v0?\n\t\t// v0 doesn't have a dedicated magic, and the first 2 bytes aren't really static\n\t\tPRUDPPacket.Version = 0\n\t\tdecoded = decodePacketV0(PRUDPPacket)\n\t\tPRUDPPacket.Checksum = decoded[\"Checksum\"].(int)\n\t}\n\n\tPRUDPPacket.Type = decoded[\"Type\"].(uint16)\n\tPRUDPPacket.Flags = decoded[\"Flags\"].(uint16)\n\tPRUDPPacket.SourceType = decoded[\"SourceType\"].(uint8)\n\tPRUDPPacket.SourcePort = decoded[\"SourcePort\"].(uint8)\n\tPRUDPPacket.DestinationType = decoded[\"DestinationType\"].(uint8)\n\tPRUDPPacket.DestinationPort = decoded[\"DestinationPort\"].(uint8)\n\tPRUDPPacket.FragmentID = decoded[\"FragmentID\"].(int)\n\n\tPRUDPPacket.Source = decoded[\"Source\"].(uint8)\n\tPRUDPPacket.Destination = decoded[\"Destination\"].(uint8)\n\tPRUDPPacket.SequenceID = decoded[\"SequenceID\"].(uint16)\n\tPRUDPPacket.SessionID = decoded[\"SessionID\"].(uint8)\n\tPRUDPPacket.Signature = decoded[\"Signature\"].([]byte)\n\n\tPRUDPPacket.Payload = decoded[\"Payload\"].([]byte)\n\n\tif decoded[\"RMCRequest\"] != nil {\n\t\tPRUDPPacket.RMCRequest = decoded[\"RMCRequest\"].(RMCRequest)\n\t}\n}", "title": "" }, { "docid": "c78872a9d9d3a8cd7c30dfe897461187", "score": "0.47151038", "text": "func ProtoToGroup(p *betapb.CloudidentityBetaGroup) *beta.Group {\n\tobj := &beta.Group{\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tGroupKey: ProtoToCloudidentityBetaGroupGroupKey(p.GetGroupKey()),\n\t\tParent: dcl.StringOrNil(p.GetParent()),\n\t\tDisplayName: dcl.StringOrNil(p.GetDisplayName()),\n\t\tDescription: dcl.StringOrNil(p.GetDescription()),\n\t\tCreateTime: dcl.StringOrNil(p.GetCreateTime()),\n\t\tUpdateTime: dcl.StringOrNil(p.GetUpdateTime()),\n\t\tDirectMemberCount: dcl.Int64OrNil(p.GetDirectMemberCount()),\n\t\tDirectMemberCountPerType: ProtoToCloudidentityBetaGroupDirectMemberCountPerType(p.GetDirectMemberCountPerType()),\n\t\tDynamicGroupMetadata: ProtoToCloudidentityBetaGroupDynamicGroupMetadata(p.GetDynamicGroupMetadata()),\n\t\tInitialGroupConfig: ProtoToCloudidentityBetaGroupInitialGroupConfigEnum(p.GetInitialGroupConfig()),\n\t}\n\tfor _, r := range p.GetAdditionalGroupKeys() {\n\t\tobj.AdditionalGroupKeys = append(obj.AdditionalGroupKeys, *ProtoToCloudidentityBetaGroupAdditionalGroupKeys(r))\n\t}\n\tfor _, r := range p.GetDerivedAliases() {\n\t\tobj.DerivedAliases = append(obj.DerivedAliases, *ProtoToCloudidentityBetaGroupDerivedAliases(r))\n\t}\n\tfor _, r := range p.GetPosixGroups() {\n\t\tobj.PosixGroups = append(obj.PosixGroups, *ProtoToCloudidentityBetaGroupPosixGroups(r))\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "69961a5f622647fcde31dca23d559bfc", "score": "0.4710855", "text": "func ProtoToWorkforcePool(p *iampb.IamWorkforcePool) *iam.WorkforcePool {\n\tobj := &iam.WorkforcePool{\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tSelfLink: dcl.StringOrNil(p.GetSelfLink()),\n\t\tParent: dcl.StringOrNil(p.GetParent()),\n\t\tDisplayName: dcl.StringOrNil(p.GetDisplayName()),\n\t\tDescription: dcl.StringOrNil(p.GetDescription()),\n\t\tState: ProtoToIamWorkforcePoolStateEnum(p.GetState()),\n\t\tDisabled: dcl.Bool(p.GetDisabled()),\n\t\tSessionDuration: dcl.StringOrNil(p.GetSessionDuration()),\n\t\tLocation: dcl.StringOrNil(p.GetLocation()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "fa11c49b77d6e32727b757cb3ed7c9bd", "score": "0.4707395", "text": "func CloudbuildAlphaWorkerPoolPrivatePoolV1ConfigNetworkConfigToProto(o *alpha.WorkerPoolPrivatePoolV1ConfigNetworkConfig) *alphapb.CloudbuildAlphaWorkerPoolPrivatePoolV1ConfigNetworkConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.CloudbuildAlphaWorkerPoolPrivatePoolV1ConfigNetworkConfig{}\n\tp.SetPeeredNetwork(dcl.ValueOrEmptyString(o.PeeredNetwork))\n\tp.SetPeeredNetworkIpRange(dcl.ValueOrEmptyString(o.PeeredNetworkIPRange))\n\tp.SetEgressOption(CloudbuildAlphaWorkerPoolPrivatePoolV1ConfigNetworkConfigEgressOptionEnumToProto(o.EgressOption))\n\treturn p\n}", "title": "" }, { "docid": "296424a54b16a4cfce4db1236f357ac3", "score": "0.47022647", "text": "func NetworkservicesGrpcRouteRulesActionFaultInjectionPolicyToProto(o *networkservices.GrpcRouteRulesActionFaultInjectionPolicy) *networkservicespb.NetworkservicesGrpcRouteRulesActionFaultInjectionPolicy {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &networkservicespb.NetworkservicesGrpcRouteRulesActionFaultInjectionPolicy{}\n\tp.SetDelay(NetworkservicesGrpcRouteRulesActionFaultInjectionPolicyDelayToProto(o.Delay))\n\tp.SetAbort(NetworkservicesGrpcRouteRulesActionFaultInjectionPolicyAbortToProto(o.Abort))\n\treturn p\n}", "title": "" }, { "docid": "2e8b46b0c960178f8dc98ea655b2fd8a", "score": "0.4702088", "text": "func ProtoToCloudbuildAlphaWorkerPoolPrivatePoolV1ConfigNetworkConfig(p *alphapb.CloudbuildAlphaWorkerPoolPrivatePoolV1ConfigNetworkConfig) *alpha.WorkerPoolPrivatePoolV1ConfigNetworkConfig {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &alpha.WorkerPoolPrivatePoolV1ConfigNetworkConfig{\n\t\tPeeredNetwork: dcl.StringOrNil(p.GetPeeredNetwork()),\n\t\tPeeredNetworkIPRange: dcl.StringOrNil(p.GetPeeredNetworkIpRange()),\n\t\tEgressOption: ProtoToCloudbuildAlphaWorkerPoolPrivatePoolV1ConfigNetworkConfigEgressOptionEnum(p.GetEgressOption()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "dd259a09c6e744c6a6c342132699fd88", "score": "0.46919364", "text": "func (t MetricGroup) ToProto() apiv1.MetricType {\n\tswitch t {\n\tcase ValidationMetricGroup:\n\t\treturn apiv1.MetricType_METRIC_TYPE_VALIDATION\n\tcase TrainingMetricGroup:\n\t\treturn apiv1.MetricType_METRIC_TYPE_TRAINING\n\tdefault:\n\t\treturn apiv1.MetricType_METRIC_TYPE_UNSPECIFIED\n\t}\n}", "title": "" }, { "docid": "7bfa67b1592b19e8aa818518485058d2", "score": "0.46867007", "text": "func ConvertReviewModelToPM(review *models.Review) *pbm.Review {\n\treviewModel := &pbm.Review{\n\t\tId: review.ID,\n\t\tLoncheraId: review.LoncheraID,\n\t\tComment: review.Comment,\n\t\tUserId: review.UserID,\n\t\tUserName: review.UserName,\n\t\tRating: review.Rating,\n\t\tCreatedAt: review.CreatedAt.Format(\"2006-01-02 15:04:05\"),\n\t}\n\n\treturn reviewModel\n}", "title": "" }, { "docid": "287b6d95953fee6cb50a45958701ad36", "score": "0.4683278", "text": "func NetworkservicesGrpcRouteRulesMatchesHeadersToProto(o *networkservices.GrpcRouteRulesMatchesHeaders) *networkservicespb.NetworkservicesGrpcRouteRulesMatchesHeaders {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &networkservicespb.NetworkservicesGrpcRouteRulesMatchesHeaders{}\n\tp.SetType(NetworkservicesGrpcRouteRulesMatchesHeadersTypeEnumToProto(o.Type))\n\tp.SetKey(dcl.ValueOrEmptyString(o.Key))\n\tp.SetValue(dcl.ValueOrEmptyString(o.Value))\n\treturn p\n}", "title": "" }, { "docid": "711fb858475f918643ef3ec0a65a8966", "score": "0.46797937", "text": "func (u *UserSafeQuestion) ConvertToProto() *UserSafeQuestionProto {\n\treturn &UserSafeQuestionProto{\n\t\tMid: u.Mid,\n\t\tSafeQuestion: u.SafeQuestion,\n\t\tSafeAnswer: u.SafeAnswer,\n\t\tSafeBindTime: u.SafeBindTime,\n\t}\n}", "title": "" }, { "docid": "a14e4d92b60b039604d3d9e648cb0e63", "score": "0.46749067", "text": "func ProtoToGroup(p *alphapb.MonitoringAlphaGroup) *alpha.Group {\n\tobj := &alpha.Group{\n\t\tDisplayName: dcl.StringOrNil(p.GetDisplayName()),\n\t\tFilter: dcl.StringOrNil(p.GetFilter()),\n\t\tIsCluster: dcl.Bool(p.GetIsCluster()),\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tParentName: dcl.StringOrNil(p.GetParentName()),\n\t\tProject: dcl.StringOrNil(p.GetProject()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "550e086e103fdd4ad75530c16451e667", "score": "0.46719265", "text": "func (m PipelineMetadata) ToProto(pb *metricpb.PipelineMetadata) error {\n\tm.AggregationID.ToProto(&pb.AggregationId)\n\tif err := m.Pipeline.ToProto(&pb.Pipeline); err != nil {\n\t\treturn err\n\t}\n\tnumStoragePolicies := len(m.StoragePolicies)\n\tif cap(pb.StoragePolicies) >= numStoragePolicies {\n\t\tpb.StoragePolicies = pb.StoragePolicies[:numStoragePolicies]\n\t} else {\n\t\tpb.StoragePolicies = make([]policypb.StoragePolicy, numStoragePolicies)\n\t}\n\tfor i := 0; i < numStoragePolicies; i++ {\n\t\tif err := m.StoragePolicies[i].ToProto(&pb.StoragePolicies[i]); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tpb.DropPolicy = policypb.DropPolicy(m.DropPolicy)\n\tpb.ResendEnabled = m.ResendEnabled\n\treturn nil\n}", "title": "" }, { "docid": "7437914ac04563c911cb2fe95d7fde10", "score": "0.46675432", "text": "func (m Metadata) ToProto(pb *metricpb.Metadata) error {\n\tnumPipelines := len(m.Pipelines)\n\tif cap(pb.Pipelines) >= numPipelines {\n\t\tpb.Pipelines = pb.Pipelines[:numPipelines]\n\t} else {\n\t\tpb.Pipelines = make([]metricpb.PipelineMetadata, numPipelines)\n\t}\n\tfor i := 0; i < numPipelines; i++ {\n\t\tif err := m.Pipelines[i].ToProto(&pb.Pipelines[i]); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ede45a519c1addebc3ca7f8f6df44d14", "score": "0.46506593", "text": "func CloudbuildAlphaWorkerPoolNetworkConfigToProto(o *alpha.WorkerPoolNetworkConfig) *alphapb.CloudbuildAlphaWorkerPoolNetworkConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.CloudbuildAlphaWorkerPoolNetworkConfig{}\n\tp.SetPeeredNetwork(dcl.ValueOrEmptyString(o.PeeredNetwork))\n\tp.SetPeeredNetworkIpRange(dcl.ValueOrEmptyString(o.PeeredNetworkIPRange))\n\treturn p\n}", "title": "" }, { "docid": "f700087afa212f66502de0ae7fa26d2e", "score": "0.4646599", "text": "func (c *DaemonConfig) toProto() *proto.DaemonConfig {\n\tif c == nil {\n\t\treturn nil\n\t}\n\n\treturn &proto.DaemonConfig{\n\t\tDriver: &proto.DaemonDriverConfig{},\n\t}\n}", "title": "" }, { "docid": "aa2f41660df4b704dda7a4b087fde6a5", "score": "0.4645305", "text": "func NewPacket(t PacketType) Packet {\r\n\tvar newPacket Packet\r\n\r\n\t// If this is a received packet, don't change anything\r\n\tif t == Received{\r\n\t\treturn newPacket\r\n\t}\r\n\r\n\t// Write the packet type\r\n\tnewPacket.data = append(newPacket.data, uint8(t))\r\n\r\n\treturn newPacket\r\n}", "title": "" }, { "docid": "38ffdd7cd3ffd3b8a41e158412bb6963", "score": "0.46447116", "text": "func (v *RevNat6Key) ToNetwork() RevNatKey {\n\tn := *v\n\tn.Key = byteorder.HostToNetwork16(n.Key)\n\treturn &n\n}", "title": "" }, { "docid": "7046f2ae3462d16be273a146345fffb4", "score": "0.4643815", "text": "func NetworkservicesAlphaEndpointConfigSelectorTrafficPortSelectorToProto(o *alpha.EndpointConfigSelectorTrafficPortSelector) *alphapb.NetworkservicesAlphaEndpointConfigSelectorTrafficPortSelector {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.NetworkservicesAlphaEndpointConfigSelectorTrafficPortSelector{}\n\tfor _, r := range o.Ports {\n\t\tp.Ports = append(p.Ports, r)\n\t}\n\treturn p\n}", "title": "" }, { "docid": "71bc1f3078247cb056c54cdcc2467606", "score": "0.46367988", "text": "func (v *RevNat6Value) ToNetwork() RevNatValue {\n\tn := *v\n\tn.Port = byteorder.HostToNetwork16(n.Port)\n\treturn &n\n}", "title": "" }, { "docid": "153ccf1111e2abc04c76f410ab85f003", "score": "0.4634238", "text": "func (interest Interest) ToPacket() (packet *Packet) {\n\tpacket = &Packet{}\n\tif interest.packet != nil {\n\t\t*packet = *interest.packet\n\t}\n\tpacket.Interest = &interest\n\treturn packet\n}", "title": "" }, { "docid": "e78a41c2ad7c7b287eeb076e910e5918", "score": "0.46299902", "text": "func ToNetSocketAddressWithProto(protocol tcpip.NetworkProtocolNumber, addr tcpip.FullAddress) net.SocketAddress {\n\tswitch protocol {\n\tcase ipv4.ProtocolNumber:\n\t\tout := net.Ipv4SocketAddress{\n\t\t\tPort: addr.Port,\n\t\t}\n\t\tcopy(out.Address.Addr[:], addr.Addr)\n\t\treturn net.SocketAddressWithIpv4(out)\n\tcase ipv6.ProtocolNumber:\n\t\tout := net.Ipv6SocketAddress{\n\t\t\tPort: addr.Port,\n\t\t}\n\t\tif len(addr.Addr) == header.IPv4AddressSize {\n\t\t\t// Copy address in v4-mapped format.\n\t\t\tcopy(out.Address.Addr[header.IPv6AddressSize-header.IPv4AddressSize:], addr.Addr)\n\t\t\tout.Address.Addr[header.IPv6AddressSize-header.IPv4AddressSize-1] = 0xff\n\t\t\tout.Address.Addr[header.IPv6AddressSize-header.IPv4AddressSize-2] = 0xff\n\t\t} else {\n\t\t\tcopy(out.Address.Addr[:], addr.Addr)\n\t\t\tif isLinkLocal(out.Address) {\n\t\t\t\tout.ZoneIndex = uint64(addr.NIC)\n\t\t\t}\n\t\t}\n\t\treturn net.SocketAddressWithIpv6(out)\n\tdefault:\n\t\tpanic(fmt.Sprintf(\"invalid protocol for conversion: %d\", protocol))\n\t}\n}", "title": "" }, { "docid": "d34470bd9bc3ad8b966e3514ecd6acf7", "score": "0.46226135", "text": "func (u *UserTel) ConvertToProto() *UserTelProto {\n\treturn &UserTelProto{\n\t\tMid: u.Mid,\n\t\tTel: u.Tel,\n\t\tCid: u.Cid,\n\t\tTelBindTime: u.TelBindTime,\n\t}\n}", "title": "" }, { "docid": "150ee47b26bddc5773db2fc0d9ea3d98", "score": "0.46175465", "text": "func NewNetProtoCollector(cfgBaseName string, parentLogger zerolog.Logger) (collector.Collector, error) {\n\tc := Proto{}\n\tc.id = NameProto\n\tc.pkgID = PackageName + \".\" + c.id\n\tc.logger = parentLogger.With().Str(\"id\", c.id).Logger()\n\tc.baseTags = tags.FromList(tags.GetBaseTags())\n\n\tvar opts protoOptions\n\terr := config.LoadConfigFile(cfgBaseName, &opts)\n\tif err != nil {\n\t\tif strings.Contains(err.Error(), \"no config found matching\") {\n\t\t\treturn &c, nil\n\t\t}\n\t\tc.logger.Warn().Err(err).Str(\"file\", cfgBaseName).Msg(\"loading config file\")\n\t\treturn nil, fmt.Errorf(\"%s config: %w\", c.pkgID, err)\n\t}\n\n\tc.logger.Debug().Str(\"base\", cfgBaseName).Interface(\"config\", opts).Msg(\"loaded config\")\n\n\tif len(opts.Protocols) > 0 {\n\t\tc.protocols = opts.Protocols\n\t}\n\n\tif opts.ID != \"\" {\n\t\tc.id = opts.ID\n\t}\n\n\tif opts.RunTTL != \"\" {\n\t\tdur, err := time.ParseDuration(opts.RunTTL)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"%s parsing run_ttl: %w\", c.pkgID, err)\n\t\t}\n\t\tc.runTTL = dur\n\t}\n\n\treturn &c, nil\n}", "title": "" }, { "docid": "089ae88d02eb9dd16b3d6265a5c416ed", "score": "0.4616041", "text": "func ProtoToCloudbuildAlphaWorkerPoolNetworkConfig(p *alphapb.CloudbuildAlphaWorkerPoolNetworkConfig) *alpha.WorkerPoolNetworkConfig {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &alpha.WorkerPoolNetworkConfig{\n\t\tPeeredNetwork: dcl.StringOrNil(p.GetPeeredNetwork()),\n\t\tPeeredNetworkIPRange: dcl.StringOrNil(p.GetPeeredNetworkIpRange()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "a974eeb8949857f195413f561753c6bb", "score": "0.46154907", "text": "func IPToNet(ip net.IP) net.IPNet {\n\tlen := 32\n\tif ip.To4() == nil {\n\t\tlen = 128\n\t}\n\n\treturn net.IPNet{\n\t\tIP: ip,\n\t\tMask: net.CIDRMask(len, len),\n\t}\n}", "title": "" }, { "docid": "e9092bccb2c162635f81ef2ab848f42d", "score": "0.4613655", "text": "func CloudidentityBetaGroupDirectMemberCountPerTypeToProto(o *beta.GroupDirectMemberCountPerType) *betapb.CloudidentityBetaGroupDirectMemberCountPerType {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.CloudidentityBetaGroupDirectMemberCountPerType{}\n\tp.SetUserCount(dcl.ValueOrEmptyInt64(o.UserCount))\n\tp.SetGroupCount(dcl.ValueOrEmptyInt64(o.GroupCount))\n\treturn p\n}", "title": "" }, { "docid": "da7f62f915e11a9f4d6e88d205bc49c6", "score": "0.46009013", "text": "func (s *Record) ToProto() *pb.ServiceMap {\n\tif len(s.m) == 0 {\n\t\treturn nil\n\t}\n\n\tservices := make(map[string]*pb.NetworkAddress, len(s.m))\n\tfor service, addr := range s.m {\n\t\tservices[service] = &pb.NetworkAddress{\n\t\t\tNetwork: addr.network,\n\t\t\tPort: uint32(addr.port),\n\t\t}\n\t}\n\n\treturn &pb.ServiceMap{\n\t\tMap: services,\n\t}\n}", "title": "" }, { "docid": "52fe8e43386a50b9cccbee72c1330da8", "score": "0.45989597", "text": "func GroupToProto(resource *alpha.Group) *alphapb.MonitoringAlphaGroup {\n\tp := &alphapb.MonitoringAlphaGroup{}\n\tp.SetDisplayName(dcl.ValueOrEmptyString(resource.DisplayName))\n\tp.SetFilter(dcl.ValueOrEmptyString(resource.Filter))\n\tp.SetIsCluster(dcl.ValueOrEmptyBool(resource.IsCluster))\n\tp.SetName(dcl.ValueOrEmptyString(resource.Name))\n\tp.SetParentName(dcl.ValueOrEmptyString(resource.ParentName))\n\tp.SetProject(dcl.ValueOrEmptyString(resource.Project))\n\n\treturn p\n}", "title": "" }, { "docid": "3332cf33955d2956d0eb05a1628afef4", "score": "0.45919544", "text": "func ProtoToAzureNodePool(p *betapb.GkemulticloudBetaAzureNodePool) *beta.AzureNodePool {\n\tobj := &beta.AzureNodePool{\n\t\tName: dcl.StringOrNil(p.Name),\n\t\tVersion: dcl.StringOrNil(p.Version),\n\t\tConfig: ProtoToGkemulticloudBetaAzureNodePoolConfig(p.GetConfig()),\n\t\tSubnetId: dcl.StringOrNil(p.SubnetId),\n\t\tAutoscaling: ProtoToGkemulticloudBetaAzureNodePoolAutoscaling(p.GetAutoscaling()),\n\t\tState: ProtoToGkemulticloudBetaAzureNodePoolStateEnum(p.GetState()),\n\t\tUid: dcl.StringOrNil(p.Uid),\n\t\tReconciling: dcl.Bool(p.Reconciling),\n\t\tCreateTime: dcl.StringOrNil(p.GetCreateTime()),\n\t\tUpdateTime: dcl.StringOrNil(p.GetUpdateTime()),\n\t\tEtag: dcl.StringOrNil(p.Etag),\n\t\tMaxPodsConstraint: ProtoToGkemulticloudBetaAzureNodePoolMaxPodsConstraint(p.GetMaxPodsConstraint()),\n\t\tAzureAvailabilityZone: dcl.StringOrNil(p.AzureAvailabilityZone),\n\t\tProject: dcl.StringOrNil(p.Project),\n\t\tLocation: dcl.StringOrNil(p.Location),\n\t\tAzureCluster: dcl.StringOrNil(p.AzureCluster),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "56a399845cdba311035b7c3a2eeb05d0", "score": "0.4582316", "text": "func JSONToProto(data string) (*google_pb.Struct, error) {\n\tvar out google_pb.Struct\n\tif err := jsonpb.UnmarshalString(string(data), &out); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &out, nil\n}", "title": "" }, { "docid": "30f99edef04413bbb7f8e3d3dda42fbb", "score": "0.45736685", "text": "func routeToProto(route router.Route) *pbNet.Route {\n\treturn &pbNet.Route{\n\t\tService: route.Service,\n\t\tAddress: route.Address,\n\t\tGateway: route.Gateway,\n\t\tNetwork: route.Network,\n\t\tRouter: route.Router,\n\t\tLink: route.Link,\n\t\tMetric: int64(route.Metric),\n\t}\n}", "title": "" }, { "docid": "54b48d6de88d757c7565b8d021e09701", "score": "0.45643198", "text": "func TransformToCNP(obj interface{}) (interface{}, error) {\n\tswitch concreteObj := obj.(type) {\n\tcase *cilium_v2.CiliumNetworkPolicy:\n\t\treturn &types.SlimCNP{\n\t\t\tCiliumNetworkPolicy: &cilium_v2.CiliumNetworkPolicy{\n\t\t\t\tTypeMeta: concreteObj.TypeMeta,\n\t\t\t\tObjectMeta: concreteObj.ObjectMeta,\n\t\t\t\tSpec: concreteObj.Spec,\n\t\t\t\tSpecs: concreteObj.Specs,\n\t\t\t},\n\t\t}, nil\n\tcase *types.SlimCNP:\n\t\treturn obj, nil\n\tcase cache.DeletedFinalStateUnknown:\n\t\tif _, ok := concreteObj.Obj.(*types.SlimCNP); ok {\n\t\t\treturn obj, nil\n\t\t}\n\t\tcnp, ok := concreteObj.Obj.(*cilium_v2.CiliumNetworkPolicy)\n\t\tif !ok {\n\t\t\treturn nil, fmt.Errorf(\"unknown object type %T\", concreteObj.Obj)\n\t\t}\n\t\treturn cache.DeletedFinalStateUnknown{\n\t\t\tKey: concreteObj.Key,\n\t\t\tObj: &types.SlimCNP{\n\t\t\t\tCiliumNetworkPolicy: &cilium_v2.CiliumNetworkPolicy{\n\t\t\t\t\tTypeMeta: cnp.TypeMeta,\n\t\t\t\t\tObjectMeta: cnp.ObjectMeta,\n\t\t\t\t\tSpec: cnp.Spec,\n\t\t\t\t\tSpecs: cnp.Specs,\n\t\t\t\t},\n\t\t\t},\n\t\t}, nil\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unknown object type %T\", concreteObj)\n\t}\n}", "title": "" }, { "docid": "1d0005e551ebb445e33ce682c707c388", "score": "0.45538014", "text": "func InstanceTemplateToProto(resource *compute.InstanceTemplate) *computepb.ComputeInstanceTemplate {\n\tp := &computepb.ComputeInstanceTemplate{\n\t\tCreationTimestamp: dcl.ValueOrEmptyString(resource.CreationTimestamp),\n\t\tDescription: dcl.ValueOrEmptyString(resource.Description),\n\t\tId: dcl.ValueOrEmptyInt64(resource.Id),\n\t\tSelfLink: dcl.ValueOrEmptyString(resource.SelfLink),\n\t\tName: dcl.ValueOrEmptyString(resource.Name),\n\t\tProperties: ComputeInstanceTemplatePropertiesToProto(resource.Properties),\n\t\tProject: dcl.ValueOrEmptyString(resource.Project),\n\t}\n\n\treturn p\n}", "title": "" }, { "docid": "c0a8a6424ba46b1b6e7abf8f22f44990", "score": "0.45516914", "text": "func ToTaskRunProto(tr *v1beta1.TaskRun) (*pb.TaskRun, error) {\n\tb, err := json.Marshal(tr)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error marshalling TaskRun: %v\", err)\n\t}\n\tout := new(pb.TaskRun)\n\tm := jsonpb.Unmarshaler{\n\t\tAllowUnknownFields: true,\n\t}\n\tif err := m.Unmarshal(bytes.NewBuffer(b), out); err != nil {\n\t\treturn nil, fmt.Errorf(\"error converting TaskRun to proto: %v\", err)\n\t}\n\treturn out, nil\n}", "title": "" }, { "docid": "77233d8bb7630f75228b808d12ebf455", "score": "0.45481014", "text": "func CloudidentityAlphaGroupDirectMemberCountPerTypeToProto(o *alpha.GroupDirectMemberCountPerType) *alphapb.CloudidentityAlphaGroupDirectMemberCountPerType {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.CloudidentityAlphaGroupDirectMemberCountPerType{}\n\tp.SetUserCount(dcl.ValueOrEmptyInt64(o.UserCount))\n\tp.SetGroupCount(dcl.ValueOrEmptyInt64(o.GroupCount))\n\treturn p\n}", "title": "" } ]
11ad049cd5c22b981df669b4969a87fd
GetRecoveryPlanProviderSpecificInput implements the RecoveryPlanProviderSpecificInputClassification interface for type RecoveryPlanProviderSpecificInput.
[ { "docid": "9dd3754a2007d5cdb6765fa31476deff", "score": "0.819971", "text": "func (r *RecoveryPlanProviderSpecificInput) GetRecoveryPlanProviderSpecificInput() *RecoveryPlanProviderSpecificInput {\n\treturn r\n}", "title": "" } ]
[ { "docid": "afe3c55f86f2acbadb9cef400c299b49", "score": "0.82019204", "text": "func (r *RecoveryPlanA2AInput) GetRecoveryPlanProviderSpecificInput() *RecoveryPlanProviderSpecificInput {\n\treturn &RecoveryPlanProviderSpecificInput{\n\t\tInstanceType: r.InstanceType,\n\t}\n}", "title": "" }, { "docid": "f78f2b243ef353406740dffc7ec8311f", "score": "0.71232194", "text": "func (i *InMageRcmPolicyCreationInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "d24a0b246f1d912615da0b80611103f5", "score": "0.710896", "text": "func (i *InMageRcmFailbackPolicyCreationInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "a6c70af6875fc4b9074673788b321503", "score": "0.7042194", "text": "func (h *HyperVReplicaPolicyInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: h.InstanceType,\n\t}\n}", "title": "" }, { "docid": "50a010c7b43c5791700d6a61b42fda35", "score": "0.702497", "text": "func (i *InMagePolicyInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "70676da848e4cffd66bf66b9c35625fb", "score": "0.6994642", "text": "func (i *InMageAzureV2PolicyInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "f13024d5d3514b30e35e35c47fba11ac", "score": "0.6959322", "text": "func (v *VMwareCbtPolicyCreationInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: v.InstanceType,\n\t}\n}", "title": "" }, { "docid": "3ab74fd287cc461b2a7a591c9c921b59", "score": "0.6948185", "text": "func (h *HyperVReplicaAzurePolicyInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: h.InstanceType,\n\t}\n}", "title": "" }, { "docid": "4ba88a220afef9b645558df1b8da26e4", "score": "0.69136834", "text": "func (i *InMageAzureV2SwitchProviderInput) GetSwitchProviderSpecificInput() *SwitchProviderSpecificInput {\n\treturn &SwitchProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "0013d90e11f153d3a37ba302c7fdcd3e", "score": "0.6909117", "text": "func (a *A2ASwitchProtectionInput) GetSwitchProtectionProviderSpecificInput() *SwitchProtectionProviderSpecificInput {\n\treturn &SwitchProtectionProviderSpecificInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "6b4fa05298ad36816473116cb2805618", "score": "0.6885341", "text": "func (s *SwitchProtectionProviderSpecificInput) GetSwitchProtectionProviderSpecificInput() *SwitchProtectionProviderSpecificInput {\n\treturn s\n}", "title": "" }, { "docid": "0ed79217c54974c65bd8dacef67316e1", "score": "0.6847277", "text": "func (s *SwitchProviderSpecificInput) GetSwitchProviderSpecificInput() *SwitchProviderSpecificInput {\n\treturn s\n}", "title": "" }, { "docid": "46769f96f8d41a0807ed29b96b0d05ed", "score": "0.6838804", "text": "func (a *A2ACrossClusterMigrationPolicyCreationInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "0eeabed8fc5a7846644a281a4a5b9a8e", "score": "0.68188363", "text": "func (a *ApplyRecoveryPointProviderSpecificInput) GetApplyRecoveryPointProviderSpecificInput() *ApplyRecoveryPointProviderSpecificInput {\n\treturn a\n}", "title": "" }, { "docid": "dc26e7bb089dc23f10c172e8dbe16095", "score": "0.68075484", "text": "func (h *HyperVReplicaBluePolicyInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: h.InstanceType,\n\t}\n}", "title": "" }, { "docid": "32bdc66f00680dc0136e10c60c529f5d", "score": "0.6749058", "text": "func (p *PolicyProviderSpecificInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn p\n}", "title": "" }, { "docid": "f20f187f4fc871545369cb3c9ada75c0", "score": "0.67415905", "text": "func (h *HyperVReplicaAzureApplyRecoveryPointInput) GetApplyRecoveryPointProviderSpecificInput() *ApplyRecoveryPointProviderSpecificInput {\n\treturn &ApplyRecoveryPointProviderSpecificInput{\n\t\tInstanceType: h.InstanceType,\n\t}\n}", "title": "" }, { "docid": "01a4ce7e5e77bbf59ffb1aede305caea", "score": "0.67265654", "text": "func (a *A2APolicyCreationInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "2bfe734ebd1aa4382ce0770649185979", "score": "0.6669482", "text": "func (a *A2AApplyRecoveryPointInput) GetApplyRecoveryPointProviderSpecificInput() *ApplyRecoveryPointProviderSpecificInput {\n\treturn &ApplyRecoveryPointProviderSpecificInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "b0c513108907c89060896f460ce1b9b2", "score": "0.6665099", "text": "func (m *MigrateProviderSpecificInput) GetMigrateProviderSpecificInput() *MigrateProviderSpecificInput {\n\treturn m\n}", "title": "" }, { "docid": "8ea1638bbf10df3115bf793ab6a08eee", "score": "0.66274744", "text": "func (i *InMageRcmEnableProtectionInput) GetEnableProtectionProviderSpecificInput() *EnableProtectionProviderSpecificInput {\n\treturn &EnableProtectionProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "7bf76b1f108adfac825548d5522d71d4", "score": "0.65858024", "text": "func (i *InMageRcmApplyRecoveryPointInput) GetApplyRecoveryPointProviderSpecificInput() *ApplyRecoveryPointProviderSpecificInput {\n\treturn &ApplyRecoveryPointProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "128151bd5f896ed6df125a0a0340e719", "score": "0.65404665", "text": "func (i *InMageEnableProtectionInput) GetEnableProtectionProviderSpecificInput() *EnableProtectionProviderSpecificInput {\n\treturn &EnableProtectionProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "080d9b35b6d52c5d0f7090b9ec1186d9", "score": "0.6497606", "text": "func (i *InMageAzureV2EnableProtectionInput) GetEnableProtectionProviderSpecificInput() *EnableProtectionProviderSpecificInput {\n\treturn &EnableProtectionProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "341f9d6f2ce6f84ecbb12a9bbaf40a25", "score": "0.6394008", "text": "func (a *A2AEnableProtectionInput) GetEnableProtectionProviderSpecificInput() *EnableProtectionProviderSpecificInput {\n\treturn &EnableProtectionProviderSpecificInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "0da367c065dc347a7fa90a84057a59bb", "score": "0.63836926", "text": "func (e *EnableMigrationProviderSpecificInput) GetEnableMigrationProviderSpecificInput() *EnableMigrationProviderSpecificInput {\n\treturn e\n}", "title": "" }, { "docid": "97ecf8f3419b49d7d36002fd540ca336", "score": "0.637712", "text": "func (e *EnableProtectionProviderSpecificInput) GetEnableProtectionProviderSpecificInput() *EnableProtectionProviderSpecificInput {\n\treturn e\n}", "title": "" }, { "docid": "57cba5db6079dcf20c6efdc05661ddd4", "score": "0.63729596", "text": "func (i *InMageAzureV2ApplyRecoveryPointInput) GetApplyRecoveryPointProviderSpecificInput() *ApplyRecoveryPointProviderSpecificInput {\n\treturn &ApplyRecoveryPointProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "f9c9e56953cef9bfb143f6593a27ae12", "score": "0.63617885", "text": "func (h *HyperVReplicaAzureEnableProtectionInput) GetEnableProtectionProviderSpecificInput() *EnableProtectionProviderSpecificInput {\n\treturn &EnableProtectionProviderSpecificInput{\n\t\tInstanceType: h.InstanceType,\n\t}\n}", "title": "" }, { "docid": "7c575845b53d289486c9c8c1fa76a460", "score": "0.63139683", "text": "func (v *VMwareCbtEnableMigrationInput) GetEnableMigrationProviderSpecificInput() *EnableMigrationProviderSpecificInput {\n\treturn &EnableMigrationProviderSpecificInput{\n\t\tInstanceType: v.InstanceType,\n\t}\n}", "title": "" }, { "docid": "c9dc70dbca50e60b5ced5047a6d1ea29", "score": "0.6283175", "text": "func (v *VMwareCbtResumeReplicationInput) GetResumeReplicationProviderSpecificInput() *ResumeReplicationProviderSpecificInput {\n\treturn &ResumeReplicationProviderSpecificInput{\n\t\tInstanceType: v.InstanceType,\n\t}\n}", "title": "" }, { "docid": "0f1f9e3fc8ac1d94e9cf80ddec5dbb1a", "score": "0.62658834", "text": "func (v *VMwareCbtMigrateInput) GetMigrateProviderSpecificInput() *MigrateProviderSpecificInput {\n\treturn &MigrateProviderSpecificInput{\n\t\tInstanceType: v.InstanceType,\n\t}\n}", "title": "" }, { "docid": "560a1a110134fa26ca4c3fc616d31d84", "score": "0.6264447", "text": "func (a *A2ACrossClusterMigrationEnableProtectionInput) GetEnableProtectionProviderSpecificInput() *EnableProtectionProviderSpecificInput {\n\treturn &EnableProtectionProviderSpecificInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "cd3924cb0303b54a03cf881edf324c96", "score": "0.62344515", "text": "func (r *ResumeReplicationProviderSpecificInput) GetResumeReplicationProviderSpecificInput() *ResumeReplicationProviderSpecificInput {\n\treturn r\n}", "title": "" }, { "docid": "6768e47d57dae0f6c2ac131a520dbbc2", "score": "0.61845666", "text": "func (a *A2ACrossClusterMigrationApplyRecoveryPointInput) GetApplyRecoveryPointProviderSpecificInput() *ApplyRecoveryPointProviderSpecificInput {\n\treturn &ApplyRecoveryPointProviderSpecificInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "aab82b4044aad2e5da8269679eaf591a", "score": "0.60958004", "text": "func (r *ResyncProviderSpecificInput) GetResyncProviderSpecificInput() *ResyncProviderSpecificInput {\n\treturn r\n}", "title": "" }, { "docid": "f78a5d9dfb2b3d53994488d4c85cb1cf", "score": "0.6084317", "text": "func (r *RecoveryPlanInMageRcmFailoverInput) GetRecoveryPlanProviderSpecificFailoverInput() *RecoveryPlanProviderSpecificFailoverInput {\n\treturn &RecoveryPlanProviderSpecificFailoverInput{\n\t\tInstanceType: r.InstanceType,\n\t}\n}", "title": "" }, { "docid": "3ddad5ecde9434d98590486692e5dfeb", "score": "0.60331035", "text": "func (r *RecoveryPlanInMageFailoverInput) GetRecoveryPlanProviderSpecificFailoverInput() *RecoveryPlanProviderSpecificFailoverInput {\n\treturn &RecoveryPlanProviderSpecificFailoverInput{\n\t\tInstanceType: r.InstanceType,\n\t}\n}", "title": "" }, { "docid": "0e8c0deaa5dc1155f104fb89afe5a4f7", "score": "0.5957143", "text": "func (r *RecoveryPlanHyperVReplicaAzureFailoverInput) GetRecoveryPlanProviderSpecificFailoverInput() *RecoveryPlanProviderSpecificFailoverInput {\n\treturn &RecoveryPlanProviderSpecificFailoverInput{\n\t\tInstanceType: r.InstanceType,\n\t}\n}", "title": "" }, { "docid": "976dfe6cc84dcbcc04661cb1d934fc5f", "score": "0.59491414", "text": "func (r *RecoveryPlanProviderSpecificFailoverInput) GetRecoveryPlanProviderSpecificFailoverInput() *RecoveryPlanProviderSpecificFailoverInput {\n\treturn r\n}", "title": "" }, { "docid": "4fe8c92598d3432264f8b7ac6a328781", "score": "0.59394306", "text": "func (v *VMwareCbtResyncInput) GetResyncProviderSpecificInput() *ResyncProviderSpecificInput {\n\treturn &ResyncProviderSpecificInput{\n\t\tInstanceType: v.InstanceType,\n\t}\n}", "title": "" }, { "docid": "73ab6f97226bd85cf204c8c88c73bac9", "score": "0.5910591", "text": "func (r *RecoveryPlanInMageAzureV2FailoverInput) GetRecoveryPlanProviderSpecificFailoverInput() *RecoveryPlanProviderSpecificFailoverInput {\n\treturn &RecoveryPlanProviderSpecificFailoverInput{\n\t\tInstanceType: r.InstanceType,\n\t}\n}", "title": "" }, { "docid": "d9ef493c329d259356aa9627a8a5194d", "score": "0.58532315", "text": "func (r *RecoveryPlanInMageRcmFailbackFailoverInput) GetRecoveryPlanProviderSpecificFailoverInput() *RecoveryPlanProviderSpecificFailoverInput {\n\treturn &RecoveryPlanProviderSpecificFailoverInput{\n\t\tInstanceType: r.InstanceType,\n\t}\n}", "title": "" }, { "docid": "084607b1e2791ae70b471b6e83a8356a", "score": "0.58423084", "text": "func (i *InMageTestFailoverInput) GetTestFailoverProviderSpecificInput() *TestFailoverProviderSpecificInput {\n\treturn &TestFailoverProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "2df3942fdcf1b6ce8af754ed7556835f", "score": "0.5791248", "text": "func (h *HyperVReplicaAzureUnplannedFailoverInput) GetUnplannedFailoverProviderSpecificInput() *UnplannedFailoverProviderSpecificInput {\n\treturn &UnplannedFailoverProviderSpecificInput{\n\t\tInstanceType: h.InstanceType,\n\t}\n}", "title": "" }, { "docid": "18faba7b6968e081f4f44661e0511a72", "score": "0.5783297", "text": "func (i *InMageUnplannedFailoverInput) GetUnplannedFailoverProviderSpecificInput() *UnplannedFailoverProviderSpecificInput {\n\treturn &UnplannedFailoverProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "6fbd744f1abb22f820fcc02786804de5", "score": "0.5757565", "text": "func (t *TestFailoverProviderSpecificInput) GetTestFailoverProviderSpecificInput() *TestFailoverProviderSpecificInput {\n\treturn t\n}", "title": "" }, { "docid": "dcd69ac7fa4bf1e3aeb5e54474d352c4", "score": "0.575752", "text": "func (i *InMageRcmTestFailoverInput) GetTestFailoverProviderSpecificInput() *TestFailoverProviderSpecificInput {\n\treturn &TestFailoverProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "751fd787b3c70b38bc63b4fe91dc8e29", "score": "0.5755104", "text": "func (u *UnplannedFailoverProviderSpecificInput) GetUnplannedFailoverProviderSpecificInput() *UnplannedFailoverProviderSpecificInput {\n\treturn u\n}", "title": "" }, { "docid": "8fb859a83835b85bea04e5d11ac4879f", "score": "0.5724655", "text": "func (r *RecoveryPlanA2AFailoverInput) GetRecoveryPlanProviderSpecificFailoverInput() *RecoveryPlanProviderSpecificFailoverInput {\n\treturn &RecoveryPlanProviderSpecificFailoverInput{\n\t\tInstanceType: r.InstanceType,\n\t}\n}", "title": "" }, { "docid": "c8a0dac6df89da8335e532e0776326e3", "score": "0.56937295", "text": "func (r *RecoveryPlanHyperVReplicaAzureFailbackInput) GetRecoveryPlanProviderSpecificFailoverInput() *RecoveryPlanProviderSpecificFailoverInput {\n\treturn &RecoveryPlanProviderSpecificFailoverInput{\n\t\tInstanceType: r.InstanceType,\n\t}\n}", "title": "" }, { "docid": "decae59c29c8792917a29823a8921a6f", "score": "0.5686913", "text": "func (i *InMageRcmUnplannedFailoverInput) GetUnplannedFailoverProviderSpecificInput() *UnplannedFailoverProviderSpecificInput {\n\treturn &UnplannedFailoverProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "abc2694b2ff798cf0dd5f5af75924c71", "score": "0.5670106", "text": "func (t *TestMigrateProviderSpecificInput) GetTestMigrateProviderSpecificInput() *TestMigrateProviderSpecificInput {\n\treturn t\n}", "title": "" }, { "docid": "76ec558e67ff71776a81381307b75e64", "score": "0.5631482", "text": "func (h *HyperVReplicaAzureTestFailoverInput) GetTestFailoverProviderSpecificInput() *TestFailoverProviderSpecificInput {\n\treturn &TestFailoverProviderSpecificInput{\n\t\tInstanceType: h.InstanceType,\n\t}\n}", "title": "" }, { "docid": "e03d0f6add44369eafb37b2c45b6cf2f", "score": "0.5621436", "text": "func (a *A2ATestFailoverInput) GetTestFailoverProviderSpecificInput() *TestFailoverProviderSpecificInput {\n\treturn &TestFailoverProviderSpecificInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "9bec87b14560a89eb75cf82e740dfc52", "score": "0.56136936", "text": "func (h *HyperVReplicaAzurePlannedFailoverProviderInput) GetPlannedFailoverProviderSpecificFailoverInput() *PlannedFailoverProviderSpecificFailoverInput {\n\treturn &PlannedFailoverProviderSpecificFailoverInput{\n\t\tInstanceType: h.InstanceType,\n\t}\n}", "title": "" }, { "docid": "33e8c8975de774b2ecc2a533faf2cd4d", "score": "0.5580514", "text": "func (i *InMageAzureV2TestFailoverInput) GetTestFailoverProviderSpecificInput() *TestFailoverProviderSpecificInput {\n\treturn &TestFailoverProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "9944f661eccb7f52dc4d84407fd4b868", "score": "0.55632323", "text": "func (i *InMageAzureV2UnplannedFailoverInput) GetUnplannedFailoverProviderSpecificInput() *UnplannedFailoverProviderSpecificInput {\n\treturn &UnplannedFailoverProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "4022d900fa227364c20ada3c8bc44dcd", "score": "0.554799", "text": "func (d *DisableProtectionProviderSpecificInput) GetDisableProtectionProviderSpecificInput() *DisableProtectionProviderSpecificInput {\n\treturn d\n}", "title": "" }, { "docid": "5df07a8903a60f775b5e557ad766d704", "score": "0.55256516", "text": "func (v *VMwareCbtTestMigrateInput) GetTestMigrateProviderSpecificInput() *TestMigrateProviderSpecificInput {\n\treturn &TestMigrateProviderSpecificInput{\n\t\tInstanceType: v.InstanceType,\n\t}\n}", "title": "" }, { "docid": "9f92e8bb14ddb6f4b3fd9f97e2642e43", "score": "0.55202353", "text": "func (r *RemoveDisksProviderSpecificInput) GetRemoveDisksProviderSpecificInput() *RemoveDisksProviderSpecificInput {\n\treturn r\n}", "title": "" }, { "docid": "b4aaa38b7cddf872330d3fffd9c43d0d", "score": "0.55171245", "text": "func (a *A2AUnplannedFailoverInput) GetUnplannedFailoverProviderSpecificInput() *UnplannedFailoverProviderSpecificInput {\n\treturn &UnplannedFailoverProviderSpecificInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "aee031ae8c6bc4b27adc9b340438d923", "score": "0.5469162", "text": "func (i *InMageRcmFailbackPlannedFailoverProviderInput) GetPlannedFailoverProviderSpecificFailoverInput() *PlannedFailoverProviderSpecificFailoverInput {\n\treturn &PlannedFailoverProviderSpecificFailoverInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "74c2a46922a9d48504d0996e6a3569a5", "score": "0.54336166", "text": "func (h *HyperVReplicaAzureFailbackProviderInput) GetPlannedFailoverProviderSpecificFailoverInput() *PlannedFailoverProviderSpecificFailoverInput {\n\treturn &PlannedFailoverProviderSpecificFailoverInput{\n\t\tInstanceType: h.InstanceType,\n\t}\n}", "title": "" }, { "docid": "418b207e959a8d61f676d06886deb9dd", "score": "0.5428298", "text": "func (u *UpdateMigrationItemProviderSpecificInput) GetUpdateMigrationItemProviderSpecificInput() *UpdateMigrationItemProviderSpecificInput {\n\treturn u\n}", "title": "" }, { "docid": "a71fc20238ea08dc01b0c1a24ed24b51", "score": "0.5408059", "text": "func (i *InMageDisableProtectionProviderSpecificInput) GetDisableProtectionProviderSpecificInput() *DisableProtectionProviderSpecificInput {\n\treturn &DisableProtectionProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "b15281e8064ca6462f5756684654ff2a", "score": "0.5394466", "text": "func (v *VMwareCbtContainerMappingInput) GetReplicationProviderSpecificContainerMappingInput() *ReplicationProviderSpecificContainerMappingInput {\n\treturn &ReplicationProviderSpecificContainerMappingInput{\n\t\tInstanceType: v.InstanceType,\n\t}\n}", "title": "" }, { "docid": "55ef80584857c274fcf6573e4004c47f", "score": "0.53871197", "text": "func (a *A2AAddDisksInput) GetAddDisksProviderSpecificInput() *AddDisksProviderSpecificInput {\n\treturn &AddDisksProviderSpecificInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "ea7fad0b678a7a3a2d4e09ffd9ecb137", "score": "0.5378486", "text": "func (a *AddDisksProviderSpecificInput) GetAddDisksProviderSpecificInput() *AddDisksProviderSpecificInput {\n\treturn a\n}", "title": "" }, { "docid": "303bc8c59f8d5296f3eee679529daaeb", "score": "0.5373521", "text": "func (p *PlannedFailoverProviderSpecificFailoverInput) GetPlannedFailoverProviderSpecificFailoverInput() *PlannedFailoverProviderSpecificFailoverInput {\n\treturn p\n}", "title": "" }, { "docid": "654772ac223ea43b49c3f9e46680d987", "score": "0.5259274", "text": "func (v *VMwareCbtUpdateMigrationItemInput) GetUpdateMigrationItemProviderSpecificInput() *UpdateMigrationItemProviderSpecificInput {\n\treturn &UpdateMigrationItemProviderSpecificInput{\n\t\tInstanceType: v.InstanceType,\n\t}\n}", "title": "" }, { "docid": "f44a94783af03fac375926de2348b4a7", "score": "0.51611936", "text": "func (a *A2ARemoveDisksInput) GetRemoveDisksProviderSpecificInput() *RemoveDisksProviderSpecificInput {\n\treturn &RemoveDisksProviderSpecificInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "99405fd1368ad876edefaab9db0c5d2f", "score": "0.51578593", "text": "func (a *A2AContainerMappingInput) GetReplicationProviderSpecificContainerMappingInput() *ReplicationProviderSpecificContainerMappingInput {\n\treturn &ReplicationProviderSpecificContainerMappingInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "4db0f7c7c2ca967bca0ef4027f4d5f92", "score": "0.5144629", "text": "func (r *ReplicationProviderSpecificContainerMappingInput) GetReplicationProviderSpecificContainerMappingInput() *ReplicationProviderSpecificContainerMappingInput {\n\treturn r\n}", "title": "" }, { "docid": "97065ecf5e4e12eff7595d683dcd5158", "score": "0.5116476", "text": "func (i *InMageRcmUpdateContainerMappingInput) GetReplicationProviderSpecificUpdateContainerMappingInput() *ReplicationProviderSpecificUpdateContainerMappingInput {\n\treturn &ReplicationProviderSpecificUpdateContainerMappingInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "515af2d48330aac37736ef3a2d797146", "score": "0.5105253", "text": "func (r *ReverseReplicationProviderSpecificInput) GetReverseReplicationProviderSpecificInput() *ReverseReplicationProviderSpecificInput {\n\treturn r\n}", "title": "" }, { "docid": "db722b68ea5387b429d4a6bf544316d6", "score": "0.506157", "text": "func (v *VMwareCbtContainerCreationInput) GetReplicationProviderSpecificContainerCreationInput() *ReplicationProviderSpecificContainerCreationInput {\n\treturn &ReplicationProviderSpecificContainerCreationInput{\n\t\tInstanceType: v.InstanceType,\n\t}\n}", "title": "" }, { "docid": "922661dfffa6eaa5ab12e4589ab340ab", "score": "0.5024589", "text": "func (a *A2ACrossClusterMigrationContainerCreationInput) GetReplicationProviderSpecificContainerCreationInput() *ReplicationProviderSpecificContainerCreationInput {\n\treturn &ReplicationProviderSpecificContainerCreationInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "25434c994e157c83837c2e6ca4df8bed", "score": "0.49738586", "text": "func (r *ReplicationProviderSpecificContainerCreationInput) GetReplicationProviderSpecificContainerCreationInput() *ReplicationProviderSpecificContainerCreationInput {\n\treturn r\n}", "title": "" }, { "docid": "7c771cfd8954c69a52aa9ab3ff2c7c92", "score": "0.49523684", "text": "func (r *RecoveryPlanProviderSpecificDetails) GetRecoveryPlanProviderSpecificDetails() *RecoveryPlanProviderSpecificDetails {\n\treturn r\n}", "title": "" }, { "docid": "00f6768c059cf828f0b8062b3b8edc7e", "score": "0.49490288", "text": "func (a *A2AContainerCreationInput) GetReplicationProviderSpecificContainerCreationInput() *ReplicationProviderSpecificContainerCreationInput {\n\treturn &ReplicationProviderSpecificContainerCreationInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "e183920888ecf74ed252a8910cd9f4c1", "score": "0.4883077", "text": "func GetClusterProviderFromRequest(\n\tctx context.Context,\n\trequest interface{},\n\tprojectProvider provider.ProjectProvider,\n\tprivilegedProjectProvider provider.PrivilegedProjectProvider,\n\tuserInfoGetter provider.UserInfoGetter) (*kubermaticv1.Cluster, *kubernetesprovider.ClusterProvider, error) {\n\n\treq, ok := request.(common.GetClusterReq)\n\tif !ok {\n\t\treturn nil, nil, kubermaticerrors.New(http.StatusBadRequest, \"invalid request\")\n\t}\n\n\tcluster, err := GetCluster(ctx, projectProvider, privilegedProjectProvider, userInfoGetter, req.ProjectID, req.ClusterID)\n\tif err != nil {\n\t\treturn nil, nil, kubermaticerrors.New(http.StatusInternalServerError, err.Error())\n\t}\n\n\trawClusterProvider, ok := ctx.Value(middleware.PrivilegedClusterProviderContextKey).(provider.PrivilegedClusterProvider)\n\tif !ok {\n\t\treturn nil, nil, kubermaticerrors.New(http.StatusInternalServerError, \"no clusterProvider in request\")\n\t}\n\tclusterProvider, ok := rawClusterProvider.(*kubernetesprovider.ClusterProvider)\n\tif !ok {\n\t\treturn nil, nil, kubermaticerrors.New(http.StatusInternalServerError, \"failed to assert clusterProvider\")\n\t}\n\treturn cluster, clusterProvider, nil\n}", "title": "" }, { "docid": "2855e3988df193ebb34bd186b740e10b", "score": "0.4827335", "text": "func NewCashPaymentProduct1526SpecificInput() *CashPaymentProduct1526SpecificInput {\n\treturn &CashPaymentProduct1526SpecificInput{}\n}", "title": "" }, { "docid": "45913484f4f9de818bef381d11c94ba0", "score": "0.48246762", "text": "func (a *A2AReprotectInput) GetReverseReplicationProviderSpecificInput() *ReverseReplicationProviderSpecificInput {\n\treturn &ReverseReplicationProviderSpecificInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "335b1d09cd47614af100b4379ba54070", "score": "0.48238724", "text": "func (h *HyperVReplicaAzureReprotectInput) GetReverseReplicationProviderSpecificInput() *ReverseReplicationProviderSpecificInput {\n\treturn &ReverseReplicationProviderSpecificInput{\n\t\tInstanceType: h.InstanceType,\n\t}\n}", "title": "" }, { "docid": "75c75cdcadc83c6c92000c22fb35cba4", "score": "0.48227423", "text": "func (i *InMageReprotectInput) GetReverseReplicationProviderSpecificInput() *ReverseReplicationProviderSpecificInput {\n\treturn &ReverseReplicationProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "57e4f19ef1756a6911a6ea9ea2f60ac0", "score": "0.47944173", "text": "func (a *A2AUpdateContainerMappingInput) GetReplicationProviderSpecificUpdateContainerMappingInput() *ReplicationProviderSpecificUpdateContainerMappingInput {\n\treturn &ReplicationProviderSpecificUpdateContainerMappingInput{\n\t\tInstanceType: a.InstanceType,\n\t}\n}", "title": "" }, { "docid": "44eadfccf994a4d0407d0b0056cc190e", "score": "0.47556305", "text": "func (r *ReplicationProviderSpecificUpdateContainerMappingInput) GetReplicationProviderSpecificUpdateContainerMappingInput() *ReplicationProviderSpecificUpdateContainerMappingInput {\n\treturn r\n}", "title": "" }, { "docid": "dc0c2a091b0ddb52be5e90bd10783dc0", "score": "0.46973217", "text": "func (i *InMageRcmReprotectInput) GetReverseReplicationProviderSpecificInput() *ReverseReplicationProviderSpecificInput {\n\treturn &ReverseReplicationProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "cfe8472e411c208585040ae7d9c7d40b", "score": "0.4689814", "text": "func (i *InMageRcmRecoveryPointDetails) GetProviderSpecificRecoveryPointDetails() *ProviderSpecificRecoveryPointDetails {\n\treturn &ProviderSpecificRecoveryPointDetails{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "03b10fed631aa0df253b0e5fdcc48724", "score": "0.46778634", "text": "func getPartnerProviderFromPost(r *http.Request) *PartnerInputData {\n\tvar data PartnerInputData\n\n\tapi.GetFromPost(r, &data)\n\n\tutil.InfoLog.Println(\"Use partner input data \", data)\n\n\tutil.InfoLog.Println(\"date of birth \", data.Provider.DateOfBirth)\n\n\treturn &data\n}", "title": "" }, { "docid": "239f971d9c4c1e54f0cecb074365b1a5", "score": "0.46305886", "text": "func (p *ProviderSpecificRecoveryPointDetails) GetProviderSpecificRecoveryPointDetails() *ProviderSpecificRecoveryPointDetails {\n\treturn p\n}", "title": "" }, { "docid": "48a406b435449e9c0fee983c3bb597ad", "score": "0.45962632", "text": "func (i *InMageRcmFabricCreationInput) GetFabricSpecificCreationInput() *FabricSpecificCreationInput {\n\treturn &FabricSpecificCreationInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "5aaa9eacce8a3d60f345367d1602cf0e", "score": "0.4590612", "text": "func (i *InMageRcmFailbackReprotectInput) GetReverseReplicationProviderSpecificInput() *ReverseReplicationProviderSpecificInput {\n\treturn &ReverseReplicationProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "c21e0402e504a5d7ccf77db5758a788b", "score": "0.4577154", "text": "func DefaultReadCloudProvider(ctx context.Context, in *CloudProvider, db *gorm1.DB, fs *query1.FieldSelection) (*CloudProvider, error) {\n\tif in == nil {\n\t\treturn nil, errors1.NilArgumentError\n\t}\n\tormObj, err := in.ToORM(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif ormObj.Id == \"\" {\n\t\treturn nil, errors1.EmptyIdError\n\t}\n\tif hook, ok := interface{}(&ormObj).(CloudProviderORMWithBeforeReadApplyQuery); ok {\n\t\tif db, err = hook.BeforeReadApplyQuery(ctx, db, fs); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tif db, err = gorm2.ApplyFieldSelection(ctx, db, fs, &CloudProviderORM{}); err != nil {\n\t\treturn nil, err\n\t}\n\tif hook, ok := interface{}(&ormObj).(CloudProviderORMWithBeforeReadFind); ok {\n\t\tif db, err = hook.BeforeReadFind(ctx, db, fs); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tormResponse := CloudProviderORM{}\n\tif err = db.Where(&ormObj).First(&ormResponse).Error; err != nil {\n\t\treturn nil, err\n\t}\n\tif hook, ok := interface{}(&ormResponse).(CloudProviderORMWithAfterReadFind); ok {\n\t\tif err = hook.AfterReadFind(ctx, db, fs); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tpbResponse, err := ormResponse.ToPB(ctx)\n\treturn &pbResponse, err\n}", "title": "" }, { "docid": "67af158aedbc4a92ac92220edddd8838", "score": "0.45625243", "text": "func (i *InMageAzureV2ReprotectInput) GetReverseReplicationProviderSpecificInput() *ReverseReplicationProviderSpecificInput {\n\treturn &ReverseReplicationProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "9aef1124fcabaef5135b69bd7e7e6434", "score": "0.45588824", "text": "func DecodeProviderAdminInitialiseKeyRequest(fcrMsg *FCRMessage) (\n\t*nodeid.NodeID, // provider id\n\t*fcrcrypto.KeyPair, // private key\n\t*fcrcrypto.KeyVersion, // private key version\n\terror, // error\n) {\n\tif fcrMsg.GetMessageType() != ProviderAdminInitialiseKeyRequestType {\n\t\treturn nil, nil, nil, errors.New(\"message type mismatch\")\n\t}\n\tmsg := providerAdminInitialiseKeyRequest{}\n\terr := json.Unmarshal(fcrMsg.GetMessageBody(), &msg)\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\tprivKey, err := fcrcrypto.DecodePrivateKey(msg.PrivateKey)\n\tif err != nil {\n\t\treturn nil, nil, nil, errors.New(\"fail to decode private key\")\n\t}\n\tprivKeyVer := fcrcrypto.DecodeKeyVersion(msg.PrivateKeyVersion)\n\tnodeID, _ := nodeid.NewNodeIDFromHexString(msg.ProviderID)\n\treturn nodeID, privKey, privKeyVer, nil\n}", "title": "" }, { "docid": "4c810a60f30515a5d076e496296a3635", "score": "0.45541915", "text": "func (f *FabricSpecificCreationInput) GetFabricSpecificCreationInput() *FabricSpecificCreationInput {\n\treturn f\n}", "title": "" }, { "docid": "c2457495872f3147915f0f9d01dcf0d1", "score": "0.45473576", "text": "func (c *CreateRequest) GetCardPayoutMethodSpecificInput() *CardPayoutMethodSpecificInput {\n\tif c == nil {\n\t\treturn nil\n\t}\n\treturn c.CardPayoutMethodSpecificInput\n}", "title": "" }, { "docid": "87de17c2f9336dbf5ee35827899879be", "score": "0.44947344", "text": "func (m *MigrationProviderSpecificSettings) GetMigrationProviderSpecificSettings() *MigrationProviderSpecificSettings {\n\treturn m\n}", "title": "" } ]